How to Recover Deleted SMS from SIM or Phone Memory
Have you deleted SMS messages that you wish had not gotten deleted? You will be happy to know there are a number of different software that can help you recover the messages you need and want, but not all of them are free and you need to purchase the software. However, if you own a Nokia phone you might be in luck, as there are very good chances of message recovery from your cellphone without need of any specialized data recovery software for free. In this tutorial I will explain, what are the steps to be followed in order to recover deleted SMS from a SIM card or phone memory.
1. First of all download and install FExplorer, excellent file manager and also sends files via bluetooth.
2. Launch FExplorer and navigate to C: if you use Phone Memory to store your messages (default) and D: if you use Storage Card as your SMS storage location.
3. Now navigate to and open "system" folder.
4. Now open the "mail" folder.
5. This folder should contain many folders named similar to 0010001_s etc. with files named similar to 00100000 etc. These files are the actual deleted messages. Simply, use the FExplorer inbuild text viewer to view these files. You will need to browse through every folder and open all files inside them until you get the required SMS.
Thsi tool includes more great fetures like:
Cut, copy & paste files
Check date modified & size
Display free space available
View file with inbuilt text viewer
Cut, copy, create & paste directories
File find. (although this only works within a directory)
Take screenshots
Set your backlight to be permanently on
Send files via bluetooth. (may be necessary to rename .sis to .sis_)
Compress memory - increasing available free memory ...and much more. All of all FExplorer is a handy file explorer application for your Series 60 phone. With a wide range of features, tips and tricks, FExplorer will become one of your favorite mobile applications!
1. First of all download and install FExplorer, excellent file manager and also sends files via bluetooth.
2. Launch FExplorer and navigate to C: if you use Phone Memory to store your messages (default) and D: if you use Storage Card as your SMS storage location.
3. Now navigate to and open "system" folder.
4. Now open the "mail" folder.
5. This folder should contain many folders named similar to 0010001_s etc. with files named similar to 00100000 etc. These files are the actual deleted messages. Simply, use the FExplorer inbuild text viewer to view these files. You will need to browse through every folder and open all files inside them until you get the required SMS.
Thsi tool includes more great fetures like:
Cut, copy & paste files
Check date modified & size
Display free space available
View file with inbuilt text viewer
Cut, copy, create & paste directories
File find. (although this only works within a directory)
Take screenshots
Set your backlight to be permanently on
Send files via bluetooth. (may be necessary to rename .sis to .sis_)
Compress memory - increasing available free memory ...and much more. All of all FExplorer is a handy file explorer application for your Series 60 phone. With a wide range of features, tips and tricks, FExplorer will become one of your favorite mobile applications!
Haya ndiyo malengo Ya kampuni za teknolojia Kwa mwaka 2015
MAMBO MATANO USIYOYAJUA KUHUSU KADI ZA NMB MASTERCARD
1. NMB MasterCard ni nini?
NMB
MasterCard ni kadi mpya ya benki ya NMB itakayomwezesha mteja kupata
fedha zake wakati wowote na mahali popote duniani penye nembo ya
MasterCard. Unaweza pia kutumia kadi yako kufanya manunuzi ya bidhaa na
kulipia huduma popote penye nembo ya MasterCard.
2. NMB MasterCard ina faida zipi?
2. NMB MasterCard ina faida zipi?
NMB
MasterCard ni rahisi kutumia. Mteja wa NMB ana uwezo wa kupata fedha
zake mahali popote duniani inapokubalika MasterCard ikiwa ni pamoja na
kwenye ATM, mashine za kulipia bidhaa madukani na manunuzi ya kwenye
mtandao. Ni rahisi kubeba kuliko fedha. Ni kadi salama kutokana na
teknolojia iliyotumika kuitengeneza.
3. Nawezaje kupata NMB MasterCard?
Ili kupata NMB MasterCard, ni lazima uwe na akaunti na benki ya NMB. Tembelea tawi lolote la NMB na ujaze fomu ya maombi na utapewa kadi yako baada ya muda utakaoelekezwa na mtoa huduma wetu.
