Saturday, August 11, 2007

A.T.M.


An automated teller machine (ATM) is a computerized telecommunications device that provides the customers of a financial institution with access to financial transactions in a public space without the need for a human clerk or bank teller. On most modern ATMs, the customer is identified by inserting a plastic ATM card with a magnetic stripe or a plastic smartcard with a chip, that contains a unique card number and some security information, such as an expiration date or CVC (CVV). Security is provided by the customer entering a personal identification number (PIN).

Using an ATM, customers can access their bank accounts in order to make cash withdrawals (or credit card cash advances) and check their account balances. Many ATMs also allow people to deposit cash or cheques, transfer money between their bank accounts, pay bills, or purchase goods and services.

ATMs are known by various casual terms including automated banking machine, cash machine, hole-in-the-wall, cashpoint or Bancomat (in Europe and Russia). The occasionally-used term ATM machine is an example of RAS syndrome.

History

An old Nixdorf ATMThe ATM was invented by Briton John Shepherd-Barron. The world's first ATM was installed in a branch of Barclays in Enfield, north London, in 1967. Reg Varney, from the television series On the Buses, was the first to withdraw cash. Inspiration had struck Mr Shepherd-Barron, now 82, while he was in the bath.

http://news.bbc.co.uk/1/hi/business/6230194.stm
A mechanical cash dispenser was developed and built by Luther George Simjian and installed 1939 in New York City by the City Bank of New York, but removed after 6 months due to the lack of customer acceptance.[1]

Thereafter, the history of ATMs paused for over 25 years, until De La Rue developed the first electronic ATM, which was installed first in Enfield Town in North London[2] on 27 June 1967 by Barclays Bank.[3]. This instance of the invention is credited to John Shepherd-Barron, although various other engineers were awarded patents for related technologies at the time.[4] Shepherd-Barron was awarded an OBE in the 2005 New Year's Honours List.[5] The first person to use the machine was Reg Varney of "On the Buses" fame, a British Television programme from the 1960s.[6] The first ATMs accepted only a single-use token or voucher, which was retained by the machine. These worked on various principles including radiation and low-coercivity magnetism that was wiped by the card reader to make fraud more difficult.[4] The idea of a PIN stored on the card was developed by the British engineer John Rose in 1965.[4]

ATMs first came into wide UK use in 1973; the IBM 2984 was designed at the request of Lloyds Bank. The 2984 CIT (Cash Issuing Terminal) was the first true Cashpoint, similar in function to today's machines; Cashpoint is still a registered trademark of Lloyds TSB in the U.K. All were online and issued a variable amount which was immediately deducted from the account. A small number of 2984s were supplied to a USA bank. Notable historical models of ATMs include the IBM 3624 and 473x series, Diebold 10xx and TABS 9000 series, and NCR 5xxx series

LOCATION


ATMs are placed not only near or inside the premises of banks, but also in locations such as shopping centers/malls, airports, grocery stores, petrol/gas stations, restaurants, or any place large numbers of people may gather. These represent two types of ATM installations: on and off premise. On premise ATMs are typically more advanced, multi-function machines that complement an actual bank branch's capabilities and thus more expensive. Off premise machines are deployed by financial institutions and also ISOs (or Independent Sales Organizations) where there is usually just a straight need for cash, so they typically are the cheaper mono-function devices. In Canada, when an ATM is not operated by a financial institution it is known as a "White Label ATM".

HARDWEAR

In North America, banks often have drive-through lanes providing access to ATMs.

