Monday, November 1, 2010

WHAT IS LATUDA

Important information about Latuda


Elderly people with dementia-related psychosis (a severe mental health problem) taking atypical


antipsychotic drugs, including Latuda, are at an increased risk for death compared with those


taking placebo (sugar tablet). Latuda is not approved for the treatment of people with


dementia-related psychosis (see BOXED WARNING). An increased risk for stroke and ministroke has


been reported in elderly people with dementia-related psychosis.



Neuroleptic malignant syndrome (NMS): NMS is a rare and potentially fatal side effect reported


with Latuda and similar medicines. Call your healthcare provider right away if you have high


fever; stiff muscles; confusion; changes in pulse, heart rate, or blood pressure; sweating; or


muscle pain and weakness. Treatment should be stopped if you have NMS.



Tardive dyskinesia (TD): TD is a serious and sometimes permanent side effect reported with


Latuda and similar medicines. TD includes uncontrollable movements of the face, tongue, and


other parts of the body. The risk for developing TD and the chance that it will become


permanent is thought to increase the longer a person takes the medicine and the more medicine a


person takes over time. TD can develop after a person has been taking the medicine for a short


time at low doses, although this is much less common. There is no known treatment for TD, but


it may go away partially or completely if the person stops taking the medicine.



High blood sugar: High blood sugar and diabetes have been reported with Latuda. In studies,


most people taking Latuda had no problems with their blood sugar. If you have diabetes or risk


factors for diabetes, such as being overweight or a family history of diabetes, your blood


sugar should be tested at the beginning of and throughout treatment with Latuda. Complications


of diabetes can be serious and even life threatening. Tell your healthcare provider if you have


blood sugar problems or signs of diabetes, such as being thirsty all the time, going to the


bathroom a lot, or feeling weak or hungry.



Weight gain: Some patients may gain weight while taking Latuda. Your healthcare provider should


check your weight regularly. Talk to your healthcare provider about ways to help control your


weight, such as eating a healthy, balanced diet and exercising.



Additional Important Warnings

Light-headedness or faintness caused by a sudden change in heart rate and blood pressure when


rising quickly from a sitting position has been reported with Latuda.

Low white blood cell counts and related conditions have been reported with Latuda and similar


medicines. Tell your healthcare provider if you have or had low white blood cell counts.

Latuda and medicines like it may raise the levels of prolactin. Tell your healthcare provider


if you experience a lack of menstrual periods, leaking or enlarged breasts, or impotence.

Tell your healthcare provider if you have a seizure disorder, have had seizures in the past, or


have conditions that increase your risk for seizures.

Tell your healthcare provider if you experience prolonged, abnormal muscle spasm or


contraction, which may be signs of a condition called dystonia.

Latuda can affect your judgment, thinking, and motor skills. You should not drive or operate


hazardous machinery until you know how Latuda affects you.

Latuda may make you more sensitive to heat. You may have trouble cooling off. Be careful when


exercising or when doing things likely to cause dehydration or make you warm.

The symptoms of schizophrenia may include thoughts of suicide or of hurting yourself or others.


If you have these thoughts at any time, tell your healthcare provider or go to an emergency


room right away.

Latuda and medicines like it have been associated with swallowing problems. If you have had or


have swallowing problems, you should tell your healthcare provider.

Pregnancy: Tell your healthcare provider if you are pregnant or if you are planning to get


pregnant while taking Latuda. Breast feeding is not recommended during treatment with Latuda.



Tell your healthcare provider about all prescription and over-the-counter medicines you are


taking or plan to take, since there are some risks for drug interactions with Latuda. Do not


drink alcohol while taking Latuda.



In people with schizophrenia, the most common side effects that occurred with Latuda were


sleepiness, an inner sense of restlessness or need to move (akathisia), uncontrolled movements


of the body and face (parkinsonism), upset stomach, and agitation.



This is not a complete summary of safety information. Please discuss the full Prescribing


Information for prescription Latuda with your doctor.



You are encouraged to report me gurbinder.sharma@gmail.com



How should I take Latuda?

Take Latuda exactly as prescribed by your doctor. Do not take in larger or smaller amounts or


for longer than recommended. Follow the directions on your prescription label.



Latuda should be taken with food.



Take Latuda regularly to get the most benefit. Get your prescription refilled before you run


out of medicine completely.



It may take several weeks before your symptoms improve. Keep using the medication as directed


and tell your doctor if your symptoms do not improve.



Store Latuda at room temperature away from moisture, light, and heat.



What happens if I miss a dose?

Take the missed dose as soon as you remember. Skip the missed dose if it is almost time for


your next scheduled dose. Do not take extra medicine to make up the missed dose.



What happens if I overdose?

Seek emergency medical attention or call the Poison Help line at 1-800-222-1222.



Overdose symptoms may include drowsiness, fast heart rate, feeling light-headed, fainting, and


restless muscle movements in your eyes, tongue, jaw, or neck.



What should I avoid while taking Latuda?

While you are taking Latuda, you may be more sensitive to temperature extremes such as very hot


or cold conditions. Avoid getting too cold, or becoming overheated or dehydrated. Drink plenty


of fluids, especially in hot weather and during exercise. It is easier to become dangerously


overheated and dehydrated while you are taking Latuda.



Latuda can cause side effects that may impair your thinking or reactions. Be careful if you


drive or do anything that requires you to be awake and alert. Avoid drinking alcohol. It can


increase some of the side effects of Latuda.







