Showing Older Blogger Posts First By Reversing Order

Today morning one of my friends called me to review his blog. Though he is newbie, it is an awesome blog. After that, he asked one simple question. He wants to display his oldest blog post first and the latest articles at last. He wants to know how to do it in blogger and also curious to know whether it will ruin Search Engine Ranking in future. I thought it is a simple task and must have an option in the dashboard. However, when I check blogger settings, there is no option to show older posts first. The only option I saw is changing the order of Blog archive and set  archive in a way to show last published article first. I searched in Google community and there experts say till now blogger does not added a feature to rearrange blogger posts in a way to show last published articles at first position. They also discourage webmasters to tweak the blogger code to alter this by warning them about possible issues in future. Though blogspot does not provide any option, we can arrange older published articles first by a simple trick.

How to Display Older Blog Posts First

Though the method I am suggesting is very simple, it can be boring if you want to do it for multiple posts. This is about manipulating blog post publishing date and time. If you set the publishing date of an older post with most recent date and time,  it will come automatically to the first position. You can do the same tip to all the posts and bring them to first positions. It has no effect in current SEO because your blog posts do not loose the URL structure. Now let us check how to do it.

1. For New Interface

  1. Logon to blogger account

  2. Click on Posts

    reverse article publishing order

  3. Select the post (the one whose date of publishing is going to change)
    posting editing

  4. Click Published on under Post settings and change the date
    reverse Publishing order

    Click Done button after changing the date.


2. For Older Interface
  1. Login to your blogger account

  2. Click on Edit Posts

    Change order

    Now you need to select the old article (which you need to bring to first position) and click on Edit. Now you will go to Blogger post Edit page.

  3. Click on Post options

    change date of publishing

    Here you can change the post published date and time. To bring this old article to first position, you should change existing post date with current date. After changing the post date you should click on Publish Post. Now this post will be in your blogger home page as the latest post. By this method we can reverse the order of article publishing.


Show oldest Blog Posts first in Blog Archive

If you are looking for a method to show older articles first in blog archive, you can do it very easily. To do this follow the steps below.
  1. Click on Design tab

    Reversing order

  2. Click on Blog Archive

  3. Select the check box "Show Oldest Posts First" and click on save



    Now onwards blog archive show the oldest posts first.

Popular Tutorials
  1. How to backup your Blogger Database

  2. How to Optimize Blogger Template for more traffic

  3. Setup Custom Domain Name

  4. How to Remove Date From Blogger URL

Technology Blog

Cannot Access Internet After Installing New Wireless Router

One of the common methods to extend a home or office network is to add  routers to the existing network. Modern router installation is very easy and rarely needs assistance from experts. However, some face issues with accessing Internet after adding them to the network. They were online when the PC was directly connected to the modem but disconnected from Internet after installing brand new router. This article explains the major reasons for this issue and step by step instructions to troubleshoot it. Steps are common for all manufacturers like Belkin, Linksys, D-link, Netgear etc.


Reasons To Get Disconnected After Adding Router
  1. Possible connection issues

    If you have connected devices in the right order, computers connected to the network will not face troubles to go online. You should double check the cables connecting the devices and ensure that the connection is as follows.

    • The WAN Port/Internet Port of Modem should be connected to WAN/Internet Port of Wireless Router

    • Computer should be connected to one of the LAN ports of the  Router

      To get more information about how to connect it to your network, click on the link below.
      How to Configure WiFi Device in your Network

      If you have more than one devices with DHCP server in the network, the below article may give more information for you.
      How to Connect Three Devices With DHCP Server

  2. Check the lights

    You should ensure that the power light, WAN/ Internet light, LAN light (respective of the port you are using) are on and steady. If any of these light is not on, there is a chance of loose connection. If you feel the connection is not proper, unplug the cables and reconnect.

  3. Make sure the cables are fine

    Faulty Ethernet cables can block your Internet. So you should ensure that the cables are fine.

  4. Check Configuration

    If you failed to configure the wireless router properly, it will not connect to the Internet. So you should double check the configuration with the manual from the router vendor. Most of the router vendors provide setup disc or automatic connection tools(Eg: Linksys Easy connect, configuration disc from Belkin, D-link, Netgear etc). Some of my older router configuration links are added below.



