SlideShare uma empresa Scribd logo
1 de 6
Web_Design_And_Development : Part I


How To Build A Hydroponics System


Given the fact that hydroponic systems are sometimes quite expensive, and very often they
can only be ordered on the Internet, many people choose to build a hydroponics systems at
home and experiment growing plants without soil. This may begin as a hobby that could
turn into a life time occupation. Building your own plant growing independent system is not
just simple, but it is also fun. Here are the basic instructions you need to follow in order to
have a system applicable to water-loving plants.

Useful steps

In oder to build a hydroponics system you need a lightproof reservoir; this can either be a
fish tank, a bin or a bucket. If it is transparent, you'll have to paint it black given the fact that
light exposure stimulates algae growth. Once you've painted the reservoir, you'll have to
draw a line or a sign of some kind to mark the maximum water level. Then you will need a
floater ' StyroFoam is ideal for such cases. The ideal reservoirs should have the same
dimensions from top to bottom so that the floater fits better. Don't place it within the tank
until you've made the holes for the net pots.

You are going to place the net pots on the floater, so, when you build a hydroponics system
you have to trace the exact shape of the pots on the StyroFoam. Use a knife or a cutter to
do so. Since air will have to enter the reservoir, don't forget to cut another little hole at one
of the end of the floaters for the air line to run inside. Also keep in mind that plants mustn't
be too close to each other.

On the contrary, you should leave enough space between them to make sure that there is
enough light for them all. Next you have to fix the air line of the pump into the tank. When
you choose the pump, consider the reservoir dimensions. Furthermore, the air line needs to
be either on the bottom of the reservoir or in the middle, in such a way so as the oxygen
bubbles would reach the plant roots.

Top tips and recommendations

When you build a hydroponics system at home there are some dos and don'ts you have to
remember. Once you've filled the reservoir with the nutrient solution, you will need to keep
constant watch over its level. Moreover, light sources are everything. If you grow your plants
indoors and use artificial light, there are special types of lamps to be used depending on the
growth period.

For instance for accelerated growth you'd need High Intensity Discharge lamps, whereas for
dense flowers High Pressure Sodium is the best solution. Should you turn hydroponics into
a full time occupation, you'll have to think of more professional solutions when you build a
hydroponics system. Good luck!
Hiring a web designer to come up with the custom solution that you need can set you back
a few thousand bucks. But you can do the whole thing yourself and make it drag and drop
simple for mere pennies with a tool like Breezy Websites. See http://breezywebsites.com
for details!


WEB_DESIGN_AND_DEVELOPMENT : End of Part I

Web_Design_And_Development : Part II



How To Build A Simple Open-Source Distributed Protocol Analyzer


This is the way that Network General (the creator of Sniffer ') has deployed Distributed
Sniffer ' since the beginning. While the product that you are using may be from another or
Open-Source vendor,( i.e. Ethereal '/ WireShark '), this process is time honored and as
such, is considered to be 'Best Practice.'

This design is meant to assure that the NIC that is listening to the Monitor is not sending
any packets itself. The Monitor Card should have no protocols bound to itself and listens in
promiscuous mode. Additionally, the PC should be as passive as possible and not phoning
home to vendors because of unnecessary software it has loaded.

One process is to take a company's standard laptop and customize it by removing anything
that is not needed to support the role of a Protocol Analyzer. Any software that is not part of
the laptops OS requirements should be un-installed. Once the laptop has been stripped
down this way, load the Open Source Protocol Analyzer of your choice and test it.

Once testing is satisfactorily completed, save an Image of the laptop to be used to generate
other Open Source Laptop Protocol Analyzers.

System Requirements:

Pentium 4 or higher.

1GB Memory or higher.

2 NICs. One of which is 100Mbs (not Gigabit) to be used as the Monitor Card. (NOTE: This
process is not appropriate for Gigabit Monitoring.)