Latuda side effects

Get emergency medical help if you have any of these signs of an allergic reaction: hives;


difficulty breathing; swelling of your face, lips, tongue, or throat. Stop taking Latuda and


call your doctor at once if you have a serious side effect such as:



fever, stiff muscles, confusion, sweating, fast or uneven heartbeats;

restless muscle movements in your eyes, tongue, jaw, or neck;

tremor (uncontrolled shaking);

fever, chills, body aches, flu symptoms;

trouble swallowing; or

feeling light-headed, fainting.

increased thirst or urination, weakness

Less serious Latuda side effects may include:



mild restlessness,agitiation, drowsiness, or tremor;

sleepiness, dreaming more than usual;

blurred vision;

abdominal pain;

dizziness or headache;

weight gain;

problems with urination;

nausea, diarrhea;

decreased appetite;

excessive salivation;

rash or itching

This is not a complete list of side effects and others may occur. Call your doctor for medical


advice about side effects. You may report side effects to FDA at 1-800-FDA-1088.



Latuda Dosing Information

The recommended starting dose of Latuda is 40 mg once daily. The maximum recommended dose is 80


mg once daily. Latuda should be taken with food.



What other drugs will affect Latuda?

Before you take Latuda, tell your doctor if you regularly use other medicines that make you


sleepy (such as cold or allergy medicine, narcotic pain medicine, sleeping pills, muscle


relaxers, and medicine for seizures, depression, or anxiety). They can add to sleepiness caused


by Latuda.



Also tell your doctor if you are taking any of the following medicines:



ketoconazole (Nizoral);

diltiazem (Cardizem, Dilacor);

rifampin (Rifadin, Rimactane, Rifater);

This list is not complete and other drugs may interact with Risperdal. Tell your doctor about


all medications you use. This includes prescription, over-the-counter, vitamin, and herbal


products. Do not start a new medication without telling your doctor.



Where can I get more information?

Your pharmacist can provide more information about Latuda.





gurbinder



My MedNotes



Get Updates by Email

Email me: gurbinder.sharma@gmail.com



Latuda side effects

Get emergency medical help if you have any of these signs of an allergic reaction: hives;


difficulty breathing; swelling of your face, lips, tongue, or throat. Stop taking Latuda and


call your doctor at once if you have a serious side effect such as:



fever, stiff muscles, confusion, sweating, fast or uneven heartbeats;

restless muscle movements in your eyes, tongue, jaw, or neck;

tremor (uncontrolled shaking);

fever, chills, body aches, flu symptoms;

trouble swallowing; or

feeling light-headed, fainting.

increased thirst or urination, weakness

Less serious Latuda side effects may include:



mild restlessness,agitiation, drowsiness, or tremor;

sleepiness, dreaming more than usual;

blurred vision;

abdominal pain;

dizziness or headache;

weight gain;

problems with urination;

nausea, diarrhea;

decreased appetite;

excessive salivation;

rash or itching

This is not a complete list of side effects and others may occur. Call your doctor for medical


advice about side effects. You may report side effects to http://cchrint.org


Latuda Dosing Information

The recommended starting dose of Latuda is 40 mg once daily. The maximum recommended dose is 80


mg once daily. Latuda should be taken with food.



What other drugs will affect Latuda?

Before you take Latuda, tell your doctor if you regularly use other medicines that make you


sleepy (such as cold or allergy medicine, narcotic pain medicine, sleeping pills, muscle


relaxers, and medicine for seizures, depression, or anxiety). They can add to sleepiness caused


by Latuda.



Also tell your doctor if you are taking any of the following medicines:



ketoconazole (Nizoral);

diltiazem (Cardizem, Dilacor);

rifampin (Rifadin, Rimactane, Rifater); These drugs are for TB patient as well HIV /AIDS

This list is not complete and other drugs may interact with Risperdal. Tell your doctor about


all medications you use. This includes prescription, over-the-counter, vitamin, and herbal


products. Do not start a new medication without telling your doctor.



Where can I get more information?

www.cchrint.org

Your pharmacist can provide more information about Latuda.

Monday, September 27, 2010

ENHANCED MITIGATION EXPERIENCE TOOLKIT

Have you been struggling to mitigate the risks, prevent vulnerabilities from being exploited and minimize disruption of your environment of legacy products or third party applications? If yes, then


help is now available to you from Microsoft

free of charge through a tool Enhanced Mitigation Experience Toolkit (EMET). The goals for EMET are:

•Leverage the tool for vulnerabilities under active exploitation to help customers prevent themselves from being exploited.





•Give customers the ability to use newer mitigation technologies to help protect older applications that cannot be recompiled to opt into them.

•Provide a central interface to make it easier for users to manage both system and application mitigations



EMET provides users with the ability to deploy security mitigation technologies to arbitrary applications. Doing so helps to prevent vulnerabilities in those applications (especially line of business and 3rd party apps) from successfully being exploited. It also responds to requests from customers to help manage risk in older, legacy products while they are in the process of transitioning over to modern, more secure products. Beyond that it makes it easy for customers to try mitigations against any software. While EMET can be used by anybody, it is primarily targeted at protecting applications on machines that are at high risk for attack. It helps you to harden applications be it line of business applications on backend servers or browsers on the desktops.



I am sure you would be interested in this tool and you can click here to download the tool free of charge! Microsoft has also put together a video for you. The video gives an even more in-depth look at some of the security mitigations offered by the tool. You can watch the video online here.



EMET provides a total of six mitigations:-





•Dynamic Data Execution Prevention (DEP) - DEP has been available since Windows XP. However, current configuration options don't allow applications to be opted in on an individual basis unless they are compiled with a special flag. EMET allows applications compiled without that flag to also be opted.