    I recommend you to go through the above documentations and verify the configuration on your router.

  5. Check USB Port

    If your modem's USB port is connected to any computer, your router will not get Internet connection from the modem. So always make sure the only device connected to modem is your router. It is very important because modem's USB port gives public IP address to the device connected to it. As a result, device connected to the LAN port of modem may not get IP address.

Some users think they are still online but having troubles with receiving emails on their PC. It is one of the confusing query comes to a technical support center of an ISP. Actually those users see webpages from cache only and any new pages will not open on browser. As a result users say they are just having troubles with receiving emails. To check this, we must ask them to do ping test. Here is the procedure to do ping test.
  1. Open Command Prompt

  2. Type ping corenetworkz.com and press enter

If they are getting valid replies from the address, that computer is online. If he is getting packet lost message, currently it is having connectivity issues.

No: Recent Posts
Wireless Network Getting Disconnected
Restart WLAN AutoConfig (WLANSVC Service) On Windows 10
restart WZC on Windows
How to Setup MTNL Broadband ADSL Modem
Setup Idea 4G on Android Phone
Delete Beneficiary Fund Transfer in HDFC Netbanking
Setup Asianet WiFi Router
Manage and Delete Wireless Filters On Windows
Wireless Router Shows Wireless Packet Drops
Setup Log Files for IP Messenger
Wireless N is backward compatible with wireless G
Remote Procedure Call (RPC)
Error 797: A Connection to the Remote Access Server was not Made
How to Reset BSNL WiFi Modem
How to Check Your Tata Photon Plus Internet Usage
Destination Net Unreachable

Steps to Deal With Malware Spreading Websites

Internet is so big and so the threat is. We cannot trust every websites are made for helping people by giving genuine information or service. There are many websites which are designed and hosted for a single purpose, spread malware products. They are infecting computers of many innocent users. As a responsible Internet user, it is your duty to join the activities of organizations against badwares and malicious websites to make sure these bad websites are blacklisted. Your information will help these organizations to create a complete list of attacking websites and publish it for general users. If you are willing to help these organization, this article will help you to make right move.

I found an Attack website, What Should I Do ?

  1. Inform Google

    The first step you should take after discovering a malware spreading website is to inform Google about this. Google is the most popular search engine and by blocking a malware spreading website in Google, you can save many users. You can inform Google by filling a simple form by yourself. Link to inform Google about malware distributing websites is:

    http://www.google.com/safebrowsing/report_badware/


  2. Stopbadware

    There are many other reputed agencies working hard to create list of bad websites (bad in the sense of malware issues) and you can inform them too. Stop Badware ( http://www.stopbadware.org/ ) is one of them and they publish public alerts about badwares. To get more details about the latest malware alerts go to the link below.

    http://www.stopbadware.org/home/alerts


    If you are suspecting a particular website as malicious, you can search Badware Website Clearinghouse to know whether it is identified as a malicious website. You can search any website here:

    http://www.stopbadware.org/home/reportsearch


  3. SiteAdvisor

    Another important tool you can use to submit the URL of an attacking website is http://www.siteadvisor.com/. McAfee SiteAdvisor is a toolbar which shows the details of websites shown in Search Results and you have the facility to report any bad websites to SiteAdvisor team. To know more details about how to use McAfee site advisor click on the link below.

    http://www.siteadvisor.com/howitworks/index.html



Ensure your website is not infected by any malicious code


If you are a webmaster, it is advised to check your website for any kind of malware infection periodically. If your website is infected with any malicious script, Security organizations will blacklist it and may loose its authority and trust. You can check virus infection on your computer by yourself. The below article will give more information about it.
http://www.corenetworkz.com/2010/09/how-to-check-virus-infection-in-my.html


You will also get notice in Google Webmaster Tools, if Google finds any malicious codes on your website.