Remote Control Software (i.e. VNC) that supports File Transfers from the laptop acting as a
Protocol Analyzer to the PC used by the Network Transaction Analyst.
Two NICs:

1st NIC ' Monitor Card ' No IP bound to the card. This card just listens in promiscuous
mode. It is the one that is attached to the Monitor Port in the Switch. This should be a 100
Mbs NIC.

2nd NIC ' Transport Card ' IP is bound (static) so that this card can be used on the Intranet
to access the remote control function of the PC. This can be Gigabit if that is all that is
available.

Other Configuration Issues:

No Management Software (SMS, Radia, etc.) enabled. No management of this device other
than remote control.

Virus Protection (only if it is considered mandatory by company policy). However, this laptop
should have no email client or any other software that will want to connect to the Internet
(with the possible exception of Time Services). A Firewall rule can always be created to
enforce its isolation from the public Internet except on approved sockets.

A Time Server should be in place to keep the various Protocol Analysis Laptops in sync.
This can be an Internet source if Company Policy permits or a local Intranet source.

The laptop should not be a member of the Company Domain. One logs into the PC itself,
locally or via remote control.
All Mirrors in switches are to be bi-directional.

Consider creating a shared folder to act as a Trace File depository. This is not required, but
can be helpful as these files can easily grow too large for many corporate email policy size
limits.

Use WinZip on the Laptop to allow compression of the large trace files to speed up transfer.



Hiring a web designer to come up with the custom solution that you need can set you back
a few thousand bucks. But you can do the whole thing yourself and make it drag and drop
simple for mere pennies with a tool like Breezy Websites. See http://breezywebsites.com
for details!


WEB_DESIGN_AND_DEVELOPMENT : End of Part II

Web_Design_And_Development : Part III


How To Build A Simple Open-Source Distributed Protocol Analyzer
This is the way that Network General (the creator of Sniffer ') has deployed Distributed
Sniffer ' since the beginning. While the product that you are using may be from another or
Open-Source vendor,( i.e. Ethereal '/ WireShark '), this process is time honored and as
such, is considered to be 'Best Practice.'

This design is meant to assure that the NIC that is listening to the Monitor is not sending
any packets itself. The Monitor Card should have no protocols bound to itself and listens in
promiscuous mode. Additionally, the PC should be as passive as possible and not phoning
home to vendors because of unnecessary software it has loaded.

One process is to take a company's standard laptop and customize it by removing anything
that is not needed to support the role of a Protocol Analyzer. Any software that is not part of
the laptops OS requirements should be un-installed. Once the laptop has been stripped
down this way, load the Open Source Protocol Analyzer of your choice and test it.

Once testing is satisfactorily completed, save an Image of the laptop to be used to generate
other Open Source Laptop Protocol Analyzers.

System Requirements:

Pentium 4 or higher.

1GB Memory or higher.

2 NICs. One of which is 100Mbs (not Gigabit) to be used as the Monitor Card. (NOTE: This
process is not appropriate for Gigabit Monitoring.)

Remote Control Software (i.e. VNC) that supports File Transfers from the laptop acting as a
Protocol Analyzer to the PC used by the Network Transaction Analyst.

Two NICs:

1st NIC ' Monitor Card ' No IP bound to the card. This card just listens in promiscuous
mode. It is the one that is attached to the Monitor Port in the Switch. This should be a 100
Mbs NIC.

2nd NIC ' Transport Card ' IP is bound (static) so that this card can be used on the Intranet
to access the remote control function of the PC. This can be Gigabit if that is all that is
available.

Other Configuration Issues:

No Management Software (SMS, Radia, etc.) enabled. No management of this device other
than remote control.

Virus Protection (only if it is considered mandatory by company policy). However, this laptop
should have no email client or any other software that will want to connect to the Internet
(with the possible exception of Time Services). A Firewall rule can always be created to
enforce its isolation from the public Internet except on approved sockets.