•Structure Exception Handler Overwrite Protection (SEHOP) - This protects against currently the most common technique for exploiting stack overflows in Windows. This mitigation has shipped with Windows since Windows Vista SP1. Recently with Windows 7, the ability to turn it on and off per process was added. With EMET, Microsoft provides the Windows 7 capabilities on any platform back though Windows XP.

•Heap Spray Allocation - When an exploit runs, it often cannot be sure of the address where its shellcode resides and must make a case when taking control of the instruction pointer. To increase the odds of success, most exploits now use heapspray techniques to place copies of their shellcode at as many memory locations as possible. This mitigation blocks the use of addresses most common in today's exploits.

•Null Page Allocation - This is similar technology to the heap spray allocation, but designed to prevent potential null dereference issues in usermode. Currently there are no known ways to exploit them and thus this is a defense in depth mitigation technology.

•Export Address Table Access Filtering - This mitigation is designed to break nearly all shell code in use today. Before a piece of shellcode can do anything useful, it generally has to locate
EMET provides a total of six mitigations:-






•Dynamic Data Execution Prevention (DEP) - DEP has been available since Windows XP. However, current configuration options don't allow applications to be opted in on an individual basis unless they are compiled with a special flag. EMET allows applications compiled without that flag to also be opted.

•Structure Exception Handler Overwrite Protection (SEHOP) - This protects against currently the most common technique for exploiting stack overflows in Windows. This mitigation has shipped with Windows since Windows Vista SP1. Recently with Windows 7, the ability to turn it on and off per process was added. With EMET, Microsoft provides the Windows 7 capabilities on any platform back though Windows XP.

•Heap Spray Allocation - When an exploit runs, it often cannot be sure of the address where its shellcode resides and must make a case when taking control of the instruction pointer. To increase the odds of success, most exploits now use heapspray techniques to place copies of their shellcode at as many memory locations as possible. This mitigation blocks the use of addresses most common in today's exploits.

•Null Page Allocation - This is similar technology to the heap spray allocation, but designed to prevent potential null dereference issues in usermode. Currently there are no known ways to exploit them and thus this is a defense in depth mitigation technology.

•Export Address Table Access Filtering - This mitigation is designed to break nearly all shell code in use today. Before a piece of shellcode can do anything useful, it generally has to locate windows APIs first. This mitigation blocks a common current technique shellcode uses to do this.

•Mandatory Address Space Layout Randomization (ASLR) - ASLR randomizes the addresses where modules are loaded to help prevent an attacker from leveraging data at predictable locations. The problem with this is that all modules have to use a compile time flag to opt into this. With EMET, we force modules to be loaded at randomized addresses for a target process regardless of the flags it was compiled with.









I would encourage you to go ahead and use this tool, harden your applications and minimize the disruptions in your environment.





Sanjay Bahl is the Chief Security Officer for Microsoft Corporation (India) Pvt. Ltd., and is a member of various security committees at national and International level.





What is the purpose of this alert?

This alert is to notify you that Microsoft has released Security Advisory 2416728 - Vulnerability in ASP.NET Could Allow Information Disclosure -- on September 17, 2010.



Summary

Microsoft is investigating a new public report of a vulnerability in ASP.NET. An attacker who exploited this vulnerability could view data, such as the View State, which was encrypted by the target server, or read data from files on the target server, such as web.config. This would allow the attacker to tamper with the contents of the data. By sending back the altered contents to an affected server, the attacker could observe the error codes returned by the server. We are not aware of attacks that try to use the reported vulnerabilities or of customer impact at this time.



We are actively working with partners in our Microsoft Active Protections Program (MAPP) to provide information that they can use to provide broader protections to customers.



Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This may include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs.





Mitigating Factors

•Microsoft has not identified any mitigations for this vulnerability.







Operating SystemComponent

Windows XP

Windows XP Media Center Edition 2005 and Windows XP Tablet PC Edition 2005 Microsoft .NET Framework 1.0 Service Pack 3

Windows XP Service Pack 3 Microsoft .NET Framework 1.1 Service Pack 1

Microsoft .NET Framework 2.0 Service Pack 2

Microsoft .NET Framework 3.5

Microsoft .NET Framework 3.5 Service Pack 1

Microsoft .NET Framework 4.0

Windows XP Professional x64 Edition Service Pack 2 Microsoft .NET Framework 1.1 Service Pack 1

Microsoft .NET Framework 2.0 Service Pack 2

Microsoft .NET Framework 3.5

Microsoft .NET Framework 3.5 Service Pack 1

Microsoft .NET Framework 4.0

Windows Server 2003

Windows Server 2003 Service Pack 2Microsoft .NET Framework 1.1 Service Pack 1

Microsoft .NET Framework 2.0 Service Pack 2

Microsoft .NET Framework 3.5

Microsoft .NET Framework 3.5 Service Pack 1

Microsoft .NET Framework 4.0

Windows Server 2003 x64 Edition Service Pack 2 Microsoft .NET Framework 1.1 Service Pack 1

Microsoft .NET Framework 2.0 Service Pack 2

Microsoft .NET Framework 3.5

Microsoft .NET Framework 3.5 Service Pack 1

Microsoft .NET Framework 4.0

Windows Server 2003 with SP2 for Itanium-based SystemsMicrosoft .NET Framework 1.1 Service Pack 1

