Tuesday, 31 May 2016

AY Live: Gordons takes on Princess, Mo Hits, Mode 9

SEYILAW SHARES SOME OF HIS EXPERIENCE

Funny African Dancing (i'm sorry) 2015

Funny African Dancing (i'm sorry) 2015

Nuer, history of a refugee (Ethiopia)

Computer Network

A computer network or data network is a telecommunications network which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media. The best-known computer network is the Internet.
Network computer devices that originate, route and terminate the data are called network nodes.[1] Nodes can include hosts such as personal computers, phones, servers as well as networking hardware. Two such devices can be said to be networked together when one device is able to exchange information with the other device, whether or not they have a direct connection to each other.
Computer networks differ in the transmission medium used to carry their signals, the communications protocols to organize network traffic, the network's size, topology and organizational intent.
Computer networks support an enormous number of applications such as access to the World Wide Web, video, digital audio, shared use of application and storage servers, printers, and fax machines, and use of email and instant messaging applications as well as many others. In most cases, application-specific communications protocols are layered (i.e. carried as payload) over other more general communications protocols.

Properties

Computer networking may be considered a branch of electrical engineering, telecommunications, computer science, information technology or computer engineering, since it relies upon the theoretical and practical application of the related disciplines.
A computer network facilitates interpersonal communications allowing users to communicate efficiently and easily via various means: email, instant messaging, chat rooms, telephone, video telephone calls, and video conferencing. Providing access to information on shared storage devices is an important feature of many networks. A network allows sharing of files, data, and other types of information giving authorized users the ability to access information stored on other computers on the network. A network allows sharing of network and computing resources. Users may access and use resources provided by devices on the network, such as printing a document on a shared network printer. Distributed computing uses computing resources across a network to accomplish tasks. A computer network may be used by computer crackers to deploy computer viruses or computer worms on devices connected to the network, or to prevent these devices from accessing the network via a denial of service attack.

Network packet

Main article: Network packet
Computer communication links that do not support packets, such as traditional point-to-point telecommunication links, simply transmit data as a bit stream. However, most information in computer networks is carried in packets. A network packet is a formatted unit of data (a list of bits or bytes, usually a few tens of bytes to a few kilobytes long) carried by a packet-switched network.
In packet networks, the data is formatted into packets that are sent through the network to their destination. Once the packets arrive they are reassembled into their original message. With packets, the bandwidth of the transmission medium can be better shared among users than if the network were circuit switched. When one user is not sending packets, the link can be filled with packets from others users, and so the cost can be shared, with relatively little interference, provided the link isn't overused.
Packets consist of two kinds of data: control information, and user data(payload). The control information provides data the network needs to deliver the user data, for example: source and destination network addresses, error detection codes, and sequencing information. Typically, control information is found in packet headers and trailers, with payload data in between.
Often the route a packet needs to take through a network is not immediately available. In that case the packet is queued and waits until a link is free.

Network topology

Main article: Network topology
The physical layout of a network is usually less important than the topology that connects network nodes. Most diagrams that describe a physical network are therefore topological, rather than geographic. The symbols on these diagrams usually denote network links and network nodes.

Network links

The transmission media (often referred to in the literature as the physical media) used to link devices to form a computer network include electrical cable (Ethernet, HomePNA, power line communication, G.hn), optical fiber (fiber-optic communication), and radio waves (wireless networking). In the OSI model, these are defined at layers 1 and 2 — the physical layer and the data link layer.
A widely adopted family of transmission media used in local area network (LAN) technology is collectively known as Ethernet. The media and protocol standards that enable communication between networked devices over Ethernet are defined by IEEE 802.3. Ethernet transmits data over both copper and fiber cables. Wireless LAN standards (e.g. those defined by IEEE 802.11) use radio waves, or others use infrared signals as a transmission medium. Power line communication uses a building's power cabling to transmit data.