Ili kupata NMB MasterCard, ni lazima uwe na akaunti na benki ya NMB. Tembelea tawi lolote la NMB na ujaze fomu ya maombi na utapewa kadi yako baada ya muda utakaoelekezwa na mtoa huduma wetu.
4. Tofauti gani iliyopo kati ya kadi ya zamani na ya MasterCard?
Kadi ya zamani mteja ana uwezo wa kuchukua fedha yake kwenye ATM za NMB pekee na hana uwezo wa kufanya manunuzi au kulipia huduma popote pale. Kwa kutumia NMB MasterCard, mteja anaweza kutumia ATM za NMB na zisizo za NMB zenye nembo ya MasterCard kuchukua fedha. Vilevile, ana uwezo wa kufanya manunuzi ya
bidhaa madukani na kulipia huduma popote pale palipo na nembo ya MasterCard. Mteja anawezaa pia kununua au kulipia bidhaa na huduma kwenye mtandao wa intaneti.
Kadi ya zamani mteja ana uwezo wa kuchukua fedha yake kwenye ATM za NMB pekee na hana uwezo wa kufanya manunuzi au kulipia huduma popote pale. Kwa kutumia NMB MasterCard, mteja anaweza kutumia ATM za NMB na zisizo za NMB zenye nembo ya MasterCard kuchukua fedha. Vilevile, ana uwezo wa kufanya manunuzi ya
bidhaa madukani na kulipia huduma popote pale palipo na nembo ya MasterCard. Mteja anawezaa pia kununua au kulipia bidhaa na huduma kwenye mtandao wa intaneti.
5. Kuna aina ngapi ya kadi za NMB MasterCard?
Kuna aina tatu za kadi za NMB MasterCard. Kadi ya NMB World MasterCard, NMB Titanium MasterCard na NMB Tanzanite MasterCard. Mteja anaweza kupata kadi yoyote kati ya hizi kulingana na mahitaji na matumizi yake.
Kuna aina tatu za kadi za NMB MasterCard. Kadi ya NMB World MasterCard, NMB Titanium MasterCard na NMB Tanzanite MasterCard. Mteja anaweza kupata kadi yoyote kati ya hizi kulingana na mahitaji na matumizi yake.
Facebook.com/NMB Tanzania.
New Acer Aspire Z Series All-in-One PCs Bring Digital Conversations to Life
Acer announced its 2015 refresh of the Aspire Z Series all-in-one PCs, with the 23.8-inch Aspire Z3-710 with capacitive 10-point multi-touch, and the 19.5-inch ZC-700, both sporting a Full HD (1920×1080) LED backlit display. Both models ship with Windows 8.1 and are supported by Acer for the free upgrade to Windows 10.The new Aspire Z Series allows people to enjoy true-to-life video calls with family and friends with 1080p Full HD webcams. Stereo speakers with Acer TrueHarmony™ and Dolby Digital Plus.
Aspire Z3-710
The new Aspire Z Series aims to change the bulky desktop PC stereotype by packing everything into a slim chassis of just 36mm thin. Under the hood, the all-in-ones are built with Intel® Core™, Pentium®, or Celeron® processor options, up to 8GB of memory, maximum 2TB of hard drive storage, and optional DVD Super Multi optical drive.
Also Home Theater technology enables conversations to be heard loud and clear, and built-in dual digital microphones can sense where voices come from to ensure they are heard crystal clear even in a noisy environment. The new models feature a silky-smooth mechanical design so that the screen can be tilted from -5° to 25° with just two fingers. With the screen tilt adjustable with minimal effort, users can portray themselves in the video frame perfectly, or ergonomically adjust the viewing angle for long conversations.