A Time Server should be in place to keep the various Protocol Analysis Laptops in sync.
This can be an Internet source if Company Policy permits or a local Intranet source.

The laptop should not be a member of the Company Domain. One logs into the PC itself,
locally or via remote control.
All Mirrors in switches are to be bi-directional.

Consider creating a shared folder to act as a Trace File depository. This is not required, but
can be helpful as these files can easily grow too large for many corporate email policy size
limits.

Use WinZip on the Laptop to allow compression of the large trace files to speed up transfer.



Hiring a web designer to come up with the custom solution that you need can set you back
a few thousand bucks. But you can do the whole thing yourself and make it drag and drop
simple for mere pennies with a tool like Breezy Websites. See http://breezywebsites.com
for details!


WEB_DESIGN_AND_DEVELOPMENT : End of Part III
(with the possible exception of Time Services). A Firewall rule can always be created to
enforce its isolation from the public Internet except on approved sockets.

A Time Server should be in place to keep the various Protocol Analysis Laptops in sync.
This can be an Internet source if Company Policy permits or a local Intranet source.

The laptop should not be a member of the Company Domain. One logs into the PC itself,
locally or via remote control.
All Mirrors in switches are to be bi-directional.

Consider creating a shared folder to act as a Trace File depository. This is not required, but
can be helpful as these files can easily grow too large for many corporate email policy size
limits.

Use WinZip on the Laptop to allow compression of the large trace files to speed up transfer.



Hiring a web designer to come up with the custom solution that you need can set you back
a few thousand bucks. But you can do the whole thing yourself and make it drag and drop
simple for mere pennies with a tool like Breezy Websites. See http://breezywebsites.com
for details!


WEB_DESIGN_AND_DEVELOPMENT : End of Part III

Mais conteúdo relacionado

Semelhante a Web design and_development

Networking and Computer Troubleshooting
Networking and Computer TroubleshootingNetworking and Computer Troubleshooting
Networking and Computer TroubleshootingRence Montanes
 
PPT on Weather Monitoring System-converted (1).pptx
PPT on Weather Monitoring System-converted (1).pptxPPT on Weather Monitoring System-converted (1).pptx
PPT on Weather Monitoring System-converted (1).pptxabhisheksinghcompute
 
User guide freedom gateway lite 1.0
User guide freedom gateway lite 1.0User guide freedom gateway lite 1.0
User guide freedom gateway lite 1.0Vivek Mehrotra
 
Automatic water dispenser arduino
Automatic water dispenser arduinoAutomatic water dispenser arduino
Automatic water dispenser arduinoTechno Electronics
 
Summer project- Jack Fletcher
Summer project- Jack Fletcher Summer project- Jack Fletcher
Summer project- Jack Fletcher Jack Fletcher
 
cluster research
cluster researchcluster research
cluster researchWill Dixon
 
Ethernet base divice control
Ethernet base divice controlEthernet base divice control
Ethernet base divice controlBhushan Deore
 
Presentation IOT Robot
Presentation IOT RobotPresentation IOT Robot
Presentation IOT RobotVatsal N Shah
 
Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!Kenneth Regalado
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator CareerBill Kuhl
 
Speech & Web based appliance control
Speech & Web based appliance controlSpeech & Web based appliance control
Speech & Web based appliance controlMohit Khatri
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
Network Design for a company
Network Design for a companyNetwork Design for a company
Network Design for a companyrosu555
 
EMBEDDED_SYSTEM_INTRODUCTION.pdf
EMBEDDED_SYSTEM_INTRODUCTION.pdfEMBEDDED_SYSTEM_INTRODUCTION.pdf
EMBEDDED_SYSTEM_INTRODUCTION.pdfNadiSarj2
 
Iot based garbage monitoring system
Iot based garbage monitoring systemIot based garbage monitoring system
Iot based garbage monitoring systemankitguptakishu
 