Wired technologies

Fiber optic cables are used to transmit light from one computer/network node to another
The orders of the following wired technologies are, roughly, from slowest to fastest transmission speed.
  • Coaxial cable is widely used for cable television systems, office buildings, and other work-sites for local area networks. The cables consist of copper or aluminum wire surrounded by an insulating layer (typically a flexible material with a high dielectric constant), which itself is surrounded by a conductive layer. The insulation helps minimize interference and distortion. Transmission speed ranges from 200 million bits per second to more than 500 million bits per second.
  • ITU-T G.hn technology uses existing home wiring (coaxial cable, phone lines and power lines) to create a high-speed (up to 1 Gigabit/s) local area network
  • Twisted pair wire is the most widely used medium for all telecommunication. Twisted-pair cabling consist of copper wires that are twisted into pairs. Ordinary telephone wires consist of two insulated copper wires twisted into pairs. Computer network cabling (wired Ethernet as defined by IEEE 802.3) consists of 4 pairs of copper cabling that can be utilized for both voice and data transmission. The use of two wires twisted together helps to reduce crosstalk and electromagnetic induction. The transmission speed ranges from 2 million bits per second to 10 billion bits per second. Twisted pair cabling comes in two forms: unshielded twisted pair (UTP) and shielded twisted-pair (STP). Each form comes in several category ratings, designed for use in various scenarios.
2007 map showing submarine optical fiber telecommunication cables around the world.
  • An optical fiber is a glass fiber. It carries pulses of light that represent data. Some advantages of optical fibers over metal wires are very low transmission loss and immunity from electrical interference. Optical fibers can simultaneously carry multiple wavelengths of light, which greatly increases the rate that data can be sent, and helps enable data rates of up to trillions of bits per second. Optic fibers can be used for long runs of cable carrying very high data rates, and are used for undersea cables to interconnect continents.
Price is a main factor distinguishing wired- and wireless-technology options in a business. Wireless options command a price premium that can make purchasing wired computers, printers and other devices a financial benefit. Before making the decision to purchase hard-wired technology products, a review of the restrictions and limitations of the selections is necessary. Business and employee needs may override any cost considerations.[6]

Wireless technologies

Computers are very often connected to networks using wireless links
Main article: Wireless network
  • Terrestrial microwave – Terrestrial microwave communication uses Earth-based transmitters and receivers resembling satellite dishes. Terrestrial microwaves are in the low-gigahertz range, which limits all communications to line-of-sight. Relay stations are spaced approximately 48 km (30 mi) apart.
  • Communications satellites – Satellites communicate via microwave radio waves, which are not deflected by the Earth's atmosphere. The satellites are stationed in space, typically in geosynchronous orbit 35,400 km (22,000 mi) above the equator. These Earth-orbiting systems are capable of receiving and relaying voice, data, and TV signals.
  • Cellular and PCS systems use several radio communications technologies. The systems divide the region covered into multiple geographic areas. Each area has a low-power transmitter or radio relay antenna device to relay calls from one area to the next area.
  • Radio and spread spectrum technologies – Wireless local area networks use a high-frequency radio technology similar to digital cellular and a low-frequency radio technology. Wireless LANs use spread spectrum technology to enable communication between multiple devices in a limited area. IEEE 802.11 defines a common flavor of open-standards wireless radio-wave technology known as Wifi.
  • Free-space optical communication uses visible or invisible light for communications. In most cases, line-of-sight propagation is used, which limits the physical positioning of communicating devices.

Exotic technologies

There have been various attempts at transporting data over exotic media:
Both cases have a large round-trip delay time, which gives slow two-way communication, but doesn't prevent sending large amounts of information.

Network nodes

Main article: Node (networking)
Apart from any physical transmission medium there may be, networks comprise additional basic system building blocks, such as network interface controller (NICs), repeaters, hubs, bridges, switches, routers, modems, and firewalls.

Network interfaces

An ATM network interface in the form of an accessory card. A lot of network interfaces are built-in.
A network interface controller (NIC) is computer hardware that provides a computer with the ability to access the transmission media, and has the ability to process low-level network information. For example, the NIC may have a connector for accepting a cable, or an aerial for wireless transmission and reception, and the associated circuitry.
The NIC responds to traffic addressed to a network address for either the NIC or the computer as a whole.
In Ethernet networks, each network interface controller has a unique Media Access Control (MAC) address—usually stored in the controller's permanent memory. To avoid address conflicts between network devices, the Institute of Electrical and Electronics Engineers (IEEE) maintains and administers MAC address uniqueness. The size of an Ethernet MAC address is six octets. The three most significant octets are reserved to identify NIC manufacturers. These manufacturers, using only their assigned prefixes, uniquely assign the three least-significant octets of every Ethernet interface they produce.

