MSN Messenger 7.0 Beta

Microsoft is all set to release the latest limited beta version of its instant messaging client MSN Messenger (rather might have already released it).

The new enhanced version is designed to attract viewers’ attention through dubbed “winks”, a sound animation, and make the contact’s Messenger window vibrate on screen, a “nudge”.

Users of MSN Messenger 7.0 will also be able to specify their status before logging in (useful for logging in invisibly). Interestingly, many of the enhanced version’s features already exist in its primary competitor Yahoo messenger.

Microsoft also intends to promote other MSN services, especially MSN Search, in the client and is testing services that allow users to purchase additional features such as special emoticons.

While the beta version includes several new features, it does not have all the features Microsoft has planned for MSN Messenger 7.0.

Microsoft hopes to release the final version to all users in the first quarter of 2005, after the public beta test.

What is TRACERT?

The TRACERT diagnostic utility determines the route taken to a destination by sending Internet Control Message Protocol (ICMP) echo packets with varying IP Time-To-Live (TTL) values to the destination. Each router along the path is required to decrement the TTL on a packet by at least 1 before forwarding it, so the TTL is effectively a hop count. When the TTL on a packet reaches 0, the router should send an ICMP Time Exceeded message back to the source computer.

TRACERT determines the route by sending the first echo packet with a TTL of 1

and incrementing the TTL by 1 on each subsequent transmission until the target

responds or the maximum TTL is reached. The route is determined by examining the ICMP Time Exceeded messages sent back by intermediate routers. Note that some routers silently drop packets with expired TTLs and are invisible to TRACERT.

TRACERT prints out an ordered list of the routers in the path that returned the

ICMP Time Exceeded message. If the -d switch is used (telling TRACERT not to

perform a DNS lookup on each IP address), the IP address of the near- side

interface of the routers is reported.

  • Note: Not all machines on the internet will respond to a tracert or ping, this may be for security reasons and not as a result of a problem.

  • What is RFID?

    Radio Frequency Identification is a means of capturing data about an object without using a human to read the data.

    But isn’t that what bar codes do?

    Yes, and bar codes and RFID both belong to a group of technologies called Automatic Identification and Data Capture. Along with Smart cards, and Magnetic Stripe technology and a host of others, this is a method of automating our need for data.

    We have all become very aware of bar codes as they have permeated our existence in the last 25 years. In fact, it is tough to buy something in a store that does not use bar codes these days. But bar codes have four disadvantages that it would be nice to eliminate:

  • You have to be able to see them

  • The bar code cannot be written on or defaced

  • You cannot change the data once they are printed

  • They take up space on the object they are printed on

    So what can we do about this things? Is the answer is RFID.

    But what is RFID and what is all this hoopla about? For those of you who are coming to Radio Frequency Identification (RFID) for the first time, a brief introduction is called for. This technology has been around for many years, but it is only in the past few years that we have seen a surge in its acceptance and a massive growth in its use. AIM has published a history of RFID and you can get more information from the web site at Shrouds of Time – A History of RFID

    From its first uses back in the 1940s, RFID suffered a very slow start and it is only since 1997 that we have seen the massive growth in the industry as technology caught up with the desires and the possibility of low cost tags was realized. Now we have the capability to make tags at a reasonable cost and the opportunities are beginning to really show themselves. As I look at my database, there are 338 companies that have identified themselves as being involved in RFID around the world. When you consider than maybe only five years ago, you could count the suppliers on your fingers, this is a massive increase.

    The technology uses a very simple idea that has many complications involved in its execution. A reader/interrogator/scanner transmits an RF wave to a tag. The tag “hears” the RF wave, and responds with some data. Tags come in many flavors: passive, battery assisted, active, backscatter, different frequencies, tag talks first, reader talks first, various anti-collision techniques or not, printed antennas, wire wound antennas, hard case, label, etc. So many variations that it can be very confusing, but there is good news. Your application will define many of these for you, and working with your supplier/integrator you will rapidly choose the solution that is best for you.

    So lets learn about the technology.

  • My New Computer

    Sorry couldnt write from a few days.. Actually I got a new computer and was busy installing Stuff on it..

