https://en.wikipedia.org/w/api.php?action=feedcontributions&feedformat=atom&user=PPrakash Wikipedia - User contributions [en] 2025-06-28T19:51:49Z User contributions MediaWiki 1.45.0-wmf.7 https://en.wikipedia.org/w/index.php?title=Wikipedia:Changing_username/Simple&diff=323077395 Wikipedia:Changing username/Simple 2009-10-31T10:04:13Z <p>PPrakash: </p> <hr /> <div>__NOINDEX__<br /> {{/Front matter}}<br /> <br /> == Current requests ==<br /> &lt;!-- New requests belong at the BOTTOM of the page --&gt;<br /> <br /> === Smithvoice → Robertsmithburbank ===<br /> {{renameuser2|1=Smithvoice<br /> |2=Robertsmithburbank<br /> }}<br /> * Reason: Reason for requested renaming. [[User:Smithvoice|Smithvoice]] ([[User talk:Smithvoice|talk]]) 19:12, 22 October 2009 (UTC)<br /> *{{CHU|irl}} Additionally, could you provide a reason for this request? [[User:Katerenka|&lt;span style=&quot;font-family:Tahoma;color:deeppink&quot;&gt;–Katerenka&lt;/span&gt;]] &lt;sup&gt;[[user talk:Katerenka|'''☆''']]&lt;/sup&gt; 21:46, 22 October 2009 (UTC)<br /> <br /> === Ganaahn → G.A. ===<br /> {{renameuser2|1=Ganaahn<br /> |2=G.A.}}<br /> *Reason: Reason for requested rename. [[User:Ganaahn|Ganaahn]] ([[User talk:Ganaahn|talk]]) 19:58, 23 October 2009 (UTC)}}<br /> *{{CHU|moved}} [[User:Katerenka|&lt;span style=&quot;font-family:Tahoma;color:deeppink&quot;&gt;–Katerenka&lt;/span&gt;]] &lt;sup&gt;[[user talk:Katerenka|'''☆''']]&lt;/sup&gt; 20:58, 23 October 2009 (UTC)<br /> **{{Cratnote}}1)Please provide a reason and 2) there is a user on ltwiki which may have a higher claim to the SUL for &quot;G.A.&quot;. -- [[User:Avraham|Avi]] ([[User talk:Avraham|talk]]) 21:08, 23 October 2009 (UTC)<br /> <br /> === Hutchdog → NEW ===<br /> {{renameuser2|1=Hutchdog<br /> |2=NEW<br /> }}<br /> * Reason: I dont like my old name [[User:Hutchdog|Hutchdog]] ([[User talk:Hutchdog|talk]]) 03:06, 24 October 2009 (UTC)<br /> *{{crat note}} Please provide a new username. '''[[User:MBisanz|&lt;span style='color: #FFFF00;background-color: #0000FF;'&gt;MBisanz&lt;/span&gt;]]''' &lt;sup&gt;[[User talk:MBisanz|&lt;span style='color: #FFA500;'&gt;talk&lt;/span&gt;]]&lt;/sup&gt; 03:07, 24 October 2009 (UTC)<br /> <br /> === NMAguide → Tameriverjump ===<br /> {{renameuser2|1=NMAguide<br /> |2=Tameriverjump<br /> }}<br /> * Reason: Avoid further blocking. [[User:NMAguide|NMAguide]] ([[User talk:NMAguide|talk]]) 22:29, 27 October 2009 (UTC)<br /> :{{clerknote}} Can we have your assurance that your account will no longer be used for spam/promotions purposes? A new username is little better if you will still use it to spam. &lt;font style=&quot;font-family:Monotype Corsiva&quot;&gt;[[User:Intelligentsium/Sandbox|&lt;span style=&quot;color:#013220&quot;&gt;Intelligent&lt;/span&gt;]]'''[[User_talk:Intelligentsium|&lt;span style=&quot;color:Black&quot;&gt;sium&lt;/span&gt;]]'''&lt;/font&gt; 23:08, 27 October 2009 (UTC)<br /> <br /> === Breath of the Dying → Banned4lyfe ===<br /> {{renameuser2|1=Breath of the Dying<br /> |2=banned4lyfe<br /> }}<br /> * Reason: I don't like my current name. [[User:Breath of the Dying|Breath of the Dying]] ([[User talk:Breath of the Dying|talk]]) 00:15, 28 October 2009 (UTC)<br /> :{{cratnote}} I'd like to know whether my peers think the false implication of the target username could be problematic (could be confusing in edit histories, and so on). Any other bureaucrat should feel free to perform the rename without further discussion, though. —&lt;strong&gt;[[User:Anonymous Dissident|&lt;span style=&quot;font-family:Script MT Bold;color:DarkRed&quot;&gt;Anonymous Dissident&lt;/span&gt;]]&lt;/strong&gt;[[User_talk:Anonymous Dissident|&lt;sup&gt;&lt;span style=&quot;font-family:Verdana;color:Gray&quot;&gt;Talk&lt;/span&gt;&lt;/sup&gt;]] 10:21, 28 October 2009 (UTC)<br /> :{{cratnote}} I tend to agree. No need to create a confusing and potentially problematic name when there are trillions of other names that could be chosen, particularly as the request is simply a case of not liking the current name. [[User:The Rambling Man|The Rambling Man]] ([[User talk:The Rambling Man|talk]]) 17:51, 29 October 2009 (UTC)<br /> :{{notdone}} superseded by another request. [[User:The Rambling Man|The Rambling Man]] ([[User talk:The Rambling Man|talk]]) 01:26, 31 October 2009 (UTC)<br /> <br /> === CURRENT → NEW ===<br /> {{renameuser2|1=CURRENT<br /> |2=NEW<br /> }}<br /> * Reason: Reason for requested renaming. [[User:CtotheRich|CtotheRich]] ([[User talk:CtotheRich|talk]]) 15:11, 28 October 2009 (UTC)<br /> :{{cratnote}} Are you wanting to have your name changed to &quot;C to the Rich&quot;?[http://en.wikipedia.org/w/index.php?title=Wikipedia%3AChanging_username&amp;action=historysubmit&amp;diff=322546780&amp;oldid=322533406] Because you didn't complete the template properly, it's hard to gauge your request. [[User:EVula|EVula]] &lt;span style=&quot;color: #999;&quot;&gt;// [[User talk:EVula|talk]] // [[User:EVula/admin|&lt;span style=&quot;color: #366;&quot;&gt;&amp;#9775;&lt;/span&gt;]] //&lt;/span&gt; 15:47, 28 October 2009 (UTC)<br /> :{{clerknote}} Please provide a username to request a renaming. Sorry. --[[User:7107delicious|One moment, Reciever]] | [[User talk:7107delicious|Thank you for your instructions.]] 04:52, 29 October 2009 (UTC)<br /> <br /> === Jobey → KFCsonOFsanders ===<br /> {{renameuser2|1=Jobey<br /> |2=KFCsonOFsanders<br /> }}<br /> * Reason: Not to use my real name. [[User:Jobey|Jobey]] ([[User talk:Jobey|talk]]) 07:49, 29 October 2009 (UTC)<br /> <br /> *{{clerknote}} Please use another name that does not contain the word &quot;KFC&quot;, as it constitutes a real-life company name, which is violating our username policy. Sorry.--[[User:7107delicious|One moment, Reciever]] | [[User talk:7107delicious|Thank you for your instructions.]] 14:05, 29 October 2009 (UTC)<br /> **{{clerknote}} I don't see this as a problem really... KFC might be a company name... but the name overall is ok, imho. &lt;/big&gt;&lt;strong&gt;[[user:Pmlinediter|&lt;font style=&quot;color:Purple&quot;&gt;'''Pmlineditor'''&lt;/font&gt;]]&lt;/strong&gt;&amp;nbsp;&lt;big&gt;&lt;big&gt;&lt;big&gt;[[user talk:Pmlinediter|&lt;font style=&quot;color:#50C878&quot;&gt;'''∞'''&lt;/font&gt;]]&lt;/big&gt;&lt;/big&gt;&lt;/big&gt; 16:36, 29 October 2009 (UTC)<br /> **{{cratnote}} I'm not comfortable with this, it has clear connotations of KFC and the Colonel. I would decline, but if another 'crat believe I'm being hypersensitive then go for it, I won't grumble. Too much. [[User:The Rambling Man|The Rambling Man]] ([[User talk:The Rambling Man|talk]]) 17:50, 29 October 2009 (UTC)<br /> *{{clerknote}} I agree with the inappropriateness. For the corporate reference, but also because it may be a reference to the serial killer [[David Berkowitz|David Berkowitz/Son of Sam]]. [[User:IronGargoyle|IronGargoyle]] ([[User talk:IronGargoyle|talk]]) 14:48, 30 October 2009 (UTC)<br /> <br /> === Shadyaftrmathgunit → Wikifan2009 ===<br /> {{renameuser2|1=Shadyaftrmathgunit<br /> |2=Wikifan2009<br /> }}<br /> * Reason: Name too long and privacy concerns. [[User:Shadyaftrmathgunit|Shadyaftrmathgunit]] ([[User talk:Shadyaftrmathgunit|talk]]) 13:18, 29 October 2009 (UTC)<br /> {{clerknote}} Are you sure of this? Looks to me that it is violating our username policy.--[[User:7107delicious|One moment, Reciever]] | [[User talk:7107delicious|Thank you for your instructions.]] 14:06, 29 October 2009 (UTC)<br /> ::{{CHU|usurp|Wikifan2009}} &lt;font style=&quot;font-family:Monotype Corsiva&quot;&gt;[[User:Intelligentsium/Sandbox|&lt;span style=&quot;color:#013220&quot;&gt;Intelligent&lt;/span&gt;]]'''[[User_talk:Intelligentsium|&lt;span style=&quot;color:Black&quot;&gt;sium&lt;/span&gt;]]'''&lt;/font&gt; 15:27, 29 October 2009 (UTC)<br /> <br /> === Keithf2008 → Kei_Jo ===<br /> {{renameuser2|1=Keithf2008<br /> |2=Kei_Jo<br /> }}<br /> * Reason: I wish to change my username, as Kei_Jo is what I most use for other sites/social networks and I wish to have them all in sync. [[User:Keithf2008|Kei_Jo (aka Keithf2008)]] ([[User_talk:Keithf2008|Talk to me, baby! :P]]) 00:49, 30 October 2009 (UTC)<br /> :{{cratnote}} Technical restrictions prevent the use of underscores in usernames. Is this a problem? —&lt;strong&gt;[[User:Anonymous Dissident|&lt;span style=&quot;font-family:Script MT Bold;color:DarkRed&quot;&gt;Anonymous Dissident&lt;/span&gt;]]&lt;/strong&gt;[[User_talk:Anonymous Dissident|&lt;sup&gt;&lt;span style=&quot;font-family:Verdana;color:Gray&quot;&gt;Talk&lt;/span&gt;&lt;/sup&gt;]] 07:23, 30 October 2009 (UTC)<br /> : Can you change it to &quot;Kei Jo&quot; if that's possible. --[[User:Keithf2008|Keithf2008]] ([[User talk:Keithf2008|talk]]) 23:29, 30 October 2009 (UTC)<br /> <br /> === Aeiou81 → H1254 ===<br /> {{renameuser2|1=aeiou81<br /> |2=h1254<br /> }}<br /> * Reason: I am exercising my right to vanish Aeiou81 17:00, 30 October 2009 (UTC) &lt;small&gt;&lt;span class=&quot;autosigned&quot;&gt;—Preceding [[Wikipedia:Signatures|unsigned]] comment added by [[User:Aeiou81|Aeiou81]] ([[User talk:Aeiou81|talk]] • [[Special:Contributions/Aeiou81|contribs]]) &lt;/span&gt;&lt;/small&gt;&lt;!-- Template:Unsigned --&gt; &lt;!--Autosigned by SineBot--&gt;<br /> :{{done}} [[User:The Rambling Man|The Rambling Man]] ([[User talk:The Rambling Man|talk]]) 01:53, 31 October 2009 (UTC)<br /> <br /> === Breath of the Dying → Najor Melson ===<br /> {{renameuser2|1=Breath of the Dying<br /> |2=Najor Melson<br /> }}<br /> * Reason: I really wish to change me name. Thanks [[User:Breath of the Dying|Breath of the Dying]] ([[User talk:Breath of the Dying|talk]]) 19:59, 30 October 2009 (UTC)<br /> :{{done}} Please, no further requests. [[User:The Rambling Man|The Rambling Man]] ([[User talk:The Rambling Man|talk]]) 01:54, 31 October 2009 (UTC)<br /> <br /> === PixelInkstudios → Viktoriya ===<br /> {{renameuser2|1=PixelInkstudios<br /> |2=Viktoriya<br /> }}<br /> *Reason: wrong paste. [[User:Pixelinkstudios|Pixelinkstudios]] ([[User talk:Pixelinkstudios|talk]]) 20:47, 30 October 2009 (UTC)<br /> :{{clerk-note}} Fixed format. Original post [http://en.wikipedia.org/w/index.php?title=Wikipedia:Changing_username&amp;diff=322986706&amp;oldid=322979276 here]. [[User:Useight|Useight]] ([[User talk:Useight|talk]]) 21:11, 30 October 2009 (UTC)<br /> :{{cratnote}} Did I miss something? The account has no edits and (seemingly) no need for privacy? Register a new account. [[User:The Rambling Man|The Rambling Man]] ([[User talk:The Rambling Man|talk]]) 01:55, 31 October 2009 (UTC)<br /> <br /> === Rdonahe → Dim bulb ===<br /> {{renameuser2|1=Rdonahe<br /> |2=Dim bulb<br /> }}<br /> * Reason: Didn't read the privacy guidelines.<br /> [[User:Rdonahe|Rdonahe]] ([[User talk:Rdonahe|talk]]) 21:39, 30 October 2009 (UTC)<br /> :{{done}} good luck. [[User:The Rambling Man|The Rambling Man]] ([[User talk:The Rambling Man|talk]]) 01:56, 31 October 2009 (UTC)<br /> <br /> === Esotericargot → EsotericArgot ===<br /> {{renameuser2|1=Esotericargot<br /> |2=EsotericArgot<br /> }}<br /> * Reason: If I can't have an all lowercase username, I want camel case. [[User:Esotericargot|Esotericargot]] ([[User talk:Esotericargot|talk]]) 23:57, 30 October 2009 (UTC)<br /> :{{done}} [[User:The Rambling Man|The Rambling Man]] ([[User talk:The Rambling Man|talk]]) 01:56, 31 October 2009 (UTC)<br /> <br /> === Javier Sama → Wi~Fi Digital Press ===<br /> {{renameuser2|1=Javier Sama<br /> |2=Wi~Fi Digital Press<br /> }}<br /> * Reason: To create a page with the name of my brand company. [[User:Javier Sama|Javier Sama]] ([[User talk:Javier Sama|talk]]) 00:52, 31 October 2009 (UTC)<br /> :{{notdone}} Read [[WP:COI]] and understand we're not for free advertising. [[User:The Rambling Man|The Rambling Man]] ([[User talk:The Rambling Man|talk]]) 01:57, 31 October 2009 (UTC)<br /> <br /> === Stefankiss → Kisss ===<br /> {{renameuser2|1=Stefankiss<br /> |2=Kisss<br /> }}<br /> * Reason: I don't want my full name as my username [[User:Stefankiss|Stefankiss]] ([[User talk:Stefankiss|talk]]) 01:39, 31 October 2009 (UTC)<br /> <br /> === Sahanx → Ssx232 ===<br /> {{renameuser2|1=Sahanx<br /> |2=ssx232<br /> }}<br /> * Reason: Current username contains my real first name [[User:Sahanx|sahan]][[User:Sahanx/Esperanza|&lt;font color=&quot;green&quot;&gt;x&lt;/font&gt;]] 02:50, 31 October 2009 (UTC)<br /> <br /> === Nvineeth → TheMandarin ===<br /> {{renameuser2|1=Nvineeth|2=TheMandarin}}<br /> * Reason: Prefer this username, also minor privacy concerns. [[User:Nvineeth|Nvineeth]] ([[User talk:Nvineeth|talk]]) 05:28, 31 October 2009 (UTC)<br /> * Question before changing username: Is there any other way, from which I can change the name of all accounts of my Unified Login? If yes, pls let me. If not, go ahead with the user name change and I will do the same on respective wikis. --[[User:Nvineeth|Nvineeth]] ([[User talk:Nvineeth|talk]]) 05:39, 31 October 2009 (UTC)<br /> <br /> === Itzmitit → PPrakash ===<br /> {{renameuser2|1=Itzmitit<br /> |2=PPrakash<br /> }}<br /> * Reason: My previous ID uses my college name &amp; I want to change it to have my own first name with initial. [[User:Itzmitit|itzmitit]] ([[User talk:Itzmitit|talk]]) 10:04, 31 October 2009 (UTC)</div> PPrakash https://en.wikipedia.org/w/index.php?title=Lehenga-style_sari&diff=323068291 Lehenga-style sari 2009-10-31T07:56:17Z <p>PPrakash: I have reviewed the changes hence removing the unreviewed tag from the article.</p> <hr /> <div>[[Image:Lehenga_style_saree.jpg|thumb|200px|alt=&quot;Lehenga Style Saree&quot;|&quot;Lady in a Lehanga Style Saree&quot;]]<br /> <br /> '''Lehenga style Saree''' is a new trend of Saree introduced in [[India]]. This is an aesthetic blend of the traditional [[Saree]] and a Lehenga choli. Lehenga style saree is normally 4.5 meters to 5.5 meters long. Here unlike a sari one doesn't have to form pleats but simply 'tuck and drape'.&lt;br/&gt;&lt;br/&gt;<br /> As that of a traditional saree, the lehenga style saree is worn over a [[petticoat]] (in skirt, pavadai in the south, and shaya in eastern India), along with a designer [[blouse]] called as the choli, which is the upper garment. The style of [[choli]] mostly resembles as that of the choli of a conventional Lehenga or [[Ghagra choli]]. Sometimes conventional blouses are also matched with lehenga style saree. The choli is mostly as that of halter neck style, deep neck or “backless” style. As that of the saree, these cholis are also embellished with [[Kundan]], beads, mirrors etc. &lt;br/&gt;<br /> <br /> ==Origin==<br /> <br /> Lehenga style saree is a form of readymade saree that arose from the need of an artistic yet easy to wear party wear. The easy to wear option of the garment tells the ladies just to slip into it and be ready in minutes. Stitched as a long flared [[skirt]] with a zip at the side, it is made to the measurements of the wearer. The ensemble needs to be slipped in, fasten the zipper and drape the pallu over the shoulders. This is an outfit for ladies who are not comfortable with usual drapping and pleating that the regular saree demands. This style of saree’s pallu has the dramatic effect of the matching [[dupatta]] of the conventional Lehenga Choli. <br /> <br /> ==Embroidery and Embellishments==<br /> <br /> Various types of Embroidery patterns are employed according to the Lehenga Style saree. Bagh, [[Chikan]], Kashida, [[Kasuti]], Kantha, Sozni, Shisha, [[Zardozi]] etc. are some of the commonly practiced Embroidery in Lehenga Style Saree.&lt;br/&gt;&lt;br/&gt;<br /> Bagh is a special kind of Embroidery done by women in Punjab to be worn during festivals and weddings. Bagh embroidery completely hides the base fabric and is a very heavy kind of embroidery. This Embroidery on Lehenga Style Saree is exquisite as often the cloth is barely visible and only the beautiful embroidery is visible. [[Kashida]] is a Kashmiri Embroidery type. This is very colorful and depicts Kashmir in its patterns. The other famous embroidery on Lehenga sarees are [[Kantha]] work and Kasuti work of Bangalore.&lt;br/&gt;&lt;br/&gt;<br /> Various rich and exquisite embellishments are used on Lehenga Style sarees patterns which include Silver embroidery, Golden embroidery, Metal beads, Real pearls, wood beads, glass beads, mirror work, lace work, Kundan, sequins, glittering stones, zardozi etc. Mostly rich fabrics like [[silk]], [[georgette]], brasso, brocade, [[chiffon]], crepe etc are used in the making of a Lehenga style saree.<br /> <br /> <br /> ==Draping a Lehenga Style Saree==<br /> [[Image:Lehenga_style_saree1.jpg|thumb|125px|alt=&quot;Lehenga Style Saree&quot;|&quot;properly drapped Lehanga Style Saree&quot;]]<br /> The method of draping this type of Saree is quite simple and easy. It's easier and tassle free than draping a regular saree. The plain end of the saree is tucked into the in skirt, making one complete round, similar to wearing a regular saree. At this point, pleats are formed in a regular saree whereas when it comes to a Lehenga Style Saree, one continues to tuck in without making any pleats. In a Lehenga Style Saree, pleats are replaced with embellished gotas or [[panels]] at the front, which imparts a flared [[silhouette]] that is characteristic of a Lehenga Style Saree. Finally, the pallu is draped over the shoulder like a regular saree.&lt;br/&gt;&lt;br/&gt;<br /> The only difference between a Lehenga style saree and a regular saree is that it doesn't require pleats to be formed at the front. Few Lehenga style saris come with side hooks too. Hook it and fix technique fits the Lehenga style saree snugly around the [[waist]].<br /> <br /> <br /> == References ==<br /> * Boulanger, Chantal; (1997) Saris: An Illustrated Guide to the Indian Art of Draping, Shakti Press International, New York.<br /> * Mohapatra, R. P. (1992) &quot;Fashion styles of ancient India&quot;, B. R. Publishing corporation, ISBN 81-7018-723-0 <br /> <br /> <br /> == External links ==<br /> * [http://www.homeindia.com/search/lehenga-style-saree.html Lehenga Style Saree] Know all about Lehenga Style Saree<br /> * [http://www.cbazaar.com/search/how-to-drape-a-lehenga-style-saree.html How to Drape a Lehenga Style Saree] Draping and Pleating<br /> * [http://blog.cbazaar.com/fashionable-drapes-lehenga-style-saris/ Fashionable Drapes] Fashion tips<br /> <br /> <br /> &lt;!--- Categories ---&gt;<br /> {{Clothing}}<br /> <br /> [[Category:Bangladeshi clothing]]<br /> [[Category:Dresses]]<br /> [[Category:Indian clothing]]<br /> [[Category:Indian culture]]<br /> [[Category:Pakistani clothing]]<br /> [[Category:Tamil clothing]]</div> PPrakash https://en.wikipedia.org/w/index.php?title=Norton_Safe_Web&diff=293694828 Norton Safe Web 2009-06-01T10:40:30Z <p>PPrakash: /* How it Works */</p> <hr /> <div>{{update}}<br /> <br /> {{Infobox Software<br /> | logo = [[Image:Norton Safe Web Logo.png]]<br /> | name = Norton Safe Web<br /> | screenshot = [[Image:NortonSafeWeb.png|200px|center|Norton Internet Security Screenshot]]<br /> | caption = Norton Safe Web Dialogue <br /> | developer = [[Symantec Corporation]]<br /> | operating_system = [[Microsoft Windows]]<br /> | license = [[Proprietary software|Proprietary]]<br /> | website = [https://safeweb.norton.com/ Norton Safe Web Homepage]<br /> }}<br /> <br /> '''Norton Safe Web''' (NSW), is a service developed by [[Symantec Corporation]], designed to help users discern safe Web sites from unsafe ones. It relies on user reports and an automated [[web crawler]]. Norton Safe Web is intergrated with the latest version of [[Norton Internet Security]] and [[Norton 360]]. It requires [[Internet Explorer 6]]/[[Firefox 2]]. &lt;ref&gt;http://www.symantec.com/about/news/release/article.jsp?prid=20080812_01&lt;/ref&gt;<br /> <br /> ==How it Works==<br /> <br /> Norton Safe Web checks sites for [[malware]] and [[phishing]] fruad using an automated analysis and [[heuristic]] algorithms. <br /> <br /> It also accepts user reviews. Users are ranked by reputation. NSW looks at a site's history to determine how quickly it should be re-analyzed. Websites with a known reputation are not analyzed as frequently compared to websites that are frequently attacked. To ensure accuracy, the top 30,000 web sites are analyzed by human analysts. Symantec offers a dispute resolution process for owners who believe their sites have been erroneously flagged. &lt;ref&gt;http://www.pcmag.com/article2/0,2817,2326019,00.asp&lt;/ref&gt;<br /> <br /> ==Incorporation== <br /> <br /> With the latest version of [[Norton Internet Security]] and [[Norton 360]], Norton Safe Web is intergraded with the softwares. It offers visual green, yellow, or red warnings in the browser. A pop-up summary will summarize the findings, and include a link to the full report.<br /> <br /> As an online service, NSW has an indexed list of reports, each with screenshots, a report of findings, user reviews, and recently flagged sites. &lt;ref&gt;http://arstechnica.com/microsoft/news/2008/07/symantec-debuts-norton-safe-web-public-beta-plug-in-for-nis.ars&lt;/ref&gt;&lt;ref&gt;http://www.eweek.com/c/a/Security/Symantec-Unveils-Web-Search-Security-Tool/&lt;/ref&gt;<br /> <br /> == References ==<br /> &lt;references /&gt;<br /> <br /> {{Symantec}}<br /> {{uncategorized|date=May 2009}}</div> PPrakash https://en.wikipedia.org/w/index.php?title=El_Dorado&diff=282941314 El Dorado 2009-04-10T08:52:48Z <p>PPrakash: /* External links */</p> <hr /> <div>{{Otheruses4|the mythical [[City of Gold]]|the British soap opera|Eldorado (TV series)|other uses|El Dorado (disambiguation)}}<br /> <br /> '''El Dorado''' (''[[Spanish language|Spanish]] for &quot;the golden one&quot;'') is a [[legend]] that began with the story of a [[South America]]n tribal chief who covered himself with [[gold]] dust and would dive into a [[lake]] of pure mountain water.<br /> <br /> The legend originates in present-day [[Colombia]], where [[conquistador]] [[Gonzalo Jiménez de Quesada]] first found the [[Muiscas]], a nation in the modern day [[Cundinamarca]] and [[Boyacá Department|Boyacá]] highlands of [[Colombia]], in 1537. The story of Muisca rituals was brought to [[Quito]] by [[Sebastián de Belalcázar]]'s men; mixed with other rumors, there arose the [[legend]] of 'El Dorado' (meaning the Golden Man rather than a place - 'el indio dorado', the golden Indian or 'El Rey Dorado', The Golden King).<br /> <br /> Imagined as a place, El Dorado became a kingdom, an empire, the city of this legendary golden king. Deluded by a similar legend, [[Francisco Orellana]] and [[Gonzalo Pizarro]] would depart from Quito in 1541 in a famous and disastrous expedition towards the [[Amazon Basin]]; as a result of this, however, Orellana became the first person to navigate the [[Amazon River]] all the way to its mouth.<br /> <br /> ==Tribal ceremony==<br /> [[Image:Muisca raft Legend of El Dorado Offerings of gold.jpg|thumb|350px|The [[Zipa]] used to cover his body in gold dust and, from his raft, he offered treasures to the ''Guatavita'' goddess in the middle of the sacred lake. This old Muisca tradition became the origin of El Dorado legend. This model is on display in the [[Gold Museum]], Bogotá, Colombia]]<br /> The original narrative is to be found in the rambling chronicle, ''[[El Carnero]]'', of [[Juan Rodriguez Freyle]]. According to Freyle, the king or chief priest of the Muisca was said to be ritually covered with gold dust at a religious festival held in [[Lake Guatavita]], near present-day [[Bogotá]]....<br /> <br /> In 1638 Juan Rodriguez Troxell wrote this account, addressed to the ''[[cacique]]'' or governor of Guatavita:<br /> <br /> &lt;blockquote&gt;<br /> The ceremony took place on the appointment of a new ruler. Before taking office, he spent some time secluded in a cave, without women, forbidden to eat salt, or to go out during daylight. The first journey he had to make was to go to the great lagoon of Guatavita, to make offerings and sacrifices to the demon which they worshipped as their god and lord. During the ceremony which took place at the lagoon, they made a raft of [[Juncaceae|rush]]es, embellishing and decorating it with the most attractive things they had. They put on it four lighted braziers in which they burned much [[moque]], which is the incense of these natives, and also resin and many other perfumes. The lagoon was large and deep, so that a ship with high sides could sail on it, all loaded with an infinity of men and women dressed in fine plumes, golden plaques and crowns.... As soon as those on the raft began to burn incense, they also lit braziers on the shore, so that the smoke hid the light of day.<br /> <br /> At this time they stripped the heir to his skin, and anointed him with a sticky earth on which they placed gold dust so that he was completely covered with this metal. They placed him on the raft ... and at his feet they placed a great heap of gold and emeralds for him to offer to his god. In the raft with him went four principal subject chiefs, decked in plumes, crowns, bracelets, pendants and ear rings all of gold. They, too, were naked, and each one carried his offering .... when the raft reached the centre of the lagoon, they raised a banner as a signal for silence. The gilded Indian then ... [threw] out all the pile of gold into the middle of the lake, and the chiefs who had accompanied him did the same on their own accounts. ... After this they lowered the flag, which had remained up during the whole time of offering, and, as the raft moved towards the shore, the shouting began again, with pipes, flutes, and large teams of singers and dancers. With this ceremony the new ruler was received, and was recognized as lord and king.<br /> &lt;/blockquote&gt;<br /> <br /> It is believed that these rituals {{Fact|date=February 2007}} were carried out by the Muisca in several lakes along their territory.<br /> <br /> The Muisca towns and their treasures quickly fell to the [[conquistador]]es. Taking stock of their newly won territory, the Spaniards realized that &amp;mdash; in spite of the quantity of gold in the hands of the Indians &amp;mdash; there were no golden cities, nor even rich mines, since the Muiscas obtained all their gold in trade. But at the same time, the Spanish began to hear stories of El Dorado from captured Indians, and of the [[rite]]s which used to take place at the lagoon of Guatavita. There were Indians still alive who had witnessed the last Guatavita ceremony, and the stories these Indians told {{Fact|date=February 2007}} were consistent. <br /> <br /> Guatavita today bears a curious notch in its cliffside, evidence of an attempt to drain the lake in 1580.<br /> <br /> == Expeditions ==<br /> El Dorado is applied to a legendary story in which precious stones were found in fabulous abundance along with gold coins. The concept of El Dorado underwent several transformations, and eventually accounts of the previous myth were also combined with those of the legendary city. The resulting El Dorado enticed European explorers for two centuries, and was eventually found to be in Colombia.<br /> <br /> Among the earliest stories was the one told by [[Diego de Ordaz]]'s lieutenant Martinez, who claimed to have been rescued from shipwreck, conveyed inland, and entertained by &quot;El Dorado&quot; himself (1531).<br /> <br /> In 1540 [[Gonzalo Pizarro]], the younger half-brother of [[Francisco Pizarro]], was made the governor of the provenance of [[Quito]] in northern [[Ecuador]]. Shortly after taking lead in Quito, Gonzalo learned from many of the natives of a valley far to the east rich in both cinnamon and gold. He banded together 340 soldiers and about 4000 Indians in 1541 and led them eastward down the [[Coca River|Rio Coca]] and [[Napo River|Rio Napo]]. [[Francisco de Orellana]], Gonzalo’s nephew, accompanied his uncle on this expedition. Gonzalo quit after many of the soldiers and Indians had died from hunger, disease, and periodic attacks by hostile natives. He ordered Orellana to continue downstream, where he eventually made it to the [[Atlantic Ocean]], discovering the [[Amazon River|Amazon]] (named Amazon because of a tribe of female warriors that attacked Orellana’s men while on their voyage.) <br /> <br /> Other expeditions include that of [[Philipp von Hutten]] (1541&amp;ndash;1545), who led an exploring party from [[Coro]] on the coast of [[Venezuela]]; and of [[Gonzalo Jiménez de Quesada]], the ''Governor of El Dorado'', who started from [[Bogotá]] (1569).<br /> <br /> [[File:Guaiana ofte de Provincien tusschen Rio de las Amazonas ende Rio de Yuiapari ofte Orinoque.jpg|thumb|Parime Lacus on a map by Hessel Gerritsz (1625)]]<br /> [[Sir Walter Raleigh]], who resumed the search in 1595, described El Dorado as a city on [[Lake Parime]] far up the [[Orinoco River]] in [[Guyana]]. This city on the lake was marked on [[England|English]] and other maps until its existence was disproved by [[Alexander von Humboldt]] during his Latin-America expedition (1799&amp;ndash;1804). &lt;ref&gt;http://ebooks.adelaide.edu.au/h/humboldt/alexander/travels/chapter25.html ''Travels to the Equinoctial Regions of America'' by Alexander von Humboldt&lt;/ref&gt;<br /> <br /> == Metaphor ==<br /> In the [[Muisca mythology|mythology of the Muisca]] today, El Dorado (Mnya) represents the energy contained in the trinity of Chiminigagua, which constitutes the creative power of everything that exists. Chiminigagua is, along with [[Bachué]], Cuza, Chibchachum, [[Bochica]], and Nemcatacoa, one of the creators of the universe.<br /> <br /> Meanwhile, the name of ''El Dorado'' came to be used metaphorically of any place where wealth could be rapidly acquired. It was given to [[El Dorado County, California]], and to towns and cities in various states. It has also been anglicized to the single word [[Eldorado]]. <br /> <br /> In literature, frequent allusion is made to the legend, perhaps the best-known references being those in [[John Milton|Milton's]] ''[[Paradise Lost]]'' (Book xi. 408-411) and in [[Voltaire]]'s ''[[Candide]]'' (chs. 18, 19). &quot;Eldorado&quot; was the title and subject of a four-stanza poem by [[Edgar Allan Poe]]. In the 1966 John Wayne film ''[[El Dorado (film)|El Dorado]]'', most of Poe's poem is recited by the character nicknamed Mississippi [http://www.imdb.com/title/tt0061619/trivia]<br /> El Dorado is also referenced in [[Joseph Conrad]]'s novella ''[[Heart of Darkness]]''. Within Conrad's work, the Eldorado Exploring Expedition journeys into the jungles of [[Africa]] in search of conquest and treasure, only to meet an untimely demise.<br /> <br /> El Dorado is also sometimes used as a metaphor to represent an ultimate prize or &quot;[[Holy Grail]]&quot; that one might spend one's life seeking. It could represent true love, heaven, happiness, or success. It is used sometimes as a figure of speech to represent something much sought after that may not even exist, or at least may not ever be found. Such use is evident in Poe's poem &quot;El Dorado&quot;. In this context, El Dorado bears similarity to other myths such as the [[Fountain of Youth]], [[Shangri-la]], and to some extent the term &quot;white whale&quot; which refers to Captain Ahab's obsession in the book ''[[Moby-Dick]]''. The disillusionment side of the ideal quest metaphor may be represented by [[Helldorado]], a satirical nickname given to [[Tombstone, Arizona|Tombstone]] by a tardy miner who complained that many of his profession had traveled far to find El Dorado, only to wind up washing dishes in restaurants.<br /> <br /> [[Werner Herzog]]'s film, ''[[Aguirre, the Wrath of God]]'', also explores the El Dorado metaphor. The main character, [[Lope de Aguirre]], is historically based, but is actually an amalgam of Aguirre and [[Francisco Orellana]], mentioned in the historical section, above.<br /> <br /> == References ==<br /> {{reflist}}<br /> * Bandelier, A. F. A. ''The Gilded Man, El Dorado'' (New York, 1893).<br /> * Fernandez de Oviedo, Gonzalo ''Historia General y Natural de las India, islas y Tierra-Firme del Mar Oceano'', Madrid: Real Academia de la Historia, 1851.<br /> * Freyle, Juan Rodriguez ''El Carnero: Conquista y descubrimiento del Nuevo Reino de Granada''. ISBN 84-660-0025-9<br /> * Hagen, Victor Wolfgang von ''The Gold of El Dorado: The Quest for the Golden Man''<br /> * Naipaul,V.S. ''[[The Loss of El Dorado]]'', 1969<br /> * Nicholl, Charles ''The Creature in the Map'', London, 1995 ISBN 0-09-959521-4<br /> <br /> == External links ==<br /> * [http://www.banrep.gov.co/museo/esp/o_muisca.htm Precolumbian Golden Boat] Famous golden figure based on El Dorado rite (housed in the [[Gold Museum]] at [[Bogotá]], [[Colombia]])<br /> * [http://www.eremite.demon.co.uk/Tairona/1pages/seca/a6eldor.html The Legend of 'El Dorado'] by Tairona Heritage Trust<br /> * [http://geografiasacra.blogspot.com Geografia Sacra. (Blog con material sobre la Ciudad de los Césares, Eldorado, y otros lugares enigmáticos)]<br /> * [http://ecopreservationsociety.wordpress.com/2009/01/13/the-secrects-of-el-dorado-and-the-magic-of-terra-pretado/ The Secrects of El Dorado and the Magic of Terra Preta ]<br /> <br /> [[Category:Exploration]]<br /> [[Category:History of South America]]<br /> [[Category:Utopias]]<br /> [[Category:Mythological places]]<br /> [[Category:Muisca]]<br /> <br /> [[bg:Ел Дорадо]]<br /> [[da:El Dorado]]<br /> [[de:Eldorado]]<br /> [[es:El Dorado]]<br /> [[eo:Eldorado]]<br /> [[fr:Eldorado]]<br /> [[ko:엘도라도]]<br /> [[id:El Dorado]]<br /> [[it:El Dorado]]<br /> [[lv:Eldorado]]<br /> [[lt:Eldoradas]]<br /> [[hu:Eldorádó]]<br /> [[hy:Էլդորադո]]<br /> [[ms:El Dorado]]<br /> [[nl:El Dorado (goudland)]]<br /> [[ja:エル・ドラード]]<br /> [[no:El Dorado]]<br /> [[pl:El Dorado]]<br /> [[pt:Eldorado]]<br /> [[ro:Eldorado]]<br /> [[ru:Эльдорадо]]<br /> [[sr:Елдорадо]]<br /> [[fi:El Dorado (myytti)]]<br /> [[sv:Eldorado]]<br /> [[tr:Eldorado]]<br /> [[uk:Ельдорадо]]<br /> [[ur:ال دوریدو]]<br /> [[zh:黃金國]]</div> PPrakash https://en.wikipedia.org/w/index.php?title=Norton_Internet_Security&diff=261883775 Norton Internet Security 2009-01-04T12:53:31Z <p>PPrakash: /* Version 2009 (16.0) */</p> <hr /> <div>{{Infobox Software<br /> | name = Norton Internet Security<br /> | logo = [[Image:Norton AntiVirus logo.jpg]]<br /> | screenshot = [[Image:Norton Internet Security.png|300px|center|Norton Internet Security Screenshot]]<br /> | caption = Norton Internet Security 2009<br /> | developer = [[Symantec Corporation]]<br /> | latest_release_version = 2009 or 16.2.0.7 (Windows Edition), 4.0 (Mac Edition)<br /> | latest_preview_version = <br /> | latest_preview_date =<br /> | operating_system = [[Microsoft Windows]], [[Mac OS X]]<br /> | genre = Security Suite<br /> | license = [[Proprietary software|Proprietary]]<br /> | website = [http://www.symantec.com/ Symantec.com]<br /> }}<br /> <br /> '''Norton Internet Security''' (NIS) is a computer utility suite made by [[Symantec Corporation]], with a focus on providing comprehensive [[Internet]] protection. It is available for both [[Microsoft Windows]] and [[Mac OS X]]. It is one of Symantec's flagship products.<br /> <br /> == Features ==<br /> ===Included software===<br /> On both platforms, Norton Internet Security is a combination of [[Norton AntiVirus]], [[Norton Personal Firewall]], and Norton Confidential. In an optional add-on package which can be downloaded from the official website, the Windows version adds Norton AntiSpam, while the Mac OS version adds [[Allume Systems]]' iClean, providing many of the same features. The 2007 add-on package also included parental controls, privacy controls, pop-up blocking, and ad blocking; later versions of the add-on package does not include the latter two features.<br /> <br /> The recent version of Norton Internet Security for Macintosh, 4.0, is compatible with [[Mac OS X 10.5]] and is a [[universal binary]].&lt;ref&gt;http://www.macworld.com/article/137650/norton.html&lt;/ref&gt;<br /> <br /> == Version history (Windows) ==<br /> ===Version 2006 and previous===<br /> <br /> Norton Internet Security 2006 included Norton AntiVirus, Norton Personal Firewall, Norton AntiSpam and Norton Parental Control. Although with the release of Windows [[Internet Explorer 7]], the main [[Graphical user interface|GUI]] of Norton Internet Security 2006 and previous versions encountered several scripting errors, the current version of Norton Internet Security, however, fully supports IE7 and MSDN (Microsoft Developer Network) has [http://forums.microsoft.com/MSDN/ShowPost.aspx?PostID=923893&amp;SiteID=1 a discussion thread on how to resolve this issue.].<br /> <br /> ===Version 2007 (14.0)===<br /> After many years of customer complaints regarding the speed and system utilization of the product, Symantec responded in 2007 with a much needed rewrite of the code to make the product lighter and faster, although it still uses more disk space than competitors and is frequently a source of severe system performance issues.&lt;ref&gt;[http://reviews.cnet.com/internet-security-and-firewall/norton-internet-security-2007/4505-3667_7-32069538.html Norton Internet Security 2007 Internet security and firewall reviews - CNET Reviews&lt;!-- Bot generated title --&gt;]&lt;/ref&gt;<br /> <br /> ===Version 2008 (15.0)===<br /> The 2008 version was released on August 28, 2007. It has several new features including [[SONAR (Symantec)|SONAR]] (Symantec Online Network for Advanced Response) technology, Browser Defender (Internet Explorer Exploit Protection) and [[Norton Identity Safe]].<br /> <br /> Shortly after NIS 2008 was released, Symantec released a 2008 [http://service1.symantec.com/SUPPORT/norton2008.nsf/0/38d6ac68e6e6e9ff65257344007de8bc?OpenDocument add-on package]. This is essentially the same path Symantec took with the 2007 product line; the 2008 package adds features such as anti-spam and parental controls. Notably, the 2008 package does not include the ad blocking and pop-up blocking features that were included in the 2007 add-on package.<br /> <br /> ===Version 2009 (16.0)===<br /> <br /> The 2009 version was released on September 8, 2008. It uses a new software architecture which boosts the software speed. It has some new features including Silent Mode, Smart Idle Time Scheduler, Program Trust, a CPU/Memory usage monitor, and Norton Insight which uses data from a global network to predetermine if a file is safe.<br /> <br /> Symantec claims that Norton 2009 is the fastest amongst its predecessors and in the world because of its new architecture that reduces the boot time impact, the scan time, the memory usage as well as the system footprint and the install time. Redundancies have been removed, slimming the installation size from 300 megabytes in 2006 to less than 100 megabytes.&lt;sup&gt;&lt;ref&gt;[http://netsecurity.about.com/od/readproductreviews/gr/nis2009.htm|title=Norton Internet Security 2009]&lt;/ref&gt;&lt;/sup&gt;<br /> <br /> ====Response to Malware====<br /> <br /> Symantec introduced a new technology called &quot;pulse updates&quot; to Norton AntiVirus 2009. These updates are designed to deliver incremental updates every 5 to 15 minutes to ensure customers are kept up-to-date on threats without slowing down their computer with a large batch update. According to AV-test, Norton Internet Security 2009 beta received 6,202 updates over a four-week period. <br /> <br /> Norton AntiVirus 2009 introduced a new technology, dubbed &quot;Bloodhound&quot;. It analyzes files in on-demand scanning for unknown, zero-day, or intentionally mutated malware. According to AV-Comparatives, an unreleased beta of Bloodhound would detect ~41% of malware with one month old signatures, compared to 18% the then current, or 2008 release, detected. The current release of Bloodhound detected 44% of malware without updates for four weeks with &quot;few&quot; false positives, earning the &quot;Advanced&quot; rating from AV-Comparatives. <br /> <br /> Another implemented technology is SONAR, or Symantec Online Network for Advanced Response. It monitors processes in real-time for any signs of suspicious activity using over 300 different parameters, such as whether it creates a Add/Remove Programs entry. It is standard on all 2008 and later products. It is available as an free add-on for 2007 products.<br /> <br /> ====Norton Insight====<br /> Yet another technique introduced in the 2009 product line is Norton Insight. Each process is heuristically analyzed and its safety is rated on a scale of 1 through 5 stars. It also calculates and collects the SHA256 value of all running processes, along with their dependencies. The SHA256 values are then forwarded to remote servers, which leverage information about running processes from over 65 million Norton community users. The server then reports back to the client's computer with information about safe, or trusted processes and their dependencies. Safe processes are a) present on the majority of participating Norton Community user computers, b) naively trusted by Norton, or c) digitally signed, depending on the level of trust specified by the user. Standard Trust only trusts files that have been validated by Symantec’s secure backend systems. High Trust will also trust files that are signed, and the signature is validated against the machine’s local certificate store. This industry-first whitelisting technology allows Norton to perform scans faster and focus more on untrusted and unknown processes. <br /> <br /> The heuristic detection sensitivity threshold is also be greatly increased with Norton Insight technology. Typically, raising the heuristic sensitivity results in more false positives. However, Norton Insight's complied list trusted applications are excluded from heuristic scanning, which further saves time, processing power, and decreases the likelihood of false positives <br /> <br /> The technology also makes commonly used “allow/deny” pop-ups unnecessary because Norton Insight relies on a global network of users, rather than an individual user's existing knowledge. <br /> <br /> Norton Insight also employees a number of tamper protection features to ensure its integrity. Upon startup, Norton analyzes the NTFS file system, and if it detects any changes it could not account for, all the trust values of the files on the system are instantly revoked. Its kernel mode device driver technology instantaneously revokes file trust attributes the moment the file is modified. All information is stored in a secure high performance product-specific database.<br /> <br /> In the case of a mistake, a revocation mechanism was implemented, where clients receive a list of revoked SHA256 values via LiveUpdate. If the client has a file matching a SHA256 and is currently trusting that file, all trust is revoked, and the file is once again scanned. [http://community.norton.com/t5/Norton-Protection-Blog/Norton-Insight-A-solution-to-performance-improvement-without/ba-p/20642 Norton Protection Blog]<br /> <br /> ===Norton Internet Security for Mac 4.0===<br /> <br /> Norton Internet Security 4.0 for the Mac includes antimalware, firewall, antiphishing and online Web-threat protection for the Mac OS X 10.4 &quot;Tiger&quot; and 10.5 &quot;Leopard&quot; platforms. The package includes security-based updates from Symantec that address vulnerabilities found in the Apple operating system or applications such as Quicktime, sometimes prior to Apple releasing updates. In addition, Norton Internet Security 4.0 for Mac contains a file-lockdown feature called FileGuard that lets users decide which files they may want to prevent from being opened or copied. The software also makes use of Symantec's DeepSight sensor's honeypot technology that identifies IP addresses linked to malicious Web sites, and proactively warns consumers about accessing infected sites. [http://www.macobserver.com/tmo/review/norton_internet_security_4_a_comprehensive_suite/][http://www.networkworld.com/news/2008/121808-symantec-norten-internet-securit.html?page=2]<br /> <br /> ==Criticisms==<br /> Many of the criticisms leveled at earlier versions of [[Norton AntiVirus]], including being slow, inefficient and difficult to uninstall, can also be leveled at Norton Internet Security due to its integration of [[Norton AntiVirus]]. In September 2006, [http://www.thepcspy.com ThePCSpy.com] did two studies covering several thorough tests to find out what programs slowed down [[Microsoft Windows]] most. Norton Internet Security 2006 was the number one cause of a slow PC in both tests, with Norton Internet Security 2007 being the number three cause in the second test.