Microsoft .NET Framework 2.0 Service Pack 2

Microsoft .NET Framework 3.5

Microsoft .NET Framework 3.5 Service Pack 1

Microsoft .NET Framework 4.0

Windows Vista

Windows Vista Service Pack 1Microsoft .NET Framework 1.1 Service Pack 1

Microsoft .NET Framework 2.0 Service Pack 2

Microsoft .NET Framework 3.5

Microsoft .NET Framework 3.5 Service Pack 1

Microsoft .NET Framework 4.0

Windows Vista Service Pack 2Microsoft .NET Framework 1.1 Service Pack 1

Microsoft .NET Framework 2.0 Service Pack 2

Microsoft .NET Framework 3.5 Service Pack 1

Microsoft .NET Framework 4.0

Windows Vista x64 Edition Service Pack 1Microsoft .NET Framework 1.1 Service Pack 1

Microsoft .NET Framework 2.0 Service Pack 2

Microsoft .NET Framework 3.5

Microsoft .NET Framework 3.5 Service Pack 1

Microsoft .NET Framework 4.0

Windows Vista x64 Edition Service Pack 2Microsoft .NET Framework 1.1 Service Pack 1

Microsoft .NET Framework 2.0 Service Pack 2

Microsoft .NET Framework 3.5 Service Pack 1

Microsoft .NET Framework 4.0

Windows Server 2008

Windows Server 2008 for 32-bit SystemsMicrosoft .NET Framework 1.1 Service Pack 1

Microsoft .NET Framework 2.0 Service Pack 2

Microsoft .NET Framework 3.5

Microsoft .NET Framework 3.5 Service Pack 1

Microsoft .NET Framework 4.0

Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2Microsoft .NET Framework 1.1 Service Pack 1

Microsoft .NET Framework 2.0 Service Pack 2

Microsoft .NET Framework 3.5 Service Pack 1

Microsoft .NET Framework 4.0

Windows Server 2008 for x64-based SystemsMicrosoft .NET Framework 1.1 Service Pack 1

Microsoft .NET Framework 2.0 Service Pack 2

Microsoft .NET Framework 3.5

Microsoft .NET Framework 3.5 Service Pack 1

Microsoft .NET Framework 4.0

Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2Microsoft .NET Framework 1.1 Service Pack 1

Microsoft .NET Framework 2.0 Service Pack 2

Microsoft .NET Framework 3.5 Service Pack 1

Microsoft .NET Framework 4.0

Windows Server 2008 for Itanium-based SystemsMicrosoft .NET Framework 1.1 Service Pack 1

Microsoft .NET Framework 2.0 Service Pack 2

Microsoft .NET Framework 3.5

Microsoft .NET Framework 3.5 Service Pack 1

Microsoft .NET Framework 4.0

Windows Server 2008 for Itanium-based Systems Service Pack 2Microsoft .NET Framework 1.1 Service Pack 1

Microsoft .NET Framework 2.0 Service Pack 2

Microsoft .NET Framework 3.5 Service Pack 1

Microsoft .NET Framework 4.0

Windows 7

Windows 7 for 32-bit SystemsMicrosoft .NET Framework 3.5.1

Microsoft .NET Framework 4.0

Windows 7 for x64-based SystemsMicrosoft .NET Framework 3.5.1

Microsoft .NET Framework 4.0

Windows Server 2008 R2

Windows Server 2008 R2 for x64-based Systems Microsoft .NET Framework 3.5.1

Microsoft .NET Framework 4.0

Windows Server 2008 R2 for Itanium-based systems Microsoft .NET Framework 3.5.1

Microsoft .NET Framework 4.0







Recommendations

Review Microsoft Security Advisory 2416728 for an overview of the issue, details on affected components, mitigating factors, workarounds, suggested actions, frequently asked questions (FAQs), and links to additional resources.



Customers who believe they are affected can contact Customer Service and Support (CSS) in North America for help with security update issues or viruses at no charge using the PC Safety line (866) PCSAFETY. International customers can contact Customer Service and Support by using any method found at http://www.microsoft.com/protect/worldwide/default.mspx.





Additional Resources

•Microsoft Advisory 2416728 - Vulnerability in ASP.NET Could Allow Information Disclosure



•Microsoft Security Response Center (MSRC) Blog

•Microsoft Security Research & Defense (SRD) Blog

•Microsoft Malware Protection Center (MMPC) Blog





Regarding Information Consistency

We strive to provide you with accurate information in static (this mail) and dynamic (web-based) content. Microsoft's security content posted to the Web is occasionally updated to reflect late-breaking information. If this results in an inconsistency between the information here and the information in Microsoft's web-based security content, the information in Microsoft's web-based security content is authoritative.



Thank you,

Microsoft CSS Security Team
 
Sincerely
Gurbinder Sharma
Partner Microsoft Online

Tuesday, September 21, 2010

VMWare Take over Suse Linux

Hi Guys
VMWare win the game of Open Source Stratgey and takes over officially the SuSe Linux . Now Wait and watch What Should Happen , After Novell's Death.Will It Effect Open Source ? or Make our life Easy.

Saturday, September 11, 2010

THE NEAR EARTH ASTEROIDS 2010 SEP



Hi Guys These Are the Potentially Dangerous Astreoids For Our Planet .This Picture Clearly Show you how lucky we were but if one of them will  change his direction due to some reason
You can see , how already they are close to earth  when they pass our planet one simple technical
mistake in calculations will destroy the earth.

Wednesday, September 8, 2010

Subject: khas khas (poppy seeds) upto 20 years in jail

Yesterday only I came to know of a case from a friend of mine which is very scary. One of his friends was traveling to UK via Dubai. Unfortunately he was carrying a packet of Khas Khas which is a commonly used spice in some Indian curries and sweets. Khas Khas is also known as poppy seed which can be sprouted to grow narcotics (afeem etc.).
This innocent person did not know that recently the laws in UAE and other Gulf countries have been revised and carrying Khas Khas is punishable with minimum 20 years of imprisonment or even worse with death penalty. Currently, the person is in a jail in Dubai for the last two weeks. His friends are frantically trying hard for his release but are finding that this has become a very very serious case. Lawyers are asking huge fees amounting to AED 100,000 even to appear in the court to plead for his innocence.
Please forward this email to all you know specially in Panjab. They should know the seriousness of this matter and should never ever carry even minutest quantities of the following items when traveling to Gulf countries:
1. Khas Khas whether raw, roasted or cooked.