Repeaters and hubs

A repeater is an electronic device that receives a network signal, cleans it of unnecessary noise and regenerates it. The signal is retransmitted at a higher power level, or to the other side of an obstruction, so that the signal can cover longer distances without degradation. In most twisted pair Ethernet configurations, repeaters are required for cable that runs longer than 100 meters. With fiber optics, repeaters can be tens or even hundreds of kilometers apart.
A repeater with multiple ports is known as a hub. Repeaters work on the physical layer of the OSI model. Repeaters require a small amount of time to regenerate the signal. This can cause a propagation delay that affects network performance. As a result, many network architectures limit the number of repeaters that can be used in a row, e.g., the Ethernet 5-4-3 rule.
Hubs have been mostly obsoleted by modern switches; but repeaters are used for long distance links, notably undersea cabling.

Bridges

A network bridge connects and filters traffic between two network segments at the data link layer (layer 2) of the OSI model to form a single network. This breaks the network's collision domain but maintains a unified broadcast domain. Network segmentation breaks down a large, congested network into an aggregation of smaller, more efficient networks.
Bridges come in three basic types:
  • Local bridges: Directly connect LANs
  • Remote bridges: Can be used to create a wide area network (WAN) link between LANs. Remote bridges, where the connecting link is slower than the end networks, largely have been replaced with routers.
  • Wireless bridges: Can be used to join LANs or connect remote devices to LANs.

Switches

A network switch is a device that forwards and filters OSI layer 2 datagrams (frames) between ports based on the destination MAC address in each frame.[9] A switch is distinct from a hub in that it only forwards the frames to the physical ports involved in the communication rather than all ports connected. It can be thought of as a multi-port bridge.[10] It learns to associate physical ports to MAC addresses by examining the source addresses of received frames. If an unknown destination is targeted, the switch broadcasts to all ports but the source. Switches normally have numerous ports, facilitating a star topology for devices, and cascading additional switches.
Multi-layer switches are capable of routing based on layer 3 addressing or additional logical levels. The term switch is often used loosely to include devices such as routers and bridges, as well as devices that may distribute traffic based on load or based on application content (e.g., a Web URL identifier).

Routers

A typical home or small office router showing the ADSL telephone line and Ethernet network cable connections
A router is an internetworking device that forwards packets between networks by processing the routing information included in the packet or datagram (Internet protocol information from layer 3). The routing information is often processed in conjunction with the routing table (or forwarding table). A router uses its routing table to determine where to forward packets. A destination in a routing table can include a "null" interface, also known as the "black hole" interface because data can go into it, however, no further processing is done for said data, i.e. the packets are dropped.

Modems

Modems (MOdulator-DEModulator) are used to connect network nodes via wire not originally designed for digital network traffic, or for wireless. To do this one or more carrier signals are modulated by the digital signal to produce an analog signal that can be tailored to give the required properties for transmission. Modems are commonly used for telephone lines, using a Digital Subscriber Line technology.

Firewalls

A firewall is a network device for controlling network security and access rules. Firewalls are typically configured to reject access requests from unrecognized sources while allowing actions from recognized ones. The vital role firewalls play in network security grows in parallel with the constant increase in cyber attacks.

Network structure

Network topology is the layout or organizational hierarchy of interconnected nodes of a computer network. Different network topologies can affect throughput, but reliability is often more critical. With many technologies, such as bus networks, a single failure can cause the network to fail entirely. In general the more interconnections there are, the more robust the network is; but the more expensive it is to install.

Common layouts

Common network topologies
Common layouts are:
  • A bus network: all nodes are connected to a common medium along this medium. This was the layout used in the original Ethernet, called 10BASE5 and 10BASE2.
  • A star network: all nodes are connected to a special central node. This is the typical layout found in a Wireless LAN, where each wireless client connects to the central Wireless access point.
  • A ring network: each node is connected to its left and right neighbour node, such that all nodes are connected and that each node can reach each other node by traversing nodes left- or rightwards. The Fiber Distributed Data Interface (FDDI) made use of such a topology.
  • A mesh network: each node is connected to an arbitrary number of neighbours in such a way that there is at least one traversal from any node to any other.
  • A fully connected network: each node is connected to every other node in the network.
  • A tree network: nodes are arranged hierarchically.
Note that the physical layout of the nodes in a network may not necessarily reflect the network topology. As an example, with FDDI, the network topology is a ring (actually two counter-rotating rings), but the physical topology is often a star, because all neighboring connections can be routed via a central physical location.