An ATM is typically made up of the following devices:

*CPU (to control the user interface and transaction devices)
*Magnetic and/or Chip card reader (to identify the customer)
*PIN Pad (similar in layout to a Touch tone or Calculator keypad), often manufactured as part of a secure enclosure.
*Secure cryptoprocessor, generally within a secure enclosure.
*Display (used by the customer for performing the transaction)
*Function key buttons (usually close to the display) or a Touchscreen (used to select the various aspects of the transaction)
*Record Printer (to provide the customer with a record of their transaction)
*Vault (to store the parts of the machinery requiring restricted access)
*Housing (for aesthetics and to attach signage to)
*Recently, due to heavier computing demands and the falling price of computer-like architectures, ATMs have moved away from custom hardware architectures using microcontrollers and/or application-specific integrated circuits to adopting a hardware architecture that is very similar to a personal computer. Many ATMs are now able to use operating systems such as Microsoft Windows and Linux. Although it is undoubtedly cheaper to use commercial off-the-shelf hardware, it does make ATMs vulnerable to the same sort of problems exhibited by conventional computers

Wednesday, August 1, 2007

Distributed Operating Systems

Distributed Operating Systems:

The ODP standards, and this text, assume a model where distributed applications are running in multiple processes in multiple computers linked by communications. The application programmer will be supported by a programming environment and run-time system that will make many aspects of distribution in the system transparent. For instance the programmer may not have to worry about where the parts of the application are running, this can all be taken care of, if required; this is called location transparency.

There is another approach to supporting applications in a distributed system, that is by using a distributed operating system. On every computer system with an operating system the O/S provides an interface which the programs use to obtain services, such as input and output.

In a distributed operating system this interface is enhanced so that a program may be run on any computer in the distributed system and access data on any other computer. The operating system provides data, execution and location transparency, often through an extended naming scheme. The advantage of a distributed operating system is that is uses an interface below that of the application program. This means the existing programming environments may be used, the programmer may use the system with little or no extra training, and in some cases existing software may be used. The disadvantage is that a number of problems are left for the programmer and user to handle, for instance concurrency; and because of the advantage above, programmers are given little support for this. Essentially, the Distributed Operating System dictates the policies of distribution for all aspects of programming. This means that the programmer is not able to use the distributed functionality in an application specific way to optimize a solution.

Another major disadvantage is that the distributed system is tied to a style of operating system interface. There are lots of different operating systems today, to meet different requirements (real or imaginary); there is no reason why future distributed systems will not need different operating system interfaces. Consequently it is not possible to build a truly heterogeneous open distributed system by building it on top of an homogeneous distributed operating system.

The ODP model provides an application interface to the distributed system. This interface is extremely simple and is concerned with aspects of distribution only. The application may still be run on any local operating system that is appropriate.

The ODP model does include the use of distributed operating systems, but would require any particular type of distributed operating system to interwork with other types through ODP and with also with non-distributed operating systems. The applications would see no difference. One popular implementors specification for some parts of ODP is the Common Object Request Broker Architecture. This is covered in chapter 7.

Distributed Operating Systems and Algorithms integrates into one text both the theory and implementation aspects of distributed operating systems for the first time. This innovative book provides the reader with knowledge of the important algorithms necessary for an in-depth understanding of distributed systems; at the same time it motivates the study of these algorithms by presenting a systems framework for their practical application.

The first part of the book is intended for use in an advanced course on operating systems and concentrates on parallel systems, distributed systems, real-time systems, and computer networks. The second part of the text is written for a course on distributed algorithms with a focus on algorithms for asynchronous distributed systems. While each of the two parts is self-contained, extensive cross-referencing allows the reader to emphasize either theory or implementation or to cover both elements of selected topics.

Features:

*Integrates and balances coverage of the advanced aspects of operating systems with the distributed algorithms used by these systems.

*Includes extensive references to commercial and experimental systems to illustrate the concepts and implementation issues.

*Provides precise algorithm description and explanation of why these algorithms were developed.

*Structures the coverage of algorithms around the creation of a framework for implementing a replicated server-a prototype for implementing a fault-tolerant and highly available distributed system.

*Contains programming projects on such topics as sockets, RPC, threads, and implementation of distributed algorithms using these tools.

*Includes an extensive annotated bibliography for each chapter, pointing the reader to recent developments.

