Please click on the link below which you want to learn
CONTACT US FOR
Any kind of computers, Laptops, Batteries for laptop, Servers , monitors, printers, hard disk, ram, ups, cabinet, keyboards, mouse, Broad-band, ADSL routers, speakers, pen drives, modems, CD, DVD, TV cards, Graphic cards, headphones and other related (desktop & laptop) accessories.
Surya Prasad Dhakal
LUS@N COMPUTER CONSULTANCY SERVICE
SHREESHA HIMALAYAN BUSINESS MART
Putalisadak, Kathmandu,Nepal
Contact no :- +977 - 01 - 4245403, 9841313530, 9741073413
Entertainment...............( मनोरन्जन )



Sagarmatha TV(Live), Image Channel, Chhanel Nepal, Nepal One, Kantipur TV, Nepal Telivision, AVNews, ABC TV
News ....
eKantipur.com, Hamropalo.com, Himalayan Times,NepalNews.com, Nepal Horizons, Nepali Times, Telegraph, Nepal News, Gorkhapatra, Rajdhani, Nagarik, My Republica,Mahanagar, Naya Patrika, Annapurnapost, Kantipur in English
Big News Network, Birmarsha, Budhabar (Kathmandu), Business Manager, CBC News, Cyber Nepal, Deshantar (Kathmandu),Dishanirdesh (Kathmandu), Dristi(Kathmandu), EIN News,Gatibidhi, Himalayan Travel Trade Journal, HimoNews,Image Channel, Independent, Inside Nepal, Jana Aastha (Kathmandu),Janadharana (Kathmandu), Kamana, Kosheli (Kathmandu),Moreover, Nepal/Bhutan News, Nepal News Headlines, Nepal Samachaparta (Kathmandu), Nepal Traveller, Nepal News, Nepal Now, Nepali Post , Nepalnews.com in Nepali, New Business Age,Newslook, NewsTrove, Nispakshya, OneWorld, Parewa News,People’s Review Weekly (Kathmandu), Rajdhani (Kathmandu),The Rising Nepal (Kathmandu), RSS Nepal National News Agency, Samachar Patra, Sandhya Times (Kathmandu), Saptahik Weekly, Satyagraha, Spotlight (Kathmandu), Sunday Post(Kathmandu), Tasapaw (Kathmandu), Topix, Travellers’ Nepal,Washington Post Nepal News, Wave (Kathmandu)
FM Radios



Kantipur FM, Radio Salaam Namaste, Dallas, Texas,USA, BBC Nepali Sewa, CRI Nepali Sewa,Gurkha Radio, Hits FM, KATH 97.9, Machhapuchhre FM, Matri FM, Nepal Fm, Radio Dovan, Radio Nepal,Radio Sagarmatha, Ujyaalo 90 NetworkView Nepali Sabdakosh
फेसबुकमा नेपालीमा टाईपगर्नु परेमा यहाँ क्लिक गर्नुहोस (पहिला रोमन मा टाईप गर्नुहोस् र कपि पेस्ट गर्नुहोस्)
Dictionary
Here is some links to sign in..
Saturday, December 19, 2009
तपाईंको कम्प्युटरको गती(speed)बढाउने उपायहरु(Tips).