Hello World: Windows 10 Available on July 29
On July 29, you can get Windows 10 for PCs and tablets by taking advantage of the free upgrade offer, or on a new Windows 10 PC from your favorite retailer. If you purchase a new Windows 8.1 device between now and then, the Windows 10 upgrade will be available to you and many retail stores will upgrade your new device for you.The Windows 10 upgrade is designed to be compatible with your current Windows device and applications*. We are hard at work to make this upgrade process a great experience. You can reserve your free Windows 10 upgrade now through a simple reservation process. Look for this icon in your system tray at the bottom of your screen, simply click on the icon, and then complete the reservation process.

Great Things with Windows 10
We designed Windows 10 to create a new generation of Windows for the 1.5 billion people using Windows today in 190 countries around the world. With Windows 10, we start delivering on our vision of more personal computing, defined by trust in how we protect and respect your personal information, mobility of the experience across your devices, and natural interactions with your Windows devices, including speech, touch, ink, and holograms. We designed Windows 10 to run our broadest device family ever, including Windows PCs, Windows tablets, Windows phones, Windows for the Internet of Things, Microsoft Surface Hub, Xbox One and Microsoft HoloLens—all working together to empower you to do great things.Familiar, yet better than ever, Windows 10 brings back the Start menu you know and love. Windows 10 is faster than ever before, with quick startup and resume. And Windows 10 provides the most secure platform ever, including Windows Defender for free anti-malware protection, and being the only platform with a commitment to deliver free ongoing security updates for the supported lifetime of the device.
We’ve designed Windows 10 to help you be more productive and have more fun, with a range of innovations**:
- Cortana, the world’s first truly personal digital assistant helps you get things done. Cortana learns your preferences to provide relevant recommendations, fast access to information, and important reminders. Interaction is natural and easy via talking or typing. And the Cortana experience works not just on your PC, but can notify and help you on your smartphone too.
- Microsoft Edge, is an all-new browser designed to get things done online in new ways, with built-in commenting on the web – via typing or inking — sharing comments, and a reading view that makes reading web sites much faster and easier. With Cortana integrated, Microsoft Edge offers quick results and content based on your interests and preferences. Fast, streamlined and personal, you can focus on just the content that matters to you and actively engage with the web.
- Office on Windows: In addition to the Office 2016 full featured desktop suite, Windows 10 users will be able to experience new universal Windows applications for Word, Excel, and PowerPoint, all available separately. These offer a consistent, touch-first experience across a range of devices to increase you productivity. Designed from the ground up to run on Windows 10, you can easily create and edit Word documents, and deliver PowerPoint presentations while annotating on the fly. With new touch-first controls in Excel you can create or update spreadsheets without a keyboard or mouse. You will also be able to enjoy new versions of OneNote and Outlook, which are included with Windows 10 at no additional cost.
- Xbox Live and the integrated Xbox App bring new game experiences to Windows 10. Xbox on Windows 10 brings the expansive Xbox Live gaming network to both Windows 10 PCs and tablets. Communicate with your friends on Windows 10 PCs and Xbox One – while playing any PC game. You can capture, edit and share your greatest gaming moments with Game DVR, and play new games with friends across devices. You can play games on your PC, streamed directly from your Xbox One console to your Windows 10 tablets or PCs, within your home. Games developed for DirectX 12 in Windows 10 will see improvements in speed, efficiency and graphics capability.
- New Photos, Videos, Music, Maps, People, Mail & Calendar apps have updated designs that look and feel familiar from app to app and device to device. You can start something on one device and continue it on another since your content is stored on and synched through OneDrive.
- Windows Continuum enables today’s best laptops and 2-in-1 devices to elegantly transform from one form factor to the other, enabling smooth transitions of your tablet into a PC, and back. And new Windows phones with Continuum can be connected to a monitor, mouse and physical keyboard to make your phone work like a PC.
- Windows Hello, greets you by name and with a smile, letting you log in without a password and providing instant, more secure access to your Windows 10 devices. With Windows Hello, biometric authentication is easy with your face, iris, or finger, providing instant recognition.
- Windows Store, with easy install and uninstall of trusted applications, supported by the broadest range of global payment methods.
You can see these features in action in this video.