Overlay network

A sample overlay network
An overlay network is a virtual computer network that is built on top of another network. Nodes in the overlay network are connected by virtual or logical links. Each link corresponds to a path, perhaps through many physical links, in the underlying network. The topology of the overlay network may (and often does) differ from that of the underlying one. For example, many peer-to-peer networks are overlay networks. They are organized as nodes of a virtual system of links that run on top of the Internet.[11]
Overlay networks have been around since the invention of networking when computer systems were connected over telephone lines using modems, before any data network existed.
The most striking example of an overlay network is the Internet itself. The Internet itself was initially built as an overlay on the telephone network.[11] Even today, each Internet node can communicate with virtually any other through an underlying mesh of sub-networks of wildly different topologies and technologies. Address resolution and routing are the means that allow mapping of a fully connected IP overlay network to its underlying network.
Another example of an overlay network is a distributed hash table, which maps keys to nodes in the network. In this case, the underlying network is an IP network, and the overlay network is a table (actually a map) indexed by keys.
Overlay networks have also been proposed as a way to improve Internet routing, such as through quality of service guarantees to achieve higher-quality streaming media. Previous proposals such as IntServ, DiffServ, and IP Multicast have not seen wide acceptance largely because they require modification of all routers in the network.[citation needed] On the other hand, an overlay network can be incrementally deployed on end-hosts running the overlay protocol software, without cooperation from Internet service providers. The overlay network has no control over how packets are routed in the underlying network between two overlay nodes, but it can control, for example, the sequence of overlay nodes that a message traverses before it reaches its destination.
For example, Akamai Technologies manages an overlay network that provides reliable, efficient content delivery (a kind of multicast). Academic research includes end system multicast,[12] resilient routing and quality of service studies, among others.

For further information on Communication protocols, the IEEE802 and others click on the link below
https://en.wikipedia.org/wiki/Computer_network
https://www.youtube.com/watch?v=7q-UW9XT4BM&list=PLV7zFBc6xjSA72uKWnyDAGDYyp2BkoRLC&index=4

do well to follow the link...

Computer Network Tutorial

what modern girls really look for in guys

Love and family are the greatest values of our life. People seek each other, and sometimes it takes much time to find the one that fits you perfectly. We asked our gorgeous friends from Romance Compass – online ukrainian dating site about what kind of features they look for in men. Clearly, you should not adapt yourself to this list, but it might help you become more attractive to women.1. Maturity. If a girl seeks a long-term relationship, she is probably interested in a certain type of guys. Young men with boyish attitudes are good when she is 18. Later on, a woman needs something more than amusement and permanent entertainment. She needs the one who would be able to overcome obstacles and make important decisions. And, of course, they look for mature men – not older, but developed. Age does not always determine maturity, but experience does.

2. Decisiveness. One of the most common mannish features is resoluteness. You know exactly how things go and can resolve any possible problem. In fact, women are also assertive. They are able to focus their attention not worse than men. However, it is stereotypically a man’s agenda to overcome difficulties. Women prefer to be assistants and supporters. You should also have an idea about your future – it makes a girl believe that you will be devoted to her and your family.

3. Intelligence. No one dares to argue about men’s brain being their sexiest organ of all. Nonetheless, not all the men train this muscle. Some of us suggest that physical strength is the only important thing about a real man. Women look for the one that would be able to keep the conversation going; the one who make them smile with witty commentaries; the one who would explain something if needed.

4. Appearance. Even though men should not be overly obsessed with their looks (nor should women be), we should somehow maintain a good appearance. We should take care of our haircuts and facial hair, wear reserved yet good-looking suits and clothes, clean our boots and stick to regular hygiene procedures. The way you look clarifies a lot about your personality. Certainly, a family-oriented girl looks for the one with a great genome – to give birth to beautiful and healthy children!