Open stack gbp final sn-4-slideshare
Open stack gbp final sn-4-slideshareOpen stack gbp final sn-4-slideshare
Open stack gbp final sn-4-slideshareSumit Naiksatam
 

Semelhante a Web design and_development (20)

Networking and Computer Troubleshooting
Networking and Computer TroubleshootingNetworking and Computer Troubleshooting
Networking and Computer Troubleshooting
 
PPT on Weather Monitoring System-converted (1).pptx
PPT on Weather Monitoring System-converted (1).pptxPPT on Weather Monitoring System-converted (1).pptx
PPT on Weather Monitoring System-converted (1).pptx
 
All in one
All in oneAll in one
All in one
 
Lanlogic IT White Paper
Lanlogic IT White PaperLanlogic IT White Paper
Lanlogic IT White Paper
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
User guide freedom gateway lite 1.0
User guide freedom gateway lite 1.0User guide freedom gateway lite 1.0
User guide freedom gateway lite 1.0
 
Automatic water dispenser arduino
Automatic water dispenser arduinoAutomatic water dispenser arduino
Automatic water dispenser arduino
 
Summer project- Jack Fletcher
Summer project- Jack Fletcher Summer project- Jack Fletcher
Summer project- Jack Fletcher
 
cluster research
cluster researchcluster research
cluster research
 
Ethernet base divice control
Ethernet base divice controlEthernet base divice control
Ethernet base divice control
 
Presentation IOT Robot
Presentation IOT RobotPresentation IOT Robot
Presentation IOT Robot
 
Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator Career
 
Speech & Web based appliance control
Speech & Web based appliance controlSpeech & Web based appliance control
Speech & Web based appliance control
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Network Design for a company
Network Design for a companyNetwork Design for a company
Network Design for a company
 
EMBEDDED_SYSTEM_INTRODUCTION.pdf
EMBEDDED_SYSTEM_INTRODUCTION.pdfEMBEDDED_SYSTEM_INTRODUCTION.pdf
EMBEDDED_SYSTEM_INTRODUCTION.pdf
 
Network Testing ques
Network Testing quesNetwork Testing ques
Network Testing ques
 
Iot based garbage monitoring system
Iot based garbage monitoring systemIot based garbage monitoring system
Iot based garbage monitoring system
 
Open stack gbp final sn-4-slideshare
Open stack gbp final sn-4-slideshareOpen stack gbp final sn-4-slideshare
Open stack gbp final sn-4-slideshare
 

Último

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Último (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Web design and_development