१. सर्बप्रथम कम्प्युटर खोल्ने बित्तिकै कुनै पनि Application चाँड चांडै नखोल्नुस् , पहिला राम्रो सँग PC लाई Bootup हुन दिनुस् ।
२. कुनैपनि Application बन्द गरी सके पछि आफ्नो Desktop लाई एक पल्ट Refresh गर्नुस् यसले तपाईंको कम्प्युटरको Ram मा जम्मा भएको Unused फाइलहरु Remove हुन्छ ।
३. आफ्नो कम्प्युटरमा सके सम्म Wallpaper को Use नै नगर्नुस् र यदि गर्नुनै छ भने ठुलो साइजको Image लाई Use नगर्नुस् ।
४. आफ्नो Desktop मा धेरै Unnessesary Shortcut हरुलाई नराख्नुस् र सके सम्म Desktop लाई Clean नै राख् नुस् । Desktop मा फोटो तथा Music को फाइलहरुलाई पनि Save नगर्नुस् ।
५. RecycleBin लाई बेला बेलामा Empty गरी राख् नुस् । तपाईंले Delete गर्नु भएको फाइलहरु RecycleBin मा जम्मा भई राखेको हुन्छ र तपाईंको कम्प्युटरको Harddrive को ठाउँ यसले लीइ राखेको हुन्छ ।
६. temporary internet files लाई बेला बेलामा Delete गरी राखनुस् ।
७. आफ्नो कम्प्युटर लाई प्रत्येक २ महिनामा Defragment गर्नुस् । यसले तपाईंको कम्प्युटरको Harddrive मा धेरै खाली ठाउँ बनाउछ र Program हरु Fast चल्छन ।
८. आफ्नो कम्प्युटर लाई जहिले पनि २ वा २ भन्दा बढीमा partitions गर्नुस् र सके सम्म Software हरुलाई दोस्रो वा तेस्रो Drive मा Instal गर्नुस् । सके सम्म C Drive लाई खाली नै राख् नुस् ।
९. जब तपाईंले नयाँ Software हरु Instal गर्नु हुन्छ त्यो Software को Tray Icon लाई Disable गर्नुस् , यि Icon हरुले तपाईंको कम्प्युटरको RAM को Use गरी राखेका हुन्छन र कम्प्युटर Slow हुन सक्छ र Software का starting the application automatically Option लाई पनि Disable गर्न नभुल्नु होला । यस्ता Option हरुलाई तपाइले software हरु Instal गरी सके पछि उक्त Software को Tools मा गएर पनि Disable गर्न सक्नु हुन्छ ।
१०. आफ्नो कम्प्युटर लाई धुलो बाट पनि सके सम्म बचाउनुस् , किन भने धुलोले तपाईंको कम्प्युटरका Cooling Fan हरुलाई जाम गरी दिन सक्छ यसले कम्प्युटर अनावश्यक रुपमा तातो हुन सक्छ र कम्प्युटर Slow Down हुन सक्छ ।"यि १० वटा साधारण Tips हरुलाई बिचार पुर्याउनु भयो भने तपाईंको कम्प्युटर तुलनात्मक रुपमा पहिले भन्दा धेरै Speed मा चल्न सक्छ ।"
हजुरको कम्प्युटरको सुरक्षाको लागि उपायहरु(Tips).
२) आफ्नो e-mail मा आएका mail हरुलाई नहेरी नबुझी झत्तै कहिले पनि नखोल्नुस् । शँका लागेका mail हरु कहिले पनि नखोल्नुस् Even तपाईंले चिनेको मान्छेले पठाएको भए पनि..." यो एउटा साधारण नियम नै हो कि यदि तपाईं कसैलाई चिन्नु हुन्न भने त्यो मान्छेले पठाएको mail खोल्नु तपाईंलाई जरुरी छैन र त्यो mail सँग जोडीएको कुनै Attachment पनि । यदि तपाईंलाई शँका लागेका यस्ता कुनै mail आएको छ भने त्यसलाई Delete गरी दिनु नै राम्रो हुन्छ न कि के हो एक चोटि खोली हेरु भनी खोल्नु । यदि तपाईंलाई खोल्नु नै छ भने पनि पहिला त्यो फाइललाई कम्प्युटरमा Save गर्नुस् र आफ्नो Anti-virus Software ले virus check गरेर मात्र खोल्नुस् तर यो पनि तपाईंको कम्प्युटरको लागि risk हुन सक्छ । साथै तपाईंलाई एउटै message एउटै नाम बाट धेरै आएको छ भने पनि तपाइ साबधान हुनुस् ।"
३) आफ्नो कम्प्युटरमा तपाईंले नचाहेर प्रवेस गर्नेलाई रोक्ने सुरक्षित ईन्टरनेट Firewalls लाई activate गर्नुस् । " तपाईंको कम्प्युटरमा भएको Firewalls system लाई active राख् नुस् । यसले तपाईंको कम्प्युटर र बाँकी दुनियाँको बिच सुरक्षा पर्खालको काम गर्छ । यसले तपाईंको कम्प्युटरको software र Hardware को एकै चोटि रक्षा गर्ने काम गर्छ । यसले तुलनात्मक रुपमा अनधाक्रित र खराब Data हरु बिरुद्द सुरक्षाको दिन्छ ।"
४) सके सम्म guess गर्न गार्हो Password को प्रयोग गर्नुस् । " जस्तै capital letter र small latter को mix , कुनै symbol को बिचमा प्रयोग अनि अंक को प्रयोग । र यो पनि नभुल्नुस् कि तपाईंको password कमसे काम ८ ओटा भन्दा कम नहोस् , आफ्नो password लाई regularly change गरी राख् नुस् at least ९० दिन भित्रमा र आफ्नो password कसै सँग पनि Share नगर्नुस् ।"