*Solutions to selected exercises, templates to programming problems, a simulator for algorithms for distributed synchronization, and teaching tips for selected topics are available to qualified instructors from Addison Wesley.

Distributed Operating Systems

Distributed Operating Systems

The ODP standards, and this text, assume a model where distributed applications are running in multiple processes in multiple computers linked by communications. The application programmer will be supported by a programming environment and run-time system that will make many aspects of distribution in the system transparent. For instance the programmer may not have to worry about where the parts of the application are running, this can all be taken care of, if required; this is called location transparency.

There is another approach to supporting applications in a distributed system, that is by using a distributed operating system. On every computer system with an operating system the O/S provides an interface which the programs use to obtain services, such as input and output.

In a distributed operating system this interface is enhanced so that a program may be run on any computer in the distributed system and access data on any other computer. The operating system provides data, execution and location transparency, often through an extended naming scheme. The advantage of a distributed operating system is that is uses an interface below that of the application program. This means the existing programming environments may be used, the programmer may use the system with little or no extra training, and in some cases existing software may be used. The disadvantage is that a number of problems are left for the programmer and user to handle, for instance concurrency; and because of the advantage above, programmers are given little support for this. Essentially, the Distributed Operating System dictates the policies of distribution for all aspects of programming. This means that the programmer is not able to use the distributed functionality in an application specific way to optimize a solution.

Another major disadvantage is that the distributed system is tied to a style of operating system interface. There are lots of different operating systems today, to meet different requirements (real or imaginary); there is no reason why future distributed systems will not need different operating system interfaces. Consequently it is not possible to build a truly heterogeneous open distributed system by building it on top of an homogeneous distributed operating system.

The ODP model provides an application interface to the distributed system. This interface is extremely simple and is concerned with aspects of distribution only. The application may still be run on any local operating system that is appropriate.

The ODP model does include the use of distributed operating systems, but would require any particular type of distributed operating system to interwork with other types through ODP and with also with non-distributed operating systems. The applications would see no difference. One popular implementors specification for some parts of ODP is the Common Object Request Broker Architecture. This is covered in chapter 7.

Distributed Operating Systems and Algorithms integrates into one text both the theory and implementation aspects of distributed operating systems for the first time. This innovative book provides the reader with knowledge of the important algorithms necessary for an in-depth understanding of distributed systems; at the same time it motivates the study of these algorithms by presenting a systems framework for their practical application.

The first part of the book is intended for use in an advanced course on operating systems and concentrates on parallel systems, distributed systems, real-time systems, and computer networks. The second part of the text is written for a course on distributed algorithms with a focus on algorithms for asynchronous distributed systems. While each of the two parts is self-contained, extensive cross-referencing allows the reader to emphasize either theory or implementation or to cover both elements of selected topics.

Features:

Integrates and balances coverage of the advanced aspects of operating systems with the distributed algorithms used by these systems.

Includes extensive references to commercial and experimental systems to illustrate the concepts and implementation issues.

Provides precise algorithm description and explanation of why these algorithms were developed.

Structures the coverage of algorithms around the creation of a framework for implementing a replicated server-a prototype for implementing a fault-tolerant and highly available distributed system.

Contains programming projects on such topics as sockets, RPC, threads, and implementation of distributed algorithms using these tools.
Includes an extensive annotated bibliography for each chapter, pointing the reader to recent developments.

Solutions to selected exercises, templates to programming problems, a simulator for algorithms for distributed synchronization, and teaching tips for selected topics are available to qualified instructors from Addison Wesley.

what is network operating system

A network operating system (NOS) is a piece of software that controls a network and its message (e.g. packet) traffic and queues, controls access by multiple users to network resources such as files, and provides for certain administrative functions, including security.

Note 1: A network operating system is most frequently used with local area networks and wide area networks, but could also have application to larger network systems.

Note 2: The upper 5 layers of the OSI Reference Model provide the foundation upon which many network operating systems are based.