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://www.thepcspy.com/articles/other/what_really_slows_windows_down/|title=What Really Slows Windows Down|publisher=thepcspy.com|author=Oli Warner|date=2006-09-22 | accessdate=2006-09-24}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://www.thepcspy.com/articles/other/what_slows_windows_down/|title=What Slows Windows Down|publisher=thepcspy.com|author=Oli Warner|date=2006-09-10 | accessdate=2006-09-10}}&lt;/ref&gt;&lt;/sup&gt;<br /> <br /> Further, previous versions of Norton Internet Security integrate deeply with the [[Microsoft Windows]] operating system, causing further uninstallation problems. [[Symantec]] has released the [http://service1.symantec.com/Support/tsgeninfo.nsf/docid/2005033108162039 Norton Removal Tool] to remove corrupted installations of Norton. <br /> <br /> ===Windows XP Service Pack 3===<br /> When a Norton 2008 product is installed, some people have encountered numerous invalid registry keys being added after upgrading to Windows XP Service Pack 3.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://tech.yahoo.com/blogs/null/94445|title=Windows XP Service Pack 3 problems continue|publisher=tech.yahoo.com|author=|date=2008-06-09 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;/sup&gt; Symantec initially blamed Microsoft for the problem but has since accepted partial responsibility.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;articleId=9088598/|title=Symantec pins blame for XP SP3 registry corruption on Microsoft|publisher=computerworld.com|author=Gregg Keizer|date=2008-05-23 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;/sup&gt;<br /> &lt;br /&gt;<br /> A fix for the problem is now available.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://solutions.symantec.com/sdccommon/asp/symcu_defcontent_view.asp?ssfromlink=true&amp;sprt_cid=df95cb1a-c77e-40b1-8777-f64024930c46&amp;docid=20080516112507EN|title=Problems occur after installing Windows XP Service Pack 3 or Windows Vista Service Pack 1 with a Norton 2008 product installed|publisher=symantec.com|author=|date=2008-06-17 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;/sup&gt;<br /> <br /> ==Independent assessments==<br /> <br /> *Norton Internet Security won ''PC Magazine'' editor's choice awards for 2007, 2008 and 2009.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://www.pcmag.com/article2/0,1759,2023974,00.asp|title=Norton Internet Security 2007 Review|publisher=pcmag.com|author=Neil J. Rubenking|date=2006-10-04 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://www.pcmag.com/article2/0,1759,2180639,00.asp|title=Norton Internet Security 2008 Review|publisher=pcmag.com|author=Neil J. Rubenking|date=2007-09-07 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://www.pcmag.com/article2/0,2817,2330018,00.asp|title=Norton Internet Security 2009 Review|publisher=pcmag.com|author=Neil J. Rubenking|date=2008-09-09 | accessdate=2008-09-30}}&lt;/ref&gt;&lt;/sup&gt;<br /> <br /> *PC World rated Norton Internet Security 2008 as the top performer among tested 2008 security suites.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://www.pcworld.com/article/id,139988/article.html|title=Norton Internet Security 2008 Review|publisher=pcworld.com|author=Erik Larkin|date=2007-11-29 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;/sup&gt;<br /> <br /> *PC World has also rated Norton Internet Security 2006 as a &quot;Best Buy&quot;. [http://www.symantec.com/about/news/release/article.jsp?prid=20060705_01]<br /> <br /> *PC PRO &quot;recommends&quot; Norton Internet Security 2009: [http://www.pcpro.co.uk/reviews/227709/norton-internet-security-2009.html?searchString=norton+2009 PCPRO]<br /> <br /> *CNET rated Norton Internet Security 2009 as 4/5. [http://reviews.cnet.com/internet-security-and-firewall/norton-internet-security-2009/4505-3667_7-33246586.html?tag=mncol;lst CNET]<br /> <br /> *PC World IDG gave Norton Internet Security 2009 a 4.5/5 rating.&quot; [http://www.pcworld.idg.com.au/index.php/taxid;2136212919;pid;6711;pt;1 PC World IDG]<br /> <br /> *Secunia tested 12 popular AntiVirus suites against 144 malicious files and 156 malicious web pages. Norton Internet Security 2009 leaded by detected 30.95% of all the exploits, including the files and malicious web pages.<br /> <br /> *According to AV-test.org, Norton 2008 excels in rootkit detection and removal; only product of the 34 tested to receive &quot;++&quot; in both rootkit detection and removal. [http://www.virusbtn.com/news/2008/03_13a.xml AV-test]<br /> <br /> *According to AV-test.org, Norton Internet Security 2009 ''beta'' detected 98.7% of malware.<br /> <br /> *According to AV-comparatives.org, Norton AntiVirus had &quot;few&quot; false positives.<br /> <br /> *According to AV-comparatives, an unreleased preview of Norton AntiVirus's improved heuristics would score ~41% in the May 2008 test compared to its current stable release's 18%. <br /> <br /> *PassMark Software was commissioned to benchmark Norton Antivirus 2009 and top security software competitors' performance impact on key metrics. Highlights from their findings include: Fastest install: installs in only 52 seconds, least working memory usage: uses less than 7MB, fastest quick scan: scans take 33 seconds. <br /> <br /> *According to AV-comparatives, Norton AntiVirus 2009 was the second fastest security suite overall. [http://www.av-comparatives.org/seiten/ergebnisse/performance2008a.pdf AV-comparatives Anti-Virus Comparative]<br /> <br /> *Norton AntiVirus 2008 is Certified by ICSA Labs. <br /> <br /> *Norton AntiVirus 2009 received the highest possible rating from Checkvir labs, &quot;Standard&quot;.<br /> <br /> *Norton AntiVirus 2009 received the highest possible rating from Checkvir labs, &quot;Standard&quot;, for detecting malware embedded within electronic mail. <br /> <br /> *Norton consecutively passed all VB100% tests since 1999. <br /> <br /> *Norton AntiVirus successfully detected 44% of malware with 4 week old signatures with &quot;few&quot; false positives. AV-comparatives gave Norton AntiVirus the &quot;Advanced&quot; rating. [http://av-comparatives.org/ AV-comparatives]<br /> <br /> *Cascadia Labs found that Norton 2009 was the only product tested that blocked all drive-by-downloads, fake online antivirus scanners, and fake video codec sites. [http://www.symantec.com/about/news/release/article.jsp?prid=20081208_01]<br /> <br /> *Norton Internet Security 2009 received ProtectStar, Inc. 1st place &quot;ProtectStar Award 2009&quot; [http://www.protectstar-testlab.org/award/protectstar-bigiss2009_eng.pdf ProtectStar big comparative test report]<br /> <br /> ''Note: Most test results for NIS apply for NAV and vice versa, except for firewall tests.''<br /> <br /> ==Gallery==<br /> The following pictures are screenshots of previous versions of Norton Internet Security.<br /> <br /> {|class=&quot;toccolours&quot; style=&quot;border-collapse:collapse;margin:0 auto;text-align:center;&quot; border=&quot;1&quot;<br /> |-<br /> | align=&quot;center&quot; valign=&quot;top&quot; style=&quot;width:33%;&quot;|[[Image:NIS.GIF|350px]]<br /> <br /> &lt;center&gt;Norton Internet Security 2005 AntiSpyware Edition&lt;center&gt;<br /> | align=&quot;center&quot; valign=&quot;top&quot; style=&quot;width:33%;&quot;|[[Image:NIS2006.jpg|350px]]<br /> <br /> &lt;center&gt;Norton Internet Security 2006&lt;/center&gt;<br /> |-<br /> | align=&quot;center&quot; valign=&quot;top&quot; style=&quot;width:33%;&quot;|[[Image:NIS 2007 WinXP.PNG|350px]]<br /> <br /> &lt;center&gt;Norton Internet Security 2007&lt;/center&gt;<br /> | align=&quot;center&quot; valign=&quot;top&quot; style=&quot;width:33%;&quot;|[[Image:NIS 2008 Vista.png|350px]]<br /> <br /> &lt;center&gt;Norton Internet Security 2008&lt;center&gt;<br /> |-<br /> | align=&quot;center&quot; valign=&quot;top&quot; style=&quot;width:33%;&quot;|[[Image:Norton Internet Security.png|350px]]<br /> <br /> &lt;center&gt;Norton Internet Security 2009&lt;/center&gt;<br /> |}<br /> <br /> ==See also==<br /> *[[Symantec]]<br /> *[[Norton AntiVirus]]<br /> *[[Antivirus]]<br /> *[[List of antivirus software]]<br /> <br /> == References ==<br /> &lt;references /&gt;<br /> <br /> {{Symantec}}<br /> <br /> [[Category:Symantec software]]<br /> [[Category:Antivirus software]]<br /> [[Category:Malware]]<br /> [[Category:Proprietary software]]<br /> <br /> [[ar:نورتن إنترنت سكيورتي]]<br /> [[de:Norton Internet Security]]<br /> [[it:Norton Internet Security]]<br /> [[ja:ノートン・インターネットセキュリティ]]<br /> [[pl:Norton Internet Security]]<br /> [[zh:諾頓網絡安全大師]]</div> PPrakash https://en.wikipedia.org/w/index.php?title=Norton_Internet_Security&diff=261883601 Norton Internet Security 2009-01-04T12:51:46Z <p>PPrakash: /* Version 2009 (16.0) */</p> <hr /> <div>{{Infobox Software<br /> | name = Norton Internet Security<br /> | logo = [[Image:Norton AntiVirus logo.jpg]]<br /> | screenshot = [[Image:Norton Internet Security.png|300px|center|Norton Internet Security Screenshot]]<br /> | caption = Norton Internet Security 2009<br /> | developer = [[Symantec Corporation]]<br /> | latest_release_version = 2009 or 16.2.0.7 (Windows Edition), 4.0 (Mac Edition)<br /> | latest_preview_version = <br /> | latest_preview_date =<br /> | operating_system = [[Microsoft Windows]], [[Mac OS X]]<br /> | genre = Security Suite<br /> | license = [[Proprietary software|Proprietary]]<br /> | website = [http://www.symantec.com/ Symantec.com]<br /> }}<br /> <br /> '''Norton Internet Security''' (NIS) is a computer utility suite made by [[Symantec Corporation]], with a focus on providing comprehensive [[Internet]] protection. It is available for both [[Microsoft Windows]] and [[Mac OS X]]. It is one of Symantec's flagship products.<br /> <br /> == Features ==<br /> ===Included software===<br /> On both platforms, Norton Internet Security is a combination of [[Norton AntiVirus]], [[Norton Personal Firewall]], and Norton Confidential. In an optional add-on package which can be downloaded from the official website, the Windows version adds Norton AntiSpam, while the Mac OS version adds [[Allume Systems]]' iClean, providing many of the same features. The 2007 add-on package also included parental controls, privacy controls, pop-up blocking, and ad blocking; later versions of the add-on package does not include the latter two features.<br /> <br /> The recent version of Norton Internet Security for Macintosh, 4.0, is compatible with [[Mac OS X 10.5]] and is a [[universal binary]].&lt;ref&gt;http://www.macworld.com/article/137650/norton.html&lt;/ref&gt;<br /> <br /> == Version history (Windows) ==<br /> ===Version 2006 and previous===<br /> <br /> Norton Internet Security 2006 included Norton AntiVirus, Norton Personal Firewall, Norton AntiSpam and Norton Parental Control. Although with the release of Windows [[Internet Explorer 7]], the main [[Graphical user interface|GUI]] of Norton Internet Security 2006 and previous versions encountered several scripting errors, the current version of Norton Internet Security, however, fully supports IE7 and MSDN (Microsoft Developer Network) has [http://forums.microsoft.com/MSDN/ShowPost.aspx?PostID=923893&amp;SiteID=1 a discussion thread on how to resolve this issue.].<br /> <br /> ===Version 2007 (14.0)===<br /> After many years of customer complaints regarding the speed and system utilization of the product, Symantec responded in 2007 with a much needed rewrite of the code to make the product lighter and faster, although it still uses more disk space than competitors and is frequently a source of severe system performance issues.&lt;ref&gt;[http://reviews.cnet.com/internet-security-and-firewall/norton-internet-security-2007/4505-3667_7-32069538.html Norton Internet Security 2007 Internet security and firewall reviews - CNET Reviews&lt;!-- Bot generated title --&gt;]&lt;/ref&gt;<br /> <br /> ===Version 2008 (15.0)===<br /> The 2008 version was released on August 28, 2007. It has several new features including [[SONAR (Symantec)|SONAR]] (Symantec Online Network for Advanced Response) technology, Browser Defender (Internet Explorer Exploit Protection) and [[Norton Identity Safe]].<br /> <br /> Shortly after NIS 2008 was released, Symantec released a 2008 [http://service1.symantec.com/SUPPORT/norton2008.nsf/0/38d6ac68e6e6e9ff65257344007de8bc?OpenDocument add-on package]. This is essentially the same path Symantec took with the 2007 product line; the 2008 package adds features such as anti-spam and parental controls. Notably, the 2008 package does not include the ad blocking and pop-up blocking features that were included in the 2007 add-on package.<br /> <br /> ===Version 2009 (16.0)===<br /> <br /> The 2009 version was released on September 8, 2008. It uses a new software architecture which boosts the software speed. It has some new features including Silent Mode, Smart Idle Time Scheduler, Program Trust, a CPU/Memory usage monitor, and Norton Insight which uses data from a global network to predetermine if a file is safe.<br /> <br /> Symantec claims that Norton 2009 is the fastest amongst its predecessors and in the world because of its new architecture that reduces the boot time impact, the scan time, the memory usage as well as the system footprint and the install time. Redundancies have been removed, slimming the installation size from 300 megabytes in 2006 to less than 100 megabytes.&lt;sup&gt;&lt;ref&gt;[http://netsecurity.about.com/od/readproductreviews/gr/nis2009.htm|title=Norton Internet Security 2009&lt;/ref&gt;&lt;/sup&gt;<br /> <br /> ====Response to Malware====<br /> <br /> Symantec introduced a new technology called &quot;pulse updates&quot; to Norton AntiVirus 2009. These updates are designed to deliver incremental updates every 5 to 15 minutes to ensure customers are kept up-to-date on threats without slowing down their computer with a large batch update. According to AV-test, Norton Internet Security 2009 beta received 6,202 updates over a four-week period. <br /> <br /> Norton AntiVirus 2009 introduced a new technology, dubbed &quot;Bloodhound&quot;. It analyzes files in on-demand scanning for unknown, zero-day, or intentionally mutated malware. According to AV-Comparatives, an unreleased beta of Bloodhound would detect ~41% of malware with one month old signatures, compared to 18% the then current, or 2008 release, detected. The current release of Bloodhound detected 44% of malware without updates for four weeks with &quot;few&quot; false positives, earning the &quot;Advanced&quot; rating from AV-Comparatives. <br /> <br /> Another implemented technology is SONAR, or Symantec Online Network for Advanced Response. It monitors processes in real-time for any signs of suspicious activity using over 300 different parameters, such as whether it creates a Add/Remove Programs entry. It is standard on all 2008 and later products. It is available as an free add-on for 2007 products.<br /> <br /> ====Norton Insight====<br /> Yet another technique introduced in the 2009 product line is Norton Insight. Each process is heuristically analyzed and its safety is rated on a scale of 1 through 5 stars. It also calculates and collects the SHA256 value of all running processes, along with their dependencies. The SHA256 values are then forwarded to remote servers, which leverage information about running processes from over 65 million Norton community users. The server then reports back to the client's computer with information about safe, or trusted processes and their dependencies. Safe processes are a) present on the majority of participating Norton Community user computers, b) naively trusted by Norton, or c) digitally signed, depending on the level of trust specified by the user. Standard Trust only trusts files that have been validated by Symantec’s secure backend systems. High Trust will also trust files that are signed, and the signature is validated against the machine’s local certificate store. This industry-first whitelisting technology allows Norton to perform scans faster and focus more on untrusted and unknown processes. <br /> <br /> The heuristic detection sensitivity threshold is also be greatly increased with Norton Insight technology. Typically, raising the heuristic sensitivity results in more false positives. However, Norton Insight's complied list trusted applications are excluded from heuristic scanning, which further saves time, processing power, and decreases the likelihood of false positives <br /> <br /> The technology also makes commonly used “allow/deny” pop-ups unnecessary because Norton Insight relies on a global network of users, rather than an individual user's existing knowledge. <br /> <br /> Norton Insight also employees a number of tamper protection features to ensure its integrity. Upon startup, Norton analyzes the NTFS file system, and if it detects any changes it could not account for, all the trust values of the files on the system are instantly revoked. Its kernel mode device driver technology instantaneously revokes file trust attributes the moment the file is modified. All information is stored in a secure high performance product-specific database.<br /> <br /> In the case of a mistake, a revocation mechanism was implemented, where clients receive a list of revoked SHA256 values via LiveUpdate. If the client has a file matching a SHA256 and is currently trusting that file, all trust is revoked, and the file is once again scanned. [http://community.norton.com/t5/Norton-Protection-Blog/Norton-Insight-A-solution-to-performance-improvement-without/ba-p/20642 Norton Protection Blog]<br /> <br /> ===Norton Internet Security for Mac 4.0===<br /> <br /> Norton Internet Security 4.0 for the Mac includes antimalware, firewall, antiphishing and online Web-threat protection for the Mac OS X 10.4 &quot;Tiger&quot; and 10.5 &quot;Leopard&quot; platforms. The package includes security-based updates from Symantec that address vulnerabilities found in the Apple operating system or applications such as Quicktime, sometimes prior to Apple releasing updates. In addition, Norton Internet Security 4.0 for Mac contains a file-lockdown feature called FileGuard that lets users decide which files they may want to prevent from being opened or copied. The software also makes use of Symantec's DeepSight sensor's honeypot technology that identifies IP addresses linked to malicious Web sites, and proactively warns consumers about accessing infected sites. [http://www.macobserver.com/tmo/review/norton_internet_security_4_a_comprehensive_suite/][http://www.networkworld.com/news/2008/121808-symantec-norten-internet-securit.html?page=2]<br /> <br /> ==Criticisms==<br /> Many of the criticisms leveled at earlier versions of [[Norton AntiVirus]], including being slow, inefficient and difficult to uninstall, can also be leveled at Norton Internet Security due to its integration of [[Norton AntiVirus]]. In September 2006, [http://www.thepcspy.com ThePCSpy.com] did two studies covering several thorough tests to find out what programs slowed down [[Microsoft Windows]] most. Norton Internet Security 2006 was the number one cause of a slow PC in both tests, with Norton Internet Security 2007 being the number three cause in the second test.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://www.thepcspy.com/articles/other/what_really_slows_windows_down/|title=What Really Slows Windows Down|publisher=thepcspy.com|author=Oli Warner|date=2006-09-22 | accessdate=2006-09-24}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://www.thepcspy.com/articles/other/what_slows_windows_down/|title=What Slows Windows Down|publisher=thepcspy.com|author=Oli Warner|date=2006-09-10 | accessdate=2006-09-10}}&lt;/ref&gt;&lt;/sup&gt;<br /> <br /> Further, previous versions of Norton Internet Security integrate deeply with the [[Microsoft Windows]] operating system, causing further uninstallation problems. [[Symantec]] has released the [http://service1.symantec.com/Support/tsgeninfo.nsf/docid/2005033108162039 Norton Removal Tool] to remove corrupted installations of Norton. <br /> <br /> ===Windows XP Service Pack 3===<br /> When a Norton 2008 product is installed, some people have encountered numerous invalid registry keys being added after upgrading to Windows XP Service Pack 3.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://tech.yahoo.com/blogs/null/94445|title=Windows XP Service Pack 3 problems continue|publisher=tech.yahoo.com|author=|date=2008-06-09 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;/sup&gt; Symantec initially blamed Microsoft for the problem but has since accepted partial responsibility.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;articleId=9088598/|title=Symantec pins blame for XP SP3 registry corruption on Microsoft|publisher=computerworld.com|author=Gregg Keizer|date=2008-05-23 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;/sup&gt;<br /> &lt;br /&gt;<br /> A fix for the problem is now available.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://solutions.symantec.com/sdccommon/asp/symcu_defcontent_view.asp?ssfromlink=true&amp;sprt_cid=df95cb1a-c77e-40b1-8777-f64024930c46&amp;docid=20080516112507EN|title=Problems occur after installing Windows XP Service Pack 3 or Windows Vista Service Pack 1 with a Norton 2008 product installed|publisher=symantec.com|author=|date=2008-06-17 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;/sup&gt;<br /> <br /> ==Independent assessments==<br /> <br /> *Norton Internet Security won ''PC Magazine'' editor's choice awards for 2007, 2008 and 2009.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://www.pcmag.com/article2/0,1759,2023974,00.asp|title=Norton Internet Security 2007 Review|publisher=pcmag.com|author=Neil J. Rubenking|date=2006-10-04 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://www.pcmag.com/article2/0,1759,2180639,00.asp|title=Norton Internet Security 2008 Review|publisher=pcmag.com|author=Neil J. Rubenking|date=2007-09-07 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://www.pcmag.com/article2/0,2817,2330018,00.asp|title=Norton Internet Security 2009 Review|publisher=pcmag.com|author=Neil J. Rubenking|date=2008-09-09 | accessdate=2008-09-30}}&lt;/ref&gt;&lt;/sup&gt;<br /> <br /> *PC World rated Norton Internet Security 2008 as the top performer among tested 2008 security suites.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://www.pcworld.com/article/id,139988/article.html|title=Norton Internet Security 2008 Review|publisher=pcworld.com|author=Erik Larkin|date=2007-11-29 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;/sup&gt;<br /> <br /> *PC World has also rated Norton Internet Security 2006 as a &quot;Best Buy&quot;. [http://www.symantec.com/about/news/release/article.jsp?prid=20060705_01]<br /> <br /> *PC PRO &quot;recommends&quot; Norton Internet Security 2009: [http://www.pcpro.co.uk/reviews/227709/norton-internet-security-2009.html?searchString=norton+2009 PCPRO]<br /> <br /> *CNET rated Norton Internet Security 2009 as 4/5. [http://reviews.cnet.com/internet-security-and-firewall/norton-internet-security-2009/4505-3667_7-33246586.html?tag=mncol;lst CNET]<br /> <br /> *PC World IDG gave Norton Internet Security 2009 a 4.5/5 rating.&quot; [http://www.pcworld.idg.com.au/index.php/taxid;2136212919;pid;6711;pt;1 PC World IDG]<br /> <br /> *Secunia tested 12 popular AntiVirus suites against 144 malicious files and 156 malicious web pages. Norton Internet Security 2009 leaded by detected 30.95% of all the exploits, including the files and malicious web pages.<br /> <br /> *According to AV-test.org, Norton 2008 excels in rootkit detection and removal; only product of the 34 tested to receive &quot;++&quot; in both rootkit detection and removal. [http://www.virusbtn.com/news/2008/03_13a.xml AV-test]<br /> <br /> *According to AV-test.org, Norton Internet Security 2009 ''beta'' detected 98.7% of malware.<br /> <br /> *According to AV-comparatives.org, Norton AntiVirus had &quot;few&quot; false positives.<br /> <br /> *According to AV-comparatives, an unreleased preview of Norton AntiVirus's improved heuristics would score ~41% in the May 2008 test compared to its current stable release's 18%. <br /> <br /> *PassMark Software was commissioned to benchmark Norton Antivirus 2009 and top security software competitors' performance impact on key metrics. Highlights from their findings include: Fastest install: installs in only 52 seconds, least working memory usage: uses less than 7MB, fastest quick scan: scans take 33 seconds. <br /> <br /> *According to AV-comparatives, Norton AntiVirus 2009 was the second fastest security suite overall. [http://www.av-comparatives.org/seiten/ergebnisse/performance2008a.pdf AV-comparatives Anti-Virus Comparative]<br /> <br /> *Norton AntiVirus 2008 is Certified by ICSA Labs. <br /> <br /> *Norton AntiVirus 2009 received the highest possible rating from Checkvir labs, &quot;Standard&quot;.<br /> <br /> *Norton AntiVirus 2009 received the highest possible rating from Checkvir labs, &quot;Standard&quot;, for detecting malware embedded within electronic mail. <br /> <br /> *Norton consecutively passed all VB100% tests since 1999. <br /> <br /> *Norton AntiVirus successfully detected 44% of malware with 4 week old signatures with &quot;few&quot; false positives. AV-comparatives gave Norton AntiVirus the &quot;Advanced&quot; rating. [http://av-comparatives.org/ AV-comparatives]<br /> <br /> *Cascadia Labs found that Norton 2009 was the only product tested that blocked all drive-by-downloads, fake online antivirus scanners, and fake video codec sites. [http://www.symantec.com/about/news/release/article.jsp?prid=20081208_01]<br /> <br /> *Norton Internet Security 2009 received ProtectStar, Inc. 1st place &quot;ProtectStar Award 2009&quot; [http://www.protectstar-testlab.org/award/protectstar-bigiss2009_eng.pdf ProtectStar big comparative test report]<br /> <br /> ''Note: Most test results for NIS apply for NAV and vice versa, except for firewall tests.''<br /> <br /> ==Gallery==<br /> The following pictures are screenshots of previous versions of Norton Internet Security.<br /> <br /> {|class=&quot;toccolours&quot; style=&quot;border-collapse:collapse;margin:0 auto;text-align:center;&quot; border=&quot;1&quot;<br /> |-<br /> | align=&quot;center&quot; valign=&quot;top&quot; style=&quot;width:33%;&quot;|[[Image:NIS.GIF|350px]]<br /> <br /> &lt;center&gt;Norton Internet Security 2005 AntiSpyware Edition&lt;center&gt;<br /> | align=&quot;center&quot; valign=&quot;top&quot; style=&quot;width:33%;&quot;|[[Image:NIS2006.jpg|350px]]<br /> <br /> &lt;center&gt;Norton Internet Security 2006&lt;/center&gt;<br /> |-<br /> | align=&quot;center&quot; valign=&quot;top&quot; style=&quot;width:33%;&quot;|[[Image:NIS 2007 WinXP.PNG|350px]]<br /> <br /> &lt;center&gt;Norton Internet Security 2007&lt;/center&gt;<br /> | align=&quot;center&quot; valign=&quot;top&quot; style=&quot;width:33%;&quot;|[[Image:NIS 2008 Vista.png|350px]]<br /> <br /> &lt;center&gt;Norton Internet Security 2008&lt;center&gt;<br /> |-<br /> | align=&quot;center&quot; valign=&quot;top&quot; style=&quot;width:33%;&quot;|[[Image:Norton Internet Security.png|350px]]<br /> <br /> &lt;center&gt;Norton Internet Security 2009&lt;/center&gt;<br /> |}<br /> <br /> ==See also==<br /> *[[Symantec]]<br /> *[[Norton AntiVirus]]<br /> *[[Antivirus]]<br /> *[[List of antivirus software]]<br /> <br /> == References ==<br /> &lt;references /&gt;<br /> <br /> {{Symantec}}<br /> <br /> [[Category:Symantec software]]<br /> [[Category:Antivirus software]]<br /> [[Category:Malware]]<br /> [[Category:Proprietary software]]<br /> <br /> [[ar:نورتن إنترنت سكيورتي]]<br /> [[de:Norton Internet Security]]<br /> [[it:Norton Internet Security]]<br /> [[ja:ノートン・インターネットセキュリティ]]<br /> [[pl:Norton Internet Security]]<br /> [[zh:諾頓網絡安全大師]]</div> PPrakash https://en.wikipedia.org/w/index.php?title=Norton_Internet_Security&diff=261883544 Norton Internet Security 2009-01-04T12:51:16Z <p>PPrakash: /* Version 2009 (16.0) */</p> <hr /> <div>{{Infobox Software<br /> | name = Norton Internet Security<br /> | logo = [[Image:Norton AntiVirus logo.jpg]]<br /> | screenshot = [[Image:Norton Internet Security.png|300px|center|Norton Internet Security Screenshot]]<br /> | caption = Norton Internet Security 2009<br /> | developer = [[Symantec Corporation]]<br /> | latest_release_version = 2009 or 16.2.0.7 (Windows Edition), 4.0 (Mac Edition)<br /> | latest_preview_version = <br /> | latest_preview_date =<br /> | operating_system = [[Microsoft Windows]], [[Mac OS X]]<br /> | genre = Security Suite<br /> | license = [[Proprietary software|Proprietary]]<br /> | website = [http://www.symantec.com/ Symantec.com]<br /> }}<br /> <br /> '''Norton Internet Security''' (NIS) is a computer utility suite made by [[Symantec Corporation]], with a focus on providing comprehensive [[Internet]] protection. It is available for both [[Microsoft Windows]] and [[Mac OS X]]. It is one of Symantec's flagship products.<br /> <br /> == Features ==<br /> ===Included software===<br /> On both platforms, Norton Internet Security is a combination of [[Norton AntiVirus]], [[Norton Personal Firewall]], and Norton Confidential. In an optional add-on package which can be downloaded from the official website, the Windows version adds Norton AntiSpam, while the Mac OS version adds [[Allume Systems]]' iClean, providing many of the same features. The 2007 add-on package also included parental controls, privacy controls, pop-up blocking, and ad blocking; later versions of the add-on package does not include the latter two features.<br /> <br /> The recent version of Norton Internet Security for Macintosh, 4.0, is compatible with [[Mac OS X 10.5]] and is a [[universal binary]].&lt;ref&gt;http://www.macworld.com/article/137650/norton.html&lt;/ref&gt;<br /> <br /> == Version history (Windows) ==<br /> ===Version 2006 and previous===<br /> <br /> Norton Internet Security 2006 included Norton AntiVirus, Norton Personal Firewall, Norton AntiSpam and Norton Parental Control. Although with the release of Windows [[Internet Explorer 7]], the main [[Graphical user interface|GUI]] of Norton Internet Security 2006 and previous versions encountered several scripting errors, the current version of Norton Internet Security, however, fully supports IE7 and MSDN (Microsoft Developer Network) has [http://forums.microsoft.com/MSDN/ShowPost.aspx?PostID=923893&amp;SiteID=1 a discussion thread on how to resolve this issue.].<br /> <br /> ===Version 2007 (14.0)===<br /> After many years of customer complaints regarding the speed and system utilization of the product, Symantec responded in 2007 with a much needed rewrite of the code to make the product lighter and faster, although it still uses more disk space than competitors and is frequently a source of severe system performance issues.&lt;ref&gt;[http://reviews.cnet.com/internet-security-and-firewall/norton-internet-security-2007/4505-3667_7-32069538.html Norton Internet Security 2007 Internet security and firewall reviews - CNET Reviews&lt;!-- Bot generated title --&gt;]&lt;/ref&gt;<br /> <br /> ===Version 2008 (15.0)===<br /> The 2008 version was released on August 28, 2007. It has several new features including [[SONAR (Symantec)|SONAR]] (Symantec Online Network for Advanced Response) technology, Browser Defender (Internet Explorer Exploit Protection) and [[Norton Identity Safe]].<br /> <br /> Shortly after NIS 2008 was released, Symantec released a 2008 [http://service1.symantec.com/SUPPORT/norton2008.nsf/0/38d6ac68e6e6e9ff65257344007de8bc?OpenDocument add-on package]. This is essentially the same path Symantec took with the 2007 product line; the 2008 package adds features such as anti-spam and parental controls. Notably, the 2008 package does not include the ad blocking and pop-up blocking features that were included in the 2007 add-on package.<br /> <br /> ===Version 2009 (16.0)===<br /> <br /> The 2009 version was released on September 8, 2008. It uses a new software architecture which boosts the software speed. It has some new features including Silent Mode, Smart Idle Time Scheduler, Program Trust, a CPU/Memory usage monitor, and Norton Insight which uses data from a global network to predetermine if a file is safe.<br /> <br /> Symantec claims that Norton 2009 is the fastest amongst its predecessors and in the world because of its new architecture that reduces the boot time impact, the scan time, the memory usage as well as the system footprint and the install time. Redundancies have been removed, slimming the installation size from 300 megabytes in 2006 to less than 100 megabytes.&lt;sup&gt;&lt;ref&gt;[http://netsecurity.about.com/od/readproductreviews/gr/nis2009.htm|title=Norton Internet Security 2009|publisher=about.com|author=Tony Bradley]&lt;/ref&gt;&lt;/sup&gt;<br /> <br /> ====Response to Malware====<br /> <br /> Symantec introduced a new technology called &quot;pulse updates&quot; to Norton AntiVirus 2009. These updates are designed to deliver incremental updates every 5 to 15 minutes to ensure customers are kept up-to-date on threats without slowing down their computer with a large batch update. According to AV-test, Norton Internet Security 2009 beta received 6,202 updates over a four-week period. <br /> <br /> Norton AntiVirus 2009 introduced a new technology, dubbed &quot;Bloodhound&quot;. It analyzes files in on-demand scanning for unknown, zero-day, or intentionally mutated malware. According to AV-Comparatives, an unreleased beta of Bloodhound would detect ~41% of malware with one month old signatures, compared to 18% the then current, or 2008 release, detected. The current release of Bloodhound detected 44% of malware without updates for four weeks with &quot;few&quot; false positives, earning the &quot;Advanced&quot; rating from AV-Comparatives. <br /> <br /> Another implemented technology is SONAR, or Symantec Online Network for Advanced Response. It monitors processes in real-time for any signs of suspicious activity using over 300 different parameters, such as whether it creates a Add/Remove Programs entry. It is standard on all 2008 and later products. It is available as an free add-on for 2007 products.<br /> <br /> ====Norton Insight====<br /> Yet another technique introduced in the 2009 product line is Norton Insight. Each process is heuristically analyzed and its safety is rated on a scale of 1 through 5 stars. It also calculates and collects the SHA256 value of all running processes, along with their dependencies. The SHA256 values are then forwarded to remote servers, which leverage information about running processes from over 65 million Norton community users. The server then reports back to the client's computer with information about safe, or trusted processes and their dependencies. Safe processes are a) present on the majority of participating Norton Community user computers, b) naively trusted by Norton, or c) digitally signed, depending on the level of trust specified by the user. Standard Trust only trusts files that have been validated by Symantec’s secure backend systems. High Trust will also trust files that are signed, and the signature is validated against the machine’s local certificate store. This industry-first whitelisting technology allows Norton to perform scans faster and focus more on untrusted and unknown processes. <br /> <br /> The heuristic detection sensitivity threshold is also be greatly increased with Norton Insight technology. Typically, raising the heuristic sensitivity results in more false positives. However, Norton Insight's complied list trusted applications are excluded from heuristic scanning, which further saves time, processing power, and decreases the likelihood of false positives <br /> <br /> The technology also makes commonly used “allow/deny” pop-ups unnecessary because Norton Insight relies on a global network of users, rather than an individual user's existing knowledge. <br /> <br /> Norton Insight also employees a number of tamper protection features to ensure its integrity. Upon startup, Norton analyzes the NTFS file system, and if it detects any changes it could not account for, all the trust values of the files on the system are instantly revoked. Its kernel mode device driver technology instantaneously revokes file trust attributes the moment the file is modified. All information is stored in a secure high performance product-specific database.<br /> <br /> In the case of a mistake, a revocation mechanism was implemented, where clients receive a list of revoked SHA256 values via LiveUpdate. If the client has a file matching a SHA256 and is currently trusting that file, all trust is revoked, and the file is once again scanned. [http://community.norton.com/t5/Norton-Protection-Blog/Norton-Insight-A-solution-to-performance-improvement-without/ba-p/20642 Norton Protection Blog]<br /> <br /> ===Norton Internet Security for Mac 4.0===<br /> <br /> Norton Internet Security 4.0 for the Mac includes antimalware, firewall, antiphishing and online Web-threat protection for the Mac OS X 10.4 &quot;Tiger&quot; and 10.5 &quot;Leopard&quot; platforms. The package includes security-based updates from Symantec that address vulnerabilities found in the Apple operating system or applications such as Quicktime, sometimes prior to Apple releasing updates. In addition, Norton Internet Security 4.0 for Mac contains a file-lockdown feature called FileGuard that lets users decide which files they may want to prevent from being opened or copied. The software also makes use of Symantec's DeepSight sensor's honeypot technology that identifies IP addresses linked to malicious Web sites, and proactively warns consumers about accessing infected sites. [http://www.macobserver.com/tmo/review/norton_internet_security_4_a_comprehensive_suite/][http://www.networkworld.com/news/2008/121808-symantec-norten-internet-securit.html?page=2]<br /> <br /> ==Criticisms==<br /> Many of the criticisms leveled at earlier versions of [[Norton AntiVirus]], including being slow, inefficient and difficult to uninstall, can also be leveled at Norton Internet Security due to its integration of [[Norton AntiVirus]]. In September 2006, [http://www.thepcspy.com ThePCSpy.com] did two studies covering several thorough tests to find out what programs slowed down [[Microsoft Windows]] most. Norton Internet Security 2006 was the number one cause of a slow PC in both tests, with Norton Internet Security 2007 being the number three cause in the second test.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://www.thepcspy.com/articles/other/what_really_slows_windows_down/|title=What Really Slows Windows Down|publisher=thepcspy.com|author=Oli Warner|date=2006-09-22 | accessdate=2006-09-24}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://www.thepcspy.com/articles/other/what_slows_windows_down/|title=What Slows Windows Down|publisher=thepcspy.com|author=Oli Warner|date=2006-09-10 | accessdate=2006-09-10}}&lt;/ref&gt;&lt;/sup&gt;<br /> <br /> Further, previous versions of Norton Internet Security integrate deeply with the [[Microsoft Windows]] operating system, causing further uninstallation problems. [[Symantec]] has released the [http://service1.symantec.com/Support/tsgeninfo.nsf/docid/2005033108162039 Norton Removal Tool] to remove corrupted installations of Norton. <br /> <br /> ===Windows XP Service Pack 3===<br /> When a Norton 2008 product is installed, some people have encountered numerous invalid registry keys being added after upgrading to Windows XP Service Pack 3.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://tech.yahoo.com/blogs/null/94445|title=Windows XP Service Pack 3 problems continue|publisher=tech.yahoo.com|author=|date=2008-06-09 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;/sup&gt; Symantec initially blamed Microsoft for the problem but has since accepted partial responsibility.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;articleId=9088598/|title=Symantec pins blame for XP SP3 registry corruption on Microsoft|publisher=computerworld.com|author=Gregg Keizer|date=2008-05-23 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;/sup&gt;<br /> &lt;br /&gt;<br /> A fix for the problem is now available.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://solutions.symantec.com/sdccommon/asp/symcu_defcontent_view.asp?ssfromlink=true&amp;sprt_cid=df95cb1a-c77e-40b1-8777-f64024930c46&amp;docid=20080516112507EN|title=Problems occur after installing Windows XP Service Pack 3 or Windows Vista Service Pack 1 with a Norton 2008 product installed|publisher=symantec.com|author=|date=2008-06-17 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;/sup&gt;<br /> <br /> ==Independent assessments==<br /> <br /> *Norton Internet Security won ''PC Magazine'' editor's choice awards for 2007, 2008 and 2009.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://www.pcmag.com/article2/0,1759,2023974,00.asp|title=Norton Internet Security 2007 Review|publisher=pcmag.com|author=Neil J. Rubenking|date=2006-10-04 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://www.pcmag.com/article2/0,1759,2180639,00.asp|title=Norton Internet Security 2008 Review|publisher=pcmag.com|author=Neil J. Rubenking|date=2007-09-07 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://www.pcmag.com/article2/0,2817,2330018,00.asp|title=Norton Internet Security 2009 Review|publisher=pcmag.com|author=Neil J. Rubenking|date=2008-09-09 | accessdate=2008-09-30}}&lt;/ref&gt;&lt;/sup&gt;<br /> <br /> *PC World rated Norton Internet Security 2008 as the top performer among tested 2008 security suites.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://www.pcworld.com/article/id,139988/article.html|title=Norton Internet Security 2008 Review|publisher=pcworld.com|author=Erik Larkin|date=2007-11-29 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;/sup&gt;<br /> <br /> *PC World has also rated Norton Internet Security 2006 as a &quot;Best Buy&quot;. [http://www.symantec.com/about/news/release/article.jsp?prid=20060705_01]<br /> <br /> *PC PRO &quot;recommends&quot; Norton Internet Security 2009: [http://www.pcpro.co.uk/reviews/227709/norton-internet-security-2009.html?searchString=norton+2009 PCPRO]<br /> <br /> *CNET rated Norton Internet Security 2009 as 4/5. [http://reviews.cnet.com/internet-security-and-firewall/norton-internet-security-2009/4505-3667_7-33246586.html?tag=mncol;lst CNET]<br /> <br /> *PC World IDG gave Norton Internet Security 2009 a 4.5/5 rating.&quot; [http://www.pcworld.idg.com.au/index.php/taxid;2136212919;pid;6711;pt;1 PC World IDG]<br /> <br /> *Secunia tested 12 popular AntiVirus suites against 144 malicious files and 156 malicious web pages. Norton Internet Security 2009 leaded by detected 30.95% of all the exploits, including the files and malicious web pages.