५) आफ्नो कम्प्युटरको महत्वपूर्ण Data हरुलाई Backup को रुपमा CD मा राख् ने गर्नुस् । " अनुभव प्राप्त कम्प्युटर अपरेटरले सधैं आफ्नो महत्वपूर्ण Data हरुलाई Backup को रुपमा Disk वा CD हरुमा राखेका हुन्छन । यस्तो गर्ने बानिले तपाईंले कहिले काही आफ्नो कम्प्युटरका Data हरु loss भएको खण्डमा धेरै काम दिन सक्छ । तपाईंको कम्प्युटरका Data हरु कुनै बेला पनि Damage हुन सक्छ त्यसैले बेलामै तयार रहनुस् ।"
६) आफ्नो कम्प्युटरलाई कहिले पनि Sharing नगर्नुस् " तपाईंको कम्प्युटरलाई अरु कम्प्युटर सँग network वा Internet बाट sharing नगर्नुस् , यसबाट पनि तपाईंको कम्प्युटरमा virus सर्न सक्ने धेरै Chance हुन्छ त्यसैले जरुरी नभए सम्म sharing mode लाई Turn Off नै राख् नुस् । आफ्नो operating system लाई check गर्नुस् कि कसरी यसलाई disible गर्न सकिन्छ र कहिले पनि कुनै अपरिचित सँग आफ्नो कम्प्युटर लाई share नगर्नुस् ।"
७) Internet connection लाई disconnect गर्नुस् यदि use भएको छैन भने " यो याद राख्नुस् कि Digital Highway को २ वटा बाटो हुन्छ , तपाईंले कुनै Data पठाउनु हुन्छ र पाउनु हुन्छ , जहिले पनि Sent र Receive को नियम लागु हुन्छ । यदि तपाईं online मा हुनु हुन्छ र तपाईं सँग Anti-virus सफ्टवेर छैन र Firewalls पनि active छैन भने अरु कुनै दोस्रो मान्छेले तपाईंको कम्प्युटरमा virus infect गर्न सक्छ । त्यसैले यदि तपाईंलाई आवश्यकता छैन भने Internet connection लाई Disconnect गर्नुस् ।"
८) आफ्नो कम्प्युटरको security system लाई बेला बेलामा check गरी राख् नुस् । " प्रोग्राम र opereting system को धेरै महत्वपूर्ण Value छ तपाईंको life सजिलो गराउनमा तर तपाईंलाई टाढा रहनु छ hackers र viruses सँग र यिनिहरुले तपाईंको यि नै महत्वपूर्ण अङमा आक्रमण गर्न्छन । त्यसैले तपाईं सधैं चनाखो रहनु जरुरी छ ।"
९) ईन्टरनेटमा जे पायो त्यही फाइलहरु download नगरनुस् । " तपाइलाई यो थाहा हुनु जरुरी छ कि ईन्टरनेटमा राम्रो मात्र हैन तपाईंको कम्प्युटरलाई बिगार्ने धेरै नराम्रो फाइलहरु पनि पाईन्छन । त्यसैले ईन्टरनेट बाट फाइलहरु download गर्दा धेरै ध्यान दिनु पर्छ । तपाईंलाई शँका लागेका वा अनावश्यक फाइलहरु सके सम्म download नगर्नु नै राम्रो ।"
१०) आफ्नो घरको परिवार वा जस्ले तपाईंको कम्प्युटर चलाऊछ उनिहरुलाई पनि थाहा हुनु पर्छ कि के गर्नु पर्छ virus बिरुद्द सुरक्षा गर्नको लागि " यो एकदम महत्वपूर्ण कुरा हो कि कम्प्युटर चलाऊने सबैले कम्प्युटरको सुरक्षाको बारेमा पनि जान्नु जरुरी छ । उनिहरुलाई थाहा हुनु पर्छ कि कसरी anti-virus Software लाई Update गर्ने कसरी Password ले सुरक्षा गर्ने आदी आदी ।"
Types of Networks
Client/Server - This type of network is designed to support a large number of users and uses dedicated server/s to accomplish this. Clients log in to the server/s in order to run applications or obtain files. Security and permissions can be managed by 1 or more administrators which cuts down on network users med-ling with things that they shouldn't be. This type of network also allows for convenient backup services, reduces network traffic and provides a host of other services that comes with the network operating system (NOS).
Centralized - This is also a client/server based model that is most often seen in UNIX environments, but the clients are "dumb terminals". This means that the client may not have a floppy drive, hard disk or CD ROM and all applications and processing occur on the server/s. As you can imagine, this requires fast and expensive server/s. Security is very high on this type of network.