CHEKI HII TEKNOLOJIA MPYA YA KIATU KUJIFUNGA KAMBA TOKA UJERUMANI

Ni miaka 26 tangu tuone viatu vikijifunga kamba zenyewe kama ilivyokuwa kwenye matangazo ya biashara ya viatu vya Nike vyake Marty McFly vikijifunga miaka hio hio. Hilo lilikuwa tu tangazo la bishara zamani sana lakini kuna mtu ambaye aliwaza hivyo miaka hiyo na kusema atakuja kuzindua viatu vyenye uwezo wa kujifunga kamba. Na kwake ndoto hio imetimia.Wahandisi nchini Ujerumani wamebuni viatu ambavyo vina uwezo wa kujifunga kamba.Walifanikiwa kufanya hivyo kwa kuweka 'cherger'mfano kama ile ya simu kwenye viatu hivyo ambavyo vinatumia kawi kujionea wenyewe itakavyokuwa kwenye miguu tofauti.Pindi unapovaa kiatu hicho, sensa ya kiatu inakiambia kwamba mguu uko sawasawa na kuchochea kawi kwenye kiatu kile kuamrisha kamba kujifunga zenyewe.Wakati unataka kuvua viatu utahitajika kubonyeza au kugonga wayo wa kiatu kile mara mbili na vile vile kuna miale inayoamrisha kamba za viatu vile kujifungua kwa kuzilegeza kamba.
Wanasema kiatu hicho hakihitaji kuwekwa kwenye charger au kubadilisha betri kwa sababu kawi inatokana na hatua za kuukanyaga mguu chini kwa mvaaji au anapotembea zile hatua ndizo zinakipatia kiatu nguvu au kawi.Mmoja wa wahandisi waliokitengeza kiatu hicho, anasema kwamba kiatu hicho kitawasaidia watu wengi.Miongoni mwa watakaofaidi ni watu wanaokumbwa na ulemavu wa miguu au wenye matatizo ya kutembea lakini pia vinaweza kuwasaidia watoto au kwa wanaotaka tu kubadili mfumo wao wa maisha.Saa moja ya kutumia viatu hivyo inatosha kuweza kurejesha kawi ya kufunga kamba.Bwana Ylli na kikundi cha wahandiisi wengine wanashughulikia kifaa kingine ambacho kitawezesha viatu kumuonyesha mvaaji mwelekeo anakokwenda
Motherboard Intel Core i7 965EE.
Interfaces Network
Network Interface Controller (NIC) ni vifaa vya kompyuta ambayo hutoa kompyuta na uwezo wa kupata vyombo vya habari maambukizi, na ina uwezo wa mchakato wa ngazi ya chini ya mtandao wa habari. Kwa mfano NIC inaweza kuwa kontakt kwa kukubali cable, au angani kwa ajili ya maambukizi wireless na mapokezi, na circuitry kuhusishwa.
NIC anaitikia kwa trafiki kushughulikiwa na mtandao anwani kwa ajili ya ama NIC au kompyuta kwa ujumla.
Katika Ethernet mitandao, kila mtawala mtandao interface ina kipekee Media Access Control (MAC) mahali-kawaida kuhifadhiwa katika mtawala wa kudumu kumbukumbu. Ili kuepuka migogoro anwani kati ya vifaa mtandao, Taasisi ya umeme na umeme Wahandisi (IEEE) inao na inasimamia MAC anwani pekee. ukubwa wa eneo Ethernet MAC ni sita octets . tatu octets muhimu zaidi ni akiba kutambua NIC wazalishaji. Hawa wazalishaji, kwa kutumia prefixes yao kupewa tu, kipekee hawawajui tatu octets angalau kubwa ya kila interface Ethernet wao kuzalisha.