<br /> <br /> *According to AV-test.org, Norton 2008 excels in rootkit detection and removal; only product of the 34 tested to receive &quot;++&quot; in both rootkit detection and removal. [http://www.virusbtn.com/news/2008/03_13a.xml AV-test]<br /> <br /> *According to AV-test.org, Norton Internet Security 2009 ''beta'' detected 98.7% of malware.<br /> <br /> *According to AV-comparatives.org, Norton AntiVirus had &quot;few&quot; false positives.<br /> <br /> *According to AV-comparatives, an unreleased preview of Norton AntiVirus's improved heuristics would score ~41% in the May 2008 test compared to its current stable release's 18%. <br /> <br /> *PassMark Software was commissioned to benchmark Norton Antivirus 2009 and top security software competitors' performance impact on key metrics. Highlights from their findings include: Fastest install: installs in only 52 seconds, least working memory usage: uses less than 7MB, fastest quick scan: scans take 33 seconds. <br /> <br /> *According to AV-comparatives, Norton AntiVirus 2009 was the second fastest security suite overall. [http://www.av-comparatives.org/seiten/ergebnisse/performance2008a.pdf AV-comparatives Anti-Virus Comparative]<br /> <br /> *Norton AntiVirus 2008 is Certified by ICSA Labs. <br /> <br /> *Norton AntiVirus 2009 received the highest possible rating from Checkvir labs, &quot;Standard&quot;.<br /> <br /> *Norton AntiVirus 2009 received the highest possible rating from Checkvir labs, &quot;Standard&quot;, for detecting malware embedded within electronic mail. <br /> <br /> *Norton consecutively passed all VB100% tests since 1999. <br /> <br /> *Norton AntiVirus successfully detected 44% of malware with 4 week old signatures with &quot;few&quot; false positives. AV-comparatives gave Norton AntiVirus the &quot;Advanced&quot; rating. [http://av-comparatives.org/ AV-comparatives]<br /> <br /> *Cascadia Labs found that Norton 2009 was the only product tested that blocked all drive-by-downloads, fake online antivirus scanners, and fake video codec sites. [http://www.symantec.com/about/news/release/article.jsp?prid=20081208_01]<br /> <br /> *Norton Internet Security 2009 received ProtectStar, Inc. 1st place &quot;ProtectStar Award 2009&quot; [http://www.protectstar-testlab.org/award/protectstar-bigiss2009_eng.pdf ProtectStar big comparative test report]<br /> <br /> ''Note: Most test results for NIS apply for NAV and vice versa, except for firewall tests.''<br /> <br /> ==Gallery==<br /> The following pictures are screenshots of previous versions of Norton Internet Security.<br /> <br /> {|class=&quot;toccolours&quot; style=&quot;border-collapse:collapse;margin:0 auto;text-align:center;&quot; border=&quot;1&quot;<br /> |-<br /> | align=&quot;center&quot; valign=&quot;top&quot; style=&quot;width:33%;&quot;|[[Image:NIS.GIF|350px]]<br /> <br /> &lt;center&gt;Norton Internet Security 2005 AntiSpyware Edition&lt;center&gt;<br /> | align=&quot;center&quot; valign=&quot;top&quot; style=&quot;width:33%;&quot;|[[Image:NIS2006.jpg|350px]]<br /> <br /> &lt;center&gt;Norton Internet Security 2006&lt;/center&gt;<br /> |-<br /> | align=&quot;center&quot; valign=&quot;top&quot; style=&quot;width:33%;&quot;|[[Image:NIS 2007 WinXP.PNG|350px]]<br /> <br /> &lt;center&gt;Norton Internet Security 2007&lt;/center&gt;<br /> | align=&quot;center&quot; valign=&quot;top&quot; style=&quot;width:33%;&quot;|[[Image:NIS 2008 Vista.png|350px]]<br /> <br /> &lt;center&gt;Norton Internet Security 2008&lt;center&gt;<br /> |-<br /> | align=&quot;center&quot; valign=&quot;top&quot; style=&quot;width:33%;&quot;|[[Image:Norton Internet Security.png|350px]]<br /> <br /> &lt;center&gt;Norton Internet Security 2009&lt;/center&gt;<br /> |}<br /> <br /> ==See also==<br /> *[[Symantec]]<br /> *[[Norton AntiVirus]]<br /> *[[Antivirus]]<br /> *[[List of antivirus software]]<br /> <br /> == References ==<br /> &lt;references /&gt;<br /> <br /> {{Symantec}}<br /> <br /> [[Category:Symantec software]]<br /> [[Category:Antivirus software]]<br /> [[Category:Malware]]<br /> [[Category:Proprietary software]]<br /> <br /> [[ar:نورتن إنترنت سكيورتي]]<br /> [[de:Norton Internet Security]]<br /> [[it:Norton Internet Security]]<br /> [[ja:ノートン・インターネットセキュリティ]]<br /> [[pl:Norton Internet Security]]<br /> [[zh:諾頓網絡安全大師]]</div> PPrakash https://en.wikipedia.org/w/index.php?title=Norton_Internet_Security&diff=261883430 Norton Internet Security 2009-01-04T12:50:19Z <p>PPrakash: /* Version 2009 (16.0) */</p> <hr /> <div>{{Infobox Software<br /> | name = Norton Internet Security<br /> | logo = [[Image:Norton AntiVirus logo.jpg]]<br /> | screenshot = [[Image:Norton Internet Security.png|300px|center|Norton Internet Security Screenshot]]<br /> | caption = Norton Internet Security 2009<br /> | developer = [[Symantec Corporation]]<br /> | latest_release_version = 2009 or 16.2.0.7 (Windows Edition), 4.0 (Mac Edition)<br /> | latest_preview_version = <br /> | latest_preview_date =<br /> | operating_system = [[Microsoft Windows]], [[Mac OS X]]<br /> | genre = Security Suite<br /> | license = [[Proprietary software|Proprietary]]<br /> | website = [http://www.symantec.com/ Symantec.com]<br /> }}<br /> <br /> '''Norton Internet Security''' (NIS) is a computer utility suite made by [[Symantec Corporation]], with a focus on providing comprehensive [[Internet]] protection. It is available for both [[Microsoft Windows]] and [[Mac OS X]]. It is one of Symantec's flagship products.<br /> <br /> == Features ==<br /> ===Included software===<br /> On both platforms, Norton Internet Security is a combination of [[Norton AntiVirus]], [[Norton Personal Firewall]], and Norton Confidential. In an optional add-on package which can be downloaded from the official website, the Windows version adds Norton AntiSpam, while the Mac OS version adds [[Allume Systems]]' iClean, providing many of the same features. The 2007 add-on package also included parental controls, privacy controls, pop-up blocking, and ad blocking; later versions of the add-on package does not include the latter two features.<br /> <br /> The recent version of Norton Internet Security for Macintosh, 4.0, is compatible with [[Mac OS X 10.5]] and is a [[universal binary]].&lt;ref&gt;http://www.macworld.com/article/137650/norton.html&lt;/ref&gt;<br /> <br /> == Version history (Windows) ==<br /> ===Version 2006 and previous===<br /> <br /> Norton Internet Security 2006 included Norton AntiVirus, Norton Personal Firewall, Norton AntiSpam and Norton Parental Control. Although with the release of Windows [[Internet Explorer 7]], the main [[Graphical user interface|GUI]] of Norton Internet Security 2006 and previous versions encountered several scripting errors, the current version of Norton Internet Security, however, fully supports IE7 and MSDN (Microsoft Developer Network) has [http://forums.microsoft.com/MSDN/ShowPost.aspx?PostID=923893&amp;SiteID=1 a discussion thread on how to resolve this issue.].<br /> <br /> ===Version 2007 (14.0)===<br /> After many years of customer complaints regarding the speed and system utilization of the product, Symantec responded in 2007 with a much needed rewrite of the code to make the product lighter and faster, although it still uses more disk space than competitors and is frequently a source of severe system performance issues.&lt;ref&gt;[http://reviews.cnet.com/internet-security-and-firewall/norton-internet-security-2007/4505-3667_7-32069538.html Norton Internet Security 2007 Internet security and firewall reviews - CNET Reviews&lt;!-- Bot generated title --&gt;]&lt;/ref&gt;<br /> <br /> ===Version 2008 (15.0)===<br /> The 2008 version was released on August 28, 2007. It has several new features including [[SONAR (Symantec)|SONAR]] (Symantec Online Network for Advanced Response) technology, Browser Defender (Internet Explorer Exploit Protection) and [[Norton Identity Safe]].<br /> <br /> Shortly after NIS 2008 was released, Symantec released a 2008 [http://service1.symantec.com/SUPPORT/norton2008.nsf/0/38d6ac68e6e6e9ff65257344007de8bc?OpenDocument add-on package]. This is essentially the same path Symantec took with the 2007 product line; the 2008 package adds features such as anti-spam and parental controls. Notably, the 2008 package does not include the ad blocking and pop-up blocking features that were included in the 2007 add-on package.<br /> <br /> ===Version 2009 (16.0)===<br /> <br /> The 2009 version was released on September 8, 2008. It uses a new software architecture which boosts the software speed. It has some new features including Silent Mode, Smart Idle Time Scheduler, Program Trust, a CPU/Memory usage monitor, and Norton Insight which uses data from a global network to predetermine if a file is safe.<br /> <br /> Symantec claims that Norton 2009 is the fastest amongst its predecessors and in the world because of its new architecture that reduces the boot time impact, the scan time, the memory usage as well as the system footprint and the install time. Redundancies have been removed, slimming the installation size from 300 megabytes in 2006 to less than 100 megabytes.&lt;sup&gt;&lt;ref&gt;[http://netsecurity.about.com/od/readproductreviews/gr/nis2009.htm|title=Norton Internet Security 2009|publisher=about.com|author=Tony Bradley&lt;/ref&gt;&lt;/sup&gt;<br /> <br /> ====Response to Malware====<br /> <br /> Symantec introduced a new technology called &quot;pulse updates&quot; to Norton AntiVirus 2009. These updates are designed to deliver incremental updates every 5 to 15 minutes to ensure customers are kept up-to-date on threats without slowing down their computer with a large batch update. According to AV-test, Norton Internet Security 2009 beta received 6,202 updates over a four-week period. <br /> <br /> Norton AntiVirus 2009 introduced a new technology, dubbed &quot;Bloodhound&quot;. It analyzes files in on-demand scanning for unknown, zero-day, or intentionally mutated malware. According to AV-Comparatives, an unreleased beta of Bloodhound would detect ~41% of malware with one month old signatures, compared to 18% the then current, or 2008 release, detected. The current release of Bloodhound detected 44% of malware without updates for four weeks with &quot;few&quot; false positives, earning the &quot;Advanced&quot; rating from AV-Comparatives. <br /> <br /> Another implemented technology is SONAR, or Symantec Online Network for Advanced Response. It monitors processes in real-time for any signs of suspicious activity using over 300 different parameters, such as whether it creates a Add/Remove Programs entry. It is standard on all 2008 and later products. It is available as an free add-on for 2007 products.<br /> <br /> ====Norton Insight====<br /> Yet another technique introduced in the 2009 product line is Norton Insight. Each process is heuristically analyzed and its safety is rated on a scale of 1 through 5 stars. It also calculates and collects the SHA256 value of all running processes, along with their dependencies. The SHA256 values are then forwarded to remote servers, which leverage information about running processes from over 65 million Norton community users. The server then reports back to the client's computer with information about safe, or trusted processes and their dependencies. Safe processes are a) present on the majority of participating Norton Community user computers, b) naively trusted by Norton, or c) digitally signed, depending on the level of trust specified by the user. Standard Trust only trusts files that have been validated by Symantec’s secure backend systems. High Trust will also trust files that are signed, and the signature is validated against the machine’s local certificate store. This industry-first whitelisting technology allows Norton to perform scans faster and focus more on untrusted and unknown processes. <br /> <br /> The heuristic detection sensitivity threshold is also be greatly increased with Norton Insight technology. Typically, raising the heuristic sensitivity results in more false positives. However, Norton Insight's complied list trusted applications are excluded from heuristic scanning, which further saves time, processing power, and decreases the likelihood of false positives <br /> <br /> The technology also makes commonly used “allow/deny” pop-ups unnecessary because Norton Insight relies on a global network of users, rather than an individual user's existing knowledge. <br /> <br /> Norton Insight also employees a number of tamper protection features to ensure its integrity. Upon startup, Norton analyzes the NTFS file system, and if it detects any changes it could not account for, all the trust values of the files on the system are instantly revoked. Its kernel mode device driver technology instantaneously revokes file trust attributes the moment the file is modified. All information is stored in a secure high performance product-specific database.<br /> <br /> In the case of a mistake, a revocation mechanism was implemented, where clients receive a list of revoked SHA256 values via LiveUpdate. If the client has a file matching a SHA256 and is currently trusting that file, all trust is revoked, and the file is once again scanned. [http://community.norton.com/t5/Norton-Protection-Blog/Norton-Insight-A-solution-to-performance-improvement-without/ba-p/20642 Norton Protection Blog]<br /> <br /> ===Norton Internet Security for Mac 4.0===<br /> <br /> Norton Internet Security 4.0 for the Mac includes antimalware, firewall, antiphishing and online Web-threat protection for the Mac OS X 10.4 &quot;Tiger&quot; and 10.5 &quot;Leopard&quot; platforms. The package includes security-based updates from Symantec that address vulnerabilities found in the Apple operating system or applications such as Quicktime, sometimes prior to Apple releasing updates. In addition, Norton Internet Security 4.0 for Mac contains a file-lockdown feature called FileGuard that lets users decide which files they may want to prevent from being opened or copied. The software also makes use of Symantec's DeepSight sensor's honeypot technology that identifies IP addresses linked to malicious Web sites, and proactively warns consumers about accessing infected sites. [http://www.macobserver.com/tmo/review/norton_internet_security_4_a_comprehensive_suite/][http://www.networkworld.com/news/2008/121808-symantec-norten-internet-securit.html?page=2]<br /> <br /> ==Criticisms==<br /> Many of the criticisms leveled at earlier versions of [[Norton AntiVirus]], including being slow, inefficient and difficult to uninstall, can also be leveled at Norton Internet Security due to its integration of [[Norton AntiVirus]]. In September 2006, [http://www.thepcspy.com ThePCSpy.com] did two studies covering several thorough tests to find out what programs slowed down [[Microsoft Windows]] most. Norton Internet Security 2006 was the number one cause of a slow PC in both tests, with Norton Internet Security 2007 being the number three cause in the second test.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://www.thepcspy.com/articles/other/what_really_slows_windows_down/|title=What Really Slows Windows Down|publisher=thepcspy.com|author=Oli Warner|date=2006-09-22 | accessdate=2006-09-24}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://www.thepcspy.com/articles/other/what_slows_windows_down/|title=What Slows Windows Down|publisher=thepcspy.com|author=Oli Warner|date=2006-09-10 | accessdate=2006-09-10}}&lt;/ref&gt;&lt;/sup&gt;<br /> <br /> Further, previous versions of Norton Internet Security integrate deeply with the [[Microsoft Windows]] operating system, causing further uninstallation problems. [[Symantec]] has released the [http://service1.symantec.com/Support/tsgeninfo.nsf/docid/2005033108162039 Norton Removal Tool] to remove corrupted installations of Norton. <br /> <br /> ===Windows XP Service Pack 3===<br /> When a Norton 2008 product is installed, some people have encountered numerous invalid registry keys being added after upgrading to Windows XP Service Pack 3.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://tech.yahoo.com/blogs/null/94445|title=Windows XP Service Pack 3 problems continue|publisher=tech.yahoo.com|author=|date=2008-06-09 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;/sup&gt; Symantec initially blamed Microsoft for the problem but has since accepted partial responsibility.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;articleId=9088598/|title=Symantec pins blame for XP SP3 registry corruption on Microsoft|publisher=computerworld.com|author=Gregg Keizer|date=2008-05-23 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;/sup&gt;<br /> &lt;br /&gt;<br /> A fix for the problem is now available.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://solutions.symantec.com/sdccommon/asp/symcu_defcontent_view.asp?ssfromlink=true&amp;sprt_cid=df95cb1a-c77e-40b1-8777-f64024930c46&amp;docid=20080516112507EN|title=Problems occur after installing Windows XP Service Pack 3 or Windows Vista Service Pack 1 with a Norton 2008 product installed|publisher=symantec.com|author=|date=2008-06-17 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;/sup&gt;<br /> <br /> ==Independent assessments==<br /> <br /> *Norton Internet Security won ''PC Magazine'' editor's choice awards for 2007, 2008 and 2009.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://www.pcmag.com/article2/0,1759,2023974,00.asp|title=Norton Internet Security 2007 Review|publisher=pcmag.com|author=Neil J. Rubenking|date=2006-10-04 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://www.pcmag.com/article2/0,1759,2180639,00.asp|title=Norton Internet Security 2008 Review|publisher=pcmag.com|author=Neil J. Rubenking|date=2007-09-07 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://www.pcmag.com/article2/0,2817,2330018,00.asp|title=Norton Internet Security 2009 Review|publisher=pcmag.com|author=Neil J. Rubenking|date=2008-09-09 | accessdate=2008-09-30}}&lt;/ref&gt;&lt;/sup&gt;<br /> <br /> *PC World rated Norton Internet Security 2008 as the top performer among tested 2008 security suites.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://www.pcworld.com/article/id,139988/article.html|title=Norton Internet Security 2008 Review|publisher=pcworld.com|author=Erik Larkin|date=2007-11-29 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;/sup&gt;<br /> <br /> *PC World has also rated Norton Internet Security 2006 as a &quot;Best Buy&quot;. [http://www.symantec.com/about/news/release/article.jsp?prid=20060705_01]<br /> <br /> *PC PRO &quot;recommends&quot; Norton Internet Security 2009: [http://www.pcpro.co.uk/reviews/227709/norton-internet-security-2009.html?searchString=norton+2009 PCPRO]<br /> <br /> *CNET rated Norton Internet Security 2009 as 4/5. [http://reviews.cnet.com/internet-security-and-firewall/norton-internet-security-2009/4505-3667_7-33246586.html?tag=mncol;lst CNET]<br /> <br /> *PC World IDG gave Norton Internet Security 2009 a 4.5/5 rating.&quot; [http://www.pcworld.idg.com.au/index.php/taxid;2136212919;pid;6711;pt;1 PC World IDG]<br /> <br /> *Secunia tested 12 popular AntiVirus suites against 144 malicious files and 156 malicious web pages. Norton Internet Security 2009 leaded by detected 30.95% of all the exploits, including the files and malicious web pages.<br /> <br /> *According to AV-test.org, Norton 2008 excels in rootkit detection and removal; only product of the 34 tested to receive &quot;++&quot; in both rootkit detection and removal. [http://www.virusbtn.com/news/2008/03_13a.xml AV-test]<br /> <br /> *According to AV-test.org, Norton Internet Security 2009 ''beta'' detected 98.7% of malware.<br /> <br /> *According to AV-comparatives.org, Norton AntiVirus had &quot;few&quot; false positives.<br /> <br /> *According to AV-comparatives, an unreleased preview of Norton AntiVirus's improved heuristics would score ~41% in the May 2008 test compared to its current stable release's 18%. <br /> <br /> *PassMark Software was commissioned to benchmark Norton Antivirus 2009 and top security software competitors' performance impact on key metrics. Highlights from their findings include: Fastest install: installs in only 52 seconds, least working memory usage: uses less than 7MB, fastest quick scan: scans take 33 seconds. <br /> <br /> *According to AV-comparatives, Norton AntiVirus 2009 was the second fastest security suite overall. [http://www.av-comparatives.org/seiten/ergebnisse/performance2008a.pdf AV-comparatives Anti-Virus Comparative]<br /> <br /> *Norton AntiVirus 2008 is Certified by ICSA Labs. <br /> <br /> *Norton AntiVirus 2009 received the highest possible rating from Checkvir labs, &quot;Standard&quot;.<br /> <br /> *Norton AntiVirus 2009 received the highest possible rating from Checkvir labs, &quot;Standard&quot;, for detecting malware embedded within electronic mail. <br /> <br /> *Norton consecutively passed all VB100% tests since 1999. <br /> <br /> *Norton AntiVirus successfully detected 44% of malware with 4 week old signatures with &quot;few&quot; false positives. AV-comparatives gave Norton AntiVirus the &quot;Advanced&quot; rating. [http://av-comparatives.org/ AV-comparatives]<br /> <br /> *Cascadia Labs found that Norton 2009 was the only product tested that blocked all drive-by-downloads, fake online antivirus scanners, and fake video codec sites. [http://www.symantec.com/about/news/release/article.jsp?prid=20081208_01]<br /> <br /> *Norton Internet Security 2009 received ProtectStar, Inc. 1st place &quot;ProtectStar Award 2009&quot; [http://www.protectstar-testlab.org/award/protectstar-bigiss2009_eng.pdf ProtectStar big comparative test report]<br /> <br /> ''Note: Most test results for NIS apply for NAV and vice versa, except for firewall tests.''<br /> <br /> ==Gallery==<br /> The following pictures are screenshots of previous versions of Norton Internet Security.<br /> <br /> {|class=&quot;toccolours&quot; style=&quot;border-collapse:collapse;margin:0 auto;text-align:center;&quot; border=&quot;1&quot;<br /> |-<br /> | align=&quot;center&quot; valign=&quot;top&quot; style=&quot;width:33%;&quot;|[[Image:NIS.GIF|350px]]<br /> <br /> &lt;center&gt;Norton Internet Security 2005 AntiSpyware Edition&lt;center&gt;<br /> | align=&quot;center&quot; valign=&quot;top&quot; style=&quot;width:33%;&quot;|[[Image:NIS2006.jpg|350px]]<br /> <br /> &lt;center&gt;Norton Internet Security 2006&lt;/center&gt;<br /> |-<br /> | align=&quot;center&quot; valign=&quot;top&quot; style=&quot;width:33%;&quot;|[[Image:NIS 2007 WinXP.PNG|350px]]<br /> <br /> &lt;center&gt;Norton Internet Security 2007&lt;/center&gt;<br /> | align=&quot;center&quot; valign=&quot;top&quot; style=&quot;width:33%;&quot;|[[Image:NIS 2008 Vista.png|350px]]<br /> <br /> &lt;center&gt;Norton Internet Security 2008&lt;center&gt;<br /> |-<br /> | align=&quot;center&quot; valign=&quot;top&quot; style=&quot;width:33%;&quot;|[[Image:Norton Internet Security.png|350px]]<br /> <br /> &lt;center&gt;Norton Internet Security 2009&lt;/center&gt;<br /> |}<br /> <br /> ==See also==<br /> *[[Symantec]]<br /> *[[Norton AntiVirus]]<br /> *[[Antivirus]]<br /> *[[List of antivirus software]]<br /> <br /> == References ==<br /> &lt;references /&gt;<br /> <br /> {{Symantec}}<br /> <br /> [[Category:Symantec software]]<br /> [[Category:Antivirus software]]<br /> [[Category:Malware]]<br /> [[Category:Proprietary software]]<br /> <br /> [[ar:نورتن إنترنت سكيورتي]]<br /> [[de:Norton Internet Security]]<br /> [[it:Norton Internet Security]]<br /> [[ja:ノートン・インターネットセキュリティ]]<br /> [[pl:Norton Internet Security]]<br /> [[zh:諾頓網絡安全大師]]</div> PPrakash https://en.wikipedia.org/w/index.php?title=Norton_Internet_Security&diff=261882863 Norton Internet Security 2009-01-04T12:45:44Z <p>PPrakash: Added citation to less space utilization</p> <hr /> <div>{{Infobox Software<br /> | name = Norton Internet Security<br /> | logo = [[Image:Norton AntiVirus logo.jpg]]<br /> | screenshot = [[Image:Norton Internet Security.png|300px|center|Norton Internet Security Screenshot]]<br /> | caption = Norton Internet Security 2009<br /> | developer = [[Symantec Corporation]]<br /> | latest_release_version = 2009 or 16.2.0.7 (Windows Edition), 4.0 (Mac Edition)<br /> | latest_preview_version = <br /> | latest_preview_date =<br /> | operating_system = [[Microsoft Windows]], [[Mac OS X]]<br /> | genre = Security Suite<br /> | license = [[Proprietary software|Proprietary]]<br /> | website = [http://www.symantec.com/ Symantec.com]<br /> }}<br /> <br /> '''Norton Internet Security''' (NIS) is a computer utility suite made by [[Symantec Corporation]], with a focus on providing comprehensive [[Internet]] protection. It is available for both [[Microsoft Windows]] and [[Mac OS X]]. It is one of Symantec's flagship products.<br /> <br /> == Features ==<br /> ===Included software===<br /> On both platforms, Norton Internet Security is a combination of [[Norton AntiVirus]], [[Norton Personal Firewall]], and Norton Confidential. In an optional add-on package which can be downloaded from the official website, the Windows version adds Norton AntiSpam, while the Mac OS version adds [[Allume Systems]]' iClean, providing many of the same features. The 2007 add-on package also included parental controls, privacy controls, pop-up blocking, and ad blocking; later versions of the add-on package does not include the latter two features.<br /> <br /> The recent version of Norton Internet Security for Macintosh, 4.0, is compatible with [[Mac OS X 10.5]] and is a [[universal binary]].&lt;ref&gt;http://www.macworld.com/article/137650/norton.html&lt;/ref&gt;<br /> <br /> == Version history (Windows) ==<br /> ===Version 2006 and previous===<br /> <br /> Norton Internet Security 2006 included Norton AntiVirus, Norton Personal Firewall, Norton AntiSpam and Norton Parental Control. Although with the release of Windows [[Internet Explorer 7]], the main [[Graphical user interface|GUI]] of Norton Internet Security 2006 and previous versions encountered several scripting errors, the current version of Norton Internet Security, however, fully supports IE7 and MSDN (Microsoft Developer Network) has [http://forums.microsoft.com/MSDN/ShowPost.aspx?PostID=923893&amp;SiteID=1 a discussion thread on how to resolve this issue.].<br /> <br /> ===Version 2007 (14.0)===<br /> After many years of customer complaints regarding the speed and system utilization of the product, Symantec responded in 2007 with a much needed rewrite of the code to make the product lighter and faster, although it still uses more disk space than competitors and is frequently a source of severe system performance issues.&lt;ref&gt;[http://reviews.cnet.com/internet-security-and-firewall/norton-internet-security-2007/4505-3667_7-32069538.html Norton Internet Security 2007 Internet security and firewall reviews - CNET Reviews&lt;!-- Bot generated title --&gt;]&lt;/ref&gt;<br /> <br /> ===Version 2008 (15.0)===<br /> The 2008 version was released on August 28, 2007. It has several new features including [[SONAR (Symantec)|SONAR]] (Symantec Online Network for Advanced Response) technology, Browser Defender (Internet Explorer Exploit Protection) and [[Norton Identity Safe]].<br /> <br /> Shortly after NIS 2008 was released, Symantec released a 2008 [http://service1.symantec.com/SUPPORT/norton2008.nsf/0/38d6ac68e6e6e9ff65257344007de8bc?OpenDocument add-on package]. This is essentially the same path Symantec took with the 2007 product line; the 2008 package adds features such as anti-spam and parental controls. Notably, the 2008 package does not include the ad blocking and pop-up blocking features that were included in the 2007 add-on package.<br /> <br /> ===Version 2009 (16.0)===<br /> <br /> The 2009 version was released on September 8, 2008. It uses a new software architecture which boosts the software speed. It has some new features including Silent Mode, Smart Idle Time Scheduler, Program Trust, a CPU/Memory usage monitor, and Norton Insight which uses data from a global network to predetermine if a file is safe.<br /> <br /> Symantec claims that Norton 2009 is the fastest amongst its predecessors and in the world because of its new architecture that reduces the boot time impact, the scan time, the memory usage as well as the system footprint and the install time. Redundancies have been removed, slimming the installation size from 300 megabytes in 2006 to less than 100 megabytes.&lt;sup&gt;&lt;ref&gt;[http://netsecurity.about.com/od/readproductreviews/gr/nis2009.htm&lt;!-- Bot generated title --&gt;]&lt;/ref&gt;&lt;/sup&gt;<br /> <br /> ====Response to Malware====<br /> <br /> Symantec introduced a new technology called &quot;pulse updates&quot; to Norton AntiVirus 2009. These updates are designed to deliver incremental updates every 5 to 15 minutes to ensure customers are kept up-to-date on threats without slowing down their computer with a large batch update. According to AV-test, Norton Internet Security 2009 beta received 6,202 updates over a four-week period. <br /> <br /> Norton AntiVirus 2009 introduced a new technology, dubbed &quot;Bloodhound&quot;. It analyzes files in on-demand scanning for unknown, zero-day, or intentionally mutated malware. According to AV-Comparatives, an unreleased beta of Bloodhound would detect ~41% of malware with one month old signatures, compared to 18% the then current, or 2008 release, detected. The current release of Bloodhound detected 44% of malware without updates for four weeks with &quot;few&quot; false positives, earning the &quot;Advanced&quot; rating from AV-Comparatives. <br /> <br /> Another implemented technology is SONAR, or Symantec Online Network for Advanced Response. It monitors processes in real-time for any signs of suspicious activity using over 300 different parameters, such as whether it creates a Add/Remove Programs entry. It is standard on all 2008 and later products. It is available as an free add-on for 2007 products.<br /> <br /> ====Norton Insight====<br /> Yet another technique introduced in the 2009 product line is Norton Insight. Each process is heuristically analyzed and its safety is rated on a scale of 1 through 5 stars. It also calculates and collects the SHA256 value of all running processes, along with their dependencies. The SHA256 values are then forwarded to remote servers, which leverage information about running processes from over 65 million Norton community users. The server then reports back to the client's computer with information about safe, or trusted processes and their dependencies. Safe processes are a) present on the majority of participating Norton Community user computers, b) naively trusted by Norton, or c) digitally signed, depending on the level of trust specified by the user. Standard Trust only trusts files that have been validated by Symantec’s secure backend systems. High Trust will also trust files that are signed, and the signature is validated against the machine’s local certificate store. This industry-first whitelisting technology allows Norton to perform scans faster and focus more on untrusted and unknown processes. <br /> <br /> The heuristic detection sensitivity threshold is also be greatly increased with Norton Insight technology. Typically, raising the heuristic sensitivity results in more false positives. However, Norton Insight's complied list trusted applications are excluded from heuristic scanning, which further saves time, processing power, and decreases the likelihood of false positives <br /> <br /> The technology also makes commonly used “allow/deny” pop-ups unnecessary because Norton Insight relies on a global network of users, rather than an individual user's existing knowledge. <br /> <br /> Norton Insight also employees a number of tamper protection features to ensure its integrity. Upon startup, Norton analyzes the NTFS file system, and if it detects any changes it could not account for, all the trust values of the files on the system are instantly revoked. Its kernel mode device driver technology instantaneously revokes file trust attributes the moment the file is modified. All information is stored in a secure high performance product-specific database.<br /> <br /> In the case of a mistake, a revocation mechanism was implemented, where clients receive a list of revoked SHA256 values via LiveUpdate. If the client has a file matching a SHA256 and is currently trusting that file, all trust is revoked, and the file is once again scanned. [http://community.norton.com/t5/Norton-Protection-Blog/Norton-Insight-A-solution-to-performance-improvement-without/ba-p/20642 Norton Protection Blog]<br /> <br /> ===Norton Internet Security for Mac 4.0===<br /> <br /> Norton Internet Security 4.0 for the Mac includes antimalware, firewall, antiphishing and online Web-threat protection for the Mac OS X 10.4 &quot;Tiger&quot; and 10.5 &quot;Leopard&quot; platforms. The package includes security-based updates from Symantec that address vulnerabilities found in the Apple operating system or applications such as Quicktime, sometimes prior to Apple releasing updates. In addition, Norton Internet Security 4.0 for Mac contains a file-lockdown feature called FileGuard that lets users decide which files they may want to prevent from being opened or copied. The software also makes use of Symantec's DeepSight sensor's honeypot technology that identifies IP addresses linked to malicious Web sites, and proactively warns consumers about accessing infected sites. [http://www.macobserver.com/tmo/review/norton_internet_security_4_a_comprehensive_suite/][http://www.networkworld.com/news/2008/121808-symantec-norten-internet-securit.html?page=2]<br /> <br /> ==Criticisms==<br /> Many of the criticisms leveled at earlier versions of [[Norton AntiVirus]], including being slow, inefficient and difficult to uninstall, can also be leveled at Norton Internet Security due to its integration of [[Norton AntiVirus]]. In September 2006, [http://www.thepcspy.com ThePCSpy.com] did two studies covering several thorough tests to find out what programs slowed down [[Microsoft Windows]] most. Norton Internet Security 2006 was the number one cause of a slow PC in both tests, with Norton Internet Security 2007 being the number three cause in the second test.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://www.thepcspy.com/articles/other/what_really_slows_windows_down/|title=What Really Slows Windows Down|publisher=thepcspy.com|author=Oli Warner|date=2006-09-22 | accessdate=2006-09-24}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://www.thepcspy.com/articles/other/what_slows_windows_down/|title=What Slows Windows Down|publisher=thepcspy.com|author=Oli Warner|date=2006-09-10 | accessdate=2006-09-10}}&lt;/ref&gt;&lt;/sup&gt;<br /> <br /> Further, previous versions of Norton Internet Security integrate deeply with the [[Microsoft Windows]] operating system, causing further uninstallation problems. [[Symantec]] has released the [http://service1.symantec.com/Support/tsgeninfo.nsf/docid/2005033108162039 Norton Removal Tool] to remove corrupted installations of Norton. <br /> <br /> ===Windows XP Service Pack 3===<br /> When a Norton 2008 product is installed, some people have encountered numerous invalid registry keys being added after upgrading to Windows XP Service Pack 3.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://tech.yahoo.com/blogs/null/94445|title=Windows XP Service Pack 3 problems continue|publisher=tech.yahoo.com|author=|date=2008-06-09 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;/sup&gt; Symantec initially blamed Microsoft for the problem but has since accepted partial responsibility.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;articleId=9088598/|title=Symantec pins blame for XP SP3 registry corruption on Microsoft|publisher=computerworld.com|author=Gregg Keizer|date=2008-05-23 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;/sup&gt;<br /> &lt;br /&gt;<br /> A fix for the problem is now available.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://solutions.symantec.com/sdccommon/asp/symcu_defcontent_view.asp?ssfromlink=true&amp;sprt_cid=df95cb1a-c77e-40b1-8777-f64024930c46&amp;docid=20080516112507EN|title=Problems occur after installing Windows XP Service Pack 3 or Windows Vista Service Pack 1 with a Norton 2008 product installed|publisher=symantec.com|author=|date=2008-06-17 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;/sup&gt;<br /> <br /> ==Independent assessments==<br /> <br /> *Norton Internet Security won ''PC Magazine'' editor's choice awards for 2007, 2008 and 2009.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://www.pcmag.com/article2/0,1759,2023974,00.asp|title=Norton Internet Security 2007 Review|publisher=pcmag.com|author=Neil J. Rubenking|date=2006-10-04 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://www.pcmag.com/article2/0,1759,2180639,00.asp|title=Norton Internet Security 2008 Review|publisher=pcmag.com|author=Neil J. Rubenking|date=2007-09-07 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://www.pcmag.com/article2/0,2817,2330018,00.asp|title=Norton Internet Security 2009 Review|publisher=pcmag.com|author=Neil J. Rubenking|date=2008-09-09 | accessdate=2008-09-30}}&lt;/ref&gt;&lt;/sup&gt;<br /> <br /> *PC World rated Norton Internet Security 2008 as the top performer among tested 2008 security suites.&lt;sup&gt;&lt;ref&gt;{{cite news|url=http://www.pcworld.com/article/id,139988/article.html|title=Norton Internet Security 2008 Review|publisher=pcworld.com|author=Erik Larkin|date=2007-11-29 | accessdate=2008-06-19}}&lt;/ref&gt;&lt;/sup&gt;<br /> <br /> *PC World has also rated Norton Internet Security 2006 as a &quot;Best Buy&quot;. [http://www.symantec.com/about/news/release/article.jsp?prid=20060705_01]<br /> <br /> *PC PRO &quot;recommends&quot; Norton Internet Security 2009: [http://www.pcpro.co.uk/reviews/227709/norton-internet-security-2009.html?searchString=norton+2009 PCPRO]<br /> <br /> *CNET rated Norton Internet Security 2009 as 4/5. [http://reviews.cnet.com/internet-security-and-firewall/norton-internet-security-2009/4505-3667_7-33246586.html?tag=mncol;lst CNET]<br /> <br /> *PC World IDG gave Norton Internet Security 2009 a 4.5/5 rating.&quot; [http://www.pcworld.idg.com.au/index.php/taxid;2136212919;pid;6711;pt;1 PC World IDG]<br /> <br /> *Secunia tested 12 popular AntiVirus suites against 144 malicious files and 156 malicious web pages. Norton Internet Security 2009 leaded by detected 30.95% of all the exploits, including the files and malicious web pages.<br /> <br /> *According to AV-test.org, Norton 2008 excels in rootkit detection and removal; only product of the 34 tested to receive &quot;++&quot; in both rootkit detection and removal. [http://www.virusbtn.com/news/2008/03_13a.xml AV-test]<br /> <br /> *According to AV-test.org, Norton Internet Security 2009 ''beta'' detected 98.7% of malware.<br /> <br /> *According to AV-comparatives.org, Norton AntiVirus had &quot;few&quot; false positives.<br /> <br /> *According to AV-comparatives, an unreleased preview of Norton AntiVirus's improved heuristics would score ~41% in the May 2008 test compared to its current stable release's 18%. <br /> <br /> *PassMark Software was commissioned to benchmark Norton Antivirus 2009 and top security software competitors' performance impact on key metrics. Highlights from their findings include: Fastest install: installs in only 52 seconds, least working memory usage: uses less than 7MB, fastest quick scan: scans take 33 seconds. <br /> <br /> *According to AV-comparatives, Norton AntiVirus 2009 was the second fastest security suite overall. [http://www.av-comparatives.org/seiten/ergebnisse/performance2008a.pdf AV-comparatives Anti-Virus Comparative]<br /> <br /> *Norton AntiVirus 2008 is Certified by ICSA Labs. <br /> <br /> *Norton AntiVirus 2009 received the highest possible rating from Checkvir labs, &quot;Standard&quot;.<br /> <br /> *Norton AntiVirus 2009 received the highest possible rating from Checkvir labs, &quot;Standard&quot;, for detecting malware embedded within electronic mail. <br /> <br /> *Norton consecutively passed all VB100% tests since 1999. <br /> <br /> *Norton AntiVirus successfully detected 44% of malware with 4 week old signatures with &quot;few&quot; false positives. AV-comparatives gave Norton AntiVirus the &quot;Advanced&quot; rating. [http://av-comparatives.org/ AV-comparatives]<br /> <br /> *Cascadia Labs found that Norton 2009 was the only product tested that blocked all drive-by-downloads, fake online antivirus scanners, and fake video codec sites. [http://www.symantec.com/about/news/release/article.jsp?prid=20081208_01]<br /> <br /> *Norton Internet Security 2009 received ProtectStar, Inc. 1st place &quot;ProtectStar Award 2009&quot; [http://www.protectstar-testlab.org/award/protectstar-bigiss2009_eng.pdf ProtectStar big comparative test report]<br /> <br /> ''Note: Most test results for NIS apply for NAV and vice versa, except for firewall tests.''<br /> <br /> ==Gallery==<br /> The following pictures are screenshots of previous versions of Norton Internet Security.<br /> <br /> {|class=&quot;toccolours&quot; style=&quot;border-collapse:collapse;margin:0 auto;text-align:center;&quot; border=&quot;1&quot;<br /> |-<br /> | align=&quot;center&quot; valign=&quot;top&quot; style=&quot;width:33%;&quot;|[[Image:NIS.GIF|350px]]<br /> <br /> &lt;center&gt;Norton Internet Security 2005 AntiSpyware Edition&lt;center&gt;<br /> | align=&quot;center&quot; valign=&quot;top&quot; style=&quot;width:33%;&quot;|[[Image:NIS2006.jpg|350px]]<br /> <br /> &lt;center&gt;Norton Internet Security 2006&lt;/center&gt;<br /> |-<br /> | align=&quot;center&quot; valign=&quot;top&quot; style=&quot;width:33%;&quot;|[[Image:NIS 2007 WinXP.PNG|350px]]<br /> <br /> &lt;center&gt;Norton Internet Security 2007&lt;/center&gt;<br /> | align=&quot;center&quot; valign=&quot;top&quot; style=&quot;width:33%;&quot;|[[Image:NIS 2008 Vista.png|350px]]<br /> <br /> &lt;center&gt;Norton Internet Security 2008&lt;center&gt;<br /> |-<br /> | align=&quot;center&quot; valign=&quot;top&quot; style=&quot;width:33%;&quot;|[[Image:Norton Internet Security.png|350px]]<br /> <br /> &lt;center&gt;Norton Internet Security 2009&lt;/center&gt;<br /> |}<br /> <br /> ==See also==<br /> *[[Symantec]]<br /> *[[Norton AntiVirus]]<br /> *[[Antivirus]]<br /> *[[List of antivirus software]]<br /> <br /> == References ==<br /> &lt;references /&gt;<br /> <br /> {{Symantec}}<br /> <br /> [[Category:Symantec software]]<br /> [[Category:Antivirus software]]<br /> [[Category:Malware]]<br /> [[Category:Proprietary software]]<br /> <br /> [[ar:نورتن إنترنت سكيورتي]]<br /> [[de:Norton Internet Security]]<br /> [[it:Norton Internet Security]]<br /> [[ja:ノートン・インターネットセキュリティ]]<br /> [[pl:Norton Internet Security]]<br /> [[zh:諾頓網絡安全大師]]</div> PPrakash https://en.wikipedia.org/w/index.php?title=Sabarimala_Temple&diff=260027414 Sabarimala Temple 2008-12-25T09:06:18Z <p>PPrakash: Changing the typo in சபரிமலை</p> <hr /> <div>{{Infobox Indian Jurisdiction<br /> | native_name = Sabarimala<br /> | type = Pilgrimage Town<br /> | locator_position = right<br /> | latd = 9.26<br /> | longd = 77.04<br /> | state_name = Kerala<br /> | district = [[Pathanamthitta District]]<br /> | leader_title = <br /> | leader_name = <br /> | altitude = 1260<br /> | population_as_of = <br /> | population_city = <br /> | population_rank = <br /> | population_total = <br /> | population_density = <br /> | area_magnitude = <br /> | area_total = <br /> | area_telephone = 0473<br /> | postal_code = <br /> | vehicle_code_range = <br /> | unlocode = <br /> | footnotes = <br /> }}<br /> '''Sabarimala''' ([[Malayalam language|Malayalam]]: ശബരിമല, [[Kannada language|Kannada]]: ಶಬರಿಮಲೆ , [[Tamil language|Tamil]]: சபரிமலை, [[Telugu language|Telugu]]: శబరిమల ) is a [[pilgrim]] centre in [[Kerala]] in the [[Western Ghats|Western Ghat]] mountain ranges of [[India]]. Lord [[Ayyappan]]'s temple is situated here in the midst of 18 hills. The area is in the Sahya hilly regions of Kerala in [[Pathanamthitta]] District. The temple is situated on a hilltop at an altitude of 1260 m/4135 ft. above mean sea level, and is surrounded by mountains and dense forests. Temples existed in each of the hills surrounding Sabarimala. While functional and intact temples exist at many places in the surrounding areas like Nilackal, Kalaketi, and Karimala, remnants of old temples are visible in the remaining hills. Sabarimala is believed to be the place where [[Ayyappan]] meditated after killing the powerful demon, Mahishi.Sabarimala is one of the most visited piligrim centres in the world with an estimated 4.5 - 5 crores devotees coming every year. The world's second largest annual pilgrimage, after Haj in Mecca, is reported to be to Sabarimala. <br /> <br /> The pilgrimage to Sabarimala is a singular example of one where pilgrims, without consideration of caste, creed, position or social status, go with one mind and one `mantra' dreaming constantly of the [[darshan]] of the presiding deity at the [[Holy Sannidhanam]]. Vehicles can go up to [[Pampa]]. Thereafter, pilgrims have to follow a path approximately four kilometres up a steep hill. The path, now fully cemented, with shops and medical aid by the sides, used to be a mere trail through dense forest.