5. Upbringing. Nice manners and loyalty are more likely to be attractive than stereotypical manliness. You should be able to communicate with people in a respective manner, even if they appear to be hierarchically below you. Because girls know – the way you communicate with other people is the same as the way you will communicate with them after marriage. Don’t be a douche.

6. Career. No, we are not talking about your flourishing financial state. Modern girls are strongly affected by feministic movements, so most of them suggest providing themselves is a great idea. However, your developed career and a remarkable job title are a sign of both confidence and assertiveness. In addition, having a job is rather a necessity in the modern world, no matter if you work by yourself or in the office.

 Credit:seriously maybewhat modern girls really look for in men


Davido, Danagog & Friends Having Fun In A Private Yacht In Dubai

Phyno - Fada Fada [Official Video] ft. Olamide

Davido and Shizzi composed a hit song with Trey Songz ( VIDEO )



here Davido make music..... wow

Davido and Shizzi composed a hit song with Trey Songz ( VIDEO )

Davido, Wizkid, Neyo, Akon & May D Having Fun Together In Congo Brazzavi...

Lil Kesh ft Olamide - who you Epp? (freestyle)

Sunday, 29 May 2016

kaloire's tale

Few days ago......
   ..... Thinking back to when we met,it was magical,it felt like this fairytale of love where the prince sweeps the princess off her feet.
    Oh he was calm,gentle,and crazy charming,felt like bliss. He was warm and caring and he listened,he would listen to me talk for hours and his eyes would sparkle with love. He knew the right thing to say and how yummy treats placed smiles on my face,he handled me like an egg and forever and always where the words we always used.
     I fell in love with how calm he could handle things and all his choice of words, I fell in love with how fragile he held my heart and how strongly he back up all my decisions, I fell in love with how irresistible he was to me listening to  my every word and plea, I fell in love with the smile that lit his face when he looked at me
      WOW we were bounded stronger than ROMEO and JULIET,our love was sweeter than VALENTINO and JULIA, hmm you would think it play but matters of the heart are not taken as a joke. His love was without withdrawal, his love with no denial, he held me never to let go, he would say yes and never say no. I saw potential and all I saw was ambition. Hmm it was him alright and my heart couldn't deny that. LOVE is something magical and trust me we had magic, glittering all over.

                  -- kaloire

Friday, 27 May 2016

STREET KOREDE BELLO





korede Bello takes to the street...
Scotts turned a year older
Khloe kardashian and kourtney's look to scott,'s birthday party,by the way it wasn't a costume party but they look good.


Hilarious kourtney kardashian refers her boyfriend of three kids Scott as her baby daddy,weird but true. Usually we say men are scared of commitment. LOL see a picture after the cut she sent it via instagran. Cute

I GO DYE & KOREDE BELLO IN GOD WIN

SEYI LAW EXPLAINS HIS TERRIBLE PASTS



Know some deep thing of Seyi Law's history

Seyi Law's Hilarious Moments at Kiss Daniel's Album Launch Concert



Hillarious

AKPORORO CHASED OFF STAGE @ KISS DANIEL LAUNCH


Akpororo stroked Kiss Daniel then he was chased off

TIMAYA & Friend Dancing In Front Of His Mansion In Lagos -- ( VIDEO)

TIMAYA ESCAPED DEATH

CHECK OUT P-SQUARE N200MILLION CARS ON AUTO XPAT

MEET A NIGERIAN MAN THAT OWN 11 ROLLS-ROYCE

 Beyonce stepped out in a white jacket,blouse and yellow canary pants paying tribute to her latest controversial album lemonade that threw quite a shade at her husband Jzay of eight years now,lady went out in style in a vibrant outfit as a reminder that the two have had more than a few cares as of late, but we sisters stick together so a thumbs up to her she looks dashing.    
lady Bey throws shade to jay-z-s-face-in-a-fiercely-fashionable way


According to reports reaching us, Mavins First Lady, Tiwa Savage, might be leaving the label owned by ace music producer, Don Jazzy,soon.

The ‘Eminado’ crooners, are reportedly not on good terms anymore, following the way her marital issues was carried and dissected by the media. Tiwa, is said to be the one bankrolling most of her recent projects.