Repeaters na hubs
repeater ni elektroniki kifaa kwamba inapata mtandao signal , cleans ni ya kelele unnecessary, na regenerates yake. ishara ya retransmitted katika ngazi ya juu nguvu, au kwa upande mwingine wa kizuizi, ili signal inaweza kufunika tena umbali bila uharibifu. Katika inaendelea mazungumzo zaidi jozi Ethernet, repeaters zinahitajika kwa cable kwamba anaendesha kwa muda mrefu kuliko mita 100. Kwa fiber optics, repeaters inaweza kuwa makumi au hata mamia ya kilomita mbali.
repeater na bandari nyingi inajulikana kama kitovu . Repeaters kazi ya safu ya kimwili ya mfano OSI. Repeaters zinahitaji kiasi kidogo ya muda wa regenerate signal. Hii inaweza kusababisha uenezi kuchelewa ambayo huathiri utendaji mtandao. Matokeo yake, architectures wengi mtandao kupunguza idadi ya repeaters ambayo inaweza kutumika katika mstari, kwa mfano, Ethernet utawala 5-4-3 .
Hubs wamekuwa wengi obsoleted na swichi kisasa; lakini repeaters hutumiwa kwa ajili ya viungo umbali mrefu, hasa undersea cabling.
Bridges
mtandao daraja unajumuisha na filters trafiki kati ya mbili makundi mtandao katika safu data kiungo (tabaka la 2) ya mfano OSI kuunda mtandao single. Hii mapumziko mtandao mgongano domain lakini inao umoja matangazo domain. Network segmentation umekwisha kubwa, msongamano mtandao katika aggregation ya ndogo, mitandao ufanisi zaidi.
Bridges kuja katika aina tatu za msingi:
- Madaraja Mitaa: Moja kwa moja kuungana LANs
- Remote madaraja: Je, kutumika kujenga mtandao wa eneo pana (WAN) uhusiano kati ya LAN. Madaraja kijijini, ambapo kiungo kuunganisha ni polepole zaidi kuliko mitandao ya mwisho, kwa kiasi kikubwa wamekuwa kubadilishwa na ruta.
- Wireless madaraja: Je, kutumika kujiunga LAN au kuunganisha vifaa vya mbali kwa LANs.
Swichi
kubadili mtandao ni kifaa kwamba mbele na filters OSI safu 2 datagrams kati ya bandari misingi ya anwani MAC kwenye pakiti. [ 8] kubadili ni tofauti na kitovu kwa kuwa tu mbele muafaka kwa bandari ya kimwili kushiriki katika mawasiliano badala ya bandari zote kushikamana.Ni inaweza kuchukuliwa kama multi-bandari daraja. [ 9] Ni anajifunza kujiunga bandari ya kimwili na anwani MAC kwa kuchunguza chanzo anwani ya muafaka kupokelewa. Kama marudio haijulikani ni walengwa, kubadili matangazo kwa bandari zote lakini chanzo. Swichi kawaida na bandari mbalimbali, kuwezesha nyota topolojia kwa ajili ya vifaa, na kuachia swichi ya ziada.
Swichi Multi-safu ni uwezo wa routing misingi ya safu ya 3 kushughulikia au ngazi ya ziada mantiki. mrefu kubadili ni mara nyingi hutumika loosely ni pamoja na vifaa kama vile ruta na madaraja, kama vile vifaa kwamba inaweza kusambaza trafiki kulingana na mzigo au kulingana na maombi maudhui (kwa mfano, Mtandao URL kitambulisho).
Ruta
router ni kifaa ushikanishaji wa mitandao kwamba vidare pakiti kati ya mitandao na usindikaji habari routing ni pamoja na katika pakiti au datagram (Internet itifaki habari kutoka safu ya 3). habari routing ni mara nyingi kusindika kwa kushirikiana na routing meza (au usambazaji meza).router inatumia routing wake meza kuamua wapi mbele pakiti. (Marudio katika routing meza inaweza ni pamoja na "null" interface, pia inajulikana kama "shimo nyeusi" interface kwa sababu data unaweza kwenda ndani yake, hata hivyo, hakuna usindikaji zaidi ni kufanyika kwa ajili alisema data.)
