Flipkart.com is a great interesting new way of buying books online in India. By offering low prices, free shipping and an intuitive interface to help you, It can give what customers’ need to search for all of their favorite books. Those buyers have always wanted for this excellent customers service as the easiest way. It can ascertain that to get the books in time and fair for prices.
www.flipkart.com shows clearly to see their books items and moreover separated by heading categories such as all the bestsellers of it and which are recently sold and so on. So customers choose according to writers or what the bestsellers books are. It can give vital information to customers to get and help what they need.
Flipart Online Bookshop provides the best possible assistance to any customers. The customer can buy the book through sign in to it’s account and it does not allow to the customers from outsides of India, even if the customer pay extra for the shipping charges, does not send books through VPP or Cash on Delivery (CoD). Every customers use the search box above to check the availability of books. If a book is marked as “Out of Stock” or not listed with this online book shop, then it is not available.
It can give completely secure and safe for the customers to use credit card. If the customer is not local she/he can use International credit card and it can accept all Master cards and Visa cards. It has made easy for everyone to view and update the customers’ account and orders any time through “My Account”. “My account is to complete and control over transactions at flipkart.
Anyway the book from flipkart.com is whether damaged, the customers can send the email to xxxx. This online shop will give refund or replacement of it for this condition within 7 days of receiving shipment. Flipkart.com won’t charge the return policy.
Our Amazing Book website, we will provide the books information. Books information include the Best seller of the weeks, Books Title, Type of Books, ISBN No, Author, and synoptic of the books. The customer can search their favorite books and author. And also the customer can search from the category. The categories include Histories, Article, Stories, and Biographies. So the customer can search easily. We will provide other information for customer. The other include how to order and about the order information (such as shipping charges,) delivery information.
The recommendation of Amazing Books Stores
The Amazing Books Store, will provide the books information. Such as the Best seller of the weeks, Books Title, Type of Books, ISBN No, Author, and synoptic of the books. The customer can search their favorite books and author. And also the customer can search from the category. The categories include Histories, Article, Stories, and Biographies. So the customer can search easily. We will provide other information for customer. The other include how to order and about the order information (such as shipping charges,) delivery information.
The method and hardware for recording new stock item
Main Types of Topologies
The following sections discuss the physical topologies used in networks and other related topics.
1. Bus Topology
a single data highway connects all the nodes.
Network nodes are tapped onto the highway via T-connections.
Nodes have equal priority and there id no requirement for a control station
The nodes need to co-operate with each other to use the bus successful and to avoid corrupting each other’s transmissions.
It two nodes try to transmit at the same time, the signal on the bus will be impossible to read.
Advantages of Bus Topology
– Easy to connect a computer or peripheral to a linear bus.
-Less cable than a star topology.
Disadvantages of Bus Topology
Entire network shuts down if there is a break in the main cable.
Terminators are required at both ends of the backbone cable.
Difficult to identify the problem if the entire network shuts down.
Not meant to be used as a stand-alone solution in a large building.
Computer attached to a central point
Connection is active
Used twisted pair cable
RJ 45 connector ,that connect directly to the NIC on the device end, and to the hub or the other end
Notes are easily added and remove from a network
Advantages Star Topology
Nodes are easily added and remove from a network
Network problems are easier to troubleshoot because suspect nodes can easily be disconnected from the hub
Disadvantages a Star Topology
Requires more cable than bus topology.
If the hub or concentrator fails, nodes attached are disabled.
3. Ring Topology
A ring consists of nodes connected in a ring through multiple point to point links, forming a physical and logical ring structure. A star ring structure consists of a physical star but a logical ring.
The most common type of cabling used in pure ring topologies is Fiber Optic Cable .
Rings are often used as the backbone of networks.
4. Mesh Topology
Multiple point to point link are used to connected multiple site
Types of Media
There are two common methods of media
Twisted Pair Cable
Fiber Optic Cable
Coaxial cable was one of the first type of cable used in data networks and LANs
Support Ethernet-type networks
Permits high data rates
Provide extra protection from electrical interference
Two types of coaxial cables are
10 base 2 (Thinnest)
Maximum distance 185 meters
Cable type RG-58
Impedance 50 ohms
10 base 5 (Thick net)
Maximum distance 500 meters
Cable type RG-8
Impedance 50 ohms
resists EMI better than twisted pair cable
supports higher bandwidth than twisted pair cable
allows for longer distances
It cannot be bent around tight radiuses
Cable is heavy, and expensive
Difficult to install
Twisted Pair Cable
Consists of a pair of shielded wires twisted together because the wires are twisted, together electrical interference is minimized.
– very high bit rates
– maximum distance 10 meters
Three types of twisted pair cables are
Unshielded Twisted Pair Cable (UTP)
Shielded Twisted Pair Cable (STP)
Screened Twisted Pair Cable (ScTP)
UTP cable category
Category 1 –for analog and digital voice(telephone),low speed data application
Category 2 –for voice , Integrated Service Digital Network (ISDN) , medium speed data up to 4 Mbps
Category 3 –high-speed data, up to 16 Mbps
Category 4 –up to 20 Mbps
Category 5 –up to 100 Mbps
Category 5e – up to 1000 Mps
Easy moves and changes
distances from the hub to the node of 100 meters
sensitive to noise
Fiber Optic Cable
Fiber optic cable consists of a light transmitting glass core surrounded by a reflective cladding layer.