OSI Seven(7) Layer Model
* Physical - The Physical layer is the specification for the hardware connection, the electronics, logic circuitry, and wiring that transmit the actual signal. It is only concerned with moving bits of data on and off the network medium. Most network problems occur at the Physical layer.
* Data Link - The Data Link layer is the interface between the upper "software" layers and the lower "hardware" Physical layer. One of its main tasks is to create and interpret different frame types based on the network type in use. The Data Link layer is divided into two sub-layers: the Media Access Control (MAC) sub-layer and the Logical Link Control (LLC) sub-layer.
o LLC sub-layer starts maintains connections between devices (e.g. server - workstation).
o MAC sub-layer enables multiple devices to share the same medium. MAC sub-layer maintains physical device (MAC) addresses for communicating locally (the MAC address of the nearest router is used to send information onto a WAN).
* Network - The Network layer addresses messages and translates logical addresses and names into physical addresses. It also manages data traffic and congestion involved in packet switching and routing. It enables the option of specifying a service address (sockets, ports) to point the data to the correct program on the destination computer.
* Transport - The Transport layer provides flow control, error handling, and is involved in correction of transmission/reception problems. It also breaks up large data files into smaller packets, combines small packets into larger ones for transmission, and reassembles incoming packets into the original sequence.
* Session - The Session layer handles security and name recognition to enable two applications on different computers to communicate over the network. Manages dialogs between computers by using simplex(rare), half-duplex or full-duplex. The phases involved in a session dialog are as follows: establishment, data-transfer and termination.
* Presentation- The Presentation layer determines data exchange formats and translates specific files from the Application layer format into a commonly recognized data format. It provides protocol conversion, data translation, encryption, character-set conversion, and graphics-command expansion.
* Application - The Application layer represents user applications, such as software for file transfers, database access, and e-mail. It handles general network access, flow control, and error recovery. Provides a consistent neutral interface for software to access the network and advertises the computers resources to the network.
Here is an idiotic, yet easy way to remember the 7 layers. Memorize the following sentence: All People Seem To Need Data Processing. The first letter of each word corresponds to the first letter of the layers starting with Application and ending with the physical layer.
Layer 1 – The Physical Layer
* Translates data into bits, or bits into data
* Deals only with electrical and mechanical level of data communication, which builds the foundation to allow higher OSI layers to walk through it.