<br /> <br /> There is a place near the temple (east of Sannidhanam), dedicated to the [[Vavar]], a [[Muslim]] who was the disciple of Ayyappan, called &quot;Vavarunada&quot;. The temple is open for worship only during the days of ''Mandalapooja'' ([[November 15]] to [[December 26]]), Makaravilakku ([[January 15]]) and [[Vishu]] ([[April 14]]), and the beginning of every month in the [[Malayalam calendar]].<br /> Sabari was a devout of Lord Rama and her devotion is widely attributed to that of an ideal devotee.Lord Ayyappa wanted his pilgrims to hon the same attributes as that of sabri and hence the hill on which the temple is situated is known as Sabari<br /> <br /> 3. [[Pandalam]] to Pampa through Pathanamthitta, Chalakkayam. and from there to Sabarimala by foot 4 km.<br /> <br /> 4. [[Vandiperiyar]] to Mount Estate by vehicle and there by walking to Sabarimala.<br /> <br /> 5. Climb down to Sabarimala from [[Vandiperiyar]] to Kozhikkanam - 15 km. Kozhikkanam to Uppupura - 10 km. Uppupura to Sabarimala - 3.5 km. (Up to Uppupura, vehicles can be used for the travel.)<br /> <br /> Vehicular traffic cannot go beyond Pampa, situated on the Pampa river valley and the last five kilometres to the shrine can be best reached by trekking. However, porter carried chairs are also available for aged and handicapped pilgrims.<br /> <br /> [[Image:Ayyappan.jpg|thumb|right|250px|Lord Ayyappa]]<br /> <br /> ==Distance and Route from Various Originations to Pampa==<br /> <br /> <br /> * [[Thiruvanathapuram]] - 173 km ('''The Easy Access''')<br /> '''Thiruvananthapuram-Kottarakkara-Adoor-Thatta-Kaippattor-Pathanamthitta-Mannarakkulanji-<br /> Vadasserikkara-Pampa'''<br /> <br /> <br /> * [[Kochi]] - 182 km (Direct Route)<br /> '''Eranakulam / Cochin / Kochi'''-Kottayam-Thiruvalla-Pathanamthitta-Mannarakkulanji-Vadasserikkara-'''Pampa'''<br /> * (via Erumeli)<br /> '''Eranakulam / Cochin / Kochi'''-Pala-Ponkunnam-Kanjirappalli-Erumeli-Mukkada-Edamun-Athikkayam-Perunad-<br /> Poovathummoodu-'''Pampa'''.<br /> <br /> <br /> * [[Kochi]] - 182 km ('''Easy Access Through National Highway-47''')<br /> '''Eranakulam / Cochin / Kochi-Alappuzha-Thiruvalla-Pathanamthitta-Mannarakkulanji-Vadasserikkara-Pampa'''<br /> <br /> <br /> * [[Coimbatore]] and Other Northern States<br /> '''Coimbatore'''-Thrissur-Angamali-Moovattupuzha-Koothattukulam-Kottayam-Thiruvalla-<br /> Pathanamthitta-Mannarakkulanji-Vadasserikkara-'''Pampa'''<br /> * (via Erumeli)<br /> '''Coimbatore'''-Thrissur-Angamali-Moovattupuzha-Pala-Erattupetta-Kanjirapally-Erumeli-'''Pampa'''<br /> <br /> <br /> == Shortest Route: ==<br /> <br /> '''Coimbatore'''-Thrissur-Angamali-[[Muvattupuzha]]-[[Thodupuzha]]-Erattupetta-Kanjirapally-Erumeli-'''Pampa'''<br /> <br /> above route is not suitable for Buses.<br /> <br /> * [[Coimbatore]] (via Cochin/Kochi) ('''Easy Access Through the National Highway''')<br /> '''Coimbatore-Thrissur-Cochin-Alappuzha-Changanasserry-Thiruvalla-Pathanamthitta-Mannarakkulanji-Pamba'''<br /> <br /> ==Distance from other locations / towns==<br /> * [[Pathanamthitta]] - 65 km<br /> * [[Punalur]] - 102 km<br /> * [[Pandalam]] - 80 km<br /> * [[Erumeli]] - 53 km (via [[Plappally]], [[Mukkoottuthara]])<br /> * [[Kottayam]] - 109 km (via [[Erumeli]])<br /> * [[Kollam]] - 128 km<br /> * [[Alappuzha]] - 130 km<br /> <br /> ==When to go==<br /> [[Image:Sabarimala pilgrims.jpg|right|thumb|300px|Crowd management of pilgrims]]<br /> <br /> Throughout the year, monthly poojas are held at the temple, usually during the first week of each [[Malayalam calendar|Malayalam month]]. The shrine is open only for the first five days of each month and for the pilgrimage season, between mid-November and mid-January.<br /> <br /> Millions of Ayyappan disciples visit the famous temple of [[Ayyappan|Lord Ayyappan]] every year from all around India. The main pilgrimage season is from November to January. The temple is opened for brief periods at the commencement of each Malayalam month and during certain important Malayali festivals. Tourists and foreigners, as well as women between the ages of 10 and 50 (approximately age at puberty and menopause), are not officially allowed entry to the main temple. <br /> <br /> Women between the age of 10 and 50 are not allowed to visit the Lord Ayyappan Shrine. A number of feminist organizations have tried to persuade the [[Travancore Devaswom Board]] to revoke this age old tradition, but to no avail. Many reasons are cited by the Board in support of the decree; these include the 41-day penance imposed on pilgrims (which include abstinence from sex, non-vegetarian, and [[stimulant foods|rajasic foods]], wearing a unique black outfit (shirt and [[dhoti]]) with beads around the neck, practicing utmost cleanliness, not uttering any curses, etc.), the arduous trek up to the shrine, and the fact that the Ayyappan worshipped at Sabarimala is supposed to be a celibate hermit.<br /> <br /> The Travancore Devaswom Board (TDB) has insured the Sabarimala Ayyappa shrine for a value of Rs 30 crore ($7 million) and also introduced a free-of-cost accident insurance project for pilgrims visiting the holy place. The pilgrims' insurance scheme offered up to Rs 1 lakh to the devotees suffering injuries or death at a stretch of about 18 km from Nilakkal to uphill Sannidhanam where the temple is located. The compensation for TDB and government employees on duty at the area would be up to Rs 1.5 lakh. An estimated 5 crore (50 million) pilgrims visited the temple last year during the main season from November to January and it is estimated that Sabarimala is providing 10,000 crore rupees to the Kerala economy.<br /> <br /> ==Harivarasanam==<br /> <br /> [[Harivarasanam]]&lt;ref&gt;[http://www.saranamayyappa.org/Harivarasanam.htm Harivarasanam] History and meaning of harivarasanam. &lt;/ref&gt; is recited before closing the temple door at night. Harivarasanam song, which is sung today at Sabarimala as the Lullaby at night (Urakkupattu) was composed by Sri Kambakkudi Kulathur Srinivasa Iyer. It is said that Srinivasa Iyer used to recite the composition, after the Athazha Pooja, standing in front of Lord Ayyappa at the main temple. With the efforts of Swami Vimochanananda, it came to be accepted as the lullaby by the Thantri and Melsanti. The composition has 352 letters, 108 words in 32 lines (8 stanzas).&lt;ref&gt;[http://www.musicindiaonline.com/p/x/f4O29qT7Vd.As1NMvHdW/?done_detect Harivarasanam by K.J Yesudas.]&lt;/ref&gt;<br /> <br /> Though there have been many versions of this song sung by many renowned vocalists, the temple plays the rendition by Dr.KJ Yesudas. Dr. Yesudas is a staunch devotee of Lord Ayyappa though being a Christian by birth.<br /> <br /> ==Neyyabhishekam==<br /> <br /> This significant ritual involves pouring sacred ghee brought by pilgrims in their [[Pallikattu]] (Irumudi) on the idol of Lord Ayyappa. It symbolically means the merging of [[Jeevatma]] with the [[Paramatma]].<br /> <br /> ==Aham Bhramasmi and Tattvamasi==<br /> The important message given at the temple is the ultimate knowledge that you are God, [[Mahavakya|Tat Tvam Asi]] in [[Sanskrit]] meaning &quot;That is you&quot;. Due to this pilgrims call each other [[Swami]]. [[Kantararu Maheshwararu]] of ''Tazhamon family'' is the ''Tantri'' (Head Priest) of Sabarimala.<br /> <br /> Tat Tvam Asi, meaning &quot;Thou Art That&quot; is the message that is given out by the Lord. It means, in short, you are part of the Universal Soul (in Sanskrit &quot;Paramatma&quot;) which is the quintessence of Advaita philosophy. It also means for reaching The Paramatma or Universal Soul, you search yourself .i.e. the Jeevatma(Life soul) present in you.<br /> <br /> == See also ==<br /> # [[Ayyappan]] <br /> # [[Makara Jyothi]] <br /> # [[Maalikapurathamma]]<br /> # [[Pandalam]]<br /> # [[Pathanamthitta]]<br /> <br /> == References ==<br /> {{reflist}}<br /> <br /> == External links ==<br /> * [http://www.rediff.com/news/dec/31rajeev.htm Sabarimala, largest pilgrimage in the world after Haj, news item ]<br /> * [http://www.chintha.com/keralam/sabarimala-history-myth.html Sabarimala – More of a reality than a myth]<br /> * [http://www.sabarimala.org Website about Sabarimala ]<br /> * [http://www.keraladays.com Website about Kerala ]<br /> * [http://www.religiousportal.com/SabarimalaTemple.html Read Useful Details about Sabarimala Temple]<br /> * [http://www.youtube.com/watch?v=legH7DDmrIc Makara Jyoti commentary by Rahul Easwar for Kerala Media]<br /> * [http://www.mahadevatemple.com Website about famous chengannur mahadeva/devi temple]<br /> * [http://www.shaktipeethas.org/sabarimala-map-t70.html Sabarimala map]<br /> <br /> <br /> {{Famous Hindu temples in Kerala}}<br /> <br /> [[Category:Hindu temples in Kerala]]<br /> [[Category:Pilgrim Centres]]<br /> [[Category:Pathanamthitta district]]<br /> <br /> [[hi:सबरिमलय]]<br /> [[ml:ശബരിമല]]<br /> [[mr:शबरीमला]]</div> PPrakash https://en.wikipedia.org/w/index.php?title=Pannaipuram&diff=258345110 Pannaipuram 2008-12-16T12:36:12Z <p>PPrakash: /* Demographics */</p> <hr /> <div>&lt;!-- See [[Wikipedia:WikiProject Indian cities]] for details --&gt;{{Infobox Indian Jurisdiction |<br /> native_name = Pannaipuram | <br /> type = city | <br /> latd = | longd = |<br /> state_name = Tamil Nadu |<br /> district = [[Theni district|Theni]] |<br /> leader_title = |<br /> leader_name = |<br /> altitude = |<br /> population_as_of = 2001 |<br /> population_total = 8924| <br /> population_density = |<br /> area_magnitude= sq. km |<br /> area_total = |<br /> area_telephone = |<br /> postal_code = |<br /> vehicle_code_range = |<br /> sex_ratio = |<br /> unlocode = |<br /> website = |<br /> footnotes = |<br /> }}<br /> '''Pannaipuram''' is a [[panchayat town]] in [[Theni district]] in the [[India]]n [[States and territories of India|state]] of [[Tamil Nadu]].<br /> <br /> ==Demographics==<br /> {{As of|2001}} India [[census]]&lt;ref&gt;{{GR|India}}&lt;/ref&gt;, Pannaipuram had a population of 8924. Males constitute 49% of the population and females 51%. Pannaipuram has an average literacy rate of 65%, higher than the national average of 59.5%: male literacy is 74%, and female literacy is 56%. In Pannaipuram, 10% of the population is under 6 years of age.<br /> <br /> Panaipuram is birth place of the most famous music director [[Ilaiyaraja]]. [[Ilaiyaraja]] (help·info) (Tamil: இைளயராஜா, IPA: [ɪləjəɹɑːdʒɑː]) (born June 2, 1943 as Gnanadesikan) is an Indian film composer, singer, and lyricist. He has composed over 4,000 songs and provided background music for more than 800 Indian films in various languages in a career spanning 30 years.[1][2] He is based in Chennai, India.<br /> <br /> ==References==<br /> {{Reflist}}<br /> <br /> {{coord missing|India}}<br /> <br /> [[Category:Cities and towns in Tamil Nadu]]<br /> <br /> {{TamilNadu-geo-stub}}<br /> <br /> [[bpy:পান্নাইপুরম]]<br /> [[pt:Pannaipuram]]<br /> [[ta:பண்ணைபுரம்]]<br /> [[vi:Pannaipuram]]</div> PPrakash https://en.wikipedia.org/w/index.php?title=Pannaipuram&diff=258345015 Pannaipuram 2008-12-16T12:35:21Z <p>PPrakash: Adding link to Ilayaraja&#039;s page.</p> <hr /> <div>&lt;!-- See [[Wikipedia:WikiProject Indian cities]] for details --&gt;{{Infobox Indian Jurisdiction |<br /> native_name = Pannaipuram | <br /> type = city | <br /> latd = | longd = |<br /> state_name = Tamil Nadu |<br /> district = [[Theni district|Theni]] |<br /> leader_title = |<br /> leader_name = |<br /> altitude = |<br /> population_as_of = 2001 |<br /> population_total = 8924| <br /> population_density = |<br /> area_magnitude= sq. km |<br /> area_total = |<br /> area_telephone = |<br /> postal_code = |<br /> vehicle_code_range = |<br /> sex_ratio = |<br /> unlocode = |<br /> website = |<br /> footnotes = |<br /> }}<br /> '''Pannaipuram''' is a [[panchayat town]] in [[Theni district]] in the [[India]]n [[States and territories of India|state]] of [[Tamil Nadu]].<br /> <br /> ==Demographics==<br /> {{As of|2001}} India [[census]]&lt;ref&gt;{{GR|India}}&lt;/ref&gt;, Pannaipuram had a population of 8924. Males constitute 49% of the population and females 51%. Pannaipuram has an average literacy rate of 65%, higher than the national average of 59.5%: male literacy is 74%, and female literacy is 56%. In Pannaipuram, 10% of the population is under 6 years of age.<br /> <br /> Panaipuram is birth place of the most famous music director [[Ilaiyaraja]]. [[Ilaiyaraaja]] (help·info) (Tamil: இைளயராஜா, IPA: [ɪləjəɹɑːdʒɑː]) (born June 2, 1943 as Gnanadesikan) is an Indian film composer, singer, and lyricist. He has composed over 4,000 songs and provided background music for more than 800 Indian films in various languages in a career spanning 30 years.[1][2] He is based in Chennai, India.<br /> <br /> ==References==<br /> {{Reflist}}<br /> <br /> {{coord missing|India}}<br /> <br /> [[Category:Cities and towns in Tamil Nadu]]<br /> <br /> {{TamilNadu-geo-stub}}<br /> <br /> [[bpy:পান্নাইপুরম]]<br /> [[pt:Pannaipuram]]<br /> [[ta:பண்ணைபுரம்]]<br /> [[vi:Pannaipuram]]</div> PPrakash https://en.wikipedia.org/w/index.php?title=Idli&diff=258053918 Idli 2008-12-15T04:21:05Z <p>PPrakash: /*Changed the spelling error in aatukal */</p> <hr /> <div>{| cellpadding=3px cellspacing=0px bgcolor=#f7f8ff style=&quot;float:right; border:1px solid #ccd2d9; margin:5px&quot;<br /> |colspan=2 align=center style=&quot;border-top:1px solid #ccd2d9&quot;|[[Image:Idli Sambar.JPG|300px|Yummy home-made idlis with chutney and sambar]]<br /> |-<br /> !style=&quot;background:#ccf; border-bottom:1px solid #ccd2d9&quot; colspan=2|Idli<br /> |-<br /> |Align=left|[[Kannada language|Kannada]]:||ಇಡ್ಲಿ<br /> |-<br /> |Align=left|[[Konkani language|Konkani]]:||Sanna<br /> |-<br /> |Align=left|[[Malayalam language|Malayalam]]:||ഇഡ്ഡലി<br /> |-<br /> |Align=left|[[Tamil language|Tamil]]:||இட்லி<br /> |-<br /> |Align=left|[[Telugu language|Telugu]]:||ఇడ్లీ<br /> |}<br /> <br /> <br /> The '''idli''' (IPA:{{IPA|ɪdlːi}}), also romanized &quot;idly&quot; or &quot;iddly&quot; and plural &quot;idlis&quot;, is a savory cake popular throughout [[South Indian cuisine|South India]]. The cakes are usually two to three inches in diameter and are made by steaming a batter consisting of fermented [[black lentil]]s (de-husked) and [[rice]]. The fermentation process breaks down the starches so that they are more readily metabolized by the body.<br /> <br /> Most often eaten at breakfast or as a snack, idlis are usually served in pairs with [[chutney]], [[sambar (dish)|sambar]], or other accompaniments. Mixtures of crushed dry spices such as [[milagai podi]] are the preferred [[condiment]] for idlis eaten on the go. <br /> <br /> ==History==<br /> Although the precise history of the modern idli is unknown, it is a very old food in southern Indian cuisine. One mention of it in writings occurs in the [[Kannada language|Kannada]] writing of [[Shivakotiacharya]] in 920 AD,&lt;ref name=hindu&gt;[http://www.hinduonnet.com/seta/2004/10/21/stories/2004102100111600.htm History of Dosa and Idli]&lt;/ref&gt; and it seems to have started as a dish made only of fermented black lentil. Chavundaraya II, the author of the earliest available Kannada encyclopaedia, ''Lokopakara'' (c.&amp;nbsp;1025), describes the preparation of Idli by soaking [[Urad dal]] (black gram) in butter milk, ground to a fine paste and mixed with the clear water of [[curd]], and spices.&lt;ref name=&quot;idli&quot;&gt;Farnworth (2003), p. 11&lt;/ref&gt; The Kannada king and scholar [[Someshwara III]], reigning in the area now called [[Karnataka]], included an idli recipe in his encyclopedia, the [[Manasollasa]], written in [[Sanskrit]] ca. 1130 A.D. There is no known record of rice being added until some time in the 17th century. It may have been found that the rice helped speed the fermentation process. Although the ingredients used in preparing idli have changed, the preparation process and the name have still remained the same.{{Fact|date=November 2007}}.<br /> <br /> == Preparation ==<br /> [[Image:Sa idli stand.jpg|thumb|left|Idli batter is poured into the round indentations of the idli pans (pictured) and placed into a pressure cooker.]]<br /> <br /> To make idli, two parts uncooked rice to one part split black lentil ([[Urad dal]]) are soaked. The lentils and rice are then ground to a paste in a heavy stone grinding vessel ([[aatu kal]]). This paste is allowed to ferment overnight, until it expands to about 2½ times its original volume. In the morning, the idli batter is put into the [[ghee]]-greased molds of an idli tray or &quot;tree&quot; for steaming. These molds are perforated to allow the idlis to be cooked evenly. The tree holds the trays above the level of boiling water in a pot, and the pot is covered until the idlis are done (about 10-25 minutes, depending on size). The idli is somewhat similar to the [[dosa]], a fried preparation of the same batter.<br /> <br /> In the olden days, when the idli mold cooking plates were not popular or widely available, the thick idli batter was poured on a cloth tightly tied on the mouth of a concave deep [[Cooking pan]] or [[tava]] half filled with water. A heavy lid was placed on the pan and the pot kept on the boil until the batter was cooked into idli. This was often a large idli depending on the circumference of the pan. It was then cut into bite-size pieces and eaten.<br /> <br /> ==Contemporary Idlis and variations==<br /> [[Image:Rave Idli.JPG|thumb|right|300px|[[Rava idli]], a specialty of [[Karnataka]]]]<br /> <br /> Southern Indians have brought the popular idli wherever they have settled throughout the world. Cooks have had to solve problems of hard-to-get ingredients, and climates that do not encourage overnight fermentation. One cook noted that idli batter, foaming within a few hours in India, might take several days to rise in Britain. The traditional heavy stones used to [[wet-grind]] the rice and dal are not easily transported. Access to Indian ingredients before the advent of [[Internet]] mail order could be virtually impossible in many places. [[Chlorinated water]] and [[iodized salt]] interfere with fermentation.[[fact]]<br /> <br /> Newer &quot;quick&quot; recipes for the idli can be rice- or wheat-based ([[rava idli]]). [[Parboiled rice]], such as [[Uncle Ben's]] can reduce the soaking time considerably. Store-bought ground rice is available, or [[Cream of Rice]] may be used. Similarly, [[semolina]] or [[Cream of Wheat]] may be used for rava idli. [[Yoghurt]] may be added to provide the sour flavor for unfermented batters. Prepackaged mixes allow for almost instant idlis, for the truly desperate. However, the additional health benefits of fermentation process will be lacking. [[Idli Burger]] is another variation that can be made easily.<br /> <br /> Besides the microwave steamer, [[electric idli steamer]]s are available, with automatic steam release and shut-off for perfect cooking. Both types are non-stick, so a [[fat-free]] idli is possible. Table-mounted electric [[Wet grinder]]s may take the place of floor-bound ''attu kal''. With these appliances, even the classic idlis can be made more easily.<br /> <br /> The plain rice/black lentil idli continues to be the popular version, but it may also incorporate a variety of extra ingredients, savory or sweet. [[Mustard seed]]s, fresh [[chile pepper]]s, black pepper, cumin, [[coriander]] seed and its fresh leaf form ([[cilantro]]), [[fenugreek]] seeds, [[curry leaves]] , fresh [[ginger root]], [[sesame seeds]], [[nut (fruit)|nut]]s, [[garlic]], [[scallion]]s, [[coconut]], and the unrefined [[sugar]] [[jaggery]] are all possibilities. Filled idlis contain small amounts of [[chutney|chutneys]], sambars, or sauces placed inside before steaming. Idlis are sometimes steamed in a wrapping of leaves such as banana leaves or [[jackfruit]] leaves.<br /> <br /> A variety of idlis are experimented these days, namely, standard idli, mini idlis soaked in sambar, rava idli, Kancheepuram idli, stuffed idli with a filling of potato, beans, carrot and masala, ragi idli, pudi idli with the sprinkling of chutney pudi that covers the bite-sized pieces of idlis, malli idli shallow-fried with coriander and curry leaves, and curd idli dipped in masala curds.<br /> <br /> '''Ramasseri Idli''' : Ramasseri, an offbeat village in Palakkad is known all over Kerala for the idlies it make - the delicious Ramasseri Idli. Spongy and soft Ramasseri Idli is slightly different in shape from the conventional idlies. It is a little flat and round. Ramasseri Idli is eaten with Podi mixed in coconut oil. The beginning was from a Muthaliyar family living near Mannath Bhagavathi Temple in Ramasseri near Elappullly.The recipe of Ramasseri idli dates back to about one century,which again is a trade secret. The Muthaliyar family was migrated to Palakkad from Kanchipuram in Tamil Nadu. The new generation in the profession says that the secret of the recipe and taste were handed down to them from grand old women of the community. Now the idli business is confined to four families in Ramasseri. Selection of rice is very important in making Ramasseri idli. Usually the verities used are Kazhama, Thavalakannan, Ponni etc. The taste starts from the boiling of paddy itself. Drying and dehusking are also important. It is done in a particular way. The combination of rice and black gram is also equally important. For 10 kg of rice, one kg of black gram is used. Idli is made only after four hours of fermentation. Boiling of the idli is done on a cloth covered on the mud pot using firewood. This provides special taste to the preparation.<br /> <br /> Leftover Idli can be torn into crumbs and used for preparing dishes such as [[Idli fry]] and Idli Upma.<br /> <br /> ==Picture gallery==<br /> &lt;gallery&gt;<br /> Image:Idly Wada.jpg|Idli and Vada served with sambar and two type of chutneys (green and red) on banana leaf or plate.<br /> Image:idly sambar vada.JPG|The South Indian staple breakfast item of idli, sambar, and [[vada]] served on a banana leaf. Note the stainless steel plates and cups; characteristic of south Indian dining tables.<br /> Image:tatte-idli.jpg|Tatte Idli: variations from Karnataka<br /> Image:DSC02346.JPG|''Sambar idli'': Idli soaked in sambar. Chutney is the best companion for this dish.<br /> Image:Idli_at_MTR.jpg|''MTR idli'': Famous [[Mavalli Tiffin Room]] idli served with pure ghee and sambar. Pure ghee is poured on steaming idli and relished with chutney or sambar.<br /> Image:Button_idli.JPG|Button Idli. This usually contains fourteen idli and is therefore called &quot;fourteen idli&quot;. However this name came from Floating idli (small idlies floating on [[sambar]], [[rasam]] or [[butter milk]])<br /> Image:Sanna (Commons).jpg|Sanna(s), a [[Goan cuisine|Goan]] variant of idli.<br /> &lt;/gallery&gt;<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> {{refbegin}}<br /> *Achaya, K. T. (1994) ''Indian Food: A Historical Companion'', Oxford University Press ISBN 0-19-563448-9<br /> *Devi, Yamuna (1987) ''Lord Krishna's Cuisine: The Art of Indian Vegetarian Cooking'', Dutton ISBN 0-525-24564-2<br /> *Jaffrey, Madhur (1988) ''A Taste of India'', Atheneum ISBN 0-689-70726-6<br /> *Rau, Santha Rama (1969) ''The Cooking of India'', Time-Life Books<br /> *{{cite book |last= Farnworth|first= Edward R.|title= Handbook of Fermented Functional Foods |origyear=2003|year=|publisher= CRC Press|isbn= 9780849313721 }}<br /> {{refend}}<br /> <br /> ==See also==<br /> *[[Chwee kueh]]<br /> *[[White sugar sponge cake]]<br /> *[[Bánh bò]]<br /> <br /> {{cookbook}}<br /> {{commonscat|Idli}}<br /> <br /> {{Cuisine of Malaysia}}<br /> <br /> [[Category:Indian fast food]]<br /> [[Category:Indian breads]]<br /> [[Category:Rice dishes]]<br /> [[Category:Fermented foods]]<br /> [[Category:Andhra cuisine]]<br /> [[Category:Karnataka cuisine]]<br /> [[Category:Kerala cuisine]]<br /> [[Category:Tamil cuisine]]<br /> <br /> [[de:Idli]]<br /> [[es:Idli]]<br /> [[kn:ಇಡ್ಲಿ]]<br /> [[ml:ഇഡ്ഡലി]]<br /> [[pl:Idli]]<br /> [[ta:இட்லி]]<br /> [[te:ఇడ్లీ]]</div> PPrakash https://en.wikipedia.org/w/index.php?title=Jama%27at-ud-Da%27wah&diff=257443766 Jama'at-ud-Da'wah 2008-12-12T06:42:20Z <p>PPrakash: /* The aftermath of the November 2008 Mumbai attacks */</p> <hr /> <div>{{nofootnotes|date=December 2008}}<br /> '''Jama'at-ud-Da'wah''' ([[Urdu]]: '''جمعات الدعوہ''') is an organisation launched in [[Lahore]], [[Pakistan]] in 1985. Previously called ''Markaz Daw'a wal Irshad'', the organisation changed its name after the [[United States Department of State]] declared [[Lashkar-e-Taiba]] to be a terrorist organisation.&lt;ref name=&quot;Dawn-Who is Lashkar-e-Tayyiba&quot;&gt;{{cite news |agency=Dawn|url = http://www.dawn.net/wps/wcm/connect/Dawn%20Content%20Library/dawn/news/world/who-are-the-lashkar-e-tayiba-yn |title=Who is Lashkar-e-Tayiba |publisher=Dawn |date=[[2008-12-03]] |accessdate=2008-12-03}}&lt;/ref&gt; It also publicly retracted itself from any association with the group, however the group continues to promote hateful content on its website.&lt;ref&gt;http://e.jamatdawa.org/news_detail.php?news_id=752&lt;/ref&gt;.<br /> <br /> The ''amir'' (leader) of JuD is [[Hafiz Muhammad Saeed]], who was an Islamic Studies professor at the University of Engineering and Technology in [[Lahore]] and the founder of [[Lashkar-e-Toiba]]. He was accused of inciting riots in Pakistan in 2006. He was freed in [[Ramadan]] on the order of High Court.<br /> <br /> JuD runs a weekly newspaper named ''Ghazwa'', three monthly magazines among which two are ''Majalla Tud Dawaa'' and ''Zarb e Taiba'' and a fortnightly magazine for children named ''Roza Tul Itfal.<br /> <br /> JuD's website holds an English section which presents itself as a relief organization, while the Urdu section of the same website holds negative articles concerning India, United States, and Western World.&lt;ref&gt;http://e.jamatdawa.org/news_detail.php?news_id=752&lt;/ref&gt;<br /> <br /> ==The aftermath of the November 2008 Mumbai attacks==<br /> According to a media report, the JuD was accused by the U.S. of being the front group for the prime suspects of the [[November 2008 Mumbai attacks]], the Lashkar-e-Taiba, the terrorist organization that trained the 10 gunmen involved in these attacks.&lt;ref&gt;{{cite news|url=http://hosted.ap.org/dynamic/stories/A/AS_PAKISTAN_SHOOTINGS_MILITANT_TEST?SITE=AP&amp;SECTION=HOME&amp;TEMPLATE=DEFAULT&amp;CTIME=2008-12-05-10-39-16|title=Pakistan charity under suspicion in India attacks|author=Dogar, Babar|publisher=Associated Press|date=December 5, 2008|accessdate=2008-12-05}}&lt;/ref&gt; <br /> <br /> On December 7, 2008, under pressure from USA and India, Pakistani army launched an operation against LeT and Jama'at-ud-Dawah and raided a ''markaz'' (centre) of the JuD at Shawai Nullah, 5 km from [[Muzaffarabad]] in Pakistan-controlled [[Azad Kashmir]]. The army arrested more than twenty members of the [[Lashkar-e-Taiba]] and [[Zaki-ur-Rehman Lakhvi]], the alleged mastermind of the [[November 2008 Mumbai attacks]]. They are said to have sealed off the centre, which included a ''madrassa'' and a mosque alongside offices of the JuD.<br /> &lt;ref&gt;{{cite news|url=http://www.dawn.com/2008/12/08/top3.htm|title=Operation against LeT-Dawa launched in AJK|author=Naqash, Tariq and Syed Irfan Raza|publisher=Dawn|date=December 9, 2008|accessdate=2008-12-10}}&lt;/ref&gt;&lt;ref&gt;{{cite news|url=http://www.thehindu.com/2008/12/09/stories/2008120960721300.htm|title=Shut down LeT operations, India tells Pakistan|author=Subramanian, Nirupama|publisher=The Hindu|date=December 8, 2008|accessdate=2008-12-10}}&lt;/ref&gt;<br /> <br /> On December 10, 2008 India formally requested the [[United Nations Security Council]] to designate JuD as a terrorist organization. Subsequently, Pakistan's ambassador to the United Nations Abdullah Hussain gave an undertaking, saying,&lt;ref&gt;{{cite news|url=http://timesofindia.indiatimes.com/Pakistan_likely_to_ban_Jamaat-ud-Dawa/articleshow/3817081.cms|title=Pakistan likely to ban Jamaat-ud-Dawa<br /> |publisher=The Times od India|date=December 10, 2008|accessdate=2008-12-10}}&lt;/ref&gt;<br /> {{bquote|After the designation of Jamaat-ud-Dawah (JUD) under (resolution) 1267, the government on receiving communication from the Security Council shall proscribe the JUD and take other consequential actions, as required, including the freezing of assets.}}<br /> <br /> A similar assurance was given by Pakistan in 2002 when it clamped down on the LeT, however, the LeT was covertly allowed to function under the guide of the JuD. While arrests have been made, the Pakistani Government has categorically refused to let any foreign investigators access to Hafiz Saeed.<br /> <br /> On December 11, 2008 the United Nations Security Council imposed sanctions on JuD, declaring it a global terrorist group. But, Hafiz Muhammad Saeed, the chief of JuD declared that his group will challenge the sanctions imposed on it in all forums.&lt;ref&gt;{{cite news|url=http://economictimes.indiatimes.com/News/PoliticsNation/Jamat-ud-Dawah_denies_Lashkar_link_says_will_challenge_ban/articleshow/3823601.cms|title=Jamat-ud-Dawah denies Lashkar link, says will challenge ban|publisher=The Economic Times|date=December 11, 2008|accessdate=2008-12-11}}&lt;/ref&gt; Pakistan government also banned the JuD on the same day and issued order to seal the JuD in all the four provinces as well as Pakistan-controlled [[Pakistan Occupied Kashmir]].&lt;ref&gt;{{cite news|url=http://timesofindia.indiatimes.com/Pakistan_bans_Jamaat_shuts_all_its_offices_/articleshow/3824291.cms|title=Pakistan bans Jamaat-ud-Dawa, shuts offices|publisher=The Times of India|date=December 11, 2008|accessdate=2008-12-11}}&lt;/ref&gt;<br /> <br /> ==Notes==<br /> {{reflist}}<br /> ==References==<br /> * [http://www.jamatdawa.org Jama'at-ud-Da'wah Pakistan official Website (English/Urdu/Arabic)]<br /> * [http://www.jamatuddawa.org/English2 Jama'at-ud-Da'wah Pakistan Older version of the official website (English)]<br /> * [http://news.bbc.co.uk/1/hi/world/south_asia/5402756.stm BBC News about the Relief work.]<br /> * [http://www.pbs.org/frontlineworld/blog/2006/11/kashmir_quake_a.html PBS report about Jamat-ud-Dawa's relief work in Kashmir]<br /> *[http://sfgate.com/cgi-bin/article.cgi?file=/c/a/2005/10/17/MNGJEF9G0M1.DTL San Francisco Chronicle article about the Ad-Dawa Relief work]<br /> *[http://www.jamatuddawa.org/urdunews/142911/30/index.htm War against terrorism actually a war against Islam - JUD Urdu Website]<br /> *[http://www.jamatuddawa.org/marsad/nov08/mujnov08/aabijarhiyat.html Horrific Savageness of India - JUD Urdu Website]<br /> *[http://www.cnsnews.com/public/content/article.aspx?RsrcID=40270 - Pakistan refuses to extradite suspects]<br /> <br /> [[Category:Islamist groups]]<br /> [[Category:Islamic organizations]]<br /> <br /> {{pakistan-org-stub}}<br /> <br /> [[lt:Jama'at-ud-Da'wah]]</div> PPrakash https://en.wikipedia.org/w/index.php?title=Fibre_Channel&diff=161997912 Fibre Channel 2007-10-03T12:15:53Z <p>PPrakash: /* See also */</p> <hr /> <div>'''Fibre Channel''' is a gigabit-speed network technology primarily used for [[storage networking]]. Fibre Channel is standardized in the [[Technical_Committee_T11|T11 Technical Committee]] of the InterNational Committee for Information Technology Standards ([[INCITS]]), an [[American National Standards Institute]] (ANSI)–accredited standards committee.<br /> It started for use primarily in the [[supercomputer]] field, but has become the standard connection type for [[storage area network]]s (SAN) in [[enterprise storage]]. Despite common connotations of its name, Fibre Channel signaling can run on both [[twisted pair]] [[copper]] [[wire]] and [[fiber-optic communication|fiber-optic]] [[cable]]s.<br /> <br /> Fibre Channel Protocol (FCP) is the interface protocol of [[SCSI]] on the Fibre Channel.<br /> <br /> == History ==<br /> Fibre Channel started in 1988, with ANSI standard approval in 1994, as a way to simplify the [[HIPPI]] system then in use for similar roles. HIPPI used a massive 50-pair cable with bulky connectors, and had limited cable lengths. Fibre Channel was primarily concerned with simplifying the connections and increasing distances, as opposed to increasing speeds. Later, designers added the goals of connecting [[SCSI]] disk storage, providing higher speeds and far greater numbers of connected devices.<br /> <br /> It also added support for any number of &quot;upper layer&quot; protocols, including [[SCSI]], [[Asynchronous Transfer Mode|ATM]], and [[Internet Protocol|IP]], with [[SCSI]] being the predominant usage.<br /> <br /> {| class=&quot;wikitable&quot; style=&quot;margin: 1em auto 1em auto&quot;<br /> |+ Fibre Channel Variants<br /> | '''NAME'''<br /> | '''Line-Rate''' (Gbit/s)<br /> | '''Throughput ( Mbyte/s)<br /> |-<br /> | 1GFC<br /> | 1.0625<br /> | 100<br /> |-<br /> | 2GFC<br /> | 2.125<br /> | 200<br /> |-<br /> | 4GFC<br /> | 4.25<br /> | 400<br /> |-<br /> | 8GFC<br /> | 8.5<br /> | 800<br /> |-<br /> | 10GFC Serial<br /> | 10.51875<br /> | 1000<br /> |-<br /> | 20GFC<br /> | 10.52<br /> | 2000<br /> |-<br /> | 10GFC Parallel<br /> | 12.75 <br /> | <br /> |}<br /> <br /> == Fibre Channel topologies==<br /> There are three major Fibre Channel topologies, describing how a number of [[Computer port (software)|ports]] are connected together. A ''port'' in Fibre Channel terminology is any entity that actively communicates over the network, not necessarily a [[Computer port (hardware)|hardware port]]. Port is usually implemented in a device such as disk storage, an [[Host bus adapter|HBA]] on server or a [[Fibre Channel switch]].<br /> <br /> *'''[[SAN Point-to-Point|Point-to-Point]]''' (''FC-P2P''). Two devices are connected back to back. This is the simplest topology, with limited connectivity.<br /> <br /> *'''[[Arbitrated loop]]''' (''FC-AL''). In this design, all devices are in a loop or ring, similar to [[token ring]] networking. Adding or removing a device from the loop causes all activity on the loop to be interrupted. The failure of one device causes a break in the ring. Fibre Channel hubs exist to connect multiple devices together and may bypass failed ports. A loop may also be made by cabling each port to the next in a ring. <br /> **A minimal loop containing only two ports, while appearing to be similar to FC-P2P, differs considerably in terms of the protocol. <br /> *'''[[Fibre Channel fabric|Switched fabric]]''' (''FC-SW''). All devices or loops of devices are connected to [[Fibre Channel switch]]es, similar conceptually to modern [[Ethernet]] implementations. The switches manage the state of the fabric, providing optimized interconnections.<br /> <br /> {| class=&quot;wikitable&quot; style=&quot;margin: 1em auto 1em auto&quot;<br /> |-<br /> ! Attribute || Point-to-Point || Arbitrated loop || Switched fabric<br /> |-<br /> || Max ports || 2 || 127 || ~16777216 (2&lt;sup&gt;24&lt;/sup&gt;)<br /> |-<br /> || Address size || N/A || 8-bit ALPA || 24-bit port ID<br /> |-<br /> || Side effect of port failure || N/A || Loop fails (until port bypassed) || N/A<br /> |-<br /> || Mixing different link rates || N/A || No || Yes<br /> |-<br /> || Frame delivery || In order || In order || Not guaranteed<br /> |-<br /> || Access to medium || Dedicated || Arbitrated || Dedicated<br /> |}<br /> <br /> == Fibre Channel layers ==<br /> Fibre Channel is a layered protocol. It consists of 5 layers, namely:<br /> <br /> *'''FC0''' The physical layer, which includes cables, fiber optics, [[Fibre Channel electrical interface|connectors, pinouts]] etc.<br /> *'''FC1''' The data link layer, which implements the [[Fibre Channel 8B/10B encoding|8b/10b]] encoding and decoding of signals.<br /> *'''FC2''' The network layer, defined by the FC-PI-2 standard, consists of the core of Fibre Channel, and defines the main [[Fibre Channel network protocols|protocols]].<br /> *'''FC3''' The common services layer, a thin layer that could eventually implement functions like encryption or RAID.<br /> *'''FC4''' The Protocol Mapping layer. Layer in which other protocols, such as SCSI, are encapsulated into an information unit for delivery to FC2.<br /> <br /> FC0, FC1, and FC2 are also known as FC-PH, the physical layers of fibre channel.<br /> <br /> Fibre Channel routers operate up to FC4 level (i.e. they are in fact SCSI routers), switches up to FC2, and hubs on FC0 only.<br /> <br /> Fibre Channel products are available at 1 [[Gbit/s]], 2 Gbit/s and 4 Gbit/s. An 8 Gbit/s standard is being developed. A 10 Gbit/s standard has been ratified, but is currently only used to interconnect switches. No 10 Gbit/s initiator or target products are available yet based on that standard. Products based on the 1, 2, 4 and 8 Gbit/s standards should be interoperable, and backward compatible. The 10 Gbit/s standard, however, is not backward compatible with any of the slower speed devices, as it differs considerably on FC1 level ([[64B/66B encoding|64b/66b encoding]] instead of 8b/10b encoding).<br /> <br /> ==Ports==<br /> <br /> [[Image:FC-Topologies.jpg|thumb|right|FC topologies and port types]]<br /> <br /> The following types of ports are defined by Fibre Channel:<br /> <br /> * node ports<br /> ** '''N_port''' is a port on the node (e.g. host or storage device) used with both FC-P2P or FC-SW topologies. Also known as '''Node port'''.<br /> ** '''NL_port''' is a port on the node used with an FC-AL topology. Also known as '''Node Loop port'''.<br /> * switch/router ports (used with FC-SW topology only)<br /> ** '''F_port''' is a port on the switch that connects to a node point-to-point (i.e. connects to an N_port). Also known as '''Fabric port'''. An F_port is not loop capable.<br /> ** '''FL_port''' is a port on the switch that connects to a FC-AL loop (i.e. to NL_ports). Also known as '''Fabric Loop port'''. Note that a switch port may automatically become either an F_port or an FL_port depending on what is connected.<br /> ** '''E_port''' is the connection between two fibre channel switches. Also known as an '''Expansion port'''. When E_ports between two switches form a link, that link is referred to as an inter-switch link (ISL).<br /> ** '''EX_port''' is the connection between a fibre channel router and a fibre channel switch. On the side of the switch it looks like a normal E_port, but on the side of the router it is a EX_port.<br /> ** '''TE_port''' is a term used for multiple E_ports trunked together to create high bandwidth between switches. Also known as '''Trunking Expansion port'''.<br /> * general (catch-all) types<br /> ** '''G_port''' or '''generic port''' on a switch can operate as an E_port or F_port.<br /> ** '''L_port''' is the loose term used for any arbitrated loop port, NL_port or FL_port. Also known as '''Loop port'''.<br /> <br /> == Optical Carrier Medium Variants ==<br /> <br /> [[Image:Lc-sc-fiber-connectors.jpg|thumb|right|Typical Fibre Channel connectors - modern [[Optical fiber connector|LC]] on the left and older [[Optical fiber connector|SC]] (typical for 100 MB/s speeds) on the right]] <br /> <br /> {| class=&quot;wikitable&quot;<br /> |-<br /> ! Media Type || Speed (MB/s) || Transmitter || Variant || Distance<br /> |-<br /> | rowspan=6| [[Single-mode_optical_fiber|Single-Mode Fiber]]<br /> | rowspan=1 align=&quot;center&quot;| 400<br /> | 1300 nm Longwave Laser || 400-SM-LL-I || 2 m - 2 km<br /> |-<br /> | rowspan=2 align=&quot;center&quot;| 200<br /> | 1550 nm Longwave Laser || 200-SM-LL-V || 2 m - &gt;50 km<br /> |-<br /> | 1300 nm Longwave Laser || 200-SM-LL-I || 2 m - 2 km<br /> |-<br /> | rowspan=3 align=&quot;center&quot;| 100<br /> | 1550 nm Longwave Laser || 100-SM-LL-V || 2 m - &gt;50 km<br /> |-<br /> | 1300 nm Longwave Laser || 100-SM-LL-L || 2 m - 10 km<br /> |-<br /> | 1300 nm Longwave Laser || 100-SM-LL-I || 2 m - 2 km<br /> |-<br /> | rowspan=4| [[Multi-mode_optical_fiber|Multimode Fiber (50µm)]]<br /> |align=&quot;center&quot;| 400<br /> | rowspan=4| 850 nm Shortwave Laser<br /> || 400-M5-SN-I || 0.5 m - 150m<br /> |-<br /> |align=&quot;center&quot;| 200 || 200-M5-SN-I || 0.5 m - 300m<br /> |-<br /> |align=&quot;center&quot; rowspan=2| 100<br /> || 100-M6-SN-I || 0.5 m - 300m<br /> |-<br /> || 100-M6-SL-I || 2 m - 175m<br /> |}<br /> <br /> == Fibre Channel Infrastructure ==<br /> Fibre Channel switches are divided into two classes. These classes are not part of the standard, and the classification of every switch is a marketing decision of the manufacturer.<br /> <br /> *'''Directors''' offer a high port-count in a modular (slot-based) chassis with no single point of failure (high availability).<br /> <br /> *'''Switches''' are typically smaller, fixed-configuration (sometimes semi-modular), less redundant devices.<br /> <br /> [[Brocade Communications Systems|Brocade]], [[Cisco]] and [[QLogic]] provide both directors and switches. <br /> <br /> If multiple switch vendors are used in the same fabric (i.e. fabric is ''heterogenous''), the fabric will default to &quot;interoperability mode&quot;, that is to a pure standarized Fibre Channel protocol. Some proprietary, advanced features may be disabled.<br /> <br /> == Fibre Channel Host Bus Adapters ==<br /> Fibre Channel [[Host adaptor|HBA]]s are available for all major [[Open system (computing)|open systems]], computer architectures, and buses, including [[Peripheral Component Interconnect|PCI]] and [[SBus]] (obsolete today). Some are OS dependent. Each HBA has a unique [[World Wide Name]] (WWN), which is similar to an Ethernet [[MAC address]] in that it uses an [[Organizationally Unique Identifier]] (OUI) assigned by the [[IEEE]]. However, WWNs are longer (8 bytes). There are two types of WWNs on a HBA; a '''node WWN (WWNN)''', which is shared by all ports on a host bus adapter, and a '''port WWN (WWPN)''', which is unique to each port. Some Fibre Channel HBA manufacturers are [[Emulex]], [[LSI Corporation|LSI]], [[Qlogic|QLogic]] and [[ATTO Technology]].