Fiber optic cable feature long transmission distance and high transmission speed.
Up to 50 Mbps
Allows long distance transmission (up to 2 km)
Two types of fiber optic cable are
– Multimode and
Specifics a light signal containing more than one light ray
Light source (LEDs – light emitting diode)
Distance 2.5 to 50 km
Only one light signal
Light source (Laser Diode)
Distance 80 to 140 km
Wireless connectivity is within the area of Local Area Network (LANs) where traditional cabled systems are being enhanced, extended or even totally replaced by wireless technology in the form of Wireless LANs (WLANs) or Wireless Fidelity (WiFi) systems.
In the case of WLAN, radio waves provide the connection between the various elements of the network.
Components of Wireless LAN
Wireless Access Point (AP)
Wireless Adapter (WA)
802.11 the original wireless LAN specification , 1 or 2 Mbps data rates using FHSS OR DSSS signaling technique in the 2.4 GHz frequency range.
802.11a -provides 54 Mbps data in 5 GHz frequency range.
802.11g – provides 54 Mbps data in 2.4 GHz frequency range.
Advantage of Wireless
more flexible than cable
easier to install and alter
Disadvantage of Wireless
transmission speed is much less than cable
cost are higher than cable
less secure than cable
Can be hacked from outside the building.
Any unauthorized mobile device can act as a receiver
Among four possible topologies, the star topology is suitable topology for the Amazing site of books. Because star topology is easy to understand and installed, troubleshooting and maintaintance than others topology.
Delivery system of the Amazing online Books shop
Theft in the workplace is more common than you might realize as “Workplace theft is a huge problem. Building owners and facility managers need to equip themselves to fight office crime and protect their business with an integrated, careful approach. Find out who may be stealing from you, and how you can prevent it. Who would do this?
Theft in the workplace is a serious matter that’s on the rise for a large majority of facilities. Perpetrators may include vendors, or even thieves off the street who find office building an easy mark. Most often, we think of workplace theft as someone snatching money from a wallet or a purse. It can just as easily be an employee stealing office supplies or committing identity theft. We have to not only safeguard our property, but our information, too.
The first step to preventing office theft to hire the right people who won’t steal from you. One of the main strategies to stop the insider is performing background checks that aim to identify them before they’re hired. When you have made sure for these people on your team, the next step is figuring out how secure your building is and where potential weaknesses may be. You can reinforce or add security elements to aspects of your building that might be at risk. The basic solutions should have found out for building and workplace security.
Access control-Electronic physical security (EPS)systems offer several solutions for the safeguarding of assets and personnel from unauthorized entrants into a workplace. EPS systems can include a card, a reader, and an electronic locking device that controls the portal. Burglar alarms and radio frequency identification (RFID) tags are also included in EPS systems. Another aspect of access control includes where people are entering your building, and who is monitoring them. McConnell says “visitors should only have access through one entrance, and should be checked in by a lobby attendant or security guard, there are a number of simple and temporary bad solutions that provide visitors with badges that clearly identify them as a visitor while providing access for only a limited amount of time to limited areas.
Video systems in today’s buildings are analog (older technology) or digital, or a hybrid (where analog is being upgraded to digital), Visbal, director of research and technology at the Alexandria, VA-based Security Industry Association explains that. Many video systems incorporate video analytics that detect motion, penetration of a secured area, and objects left behind or moved. In addition to recording events, video surveillance has a psychological impact. Visible cameras and signage are effective deterrents to office crime. Forming an “office watch” group will also reinforce workplace surveillance.
You can use these tips for a safer Facility for building Owners to check the security of your facility.
*Be certain that all windows are secure.
*If doors only have a locking knob or lever, install a deadbolt for additional security.
*Lock steel bars or door barriers with high-security padlocks that have a hardened steel body and shackle to resist drill, hammers, blowtorches, and bolt cutters.
*Make sure all doors are solid. Look for sheet steel on both sides of rear and basement doors. Make sure doorframes and hinges are strong enough that they can’t be pried open.
*Good locks are the first line of defense. Use high-security locks or electronic access-control units on all doors.
*Verify that any electronic access-control unit has secure key bypass.
*Install motion-sensitive and constant outside lights.
*Check the identity of any strangers who are in your office-ask who they’re visiting, and whether you can help them that person.
Security control in warehouse or office
CCTV system enables reliable and real-time warehouse monitoring and alarm verification by security guard. It records the story between pre-and post-alarm video, which can be used as evidence or for visual verification. Equipping CCTV to keep track and strengthen the quality control of product operation is absolutely a cost-effective choice.
There could be assumed that stock inaccuracies are introduced by theft type errors that arise within the store. We analyze the problem of having theft in store by optimizing the holding cost under a service level constraint.
I would like to recommendation for electronic security for hardware, software and network requirement. I like use the Burglar alarms, radio frequency identification (RFID) tags and CCTV camera. By using these hardware, our stock inventory are more secure from theft. And also I like use the Electronic physical security (EPS)systems offer several solutions for the safeguarding of assets and personnel from unauthorized entrants into a workplace. EPS systems can include a card, a reader, and an electronic locking device that controls the portal. Because of using this system is more secure for my Amazing book online system.