* Physical Layer devices are:
o NIC Cards
o Ethernet Hubs
o Repeaters
o Multistation Access Units (MAUs)
o Transceiver
o Media Filters
Layer 2 – The Data Link Layer
* Provides flow and error control and synchronization for the Physical Layer
* Is made up of the Logical Link control and MAC sublayers
* Data Link Layer Devices are:
o Bridges
o Switches
o Brouters
The Protocols that operate at the Data Link Layer are:
* Point-to-Point Protocol (PPP)
* Serial Line Internet Protocol (SLIP)
* High-Level Data Link Control (HDLC)
* Logical Link Control (LLC)
* Link Access Protocol (LAP)
Layer 3- The Network Layer
* Manages communications routing for packets that are destined for addresses that are not on the LAN
* Uses routable protocols to deliver packets across interconnected networks joined by routers.
* Device which operate at the Network Layer are:
o Routers
o Connectionless Oriented services
The two main protocols that operate at the Network Layer are:
* TCP/IP
* IPX/SPX
Layer 4 – The Transport Layer
o Manages the end-to-end control and error checking by providing an end-to-end connection between the source and the destination node to ensure reliable data delivery
o Also responsible for providing end-to-end recovery, flow control, and releasing the connection
Connectionless-Oriented Protocols that operate at this layer are:
* UDP
Connection-Oriented Protocols that operate at this layer are:
* TCP/IP
* SPX/IPX
Layer 5 – The Session Layer
* The session layer manages the establishment of a continuing series of requests and responses between the applications at each end.
* Mainframes used to use this layer – modern networking does not.
Layer 6 - The Presentation Layer
* Usually part of the Operating System
* It prepares incoming data for the Application layer and formats outgoing data that the Application layer sends and receives.
* Data compression and data encryption.
Layer 7 – The Application Layer
* The top layer of the OSI model
* Provides information services
* FTP and Telnet access the OSI model at this layer.
FANS OF LUS@N COMPUTER
Network Topologies
· Bus - This topology is an old one and essentially has each of the computers on the network daisy-chained to each other. This type of network is usually peer-to-peer and uses Thinnet (10base2) cabling. It is configured by connecting a "T-connector" to the network adapter and then connecting cables to the T-connectors on the computers on the right and left. At both ends of the chain, the network must be terminated with a 50 ohm impedance terminator. If a failure occurs with a host, it will prevent the other computers from communicating with each other. Missing terminators or terminators with an incorrect impedance will also cause problems.
As you can see if computer #1 sends a packet to computer #4, it must pass through computers #2 and #3, creating excess traffic.
ADVANTAGES: Cheap, simple to set up.
DISADVANTAGES: Excess network traffic, a failure may affect many users, problems are difficult to troubleshoot.
· Star - The star topology uses twisted pair (10baseT or 100baseT) cabling and requires that all devices are connected to a hub.
ADVANTAGES: centralized monitoring, failures do not affect others unless it is the hub, easy to modify.
DISADVANTAGES: If the hub fails then everything connected to it is down. This is like if you were to burn down the phone company's central office, then anyone connected to it wouldn't be able to make any phone calls.
· Ring - The ring topology looks the same as the star, except that it uses special hubs and ethernet adapters. The ring topology is used with Token Ring networks.
ADVANTAGES: Equal access.
DISADVANTAGES: Difficult to troubleshoot, network changes affect many users, failures affect many users.
· Hybrid - Hybrid topologies are combinations of the above and are common on very large networks. For example, a star bus network has hubs connected in a row (like a bus network) and has computers connected to each hub as in the star topology.
· Mesh - In a true mesh topology every node has a connection to every other node in the network. A full mesh network can be very expensive, but provides redundancy in case of a failure between links.
ADVANTAGES: World-wide acceptance. Ranges over 150 feet. Freedom to move about and no cables (obvious).
DISADVANTAGES: Susceptible to interference from objects such as microwave ovens and cordless phones