2. Paan

3. Beetle nut (supari and its products, e.g. Paan Parag etc.)



The penalties are very severe and it could destroy the life of an innocent person.
I appeal you to create the awareness by forwarding this email to all you know.



Thanks and Best Regards
Gurbinder Sharma
CCHR

Wednesday, September 1, 2010

Infectious Disease, Critical Care Medicine, Internal Medicine

Infectious Disease, Critical Care Medicine, Internal Medicine


ISSUE:  We were reminded healthcare professionals of an increased mortality risk associated with the use of the intravenous antibacterial Tygacil (tigecycline) compared to that of other drugs used to treat a variety of serious infections. The increased risk was seen most clearly in patients treated for hospital-acquired pneumonia, especially ventilator-associated pneumonia, but was also seen in patients with complicated skin and skin structure infections, complicated intra-abdominal infections and diabetic foot infections. FDA has updated sections of the Tygacil drug label to include information regarding increased mortality risk of Tygacil.



BACKGROUND: Tygacil is approved by FDA for the treatment of complicated skin and skin structure infections, complicated intra-abdominal infections, and community acquired pneumonia. Tygacil is not approved for the treatment of hospital-acquired pneumonia (including ventilator-associated pneumonia) or diabetic foot infection. The increased risk was determined using a pooled analysis of clinical trials. See the Data Summary section of the FDA Drug Safety Communication for additional details.

RECOMMENDATION: Alternatives to Tygacil should be considered in patients with severe infections. Healthcare professionals and patients are encouraged to report adverse events or side effects related to the use of this product to the FDA's MedWatch Safety Information and Adverse Event Reporting Programme.
Sincerely
Gurbinder Sharma

Saturday, August 28, 2010

NETWORK TOPOLOGIES USED WITH PARTIAL AVAILABLE/FULLY AVAILABLE

In computer networking, topology refers to the layout of connected devices.

Network topology is defined as the interconnection of the various elements (links, nodes, etc.) of a computer network.[1][2] Network Topologies can be physical or logical. Physical Topology means the physical design of a network including the devices, location and cable installation. Logical topology refers to how data is actually transferred in a network as opposed to its physical design.
Topology can be considered as a virtual shape or structure of a network. This shape does not correspond to the actual physical design of the devices on the computer network. The computers on a home network can be arranged in a circle but it does not necessarily mean that it represents a ring topology.
Any particular network topology is determined only by the graphical mapping of the configuration of physical and/or logical connections between nodes. The study of network topology uses graph theory. Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ in two networks and yet their topologies may be identical.
A local area network (LAN) is one example of a network that exhibits both a physical topology and a logical topology. Any given node in the LAN has one or more links to one or more nodes in the network and the mapping of these links and nodes in a graph results in a geometric shape that may be used to describe the physical topology of the network. Likewise, the mapping of the data flow between the nodes in the network determines the logical topology of the network. The physical and logical topologies may or may not be identical in any particular network.



Contents:
1 Basic topology types

2 Classification of network topologies

2.1 Physical topologies

2.1.1 Classification of physical topologies

2.1.1.1 Point-to-point

2.1.1.2 Bus

2.1.1.3 Star

2.2 Notes

2.3 Extended star

2.4 Distributed Star

2.4.1 Ring

2.4.2 Mesh

2.4.3 Tree

2.5 Signal topology

2.6 Logical topology

2.6.1 Classification of logical topologies

3 Daisy chains

4 Centralization

5 Decentralization

6 Hybrids

7 See also

8 References

9 External links



 Basic topology types

The study of network topology recognizes six basic topologies:



Bus topology

Star topology

Ring topology

Tree topology

Mesh topology

Hybrid topology

This classification is based on the interconnection between computers - be it physical or logical.



This article relies largely or entirely upon a single source. Please help improve this article by introducing appropriate citations of additional sources. (aug 2010)



 Classification of network topologies

It is requested that a diagram or diagrams be included in this article to improve its quality.

There are also three basic categories of network topologies:

Physical topologies

Signal topologies

Logical topologies

The terms Signal topology and logical topology are often used interchangeably, though there is a subtle difference between the two.[citation needed]

 Physical topologies

The mapping of the nodes of a network and the physical connections between them – i.e., the layout of wiring, cables, the locations of nodes, and the interconnections between the nodes and the cabling or wiring system[1].



Classification of physical topologies

 Point-to-point

The simplest topology is a permanent link between two endpoints (the line in the illustration above). Switched point-to-point topologies are the basic model of conventional telephony. The value of a permanent point-to-point network is the value of guaranteed, or nearly so, communications between the two endpoints. The value of an on-demand point-to-point connection is proportional to the number of potential pairs of subscribers, and has been expressed as Metcalfe's Law.



Permanent (dedicated)

Easiest to understand, of the variations of point-to-point topology, is a point-to-point communications channel that appears, to the user, to be permanently associated with the two endpoints. Children's "tin-can telephone" is one example, with a microphone to a single public address speaker is another. These are examples of physical dedicated channels.

