Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Web design and_development

141 views

Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Web design and_development

  1. 1. Web_Design_And_Development : Part IHow To Build A Hydroponics SystemGiven the fact that hydroponic systems are sometimes quite expensive, and very often theycan only be ordered on the Internet, many people choose to build a hydroponics systems athome and experiment growing plants without soil. This may begin as a hobby that couldturn into a life time occupation. Building your own plant growing independent system is notjust simple, but it is also fun. Here are the basic instructions you need to follow in order tohave a system applicable to water-loving plants.Useful stepsIn oder to build a hydroponics system you need a lightproof reservoir; this can either be afish tank, a bin or a bucket. If it is transparent, youll have to paint it black given the fact thatlight exposure stimulates algae growth. Once youve painted the reservoir, youll have todraw a line or a sign of some kind to mark the maximum water level. Then you will need afloater StyroFoam is ideal for such cases. The ideal reservoirs should have the samedimensions from top to bottom so that the floater fits better. Dont place it within the tankuntil youve made the holes for the net pots.You are going to place the net pots on the floater, so, when you build a hydroponics systemyou have to trace the exact shape of the pots on the StyroFoam. Use a knife or a cutter todo so. Since air will have to enter the reservoir, dont forget to cut another little hole at oneof the end of the floaters for the air line to run inside. Also keep in mind that plants mustntbe too close to each other.On the contrary, you should leave enough space between them to make sure that there isenough light for them all. Next you have to fix the air line of the pump into the tank. Whenyou choose the pump, consider the reservoir dimensions. Furthermore, the air line needs tobe either on the bottom of the reservoir or in the middle, in such a way so as the oxygenbubbles would reach the plant roots.Top tips and recommendationsWhen you build a hydroponics system at home there are some dos and donts you have toremember. Once youve filled the reservoir with the nutrient solution, you will need to keepconstant watch over its level. Moreover, light sources are everything. If you grow your plantsindoors and use artificial light, there are special types of lamps to be used depending on thegrowth period.For instance for accelerated growth youd need High Intensity Discharge lamps, whereas fordense flowers High Pressure Sodium is the best solution. Should you turn hydroponics intoa full time occupation, youll have to think of more professional solutions when you build ahydroponics system. Good luck!
  2. 2. Hiring a web designer to come up with the custom solution that you need can set you backa few thousand bucks. But you can do the whole thing yourself and make it drag and dropsimple for mere pennies with a tool like Breezy Websites. See http://breezywebsites.comfor details!WEB_DESIGN_AND_DEVELOPMENT : End of Part IWeb_Design_And_Development : Part IIHow To Build A Simple Open-Source Distributed Protocol AnalyzerThis is the way that Network General (the creator of Sniffer ) has deployed DistributedSniffer since the beginning. While the product that you are using may be from another orOpen-Source vendor,( i.e. Ethereal / WireShark ), this process is time honored and assuch, is considered to be Best Practice.This design is meant to assure that the NIC that is listening to the Monitor is not sendingany packets itself. The Monitor Card should have no protocols bound to itself and listens inpromiscuous mode. Additionally, the PC should be as passive as possible and not phoninghome to vendors because of unnecessary software it has loaded.One process is to take a companys standard laptop and customize it by removing anythingthat is not needed to support the role of a Protocol Analyzer. Any software that is not part ofthe laptops OS requirements should be un-installed. Once the laptop has been strippeddown this way, load the Open Source Protocol Analyzer of your choice and test it.Once testing is satisfactorily completed, save an Image of the laptop to be used to generateother Open Source Laptop Protocol Analyzers.System Requirements:Pentium 4 or higher.1GB Memory or higher.2 NICs. One of which is 100Mbs (not Gigabit) to be used as the Monitor Card. (NOTE: Thisprocess is not appropriate for Gigabit Monitoring.)Remote Control Software (i.e. VNC) that supports File Transfers from the laptop acting as aProtocol Analyzer to the PC used by the Network Transaction Analyst.