  • 1. Web_Design_And_Development : Part I How To Build A Hydroponics System Given the fact that hydroponic systems are sometimes quite expensive, and very often they can only be ordered on the Internet, many people choose to build a hydroponics systems at home and experiment growing plants without soil. This may begin as a hobby that could turn into a life time occupation. Building your own plant growing independent system is not just simple, but it is also fun. Here are the basic instructions you need to follow in order to have a system applicable to water-loving plants. Useful steps In oder to build a hydroponics system you need a lightproof reservoir; this can either be a fish tank, a bin or a bucket. If it is transparent, you'll have to paint it black given the fact that light exposure stimulates algae growth. Once you've painted the reservoir, you'll have to draw a line or a sign of some kind to mark the maximum water level. Then you will need a floater ' StyroFoam is ideal for such cases. The ideal reservoirs should have the same dimensions from top to bottom so that the floater fits better. Don't place it within the tank until you've made the holes for the net pots. You are going to place the net pots on the floater, so, when you build a hydroponics system you have to trace the exact shape of the pots on the StyroFoam. Use a knife or a cutter to do so. Since air will have to enter the reservoir, don't forget to cut another little hole at one of the end of the floaters for the air line to run inside. Also keep in mind that plants mustn't be too close to each other. On the contrary, you should leave enough space between them to make sure that there is enough light for them all. Next you have to fix the air line of the pump into the tank. When you choose the pump, consider the reservoir dimensions. Furthermore, the air line needs to be either on the bottom of the reservoir or in the middle, in such a way so as the oxygen bubbles would reach the plant roots. Top tips and recommendations When you build a hydroponics system at home there are some dos and don'ts you have to remember. Once you've filled the reservoir with the nutrient solution, you will need to keep constant watch over its level. Moreover, light sources are everything. If you grow your plants indoors and use artificial light, there are special types of lamps to be used depending on the growth period. For instance for accelerated growth you'd need High Intensity Discharge lamps, whereas for dense flowers High Pressure Sodium is the best solution. Should you turn hydroponics into a full time occupation, you'll have to think of more professional solutions when you build a hydroponics system. Good luck!
  • 2. Hiring a web designer to come up with the custom solution that you need can set you back a few thousand bucks. But you can do the whole thing yourself and make it drag and drop simple for mere pennies with a tool like Breezy Websites. See http://breezywebsites.com for details! WEB_DESIGN_AND_DEVELOPMENT : End of Part I Web_Design_And_Development : Part II How To Build A Simple Open-Source Distributed Protocol Analyzer This is the way that Network General (the creator of Sniffer ') has deployed Distributed Sniffer ' since the beginning. While the product that you are using may be from another or Open-Source vendor,( i.e. Ethereal '/ WireShark '), this process is time honored and as such, is considered to be 'Best Practice.' This design is meant to assure that the NIC that is listening to the Monitor is not sending any packets itself. The Monitor Card should have no protocols bound to itself and listens in promiscuous mode. Additionally, the PC should be as passive as possible and not phoning home to vendors because of unnecessary software it has loaded. One process is to take a company's standard laptop and customize it by removing anything that is not needed to support the role of a Protocol Analyzer. Any software that is not part of the laptops OS requirements should be un-installed. Once the laptop has been stripped down this way, load the Open Source Protocol Analyzer of your choice and test it. Once testing is satisfactorily completed, save an Image of the laptop to be used to generate other Open Source Laptop Protocol Analyzers. System Requirements: Pentium 4 or higher. 1GB Memory or higher. 2 NICs. One of which is 100Mbs (not Gigabit) to be used as the Monitor Card. (NOTE: This process is not appropriate for Gigabit Monitoring.) Remote Control Software (i.e. VNC) that supports File Transfers from the laptop acting as a Protocol Analyzer to the PC used by the Network Transaction Analyst.
  • 3. Two NICs: 1st NIC ' Monitor Card ' No IP bound to the card. This card just listens in promiscuous mode. It is the one that is attached to the Monitor Port in the Switch. This should be a 100 Mbs NIC. 2nd NIC ' Transport Card ' IP is bound (static) so that this card can be used on the Intranet to access the remote control function of the PC. This can be Gigabit if that is all that is available. Other Configuration Issues: No Management Software (SMS, Radia, etc.) enabled. No management of this device other than remote control. Virus Protection (only if it is considered mandatory by company policy). However, this laptop should have no email client or any other software that will want to connect to the Internet (with the possible exception of Time Services). A Firewall rule can always be created to enforce its isolation from the public Internet except on approved