Within many switched telecommunications systems, it is possible to establish a permanent circuit. One example might be a telephone in the lobby of a public building, which is programmed to ring only the number of a telephone dispatcher. "Nailing down" a switched connection saves the cost of running a physical circuit between the two points. The resources in such a connection can be released when no longer needed, for example, a television circuit from a parade route back to the studio.

Switched:

Using circuit-switching or packet-switching technologies, a point-to-point circuit can be set up dynamically, and dropped when no longer needed. This is the basic mode of conventional telephony.

 Bus

Main article: Bus network



Bus network topologyIn local area networks where bus topology is used, each machine is connected to a single cable. Each computer or server is connected to the single bus cable through some kind of connector. A terminator is required at each end of the bus cable to prevent the signal from bouncing back and forth on the bus cable. A signal from the source travels in both directions to all machines connected on the bus cable until it finds the MAC address or IP address on the network that is the intended recipient. If the machine address does not match the intended address for the data, the machine ignores the data. Alternatively, if the data does match the machine address, the data is accepted. Since the bus topology consists of only one wire, it is rather inexpensive to implement when compared to other topologies. However, the low cost of implementing the technology is offset by the high cost of managing the network. Additionally, since only one cable is utilized, it can be the single point of failure. If the network cable breaks, the entire network will be down.

Linear bus

The type of network topology in which all of the nodes of the network are connected to a common transmission medium which has exactly two endpoints (this is the 'bus', which is also commonly referred to as the backbone, or trunk) – all data that is transmitted between nodes in the network is transmitted over this common transmission medium and is able to be received by all nodes in the network virtually simultaneously (disregarding propagation delays)[1].

Note: The two endpoints of the common transmission medium are normally terminated with a device called a terminator that exhibits the characteristic impedance of the transmission medium and which dissipates or absorbs the energy that remains in the signal to prevent the signal from being reflected or propagated back onto the transmission medium in the opposite direction, which would cause interference with and degradation of the signals on the transmission medium (See Electrical termination).

Distributed bus

The type of network topology in which all of the nodes of the network are connected to a common transmission medium which has more than two endpoints that are created by adding branches to the main section of the transmission medium – the physical distributed bus topology functions in exactly the same fashion as the physical linear bus topology (i.e., all nodes share a common transmission medium).

Notes:

1.) All of the endpoints of the common transmission medium are normally terminated with a device called a 'terminator' (see the note under linear bus).

2.) The physical linear bus topology is sometimes considered to be a special case of the physical distributed bus topology – i.e., a distributed bus with no branching segments.

3.) The physical distributed bus topology is sometimes incorrectly referred to as a physical tree topology – however, although the physical distributed bus topology resembles the physical tree topology, it differs from the physical tree topology in that there is no central node to which any other nodes are connected, since this hierarchical functionality is replaced by the common bus.

 Star

Main article: Star network



Star network topologyIn local area networks with a star topology, each network host is connected to a central hub. In contrast to the bus topology, the star topology connects each node to the hub with a point-to-point connection. All traffic that transverses the network passes through the central hub. The hub acts as a signal booster or repeater. The star topology is considered the easiest topology to design and implement. An advantage of the star topology is the simplicity of adding additional nodes. The primary disadvantage of the star topology is that the hub represents a single point of failure.



 Notes

A point-to-point link (described above) is sometimes categorized as a special instance of the physical star topology – therefore, the simplest type of network that is based upon the physical star topology would consist of one node with a single point-to-point link to a second node, the choice of which node is the 'hub' and which node is the 'spoke' being arbitrary[1].

After the special case of the point-to-point link, as in note 1.) above, the next simplest type of network that is based upon the physical star topology would consist of one central node – the 'hub' – with two separate point-to-point links to two peripheral nodes – the 'spokes'.

Although most networks that are based upon the physical star topology are commonly implemented using a special device such as a hub or switch as the central node (i.e., the 'hub' of the star), it is also possible to implement a network that is based upon the physical star topology using a computer or even a simple common connection point as the 'hub' or central node – however, since many illustrations of the physical star network topology depict the central node as one of these special devices, some confusion is possible, since this practice may lead to the misconception that a physical star network requires the central node to be one of these special devices, which is not true because a simple network consisting of three computers connected as in note 2.) above also has the topology of the physical star.

Star networks may also be described as either broadcast multi-access or nonbroadcast multi-access (NBMA), depending on whether the technology of the network either automatically propagates a signal at the hub to all spokes, or only addresses individual spokes with each communication.

 Extended star

A type of network topology in which a network that is based upon the physical star topology has one or more repeaters between the central node (the 'hub' of the star) and the peripheral or 'spoke' nodes, the repeaters being used to extend the maximum transmission distance of the point-to-point links between the central node and the peripheral nodes beyond that which is supported by the transmitter power of the central node or beyond that which is supported by the standard upon which the physical layer of the physical star network is based.



If the repeaters in a network that is based upon the physical extended star topology are replaced with hubs or switches, then a hybrid network topology is created that is referred to as a physical hierarchical star topology, although some texts make no distinction between the two topologies.



Distributed Star

A type of network topology that is composed of individual networks that are based upon the physical star topology connected together in a linear fashion – i.e., 'daisy-chained' – with no central or top level connection point (e.g., two or more 'stacked' hubs, along with their associated star connected nodes or 'spokes').