Tiwa, joined Mavins back in 2012 and has released two album with R.E.D,which was released late 2015 still enjoying massive reception from all her fans across the globe.

Both parties are yet to react to the recent rumor.
First lady if mavins record set to leave
     world most important passports                                                     
According to statistics shared by the World Economic Forum this morning, these are the countries with the world's most powerful passports. Sadly, Nigeria's passport is not included.

What a pity

What a shameful affair,a young man was seen well clad in a youth corp uniform sleeping on the bridge few meters away from kubwa garage,not to make matters worst when weakened the horrifying story told could exhaust not a few pages. We really need to come and interven on the behalf of Nigerian corpers.

            





President Buhari's beautiful daughter, Zahra, pictured looking elegant and classy in a Jacquard dress. And check out her Manolo Blahnik shoes...Photo Credit: Instagram - lerougebyamma


Metuh who is believed to be currently sick, has told the government he is ready to return the money, but the EFCC allegedly rejected the offer.

kaloire's tale

  Sitting on my bed that night I realised  one thing,I'd  lost control of me, its like time had flown so fast that being me was no longer an option. My yes had become his no and my no his yes.
      My emotions had taken control and I was nothing but a joke thereafter. WOW where had smart old me run off to,Charles gave me this wonderful feeling and I felt we could take on the world together but then the clock
had changed its hands and all he could see was him. My heart was beating out of my chest and my head felt like exploding,my blood was all hot but my feet were cold stiff. Where did I go wrong or had I just turn to a puppet being used by my master's mind. Charles glaring words still rang in my ears talking of my incompetence at being faithful and how bad I was at being truthful.
    He yelled it out loud that he did it all and I was ungrateful,hmm like what the HECK where did all the promises of love run off to,all the sweet talk s of the future felt like mist,all I could hear was his harsh tones and my beating heart.
                
                                                       



                                                                                                                                                   _ kaloire

Wednesday, 25 May 2016

Kaloire's Tale

My INTRODUCTION:
 
      Have you ever been in a situation whereby things go wrong and you freak out and then things go alright and you feel worst. It just feels like an uncertainty of if its going all wrong for this reasons or alright for the wrong reasons. You feel he's doing it all wrong; you feeling all choked up and confused and its like the earth should open and swallow you up. 
     At a moment you start to think "probably i'm just over-reacting" and just at that point of dilemma, he comes around and he's all over you like nothing had actually happened. For a slight moment of doubt, it does feel right but then questions of 'how' and 'why' comes into place; minds' getting all jumbled up and emotions sways you away. 
You supposedly feel alright but you ask yourself "am i being used, does he even care for my feelings, my emotions, does he consider what i think of things or is this just about an insane battle of being right at all cost, or about getting it alright in the wrong way? So many questions left unanswered...

- Kaloire

Tuesday, 24 May 2016

TREMz Network: Akpororo and the police

TREMz Network: Akpororo and the police - 

http://www.youtu.be/JVmT6_8Z4Bw?t=3s

Akpororo and the police

see as Akpororo got into trouble with the police (click the link below)
https://www.youtube.com/watch?v=JVmT6_8Z4Bw&feature=youtu.be

Kaloire's Tale

PREFACE:

It's ALL ABOUT YOU

     Looking back at what life has thrown to your face, makes one realize that shit happens and trust me it happens to anybody!.
     When i look back to happenings in my life, JOY, SADNESS, TEARS and FEARS, LONELINESS and 'BLANKNESS', i realize that life it self has put me in a stand still; it has brought difficulties and anguish but truthfully, it's ALL ABOUT YOU - me, because without me, life itself would have been on a standstill; without me to face the difficulties, to shed the tears, to face the fears. without you dearie, life would have been full of shit.
     At first i will beat myself blue, trying to make up my mind that i would do better, face life in better ways, do things in the way life wants it, but all round it bounced back to me that without all of those mistakes of mine there would be no big juicy interesting story abut life; it would have been just this big book filled with blank pages.
     So dearie, enjoy life to the full cause it's ALL ABOUT YOU.

the it's ALL ABOUT YOU series [look out for the full writeup coming out soon] #tremznetwork #kaloiretale

- Kaloire