Monday, 22 September 2014




Has the title suggests that the subject has to do with the Internet daemon or the Internet dark, which has already touched him by the Secretary of Rgab, but in fact what Sacherha in this post is a different topic, how do you overcome the disconnect from the Internet or block specific sites by service providers, Internet Service Providers. 
There is no doubt that Internet users want to get out for the control of service providers who represent the only outlet to gain access to the network, if they block certain sites, especially social networking sites Ctoatr and Facebook, or they prevented access to the network once and the millions of people sit tight in the darkness of Digital. , and this vein popping loop wireless networks Wireless Mesh Networks that connect end users together, and allow them to stay online and whirling on the central network even if closed. And here's compared photographer between normal network in a network loop or network under: Network extraordinary: a network loop: In normal network users will be just the points on the edges, while in the networking loop wireless users will be intermediate stations or in other words, if you cut the Internet have become providers of Internet for themselves. To create a network loop wireless necessary number Asgari of the contract any users to ensure network continuity, and is required for each user device Rutter Router type Open Mesh Accses Point, for example, is placed outside the home on the surface is high, and is covered by a box of plastic to protect it from the impact of weather factors, in addition to the line of sight Rutter with another user until the call is made ​​between them, and, of course, must be one user of users connected to the Internet via cable Cable.These are some pictures of Network Equipment loop: supports sending data in these networks, routing Routing where to send data via custom path by jumping from node to node until it reaches its destination, and when the crash to contact when a node is going automatically to another node are valid. said of the pros networks shade it a strong coherent, if become invalid node it does not cripple the entire system, which allows the addition of new devices without installing any wires and then they are inexpensive, and that the increase in the number of nodes increases the speed of data exchange which in this side-like technique Peer to peer Peer -To-Peer. feature in the latter perhaps more importantly, the networks are Matmanha loop of digital freedom and more privacy for Internet users, and is the same feature that will allow the deployment of these networks and develop in the future. theme of the party: Abdul Qadir Balkheir
 











0 التعليقات:

POST A COMMENT

0 التعليقات:

Post a Comment