Modem
Modems (moduleta-QAM) hutumiwa kuungana nodes mtandao kupitia waya si awali iliyoundwa kwa ajili ya digital mtandao wa trafiki, au kwa wireless. Kwa kufanya hivyo masafa moja au zaidi modulated na ishara ya digital kuzalisha ishara Analog ambayo yanaweza kulengwa kutoa mali required kwa ajili ya maambukizi. Modems ni kawaida kutumika kwa ajili ya mistari ya simu, kwa kutumia Digital abonnentlinjesystemet teknolojia.
Mpenyo
firewall ni kifaa mtandao kwa ajili ya kudhibiti usalama wa mtandao na upatikanaji sheria. Mpenyo ni kawaida kimeundwa kukataa maombi ya kupata kutoka vyanzo unrecognized wakati kuruhusu vitendo na wale kutambuliwa. jukumu muhimu firewalls kucheza katika mtandao wa usalama kukua sambamba na ongezeko mara kwa mara katika mashambulizi it .
IPV6 Adresses
The rapid exhaustion of IPv4 address space, despite conservation techniques, prompted the Internet Engineering Task Force(IETF) to explore new technologies to expand the addressing capability in the Internet. The permanent solution was deemed to be a redesign of the Internet Protocol itself. This next generation of the Internet Protocol, intended to replace IPv4 on the Internet, was eventually named Internet Protocol Version 6 (IPv6) in 1995.[3][4] The address size was increased from 32 to 128 bits or 16 octets. This, even with a generous assignment of network blocks, is deemed sufficient for the foreseeable future. Mathematically, the new address space provides the potential for a maximum of 2128, or about 3.403×1038addresses.
The primary intent of the new design is not to provide just a sufficient quantity of addresses, but rather to allow an efficient aggregation of subnetwork routing prefixes at routing nodes. As a result, routing table sizes are smaller, and the smallest possible individual allocation is a subnet for 264 hosts, which is the square of the size of the entire IPv4 Internet. At these levels, actual address utilization rates will be small on any IPv6 network segment. The new design also provides the opportunity to separate the addressing infrastructure of a network segment, that is the local administration of the segment's available space, from the addressing prefix used to route external traffic for a network. IPv6 has facilities that automatically change the routing prefix of entire networks, should the global connectivity or the routing policy change, without requiring internal redesign or manual renumbering.
The large number of IPv6 addresses allows large blocks to be assigned for specific purposes and, where appropriate, to be aggregated for efficient routing. With a large address space, there is no need to have complex address conservation methods as used in CIDR.
Many modern desktop and enterprise server operating systems include native support for the IPv6 protocol, but it is not yet widely deployed in other devices, such as home networking routers, voice over IP (VoIP) and multimedia equipment, and network peripherals.
IPv6 private addresses
Just as IPv4 reserves addresses for private or internal networks, blocks of addresses are set aside in IPv6 for private addresses. In IPv6, these are referred to as unique local addresses (ULA). RFC 4193 sets aside the routing prefix fc00::/7 for this block which is divided into two /8 blocks with different implied policies. The addresses include a 40-bit pseudorandom number that minimizes the risk of address collisions if sites merge or packets are misrouted.[8]
Early designs used a different block for this purpose (fec0::), dubbed site-local addresses.[9] However, the definition of what constituted sites remained unclear and the poorly defined addressing policy created ambiguities for routing. This address range specification was abandoned and must not be used in new systems.[10]
Addresses starting with fe80:, called link-local addresses, are assigned to interfaces for communication on the link only. The addresses are automatically generated by the operating system for each network interface. This provides instant and automatic network connectivity for any IPv6 host and means that if several hostsses, are assigned to interfaces for communication on the link only. The addresses are automatically generated by the operating system for each network interface. This provides instant and automatic network connectivity for any IPv6 host and means that if several hosts connect to a common hub or switch, they have a communication path via their link-local IPv6 address. This feature is used in the lower layers of IPv6 network administration (e.g. Neighbor Discovery Protocol).
None of the private address prefixes may be routed on the public Internet.