Source: from Federal Standard 1037C

NOS was also the name of a proprietary time-sharing operating system on the CDC 60-bit 6000 and Cyber series mainframe computers; in the mid 1980s, NOS was replaced with NOS/VE on the 64-bit Cyber-180 systems.

Network Operating System (NOS) is an operating system that includes special functions for connecting computers and devices into a local-area network (LAN) or Inter-networking. Some popular NOSs for DOS and Windows systems include Novell Netware, Windows NT and 2000, Sun Solaris and IBM OS/2. The Cisco IOS (Internet Operating System) is also a Network Operating System with a focus on the Internetworking capabilities of network devices.

defination:

*Abbreviated as NOS, an operating system that includes special functions for connecting computers and devices into a local-area network (LAN). Some operating systems, such as UNIX and the Mac OS, have networking functions built in. The term network operating system, however, is generally reserved for software that enhances a basic operating system by adding networking features. Novell Netware, Artisoft's LANtastic, Microsoft Windows Server, and Windows NT are examples of an NOS.


Some of the features of Network Operating System are:

*Provide basic operating system features such as support for processors, protocols,
automatic hardware detection and support multi-processing of applications

*Security features such as authentication, authorization, logon restrictions and access control

*Provide name and directory services

*Provide file, print, web services, back-up and replication services

*Support Internetworking such as routing and WAN ports

*User management and support for logon and logoff, remote access; system management, administration and auditing tools with graphic interfaces

*Clustering capabilities;

Misconception

* A NOS is not the same as the networking tools provided by some existing OSs, Windows XP for instance. An NOS is an OS that has been specifically written to keep networks running at optimal performance.

Tuesday, July 31, 2007

Lesar Printer


Laser printer
From Wikipedia, the free encyclopedia
Jump to: navigation, search

1993 Apple LaserWriter Pro 630 laser printerA laser printer is a common type of computer printer that rapidly produces high quality text and graphics on plain paper. Like photocopiers, laser printers employ a xerographic printing process but differ from analog photocopiers in that the image is produced by the direct scanning of a laser beam across the printer's photoreceptor.

Contents [hide]
1 Overview
2 History
3 How it works
3.1 Raster Image Processing
3.2 Charging
3.3 Writing
3.4 Developing
3.5 Transferring
3.6 Fusing
3.7 Cleaning
3.8 Multiple steps occurring at once
4 Color laser printers
5 Laser printer maintenance
6 Steganographic anti-counterfeiting ("secret") marks
7 Safety hazards and precautions
7.1 Shock hazards
7.2 Toner clean-up
7.3 Ozone hazards
8 See also
9 External links




Overview

Laser printers have many significant advantages over other types of printers. Unlike impact printers, laser printer speed can vary widely, and depends on many factors, including the graphic intensity of the job being processed. The fastest models can print over 200 monochrome pages per minute (12,000 pages per hour). The fastest color laser printers can print over 100 pages per minute (6000 pages per hour). Very high-speed laser printers are used for mass mailings of personalized documents, such as credit card or utility bills, and are competing with lithography in some commercial applications.

The cost of this technology depends on a combination of factors, including inflation. Costs of paper, toner, and infrequent drum replacement, as well as the replacement of other consumables such as the fuser assembly and transfer assembly. Often printers with soft plastic drums can have a very high cost of ownership that does not become apparent until the drum requires replacement.

A duplexing printer (one that prints on both sides of the paper) can halve paper costs and reduce filing volumes. Formerly only available on high-end printers, duplexers are now common on mid-range office printers, though not all printers can accommodate a duplexing unit. Duplexing can also give a slower page-printing speed, because of the longer paper path.

In comparison with the laser printer, most inkjet and dot-matrix printers simply take an incoming stream of data and directly imprint it in a slow lurching process that may include pauses as the printer waits for more data. A laser printer is unable to work this way because such a large amount of data needs to output to the printing device in a rapid, continuous process. The printer cannot stop the mechanism precisely enough to wait until more data arrives, without creating a visible gap or misalignment of the dots on the printed page.