    The Config goes as follows:

    P IV 3 Ghz with Hyper-Threading Technology

    1 Gb Of RAM

    915 Express Motherboard

    80 Gb SATA HDD

    and a 8X DVD Writer

    Now thats what I would say “Envy for others” 😉

    Medical School Exams…

    Once upon a time, a Sardar applied to Medical School needless to say he never made it –

    do you know why ????

    These are the answers he gave …

    ANTIBODY – against everyone

    ARTERY – the study of fine paintings

    BACTERIA – back door to a cafeteria

    COMA – punctuation mark

    DIAGNOSIS – person with a slanted nose

    DILATE – the late British princess

    GALLBLADDER – bladder in a girl

    GENES – blue denim

    HERNIA – she is close by

    HYMEN – greeting to several males

    IMPOTENT – distinguished, well-known

    LABOR PAIN – hurt at work

    LACTOSE – person without digits on the foot

    LIPOSUCTION – a French kiss

    LYMPH – walk unsteadily

    MICROBES – small dressing gowns

    OBESITY – city of Obe

    SECRETION – hiding anything

    TABLET – small table

    ULTRASOUND – radical noise

    CAESARIAN SECTION – a district in Rome

    CARDIOLOGY – advanced study of playing cards

    CAT SCAN – searching for lost kitty

    CHRONIC – neck of a crow

    The right PING!!

    I am a total network freak and just love to network computers and do all sorts of R&D on it.. Yest, when I wanted to Remote Login on a Machine, I just couldnt do it.. Then called for “GOD” and he asked me to use “PING”.. So finally my “neck” savor told me the problem and i rectified the errors in IP Address..

    Well, most of US definately must have or will have to use “PING” at one point or other.. So here is something to give you and Inside Story on How does Ping work..

  • The source device generates an ICMP protocol data unit.
  • The ICMP PDU is encapsulated in an IP datagram, with the source and destination IP addresses in the IP header.
  • The source machine notes the local time on it’s clock as it transmits the IP Datagram towards the destination. Each machine that receives the datagram checks the destination address to see if it matches their own, or is the ‘all hosts’ address.
  • If the destination IP address in the IP datagram does not match the local machine’s address, the datgram is forwarded to the network where the IP address resides.
  • The destination machine receives the packet, finds a match between itself and the destination address in the IP packet.
  • The destination machine notes the ICMP information in the ICMP ECHO, performs any necessary work, and destroys the complete original IP/ICMP Echo packet.
  • The destination machine creates an ICMP Echo Reply, encapsulates it in IP placing it’s own address in the source IP address field, and the original sender’s IP address in the destination field of the IP datagram.
  • The packet is routed back to the originator of the first ICMP Echo, who receives it, notes the time on the clock, prints PING output information, including the elapsed time.
  • The process above is repeated until all requested Echo packets have been sent, and responses have been received or timed out.

    Note that since ICMP requires responses, a fully functioning duplex communication environment (a downlink and uplink path) must be in place and be functioning for the PING to work.

    PING does not work where there is a single, one way link.

    What is UDP?

    This one is also one of the imp Protocols. Its always compared with TCP/IP…..

    UDP

    User Datagram Protocol (UDP) provides an unreliable packetized data transfer service between endpoints on an internet. UDP depends on IP to move packets around the network on its behalf.

    UDP does not guarantee to actually deliver the data to the destination, nor does it guarantee that data packets will be delivered to the destination in the order in which they were sent by the source, nor does it guarantee that only one copy of the data will be delivered to the destination. UDP does guarantee data integrity, and it does this by adding a checksum to the data before transmission. (Some machines run with UDP checksum generation disabled, in which case data corruption or truncation can go undetected. Very few people think this is a good idea.)

    What is IP?

    Continuing with different protocols, here is the one which everyone of us should know about.. The basic Protocol of “World Wide Web“…..

    Internet Protocol

    Internet Protocol (IP) is the central, unifying protocol in the TCP/IP suite. It provides the basic delivery mechanism for packets of data sent between all systems on an internet, regardless of whether the systems are in the same room or on opposite sides of the world. All other protocols in the TCP/IP suite depend on IP to carry out the fundamental function of moving packets across the internet.