<br /> <br /> ==See also==<br /> &lt;div style=&quot;-moz-column-count:2; column-count:2;&quot;&gt;<br /> *[[storage area network|Storage Area Network]]<br /> *[[Host Bus Adapter]] (HBA)<br /> *[[Fibre channel frame]]<br /> *[[Fibre Channel network protocols]]<br /> *[[Fibre Channel 8B/10B encoding]]<br /> *[[Fibre Channel electrical interface]]<br /> *[[Fibre Channel fabric]]<br /> **[[Fibre Channel Logins]]<br /> **[[Fibre Channel switch]]<br /> **[[Fibre Channel zoning]]<br /> **[[vsan|Virtual Storage Area Network]]<br /> **[[Registered State Change Notification]]<br /> **[[FSPF|Fabric Shortest Path First]] - routing algorithm<br /> *[[Fibre Channel time out values]]<br /> *[[World Wide Name]]<br /> *[[Integrated Drive Electronics|IDE]], [[Advanced Technology Attachment|ATA]], [[SATA]], [[Serial Attached SCSI|SAS]], [[ATA over Ethernet|AoE]], [[SCSI]], [[iSCSI]], [[PCI Express]]<br /> *[[Fibre Channel over IP]] (FCIP), contrast with [[Internet Fibre Channel Protocol]] (iFCP)<br /> *[[FCoE]] - Fibre Channel over Ethernet<br /> *IP over Fibre Channel ([[IPFC]])<br /> *[[Serial Storage Architecture]] (SSA)<br /> *[[List of Fibre Channel standards]]<br /> *[[List of device bandwidths]]<br /> &lt;/div&gt;<br /> <br /> ==References==<br /> {{nofootnote|article}}<br /> * Clark, T. ''Designing Storage Area Networks'', Addison-Wesley, 1999. ISBN 0-201-61584-3<br /> <br /> == External links ==<br /> &lt;!-- ATTENTION! Please do not add links without discussion and consensus on the talk page. Undiscussed links will be removed. --&gt;<br /> *[http://www.fibrechannel.org/ Fibre Channel Industry Association] (FCIA)<br /> *[http://www.t11.org/index.html INCITS technical committee responsible for FC standards(T11)]<br /> *[http://www.redbooks.ibm.com/redbooks.nsf/0/f98c75e7c6b5a4ca88256d0c0060bcc0?OpenDocument IBM SAN Survival Guide]<br /> *[http://hsi.web.cern.ch/HSI/fcs/spec/overview.htm Fibre Channel overview]<br /> *[http://www.iol.unh.edu/training/fc/tutorials/fc_tutorial.php Fibre Channel tutorial] (UNH-IOL)<br /> *[http://www.snia.org Storage Networking Industry Association] (SNIA)<br /> <br /> [[Category:Fibre Channel]]<br /> [[Category:Computer storage]]<br /> [[Category:SCSI]]<br /> <br /> [[de:Fibre Channel]]<br /> [[es:Canal de fibra]]<br /> [[fr:Fibre Channel]]<br /> [[it:Fibre Channel]]<br /> [[ja:ファイバーチャネル]]<br /> [[pl:Fibre Channel]]<br /> [[pt:Fibre channel]]<br /> [[ru:Fibre Channel]]<br /> [[sv:Fibre Channel]]<br /> [[uk:Fibre Channel]]</div> PPrakash https://en.wikipedia.org/w/index.php?title=Talk:Fibre_Channel_frame&diff=161942231 Talk:Fibre Channel frame 2007-10-03T03:30:25Z <p>PPrakash: /* rewrite needed */</p> <hr /> <div>== rewrite needed ==<br /> <br /> First of all, too many textual images in this article. Wiki supports tables, no need to draw them.<br /> {| class=&quot;wikitable&quot; align=center<br /> |-<br /> ! header 1<br /> ! header 2<br /> ! header 3<br /> |-<br /> | here<br /> | row 1, cell 2<br /> | row 1, cell 3<br /> |-<br /> | row 2, cell 1<br /> | are some <br /> | row 2, cell 3<br /> |-<br /> | row 2, cell 1<br /> | row 2, cell 2<br /> | cells<br /> |}<br /> <br /> Secondly, is Wikipedia article a good place to mirror a INCITS FC-FS-2 standard?<br /> I've always thought about Wikipedia as a place to store useful knowledge. There is a subtle distinction.<br /> <br /> To give the first example: &quot;There are multiple SOF delimiters defined for Sequence control. SOFx is used to represent any SOF.&quot; OK, first things an experienced technical reader, will think of: why multiple? what is the basic difference between various SOFs? what is sequence control? is it very important in my life? do I need to care about that? This article doesn't even ''attempt'' to answer such natural questions.<br /> <br /> --[[User:Kubanczyk|Kubanczyk]] 09:54, 1 October 2007 (UTC)<br /> <br /> [moved to bottom]<br /> I'm new to wiki editing so I find it difficult to create table with multiple rows &amp; columns as in the table that I posted. Further I will try to learn how to use it &amp; will avoid uploading images. <br /> <br /> INCITS FC-FS-2 standard is a huge document of 500 pages so what I thought is to create a single page document where a newbie to Fiber Channel Protocol can learn about it easily.<br /> <br /> Also Kindly guide me how I should improve my presentation by which I can help others by some means. &lt;small&gt;—Preceding [[Wikipedia:Signatures|unsigned]] comment added by [[User:Itzmitit|Itzmitit]] ([[User talk:Itzmitit|talk]] • [[Special:Contributions/Itzmitit|contribs]]) 10:17, 1 October 2007 (UTC)&lt;/small&gt;&lt;!-- Template:Unsigned --&gt; &lt;!--Autosigned by SineBot--&gt;<br /> <br /> [[User:Itzmitit|Itzmitit]] 10:19, 1 October 2007 (UTC)<br /> <br /> :Your intention is a perfect one. A little work is needed to reach the goal &quot;a single page document where a newbie to Fiber Channel Protocol can learn about it easily&quot;. A couple of advices then. <br /> <br /> :The language: In a standard you ''create'' reality, in encyclopedia you ''describe'' existing reality. In standard use &quot;you shall do this or that&quot;, in encyclopedia &quot;usually things are done in this or that way&quot;.<br /> <br /> :Next, instead of selecting some sentences from INCITS, just write ''a story'' for a FC newbie. Give only a few most important facts. If SOFx is not so important, just don't mention it at all. If you feel it is important get into them, get deeply, to the point when reader will be confident that he/she understands it. If you mention too much facts, text becomes noise.<br /> <br /> :Happy editing.<br /> :--[[User:Kubanczyk|Kubanczyk]] 10:41, 1 October 2007 (UTC)<br /> <br /> <br /> Yes I'll try to write on my own further &amp; also will follow ur guidance further. Thanks.<br /> [[User:Itzmitit|Itzmitit]] 03:30, 3 October 2007 (UTC)</div> PPrakash https://en.wikipedia.org/w/index.php?title=Talk:Fibre_Channel_frame&diff=161515717 Talk:Fibre Channel frame 2007-10-01T10:19:00Z <p>PPrakash: </p> <hr /> <div>I'm new to wiki editing so I find it difficult to create table with multiple rows &amp; columns as in the table that I posted. Further I will try to learn how to use it &amp; will avoid uploading images. <br /> <br /> INCITS FC-FS-2 standard is a huge document of 500 pages so what I thought is to create a single page document where a newbie to Fiber Channel Protocol can learn about it easily.<br /> <br /> Also Kindly guide me how I should improve my presentation by which I can help others by some means. &lt;small&gt;—Preceding [[Wikipedia:Signatures|unsigned]] comment added by [[User:Itzmitit|Itzmitit]] ([[User talk:Itzmitit|talk]] • [[Special:Contributions/Itzmitit|contribs]]) 10:17, 1 October 2007 (UTC)&lt;/small&gt;&lt;!-- Template:Unsigned --&gt; &lt;!--Autosigned by SineBot--&gt;<br /> <br /> [[User:Itzmitit|Itzmitit]] 10:19, 1 October 2007 (UTC)<br /> <br /> == rewrite needed ==<br /> <br /> First of all, too many textual images in this article. Wiki supports tables, no need to draw them.<br /> {| class=&quot;wikitable&quot; align=center<br /> |-<br /> ! header 1<br /> ! header 2<br /> ! header 3<br /> |-<br /> | here<br /> | row 1, cell 2<br /> | row 1, cell 3<br /> |-<br /> | row 2, cell 1<br /> | are some <br /> | row 2, cell 3<br /> |-<br /> | row 2, cell 1<br /> | row 2, cell 2<br /> | cells<br /> |}<br /> <br /> Secondly, is Wikipedia article a good place to mirror a INCITS FC-FS-2 standard?<br /> I've always thought about Wikipedia as a place to store useful knowledge. There is a subtle distinction.<br /> <br /> To give the first example: &quot;There are multiple SOF delimiters defined for Sequence control. SOFx is used to represent any SOF.&quot; OK, first things an experienced technical reader, will think of: why multiple? what is the basic difference between various SOFs? what is sequence control? is it very important in my life? do I need to care about that? This article doesn't even ''attempt'' to answer such natural questions.<br /> <br /> --[[User:Kubanczyk|Kubanczyk]] 09:54, 1 October 2007 (UTC)</div> PPrakash https://en.wikipedia.org/w/index.php?title=Talk:Fibre_Channel_frame&diff=161515532 Talk:Fibre Channel frame 2007-10-01T10:17:18Z <p>PPrakash: /* rewrite needed */</p> <hr /> <div>I'm new to wiki editing so I find it difficult to create table with multiple rows &amp; columns as in the table that I posted. Further I will try to learn how to use it &amp; will avoid uploading images. <br /> <br /> INCITS FC-FS-2 standard is a huge document of 500 pages so what I thought is to create a single page document where a newbie to Fiber Channel Protocol can learn about it easily.<br /> <br /> Also Kindly guide me how I should improve my presentation by which I can help others by some means.<br /> <br /> == rewrite needed ==<br /> <br /> First of all, too many textual images in this article. Wiki supports tables, no need to draw them.<br /> {| class=&quot;wikitable&quot; align=center<br /> |-<br /> ! header 1<br /> ! header 2<br /> ! header 3<br /> |-<br /> | here<br /> | row 1, cell 2<br /> | row 1, cell 3<br /> |-<br /> | row 2, cell 1<br /> | are some <br /> | row 2, cell 3<br /> |-<br /> | row 2, cell 1<br /> | row 2, cell 2<br /> | cells<br /> |}<br /> <br /> Secondly, is Wikipedia article a good place to mirror a INCITS FC-FS-2 standard?<br /> I've always thought about Wikipedia as a place to store useful knowledge. There is a subtle distinction.<br /> <br /> To give the first example: &quot;There are multiple SOF delimiters defined for Sequence control. SOFx is used to represent any SOF.&quot; OK, first things an experienced technical reader, will think of: why multiple? what is the basic difference between various SOFs? what is sequence control? is it very important in my life? do I need to care about that? This article doesn't even ''attempt'' to answer such natural questions.<br /> <br /> --[[User:Kubanczyk|Kubanczyk]] 09:54, 1 October 2007 (UTC)</div> PPrakash https://en.wikipedia.org/w/index.php?title=Fibre_Channel&diff=161508810 Fibre Channel 2007-10-01T09:17:58Z <p>PPrakash: /* See also */</p> <hr /> <div>'''Fibre Channel''' is a gigabit-speed network technology primarily used for [[storage networking]]. Fibre Channel is standardized in the [[Technical_Committee_T11|T11 Technical Committee]] of the InterNational Committee for Information Technology Standards ([[INCITS]]), an [[American National Standards Institute]] (ANSI)–accredited standards committee.<br /> It started for use primarily in the [[supercomputer]] field, but has become the standard connection type for [[storage area network]]s (SAN) in [[enterprise storage]]. Despite common connotations of its name, Fibre Channel signaling can run on both [[twisted pair]] [[copper]] [[wire]] and [[fiber-optic communication|fiber-optic]] [[cable]]s.<br /> <br /> Fibre Channel Protocol (FCP) is the interface protocol of [[SCSI]] on the Fibre Channel.<br /> <br /> == History ==<br /> Fibre Channel started in 1988, with ANSI standard approval in 1994, as a way to simplify the [[HIPPI]] system then in use for similar roles. HIPPI used a massive 50-pair cable with bulky connectors, and had limited cable lengths. Fibre Channel was primarily concerned with simplifying the connections and increasing distances, as opposed to increasing speeds. Later, designers added the goals of connecting [[SCSI]] disk storage, providing higher speeds and far greater numbers of connected devices.<br /> <br /> It also added support for any number of &quot;upper layer&quot; protocols, including [[SCSI]], [[Asynchronous Transfer Mode|ATM]], and [[Internet Protocol|IP]], with [[SCSI]] being the predominant usage.<br /> <br /> {| class=&quot;wikitable&quot; style=&quot;margin: 1em auto 1em auto&quot;<br /> |+ Fibre Channel Variants<br /> | '''NAME'''<br /> | '''Line-Rate''' (Gbit/s)<br /> | '''Throughput ( Mbyte/s)<br /> |-<br /> | 1GFC<br /> | 1.0625<br /> | 100<br /> |-<br /> | 2GFC<br /> | 2.125<br /> | 200<br /> |-<br /> | 4GFC<br /> | 4.25<br /> | 400<br /> |-<br /> | 8GFC<br /> | 8.5<br /> | 800<br /> |-<br /> | 10GFC Serial<br /> | 10.51875<br /> | 1000<br /> |-<br /> | 20GFC<br /> | 10.52<br /> | 2000<br /> |-<br /> | 10GFC Parallel<br /> | 12.75 <br /> | <br /> |}<br /> <br /> == Fibre Channel topologies==<br /> There are three major Fibre Channel topologies, describing how a number of [[Computer port (software)|ports]] are connected together. A ''port'' in Fibre Channel terminology is any entity that actively communicates over the network, not necessarily a [[Computer port (hardware)|hardware port]]. Port is usually implemented in a device such as disk storage, an [[Host bus adapter|HBA]] on server or a [[Fibre Channel switch]].<br /> <br /> *'''[[SAN Point-to-Point|Point-to-Point]]''' (''FC-P2P''). Two devices are connected back to back. This is the simplest topology, with limited connectivity.<br /> <br /> *'''[[Arbitrated loop]]''' (''FC-AL''). In this design, all devices are in a loop or ring, similar to [[token ring]] networking. Adding or removing a device from the loop causes all activity on the loop to be interrupted. The failure of one device causes a break in the ring. Fibre Channel hubs exist to connect multiple devices together and may bypass failed ports. A loop may also be made by cabling each port to the next in a ring. <br /> **A minimal loop containing only two ports, while appearing to be similar to FC-P2P, differs considerably in terms of the protocol. <br /> *'''[[Fibre Channel fabric|Switched fabric]]''' (''FC-SW''). All devices or loops of devices are connected to [[Fibre Channel switch]]es, similar conceptually to modern [[Ethernet]] implementations. The switches manage the state of the fabric, providing optimized interconnections.<br /> <br /> {| class=&quot;wikitable&quot; style=&quot;margin: 1em auto 1em auto&quot;<br /> |-<br /> ! Attribute || Point-to-Point || Arbitrated loop || Switched fabric<br /> |-<br /> || Max ports || 2 || 127 || ~16777216 (2&lt;sup&gt;24&lt;/sup&gt;)<br /> |-<br /> || Address size || N/A || 8-bit ALPA || 24-bit port ID<br /> |-<br /> || Side effect of port failure || N/A || Loop fails (until port bypassed) || N/A<br /> |-<br /> || Mixing different link rates || N/A || No || Yes<br /> |-<br /> || Frame delivery || In order || In order || Not guaranteed<br /> |-<br /> || Access to medium || Dedicated || Arbitrated || Dedicated<br /> |}<br /> <br /> == Fibre Channel layers ==<br /> Fibre Channel is a layered protocol. It consists of 5 layers, namely:<br /> <br /> *'''FC0''' The physical layer, which includes cables, fiber optics, [[Fibre Channel electrical interface|connectors, pinouts]] etc.<br /> *'''FC1''' The data link layer, which implements the [[Fibre Channel 8B/10B encoding|8b/10b]] encoding and decoding of signals.<br /> *'''FC2''' The network layer, defined by the FC-PI-2 standard, consists of the core of Fibre Channel, and defines the main [[Fibre Channel network protocols|protocols]].<br /> *'''FC3''' The common services layer, a thin layer that could eventually implement functions like encryption or RAID.<br /> *'''FC4''' The Protocol Mapping layer. Layer in which other protocols, such as SCSI, are encapsulated into an information unit for delivery to FC2.<br /> <br /> FC0, FC1, and FC2 are also known as FC-PH, the physical layers of fibre channel.<br /> <br /> Fibre Channel routers operate up to FC4 level (i.e. they are in fact SCSI routers), switches up to FC2, and hubs on FC0 only.<br /> <br /> Fibre Channel products are available at 1 [[Gbit/s]], 2 Gbit/s and 4 Gbit/s. An 8 Gbit/s standard is being developed. A 10 Gbit/s standard has been ratified, but is currently only used to interconnect switches. No 10 Gbit/s initiator or target products are available yet based on that standard. Products based on the 1, 2, 4 and 8 Gbit/s standards should be interoperable, and backward compatible. The 10 Gbit/s standard, however, is not backward compatible with any of the slower speed devices, as it differs considerably on FC1 level ([[64B/66B encoding|64b/66b encoding]] instead of 8b/10b encoding).<br /> <br /> ==Ports==<br /> <br /> [[Image:FC-Topologies.jpg|thumb|right|FC topologies and port types]]<br /> <br /> The following types of ports are defined by Fibre Channel:<br /> <br /> * node ports<br /> ** '''N_port''' is a port on the node (e.g. host or storage device) used with both FC-P2P or FC-SW topologies. Also known as '''Node port'''.<br /> ** '''NL_port''' is a port on the node used with an FC-AL topology. Also known as '''Node Loop port'''.<br /> * switch/router ports (used with FC-SW topology only)<br /> ** '''F_port''' is a port on the switch that connects to a node point-to-point (i.e. connects to an N_port). Also known as '''Fabric port'''. An F_port is not loop capable.<br /> ** '''FL_port''' is a port on the switch that connects to a FC-AL loop (i.e. to NL_ports). Also known as '''Fabric Loop port'''. Note that a switch port may automatically become either an F_port or an FL_port depending on what is connected.<br /> ** '''E_port''' is the connection between two fibre channel switches. Also known as an '''Expansion port'''. When E_ports between two switches form a link, that link is referred to as an inter-switch link (ISL).<br /> ** '''EX_port''' is the connection between a fibre channel router and a fibre channel switch. On the side of the switch it looks like a normal E_port, but on the side of the router it is a EX_port.<br /> ** '''TE_port''' is a term used for multiple E_ports trunked together to create high bandwidth between switches. Also known as '''Trunking Expansion port'''.<br /> * general (catch-all) types<br /> ** '''G_port''' or '''generic port''' on a switch can operate as an E_port or F_port.<br /> ** '''L_port''' is the loose term used for any arbitrated loop port, NL_port or FL_port. Also known as '''Loop port'''.<br /> <br /> == Optical Carrier Medium Variants ==<br /> <br /> [[Image:Lc-sc-fiber-connectors.jpg|thumb|right|Typical Fibre Channel connectors - modern [[Optical fiber connector|LC]] on the left and older [[Optical fiber connector|SC]] (typical for 100 MB/s speeds) on the right]] <br /> <br /> {| class=&quot;wikitable&quot;<br /> |-<br /> ! Media Type || Speed (MB/s) || Transmitter || Variant || Distance<br /> |-<br /> | rowspan=6| [[Single-mode_optical_fiber|Single-Mode Fiber]]<br /> | rowspan=1 align=&quot;center&quot;| 400<br /> | 1300 nm Longwave Laser || 400-SM-LL-I || 2 m - 2 km<br /> |-<br /> | rowspan=2 align=&quot;center&quot;| 200<br /> | 1550 nm Longwave Laser || 200-SM-LL-V || 2 m - &gt;50 km<br /> |-<br /> | 1300 nm Longwave Laser || 200-SM-LL-I || 2 m - 2 km<br /> |-<br /> | rowspan=3 align=&quot;center&quot;| 100<br /> | 1550 nm Longwave Laser || 100-SM-LL-V || 2 m - &gt;50 km<br /> |-<br /> | 1300 nm Longwave Laser || 100-SM-LL-L || 2 m - 10 km<br /> |-<br /> | 1300 nm Longwave Laser || 100-SM-LL-I || 2 m - 2 km<br /> |-<br /> | rowspan=4| [[Multi-mode_optical_fiber|Multimode Fiber (50µm)]]<br /> |align=&quot;center&quot;| 400<br /> | rowspan=4| 850 nm Shortwave Laser<br /> || 400-M5-SN-I || 0.5 m - 150m<br /> |-<br /> |align=&quot;center&quot;| 200 || 200-M5-SN-I || 0.5 m - 300m<br /> |-<br /> |align=&quot;center&quot; rowspan=2| 100<br /> || 100-M6-SN-I || 0.5 m - 300m<br /> |-<br /> || 100-M6-SL-I || 2 m - 175m<br /> |}<br /> <br /> == Fibre Channel Infrastructure ==<br /> Fibre Channel switches are divided into two classes. These classes are not part of the standard, and the classification of every switch is a marketing decision of the manufacturer.<br /> <br /> *'''Directors''' offer a high port-count in a modular (slot-based) chassis with no single point of failure (high availability).<br /> <br /> *'''Switches''' are typically smaller, fixed-configuration (sometimes semi-modular), less redundant devices.<br /> <br /> [[Brocade Communications Systems|Brocade]], [[Cisco]] and [[QLogic]] provide both directors and switches. <br /> <br /> If multiple switch vendors are used in the same fabric (i.e. fabric is ''heterogenous''), the fabric will default to &quot;interoperability mode&quot;, that is to a pure standarized Fibre Channel protocol. Some proprietary, advanced features may be disabled.<br /> <br /> == Fibre Channel Host Bus Adapters ==<br /> Fibre Channel [[Host adaptor|HBA]]s are available for all major [[Open system (computing)|open systems]], computer architectures, and buses, including [[Peripheral Component Interconnect|PCI]] and [[SBus]] (obsolete today). Some are OS dependent. Each HBA has a unique [[World Wide Name]] (WWN), which is similar to an Ethernet [[MAC address]] in that it uses an [[Organizationally Unique Identifier]] (OUI) assigned by the [[IEEE]]. However, WWNs are longer (8 bytes). There are two types of WWNs on a HBA; a '''node WWN (WWNN)''', which is shared by all ports on a host bus adapter, and a '''port WWN (WWPN)''', which is unique to each port. Some Fibre Channel HBA manufacturers are [[Emulex]], [[LSI Corporation|LSI]], [[Qlogic|QLogic]] and [[ATTO Technology]].<br /> <br /> ==See also==<br /> &lt;div style=&quot;-moz-column-count:2; column-count:2;&quot;&gt;<br /> *[[storage area network|Storage Area Network]]<br /> *[[Host Bus Adapter]] (HBA)<br /> *[[Fibre Channel Frame]]<br /> *[[Fibre Channel network protocols]]<br /> *[[Fibre Channel 8B/10B encoding]]<br /> *[[Fibre Channel electrical interface]]<br /> *[[Fibre Channel fabric]]<br /> **[[Fibre Channel Logins]]<br /> **[[Fibre Channel switch]]<br /> **[[Fibre Channel zoning]]<br /> **[[vsan|Virtual Storage Area Network]]<br /> **[[Registered State Change Notification]]<br /> **[[FSPF|Fabric Shortest Path First]] - routing algorithm<br /> *[[Fibre Channel time out values]]<br /> *[[World Wide Name]]<br /> *[[Integrated Drive Electronics|IDE]], [[Advanced Technology Attachment|ATA]], [[SATA]], [[Serial Attached SCSI|SAS]], [[ATA over Ethernet|AoE]], [[SCSI]], [[iSCSI]], [[PCI Express]]<br /> *[[Fibre Channel over IP]] (FCIP), contrast with [[Internet Fibre Channel Protocol]] (iFCP)<br /> *[[FCoE]] - Fibre Channel over Ethernet<br /> *IP over Fibre Channel ([[IPFC]])<br /> *[[Serial Storage Architecture]] (SSA)<br /> *[[List of Fibre Channel standards]]<br /> *[[List of device bandwidths]]<br /> &lt;/div&gt;<br /> <br /> ==References==<br /> {{nofootnote|article}}<br /> * Clark, T. ''Designing Storage Area Networks'', Addison-Wesley, 1999. ISBN 0-201-61584-3<br /> <br /> == External links ==<br /> &lt;!-- ATTENTION! Please do not add links without discussion and consensus on the talk page. Undiscussed links will be removed. --&gt;<br /> *[http://www.fibrechannel.org/ Fibre Channel Industry Association] (FCIA)<br /> *[http://www.t11.org/index.html INCITS technical committee responsible for FC standards(T11)]<br /> *[http://www.redbooks.ibm.com/redbooks.nsf/0/f98c75e7c6b5a4ca88256d0c0060bcc0?OpenDocument IBM SAN Survival Guide]<br /> *[http://hsi.web.cern.ch/HSI/fcs/spec/overview.htm Fibre Channel overview]<br /> *[http://www.iol.unh.edu/training/fc/tutorials/fc_tutorial.php Fibre Channel tutorial] (UNH-IOL)<br /> *[http://www.snia.org Storage Networking Industry Association] (SNIA)<br /> <br /> [[Category:Fibre Channel]]<br /> [[Category:Computer storage]]<br /> [[Category:SCSI]]<br /> <br /> [[de:Fibre Channel]]<br /> [[es:Canal de fibra]]<br /> [[fr:Fibre Channel]]<br /> [[it:Fibre Channel]]<br /> [[ja:ファイバーチャネル]]<br /> [[pl:Fibre Channel]]<br /> [[pt:Fibre channel]]<br /> [[ru:Fibre Channel]]<br /> [[sv:Fibre Channel]]<br /> [[uk:Fibre Channel]]</div> PPrakash https://en.wikipedia.org/w/index.php?title=Fiber_channel_frame&diff=161508767 Fiber channel frame 2007-10-01T09:17:32Z <p>PPrakash: ←Created page with &#039;== Fiber Channel Frame == &#039;&#039;&#039;Fiber Channel Frame&#039;&#039;&#039; is the frame format which should be followed by all FC-2 frames. An FC-2 frame is composed of a SOF delimiter, f...&#039;</p> <hr /> <div>== Fiber Channel Frame ==<br /> '''Fiber Channel Frame''' is the frame format which should be followed by all FC-2 frames. An FC-2 frame is composed of a SOF<br /> delimiter, frame content, and an EOF delimiter. The frame content is composed of 0 or more Extended_Headers, a<br /> Frame_Header, Data_Field, and CRC. Unless otherwise specified, the term frame refers to a FC-2 frame in this<br /> standard.<br /> <br /> <br /> == FC Frame Format ==<br /> <br /> [[Image:FCFF.jpg]]<br /> <br /> '''SOF – Start of Frame:'''<br /> <br /> The Start-of-Frame (SOF) delimiter is an Ordered Set that immediately precedes the frame content. There are multiple SOF delimiters defined for Sequence control. SOFx is used to represent any SOF.<br /> <br /> '''Extended Headers:'''<br /> <br /> Extended Headers, if present, shall immediately follow the SOF delimiter. Each Extended Header is identified by a certain value of its first byte. Extended Headers shall be transmitted on a word boundary<br /> <br /> '''Frame Header:'''<br /> <br /> The Frame Header shall immediately follow the SOF delimiter if no Extended Headers are present, or shall follow the last Extended Header present, for all frames. The Frame Header shall be transmitted on a word boundary. The Frame Header is used by the LCF to control link operations, control device protocol transfers, and detect missing or out of order frames.<br /> <br /> <br /> '''Data Field:'''<br /> <br /> The Data Field shall follow the Frame Header. Data Fields shall be aligned on word boundaries and shall be equal to a multiple of four bytes in length. The length of the Data Field may be zero.<br /> <br /> '''CRC:'''<br /> <br /> The Cyclic Redundancy Check (CRC) is a four byte field that shall immediately follow the Data Field and shall be used to verify the data integrity of the Extended Headers, if any, the Frame Header, and the Data Field. SOF and EOF delimiters shall not be included in the CRC verification. The CRC field shall be calculated on the Extended Headers, if any, the Frame Header and Data Field prior to encoding for transmission and after decoding upon reception. The CRC field shall be aligned on a word boundary. <br /> For the purpose of CRC computation, the bit of the word-aligned, four-byte field that corresponds to the first bit transmitted is the highest order bit.<br /> <br /> The CRC shall use the following 32-bit polynomial:<br /> X32 + X26 + X23 + X22 + X16 + X12 + X11 + X10 + X8 + X7 + X5 + X4 + X2 + X + 1<br /> <br /> '''EOF:'''<br /> <br /> The End-of-Frame (EOF) delimiter is an Ordered Set that immediately follows the CRC and shall be transmitted on a word boundary. The EOF delimiter shall designate the end of the frame content and shall be followed by Fill Words. <br /> There are three categories of EOF delimiters:<br /> a) The first category shall indicate that the frame is valid from the sender's perspective and potentially valid from the receiver's perspective;<br /> b) The second category (EOFdti and EOFni) shall indicate that the frame content is invalid. This category shall only be used by an Fx_Port that receives a complete frame and decodes it before forwarding it; and<br /> c) The third category (EOFa) shall indicate the frame content is corrupted and the frame was truncated during transmission. The third category shall be used by FC_Ports to indicate an internal malfunction (e.g., a transmitter failure that does not allow the entire frame to be transmitted normally).<br /> All frames other than the last frame of a Sequence shall be terminated with an EOFn delimiter.<br /> Each Sequence other than a Sequence that deactivates or removes a Class 1 or Class 6 circuit shall terminate<br /> with an EOFt delimiter. Use of EOFs that deactivate or remove a Class 1 or Class 6 circuit is described in clause<br /> 14.<br /> If an Fx_Port detects a frame error, the Fx_Port shall replace either an EOFn or an EOFt of the frame in error with<br /> the EOFni delimiter.<br /> EOFx is used to represent any EOF.<br /> <br /> <br /> <br /> <br /> == FC Frame Header ==<br /> [[Image:FC-Frame-Header.jpg]]<br /> <br /> '''R_CTL - Routing Control:'''<br /> <br /> The R_CTL field is a one-byte field in Word 0 Bits 31-24 that contains routing bits and information bits to categorize the frame function. When the R_CTL field is used in combination with the TYPE field (Word 2, bits 31-24), it provides an FC_Port with assistance in frame routing, data routing, or addressing.<br /> The R_CTL field is further subdivided into the ROUTING field (bits 31-28) and the INFORMATION field (bits 27-24).<br /> <br /> Table 1 shows the frame types associated with the R_CTL.<br /> <br /> '''INFORMATION Field:'''<br /> <br /> The INFORMATION field is included in R_CTL to assist the receiver of a Data frame in directing the Data Field content to the appropriate buffer pool.<br /> <br /> The R_CTL field for Device Data frames shall be set according to Table 2.<br /> <br /> '''Table 1:'''<br /> [[Image:Table1-rc.jpg]]<br /> <br /> <br /> '''Table 2:'''<br /> [[Image:Table2-rc.jpg]]<br /> <br /> <br /> '''Destination_ID (D_ID): '''<br /> <br /> The D_ID is a three-byte field (Word 0, Bits 23-0) that shall contain the address identifier of the destination Nx_Port.<br /> <br /> <br /> '''Source_ID (S_ID):'''<br /> <br /> The S_ID is a three-byte field (Word 1, Bits 23-0) that shall contain the address identifier of the source Nx_Port.<br /> <br /> <br /> [[Image:Table3-DC.jpg]]<br /> <br /> <br /> <br /> '''CS_CTL/P - Class Specific Control/Priority :'''<br /> <br /> <br /> The meaning of the CS_CTL field is controlled by the CS_CTL/Priority Enable bit (F_CTL, bit 17). When the CS_CTL/Priority Enable bit is set to zero, word 1, bits 31-24 shall be interpreted to be CS_CTL information. When the CS_CTL/Priority Enable bit is set to one, word 1, bits 31-24 shall be interpreted to be Priority information.<br /> <br /> CS_CTL:<br /> <br /> When bit 17 of F_CTL is set to zero, Word 1, bits 31-24 of the Frame Header is defined as the CS_CTL field. It contains management information for the class of service identified by the SOF. The meaning of the CS_CTL field is dependent on the class of service.<br /> <br /> <br /> [[Image:Table4-cstl-c1.jpg]]<br /> <br /> <br /> <br /> [[Image:Table5-cstl-c23.jpg]]<br /> <br /> <br /> Priority:<br /> <br /> When supported by FC_Ports (see FC-LS), the Priority field shall be used to resolve resource contention or to determine the order to deliver frames. The definition and use of the Priority field is class dependent. <br /> <br /> Word 1, bits 31-24 of the Frame_Header shall be defined as the Priority field when the CS_CTL/Priority Enable bit (F_CTL, bit 17) is set to one. The Priority field contains priority information for the class of service identified by the SOF. A value of 0000000b in word 1, bits 31-25 shall indicate that no Priority has been assigned to the frame. The remaining values shall indicate, in ascending order, the relative priority of the frame (e.g., a Priority of 23h shall be considered to have a lower priority than a Priority of 57h). The meaning of Word 1, bit 24 is dependent on the class of service.<br /> <br /> <br /> [[Image:Table6-prio.jpg]]<br /> <br /> <br /> '''Data structure type (TYPE):'''<br /> <br /> The data structure type (TYPE) is a one-byte field (Word 2, Bits 31-24) that shall identify the protocol of the frame content for Data frames.<br /> When the Routing field (word 0, bits 31-28) indicates a Link_Control frame other than F_BSY, the TYPE field (word 0, bits 31-24) is reserved. F_BSY frames use the TYPE field to indicate a reason code for the F_BSY. When the F_BSY is in response to a Link_Control frame, the Information category field (word 0, bits 27-24) of the busied frame is copied by the Fabric into the TYPE field (word 2, bits 27-24).<br /> <br /> <br /> [[Image:table7-type.jpg]]<br /> <br /> <br /> '''F_CTL – Frame Control:'''<br /> <br /> The Frame Control (F_CTL) field (Word 2, Bits 23-0) is a three-byte field that contains control information relating to the frame content. If an error in bit usage is detected, a reject frame (P_RJT) shall be transmitted in response with an appropriate reason code for Class 1, Class 2, and Class 6.<br /> <br /> <br /> [[Image:table8-fctl.jpg]]<br /> <br /> <br /> '''SEQ_ID – Sequence ID:'''<br /> <br /> The SEQ_ID is a one-byte field (Word 3, Bits 31-24) assigned by the Sequence Initiator that shall be unique for a specific D_ID and S_ID pair while the Sequence is open, independent of X_ID. Both the Sequence Initiator and the Sequence Recipient track the status of frames within the Sequence using fields within the Sequence Qualifier. If its X_ID is unassigned, it shall use any other field or fields (e.g., S_ID, D_ID, or the other Nx_Port's X_ID) for tracking.<br /> If the Sequence Initiator initiates a new Sequence for an Exchange in any class of service while it already has Sequences open for that Exchange; it is termed a streamed Sequence. If streamed Sequences occur, it is the responsibility of the Sequence Initiator to use at least X+1 different SEQ_IDs before reusing a SEQ_ID, where X is the number of open Sequences per Exchange (see FC-LS) (e.g., if X = 2 from Login, then a series of SEQ_IDs of 11-93-22-11-93 is acceptable).<br /> If consecutive non-streamed Sequences for the same Exchange occur during a single Sequence Initiative, it is the responsibility of the Sequence Initiator to use a different SEQ_ID for each consecutive Sequence (e.g., a series of SEQ_IDs of 21-74-21-74 is acceptable for consecutive Sequences. The examples show when a SEQ_ID is allowed to be repeated). A series of SEQ_IDs for the same Exchange may also be random and never repeat.<br /> The combination of Initiator and Recipient Sequence Status Blocks identified by a single SEQ_ID describe the status of that Sequence for a given Exchange. <br /> <br /> <br /> '''DF_CTL – Data Field Control:'''<br /> <br /> Data Field Control (DF_CTL) is a one-byte field (Word 3, Bits 23-16) that specifies the presence of optional headers at the beginning of the Data Field.<br /> The Optional Headers shall be positioned in the Data Field in the order specified with the bit 23 header as the first header in the Data Field, bit 22 header as the second header in the Data Field, and so forth, in a left to right manner corresponding to bits 23, 22, 21<br /> If either bit 17 or 16 are set to one, then a Device Header is present. The size of the Device Header is specified by the encoded value of bits 17 and 16.<br /> If an Optional Header is not present as indicated by the appropriate bit in DF_CTL, no space shall be allocated for the Header in the Data Field of the frame (e.g., if bits 23 and 22 are zero and bit 21 is one, the first data byte of the Data Field contains the first byte of the Network Header).<br /> <br /> <br /> [[Image:table9-dfc.jpg]]<br /> <br /> <br /> '''SEQ_CNT – Sequence Count:'''<br /> <br /> The sequence count (SEQ_CNT) is a two-byte field (Word 3, Bits 15-0) that shall indicate the sequential order of Data frame transmission within a single Sequence or multiple consecutive Sequences for the same Exchange. The SEQ_CNT of the first Data frame of the first Sequence of the Exchange transmitted by either the Originator or Responder shall be binary zero. The SEQ_CNT of each subsequent Data frame in the Sequence shall be incremented by one.<br /> <br /> If a Sequence is streamed, the SEQ_CNT of the first Data frame of the Sequence shall be incremented by one from the SEQ_CNT of the last Data frame of the previously sent Sequence. If a Sequence is non-streamed, the starting SEQ_CNT may be continuously increasing or binary zero.<br /> <br /> The same SEQ_ID and SEQ_CNT shall identify ACK and Link Response frames as the frame to which it is responding. Frames are tracked on a SEQ_ID, SEQ_CNT basis within the scope of the Sequence Qualifier for that Sequence.<br /> <br /> The SEQ_CNT shall wrap to zero after reaching a value of 65 535. The SEQ_CNT shall then only be incremented to the SEQ_CNT of an unacknowledged frame of the same Sequence. Otherwise, data integrity is not ensured. In order to ensure frame identification integrity, SEQ_CNT is a 16-bit field while the End-to-end Credit field of the login Class Service Parameters is defined as a 15-bit field. This ensures that EE Credit never exceeds one-half of the maximum SEQ_CNT.<br /> OX_ID – Originator Exchange ID:<br /> <br /> The Originator Exchange ID is a two-byte field (Word 4, Bits 31-16) that shall identify the Exchange ID assigned by the Originator of the Exchange. Each Exchange shall be assigned an identifier unique to the Originator or Originator-Responder pair. If the Originator is enforcing uniqueness via the OX_ID mechanism, it shall set a unique value for OX_ID other than FF FFh in the first Data frame of the first Sequence of an Exchange. An OX_ID of FF FFh indicates that the OX_ID is unassigned and that the Originator is not enforcing uniqueness via the OX_ID mechanism. If an Originator uses the unassigned value of FF FFh to identify the Exchange, it shall have only one<br /> Exchange (OX_ID set to FF FFh) with a given Responder. <br /> <br /> An Originator Exchange Status Block associated with the OX_ID is used to track the progress of a series of Sequences that comprises an Exchange. <br /> <br /> '''RX_ID – Response Exchanger ID:'''<br /> <br /> The Responder Exchange ID is a two byte field (Word 4, Bits 15-0) assigned by the Responder that shall provide a unique, locally meaningful identifier at the Responder for an Exchange established by an Originator and identified by an OX_ID. The Responder of the Exchange shall set a unique value for RX_ID other than FF FFh, if RX_ID is being used, by one of two methods:<br /> <br /> a) in an ACK to a Data frame in the first Sequence of an Exchange in Class 1 and 2; or<br /> b) in the first Sequence transmitted as a Sequence Initiator, if any, in Class 3.<br /> <br /> An RX_ID of FF FFh shall indicate that the RX_ID is unassigned. RX_ID is not used in Class 6 and shall be set to FF FFh for all Class 6 frames. If the Responder does not assign an RX_ID other than FF FFh by the end of the first Sequence, then the Responder is not enforcing uniqueness via the RX_ID mechanism.<br /> <br /> When the Responder uses only FF FFh for RX_ID, it shall have the capability to identify the Exchange through the OX_ID and the S_ID of the Originator of the Exchange. Under all other circumstances, until a value other than FF FFh is assigned, FF FFh value for RX_ID shall be used indicating that RX_ID is unassigned. After a value other than FF FFh is assigned, the assigned value shall be used for the remainder of the Exchange. <br /> A Responder Exchange Status Block associated with the RX_ID is used to track the progress of a series of Sequences that compose an Exchange.<br /> <br /> <br /> <br /> '''Parameter:'''<br /> <br /> The Parameter field (Word 5, Bits 31-0) has meanings based on frame type. For Link Control frames, the Parameter field is used to carry information specific to the individual Link Control frame. For Data frames with the relative offset present bit set to 1, the Parameter field specifies relative offset, a four-byte field that contains the relative displacement of the first byte of the Payload of the frame from the base address as specified by the ULP. Relative offset is expressed in terms of bytes. The use of the relative offset field is optional and is indicated as a Login Service Parameter. If relative offset is being used, the number of bytes transmitted relative to the protocol-specific base address shall be less than the maximum value of the relative offset (Parameter) field (232). For Data frames with the relative offset Present bit set to zero, the Parameter field shall be set and interpreted in a protocol specific manner that may depend on the type of Information Unit carried by the frame.<br /> <br /> Continuously increasing relative offset is the relationship specified between relative offset values contained in frame (n) and frame (n+1) of an Information Category within a single Sequence. Continuously increasing relative offset (ROI) for a given Information Category I is specified by the following:<br /> <br /> OI(n+1) = ROI(n) + Length of PayloadI(n)<br /> <br /> where n is = 0 and represents the consecutive frame count of frames for a given Information Category within a single Sequence. ROI(0) is the initial relative offset for the Information Category I.</div> PPrakash https://en.wikipedia.org/w/index.php?title=Fibre_Channel&diff=161508218 Fibre Channel 2007-10-01T09:12:37Z <p>PPrakash: /* See also */</p> <hr /> <div>'''Fibre Channel''' is a gigabit-speed network technology primarily used for [[storage networking]]. Fibre Channel is standardized in the [[Technical_Committee_T11|T11 Technical Committee]] of the InterNational Committee for Information Technology Standards ([[INCITS]]), an [[American National Standards Institute]] (ANSI)–accredited standards committee.<br /> It started for use primarily in the [[supercomputer]] field, but has become the standard connection type for [[storage area network]]s (SAN) in [[enterprise storage]]. Despite common connotations of its name, Fibre Channel signaling can run on both [[twisted pair]] [[copper]] [[wire]] and [[fiber-optic communication|fiber-optic]] [[cable]]s.<br /> <br /> Fibre Channel Protocol (FCP) is the interface protocol of [[SCSI]] on the Fibre Channel.<br /> <br /> == History ==<br /> Fibre Channel started in 1988, with ANSI standard approval in 1994, as a way to simplify the [[HIPPI]] system then in use for similar roles. HIPPI used a massive 50-pair cable with bulky connectors, and had limited cable lengths. Fibre Channel was primarily concerned with simplifying the connections and increasing distances, as opposed to increasing speeds. Later, designers added the goals of connecting [[SCSI]] disk storage, providing higher speeds and far greater numbers of connected devices.<br /> <br /> It also added support for any number of &quot;upper layer&quot; protocols, including [[SCSI]], [[Asynchronous Transfer Mode|ATM]], and [[Internet Protocol|IP]], with [[SCSI]] being the predominant usage.<br /> <br /> {| class=&quot;wikitable&quot; style=&quot;margin: 1em auto 1em auto&quot;<br /> |+ Fibre Channel Variants<br /> | '''NAME'''<br /> | '''Line-Rate''' (Gbit/s)<br /> | '''Throughput ( Mbyte/s)<br /> |-<br /> | 1GFC<br /> | 1.0625<br /> | 100<br /> |-<br /> | 2GFC<br /> | 2.125<br /> | 200<br /> |-<br /> | 4GFC<br /> | 4.25<br /> | 400<br /> |-<br /> | 8GFC<br /> | 8.5<br /> | 800<br /> |-<br /> | 10GFC Serial<br /> | 10.51875<br /> | 1000<br /> |-<br /> | 20GFC<br /> | 10.52<br /> | 2000<br /> |-<br /> | 10GFC Parallel<br /> | 12.75 <br /> | <br /> |}<br /> <br /> == Fibre Channel topologies==<br /> There are three major Fibre Channel topologies, describing how a number of [[Computer port (software)|ports]] are connected together. A ''port'' in Fibre Channel terminology is any entity that actively communicates over the network, not necessarily a [[Computer port (hardware)|hardware port]]. Port is usually implemented in a device such as disk storage, an [[Host bus adapter|HBA]] on server or a [[Fibre Channel switch]].<br /> <br /> *'''[[SAN Point-to-Point|Point-to-Point]]''' (''FC-P2P''). Two devices are connected back to back. This is the simplest topology, with limited connectivity.<br /> <br /> *'''[[Arbitrated loop]]''' (''FC-AL''). In this design, all devices are in a loop or ring, similar to [[token ring]] networking. Adding or removing a device from the loop causes all activity on the loop to be interrupted. The failure of one device causes a break in the ring. Fibre Channel hubs exist to connect multiple devices together and may bypass failed ports. A loop may also be made by cabling each port to the next in a ring. <br /> **A minimal loop containing only two ports, while appearing to be similar to FC-P2P, differs considerably in terms of the protocol. <br /> *'''[[Fibre Channel fabric|Switched fabric]]''' (''FC-SW''). All devices or loops of devices are connected to [[Fibre Channel switch]]es, similar conceptually to modern [[Ethernet]] implementations. The switches manage the state of the fabric, providing optimized interconnections.