Instead the image data is built up and stored in a large bank of memory capable of representing every dot on the page. The requirement to store all dots in memory before printing has traditionally limited laser printers to small fixed paper sizes such as letter or A4. Most laser printers are unable to print continuous banners spanning a sheet of paper two meters long, because there is not enough memory available in the printer to store such a large image before printing begins.



History
The first laser printer was produced by Xerox when Xerox researcher Gary Starkweather modified a Xerox copier in 1971.[1] Laser printing eventually became a multibillion-dollar business for Xerox.

The first commercial implementation of a laser printer was the IBM model 3800 in 1976, used for high-volume printing of documents such as invoices and mailing labels. It is often cited as "taking up a whole room," implying that it was a primitive version of the later familiar device used with a personal computer. While large, it was designed for an entirely different purpose. Many 3800s are still in use.


Xerox 9700 laser printer (ca. 1977)The first laser printer designed for use with an individual computer was released with the Xerox Star 8010 in 1981. Although it was innovative, the Star was an expensive ($17,000) system that was only purchased by a small number of laboratories and institutions. After personal computers became more widespread, the first laser printer intended for a mass market was the HP LaserJet 8ppm, released in 1984, using a Canon engine controlled by HP software. The HP LaserJet printer was quickly followed by other laser printers from Brother Industries, IBM, and others.

Most noteworthy was the role the laser printer played in popularizing desktop publishing with the introduction of the Apple LaserWriter for the Apple Macintosh, along with Aldus PageMaker software, in 1985. With these products, users could create documents that would previously have required professional typesetting.

As with most electronic devices, the cost of laser printers has fallen markedly over the years. In 1985 the HP LaserJet sold for $2995.00 and weighed 71 pounds (32.2 kg). The Apple LaserWriter (which shipped with a more powerful processor and the Postscript page description language) weighed about 70 lb and cost almost $7000.00. (Work rules in the factory producing the Laserwriter forbade any worker lifting the printer unassisted.) Today a comparable laser printer with more memory, a higher speed and duplexing capability costs about $300.00. A bare-bones laser printer costs less than $100.00.


How it works
Main article: Xerography
There are typically seven steps involved in the laser printing process:


Raster Image Processing
Each horizontal strip of dots across the page is known as a raster. Creating the image to be printed is done by a Raster Image Processor (RIP), typically built into the laser printer. The source material may be encoded in any number of special page description languages such as Adobe PostScript (PS) or HP Printer Command Language (PCL), as well as unformatted text-only data. The RIP uses the page description language to generate a bitmap of the final page in the raster memory. Once the entire page has been rendered in raster memory, the printer is ready to begin the process of sending the rasterized stream of dots to the paper in a continuous stream.
Generating the raster image data


Charging
A corona wire (in older printers) or a primary charge roller projects an electrostatic charge onto the photoreceptor (otherwise named the photoconductor unit), a revolving photosensitive drum or belt, which is capable of holding an electrostatic charge on its surface while it is in the dark.
Appyling a negative charge to the photosensitive drum


Writing
The laser is aimed at a rotating polygonal mirror, which directs the laser beam through a system of lenses and mirrors onto the photoreceptor. The beam sweeps across the photoreceptor at an angle to make the sweep straight across the page; the cylinder continues to rotate during the sweep and the angle of sweep compensates for this motion. The stream of rasterized data held in memory turns the laser on and off to form the dots on the cylinder. Some printers switch an array of laser diodes spanning the width of the page, and they signal to both the photoreceptor and their Quartz-clocked host in time to marks on the underpassing cylinder. Lasers are used because they generate a narrow beam for great distances. The laser beam neutralizes (or reverses) the charge on the white parts, leaving a mirror image of static electricity on the photoreceptor surface to lift powdered ink.
How the bitmap is written to the photosensitive drum.