Ring

Main article: Ring network



Ring network topologyIn local area networks where the ring topology is used, each computer is connected to the network in a closed loop or ring. Each machine or computer has a unique address that is used for identification purposes. The signal passes through each machine or computer connected to the ring in one direction. Ring topologies typically utilize a token passing scheme, used to control access to the network. By utilizing this scheme, only one machine can transmit on the network at a time. The machines or computers connected to the ring act as signal boosters or repeaters which strengthen the signals that transverse the network. The primary disadvantage of ring topology is the failure of one machine will cause the entire network to fail.[citation needed]

 Mesh

Main article: Mesh networking

The value of fully meshed networks is proportional to the exponent of the number of subscribers, assuming that communicating groups of any two endpoints, up to and including all the endpoints, is approximated by Reed's Law.
Fully connected mesh topologyThe number of connections in a full mesh = n(n - 1) / 2



Fully connected

Note: The physical fully connected mesh topology is generally too costly and complex for practical networks, although the topology is used when there are only a small number of nodes to be interconnected.



Partially connected mesh topologyPartially connected

The type of network topology in which some of the nodes of the network are connected to more than one other node in the network with a point-to-point link – this makes it possible to take advantage of some of the redundancy that is provided by a physical fully connected mesh topology without the expense and complexity required for a connection between every node in the network.

Note: In most practical networks that are based upon the physical partially connected mesh topology, all of the data that is transmitted between nodes in the network takes the shortest path (or an approximation of the shortest path) between nodes, except in the case of a failure or break in one of the links, in which case the data takes an alternative path to the destination. This requires that the nodes of the network possess some type of logical 'routing' algorithm to determine the correct path to use at any particular time.

 Tree
Tree network topologyAlso known as a hierarchical network.

The type of network topology in which a central 'root' node (the top level of the hierarchy) is connected to one or more other nodes that are one level lower in the hierarchy (i.e., the second level) with a point-to-point link between each of the second level nodes and the top level central 'root' node, while each of the second level nodes that are connected to the top level central 'root' node will also have one or more other nodes that are one level lower in the hierarchy (i.e., the third level) connected to it, also with a point-to-point link, the top level central 'root' node being the only node that has no other node above it in the hierarchy (The hierarchy of the tree is symmetrical.) Each node in the network having a specific fixed number, of nodes connected to it at the next lower level in the hierarchy, the number, being referred to as the 'branching factor' of the hierarchical tree.This tree has individual peripheral nodes.



1.) A network that is based upon the physical hierarchical topology must have at least three levels in the hierarchy of the tree, since a network with a central 'root' node and only one hierarchical level below it would exhibit the physical topology of a star.

2.) A network that is based upon the physical hierarchical topology and with a branching factor of 1 would be classified as a physical linear topology.

3.) The branching factor, f, is independent of the total number of nodes in the network and, therefore, if the nodes in the network require ports for connection to other nodes the total number of ports per node may be kept low even though the total number of nodes is large – this makes the effect of the cost of adding ports to each node totally dependent upon the branching factor and may therefore be kept as low as required without any effect upon the total number of nodes that are possible.

4.) The total number of point-to-point links in a network that is based upon the physical hierarchical topology will be one less than the total number of nodes in the network.

5.) If the nodes in a network that is based upon the physical hierarchical topology are required to perform any processing upon the data that is transmitted between nodes in the network, the nodes that are at higher levels in the hierarchy will be required to perform more processing operations on behalf of other nodes than the nodes that are lower in the hierarchy. Such a type of network topology is very useful and highly recommended.

 Signal topology

The mapping of the actual connections between the nodes of a network, as evidenced by the path that the signals take when propagating between the nodes.



Note: The term 'signal topology' is often used synonymously with the term 'logical topology', however, some confusion may result from this practice in certain situations since, by definition, the term 'logical topology' refers to the apparent path that the data takes between nodes in a network while the term 'signal topology' generally refers to the actual path that the signals (e.g., optical, electrical, electromagnetic, etc.) take when propagating between nodes.

Logical topology

The logical topology, in contrast to the "physical", is the way that the signals act on the network media, or the way that the data passes through the network from one device to the next without regard to the physical interconnection of the devices. A network's logical topology is not necessarily the same as its physical topology. For example, twisted pair Ethernet is a logical bus topology in a physical star topology layout. While IBM's Token Ring is a logical ring topology, it is physically set up in a star topology.

The logical classification of network topologies generally follows the same classifications as those in the physical classifications of network topologies, the path that the data takes between nodes being used to determine the topology as opposed to the actual physical connections being used to determine the topology

1.) Logical topologies are often closely associated with media access control (MAC) methods and protocols.

2.) The logical topologies are generally determined by network protocols as opposed to being determined by the physical layout of cables, wires, and network devices or by the flow of the electrical signals, although in many cases the paths that the electrical signals take between nodes may closely match the logical flow of data, hence the convention of using the terms 'logical topology' and 'signal topology' interchangeably.

3.) Logical topologies are able to be dynamically reconfigured by special types of equipment such as routers and switches.

 Daisy chains

Except for star-based networks, the easiest way to add more computers into a network is by daisy-chaining, or connecting each computer in series to the next. If a message is intended for a computer partway down the line, each system bounces it along in sequence until it reaches the destination. A daisy-chained network can take two basic forms: linear and ring.



A linear topology puts a two-way link between one computer and the next. However, this was expensive in the early days of computing, since each computer (except for the ones at each end) required two receivers and two transmitters.

By connecting the computers at each end, a ring topology can be formed. An advantage of the ring is that the number of transmitters and receivers can be cut in half, since a message will eventually loop all of the way around. When a node sends a message, the message is processed by each computer in the ring. If a computer is not the destination node, it will pass the message to the next node, until the message arrives at its destination. If the message is not accepted by any node on the network, it will travel around the entire ring and return to the sender. This potentially results in a doubling of travel time for data.