    In terms of the OSI networking model, IP provides a Connectionless Unacknowledged Network Service, which means that its attitude to data packets can be characterised as “send and forget”. IP does not guarantee to actually deliver the data to the destination, nor does it guarantee that the data will be delivered undamaged, nor does it guarantee that data packets will be delivered to the destination in the order in which they were sent by the source, nor does it guarantee that only one copy of the data will be delivered to the destination.

    Because it makes so few guarantees, IP is a very simple protocol. This means that it can be implemented fairly easily and can run on systems that have modest processing power and small amounts of memory. It also means that IP demands only minimal functionality from the underlying medium (the physical network that carries packets on behalf of IP) and can be deployed on a wide variety of networking technologies.

    The no-promises type of service offered by IP is not directly useful to many applications. Applications usually depend on TCP or UDP to provide assurances of of data integrity and (in TCP’s case) ordered and complete data delivery.

    What is SNMP?

    SNMP Protocol Overview

    The Simple Network Management Protocol (SNMP) is essentially a request-reply protocol running over UDP (ports 161 and 162), though TCP operation is possible. SNMP is an asymmetric protocol, operating between a management station (smart) and an agent (dumb). The agent is the device being managed –

    all its software has to do is implement a few simple packet types and a generic get-or-set function on its MIB variables. The management station presents the user interface. Simple management stations can be built with UNIX command-line utilities. More complex (and expensive) ones collect

    MIB data over time and use GUIs to draw network maps.

    An SNMP operation takes the form of a Protocol Data Unit (PDU), basically a fancy word for packet. Version 1 SNMP supports five possible PDUs:

    • GetRequest / SetRequest supplies a list of objects and, possibly, values they are to be set to (SetRequest). In either case, the agent returns a GetResponse.

    • GetResponse informs the management station of the results of a GetRequest or SetRequest by returning an error indication and a list of variable/value bindings.

    • GetNextRequest is used to perform table transversal,

      and in other cases where the management station does not know the exact MIB name of the object it desires. GetNextRequest does not require an exact name to be specified; if no object exists of the specified name, the next object in the MIB is returned. Note that to support this, MIBs must be strictly ordered sets (and are).

    • Trap is the only PDU sent by an agent on its own initiative. It is used to notify the management station of an unusual event that may demand further attention (like a link going down). In version 2, traps are named in MIB space. Newer MIBs specify management objects that control how traps are sent.

    What is IMAP?

    Well, POP3 was done.. But then I though it would be real good to write stuff about IMAP.. So guys, for all you wanting to know about this protocol, here is the answer…

    IMAP (Internet Mail Access Protocol)

    A method of accessing electronic mail or bulletin board messages that are kept on a (possibly shared) mail server. In other words, it permits a “client” email program to access remote message stores as if they were local. For example, email stored on an IMAP server can be manipulated from a desktop computer at home, a workstation at the office, and a notebook computer while traveling, without the need to transfer messages or files back and forth between these computers.

    IMAP synchronizes the messages with the server with the e-mail client by downloading just the subject and header information from the new messages (instead of the entire message). When a message is read, the body of the message is then sent to the e-mail client but the message remains on the IMAP server. Now if a user moves messages into folders, the messages are saved on the server, not on the user’s computer.

    Advantages:

    1) Can manipulate persistent message status flags.

    2) Can support concurrent upsates and access to shared mailboxes.

    3) Especially useful management over low speed links. More efficient than POP3.

    4) Save valuable bandwidth, because when you check your mail, all you download is headers: you don’t download any message until you ask to read it. Read or download any part of a MIME message without downloading the other parts – no more waiting for attachments to download before you can read your mail.

    5) Access and manipulate your mail and all your mailboxes (mail folders) from anywhere – work, home, on the road, even using someone else’s computer – with total convenience and transparency, without any confusion about what you’ve read, where you’ve stored it, and so on.

    Disadvantages:

    1) More complicated to implement on the server

    2) Less software which supports the IMAP protocol (like older versions of Eudora).