Developing
The surface with the latent image is exposed to toner, fine particles of dry plastic powder mixed with carbon black or coloring agents. The charged toner particles are given a negative charge, and are electrostatically attracted to the photoreceptor where the laser wrote the latent image. Because like charges repel, the negatively charged toner will not touch the drum where light has not removed the negative charge.

The overall darkness of the printed image is controlled by the high voltage charge applied to the supply toner. Once the charged toner has jumped the gap to the surface of the drum, the negative charge on the toner itself repels the supply toner and prevents more toner from jumping to the drum. If the voltage is low, only a thin coat of toner is needed to stop more toner from transferring. If the voltage is high, then a thin coating on the drum is too weak to stop more toner from transferring to the drum. More supply toner will continue to jump to the drum until the charges on the drum are again high enough to repel the supply toner. At the darkest settings the supply toner voltage is high enough that it will also start coating the drum where the initial unwritten drum charge is still present, and will give the entire page a dark shadow.


Transferring
The photoreceptor is pressed or rolled over paper, transferring the image. Higher-end machines use a positively charged transfer roller on the back side of the paper to pull the toner from the photoreceptor to the paper.


Fusing
The paper passes through a fuser assembly with rollers that provide heat and pressure (up to 200 Celsius), bonding the plastic powder to the paper.
In the fuser assembly one roller is usually a hollow tube and the other is a rubber backing roller. A radiant heat lamp is suspended in the center of the hollow tube, and infrared energy is projected onto the inside of the roller to uniformly heat it from the inside out. For proper bonding of the toner, the fuser roller needs to be uniformly hot.

The fuser tends to account for up to 90% of a printer's power usage. The intense heat from the fuser assembly can cause damage to the rest of the printer, so the hot fuser assembly is often surrounded by fans blowing the heat away from the rest of the equipment inside the printer. The primary power saving feature of most copiers and laser printers is to simply turn off the fuser and let it go cold. Resuming normal operation requires waiting for the fuser to return to operating temperature before printing can begin.

Some printers use a very thin flexible metal, so that the hollow roller has a low mass and can be quickly warmed to the correct temperature. This both speeds printing from a cold idle state and permits the fuser to turn off more frequently to conserve power.

Melting toner into the paper using heat and pressure.


Cleaning
When the print is complete, an electrically neutral soft plastic blade cleans any excess toner from the photoreceptor and deposits it into a waste reservoir, and a discharge lamp removes the remaining charge from the photoreceptor.

Toner may occasionally be left on the photoreceptor when unexpected events such as a paper jam occur. The toner is on the photoconductor ready to apply, but the operation failed before it could be applied. The toner must be wiped off and the process restarted.

Waste toner cannot be reused for printing because it can be contaminated with dust and paper fibers. A quality printed image requires pure, clean toner. Reusing contaminated toner can result in splotchy printed areas or poor fusing of the toner into the paper.


Multiple steps occurring at once
Once the raster image generation is complete all steps of the printing process can occur one after the other in rapid succession. This permits the use of a very small and compact unit, where the photoreceptor is charged, rotates a few degrees and is scanned, rotates a few more degrees and is developed, and so forth. The entire process can be completed before the drum completes one revolution.

Different printers implement these steps in distinct ways. Some "laser" printers actually use a linear array of light-emitting diodes to "write" the light on the drum (see LED printer). The toner is based on either wax or plastic, so that when the paper passes through the fuser assembly, the particles of toner melt. The paper may or may not be oppositely charged. The fuser can be an infrared oven, a heated pressure roller, or (on some very fast, expensive printers) a xenon flash lamp. The Warm Up process that a laser printer goes through when power is initially applied to the printer consists mainly of heating the fuser element. Many printers have a toner-conservation mode or "economode", which can be substantially more economical with fuser consumption at the price of slightly lower contrast.


Color laser printers
Color laser printers add colored toner (typically but not always cyan, yellow, and magenta -- see CMYK) in three additional steps or passes. Color adds complexity to the printing process because very slight misalignments known as registration errors can occur between printing each color, causing unintended color fringing, blurring, or light/dark streaking along the edges of colored regions.