<br /> <br /> {| class=&quot;wikitable&quot; style=&quot;margin: 1em auto 1em auto&quot;<br /> |-<br /> ! Attribute || Point-to-Point || Arbitrated loop || Switched fabric<br /> |-<br /> || Max ports || 2 || 127 || ~16777216 (2&lt;sup&gt;24&lt;/sup&gt;)<br /> |-<br /> || Address size || N/A || 8-bit ALPA || 24-bit port ID<br /> |-<br /> || Side effect of port failure || N/A || Loop fails (until port bypassed) || N/A<br /> |-<br /> || Mixing different link rates || N/A || No || Yes<br /> |-<br /> || Frame delivery || In order || In order || Not guaranteed<br /> |-<br /> || Access to medium || Dedicated || Arbitrated || Dedicated<br /> |}<br /> <br /> == Fibre Channel layers ==<br /> Fibre Channel is a layered protocol. It consists of 5 layers, namely:<br /> <br /> *'''FC0''' The physical layer, which includes cables, fiber optics, [[Fibre Channel electrical interface|connectors, pinouts]] etc.<br /> *'''FC1''' The data link layer, which implements the [[Fibre Channel 8B/10B encoding|8b/10b]] encoding and decoding of signals.<br /> *'''FC2''' The network layer, defined by the FC-PI-2 standard, consists of the core of Fibre Channel, and defines the main [[Fibre Channel network protocols|protocols]].<br /> *'''FC3''' The common services layer, a thin layer that could eventually implement functions like encryption or RAID.<br /> *'''FC4''' The Protocol Mapping layer. Layer in which other protocols, such as SCSI, are encapsulated into an information unit for delivery to FC2.<br /> <br /> FC0, FC1, and FC2 are also known as FC-PH, the physical layers of fibre channel.<br /> <br /> Fibre Channel routers operate up to FC4 level (i.e. they are in fact SCSI routers), switches up to FC2, and hubs on FC0 only.<br /> <br /> Fibre Channel products are available at 1 [[Gbit/s]], 2 Gbit/s and 4 Gbit/s. An 8 Gbit/s standard is being developed. A 10 Gbit/s standard has been ratified, but is currently only used to interconnect switches. No 10 Gbit/s initiator or target products are available yet based on that standard. Products based on the 1, 2, 4 and 8 Gbit/s standards should be interoperable, and backward compatible. The 10 Gbit/s standard, however, is not backward compatible with any of the slower speed devices, as it differs considerably on FC1 level ([[64B/66B encoding|64b/66b encoding]] instead of 8b/10b encoding).<br /> <br /> ==Ports==<br /> <br /> [[Image:FC-Topologies.jpg|thumb|right|FC topologies and port types]]<br /> <br /> The following types of ports are defined by Fibre Channel:<br /> <br /> * node ports<br /> ** '''N_port''' is a port on the node (e.g. host or storage device) used with both FC-P2P or FC-SW topologies. Also known as '''Node port'''.<br /> ** '''NL_port''' is a port on the node used with an FC-AL topology. Also known as '''Node Loop port'''.<br /> * switch/router ports (used with FC-SW topology only)<br /> ** '''F_port''' is a port on the switch that connects to a node point-to-point (i.e. connects to an N_port). Also known as '''Fabric port'''. An F_port is not loop capable.<br /> ** '''FL_port''' is a port on the switch that connects to a FC-AL loop (i.e. to NL_ports). Also known as '''Fabric Loop port'''. Note that a switch port may automatically become either an F_port or an FL_port depending on what is connected.<br /> ** '''E_port''' is the connection between two fibre channel switches. Also known as an '''Expansion port'''. When E_ports between two switches form a link, that link is referred to as an inter-switch link (ISL).<br /> ** '''EX_port''' is the connection between a fibre channel router and a fibre channel switch. On the side of the switch it looks like a normal E_port, but on the side of the router it is a EX_port.<br /> ** '''TE_port''' is a term used for multiple E_ports trunked together to create high bandwidth between switches. Also known as '''Trunking Expansion port'''.<br /> * general (catch-all) types<br /> ** '''G_port''' or '''generic port''' on a switch can operate as an E_port or F_port.<br /> ** '''L_port''' is the loose term used for any arbitrated loop port, NL_port or FL_port. Also known as '''Loop port'''.<br /> <br /> == Optical Carrier Medium Variants ==<br /> <br /> [[Image:Lc-sc-fiber-connectors.jpg|thumb|right|Typical Fibre Channel connectors - modern [[Optical fiber connector|LC]] on the left and older [[Optical fiber connector|SC]] (typical for 100 MB/s speeds) on the right]] <br /> <br /> {| class=&quot;wikitable&quot;<br /> |-<br /> ! Media Type || Speed (MB/s) || Transmitter || Variant || Distance<br /> |-<br /> | rowspan=6| [[Single-mode_optical_fiber|Single-Mode Fiber]]<br /> | rowspan=1 align=&quot;center&quot;| 400<br /> | 1300 nm Longwave Laser || 400-SM-LL-I || 2 m - 2 km<br /> |-<br /> | rowspan=2 align=&quot;center&quot;| 200<br /> | 1550 nm Longwave Laser || 200-SM-LL-V || 2 m - &gt;50 km<br /> |-<br /> | 1300 nm Longwave Laser || 200-SM-LL-I || 2 m - 2 km<br /> |-<br /> | rowspan=3 align=&quot;center&quot;| 100<br /> | 1550 nm Longwave Laser || 100-SM-LL-V || 2 m - &gt;50 km<br /> |-<br /> | 1300 nm Longwave Laser || 100-SM-LL-L || 2 m - 10 km<br /> |-<br /> | 1300 nm Longwave Laser || 100-SM-LL-I || 2 m - 2 km<br /> |-<br /> | rowspan=4| [[Multi-mode_optical_fiber|Multimode Fiber (50µm)]]<br /> |align=&quot;center&quot;| 400<br /> | rowspan=4| 850 nm Shortwave Laser<br /> || 400-M5-SN-I || 0.5 m - 150m<br /> |-<br /> |align=&quot;center&quot;| 200 || 200-M5-SN-I || 0.5 m - 300m<br /> |-<br /> |align=&quot;center&quot; rowspan=2| 100<br /> || 100-M6-SN-I || 0.5 m - 300m<br /> |-<br /> || 100-M6-SL-I || 2 m - 175m<br /> |}<br /> <br /> == Fibre Channel Infrastructure ==<br /> Fibre Channel switches are divided into two classes. These classes are not part of the standard, and the classification of every switch is a marketing decision of the manufacturer.<br /> <br /> *'''Directors''' offer a high port-count in a modular (slot-based) chassis with no single point of failure (high availability).<br /> <br /> *'''Switches''' are typically smaller, fixed-configuration (sometimes semi-modular), less redundant devices.<br /> <br /> [[Brocade Communications Systems|Brocade]], [[Cisco]] and [[QLogic]] provide both directors and switches. <br /> <br /> If multiple switch vendors are used in the same fabric (i.e. fabric is ''heterogenous''), the fabric will default to &quot;interoperability mode&quot;, that is to a pure standarized Fibre Channel protocol. Some proprietary, advanced features may be disabled.<br /> <br /> == Fibre Channel Host Bus Adapters ==<br /> Fibre Channel [[Host adaptor|HBA]]s are available for all major [[Open system (computing)|open systems]], computer architectures, and buses, including [[Peripheral Component Interconnect|PCI]] and [[SBus]] (obsolete today). Some are OS dependent. Each HBA has a unique [[World Wide Name]] (WWN), which is similar to an Ethernet [[MAC address]] in that it uses an [[Organizationally Unique Identifier]] (OUI) assigned by the [[IEEE]]. However, WWNs are longer (8 bytes). There are two types of WWNs on a HBA; a '''node WWN (WWNN)''', which is shared by all ports on a host bus adapter, and a '''port WWN (WWPN)''', which is unique to each port. Some Fibre Channel HBA manufacturers are [[Emulex]], [[LSI Corporation|LSI]], [[Qlogic|QLogic]] and [[ATTO Technology]].<br /> <br /> ==See also==<br /> &lt;div style=&quot;-moz-column-count:2; column-count:2;&quot;&gt;<br /> *[[storage area network|Storage Area Network]]<br /> *[[Host Bus Adapter]] (HBA)<br /> *[[Fibre Channel network protocols]]<br /> *[[Fibre Channel Frame]]<br /> *[[Fibre Channel 8B/10B encoding]]<br /> *[[Fibre Channel electrical interface]]<br /> *[[Fibre Channel fabric]]<br /> **[[Fibre Channel Logins]]<br /> **[[Fibre Channel switch]]<br /> **[[Fibre Channel zoning]]<br /> **[[vsan|Virtual Storage Area Network]]<br /> **[[Registered State Change Notification]]<br /> **[[FSPF|Fabric Shortest Path First]] - routing algorithm<br /> *[[Fibre Channel time out values]]<br /> *[[World Wide Name]]<br /> *[[Integrated Drive Electronics|IDE]], [[Advanced Technology Attachment|ATA]], [[SATA]], [[Serial Attached SCSI|SAS]], [[ATA over Ethernet|AoE]], [[SCSI]], [[iSCSI]], [[PCI Express]]<br /> *[[Fibre Channel over IP]] (FCIP), contrast with [[Internet Fibre Channel Protocol]] (iFCP)<br /> *[[FCoE]] - Fibre Channel over Ethernet<br /> *IP over Fibre Channel ([[IPFC]])<br /> *[[Serial Storage Architecture]] (SSA)<br /> *[[List of Fibre Channel standards]]<br /> *[[List of device bandwidths]]<br /> &lt;/div&gt;<br /> <br /> ==References==<br /> {{nofootnote|article}}<br /> * Clark, T. ''Designing Storage Area Networks'', Addison-Wesley, 1999. ISBN 0-201-61584-3<br /> <br /> == External links ==<br /> &lt;!-- ATTENTION! Please do not add links without discussion and consensus on the talk page. Undiscussed links will be removed. --&gt;<br /> *[http://www.fibrechannel.org/ Fibre Channel Industry Association] (FCIA)<br /> *[http://www.t11.org/index.html INCITS technical committee responsible for FC standards(T11)]<br /> *[http://www.redbooks.ibm.com/redbooks.nsf/0/f98c75e7c6b5a4ca88256d0c0060bcc0?OpenDocument IBM SAN Survival Guide]<br /> *[http://hsi.web.cern.ch/HSI/fcs/spec/overview.htm Fibre Channel overview]<br /> *[http://www.iol.unh.edu/training/fc/tutorials/fc_tutorial.php Fibre Channel tutorial] (UNH-IOL)<br /> *[http://www.snia.org Storage Networking Industry Association] (SNIA)<br /> <br /> [[Category:Fibre Channel]]<br /> [[Category:Computer storage]]<br /> [[Category:SCSI]]<br /> <br /> [[de:Fibre Channel]]<br /> [[es:Canal de fibra]]<br /> [[fr:Fibre Channel]]<br /> [[it:Fibre Channel]]<br /> [[ja:ファイバーチャネル]]<br /> [[pl:Fibre Channel]]<br /> [[pt:Fibre channel]]<br /> [[ru:Fibre Channel]]<br /> [[sv:Fibre Channel]]<br /> [[uk:Fibre Channel]]</div> PPrakash https://en.wikipedia.org/w/index.php?title=Fibre_Channel&diff=161506828 Fibre Channel 2007-10-01T09:01:43Z <p>PPrakash: /* See also */</p> <hr /> <div>'''Fibre Channel''' is a gigabit-speed network technology primarily used for [[storage networking]]. Fibre Channel is standardized in the [[Technical_Committee_T11|T11 Technical Committee]] of the InterNational Committee for Information Technology Standards ([[INCITS]]), an [[American National Standards Institute]] (ANSI)–accredited standards committee.<br /> It started for use primarily in the [[supercomputer]] field, but has become the standard connection type for [[storage area network]]s (SAN) in [[enterprise storage]]. Despite common connotations of its name, Fibre Channel signaling can run on both [[twisted pair]] [[copper]] [[wire]] and [[fiber-optic communication|fiber-optic]] [[cable]]s.<br /> <br /> Fibre Channel Protocol (FCP) is the interface protocol of [[SCSI]] on the Fibre Channel.<br /> <br /> == History ==<br /> Fibre Channel started in 1988, with ANSI standard approval in 1994, as a way to simplify the [[HIPPI]] system then in use for similar roles. HIPPI used a massive 50-pair cable with bulky connectors, and had limited cable lengths. Fibre Channel was primarily concerned with simplifying the connections and increasing distances, as opposed to increasing speeds. Later, designers added the goals of connecting [[SCSI]] disk storage, providing higher speeds and far greater numbers of connected devices.<br /> <br /> It also added support for any number of &quot;upper layer&quot; protocols, including [[SCSI]], [[Asynchronous Transfer Mode|ATM]], and [[Internet Protocol|IP]], with [[SCSI]] being the predominant usage.<br /> <br /> {| class=&quot;wikitable&quot; style=&quot;margin: 1em auto 1em auto&quot;<br /> |+ Fibre Channel Variants<br /> | '''NAME'''<br /> | '''Line-Rate''' (Gbit/s)<br /> | '''Throughput ( Mbyte/s)<br /> |-<br /> | 1GFC<br /> | 1.0625<br /> | 100<br /> |-<br /> | 2GFC<br /> | 2.125<br /> | 200<br /> |-<br /> | 4GFC<br /> | 4.25<br /> | 400<br /> |-<br /> | 8GFC<br /> | 8.5<br /> | 800<br /> |-<br /> | 10GFC Serial<br /> | 10.51875<br /> | 1000<br /> |-<br /> | 20GFC<br /> | 10.52<br /> | 2000<br /> |-<br /> | 10GFC Parallel<br /> | 12.75 <br /> | <br /> |}<br /> <br /> == Fibre Channel topologies==<br /> There are three major Fibre Channel topologies, describing how a number of [[Computer port (software)|ports]] are connected together. A ''port'' in Fibre Channel terminology is any entity that actively communicates over the network, not necessarily a [[Computer port (hardware)|hardware port]]. Port is usually implemented in a device such as disk storage, an [[Host bus adapter|HBA]] on server or a [[Fibre Channel switch]].<br /> <br /> *'''[[SAN Point-to-Point|Point-to-Point]]''' (''FC-P2P''). Two devices are connected back to back. This is the simplest topology, with limited connectivity.<br /> <br /> *'''[[Arbitrated loop]]''' (''FC-AL''). In this design, all devices are in a loop or ring, similar to [[token ring]] networking. Adding or removing a device from the loop causes all activity on the loop to be interrupted. The failure of one device causes a break in the ring. Fibre Channel hubs exist to connect multiple devices together and may bypass failed ports. A loop may also be made by cabling each port to the next in a ring. <br /> **A minimal loop containing only two ports, while appearing to be similar to FC-P2P, differs considerably in terms of the protocol. <br /> *'''[[Fibre Channel fabric|Switched fabric]]''' (''FC-SW''). All devices or loops of devices are connected to [[Fibre Channel switch]]es, similar conceptually to modern [[Ethernet]] implementations. The switches manage the state of the fabric, providing optimized interconnections.<br /> <br /> {| class=&quot;wikitable&quot; style=&quot;margin: 1em auto 1em auto&quot;<br /> |-<br /> ! Attribute || Point-to-Point || Arbitrated loop || Switched fabric<br /> |-<br /> || Max ports || 2 || 127 || ~16777216 (2&lt;sup&gt;24&lt;/sup&gt;)<br /> |-<br /> || Address size || N/A || 8-bit ALPA || 24-bit port ID<br /> |-<br /> || Side effect of port failure || N/A || Loop fails (until port bypassed) || N/A<br /> |-<br /> || Mixing different link rates || N/A || No || Yes<br /> |-<br /> || Frame delivery || In order || In order || Not guaranteed<br /> |-<br /> || Access to medium || Dedicated || Arbitrated || Dedicated<br /> |}<br /> <br /> == Fibre Channel layers ==<br /> Fibre Channel is a layered protocol. It consists of 5 layers, namely:<br /> <br /> *'''FC0''' The physical layer, which includes cables, fiber optics, [[Fibre Channel electrical interface|connectors, pinouts]] etc.<br /> *'''FC1''' The data link layer, which implements the [[Fibre Channel 8B/10B encoding|8b/10b]] encoding and decoding of signals.<br /> *'''FC2''' The network layer, defined by the FC-PI-2 standard, consists of the core of Fibre Channel, and defines the main [[Fibre Channel network protocols|protocols]].<br /> *'''FC3''' The common services layer, a thin layer that could eventually implement functions like encryption or RAID.<br /> *'''FC4''' The Protocol Mapping layer. Layer in which other protocols, such as SCSI, are encapsulated into an information unit for delivery to FC2.<br /> <br /> FC0, FC1, and FC2 are also known as FC-PH, the physical layers of fibre channel.<br /> <br /> Fibre Channel routers operate up to FC4 level (i.e. they are in fact SCSI routers), switches up to FC2, and hubs on FC0 only.<br /> <br /> Fibre Channel products are available at 1 [[Gbit/s]], 2 Gbit/s and 4 Gbit/s. An 8 Gbit/s standard is being developed. A 10 Gbit/s standard has been ratified, but is currently only used to interconnect switches. No 10 Gbit/s initiator or target products are available yet based on that standard. Products based on the 1, 2, 4 and 8 Gbit/s standards should be interoperable, and backward compatible. The 10 Gbit/s standard, however, is not backward compatible with any of the slower speed devices, as it differs considerably on FC1 level ([[64B/66B encoding|64b/66b encoding]] instead of 8b/10b encoding).<br /> <br /> ==Ports==<br /> <br /> [[Image:FC-Topologies.jpg|thumb|right|FC topologies and port types]]<br /> <br /> The following types of ports are defined by Fibre Channel:<br /> <br /> * node ports<br /> ** '''N_port''' is a port on the node (e.g. host or storage device) used with both FC-P2P or FC-SW topologies. Also known as '''Node port'''.<br /> ** '''NL_port''' is a port on the node used with an FC-AL topology. Also known as '''Node Loop port'''.<br /> * switch/router ports (used with FC-SW topology only)<br /> ** '''F_port''' is a port on the switch that connects to a node point-to-point (i.e. connects to an N_port). Also known as '''Fabric port'''. An F_port is not loop capable.<br /> ** '''FL_port''' is a port on the switch that connects to a FC-AL loop (i.e. to NL_ports). Also known as '''Fabric Loop port'''. Note that a switch port may automatically become either an F_port or an FL_port depending on what is connected.<br /> ** '''E_port''' is the connection between two fibre channel switches. Also known as an '''Expansion port'''. When E_ports between two switches form a link, that link is referred to as an inter-switch link (ISL).<br /> ** '''EX_port''' is the connection between a fibre channel router and a fibre channel switch. On the side of the switch it looks like a normal E_port, but on the side of the router it is a EX_port.<br /> ** '''TE_port''' is a term used for multiple E_ports trunked together to create high bandwidth between switches. Also known as '''Trunking Expansion port'''.<br /> * general (catch-all) types<br /> ** '''G_port''' or '''generic port''' on a switch can operate as an E_port or F_port.<br /> ** '''L_port''' is the loose term used for any arbitrated loop port, NL_port or FL_port. Also known as '''Loop port'''.<br /> <br /> == Optical Carrier Medium Variants ==<br /> <br /> [[Image:Lc-sc-fiber-connectors.jpg|thumb|right|Typical Fibre Channel connectors - modern [[Optical fiber connector|LC]] on the left and older [[Optical fiber connector|SC]] (typical for 100 MB/s speeds) on the right]] <br /> <br /> {| class=&quot;wikitable&quot;<br /> |-<br /> ! Media Type || Speed (MB/s) || Transmitter || Variant || Distance<br /> |-<br /> | rowspan=6| [[Single-mode_optical_fiber|Single-Mode Fiber]]<br /> | rowspan=1 align=&quot;center&quot;| 400<br /> | 1300 nm Longwave Laser || 400-SM-LL-I || 2 m - 2 km<br /> |-<br /> | rowspan=2 align=&quot;center&quot;| 200<br /> | 1550 nm Longwave Laser || 200-SM-LL-V || 2 m - &gt;50 km<br /> |-<br /> | 1300 nm Longwave Laser || 200-SM-LL-I || 2 m - 2 km<br /> |-<br /> | rowspan=3 align=&quot;center&quot;| 100<br /> | 1550 nm Longwave Laser || 100-SM-LL-V || 2 m - &gt;50 km<br /> |-<br /> | 1300 nm Longwave Laser || 100-SM-LL-L || 2 m - 10 km<br /> |-<br /> | 1300 nm Longwave Laser || 100-SM-LL-I || 2 m - 2 km<br /> |-<br /> | rowspan=4| [[Multi-mode_optical_fiber|Multimode Fiber (50µm)]]<br /> |align=&quot;center&quot;| 400<br /> | rowspan=4| 850 nm Shortwave Laser<br /> || 400-M5-SN-I || 0.5 m - 150m<br /> |-<br /> |align=&quot;center&quot;| 200 || 200-M5-SN-I || 0.5 m - 300m<br /> |-<br /> |align=&quot;center&quot; rowspan=2| 100<br /> || 100-M6-SN-I || 0.5 m - 300m<br /> |-<br /> || 100-M6-SL-I || 2 m - 175m<br /> |}<br /> <br /> == Fibre Channel Infrastructure ==<br /> Fibre Channel switches are divided into two classes. These classes are not part of the standard, and the classification of every switch is a marketing decision of the manufacturer.<br /> <br /> *'''Directors''' offer a high port-count in a modular (slot-based) chassis with no single point of failure (high availability).<br /> <br /> *'''Switches''' are typically smaller, fixed-configuration (sometimes semi-modular), less redundant devices.<br /> <br /> [[Brocade Communications Systems|Brocade]], [[Cisco]] and [[QLogic]] provide both directors and switches. <br /> <br /> If multiple switch vendors are used in the same fabric (i.e. fabric is ''heterogenous''), the fabric will default to &quot;interoperability mode&quot;, that is to a pure standarized Fibre Channel protocol. Some proprietary, advanced features may be disabled.<br /> <br /> == Fibre Channel Host Bus Adapters ==<br /> Fibre Channel [[Host adaptor|HBA]]s are available for all major [[Open system (computing)|open systems]], computer architectures, and buses, including [[Peripheral Component Interconnect|PCI]] and [[SBus]] (obsolete today). Some are OS dependent. Each HBA has a unique [[World Wide Name]] (WWN), which is similar to an Ethernet [[MAC address]] in that it uses an [[Organizationally Unique Identifier]] (OUI) assigned by the [[IEEE]]. However, WWNs are longer (8 bytes). There are two types of WWNs on a HBA; a '''node WWN (WWNN)''', which is shared by all ports on a host bus adapter, and a '''port WWN (WWPN)''', which is unique to each port. Some Fibre Channel HBA manufacturers are [[Emulex]], [[LSI Corporation|LSI]], [[Qlogic|QLogic]] and [[ATTO Technology]].<br /> <br /> ==See also==<br /> &lt;div style=&quot;-moz-column-count:2; column-count:2;&quot;&gt;<br /> *[[storage area network|Storage Area Network]]<br /> *[[Host Bus Adapter]] (HBA)<br /> *[[Fibre Channel network protocols]]<br /> **[[Fibre Channel frame]]<br /> *[[Fibre Channel 8B/10B encoding]]<br /> *[[Fibre Channel electrical interface]]<br /> *[[Fibre Channel fabric]]<br /> **[[Fibre Channel Logins]]<br /> **[[Fibre Channel switch]]<br /> **[[Fibre Channel zoning]]<br /> **[[vsan|Virtual Storage Area Network]]<br /> **[[Registered State Change Notification]]<br /> **[[FSPF|Fabric Shortest Path First]] - routing algorithm<br /> *[[Fibre Channel time out values]]<br /> *[[World Wide Name]]<br /> *[[Integrated Drive Electronics|IDE]], [[Advanced Technology Attachment|ATA]], [[SATA]], [[Serial Attached SCSI|SAS]], [[ATA over Ethernet|AoE]], [[SCSI]], [[iSCSI]], [[PCI Express]]<br /> *[[Fibre Channel over IP]] (FCIP), contrast with [[Internet Fibre Channel Protocol]] (iFCP)<br /> *[[FCoE]] - Fibre Channel over Ethernet<br /> *IP over Fibre Channel ([[IPFC]])<br /> *[[Serial Storage Architecture]] (SSA)<br /> *[[List of Fibre Channel standards]]<br /> *[[List of device bandwidths]]<br /> &lt;/div&gt;<br /> <br /> ==References==<br /> {{nofootnote|article}}<br /> * Clark, T. ''Designing Storage Area Networks'', Addison-Wesley, 1999. ISBN 0-201-61584-3<br /> <br /> == External links ==<br /> &lt;!-- ATTENTION! Please do not add links without discussion and consensus on the talk page. Undiscussed links will be removed. --&gt;<br /> *[http://www.fibrechannel.org/ Fibre Channel Industry Association] (FCIA)<br /> *[http://www.t11.org/index.html INCITS technical committee responsible for FC standards(T11)]<br /> *[http://www.redbooks.ibm.com/redbooks.nsf/0/f98c75e7c6b5a4ca88256d0c0060bcc0?OpenDocument IBM SAN Survival Guide]<br /> *[http://hsi.web.cern.ch/HSI/fcs/spec/overview.htm Fibre Channel overview]<br /> *[http://www.iol.unh.edu/training/fc/tutorials/fc_tutorial.php Fibre Channel tutorial] (UNH-IOL)<br /> *[http://www.snia.org Storage Networking Industry Association] (SNIA)<br /> <br /> [[Category:Fibre Channel]]<br /> [[Category:Computer storage]]<br /> [[Category:SCSI]]<br /> <br /> [[de:Fibre Channel]]<br /> [[es:Canal de fibra]]<br /> [[fr:Fibre Channel]]<br /> [[it:Fibre Channel]]<br /> [[ja:ファイバーチャネル]]<br /> [[pl:Fibre Channel]]<br /> [[pt:Fibre channel]]<br /> [[ru:Fibre Channel]]<br /> [[sv:Fibre Channel]]<br /> [[uk:Fibre Channel]]</div> PPrakash https://en.wikipedia.org/w/index.php?title=Fibre_Channel&diff=161506738 Fibre Channel 2007-10-01T09:00:56Z <p>PPrakash: </p> <hr /> <div>'''Fibre Channel''' is a gigabit-speed network technology primarily used for [[storage networking]]. Fibre Channel is standardized in the [[Technical_Committee_T11|T11 Technical Committee]] of the InterNational Committee for Information Technology Standards ([[INCITS]]), an [[American National Standards Institute]] (ANSI)–accredited standards committee.<br /> It started for use primarily in the [[supercomputer]] field, but has become the standard connection type for [[storage area network]]s (SAN) in [[enterprise storage]]. Despite common connotations of its name, Fibre Channel signaling can run on both [[twisted pair]] [[copper]] [[wire]] and [[fiber-optic communication|fiber-optic]] [[cable]]s.<br /> <br /> Fibre Channel Protocol (FCP) is the interface protocol of [[SCSI]] on the Fibre Channel.<br /> <br /> == History ==<br /> Fibre Channel started in 1988, with ANSI standard approval in 1994, as a way to simplify the [[HIPPI]] system then in use for similar roles. HIPPI used a massive 50-pair cable with bulky connectors, and had limited cable lengths. Fibre Channel was primarily concerned with simplifying the connections and increasing distances, as opposed to increasing speeds. Later, designers added the goals of connecting [[SCSI]] disk storage, providing higher speeds and far greater numbers of connected devices.<br /> <br /> It also added support for any number of &quot;upper layer&quot; protocols, including [[SCSI]], [[Asynchronous Transfer Mode|ATM]], and [[Internet Protocol|IP]], with [[SCSI]] being the predominant usage.<br /> <br /> {| class=&quot;wikitable&quot; style=&quot;margin: 1em auto 1em auto&quot;<br /> |+ Fibre Channel Variants<br /> | '''NAME'''<br /> | '''Line-Rate''' (Gbit/s)<br /> | '''Throughput ( Mbyte/s)<br /> |-<br /> | 1GFC<br /> | 1.0625<br /> | 100<br /> |-<br /> | 2GFC<br /> | 2.125<br /> | 200<br /> |-<br /> | 4GFC<br /> | 4.25<br /> | 400<br /> |-<br /> | 8GFC<br /> | 8.5<br /> | 800<br /> |-<br /> | 10GFC Serial<br /> | 10.51875<br /> | 1000<br /> |-<br /> | 20GFC<br /> | 10.52<br /> | 2000<br /> |-<br /> | 10GFC Parallel<br /> | 12.75 <br /> | <br /> |}<br /> <br /> == Fibre Channel topologies==<br /> There are three major Fibre Channel topologies, describing how a number of [[Computer port (software)|ports]] are connected together. A ''port'' in Fibre Channel terminology is any entity that actively communicates over the network, not necessarily a [[Computer port (hardware)|hardware port]]. Port is usually implemented in a device such as disk storage, an [[Host bus adapter|HBA]] on server or a [[Fibre Channel switch]].<br /> <br /> *'''[[SAN Point-to-Point|Point-to-Point]]''' (''FC-P2P''). Two devices are connected back to back. This is the simplest topology, with limited connectivity.<br /> <br /> *'''[[Arbitrated loop]]''' (''FC-AL''). In this design, all devices are in a loop or ring, similar to [[token ring]] networking. Adding or removing a device from the loop causes all activity on the loop to be interrupted. The failure of one device causes a break in the ring. Fibre Channel hubs exist to connect multiple devices together and may bypass failed ports. A loop may also be made by cabling each port to the next in a ring. <br /> **A minimal loop containing only two ports, while appearing to be similar to FC-P2P, differs considerably in terms of the protocol. <br /> *'''[[Fibre Channel fabric|Switched fabric]]''' (''FC-SW''). All devices or loops of devices are connected to [[Fibre Channel switch]]es, similar conceptually to modern [[Ethernet]] implementations. The switches manage the state of the fabric, providing optimized interconnections.<br /> <br /> {| class=&quot;wikitable&quot; style=&quot;margin: 1em auto 1em auto&quot;<br /> |-<br /> ! Attribute || Point-to-Point || Arbitrated loop || Switched fabric<br /> |-<br /> || Max ports || 2 || 127 || ~16777216 (2&lt;sup&gt;24&lt;/sup&gt;)<br /> |-<br /> || Address size || N/A || 8-bit ALPA || 24-bit port ID<br /> |-<br /> || Side effect of port failure || N/A || Loop fails (until port bypassed) || N/A<br /> |-<br /> || Mixing different link rates || N/A || No || Yes<br /> |-<br /> || Frame delivery || In order || In order || Not guaranteed<br /> |-<br /> || Access to medium || Dedicated || Arbitrated || Dedicated<br /> |}<br /> <br /> == Fibre Channel layers ==<br /> Fibre Channel is a layered protocol. It consists of 5 layers, namely:<br /> <br /> *'''FC0''' The physical layer, which includes cables, fiber optics, [[Fibre Channel electrical interface|connectors, pinouts]] etc.<br /> *'''FC1''' The data link layer, which implements the [[Fibre Channel 8B/10B encoding|8b/10b]] encoding and decoding of signals.<br /> *'''FC2''' The network layer, defined by the FC-PI-2 standard, consists of the core of Fibre Channel, and defines the main [[Fibre Channel network protocols|protocols]].<br /> *'''FC3''' The common services layer, a thin layer that could eventually implement functions like encryption or RAID.<br /> *'''FC4''' The Protocol Mapping layer. Layer in which other protocols, such as SCSI, are encapsulated into an information unit for delivery to FC2.<br /> <br /> FC0, FC1, and FC2 are also known as FC-PH, the physical layers of fibre channel.<br /> <br /> Fibre Channel routers operate up to FC4 level (i.e. they are in fact SCSI routers), switches up to FC2, and hubs on FC0 only.<br /> <br /> Fibre Channel products are available at 1 [[Gbit/s]], 2 Gbit/s and 4 Gbit/s. An 8 Gbit/s standard is being developed. A 10 Gbit/s standard has been ratified, but is currently only used to interconnect switches. No 10 Gbit/s initiator or target products are available yet based on that standard. Products based on the 1, 2, 4 and 8 Gbit/s standards should be interoperable, and backward compatible. The 10 Gbit/s standard, however, is not backward compatible with any of the slower speed devices, as it differs considerably on FC1 level ([[64B/66B encoding|64b/66b encoding]] instead of 8b/10b encoding).<br /> <br /> ==Ports==<br /> <br /> [[Image:FC-Topologies.jpg|thumb|right|FC topologies and port types]]<br /> <br /> The following types of ports are defined by Fibre Channel:<br /> <br /> * node ports<br /> ** '''N_port''' is a port on the node (e.g. host or storage device) used with both FC-P2P or FC-SW topologies. Also known as '''Node port'''.<br /> ** '''NL_port''' is a port on the node used with an FC-AL topology. Also known as '''Node Loop port'''.<br /> * switch/router ports (used with FC-SW topology only)<br /> ** '''F_port''' is a port on the switch that connects to a node point-to-point (i.e. connects to an N_port). Also known as '''Fabric port'''. An F_port is not loop capable.<br /> ** '''FL_port''' is a port on the switch that connects to a FC-AL loop (i.e. to NL_ports). Also known as '''Fabric Loop port'''. Note that a switch port may automatically become either an F_port or an FL_port depending on what is connected.<br /> ** '''E_port''' is the connection between two fibre channel switches. Also known as an '''Expansion port'''. When E_ports between two switches form a link, that link is referred to as an inter-switch link (ISL).<br /> ** '''EX_port''' is the connection between a fibre channel router and a fibre channel switch. On the side of the switch it looks like a normal E_port, but on the side of the router it is a EX_port.<br /> ** '''TE_port''' is a term used for multiple E_ports trunked together to create high bandwidth between switches. Also known as '''Trunking Expansion port'''.<br /> * general (catch-all) types<br /> ** '''G_port''' or '''generic port''' on a switch can operate as an E_port or F_port.<br /> ** '''L_port''' is the loose term used for any arbitrated loop port, NL_port or FL_port. Also known as '''Loop port'''.<br /> <br /> == Optical Carrier Medium Variants ==<br /> <br /> [[Image:Lc-sc-fiber-connectors.jpg|thumb|right|Typical Fibre Channel connectors - modern [[Optical fiber connector|LC]] on the left and older [[Optical fiber connector|SC]] (typical for 100 MB/s speeds) on the right]] <br /> <br /> {| class=&quot;wikitable&quot;<br /> |-<br /> ! Media Type || Speed (MB/s) || Transmitter || Variant || Distance<br /> |-<br /> | rowspan=6| [[Single-mode_optical_fiber|Single-Mode Fiber]]<br /> | rowspan=1 align=&quot;center&quot;| 400<br /> | 1300 nm Longwave Laser || 400-SM-LL-I || 2 m - 2 km<br /> |-<br /> | rowspan=2 align=&quot;center&quot;| 200<br /> | 1550 nm Longwave Laser || 200-SM-LL-V || 2 m - &gt;50 km<br /> |-<br /> | 1300 nm Longwave Laser || 200-SM-LL-I || 2 m - 2 km<br /> |-<br /> | rowspan=3 align=&quot;center&quot;| 100<br /> | 1550 nm Longwave Laser || 100-SM-LL-V || 2 m - &gt;50 km<br /> |-<br /> | 1300 nm Longwave Laser || 100-SM-LL-L || 2 m - 10 km<br /> |-<br /> | 1300 nm Longwave Laser || 100-SM-LL-I || 2 m - 2 km<br /> |-<br /> | rowspan=4| [[Multi-mode_optical_fiber|Multimode Fiber (50µm)]]<br /> |align=&quot;center&quot;| 400<br /> | rowspan=4| 850 nm Shortwave Laser<br /> || 400-M5-SN-I || 0.5 m - 150m<br /> |-<br /> |align=&quot;center&quot;| 200 || 200-M5-SN-I || 0.5 m - 300m<br /> |-<br /> |align=&quot;center&quot; rowspan=2| 100<br /> || 100-M6-SN-I || 0.5 m - 300m<br /> |-<br /> || 100-M6-SL-I || 2 m - 175m<br /> |}<br /> <br /> == Fibre Channel Infrastructure ==<br /> Fibre Channel switches are divided into two classes. These classes are not part of the standard, and the classification of every switch is a marketing decision of the manufacturer.<br /> <br /> *'''Directors''' offer a high port-count in a modular (slot-based) chassis with no single point of failure (high availability).<br /> <br /> *'''Switches''' are typically smaller, fixed-configuration (sometimes semi-modular), less redundant devices.<br /> <br /> [[Brocade Communications Systems|Brocade]], [[Cisco]] and [[QLogic]] provide both directors and switches. <br /> <br /> If multiple switch vendors are used in the same fabric (i.e. fabric is ''heterogenous''), the fabric will default to &quot;interoperability mode&quot;, that is to a pure standarized Fibre Channel protocol. Some proprietary, advanced features may be disabled.<br /> <br /> == Fibre Channel Host Bus Adapters ==<br /> Fibre Channel [[Host adaptor|HBA]]s are available for all major [[Open system (computing)|open systems]], computer architectures, and buses, including [[Peripheral Component Interconnect|PCI]] and [[SBus]] (obsolete today). Some are OS dependent. Each HBA has a unique [[World Wide Name]] (WWN), which is similar to an Ethernet [[MAC address]] in that it uses an [[Organizationally Unique Identifier]] (OUI) assigned by the [[IEEE]]. However, WWNs are longer (8 bytes). There are two types of WWNs on a HBA; a '''node WWN (WWNN)''', which is shared by all ports on a host bus adapter, and a '''port WWN (WWPN)''', which is unique to each port. Some Fibre Channel HBA manufacturers are [[Emulex]], [[LSI Corporation|LSI]], [[Qlogic|QLogic]] and [[ATTO Technology]].<br /> <br /> ==See also==<br /> &lt;div style=&quot;-moz-column-count:2; column-count:2;&quot;&gt;<br /> *[[storage area network|Storage Area Network]]<br /> *[[Host Bus Adapter]] (HBA)<br /> *[[Fibre Channel network protocols]]<br /> *[[Fibre Channel frame]]<br /> *[[Fibre Channel 8B/10B encoding]]<br /> *[[Fibre Channel electrical interface]]<br /> *[[Fibre Channel fabric]]<br /> **[[Fibre Channel Logins]]<br /> **[[Fibre Channel switch]]<br /> **[[Fibre Channel zoning]]<br /> **[[vsan|Virtual Storage Area Network]]<br /> **[[Registered State Change Notification]]<br /> **[[FSPF|Fabric Shortest Path First]] - routing algorithm<br /> *[[Fibre Channel time out values]]<br /> *[[World Wide Name]]<br /> *[[Integrated Drive Electronics|IDE]], [[Advanced Technology Attachment|ATA]], [[SATA]], [[Serial Attached SCSI|SAS]], [[ATA over Ethernet|AoE]], [[SCSI]], [[iSCSI]], [[PCI Express]]<br /> *[[Fibre Channel over IP]] (FCIP), contrast with [[Internet Fibre Channel Protocol]] (iFCP)<br /> *[[FCoE]] - Fibre Channel over Ethernet<br /> *IP over Fibre Channel ([[IPFC]])<br /> *[[Serial Storage Architecture]] (SSA)<br /> *[[List of Fibre Channel standards]]<br /> *[[List of device bandwidths]]<br /> &lt;/div&gt;<br /> <br /> ==References==<br /> {{nofootnote|article}}<br /> * Clark, T. ''Designing Storage Area Networks'', Addison-Wesley, 1999. ISBN 0-201-61584-3<br /> <br /> == External links ==<br /> &lt;!-- ATTENTION! Please do not add links without discussion and consensus on the talk page. Undiscussed links will be removed. --&gt;<br /> *[http://www.fibrechannel.org/ Fibre Channel Industry Association] (FCIA)<br /> *[http://www.t11.org/index.html INCITS technical committee responsible for FC standards(T11)]<br /> *[http://www.redbooks.ibm.com/redbooks.nsf/0/f98c75e7c6b5a4ca88256d0c0060bcc0?OpenDocument IBM SAN Survival Guide]<br /> *[http://hsi.web.cern.ch/HSI/fcs/spec/overview.htm Fibre Channel overview]<br /> *[http://www.iol.unh.edu/training/fc/tutorials/fc_tutorial.php Fibre Channel tutorial] (UNH-IOL)<br /> *[http://www.snia.org Storage Networking Industry Association] (SNIA)<br /> <br /> [[Category:Fibre Channel]]<br /> [[Category:Computer storage]]<br /> [[Category:SCSI]]<br /> <br /> [[de:Fibre Channel]]<br /> [[es:Canal de fibra]]<br /> [[fr:Fibre Channel]]<br /> [[it:Fibre Channel]]<br /> [[ja:ファイバーチャネル]]<br /> [[pl:Fibre Channel]]<br /> [[pt:Fibre channel]]<br /> [[ru:Fibre Channel]]<br /> [[sv:Fibre Channel]]<br /> [[uk:Fibre Channel]]</div> PPrakash https://en.wikipedia.org/w/index.php?title=Fibre_Channel_frame&diff=161506584 Fibre Channel frame 2007-10-01T08:59:43Z <p>PPrakash: </p> <hr /> <div>== Fiber Channel Frame ==<br /> '''Fiber Channel Frame''' is the frame format which should be followed by all FC-2 frames. An FC-2 frame is composed of a SOF<br /> delimiter, frame content, and an EOF delimiter. The frame content is composed of 0 or more Extended_Headers, a<br /> Frame_Header, Data_Field, and CRC. Unless otherwise specified, the term frame refers to a FC-2 frame in this<br /> standard.<br /> <br /> <br /> == FC Frame Format ==<br /> <br /> [[Image:FCFF.jpg]]<br /> <br /> '''SOF – Start of Frame:'''<br /> <br /> The Start-of-Frame (SOF) delimiter is an Ordered Set that immediately precedes the frame content. There are multiple SOF delimiters defined for Sequence control. SOFx is used to represent any SOF.<br /> <br /> '''Extended Headers:'''<br /> <br /> Extended Headers, if present, shall immediately follow the SOF delimiter. Each Extended Header is identified by a certain value of its first byte. Extended Headers shall be transmitted on a word boundary<br /> <br /> '''Frame Header:'''<br /> <br /> The Frame Header shall immediately follow the SOF delimiter if no Extended Headers are present, or shall follow the last Extended Header present, for all frames. The Frame Header shall be transmitted on a word boundary. The Frame Header is used by the LCF to control link operations, control device protocol transfers, and detect missing or out of order frames.<br /> <br /> <br /> '''Data Field:'''<br /> <br /> The Data Field shall follow the Frame Header. Data Fields shall be aligned on word boundaries and shall be equal to a multiple of four bytes in length. The length of the Data Field may be zero.<br /> <br /> '''CRC:'''<br /> <br /> The Cyclic Redundancy Check (CRC) is a four byte field that shall immediately follow the Data Field and shall be used to verify the data integrity of the Extended Headers, if any, the Frame Header, and the Data Field. SOF and EOF delimiters shall not be included in the CRC verification. The CRC field shall be calculated on the Extended Headers, if any, the Frame Header and Data Field prior to encoding for transmission and after decoding upon reception. The CRC field shall be aligned on a word boundary. <br /> For the purpose of CRC computation, the bit of the word-aligned, four-byte field that corresponds to the first bit transmitted is the highest order bit.<br /> <br /> The CRC shall use the following 32-bit polynomial:<br /> X32 + X26 + X23 + X22 + X16 + X12 + X11 + X10 + X8 + X7 + X5 + X4 + X2 + X + 1<br /> <br /> '''EOF:'''<br /> <br /> The End-of-Frame (EOF) delimiter is an Ordered Set that immediately follows the CRC and shall be transmitted on a word boundary. The EOF delimiter shall designate the end of the frame content and shall be followed by Fill Words. <br /> There are three categories of EOF delimiters:<br /> a) The first category shall indicate that the frame is valid from the sender's perspective and potentially valid from the receiver's perspective;<br /> b) The second category (EOFdti and EOFni) shall indicate that the frame content is invalid. This category shall only be used by an Fx_Port that receives a complete frame and decodes it before forwarding it; and<br /> c) The third category (EOFa) shall indicate the frame content is corrupted and the frame was truncated during transmission. The third category shall be used by FC_Ports to indicate an internal malfunction (e.g., a transmitter failure that does not allow the entire frame to be transmitted normally).<br /> All frames other than the last frame of a Sequence shall be terminated with an EOFn delimiter.<br /> Each Sequence other than a Sequence that deactivates or removes a Class 1 or Class 6 circuit shall terminate<br /> with an EOFt delimiter. Use of EOFs that deactivate or remove a Class 1 or Class 6 circuit is described in clause<br /> 14.<br /> If an Fx_Port detects a frame error, the Fx_Port shall replace either an EOFn or an EOFt of the frame in error with<br /> the EOFni delimiter.<br /> EOFx is used to represent any EOF.<br /> <br /> <br /> <br /> <br /> == FC Frame Header ==<br /> [[Image:FC-Frame-Header.jpg]]<br /> <br /> '''R_CTL - Routing Control:'''<br /> <br /> The R_CTL field is a one-byte field in Word 0 Bits 31-24 that contains routing bits and information bits to categorize the frame function. When the R_CTL field is used in combination with the TYPE field (Word 2, bits 31-24), it provides an FC_Port with assistance in frame routing, data routing, or addressing.<br /> The R_CTL field is further subdivided into the ROUTING field (bits 31-28) and the INFORMATION field (bits 27-24).<br /> <br /> Table 1 shows the frame types associated with the R_CTL.<br /> <br /> '''INFORMATION Field:'''<br /> <br /> The INFORMATION field is included in R_CTL to assist the receiver of a Data frame in directing the Data Field content to the appropriate buffer pool.<br /> <br /> The R_CTL field for Device Data frames shall be set according to Table 2.<br /> <br /> '''Table 1:'''<br /> [[Image:Table1-rc.jpg]]<br /> <br /> <br /> '''Table 2:'''<br /> [[Image:Table2-rc.jpg]]<br /> <br /> <br /> '''Destination_ID (D_ID): '''<br /> <br /> The D_ID is a three-byte field (Word 0, Bits 23-0) that shall contain the address identifier of the destination Nx_Port.<br /> <br /> <br /> '''Source_ID (S_ID):'''<br /> <br /> The S_ID is a three-byte field (Word 1, Bits 23-0) that shall contain the address identifier of the source Nx_Port.<br /> <br /> <br /> [[Image:Table3-DC.jpg]]<br /> <br /> <br /> <br /> '''CS_CTL/P - Class Specific Control/Priority :'''<br /> <br /> <br /> The meaning of the CS_CTL field is controlled by the CS_CTL/Priority Enable bit (F_CTL, bit 17). When the CS_CTL/Priority Enable bit is set to zero, word 1, bits 31-24 shall be interpreted to be CS_CTL information. When the CS_CTL/Priority Enable bit is set to one, word 1, bits 31-24 shall be interpreted to be Priority information.<br /> <br /> CS_CTL:<br /> <br /> When bit 17 of F_CTL is set to zero, Word 1, bits 31-24 of the Frame Header is defined as the CS_CTL field. It contains management information for the class of service identified by the SOF. The meaning of the CS_CTL field is dependent on the class of service.