sockets. A Time Server should be in place to keep the various Protocol Analysis Laptops in sync. This can be an Internet source if Company Policy permits or a local Intranet source. The laptop should not be a member of the Company Domain. One logs into the PC itself, locally or via remote control. All Mirrors in switches are to be bi-directional. Consider creating a shared folder to act as a Trace File depository. This is not required, but can be helpful as these files can easily grow too large for many corporate email policy size limits. Use WinZip on the Laptop to allow compression of the large trace files to speed up transfer. Hiring a web designer to come up with the custom solution that you need can set you back a few thousand bucks. But you can do the whole thing yourself and make it drag and drop simple for mere pennies with a tool like Breezy Websites. See http://breezywebsites.com for details! WEB_DESIGN_AND_DEVELOPMENT : End of Part II Web_Design_And_Development : Part III How To Build A Simple Open-Source Distributed Protocol Analyzer
  • 4. This is the way that Network General (the creator of Sniffer ') has deployed Distributed Sniffer ' since the beginning. While the product that you are using may be from another or Open-Source vendor,( i.e. Ethereal '/ WireShark '), this process is time honored and as such, is considered to be 'Best Practice.' This design is meant to assure that the NIC that is listening to the Monitor is not sending any packets itself. The Monitor Card should have no protocols bound to itself and listens in promiscuous mode. Additionally, the PC should be as passive as possible and not phoning home to vendors because of unnecessary software it has loaded. One process is to take a company's standard laptop and customize it by removing anything that is not needed to support the role of a Protocol Analyzer. Any software that is not part of the laptops OS requirements should be un-installed. Once the laptop has been stripped down this way, load the Open Source Protocol Analyzer of your choice and test it. Once testing is satisfactorily completed, save an Image of the laptop to be used to generate other Open Source Laptop Protocol Analyzers. System Requirements: Pentium 4 or higher. 1GB Memory or higher. 2 NICs. One of which is 100Mbs (not Gigabit) to be used as the Monitor Card. (NOTE: This process is not appropriate for Gigabit Monitoring.) Remote Control Software (i.e. VNC) that supports File Transfers from the laptop acting as a Protocol Analyzer to the PC used by the Network Transaction Analyst. Two NICs: 1st NIC ' Monitor Card ' No IP bound to the card. This card just listens in promiscuous mode. It is the one that is attached to the Monitor Port in the Switch. This should be a 100 Mbs NIC. 2nd NIC ' Transport Card ' IP is bound (static) so that this card can be used on the Intranet to access the remote control function of the PC. This can be Gigabit if that is all that is available. Other Configuration Issues: No Management Software (SMS, Radia, etc.) enabled. No management of this device other than remote control. Virus Protection (only if it is considered mandatory by company policy). However, this laptop should have no email client or any other software that will want to connect to the Internet
  • 5. (with the possible exception of Time Services). A Firewall rule can always be created to enforce its isolation from the public Internet except on approved sockets. A Time Server should be in place to keep the various Protocol Analysis Laptops in sync. This can be an Internet source if Company Policy permits or a local Intranet source. The laptop should not be a member of the Company Domain. One logs into the PC itself, locally or via remote control. All Mirrors in switches are to be bi-directional. Consider creating a shared folder to act as a Trace File depository. This is not required, but can be helpful as these files can easily grow too large for many corporate email policy size limits. Use WinZip on the Laptop to allow compression of the large trace files to speed up transfer. Hiring a web designer to come up with the custom solution that you need can set you back a few thousand bucks. But you can do the whole thing yourself and make it drag and drop simple for mere pennies with a tool like Breezy Websites. See http://breezywebsites.com for details! WEB_DESIGN_AND_DEVELOPMENT : End of Part III
  • 6. (with the possible exception of Time Services). A Firewall rule can always be created to enforce its isolation from the public Internet except on approved sockets. A Time Server should be in place to keep the various Protocol Analysis Laptops in sync. This can be an Internet source if Company Policy permits or a local Intranet source. The laptop should not be a member of the Company Domain. One logs into the PC itself, locally or via remote control. All Mirrors in switches are to be bi-directional. Consider creating a shared folder to act as a Trace File depository. This is not required, but can be helpful as these files can easily grow too large for many corporate email policy size limits. Use WinZip on the Laptop to allow compression of the large trace files to speed up transfer. Hiring a web designer to come up with the custom solution that you need can set you back a few thousand bucks. But you can do the whole thing yourself and make it drag and drop simple for mere pennies with a tool like Breezy Websites. See http://breezywebsites.com for details! WEB_DESIGN_AND_DEVELOPMENT : End of Part III