To permit a high registration accuracy, some color laser printers use a large belt the size of a full sheet of paper to generate the image. All four layers of toner are precisely applied to the belt, and the combined layers are then applied to the paper in a single step.

Color laser printers typically require four times as much memory as a monochrone printer to print the same size document, because each of the four CMYK color separations needs to be rasterized and stored in memory before printing can begin.


Laser printer maintenance
Most consumer and small business laser printers use a toner cartridge that combines the photoreceptor (otherwise named photoconductor unit) with the supply toner and waste toner bottle and the various wiper blades. When the supply toner runs out, replacing the cartridge also automatically replaces the photoreceptor, waste toner bottle, and blades.

Some small consumer printers use a separate toner bottle that can be replaced several times separately from the photoreceptor, allowing for a much lower cost of operation. High-volume business laser printers separate all components into individual modules.

After printing about fifty thousand pages, typical maintenance is to vacuum the mechanism, and clean or replace the paper handling rollers. The rollers have a thick rubber coating, which eventually suffers wear and becomes covered with slippery paper dust. They can usually be cleaned with a damp lint-free rag and there are chemical solutions that can help restore the traction of the rubber.

After one hundred thousand pages, it is common for the fuser assembly to either wear out or need cleaning. The fuser heating rollers are often coated with an oil that prevents toner from sticking to the rollers. A small amount of the oil coating is absorbed by each piece of paper passing through the fuser, eventually requiring the oil supply to be replenished or the pressure roller assembly to be completely replaced. It is common for the fuser assembly to be left unmaintained until the toner starts sticking to the rollers, which creates a repeating ragged line on every printed page due to the rollers not being smooth anymore.

Color laser printers are typically more expensive and higher maintenance than monochrome laser printers since they contain more imaging components. Color laser printers intended for high volume use may require supplies that monochrone printers do not use, while the least expensive consumer color laser printers are expected to wear out and fail four times faster during color printing, compared to monochrome printing.[citation needed]

Due to current market incentives, the least expensive consumer color laser printers often cost less than the total value of the replacement parts inside the printer. The photoreceptor assembly for example may last 100,000 pages but may cost as much to replace as buying a new printer with new toner cartridges included.


Steganographic anti-counterfeiting ("secret") marks

Small yellow dots on white paper, generated by a color laser printer (scale: 0.1mm). Click for a larger image.Main article: Printer steganography
Many modern color laser printers mark printouts by a nearly invisible dot raster, for the purpose of identification. The dots are yellow and about 0.1 mm in size, with a raster of about 1 mm. This is purportedly the result of a deal between the US government and printer manufacturers to help track counterfeiters. [2]

The dots encode data such as printing date, time, and printer serial number in binary-coded decimal on every sheet of paper printed, which allows pieces of paper to be traced by the manufacturer to identify the place of purchase, and sometimes the buyer. Some are concerned that this is a threat to the privacy and anonymity of those who print.


Safety hazards and precautions

Shock hazards
Although modern printers include many safety interlocks and protection circuits, it is possible for a high voltage or a residual voltage to be present on the various rollers, wires, and metal contacts inside a laser printer. Care should be taken to avoid unnecessary contact with these parts to reduce the potential for electical shock.


Toner clean-up
Toner particles are designed to have electrostatic properties and can develop static-electric charges when they rub against other particles, objects, or the interiors of transport systems and vacuum hoses. Because of this and its small particle size, toner should not be vacuumed with a conventional home vacuum cleaner. Static discharge from charged toner particles can ignite dust in the vacuum cleaner bag or create a small explosion if sufficient toner is airborne. This may damage the vacuum cleaner or start a fire. In addition, toner particles are so fine that they are poorly filtered by conventional household vacuum cleaner filter bags and blow through the motor or back into the room.

Toner particles melt (or fuse) when warmed. Small toner spills can be wiped up with a cold, damp cloth.