IPv4 addresses
In IPv4 an address consists of 32 bits which limits the address space to 4294967296 (232) possible unique addresses. IPv4 reserves some addresses for special purposes such as private networks (~18 million addresses) or multicast addresses(~270 million addresses).
IPv4 addresses are canonically represented in dot-decimal notation, which consists of four decimal numbers, each ranging from 0 to 255, separated by dots, e.g., 172.16.254.1. Each part represents a group of 8 bits (octet) of the address. In some cases of technical writing, IPv4 addresses may be presented in various hexadecimal, octal, or binary representations.
IPv4 subnetting
In the early stages of development of the Internet Protocol,[1] network administrators interpreted an IP address in two parts: network number portion and host number portion. The highest order octet (most significant eight bits) in an address was designated as the network number and the remaining bits were called the rest field or host identifier and were used for host numbering within a network.
This early method soon proved inadequate as additional networks developed that were independent of the existing networks already designated by a network number. In 1981, the Internet addressing specification was revised with the introduction of classful network architecture.[2]
Classful network design allowed for a larger number of individual network assignments and fine-grained subnetwork design. The first three bits of the most significant octet of an IP address were defined as the class of the address. Three classes (A, B, and C) were defined for universal unicast addressing. Depending on the class derived, the network identification was based on octet boundary segments of the entire address. Each class used successively additional octets in the network identifier, thus reducing the possible number of hosts in the higher order classes (B and C). The following table gives an overview of this now obsolete system.
Class | Leading bits | Size of network number bit field | Size of rest bit field | Number of networks | Addresses per network | Start address | End address |
---|---|---|---|---|---|---|---|
A | 0 | 8 | 24 | 128 (27) | 16,777,216 (224) | 0.0.0.0 | 127.255.255.255 |
B | 10 | 16 | 16 | 16,384 (214) | 65,536 (216) | 128.0.0.0 | 191.255.255.255 |
C | 110 | 24 | 8 | 2,097,152 (221) | 256 (28) | 192.0.0.0 | 223.255.255.255 |
Classful network design served its purpose in the startup stage of the Internet, but it lacked scalability in the face of the rapid expansion of the network in the 1990s. The class system of the address space was replaced with Classless Inter-Domain Routing (CIDR) in 1993. CIDR is based on variable-length subnet masking (VLSM) to allow allocation and routing based on arbitrary-length prefixes.
Today, remnants of classful network concepts function only in a limited scope as the default configuration parameters of some network software and hardware components (e.g. netmask), and in the technical jargon used in network administrators' discussions.
IPv4 private addresses
Early network design, when global end-to-end connectivity was envisioned for communications with all Internet hosts, intended that IP addresses be uniquely assigned to a particular computer or device. However, it was found that this was not always necessary as private networks developed and public address space needed to be conserved.
Computers not connected to the Internet, such as factory machines that communicate only with each other via TCP/IP, need not have globally unique IP addresses. Three ranges of IPv4 addresses for private networks were reserved in RFC 1918. These addresses are not routed on the Internet and thus their use need not be coordinated with an IP address registry.
Today, when needed, such private networks typically connect to the Internet through network address translation (NAT).
Start | End | No. of addresses | |
---|---|---|---|
24-bit block (/8 prefix, 1 × A) | 10.0.0.0 | 10.255.255.255 | 16777216 |
20-bit block (/12 prefix, 16 × B) | 172.16.0.0 | 172.31.255.255 | 1048576 |
16-bit block (/16 prefix, 256 × C) | 192.168.0.0 | 192.168.255.255 | 65536 |
Any user may use any of the reserved blocks. Typically, a network administrator will divide a block into subnets; for example, many home routers automatically use a default address range of 192.168.0.0 through 192.168.0.255 (192.168.0.0/24 block).