  3. 3. Two NICs:1st NIC Monitor Card No IP bound to the card. This card just listens in promiscuousmode. It is the one that is attached to the Monitor Port in the Switch. This should be a 100Mbs NIC.2nd NIC Transport Card IP is bound (static) so that this card can be used on the Intranetto access the remote control function of the PC. This can be Gigabit if that is all that isavailable.Other Configuration Issues:No Management Software (SMS, Radia, etc.) enabled. No management of this device otherthan remote control.Virus Protection (only if it is considered mandatory by company policy). However, this laptopshould have no email client or any other software that will want to connect to the Internet(with the possible exception of Time Services). A Firewall rule can always be created toenforce its isolation from the public Internet except on approved sockets.A Time Server should be in place to keep the various Protocol Analysis Laptops in sync.This can be an Internet source if Company Policy permits or a local Intranet source.The laptop should not be a member of the Company Domain. One logs into the PC itself,locally or via remote control.All Mirrors in switches are to be bi-directional.Consider creating a shared folder to act as a Trace File depository. This is not required, butcan be helpful as these files can easily grow too large for many corporate email policy sizelimits.Use WinZip on the Laptop to allow compression of the large trace files to speed up transfer.Hiring a web designer to come up with the custom solution that you need can set you backa few thousand bucks. But you can do the whole thing yourself and make it drag and dropsimple for mere pennies with a tool like Breezy Websites. See http://breezywebsites.comfor details!WEB_DESIGN_AND_DEVELOPMENT : End of Part IIWeb_Design_And_Development : Part IIIHow To Build A Simple Open-Source Distributed Protocol Analyzer
  4. 4. This is the way that Network General (the creator of Sniffer ) has deployed DistributedSniffer since the beginning. While the product that you are using may be from another orOpen-Source vendor,( i.e. Ethereal / WireShark ), this process is time honored and assuch, is considered to be Best Practice.This design is meant to assure that the NIC that is listening to the Monitor is not sendingany packets itself. The Monitor Card should have no protocols bound to itself and listens inpromiscuous mode. Additionally, the PC should be as passive as possible and not phoninghome to vendors because of unnecessary software it has loaded.One process is to take a companys standard laptop and customize it by removing anythingthat is not needed to support the role of a Protocol Analyzer. Any software that is not part ofthe laptops OS requirements should be un-installed. Once the laptop has been strippeddown this way, load the Open Source Protocol Analyzer of your choice and test it.Once testing is satisfactorily completed, save an Image of the laptop to be used to generateother Open Source Laptop Protocol Analyzers.System Requirements:Pentium 4 or higher.1GB Memory or higher.2 NICs. One of which is 100Mbs (not Gigabit) to be used as the Monitor Card. (NOTE: Thisprocess is not appropriate for Gigabit Monitoring.)Remote Control Software (i.e. VNC) that supports File Transfers from the laptop acting as aProtocol Analyzer to the PC used by the Network Transaction Analyst.Two NICs:1st NIC Monitor Card No IP bound to the card. This card just listens in promiscuousmode. It is the one that is attached to the Monitor Port in the Switch. This should be a 100Mbs NIC.2nd NIC Transport Card IP is bound (static) so that this card can be used on the Intranetto access the remote control function of the PC. This can be Gigabit if that is all that isavailable.Other Configuration Issues:No Management Software (SMS, Radia, etc.) enabled. No management of this device otherthan remote control.Virus Protection (only if it is considered mandatory by company policy). However, this laptopshould have no email client or any other software that will want to connect to the Internet
  5. 5. (with the possible exception of Time Services). A Firewall rule can always be created toenforce its isolation from the public Internet except on approved sockets.A Time Server should be in place to keep the various Protocol Analysis Laptops in sync.This can be an Internet source if Company Policy permits or a local Intranet source.The laptop should not be a member of the Company Domain. One logs into the PC itself,locally or via remote control.All Mirrors in switches are to be bi-directional.Consider creating a shared folder to act as a Trace File depository. This is not required, butcan be helpful as these files can easily grow too large for many corporate email policy sizelimits.Use WinZip on the Laptop to allow compression of the large trace files to speed up transfer.Hiring a web designer to come up with the custom solution that you need can set you backa few thousand bucks. But you can do the whole thing yourself and make it drag and dropsimple for mere pennies with a tool like Breezy Websites. See http://breezywebsites.comfor details!WEB_DESIGN_AND_DEVELOPMENT : End of Part III
  6. 6. (with the possible exception of Time Services). A Firewall rule can always be created toenforce its isolation from the public Internet except on approved sockets.A Time Server should be in place to keep the various Protocol Analysis Laptops in sync.This can be an Internet source if Company Policy permits or a local Intranet source.The laptop should not be a member of the Company Domain. One logs into the PC itself,locally or via remote control.All Mirrors in switches are to be bi-directional.Consider creating a shared folder to act as a Trace File depository. This is not required, butcan be helpful as these files can easily grow too large for many corporate email policy sizelimits.Use WinZip on the Laptop to allow compression of the large trace files to speed up transfer.Hiring a web designer to come up with the custom solution that you need can set you backa few thousand bucks. But you can do the whole thing yourself and make it drag and dropsimple for mere pennies with a tool like Breezy Websites. See http://breezywebsites.comfor details!WEB_DESIGN_AND_DEVELOPMENT : End of Part III

×