If toner spills into the laser printer, a special type of vacuum cleaner with an electrically conductive hose and a high efficiency (HEPA) filter may be needed for effective cleaning. These are called ESD-safe (Electrostatic Discharge-safe) or toner vacuums. Similar HEPA-filter equipped vacuums should be used for clean-up of larger toner spills.

Toner is easily cleaned from most water-washable clothing. As toner is a wax or plastic powder with a low melting temperature, it must be kept cold during the cleaning process. Washing a toner stained garment in cold water is often successful. Even warm water is likely to result in permanent staining. The washing machine should be filled with cold water before adding the garment. Washing through two cycles improves the chances of success. The first may use hand wash dish detergent, with the second cycle using regular laundry detergent. Residual toner floating in the rinse water of the first cycle will remain in the garment and may cause a permanent graying. A clothes dryer or iron should not be used until it is certain that all the toner has been removed.


Ozone hazards
As a natural part of the printing process, the high voltages inside the printer can produce a corona discharge that generates a small amount of ionized oxygen and nitrogen, forming ozone and nitrogen oxides. In larger commercial printers and copiers, a carbon filter in the air exhaust stream breaks down these oxides to prevent pollution of the office environment.

However, some ozone escapes the filtering process in commercial printers, and ozone filters are not used in many smaller consumer printers. When a laser printer or copier is operated for a long period of time in a small, poorly ventilated space, these gases can build up to levels at which the odor of ozone or irritiation may be noticed. A potential for creating a health hazard is theoretically possible in extreme cases.


See also
Daisy wheel printer
Dot matrix printer
Inkjet printer
LED printer
Thermal printer
Dye-sublimation printer
Steganography

External links
Howstuffworks "How Laser Printers Work"
Is Your Printer Spying On You? (by EFF)
Detailed description, modelling and simulation of the electrophotographic print process (technical; 7.2MB)
Xerographic Color Technology (pdf), Katun (supplier of OEM-compatible imaging supplies, photoreceptors, and parts), July 1999
Laser Printer info
Retrieved from "http://en.wikipedia.org/wiki/Laser_printer"

works .........of firewall

How does a firewall work?

By WhatIs.com
22 Oct 2003 | http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci933217,00.html?offer=LGsn605


A firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks. (The term also implies the security policy that is used with the programs.) An enterprise with an intranet that allows its workers access to the wider Internet installs a firewall to prevent outsiders from accessing its own private data resources and for controlling what outside resources its own users have access to.
Basically, a firewall, working closely with a router program, examines each network packet to determine whether to forward it toward its destination. A firewall also includes or works with a proxy server that makes network requests on behalf of workstation users. A firewall is often installed in a specially designated computer separate from the rest of the network so that no incoming request can get directly at private network resources.

There are a number of firewall screening methods. A simple one is to screen requests to make sure they come from acceptable (previously identified) domain name and Internet Protocol addresses. For mobile users, firewalls allow remote access in to the private network by the use of secure logon procedures and authentication certificates.

A number of companies make firewall products. Features include logging and reporting, automatic alarms at given thresholds of attack, and a graphical user interface for controlling the firewall.

To learn even more, go back to the Crash Course on Firewalls.

Share - Digg This! Bookmark with Del.icio.us


NETWORKING RELATED LINKS

Ads by Google

Firewall Log Analyzer
F/W Log Analysis & Reporting Tool For B/W & User Activity Monitoring.
www.fwanalyzer.com

Small Business Network
Let Your SMB network do more & cost less w/ Nortel. Learn how.
www.nortel.com

Internet & Security
Internet, MPLS VPN, Firewalls, AV, Routers, Switches
www.spudweb.in

Axiomtek
Manufacturer of standard or OEM network appliance platforms
www.axiomtek.com

Find and Fix Problems
Isolate, Monitor, Report, Optimize Free Guide for Network Performance
www.Packeteer.com