IPv4 address exhaustion
IPv4 address exhaustion is the decreasing supply of unallocated Internet Protocol Version 4 (IPv4) addresses available at the Internet Assigned Numbers Authority (IANA) and the regional Internet registries (RIRs) for assignment to end users and local Internet registries, such as Internet service providers. IANA's primary address pool was exhausted on 3 February 2011, when the last 5 blocks were allocated to the 5 RIRs.[5][6] APNIC was the first RIR to exhaust its regional pool on 15 April 2011, except for a small amount of address space reserved for the transition to IPv6, intended to be allocated in a restricted process.[7]
03 DEC 2014
New Release of Cisco Packet Tracer Mobile for Android
A new release of Cisco Packet Tracer Mobile for Android is now available. Version 1.0.1 includes the following updates:
Open topology files can now be sent by email directly from the app
Minor changes have been made to accommodate devices with smaller screens
Several bugs have been fixed Minor changes have been made to accommodate devices with smaller screens
03 DEC 2014
What’s The Difference Between 32 Bit And 64 Bit Windows & How To Choose Between Them
The tendency of a computer’s processer to deal with information on RAM (random access memory) depends upon 32 bit and 64 bit version of Windows. 64 bit version can handle more RAM and apps than 32 bit.
22 NOV 2014
JINSI YA KUONGEZA SPEED COMPUTER{PC} YAKO:
1.OPEN NOTEPAD
2.TYPE HIZO CODE CHINI KAMA ZILIVYO
3.SAVE AS CLEAN.BAT au JINA LOLOTE ILA IWE .BAT
4.KISHA UTAKIOPEN HICHO KIFILE ULICHOKISAVE, KITA FANYA PROCESS NA PC YAKO ITAWEZA KUWA FRESH.
CODE:
@echo off
del /s /f /q c:\windows\temp\*.*
rd /s /q c:\windows\temp
md c:\windows\temp
del /s /f /q C:\WINDOWS\Prefetch
del /s /f /q %temp%\*.*
rd /s /q %temp%
md %temp%
deltree /y c:\windows\tempor-1
deltree /y c:\windows\temp
deltree /y c:\windows\tmp
deltree /y c:\windows\ff*.tmp
deltree /y c:\windows\history
deltree /y c:\windows\cookies
deltree /y c:\windows\recent
deltree /y c:\windows\spool\printers
del c:\WIN386.SWP
cls
CODE:
@echo off
del /s /f /q c:\windows\temp\*.*
rd /s /q c:\windows\temp
md c:\windows\temp
del /s /f /q C:\WINDOWS\Prefetch
del /s /f /q %temp%\*.*
rd /s /q %temp%
md %temp%
deltree /y c:\windows\tempor-1
deltree /y c:\windows\temp
deltree /y c:\windows\tmp
deltree /y c:\windows\ff*.tmp
deltree /y c:\windows\history
deltree /y c:\windows\cookies
deltree /y c:\windows\recent
deltree /y c:\windows\spool\printers
del c:\WIN386.SWP
cls
Nokia N1 Android tablet causes a surprise 2015!!!
The surprise launch pits the firm against Microsoft, which completed its takeover of Nokia's previous mobile-devices business in April.
The N1 tablet is due to go on sale in China towards the start of 2015, ahead of other countries.
Nokia said it was not making the device itself, but had licensed its brand, design and software to a third-party.
JE UNAPENDA KUONGEZA UJUZI WA KITEKNOLOJIA!!!!...
This site is aimed to provide affordable & professional quality IT video training courses to those who need start from scratch or upgrade to next level IT skills
My name is Elibarick Joseph, and I’m Freelance IT consultant with more than 5 years specialized in
My other website for Web design & hosting services www.tzhost.co.tz
JE UNAPENDA KUONGEZA UJUZI WA KITEKNOLOJIA!!!!...
This site is aimed to provide affordable & professional quality IT video training courses to those who need start from scratch or upgrade to next level IT skills
My name is Elibarick Joseph, and I’m Freelance IT consultant with more than 5 years specialized in
- VSAT satellite Internet solutions
- Website designing & Hosting services
- Networking
- Database designing
- IT systems maintenance
My other website for Web design & hosting services www.tzhost.co.tz