<br /> <br /> <br /> [[Image:Table4-cstl-c1.jpg]]<br /> <br /> <br /> <br /> [[Image:Table5-cstl-c23.jpg]]<br /> <br /> <br /> Priority:<br /> <br /> When supported by FC_Ports (see FC-LS), the Priority field shall be used to resolve resource contention or to determine the order to deliver frames. The definition and use of the Priority field is class dependent. <br /> <br /> Word 1, bits 31-24 of the Frame_Header shall be defined as the Priority field when the CS_CTL/Priority Enable bit (F_CTL, bit 17) is set to one. The Priority field contains priority information for the class of service identified by the SOF. A value of 0000000b in word 1, bits 31-25 shall indicate that no Priority has been assigned to the frame. The remaining values shall indicate, in ascending order, the relative priority of the frame (e.g., a Priority of 23h shall be considered to have a lower priority than a Priority of 57h). The meaning of Word 1, bit 24 is dependent on the class of service.<br /> <br /> <br /> [[Image:Table6-prio.jpg]]<br /> <br /> <br /> '''Data structure type (TYPE):'''<br /> <br /> The data structure type (TYPE) is a one-byte field (Word 2, Bits 31-24) that shall identify the protocol of the frame content for Data frames.<br /> When the Routing field (word 0, bits 31-28) indicates a Link_Control frame other than F_BSY, the TYPE field (word 0, bits 31-24) is reserved. F_BSY frames use the TYPE field to indicate a reason code for the F_BSY. When the F_BSY is in response to a Link_Control frame, the Information category field (word 0, bits 27-24) of the busied frame is copied by the Fabric into the TYPE field (word 2, bits 27-24).<br /> <br /> <br /> [[Image:table7-type.jpg]]<br /> <br /> <br /> '''F_CTL – Frame Control:'''<br /> <br /> The Frame Control (F_CTL) field (Word 2, Bits 23-0) is a three-byte field that contains control information relating to the frame content. If an error in bit usage is detected, a reject frame (P_RJT) shall be transmitted in response with an appropriate reason code for Class 1, Class 2, and Class 6.<br /> <br /> <br /> [[Image:table8-fctl.jpg]]<br /> <br /> <br /> '''SEQ_ID – Sequence ID:'''<br /> <br /> The SEQ_ID is a one-byte field (Word 3, Bits 31-24) assigned by the Sequence Initiator that shall be unique for a specific D_ID and S_ID pair while the Sequence is open, independent of X_ID. Both the Sequence Initiator and the Sequence Recipient track the status of frames within the Sequence using fields within the Sequence Qualifier. If its X_ID is unassigned, it shall use any other field or fields (e.g., S_ID, D_ID, or the other Nx_Port's X_ID) for tracking.<br /> If the Sequence Initiator initiates a new Sequence for an Exchange in any class of service while it already has Sequences open for that Exchange; it is termed a streamed Sequence. If streamed Sequences occur, it is the responsibility of the Sequence Initiator to use at least X+1 different SEQ_IDs before reusing a SEQ_ID, where X is the number of open Sequences per Exchange (see FC-LS) (e.g., if X = 2 from Login, then a series of SEQ_IDs of 11-93-22-11-93 is acceptable).<br /> If consecutive non-streamed Sequences for the same Exchange occur during a single Sequence Initiative, it is the responsibility of the Sequence Initiator to use a different SEQ_ID for each consecutive Sequence (e.g., a series of SEQ_IDs of 21-74-21-74 is acceptable for consecutive Sequences. The examples show when a SEQ_ID is allowed to be repeated). A series of SEQ_IDs for the same Exchange may also be random and never repeat.<br /> The combination of Initiator and Recipient Sequence Status Blocks identified by a single SEQ_ID describe the status of that Sequence for a given Exchange. <br /> <br /> <br /> '''DF_CTL – Data Field Control:'''<br /> <br /> Data Field Control (DF_CTL) is a one-byte field (Word 3, Bits 23-16) that specifies the presence of optional headers at the beginning of the Data Field.<br /> The Optional Headers shall be positioned in the Data Field in the order specified with the bit 23 header as the first header in the Data Field, bit 22 header as the second header in the Data Field, and so forth, in a left to right manner corresponding to bits 23, 22, 21<br /> If either bit 17 or 16 are set to one, then a Device Header is present. The size of the Device Header is specified by the encoded value of bits 17 and 16.<br /> If an Optional Header is not present as indicated by the appropriate bit in DF_CTL, no space shall be allocated for the Header in the Data Field of the frame (e.g., if bits 23 and 22 are zero and bit 21 is one, the first data byte of the Data Field contains the first byte of the Network Header).<br /> <br /> <br /> [[Image:table9-dfc.jpg]]<br /> <br /> <br /> '''SEQ_CNT – Sequence Count:'''<br /> <br /> The sequence count (SEQ_CNT) is a two-byte field (Word 3, Bits 15-0) that shall indicate the sequential order of Data frame transmission within a single Sequence or multiple consecutive Sequences for the same Exchange. The SEQ_CNT of the first Data frame of the first Sequence of the Exchange transmitted by either the Originator or Responder shall be binary zero. The SEQ_CNT of each subsequent Data frame in the Sequence shall be incremented by one.<br /> <br /> If a Sequence is streamed, the SEQ_CNT of the first Data frame of the Sequence shall be incremented by one from the SEQ_CNT of the last Data frame of the previously sent Sequence. If a Sequence is non-streamed, the starting SEQ_CNT may be continuously increasing or binary zero.<br /> <br /> The same SEQ_ID and SEQ_CNT shall identify ACK and Link Response frames as the frame to which it is responding. Frames are tracked on a SEQ_ID, SEQ_CNT basis within the scope of the Sequence Qualifier for that Sequence.<br /> <br /> The SEQ_CNT shall wrap to zero after reaching a value of 65 535. The SEQ_CNT shall then only be incremented to the SEQ_CNT of an unacknowledged frame of the same Sequence. Otherwise, data integrity is not ensured. In order to ensure frame identification integrity, SEQ_CNT is a 16-bit field while the End-to-end Credit field of the login Class Service Parameters is defined as a 15-bit field. This ensures that EE Credit never exceeds one-half of the maximum SEQ_CNT.<br /> OX_ID – Originator Exchange ID:<br /> <br /> The Originator Exchange ID is a two-byte field (Word 4, Bits 31-16) that shall identify the Exchange ID assigned by the Originator of the Exchange. Each Exchange shall be assigned an identifier unique to the Originator or Originator-Responder pair. If the Originator is enforcing uniqueness via the OX_ID mechanism, it shall set a unique value for OX_ID other than FF FFh in the first Data frame of the first Sequence of an Exchange. An OX_ID of FF FFh indicates that the OX_ID is unassigned and that the Originator is not enforcing uniqueness via the OX_ID mechanism. If an Originator uses the unassigned value of FF FFh to identify the Exchange, it shall have only one<br /> Exchange (OX_ID set to FF FFh) with a given Responder. <br /> <br /> An Originator Exchange Status Block associated with the OX_ID is used to track the progress of a series of Sequences that comprises an Exchange. <br /> <br /> '''RX_ID – Response Exchanger ID:'''<br /> <br /> The Responder Exchange ID is a two byte field (Word 4, Bits 15-0) assigned by the Responder that shall provide a unique, locally meaningful identifier at the Responder for an Exchange established by an Originator and identified by an OX_ID. The Responder of the Exchange shall set a unique value for RX_ID other than FF FFh, if RX_ID is being used, by one of two methods:<br /> <br /> a) in an ACK to a Data frame in the first Sequence of an Exchange in Class 1 and 2; or<br /> b) in the first Sequence transmitted as a Sequence Initiator, if any, in Class 3.<br /> <br /> An RX_ID of FF FFh shall indicate that the RX_ID is unassigned. RX_ID is not used in Class 6 and shall be set to FF FFh for all Class 6 frames. If the Responder does not assign an RX_ID other than FF FFh by the end of the first Sequence, then the Responder is not enforcing uniqueness via the RX_ID mechanism.<br /> <br /> When the Responder uses only FF FFh for RX_ID, it shall have the capability to identify the Exchange through the OX_ID and the S_ID of the Originator of the Exchange. Under all other circumstances, until a value other than FF FFh is assigned, FF FFh value for RX_ID shall be used indicating that RX_ID is unassigned. After a value other than FF FFh is assigned, the assigned value shall be used for the remainder of the Exchange. <br /> A Responder Exchange Status Block associated with the RX_ID is used to track the progress of a series of Sequences that compose an Exchange.<br /> <br /> <br /> <br /> '''Parameter:'''<br /> <br /> The Parameter field (Word 5, Bits 31-0) has meanings based on frame type. For Link Control frames, the Parameter field is used to carry information specific to the individual Link Control frame. For Data frames with the relative offset present bit set to 1, the Parameter field specifies relative offset, a four-byte field that contains the relative displacement of the first byte of the Payload of the frame from the base address as specified by the ULP. Relative offset is expressed in terms of bytes. The use of the relative offset field is optional and is indicated as a Login Service Parameter. If relative offset is being used, the number of bytes transmitted relative to the protocol-specific base address shall be less than the maximum value of the relative offset (Parameter) field (232). For Data frames with the relative offset Present bit set to zero, the Parameter field shall be set and interpreted in a protocol specific manner that may depend on the type of Information Unit carried by the frame.<br /> <br /> Continuously increasing relative offset is the relationship specified between relative offset values contained in frame (n) and frame (n+1) of an Information Category within a single Sequence. Continuously increasing relative offset (ROI) for a given Information Category I is specified by the following:<br /> <br /> OI(n+1) = ROI(n) + Length of PayloadI(n)<br /> <br /> where n is ≥ 0 and represents the consecutive frame count of frames for a given Information Category within a single Sequence. ROI(0) is the initial relative offset for the Information Category I.<br /> <br /> <br /> <br /> <br /> == '''Source:''' ==<br /> <br /> [http://www.t11.org/ftp/t11/pub/fc/fs-2/06-085v3.pdf T11 Draft of FC-FS2]</div> PPrakash https://en.wikipedia.org/w/index.php?title=Fibre_Channel_frame&diff=161506226 Fibre Channel frame 2007-10-01T08:56:26Z <p>PPrakash: ←Created page with &#039;== Fiber Channel Frame == &#039;&#039;&#039;Fiber Channel Frame&#039;&#039;&#039; is the frame format which should be followed by all FC-2 frames. An FC-2 frame is composed of a SOF delimiter, f...&#039;</p> <hr /> <div>== Fiber Channel Frame ==<br /> '''Fiber Channel Frame''' is the frame format which should be followed by all FC-2 frames. An FC-2 frame is composed of a SOF<br /> delimiter, frame content, and an EOF delimiter. The frame content is composed of 0 or more Extended_Headers, a<br /> Frame_Header, Data_Field, and CRC. Unless otherwise specified, the term frame refers to a FC-2 frame in this<br /> standard.<br /> <br /> <br /> == FC Frame Format ==<br /> <br /> [[Image:FCFF.jpg]]<br /> <br /> '''SOF – Start of Frame:'''<br /> <br /> The Start-of-Frame (SOF) delimiter is an Ordered Set that immediately precedes the frame content. There are multiple SOF delimiters defined for Sequence control. SOFx is used to represent any SOF.<br /> <br /> '''Extended Headers:'''<br /> <br /> Extended Headers, if present, shall immediately follow the SOF delimiter. Each Extended Header is identified by a certain value of its first byte. Extended Headers shall be transmitted on a word boundary<br /> <br /> '''Frame Header:'''<br /> <br /> The Frame Header shall immediately follow the SOF delimiter if no Extended Headers are present, or shall follow the last Extended Header present, for all frames. The Frame Header shall be transmitted on a word boundary. The Frame Header is used by the LCF to control link operations, control device protocol transfers, and detect missing or out of order frames.<br /> <br /> <br /> '''Data Field:'''<br /> <br /> The Data Field shall follow the Frame Header. Data Fields shall be aligned on word boundaries and shall be equal to a multiple of four bytes in length. The length of the Data Field may be zero.<br /> <br /> '''CRC:'''<br /> <br /> The Cyclic Redundancy Check (CRC) is a four byte field that shall immediately follow the Data Field and shall be used to verify the data integrity of the Extended Headers, if any, the Frame Header, and the Data Field. SOF and EOF delimiters shall not be included in the CRC verification. The CRC field shall be calculated on the Extended Headers, if any, the Frame Header and Data Field prior to encoding for transmission and after decoding upon reception. The CRC field shall be aligned on a word boundary. <br /> For the purpose of CRC computation, the bit of the word-aligned, four-byte field that corresponds to the first bit transmitted is the highest order bit.<br /> <br /> The CRC shall use the following 32-bit polynomial:<br /> X32 + X26 + X23 + X22 + X16 + X12 + X11 + X10 + X8 + X7 + X5 + X4 + X2 + X + 1<br /> <br /> '''EOF:'''<br /> <br /> The End-of-Frame (EOF) delimiter is an Ordered Set that immediately follows the CRC and shall be transmitted on a word boundary. The EOF delimiter shall designate the end of the frame content and shall be followed by Fill Words. <br /> There are three categories of EOF delimiters:<br /> a) The first category shall indicate that the frame is valid from the sender's perspective and potentially valid from the receiver's perspective;<br /> b) The second category (EOFdti and EOFni) shall indicate that the frame content is invalid. This category shall only be used by an Fx_Port that receives a complete frame and decodes it before forwarding it; and<br /> c) The third category (EOFa) shall indicate the frame content is corrupted and the frame was truncated during transmission. The third category shall be used by FC_Ports to indicate an internal malfunction (e.g., a transmitter failure that does not allow the entire frame to be transmitted normally).<br /> All frames other than the last frame of a Sequence shall be terminated with an EOFn delimiter.<br /> Each Sequence other than a Sequence that deactivates or removes a Class 1 or Class 6 circuit shall terminate<br /> with an EOFt delimiter. Use of EOFs that deactivate or remove a Class 1 or Class 6 circuit is described in clause<br /> 14.<br /> If an Fx_Port detects a frame error, the Fx_Port shall replace either an EOFn or an EOFt of the frame in error with<br /> the EOFni delimiter.<br /> EOFx is used to represent any EOF.<br /> <br /> <br /> <br /> <br /> == FC Frame Header ==<br /> [[Image:FC-Frame-Header.jpg]]<br /> <br /> '''R_CTL - Routing Control:'''<br /> <br /> The R_CTL field is a one-byte field in Word 0 Bits 31-24 that contains routing bits and information bits to categorize the frame function. When the R_CTL field is used in combination with the TYPE field (Word 2, bits 31-24), it provides an FC_Port with assistance in frame routing, data routing, or addressing.<br /> The R_CTL field is further subdivided into the ROUTING field (bits 31-28) and the INFORMATION field (bits 27-24).<br /> <br /> Table 1 shows the frame types associated with the R_CTL.<br /> <br /> '''INFORMATION Field:'''<br /> <br /> The INFORMATION field is included in R_CTL to assist the receiver of a Data frame in directing the Data Field content to the appropriate buffer pool.<br /> <br /> The R_CTL field for Device Data frames shall be set according to Table 2.<br /> <br /> '''Table 1:'''<br /> [[Image:Table1-rc.jpg]]<br /> <br /> <br /> '''Table 2:'''<br /> [[Image:Table2-rc.jpg]]<br /> <br /> <br /> '''Destination_ID (D_ID): '''<br /> <br /> The D_ID is a three-byte field (Word 0, Bits 23-0) that shall contain the address identifier of the destination Nx_Port.<br /> <br /> <br /> '''Source_ID (S_ID):'''<br /> <br /> The S_ID is a three-byte field (Word 1, Bits 23-0) that shall contain the address identifier of the source Nx_Port.<br /> <br /> <br /> [[Image:Table3-DC.jpg]]<br /> <br /> <br /> <br /> '''CS_CTL/P - Class Specific Control/Priority :'''<br /> <br /> <br /> The meaning of the CS_CTL field is controlled by the CS_CTL/Priority Enable bit (F_CTL, bit 17). When the CS_CTL/Priority Enable bit is set to zero, word 1, bits 31-24 shall be interpreted to be CS_CTL information. When the CS_CTL/Priority Enable bit is set to one, word 1, bits 31-24 shall be interpreted to be Priority information.<br /> <br /> CS_CTL:<br /> <br /> When bit 17 of F_CTL is set to zero, Word 1, bits 31-24 of the Frame Header is defined as the CS_CTL field. It contains management information for the class of service identified by the SOF. The meaning of the CS_CTL field is dependent on the class of service.<br /> <br /> <br /> [[Image:Table4-cstl-c1.jpg]]<br /> <br /> <br /> <br /> [[Image:Table5-cstl-c23.jpg]]<br /> <br /> <br /> Priority:<br /> <br /> When supported by FC_Ports (see FC-LS), the Priority field shall be used to resolve resource contention or to determine the order to deliver frames. The definition and use of the Priority field is class dependent. <br /> <br /> Word 1, bits 31-24 of the Frame_Header shall be defined as the Priority field when the CS_CTL/Priority Enable bit (F_CTL, bit 17) is set to one. The Priority field contains priority information for the class of service identified by the SOF. A value of 0000000b in word 1, bits 31-25 shall indicate that no Priority has been assigned to the frame. The remaining values shall indicate, in ascending order, the relative priority of the frame (e.g., a Priority of 23h shall be considered to have a lower priority than a Priority of 57h). The meaning of Word 1, bit 24 is dependent on the class of service.<br /> <br /> <br /> [[Image:Table6-prio.jpg]]<br /> <br /> <br /> '''Data structure type (TYPE):'''<br /> <br /> The data structure type (TYPE) is a one-byte field (Word 2, Bits 31-24) that shall identify the protocol of the frame content for Data frames.<br /> When the Routing field (word 0, bits 31-28) indicates a Link_Control frame other than F_BSY, the TYPE field (word 0, bits 31-24) is reserved. F_BSY frames use the TYPE field to indicate a reason code for the F_BSY. When the F_BSY is in response to a Link_Control frame, the Information category field (word 0, bits 27-24) of the busied frame is copied by the Fabric into the TYPE field (word 2, bits 27-24).<br /> <br /> <br /> [[Image:table7-type.jpg]]<br /> <br /> <br /> '''F_CTL – Frame Control:'''<br /> <br /> The Frame Control (F_CTL) field (Word 2, Bits 23-0) is a three-byte field that contains control information relating to the frame content. If an error in bit usage is detected, a reject frame (P_RJT) shall be transmitted in response with an appropriate reason code for Class 1, Class 2, and Class 6.<br /> <br /> <br /> [[Image:table8-fctl.jpg]]<br /> <br /> <br /> '''SEQ_ID – Sequence ID:'''<br /> <br /> The SEQ_ID is a one-byte field (Word 3, Bits 31-24) assigned by the Sequence Initiator that shall be unique for a specific D_ID and S_ID pair while the Sequence is open, independent of X_ID. Both the Sequence Initiator and the Sequence Recipient track the status of frames within the Sequence using fields within the Sequence Qualifier. If its X_ID is unassigned, it shall use any other field or fields (e.g., S_ID, D_ID, or the other Nx_Port's X_ID) for tracking.<br /> If the Sequence Initiator initiates a new Sequence for an Exchange in any class of service while it already has Sequences open for that Exchange; it is termed a streamed Sequence. If streamed Sequences occur, it is the responsibility of the Sequence Initiator to use at least X+1 different SEQ_IDs before reusing a SEQ_ID, where X is the number of open Sequences per Exchange (see FC-LS) (e.g., if X = 2 from Login, then a series of SEQ_IDs of 11-93-22-11-93 is acceptable).<br /> If consecutive non-streamed Sequences for the same Exchange occur during a single Sequence Initiative, it is the responsibility of the Sequence Initiator to use a different SEQ_ID for each consecutive Sequence (e.g., a series of SEQ_IDs of 21-74-21-74 is acceptable for consecutive Sequences. The examples show when a SEQ_ID is allowed to be repeated). A series of SEQ_IDs for the same Exchange may also be random and never repeat.<br /> The combination of Initiator and Recipient Sequence Status Blocks identified by a single SEQ_ID describe the status of that Sequence for a given Exchange. <br /> <br /> <br /> '''DF_CTL – Data Field Control:'''<br /> <br /> Data Field Control (DF_CTL) is a one-byte field (Word 3, Bits 23-16) that specifies the presence of optional headers at the beginning of the Data Field.<br /> The Optional Headers shall be positioned in the Data Field in the order specified with the bit 23 header as the first header in the Data Field, bit 22 header as the second header in the Data Field, and so forth, in a left to right manner corresponding to bits 23, 22, 21<br /> If either bit 17 or 16 are set to one, then a Device Header is present. The size of the Device Header is specified by the encoded value of bits 17 and 16.<br /> If an Optional Header is not present as indicated by the appropriate bit in DF_CTL, no space shall be allocated for the Header in the Data Field of the frame (e.g., if bits 23 and 22 are zero and bit 21 is one, the first data byte of the Data Field contains the first byte of the Network Header).<br /> <br /> <br /> [[Image:table9-dfc.jpg]]<br /> <br /> <br /> '''SEQ_CNT – Sequence Count:'''<br /> <br /> The sequence count (SEQ_CNT) is a two-byte field (Word 3, Bits 15-0) that shall indicate the sequential order of Data frame transmission within a single Sequence or multiple consecutive Sequences for the same Exchange. The SEQ_CNT of the first Data frame of the first Sequence of the Exchange transmitted by either the Originator or Responder shall be binary zero. The SEQ_CNT of each subsequent Data frame in the Sequence shall be incremented by one.<br /> <br /> If a Sequence is streamed, the SEQ_CNT of the first Data frame of the Sequence shall be incremented by one from the SEQ_CNT of the last Data frame of the previously sent Sequence. If a Sequence is non-streamed, the starting SEQ_CNT may be continuously increasing or binary zero.<br /> <br /> The same SEQ_ID and SEQ_CNT shall identify ACK and Link Response frames as the frame to which it is responding. Frames are tracked on a SEQ_ID, SEQ_CNT basis within the scope of the Sequence Qualifier for that Sequence.<br /> <br /> The SEQ_CNT shall wrap to zero after reaching a value of 65 535. The SEQ_CNT shall then only be incremented to the SEQ_CNT of an unacknowledged frame of the same Sequence. Otherwise, data integrity is not ensured. In order to ensure frame identification integrity, SEQ_CNT is a 16-bit field while the End-to-end Credit field of the login Class Service Parameters is defined as a 15-bit field. This ensures that EE Credit never exceeds one-half of the maximum SEQ_CNT.<br /> OX_ID – Originator Exchange ID:<br /> <br /> The Originator Exchange ID is a two-byte field (Word 4, Bits 31-16) that shall identify the Exchange ID assigned by the Originator of the Exchange. Each Exchange shall be assigned an identifier unique to the Originator or Originator-Responder pair. If the Originator is enforcing uniqueness via the OX_ID mechanism, it shall set a unique value for OX_ID other than FF FFh in the first Data frame of the first Sequence of an Exchange. An OX_ID of FF FFh indicates that the OX_ID is unassigned and that the Originator is not enforcing uniqueness via the OX_ID mechanism. If an Originator uses the unassigned value of FF FFh to identify the Exchange, it shall have only one<br /> Exchange (OX_ID set to FF FFh) with a given Responder. <br /> <br /> An Originator Exchange Status Block associated with the OX_ID is used to track the progress of a series of Sequences that comprises an Exchange. <br /> <br /> '''RX_ID – Response Exchanger ID:'''<br /> <br /> The Responder Exchange ID is a two byte field (Word 4, Bits 15-0) assigned by the Responder that shall provide a unique, locally meaningful identifier at the Responder for an Exchange established by an Originator and identified by an OX_ID. The Responder of the Exchange shall set a unique value for RX_ID other than FF FFh, if RX_ID is being used, by one of two methods:<br /> <br /> a) in an ACK to a Data frame in the first Sequence of an Exchange in Class 1 and 2; or<br /> b) in the first Sequence transmitted as a Sequence Initiator, if any, in Class 3.<br /> <br /> An RX_ID of FF FFh shall indicate that the RX_ID is unassigned. RX_ID is not used in Class 6 and shall be set to FF FFh for all Class 6 frames. If the Responder does not assign an RX_ID other than FF FFh by the end of the first Sequence, then the Responder is not enforcing uniqueness via the RX_ID mechanism.<br /> <br /> When the Responder uses only FF FFh for RX_ID, it shall have the capability to identify the Exchange through the OX_ID and the S_ID of the Originator of the Exchange. Under all other circumstances, until a value other than FF FFh is assigned, FF FFh value for RX_ID shall be used indicating that RX_ID is unassigned. After a value other than FF FFh is assigned, the assigned value shall be used for the remainder of the Exchange. <br /> A Responder Exchange Status Block associated with the RX_ID is used to track the progress of a series of Sequences that compose an Exchange.<br /> <br /> <br /> <br /> '''Parameter:'''<br /> <br /> The Parameter field (Word 5, Bits 31-0) has meanings based on frame type. For Link Control frames, the Parameter field is used to carry information specific to the individual Link Control frame. For Data frames with the relative offset present bit set to 1, the Parameter field specifies relative offset, a four-byte field that contains the relative displacement of the first byte of the Payload of the frame from the base address as specified by the ULP. Relative offset is expressed in terms of bytes. The use of the relative offset field is optional and is indicated as a Login Service Parameter. If relative offset is being used, the number of bytes transmitted relative to the protocol-specific base address shall be less than the maximum value of the relative offset (Parameter) field (232). For Data frames with the relative offset Present bit set to zero, the Parameter field shall be set and interpreted in a protocol specific manner that may depend on the type of Information Unit carried by the frame.<br /> <br /> Continuously increasing relative offset is the relationship specified between relative offset values contained in frame (n) and frame (n+1) of an Information Category within a single Sequence. Continuously increasing relative offset (ROI) for a given Information Category I is specified by the following:<br /> <br /> OI(n+1) = ROI(n) + Length of PayloadI(n)<br /> <br /> where n is ≥ 0 and represents the consecutive frame count of frames for a given Information Category within a single Sequence. ROI(0) is the initial relative offset for the Information Category I.</div> PPrakash https://en.wikipedia.org/w/index.php?title=Mettupalayam,_Coimbatore&diff=144407207 Mettupalayam, Coimbatore 2007-07-13T14:47:00Z <p>PPrakash: /* Things to see and do */</p> <hr /> <div>&lt;!-- See [[Wikipedia:WikiProject Indian cities]] for details --&gt;{{Infobox Indian Jurisdiction |<br /> native_name = Mettupalayam | <br /> type = city | <br /> latd = 11.3000 | longd = 76.9500|<br /> state_name = Tamil Nadu |<br /> district = [[Coimbatore district|Coimbatore]] |<br /> leader_title = |<br /> leader_name = |<br /> altitude = 326|<br /> population_as_of = 2001 |<br /> population_total = 66,313| <br /> population_density = |<br /> area_magnitude= sq. km |<br /> area_total = |<br /> area_telephone = |<br /> postal_code = |<br /> vehicle_code_range = TN 37, TN 38|<br /> sex_ratio = |<br /> unlocode = |<br /> website = |<br /> footnotes = |<br /> }}<br /> {{this|a town in Coimbatore district|Mettupalayam}}<br /> '''Mettupalayam''' ([[Tamil language|Tamil]]:மேட்டுப்பாளையம்)is a city and a [[municipality]] in [[Coimbatore district]] in the [[India]]n [[States and territories of India|state]] of [[Tamil Nadu]].<br /> <br /> ==Geography==<br /> Mettupalayam is located at {{coor d|11.3000|N|76.9500|E|}}&lt;ref&gt;[http://www.fallingrain.com/world/IN/25/Mettuppalaiyam2.html Falling Rain Genomics, Inc - Mettuppalaiyam, India]&lt;/ref&gt;. It has an average elevation of 314&amp;nbsp;[[metre]]s (1033&amp;nbsp;[[foot (unit of length)|feet]]). Mettupalayam is situated on the bank of [[Bhavani River]] at the foot of the [[Nilgiri]] mountains.<br /> <br /> ==Demographics==<br /> [[As of 2001]] India [[census]]{{GR|India}}, Mettupalayam had a population of 66,313. Males constitute 50% of the population and females 50%. Mettupalayam has an average literacy rate of 73%, higher than the national average of 59.5%: male literacy is 79%, and female literacy is 68%. In Mettupalayam, 10% of the population is under 6 years of age.<br /> <br /> ==Transport Infrastructure==<br /> Mettupalayam is the railhead for the [[Nilgiri Mountain Railway]], and provides the interchange for passengers of this subline to the broad gauge railway. <br /> <br /> Mettupalayam is the starting point for two of the [[Nilgiri Ghat Roads|Ghat Roads]] into the [[Nilgiri Hills]]. Subsequently it has established itself for the trade of fresh fruits &amp; vegetables coming down from the hills and also for produce that grows in the plains and is destined for the hills. Fresh produce from here is supplied to most parts of [[Coimbatore]] district.<br /> <br /> [[Coimbatore]] (Manchester of South India) is 38 km by road from Mettupupalayam. The nearest airport is in [[Coimbatore]] which has regular ([http://www.coimbatorecity.com/index.php?/content/view/90/27/ Air timings]) flights from [[Ahmedabad]], [[Bangalore]], [[Calicut]], [[Chennai]], [[Cochin]], [[Hyderabad, Andhra Pradesh|Hyderabad]], [[Mumbai]], [[New Delhi]] and [[Sharjah]].<br /> <br /> ==Things to see and do==<br /> [[Kotagiri]] road is fabulous walking spot for Mettupalyam locals, where one can watch spotted deers and [[elephants]]. <br /> <br /> Vana Bathrakali Amman Kovil, Idugampalayam Aanjineyar temple, Subramaniya swamy temple, Thirupathi, Karamadai Ranganadhar Kovil are all famous temples located near Mettupalayam.<br /> <br /> Black Thunder a water theme park located 3 km from the town attract most tourist.<br /> <br /> For a magnificent view of the hillside covered with forests, a train journey from Mettupalyam to [[Ooty]] in is recommended. This narrow gauge mountain train winds through 46 km of forests, [[tea]] plantations, 16 tunnels, and more than 250 bridges, starting from Mettupalayam on the plains. Moving at a pace little faster than walking, the journey takes four and half to five hours, but is more than compensated by stunning views.<br /> <br /> ==References==<br /> &lt;references/&gt;<br /> <br /> [[Category:Cities and towns in Tamil Nadu]]<br /> <br /> [[pl:Mettupalayam]]<br /> [[pt:Mettupalayam]]<br /> [[ta:மேட்டுப்பாளையம்]]<br /> <br /> {{Coimbatore-geo-stub}}</div> PPrakash https://en.wikipedia.org/w/index.php?title=Serial_Attached_SCSI&diff=112016886 Serial Attached SCSI 2007-03-02T06:07:51Z <p>PPrakash: /* External references */</p> <hr /> <div>{{Cleanup|December 2006}}<br /> [[Image:SASHardDriveComparsion.jpg|thumb|200px|2.5in. &amp; 3.5in SAS Hard Drives]]In [[computer hardware]], '''Serial Attached SCSI''' ('''SAS''') is a [[computer bus]] technology primarily designed for transfer of data to and from devices like [[hard drives]], [[CD-ROM]] drives and so on. SAS is a serial communication protocol for direct attached storage ([[Direct Attached Storage|DAS]]) devices. It is designed for the corporate and enterprise market as a replacement for parallel [[SCSI]], allowing for much higher speed data transfers than previously available, and is backwards-compatible with [[Serial ATA|SATA]]. Though SAS uses [[Serial communications|serial communication]] instead of the [[Parallel port|parallel]] method found in traditional [[SCSI]] devices, it still uses [[SCSI command]]s for interacting with SAS End devices. SAS protocol is developed and maintained by [http://www.t10.org T10 committee]. The current draft revision of SAS protocol can be downloaded from {{PDFlink|[http://www.t10.org/ftp/t10/drafts/sas2/sas2r05a.pdf SAS 2 draft]}}.<br /> <br /> ==Introduction==<br /> A typical Serial Attached SCSI system would consist of the following basic components:<br /> <br /> # An '''Initiator''' is a device that originates device service and [[Task Management Function|task management]] requests to be processed by a target device and receives responses for the same requests from other target devices. Initiators may be provided as an on-board component on the motherboard (as is the case with many server-oriented motherboards) or as an add-on [[host bus adapter]].<br /> # A '''Target''' is a device containing logical units and target ports that receives device service and [[Task Management Function|task management]] requests for processing and sends responses for the same requests to initiator devices. A target device could be a [[hard disk]] or a [[disk array]] system.<br /> # A '''Service Delivery Subsystem''' is the part of an [[input/output|I/O]] system that transmits information between an initiator and a target. Typically cables connecting an initiator and target with or without expanders constitute a service delivery subsystem.<br /> # '''[[SAS Expanders|Expanders]]''' are devices that are part of a service delivery subsystem and facilitate communication between SAS devices. It facilitates connection of multiple SAS End devices to a single initiator port.<br /> <br /> ==SAS Domain &amp; WWN (World Wide Name)==<br /> A &quot;SAS Domain&quot; is an [[input/output|I/O]] system consisting of a set of SAS devices that communicate with one another by means of a service delivery subsystem. Each SAS device in a SAS Domain has a globally unique identifier assigned to the device manufacturer by [[IEEE]] (similar to that of an [[Ethernet]] device's [[MAC address]]) called as [[World Wide Name]] (aka SAS address). The WWN uniquely identifies the device in the SAS domain just as a SCSI ID identifies a device in a parallel SCSI bus. A SAS domain may contain up to a total of 16,256 devices.<br /> <br /> ==SAS vs parallel SCSI==<br /> * SAS uses Serial transfer protocol to interface multiple devices hence lesser signaling overhead than parallel SCSI, resulting in higher speed.<br /> * No bus contention as SAS bus is [[point-to-point]] while SCSI bus is [[multidrop]]. Each device is connected by a dedicated bus to the initiator. Connection through expanders may appear to cause some contention, but this is transparent to the initiator.<br /> * SAS has no [[termination]] issues and does not require terminator packs like parallel SCSI.<br /> * SAS eliminates [[clock skew]].<br /> * SAS supports higher number of devices (&gt; 16384) while Parallel SCSI limits it to 8, 16, or 32.<br /> * SAS supports higher transfer speed (1.5, 3.0 or 6.0 [[Gbps]]). The speed is realized on each initiator-target connection, hence higher throughput whereas in parallel SCSI the speed is shared across the entire [[multidrop]] bus.<br /> * SAS supports SATA devices.<br /> * SAS uses SCSI commands to interface with SAS End devices.<br /> <br /> ==SAS vs SATA==<br /> * SATA devices are uniquely identified by their port number connected to the [[Host bus adapter]] while SAS devices are uniquely identifed by their [[World Wide Name]] (WWN).<br /> * Most SAS drives provide [[Tagged Command Queuing]], while most newer SATA drives provide [[Native Command Queuing]], each of which has its pros and cons.<br /> * SATA follows ATA command set and supports hard drives and CD-ROM drives only while SAS supports a wide range of devices including hard drives, scanners, printers, CD-ROM drives etc.<br /> * SAS hardware allows [[multipath I/O]] to devices while SATA does not. Effort is on in SATA 2 to use port multiplier to achieve multipathing.<br /> * SATA is primarily used for non-critical applications like home PC use while SAS, due to its robustness, can be used for critical server applications.<br /> * SAS error recovery and reporting are much cleaner than SATA.<br /> * SAS complements SATA and is not a competitor to SATA.<br /> * SAS uses higher Signal Voltages (800-1600mV TX, 275-1600mV RX) than SATA (400-600mV TX, 325-600mV RX), so when mixed, SAS-drives fall back to SATA-voltages.<br /> * SAS can use cables up to 8m (25ft) long, SATA is limited to 1m.<br /> <br /> ==SAS Expanders==<br /> A '''Serial Attached SCSI Expander''' (SAS Expander) is a component used to facilitate communication between large numbers of SAS devices. Expanders contain two or more external expander ports. Each expander device contains at least one [[SAS Management Protocol]] target port for management and may contain SAS devices itself. For example, an expander may include an [[Serial SCSI Protocol]] target port for access to a peripheral device. An expander is ''not necessary'' to interface a SAS initiator and target but if connected it helps a single initiator to communicate to more SAS/SATA targets. An useful analogy could be is that expanders can be considered akin to a [[ethernet hub]] in a network that allows multiple systems to be connected using a single port in the network.<br /> <br /> There are two different types of expanders: Edge Expanders and Fanout Expanders.<br /> *An '''Edge Expander''' allows for communication with up to 128 SAS addresses, allowing the SAS initiator to communicate with these additional devices. Edge expanders are the ones which can do Direct Table routing, and Subtractive Routing. Brief Discussion of these routing mechanisms are below. Without fan out expander you can use at the max two edge expanders in your delivery subsystem(because you will connect the subtractive routing port of those edge expanders together, and you can't connect any more expanders). To solve this bottleneck we are going for Fan-Out Expanders.<br /> <br /> *A '''Fanout Expander''' can connect up to 128 sets of Edge Expanders, known as an Edge Expander Device Set, allowing for even more SAS devices to be addressed. Subtractive routing port of all edge expanders will be connected to the phys of fan-out expander. Fan out expander can not do subtractive routing, it can only forward subtractive routing requests to the connected edge expanders.<br /> <br /> *A '''Dual Expander''' is an expander (either Fanout or Edge) featuring redundant links.<br /> <br /> Direct routing is to identify devices directly connected to it. Table routing is for identifying devices connected to the expanders connected to its own PHY. Subtractive routing is used when you are not able to find the devices in the sub-branch you belong to. This will pass the request to different branch altogether.<br /> <br /> ==Connectors==<br /> The SAS connector is much smaller than traditional parallel [[SCSI connector]]s allowing for the small 2.5 inch drives. SAS supports point data transfer speeds up to 3 [[Gigabit per second|Gbit/s]], but is expected to reach 10 Gbit/s [[as of 2010|by the year 2010]]. <br /> <br /> The physical SAS connector is available in several different variants including:<br /> <br /> * SFF 8482 — which is form factor compatible with SATA,<br /> * SFF 8484 — hi-density internal connector for connecting up to 4 devices,<br /> * SFF 8470 — hi-density external connector (aka [[Infiniband]] connector, also used as an internal connector) for connecting up to 4 devices.<br /> * SFF 8087 - Molex iPASS reduced width internal 4x connector with future 10 Gbit/s support<br /> * SFF 8088 - Molex iPASS reduced width external 4x connector with future 10 Gbit/s support<br /> <br /> The SFF 8482 connector allows for SATA drives to connect to a SAS [[backplane]], which obviates the need to install an additional SATA controller just to attach a DVD-writer, for example. Conversely, SAS drives are not usable on a SATA bus and have their physical connector keyed to prevent any plugging into a SATA backplane.<br /> <br /> ==Technical details==<br /> Serial Attached SCSI is comprised of three transport protocols:<br /> <br /> * Serial SCSI Protocol (SSP) — Supporting SAS disk drives.<br /> * Serial ATA Tunneling Protocol (STP) — Supporting SATA disks.<br /> * Serial Management Protocol (SMP) — for managing SAS Expanders.<br /> <br /> ==Topology==<br /> An [[initiator]] may be directly connected to a [[target]] via one or more [[PHY]]s (such a connection is called a port whether it uses one or more PHYs, although the term &quot;wide port&quot; is sometimes used for a multi-PHY connection).<br /> <br /> Expanders exist to allow more complex interconnect topologies. Expanders assist in link-switching (as opposed to packet-switching) end devices (initiators or targets). They may locate an end device either directly (when the end device is connected to it), via a routing table (a mapping of end device IDs and the expander the link should be switched to 'downstream' to route towards that ID), or when those methods fail, via subtractive routing: the link is routed to a single expander connected to a subtractive routing port. If there is no expander connected to a subtractive port, the end device cannot be reached.<br /> <br /> Expanders with no PHYs configured as subtractive act as [[fanout expanders]] and can connect to any number of other expanders. Expanders with subtractive PHYs may only connect to two other expanders at a maximum, and in that case they must connect to one expander via a subtractive port and the other via a non-subtractive port.<br /> <br /> There exists one root (most 'upstream') node in a [[SAS domain]]. This node is the expander which is not connected to another expander via a subtractive port. Therefore, if a fanout expander exists in the configuration, it must be the domain's root node. The root node knows about all end devices connected to the domain.<br /> <br /> Practical enforcement of this topology is outside the scope of this section.<br /> <br /> ==External references==<br /> *[http://www.t10.org T10 committee]<br /> *{{PDFlink|[http://www.t10.org/ftp/t10/drafts/sas2/sas2r05a.pdf Download SAS 2 draft revision from T10]}} <br /> *[http://www.infostor.com/sas/sas_home.cfm SAS Resources]<br /> *{{PDFlink|[http://www.scsita.org/aboutscsi/sas/tutorials/SAS_General_overview_public.pdf SAS General Overview]}} <br /> *[http://www.lsi.com/insight_center/industry_standards/storage_connectivity/sas/index.html SAS LSI Logic]<br /> <br /> [[Category:SCSI]]<br /> [[Category:Serial ATA]]<br /> [[Category:Serial buses]]<br /> <br /> [[de:Serial Attached SCSI]]<br /> [[es:Serial Attached SCSI]]<br /> [[it:Serial Attached SCSI]]<br /> [[ru:Serial Attached SCSI]]<br /> [[fi:Serial Attached SCSI]]<br /> [[sv:Serial Attached SCSI]]</div> PPrakash https://en.wikipedia.org/w/index.php?title=LSI_Logic&diff=112016254 LSI Logic 2007-03-02T06:03:09Z <p>PPrakash: /* External links */</p> <hr /> <div>{{Infobox_Company |<br /> company_name = LSI Logic Corporation |<br /> company_type = Public ([[NYSE]]: [http://www.nyse.com/about/listed/lcddata.html?ticker=LSI LSI]) |<br /> company_logo = [[Image:Lsilogic transparent.gif|94px|LSI Logic logo]] |<br /> foundation = [[1981]] |<br /> location = [[Milpitas, California]], [[USA]] |<br /> key_people = Abhi Talwalkar, President and CEO |<br /> num_employees = 4300 ([[2005]]) |<br /> revenue = $1.9 Billion [[United States dollar|USD]] ([[Fiscal year|2005]]) |<br /> industry = [[Semiconductor]]s, [[Computer storage|Storage]] |<br /> homepage = [http://www.lsi.com/ www.lsi.com]<br /> }}<br /> '''LSI Logic''' was founded in Milpitas, CA by [[Wilfred Corrigan]] in 1981 after he left an executive position with [[Fairchild Semiconductor]].