Centralization

The star topology reduces the probability of a network failure by connecting all of the peripheral nodes (computers, etc.) to a central node. When the physical star topology is applied to a logical bus network such as Ethernet, this central node (traditionally a hub) rebroadcasts all transmissions received from any peripheral node to all peripheral nodes on the network, sometimes including the originating node. All peripheral nodes may thus communicate with all others by transmitting to, and receiving from, the central node only. The failure of a transmission line linking any peripheral node to the central node will result in the isolation of that peripheral node from all others, but the remaining peripheral nodes will be unaffected. However, the disadvantage is that the failure of the central node will cause the failure of all of the peripheral nodes also.



If the central node is passive, the originating node must be able to tolerate the reception of an echo of its own transmission, delayed by the two-way round trip transmission time (i.e. to and from the central node) plus any delay generated in the central node. An active star network has an active central node that usually has the means to prevent echo-related problems.



A tree topology (a.k.a. hierarchical topology) can be viewed as a collection of star networks arranged in a hierarchy. This tree has individual peripheral nodes (e.g. leaves) which are required to transmit to and receive from one other node only and are not required to act as repeaters or regenerators. Unlike the star network, the functionality of the central node may be distributed.



As in the conventional star network, individual nodes may thus still be isolated from the network by a single-point failure of a transmission path to the node. If a link connecting a leaf fails, that leaf is isolated; if a connection to a non-leaf node fails, an entire section of the network becomes isolated from the rest.



In order to alleviate the amount of network traffic that comes from broadcasting all signals to all nodes, more advanced central nodes were developed that are able to keep track of the identities of the nodes that are connected to the network. These network switches will "learn" the layout of the network by "listening" on each port during normal data transmission, examining the data packets and recording the address/identifier of each connected node and which port it's connected to in a lookup table held in memory. This lookup table then allows future transmissions to be forwarded to the intended destination only.



 Decentralization

In a mesh topology (i.e., a partially connected mesh topology), there are at least two nodes with two or more paths between them to provide redundant paths to be used in case the link providing one of the paths fails. This decentralization is often used to advantage to compensate for the single-point-failure disadvantage that is present when using a single device as a central node (e.g., in star and tree networks). A special kind of mesh, limiting the number of hops between two nodes, is a hypercube. The number of arbitrary forks in mesh networks makes them more difficult to design and implement, but their decentralized nature makes them very useful. This is similar in some ways to a grid network, where a linear or ring topology is used to connect systems in multiple directions. A multi-dimensional ring has a toroidal topology, for instance.



A fully connected network, complete topology or full mesh topology is a network topology in which there is a direct link between all pairs of nodes. In a fully connected network with n nodes, there are n(n-1)/2 direct links. Networks designed with this topology are usually very expensive to set up, but provide a high degree of reliability due to the multiple paths for data that are provided by the large number of redundant links between nodes. This topology is mostly seen in military applications. However, it can also be seen in the file sharing protocol BitTorrent in which users connect to other users in the "swarm" by allowing each user sharing the file to connect to other users also involved. Often in actual usage of BitTorrent any given individual node is rarely connected to every single other node as in a true fully connected network but the protocol does allow for the possibility for any one node to connect to any other node when sharing files.



Hybrids

Hybrid networks use a combination of any two or more topologies in such a way that the resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.). For example, a tree network connected to a tree network is still a tree network, but two star networks connected together exhibit a hybrid network topology. A hybrid topology is always produced when two different basic network topologies are connected. Two common examples for Hybrid network are: star ring network and star bus network



A Star ring network consists of two or more star topologies connected using a multistation access unit (MAU) as a centralized hub.

A Star Bus network consists of two or more star topologies connected using a bus trunk (the bus trunk serves as the network's backbone).

While grid networks have found popularity in high-performance computing applications, some systems have used genetic algorithms to design custom networks that have the fewest possible hops in between different nodes. Some of the resulting layouts are nearly incomprehensible, although they function quite well.
gurbinder

Friday, February 19, 2010

I Have Recieved Frauds Reports From Many Guys Seeking Help

Hi
I am Gurbinder Sharma.I am a IT Professional .I want to tell you some people sending fake e-mails about direct recruitments into
companies like WIPRO,VOLTAS,IBM,HCL & INFOSYS.you might first recieve sms on mobile for your selection.they provide you
e-mail address to reply on.like: appointment.wipro.13@gmail.com.

Matter: hi mr. any name
we are pleased to inform you that you are selected for the position of manager/executive/it admin for our new plant in Pune.sometimes multiple locations also like DELHI,PUNE,NOIDA.Your Compensation is 30,000(benefits as per company rules).
Last Date of Submission: 22 feb 2010

pls rush to make sure you won't lose this chance.you have to deposit rs 4250/- in any bank with EDC facility (mostly ICICI) which
is refundable Interview fees.Once you deposit the amount pls mail to hrd,wipro/voltas/sr. hrd any of these type we assume it from
wipro: wipro.recruitmentprocess@post.com . once we recieve the payment we send you your offer letter and a air ticket to Pune/Delhi/Noida.Account no was different in Different mails and HR person was also Different.
REQUIRED DOCUMENTS BY THE COMPANY HRD.


1) Photo-copies of Qualification Documents.

2) Photo-copies of Experience Certificates (If any)

3) Photo-copies of Address Proof

4) Two Passport Size Photograph

A/c no:496002010043024
We wish you the best of luck for the subsequent and remaining stage.


Address: ms. Ravi Kumar(HR)
Wipro Technologies
A-182,Telex Tower MIDC
Industrial Area Shirur Pune.
Cell no:098958143024

Kind regards
gurbinder
Microsoft Certified Professional
Microsoft Certified Technology Specialist
Microsoft Certified IT Professional
Security Specialist