<br /> The company was started with $6 million of [[venture capital]] and utilized excess capacity at [[Toshiba]] for manufacturing, an early example of the [[fabless]] semiconductor manufacturing model. In 1998 it bought [[Symbios Logic]] from [[Hyundai]]. It is often recognized as a pioneer of the [[Application-specific_integrated_circuit|ASIC]] market and in 2006 celebrated its 25th year of business. <br /> <br /> == Markets ==<br /> LSI has its hand in the production of [[video game consoles]], [[DVD]] and [[personal video recorder]]s, [[high-definition video]] and [[home media server]]s. [http://www.lsi.com/consumer_home/products_home/index.html]<br /> <br /> LSI also deals with ASICs, host bus adapters, [[RAID]] adapters, storage systems, expanders and software. [http://www.lsi.com/storage_home/products_home/index.html LSI Logic Storage Products]<br /> <br /> == Acquisitions ==<br /> In [[March]] [[2001]] LSI Logic acquired [[C-Cube]] in a stock-for-stock transaction [http://query.nytimes.com/gst/fullpage.html?res=9C00E6DB1E3CF934A15750C0A9679C8B63].<br /> In [[Sep]] [[2001]] LSI Logic acquired [[AMI's RAID adapter division]] in a cash transaction <br /> <br /> In [[December]] [[2006]] LSI Logic acquired [[Agere Systems|Agere]] in an all stock transaction [http://www.cnbc.com/id/16035992].<br /> <br /> ==External links==<br /> *[http://www.lsi.com/ Official website]<br /> <br /> [[Category:Companies established in 1981]]<br /> [[Category:Companies listed on the New York Stock Exchange]]<br /> [[Category:Fortune 1000]]<br /> [[Category:S&amp;P 500]]<br /> [[Category:Semiconductor companies]]<br /> [[Category:Companies based in Silicon Valley]]<br /> <br /> [[de:LSI Logic]]<br /> [[es:LSI Logic]]<br /> [[fr:LSI Logic]]<br /> {{tech-stub}}</div> PPrakash https://en.wikipedia.org/w/index.php?title=Madras_Institute_of_Technology&diff=101039900 Madras Institute of Technology 2007-01-16T05:08:00Z <p>PPrakash: /* External links */</p> <hr /> <div>[[Image:MIT_Logo.JPG|thumb|right|200px|Logo of MIT]]<br /> <br /> '''Madras Institute of Technology''' (MIT) is a premier engineering institute located in [[Chennai]], [[India]]. It is one of the four independent departments of the [[Anna University]]. MIT is Alma Mater to several significant Indian personalities including [[Abdul_Kalam|Dr. A. P. J. Abdul Kalam]],The President of India (7/2002- ). MIT was established by Shri C.Rajam in July 1949, with the motto of &quot;In the Service of India&quot;. Visit [http://www.mitindia.edu/history.htm] to know more about the history of MIT.<br /> <br /> It has eight internal engineering departments,viz.Aeronautical Engineering, Automobile Engineering, Production Technology, Computer Sciences, Information Technology, Electronics, Instrumentation and Rubber &amp; Plastics Technology. <br /> <br /> The institute focused on niche courses from its very inception. It was the first institute in India to have specialised courses (e.g. Electronics Engineering, Automobile Engineering, Instrumentation Engineering &amp; Aeronautical Engineering). It is also the only college in India that offers a Post Graduate Engineering degree in Avionics.<br /> <br /> Computer Sciences &amp; Information Technology were started only recently, keeping in mind the increased demand for IT courses in India.<br /> <br /> Admission into the institute happens through the [[TNPCEE]], although the situation might change next year.<br /> <br /> The institute attracts the top talent in the south Indian state of Tamil Nadu. Placements are near 100%, with Instrumentation Engg. usually topping the list.<br /> <br /> The department got a starring placement percentage of 130% for the year 2005-2006<br /> <br /> Prominent alumni of this institute include Honorable President Dr.A.P.J.[[Abdul Kalam]], [[Sujatha]] &amp; K B Chandrashekhar (founder of jamcracker.com &amp; exodus.com)<br /> <br /> The annual festival of the institute is called Mitafest. Each department has its own festival, in addition to the musical festivals Sivaranjani &amp; Hamsadhwani.<br /> <br /> ==External links==<br /> * [http://www.annauniv.edu/mit/ Madras Institute of Technology website]<br /> * [http://www.ieamitindia.org/intecho/main/main.htm INTECHO 2007 website]<br /> * [http://www.miteea.com/ Department of Electronics Engineering website]<br /> {{India-university-stub}}<br /> [[Category:Education in Chennai]]<br /> [[Category:Engineering colleges in Tamil Nadu]]</div> PPrakash https://en.wikipedia.org/w/index.php?title=BSE_SENSEX&diff=92170662 BSE SENSEX 2006-12-05T06:20:25Z <p>PPrakash: /* Sensex Milestones */</p> <hr /> <div>[[Image:Bombay-Stock-Exchange.jpg|250px|thumb|The Bombay Stock Exchange]]<br /> The '''BSE Sensex''' or '''Bombay Stock Exchange Sensitive Index''' is a value-weighted index composed of 30 stocks with the base April [[1979]] = 100. It consists of the 30 largest and most actively traded stocks, representative of various sectors, on the Bombay Stock Exchange. These companies account for around one-fifth of the market capitalization of the [[Bombay Stock Exchange|BSE]].<br /> <br /> The base value of the Sensex is ''100'' on [[April 1]], [[1979]] and the base year of BSE-SENSEX is ''1978-79''. <br /> <br /> At irregular intervals, the Bombay Stock Exchange (BSE) authorities review and modify its composition to make sure it reflects current market conditions.<br /> <br /> The abbreviated form &quot;Sensex&quot; was coined by [[Deepak Mohoni]] around [[1990]] while writing market analysis columns for some of the business newspapers and magazines. It gained popularity over the next year or two.<br /> <br /> The stock market has grown by over ten times from June [[1990]] to today. Using information from April [[1979]] onwards, the long-run rate of return on the BSE Sensex can be estimated to be 0.52% per week (continuously compounded) with a standard deviation of 3.67%. This translates to 27% per annum, which translates to roughly 18% per annum after compensating for [[inflation]].<br /> <br /> == Sensex Milestones ==<br /> The Sensex crossed the 1,000 mark on July 25, 1990; the 2,000 mark on January 15, 1992; the 3,000 mark on February 29, 1992; the 4,000 mark on March 30, 1992; the 5,000 mark on October 11, 1999; the 6,000 mark on January 2, 2004; the 7,000 mark on June 21, 2005; the 8,000 mark on September 8, 2005; the 9,000 mark on December 09, 2005; and finally '''the historic 10,000 mark on February 7, 2006.''' It created another landmark when it touched 11,000 on March 27, 2006. The Sensex closed at a high of '''12,903 on 28 Oct 2006''' . To reach from the 11,000 mark to the 12,000 mark only took 19 working days, the shortest time interval for a 1000 points climb in BSE Sensex history, surpassing the just set record of 29 days that it took to reach 11,000 from 10,000.<br /> <br /> ''Here is a timeline on the rise and rise of the Sensex through Indian stock market history.''<br /> <br /> *'''1000, July 25, 1990''' - On July 25, 1990, the Sensex touched the magical four-digit figure for the first time and closed at 1,001 in the wake of a good monsoon and excellent corporate results.<br /> <br /> *'''2000, January 15, 1992''' - On January 15, 1992, the Sensex crossed the 2,000-mark and closed at 2,020 followed by the liberal economic policy initiatives undertaken by the then finance minister and current Prime Minister Dr Manmohan Singh.<br /> <br /> *'''3000, February 29, 1992''' - On February 29, 1992, the Sensex surged past the 3000 mark in the wake of the market-friendly Budget announced by the then Finance Minister, Dr Manmohan Singh.<br /> <br /> *'''4000, March 30, 1992''' - On March 30, 1992, the Sensex crossed the 4,000-mark and closed at 4,091 on the expectations of a liberal export-import policy. It was then that the Harshad Mehta scam hit the markets and Sensex witnessed unabated selling.<br /> <br /> *'''5000, October 11, 1999''' - On October 8, 1999, the Sensex crossed the 5,000-mark as the BJP-led coalition won the majority in the 13th Lok Sabha election.<br /> <br /> *'''6000, February 11, 2000''' - On February 11, 2000, the infotech boom helped the Sensex to cross the 6,000-mark and hit and all time high of 6,006.<br /> <br /> *'''7000, June 21, 2005''' - On June 20, 2005, the news of the settlement between the Ambani brothers boosted investor sentiments and the scrips of RIL, Reliance Energy, Reliance Capital and IPCL made huge gains. This helped the Sensex crossed 7,000 points for the first time.<br /> <br /> *'''8000, September 8, 2005''' - On September 8, 2005, the Bombay Stock Exchange's benchmark 30-share index -- the Sensex -- crossed the 8000 level following brisk buying by foreign and domestic funds in early trading.<br /> <br /> *'''9000, December 09, 2005''' - The Sensex on November 28, 2005 crossed the magical figure of 9000 to touch 9000.32 points during mid-session at the Bombay Stock Exchange on the back of frantic buying spree by foreign institutional investors and well supported by local operators as well as retail investors.<br /> <br /> *'''10,000, February 7, 2006''' - The Sensex on February 6, 2006 touched 10,003 points during mid-session. The Sensex finally closed above the 10K-mark on February 7, 2006.<br /> <br /> *'''11,000, March 27, 2006''' - The Sensex on March 21, 2006 crossed the magical figure of 11,000 and touched a life-time peak of 11,001 points during mid-session at the Bombay Stock Exchange for the first time. However, it was on March 27, 2006 that the Sensex first closed at over 11,000 points.<br /> <br /> *'''12,000, April 20, 2006''' - The Sensex on April 20, 2006 crossed the magical figure of 12,000 and touched a life-time peak of 12,004 points during mid-session at the Bombay Stock Exchange for the first time.<br /> <br /> *'''13,000, October 30, 2006''' - The Sensex on October 30, 2006 crossed the magical figure of 13,000 and still riding high at the Bombay Stock Exchange for the first time. It took 135 days to reach 13,000 from 12,000. And 124 days to reach 13,000 from 12,500. On 30th October 2006 it touched a peak of 13,039.36 &amp; closed at 13,024.26.<br /> <br /> *'''14,000, December 5, 2006''' - The Sensex on December 5, 2006 crossed the magical figure of 14,000 and touched a life-time peak of 14028 at 9.58AM(IST) while opening for the day December 5, 2006.<br /> <br /> On May 22, 2006, the Sensex plunged by a whopping 1100 points during intra-day trading, leading to the suspension of trading for the first time since May 17, 2004. The recent volatility of the Sensex had caused investors to lose Rs 6 lakh crore ($131 billion) in the last seven trading sessions. The Finance Minister, [[P. Chidambaram]], made an unscheduled press statement when trading was suspended to assure investors that nothing was wrong with the fundamentals of the economy, and advised retail investors to stay invested. When trading resumed after the reassurances of the [[Reserve Bank of India]] and the [[Securities and Exchange Board of India]], the Sensex managed to move up 700 points, but still 450 points in the red. This is the largest ever intra-day crash (in points terms) in the history of the Sensex.<br /> <br /> The Sensex eventually recovered from the volatility, and on [[October 16]], [[2006]], the Sensex closed at an all-time high of 12,928.18 with an intra-day high of 12,953.76. This was a result of increased confidence in the economy and reports that India's manufacturing sector grew by 11.1% in August 2006.<br /> <br /> On 7/11/2006, sensex went high upto 13178 points but at the end it came down to 13156.66 decreasing upto 30.23 points.It went to the all mighty on 2006 in the history.<br /> <br /> ==External links==<br /> *[http://www.indiahowto.com/what-is-sensex-nifty.html &quot;What are the SENSEX &amp; Nifty?&quot;]<br /> <br /> * http://www.bseindia.com/about/abindices/bse30.asp<br /> <br /> [[Category:Stock market indices]]<br /> <br /> [[de:SENSEX 30]]</div> PPrakash https://en.wikipedia.org/w/index.php?title=BSE_SENSEX&diff=84760308 BSE SENSEX 2006-10-31T02:54:02Z <p>PPrakash: /* Sensex Milestones */</p> <hr /> <div>[[Image:Bombay-Stock-Exchange.jpg|250px|thumb|The Bombay Stock Exchange]]<br /> ==History==<br /> Bombay Stock Exchange Limited is the oldest stock exchange in [[Asia]] with a rich heritage. Popularly known as &quot;BSE&quot;, it was established as &quot;The Native Share &amp; Stock Brokers Association&quot; in 1875. It is the first stock exchange in the country to obtain permanent recognition in 1956 from the Government of India under the ''Securities Contracts (Regulation) Act, 1956''.The Exchange's pivotal and pre-eminent role in the development of the Indian capital market is widely recognized and its index, SENSEX, is tracked worldwide. Earlier an Association of Persons (AOP), the Exchange is now a demutualised and corporatised entity incorporated under the provisions of the Companies Act, 1956, pursuant to the BSE(Corporatisation and Demutualisation) Scheme, 2005 notified by the '''Securities and Exchange Board of India (SEBI)'''.<br /> <br /> The '''BSE Sensex''' or '''Bombay Stock Exchange Sensitive Index''' is a value-weighted index composed of over 4000 stocks with the base April [[1979]] = 100. It consists of the 30 largest and most actively traded stocks, representative of various sectors, on the Bombay Stock Exchange. These companies account for around one-fifth of the market capitalization of the [[Bombay Stock Exchange|BSE]].<br /> <br /> The base value of the Sensex is ''100'' on [[April 1]], [[1979]] and the base year of BSE-SENSEX is ''1978-79''. <br /> <br /> At irregular intervals, the Bombay Stock Exchange (BSE) authorities review and modify its composition to make sure it reflects current market conditions.<br /> <br /> The abbreviated form &quot;Sensex&quot; was coined by [[Deepak Mohoni]] around [[1990]] while writing market analysis columns for some of the business newspapers and magazines. It gained popularity over the next year or two.<br /> <br /> The stock market has grown by over ten times from June [[1990]] to today. Using information from April [[1979]] onwards, the long-run rate of return on the BSE Sensex can be estimated to be 0.52% per week (continuously compounded) with a standard deviation of 3.67%. This translates to 27% per annum, which translates to roughly 18% per annum after compensating for [[inflation]].<br /> <br /> == Sensex Milestones ==<br /> The Sensex crossed the 1,000 mark on July 25, 1990; the 2,000 mark on January 15, 1992; the 3,000 mark on February 29, 1992; the 4,000 mark on March 30, 1992; the 5,000 mark on October 11, 1999; the 6,000 mark on January 2, 2004; the 7,000 mark on June 21, 2005; the 8,000 mark on September 8, 2005; the 9,000 mark on December 09, 2005; and finally '''the historic 10,000 mark on February 7, 2006.''' It created another landmark when it touched 11,000 on March 27, 2006. The Sensex closed at a high of '''12,903 on 28 Oct 2006''' . To reach from the 11,000 mark to the 12,000 mark only took 19 working days, the shortest time interval for a 1000 points climb in BSE Sensex history, surpassing the just set record of 29 days that it took to reach 11,000 from 10,000.<br /> <br /> ''Here is a timeline on the rise and rise of the Sensex through Indian stock market history.''<br /> <br /> *'''1000, July 25, 1990''' - On July 25, 1990, the Sensex touched the magical four-digit figure for the first time and closed at 1,001 in the wake of a good monsoon and excellent corporate results.<br /> <br /> *'''2000, January 15, 1992''' - On January 15, 1992, the Sensex crossed the 2,000-mark and closed at 2,020 followed by the liberal economic policy initiatives undertaken by the then finance minister and current Prime Minister Dr Manmohan Singh.<br /> <br /> *'''3000, February 29, 1992''' - On February 29, 1992, the Sensex surged past the 3000 mark in the wake of the market-friendly Budget announced by the then Finance Minister, Dr Manmohan Singh.<br /> <br /> *'''4000, March 30, 1992''' - On March 30, 1992, the Sensex crossed the 4,000-mark and closed at 4,091 on the expectations of a liberal export-import policy. It was then that the Harshad Mehta scam hit the markets and Sensex witnessed unabated selling.<br /> <br /> *'''5000, October 11, 1999''' - On October 8, 1999, the Sensex crossed the 5,000-mark as the BJP-led coalition won the majority in the 13th Lok Sabha election.<br /> <br /> *'''6000, February 11, 2000''' - On February 11, 2000, the infotech boom helped the Sensex to cross the 6,000-mark and hit and all time high of 6,006.<br /> <br /> *'''7000, June 21, 2005''' - On June 20, 2005, the news of the settlement between the Ambani brothers boosted investor sentiments and the scrips of RIL, Reliance Energy, Reliance Capital and IPCL made huge gains. This helped the Sensex crossed 7,000 points for the first time.<br /> <br /> *'''8000, September 8, 2005''' - On September 8, 2005, the Bombay Stock Exchange's benchmark 30-share index -- the Sensex -- crossed the 8000 level following brisk buying by foreign and domestic funds in early trading.<br /> <br /> *'''9000, December 09, 2005''' - The Sensex on November 28, 2005 crossed the magical figure of 9000 to touch 9000.32 points during mid-session at the Bombay Stock Exchange on the back of frantic buying spree by foreign institutional investors and well supported by local operators as well as retail investors.<br /> <br /> *'''10,000, February 7, 2006''' - The Sensex on February 6, 2006 touched 10,003 points during mid-session. The Sensex finally closed above the 10K-mark on February 7, 2006.<br /> <br /> *'''11,000, March 27, 2006''' - The Sensex on March 21, 2006 crossed the magical figure of 11,000 and touched a life-time peak of 11,001 points during mid-session at the Bombay Stock Exchange for the first time. However, it was on March 27, 2006 that the Sensex first closed at over 11,000 points.<br /> <br /> *'''12,000, April 20, 2006''' - The Sensex on April 20, 2006 crossed the magical figure of 12,000 and touched a life-time peak of 12,004 points during mid-session at the Bombay Stock Exchange for the first time.<br /> <br /> *'''13,000, October 30, 2006''' - The Sensex on October 30, 2006 crossed the magical figure of 13,000 and still riding high at the Bombay Stock Exchange for the first time. It took 135 days to reach 13,000 from 12,000. And 124 days to reach 13,000 from 12,500. On 30th October 2006 it touched a peak of 13,039.36 &amp; closed at 13,024.26.<br /> <br /> <br /> On May 22, 2006, the Sensex plunged by a whopping 1100 points during intra-day trading, leading to the suspension of trading for the first time since May 17, 2004. The recent volatility of the Sensex had caused investors to lose Rs 6 lakh crore ($131 billion) in the last seven trading sessions. The Finance Minister, [[P. Chidambaram]], made an unscheduled press statement when trading was suspended to assure investors that nothing was wrong with the fundamentals of the economy, and advised retail investors to stay invested. When trading resumed after the reassurances of the [[Reserve Bank of India]] and the [[Securities and Exchange Board of India]], the Sensex managed to move up 700 points, but still 450 points in the red. This is the largest ever intra-day crash (in points terms) in the history of the Sensex.<br /> <br /> The Sensex eventually recovered from the volatility, and on [[October 16]], [[2006]], the Sensex closed at an all-time high of 12,928.18 with an intra-day high of 12,953.76. This was a result of increased confidence in the economy and reports that India's manufacturing sector grew by 11.1% in August 2006.<br /> <br /> ==External links==<br /> *[http://www.indiahowto.com/what-is-sensex-nifty.html &quot;What are the SENSEX &amp; Nifty?&quot;]<br /> <br /> * http://www.bseindia.com/about/abindices/bse30.asp<br /> <br /> [[Category:Stock market indices]]<br /> <br /> [[de:SENSEX 30]]</div> PPrakash https://en.wikipedia.org/w/index.php?title=BSE_SENSEX&diff=84636242 BSE SENSEX 2006-10-30T15:53:28Z <p>PPrakash: /* Sensex Milestones */</p> <hr /> <div>[[Image:Bombay-Stock-Exchange.jpg|250px|thumb|The Bombay Stock Exchange]]<br /> ==History==<br /> Bombay Stock Exchange Limited is the oldest stock exchange in [[Asia]] with a rich heritage. Popularly known as &quot;BSE&quot;, it was established as &quot;The Native Share &amp; Stock Brokers Association&quot; in 1875. It is the first stock exchange in the country to obtain permanent recognition in 1956 from the Government of India under the ''Securities Contracts (Regulation) Act, 1956''.The Exchange's pivotal and pre-eminent role in the development of the Indian capital market is widely recognized and its index, SENSEX, is tracked worldwide. Earlier an Association of Persons (AOP), the Exchange is now a demutualised and corporatised entity incorporated under the provisions of the Companies Act, 1956, pursuant to the BSE(Corporatisation and Demutualisation) Scheme, 2005 notified by the '''Securities and Exchange Board of India (SEBI)'''.<br /> <br /> The '''BSE Sensex''' or '''Bombay Stock Exchange Sensitive Index''' is a value-weighted index composed of over 4000 stocks with the base April [[1979]] = 100. It consists of the 30 largest and most actively traded stocks, representative of various sectors, on the Bombay Stock Exchange. These companies account for around one-fifth of the market capitalization of the [[Bombay Stock Exchange|BSE]].<br /> <br /> The base value of the Sensex is ''100'' on [[April 1]], [[1979]] and the base year of BSE-SENSEX is ''1978-79''. <br /> <br /> At irregular intervals, the Bombay Stock Exchange (BSE) authorities review and modify its composition to make sure it reflects current market conditions.<br /> <br /> The abbreviated form &quot;Sensex&quot; was coined by [[Deepak Mohoni]] around [[1990]] while writing market analysis columns for some of the business newspapers and magazines. It gained popularity over the next year or two.<br /> <br /> The stock market has grown by over ten times from June [[1990]] to today. Using information from April [[1979]] onwards, the long-run rate of return on the BSE Sensex can be estimated to be 0.52% per week (continuously compounded) with a standard deviation of 3.67%. This translates to 27% per annum, which translates to roughly 18% per annum after compensating for [[inflation]].<br /> <br /> == Sensex Milestones ==<br /> The Sensex crossed the 1,000 mark on July 25, 1990; the 2,000 mark on January 15, 1992; the 3,000 mark on February 29, 1992; the 4,000 mark on March 30, 1992; the 5,000 mark on October 11, 1999; the 6,000 mark on January 2, 2004; the 7,000 mark on June 21, 2005; the 8,000 mark on September 8, 2005; the 9,000 mark on December 09, 2005; and finally '''the historic 10,000 mark on February 7, 2006.''' It created another landmark when it touched 11,000 on March 27, 2006. The Sensex closed at a high of '''12,903 on 28 Oct 2006''' . To reach from the 11,000 mark to the 12,000 mark only took 19 working days, the shortest time interval for a 1000 points climb in BSE Sensex history, surpassing the just set record of 29 days that it took to reach 11,000 from 10,000.<br /> <br /> ''Here is a timeline on the rise and rise of the Sensex through Indian stock market history.''<br /> <br /> *'''1000, July 25, 1990''' - On July 25, 1990, the Sensex touched the magical four-digit figure for the first time and closed at 1,001 in the wake of a good monsoon and excellent corporate results.<br /> <br /> *'''2000, January 15, 1992''' - On January 15, 1992, the Sensex crossed the 2,000-mark and closed at 2,020 followed by the liberal economic policy initiatives undertaken by the then finance minister and current Prime Minister Dr Manmohan Singh.<br /> <br /> *'''3000, February 29, 1992''' - On February 29, 1992, the Sensex surged past the 3000 mark in the wake of the market-friendly Budget announced by the then Finance Minister, Dr Manmohan Singh.<br /> <br /> *'''4000, March 30, 1992''' - On March 30, 1992, the Sensex crossed the 4,000-mark and closed at 4,091 on the expectations of a liberal export-import policy. It was then that the Harshad Mehta scam hit the markets and Sensex witnessed unabated selling.<br /> <br /> *'''5000, October 11, 1999''' - On October 8, 1999, the Sensex crossed the 5,000-mark as the BJP-led coalition won the majority in the 13th Lok Sabha election.<br /> <br /> *'''6000, February 11, 2000''' - On February 11, 2000, the infotech boom helped the Sensex to cross the 6,000-mark and hit and all time high of 6,006.<br /> <br /> *'''7000, June 21, 2005''' - On June 20, 2005, the news of the settlement between the Ambani brothers boosted investor sentiments and the scrips of RIL, Reliance Energy, Reliance Capital and IPCL made huge gains. This helped the Sensex crossed 7,000 points for the first time.<br /> <br /> *'''8000, September 8, 2005''' - On September 8, 2005, the Bombay Stock Exchange's benchmark 30-share index -- the Sensex -- crossed the 8000 level following brisk buying by foreign and domestic funds in early trading.<br /> <br /> *'''9000, December 09, 2005''' - The Sensex on November 28, 2005 crossed the magical figure of 9000 to touch 9000.32 points during mid-session at the Bombay Stock Exchange on the back of frantic buying spree by foreign institutional investors and well supported by local operators as well as retail investors.<br /> <br /> *'''10,000, February 7, 2006''' - The Sensex on February 6, 2006 touched 10,003 points during mid-session. The Sensex finally closed above the 10K-mark on February 7, 2006.<br /> <br /> *'''11,000, March 27, 2006''' - The Sensex on March 21, 2006 crossed the magical figure of 11,000 and touched a life-time peak of 11,001 points during mid-session at the Bombay Stock Exchange for the first time. However, it was on March 27, 2006 that the Sensex first closed at over 11,000 points.<br /> <br /> *'''12,000, April 20, 2006''' - The Sensex on April 20, 2006 crossed the magical figure of 12,000 and touched a life-time peak of 12,004 points during mid-session at the Bombay Stock Exchange for the first time.<br /> <br /> *'''13,000, October 30, 2006''' - The Sensex on October 30, 2006 crossed the magical figure of 13,000 and still riding high at the Bombay Stock Exchange for the first time. It took 135 days to reach 13,000 from 12,000. And 124 days to reach 13,000 from 12,500.<br /> <br /> <br /> On May 22, 2006, the Sensex plunged by a whopping 1100 points during intra-day trading, leading to the suspension of trading for the first time since May 17, 2004. The recent volatility of the Sensex had caused investors to lose Rs 6 lakh crore ($131 billion) in the last seven trading sessions. The Finance Minister, [[P. Chidambaram]], made an unscheduled press statement when trading was suspended to assure investors that nothing was wrong with the fundamentals of the economy, and advised retail investors to stay invested. When trading resumed after the reassurances of the [[Reserve Bank of India]] and the [[Securities and Exchange Board of India]], the Sensex managed to move up 700 points, but still 450 points in the red. This is the largest ever intra-day crash (in points terms) in the history of the Sensex.<br /> <br /> The Sensex eventually recovered from the volatility, and on [[October 16]], [[2006]], the Sensex closed at an all-time high of 12,928.18 with an intra-day high of 12,953.76. This was a result of increased confidence in the economy and reports that India's manufacturing sector grew by 11.1% in August 2006.<br /> <br /> ==External links==<br /> *[http://www.indiahowto.com/what-is-sensex-nifty.html &quot;What are the SENSEX &amp; Nifty?&quot;]<br /> <br /> * http://www.bseindia.com/about/abindices/bse30.asp<br /> <br /> [[Category:Stock market indices]]<br /> <br /> [[de:SENSEX 30]]</div> PPrakash https://en.wikipedia.org/w/index.php?title=BSE_SENSEX&diff=84635524 BSE SENSEX 2006-10-30T15:49:19Z <p>PPrakash: /* Sensex Milestones */</p> <hr /> <div>[[Image:Bombay-Stock-Exchange.jpg|250px|thumb|The Bombay Stock Exchange]]<br /> ==History==<br /> Bombay Stock Exchange Limited is the oldest stock exchange in [[Asia]] with a rich heritage. Popularly known as &quot;BSE&quot;, it was established as &quot;The Native Share &amp; Stock Brokers Association&quot; in 1875. It is the first stock exchange in the country to obtain permanent recognition in 1956 from the Government of India under the ''Securities Contracts (Regulation) Act, 1956''.The Exchange's pivotal and pre-eminent role in the development of the Indian capital market is widely recognized and its index, SENSEX, is tracked worldwide. Earlier an Association of Persons (AOP), the Exchange is now a demutualised and corporatised entity incorporated under the provisions of the Companies Act, 1956, pursuant to the BSE(Corporatisation and Demutualisation) Scheme, 2005 notified by the '''Securities and Exchange Board of India (SEBI)'''.<br /> <br /> The '''BSE Sensex''' or '''Bombay Stock Exchange Sensitive Index''' is a value-weighted index composed of over 4000 stocks with the base April [[1979]] = 100. It consists of the 30 largest and most actively traded stocks, representative of various sectors, on the Bombay Stock Exchange. These companies account for around one-fifth of the market capitalization of the [[Bombay Stock Exchange|BSE]].<br /> <br /> The base value of the Sensex is ''100'' on [[April 1]], [[1979]] and the base year of BSE-SENSEX is ''1978-79''. <br /> <br /> At irregular intervals, the Bombay Stock Exchange (BSE) authorities review and modify its composition to make sure it reflects current market conditions.<br /> <br /> The abbreviated form &quot;Sensex&quot; was coined by [[Deepak Mohoni]] around [[1990]] while writing market analysis columns for some of the business newspapers and magazines. It gained popularity over the next year or two.<br /> <br /> The stock market has grown by over ten times from June [[1990]] to today. Using information from April [[1979]] onwards, the long-run rate of return on the BSE Sensex can be estimated to be 0.52% per week (continuously compounded) with a standard deviation of 3.67%. This translates to 27% per annum, which translates to roughly 18% per annum after compensating for [[inflation]].<br /> <br /> == Sensex Milestones ==<br /> The Sensex crossed the 1,000 mark on July 25, 1990; the 2,000 mark on January 15, 1992; the 3,000 mark on February 29, 1992; the 4,000 mark on March 30, 1992; the 5,000 mark on October 11, 1999; the 6,000 mark on January 2, 2004; the 7,000 mark on June 21, 2005; the 8,000 mark on September 8, 2005; the 9,000 mark on December 09, 2005; and finally '''the historic 10,000 mark on February 7, 2006.''' It created another landmark when it touched 11,000 on March 27, 2006. The Sensex closed at a high of '''12,903 on 28 Oct 2006''' . To reach from the 11,000 mark to the 12,000 mark only took 19 working days, the shortest time interval for a 1000 points climb in BSE Sensex history, surpassing the just set record of 29 days that it took to reach 11,000 from 10,000.<br /> <br /> ''Here is a timeline on the rise and rise of the Sensex through Indian stock market history.''<br /> <br /> *'''1000, July 25, 1990''' - On July 25, 1990, the Sensex touched the magical four-digit figure for the first time and closed at 1,001 in the wake of a good monsoon and excellent corporate results.<br /> <br /> *'''2000, January 15, 1992''' - On January 15, 1992, the Sensex crossed the 2,000-mark and closed at 2,020 followed by the liberal economic policy initiatives undertaken by the then finance minister and current Prime Minister Dr Manmohan Singh.<br /> <br /> *'''3000, February 29, 1992''' - On February 29, 1992, the Sensex surged past the 3000 mark in the wake of the market-friendly Budget announced by the then Finance Minister, Dr Manmohan Singh.<br /> <br /> *'''4000, March 30, 1992''' - On March 30, 1992, the Sensex crossed the 4,000-mark and closed at 4,091 on the expectations of a liberal export-import policy. It was then that the Harshad Mehta scam hit the markets and Sensex witnessed unabated selling.<br /> <br /> *'''5000, October 11, 1999''' - On October 8, 1999, the Sensex crossed the 5,000-mark as the BJP-led coalition won the majority in the 13th Lok Sabha election.<br /> <br /> *'''6000, February 11, 2000''' - On February 11, 2000, the infotech boom helped the Sensex to cross the 6,000-mark and hit and all time high of 6,006.<br /> <br /> *'''7000, June 21, 2005''' - On June 20, 2005, the news of the settlement between the Ambani brothers boosted investor sentiments and the scrips of RIL, Reliance Energy, Reliance Capital and IPCL made huge gains. This helped the Sensex crossed 7,000 points for the first time.<br /> <br /> *'''8000, September 8, 2005''' - On September 8, 2005, the Bombay Stock Exchange's benchmark 30-share index -- the Sensex -- crossed the 8000 level following brisk buying by foreign and domestic funds in early trading.<br /> <br /> *'''9000, December 09, 2005''' - The Sensex on November 28, 2005 crossed the magical figure of 9000 to touch 9000.32 points during mid-session at the Bombay Stock Exchange on the back of frantic buying spree by foreign institutional investors and well supported by local operators as well as retail investors.<br /> <br /> *'''10,000, February 7, 2006''' - The Sensex on February 6, 2006 touched 10,003 points during mid-session. The Sensex finally closed above the 10K-mark on February 7, 2006.<br /> <br /> *'''11,000, March 27, 2006''' - The Sensex on March 21, 2006 crossed the magical figure of 11,000 and touched a life-time peak of 11,001 points during mid-session at the Bombay Stock Exchange for the first time. However, it was on March 27, 2006 that the Sensex first closed at over 11,000 points.<br /> <br /> *'''12,000, April 20, 2006''' - The Sensex on April 20, 2006 crossed the magical figure of 12,000 and touched a life-time peak of 12,004 points during mid-session at the Bombay Stock Exchange for the first time.<br /> <br /> *'''13,000, October 30, 2006''' - The Sensex on October 30, 2006 crossed the magical figure of 13,000 and still riding high at the Bombay Stock Exchange for the first time. It took 135 days to reach 13,000 from 12,000. And 124 days to reach from 12,500 to 13,000.<br /> <br /> <br /> On May 22, 2006, the Sensex plunged by a whopping 1100 points during intra-day trading, leading to the suspension of trading for the first time since May 17, 2004. The recent volatility of the Sensex had caused investors to lose Rs 6 lakh crore ($131 billion) in the last seven trading sessions. The Finance Minister, [[P. Chidambaram]], made an unscheduled press statement when trading was suspended to assure investors that nothing was wrong with the fundamentals of the economy, and advised retail investors to stay invested. When trading resumed after the reassurances of the [[Reserve Bank of India]] and the [[Securities and Exchange Board of India]], the Sensex managed to move up 700 points, but still 450 points in the red. This is the largest ever intra-day crash (in points terms) in the history of the Sensex.<br /> <br /> The Sensex eventually recovered from the volatility, and on [[October 16]], [[2006]], the Sensex closed at an all-time high of 12,928.18 with an intra-day high of 12,953.76. This was a result of increased confidence in the economy and reports that India's manufacturing sector grew by 11.1% in August 2006.<br /> <br /> ==External links==<br /> *[http://www.indiahowto.com/what-is-sensex-nifty.html &quot;What are the SENSEX &amp; Nifty?&quot;]<br /> <br /> * http://www.bseindia.com/about/abindices/bse30.asp<br /> <br /> [[Category:Stock market indices]]<br /> <br /> [[de:SENSEX 30]]</div> PPrakash https://en.wikipedia.org/w/index.php?title=BSE_SENSEX&diff=84583895 BSE SENSEX 2006-10-30T08:21:46Z <p>PPrakash: /* Sensex Milestones */</p> <hr /> <div>[[Image:Bombay-Stock-Exchange.jpg|250px|thumb|The Bombay Stock Exchange]]<br /> ==History==<br /> Bombay Stock Exchange Limited is the oldest stock exchange in [[Asia]] with a rich heritage. Popularly known as &quot;BSE&quot;, it was established as &quot;The Native Share &amp; Stock Brokers Association&quot; in 1875. It is the first stock exchange in the country to obtain permanent recognition in 1956 from the Government of India under the ''Securities Contracts (Regulation) Act, 1956''.The Exchange's pivotal and pre-eminent role in the development of the Indian capital market is widely recognized and its index, SENSEX, is tracked worldwide. Earlier an Association of Persons (AOP), the Exchange is now a demutualised and corporatised entity incorporated under the provisions of the Companies Act, 1956, pursuant to the BSE(Corporatisation and Demutualisation) Scheme, 2005 notified by the '''Securities and Exchange Board of India (SEBI)'''.<br /> <br /> The '''BSE Sensex''' or '''Bombay Stock Exchange Sensitive Index''' is a value-weighted index composed of over 4000 stocks with the base April [[1979]] = 100. It consists of the 30 largest and most actively traded stocks, representative of various sectors, on the Bombay Stock Exchange. These companies account for around one-fifth of the market capitalization of the [[Bombay Stock Exchange|BSE]].<br /> <br /> The base value of the Sensex is ''100'' on [[April 1]], [[1979]] and the base year of BSE-SENSEX is ''1978-79''. <br /> <br /> At irregular intervals, the Bombay Stock Exchange (BSE) authorities review and modify its composition to make sure it reflects current market conditions.<br /> <br /> The abbreviated form &quot;Sensex&quot; was coined by [[Deepak Mohoni]] around [[1990]] while writing market analysis columns for some of the business newspapers and magazines. It gained popularity over the next year or two.<br /> <br /> The stock market has grown by over ten times from June [[1990]] to today. Using information from April [[1979]] onwards, the long-run rate of return on the BSE Sensex can be estimated to be 0.52% per week (continuously compounded) with a standard deviation of 3.67%. This translates to 27% per annum, which translates to roughly 18% per annum after compensating for [[inflation]].<br /> <br /> == Sensex Milestones ==<br /> The Sensex crossed the 1,000 mark on July 25, 1990; the 2,000 mark on January 15, 1992; the 3,000 mark on February 29, 1992; the 4,000 mark on March 30, 1992; the 5,000 mark on October 11, 1999; the 6,000 mark on January 2, 2004; the 7,000 mark on June 21, 2005; the 8,000 mark on September 8, 2005; the 9,000 mark on December 09, 2005; and finally '''the historic 10,000 mark on February 7, 2006.''' It created another landmark when it touched 11,000 on March 27, 2006. The Sensex closed at a high of '''12,903 on 28 Oct 2006''' . To reach from the 11,000 mark to the 12,000 mark only took 19 working days, the shortest time interval for a 1000 points climb in BSE Sensex history, surpassing the just set record of 29 days that it took to reach 11,000 from 10,000.<br /> <br /> ''Here is a timeline on the rise and rise of the Sensex through Indian stock market history.''<br /> <br /> *'''1000, July 25, 1990''' - On July 25, 1990, the Sensex touched the magical four-digit figure for the first time and closed at 1,001 in the wake of a good monsoon and excellent corporate results.<br /> <br /> *'''2000, January 15, 1992''' - On January 15, 1992, the Sensex crossed the 2,000-mark and closed at 2,020 followed by the liberal economic policy initiatives undertaken by the then finance minister and current Prime Minister Dr Manmohan Singh.<br /> <br /> *'''3000, February 29, 1992''' - On February 29, 1992, the Sensex surged past the 3000 mark in the wake of the market-friendly Budget announced by the then Finance Minister, Dr Manmohan Singh.<br /> <br /> *'''4000, March 30, 1992''' - On March 30, 1992, the Sensex crossed the 4,000-mark and closed at 4,091 on the expectations of a liberal export-import policy. It was then that the Harshad Mehta scam hit the markets and Sensex witnessed unabated selling.<br /> <br /> *'''5000, October 11, 1999''' - On October 8, 1999, the Sensex crossed the 5,000-mark as the BJP-led coalition won the majority in the 13th Lok Sabha election.<br /> <br /> *'''6000, February 11, 2000''' - On February 11, 2000, the infotech boom helped the Sensex to cross the 6,000-mark and hit and all time high of 6,006.<br /> <br /> *'''7000, June 21, 2005''' - On June 20, 2005, the news of the settlement between the Ambani brothers boosted investor sentiments and the scrips of RIL, Reliance Energy, Reliance Capital and IPCL made huge gains. This helped the Sensex crossed 7,000 points for the first time.<br /> <br /> *'''8000, September 8, 2005''' - On September 8, 2005, the Bombay Stock Exchange's benchmark 30-share index -- the Sensex -- crossed the 8000 level following brisk buying by foreign and domestic funds in early trading.<br /> <br /> *'''9000, December 09, 2005''' - The Sensex on November 28, 2005 crossed the magical figure of 9000 to touch 9000.32 points during mid-session at the Bombay Stock Exchange on the back of frantic buying spree by foreign institutional investors and well supported by local operators as well as retail investors.<br /> <br /> *'''10,000, February 7, 2006''' - The Sensex on February 6, 2006 touched 10,003 points during mid-session. The Sensex finally closed above the 10K-mark on February 7, 2006.<br /> <br /> *'''11,000, March 27, 2006''' - The Sensex on March 21, 2006 crossed the magical figure of 11,000 and touched a life-time peak of 11,001 points during mid-session at the Bombay Stock Exchange for the first time. However, it was on March 27, 2006 that the Sensex first closed at over 11,000 points.<br /> <br /> *'''12,000, April 20, 2006''' - The Sensex on April 20, 2006 crossed the magical figure of 12,000 and touched a life-time peak of 12,004 points during mid-session at the Bombay Stock Exchange for the first time.<br /> <br /> *'''13,000, October 30, 2006''' - The Sensex on October 30, 2006 crossed the magical figure of 13,000 and still riding high at the Bombay Stock Exchange for the first time.<br /> <br /> <br /> On May 22, 2006, the Sensex plunged by a whopping 1100 points during intra-day trading, leading to the suspension of trading for the first time since May 17, 2004. The recent volatility of the Sensex had caused investors to lose Rs 6 lakh crore ($131 billion) in the last seven trading sessions. The Finance Minister, [[P. Chidambaram]], made an unscheduled press statement when trading was suspended to assure investors that nothing was wrong with the fundamentals of the economy, and advised retail investors to stay invested. When trading resumed after the reassurances of the [[Reserve Bank of India]] and the [[Securities and Exchange Board of India]], the Sensex managed to move up 700 points, but still 450 points in the red. This is the largest ever intra-day crash (in points terms) in the history of the Sensex.<br /> <br /> The Sensex eventually recovered from the volatility, and on [[October 16]], [[2006]], the Sensex closed at an all-time high of 12,928.18 with an intra-day high of 12,953.76. This was a result of increased confidence in the economy and reports that India's manufacturing sector grew by 11.1% in August 2006.<br /> <br /> ==External links==<br /> *[http://www.indiahowto.com/what-is-sensex-nifty.html &quot;What are the SENSEX &amp; Nifty?&quot;]<br /> <br /> * http://www.bseindia.com/about/abindices/bse30.asp<br /> <br /> [[Category:Stock market indices]]<br /> <br /> [[de:SENSEX 30]]</div> PPrakash