No: Recent Posts
Broadband Hack Tricks
Network Address Translation( NAT)
What is Smurf Attack & How to Prevent it
How to Setup MTNL Broadband ADSL Modem
Setup Idea 4G on Android Phone
Delete Beneficiary Fund Transfer in HDFC Netbanking
Setup Asianet WiFi Router
Denial of Service (DOS) attacks
View & Clear Saved Username and Passwords In Mozilla Firefox
Setup Log Files for IP Messenger
Make Sure your Computer and Network are Safe and Secure
Omiga Plus Browser Infection Removal Guide
Error 797: A Connection to the Remote Access Server was not Made
How to Reset BSNL WiFi Modem
How to Check Your Tata Photon Plus Internet Usage
Destination Net Unreachable

Faster Website Loading and Proxy Features of Opera Turbo

I was not aware of the real use of Opera Turbo until today morning. Yesterday I had one issue about one of my client's website is blocked by BSNL connection. I failed to open the website in Firefox, Opera , Chrome etc. Accidentally today I enabled Opera turbo and I am happy, the blocked website is here. So thanks to Opera turbo to solve one of the problem (Though actual problem remains ) I have been facing since yesterday morning. So now I understand Opera Turbo is not just improving the speed of browsing but also act as a proxy to bypass some of ISP restrictions. According to team Opera, Opera Turbo compress web page to lower size and help to transmit more data in available bandwidth. It is like opera compress the website which are requested by the browser in Opera's server and make sure that the size of downloaded data to the computer is less than normal mode(when Opera Turbo is not enabled).In Opera website they claim Opera Turbo mode can load web pages up to five times faster than other browsers. In my case I saw a notification where the current loading speed is noted as 3X.


How to Start Opera Turbo

There is not much head aches to start Opera Turbo in your computer. In order to start Opera turbo click on the Opera Turbo icon situated at left-hand bottom corner of the Opera browser.

How to start Opera Turbo

Now you will see Turbo configuration page and you need to set as Turbo on.

Configure Opera Turbo settings

There are three Turbo modes are there. Automatic, on and off. If you set automatic mode, Opera will detect lower bandwidth and enable Turbo automatically.

Enable Turbo for slower broadband connection



Opera Turbo act as Proxy

Opera Turbo is acting like a fast proxy server by hiding my actual information from the third party websites. Here I run a test to find my IP address and location. When I checked my IP address in normal mode, they showed my actual details but it changed when I enable Turbo mode. You can see the result when I browse in Opera Turbo mode.



Turbo mode hide my IP address and location.

Technology Blog

Cannot Access A Website in BSNL Connection

I can surely say today is one of my bad days because I didn't understand the real reasons of blocking one of my client's website in my office. I could even ping this e-commerce website successfully but not able to open it on any browser (I tried Firefox, Opera, Chrome and IE). I spend hours to troubleshoot this issue without any results. I am unable to access one website via BSNL Internet connection but all other domains are fine. At first I thought it is my computer which is blocking the website and I wasted a lot of time by troubleshooting without knowing the actual reason. The error message we are getting while trying access this website via BSNL connection is "403 Forbidden -You don't have permission to access / on this server. Additionally, a 404 Not Found error was encountered while trying to use an Error Document to handle the request ". We are facing this issue only on BSNL connection and we can access the same site via Tata broadband and Reliance connection. I called some other friends who are using BSNL connection to verify it. They all have the same problem and the culprit is confirmed. I tried to access the website by typing the IP address instead of domain name without success.

What to Do If BSNL Blocks a Website

This article explains the steps I have done to fix the issue of unable to access my client's website with BSNL Internet connection.
  1. Changed the Default BSNL DNS address

    I changed the DNS address configured on my computer. Sometimes the corrupted ISP DNS server can prevent domains from opening. I changed the default DNS settings with Open DNS address. Despite all my expectations, this step failed. However, I strongly suggest you to change your default DNS details on your PC if certain domains are blocked on your computer from ISP side. Some of my previous DNS related articles are:


  2. Disabled Firewall and Antivirus

    Wrongly configured Internet Security suit can block a website on a laptop. So I disabled all security programs on my computer but the issue persists.

  3. Checked the host file

    Any wrong entries in host file can block specific domain name. I checked for any new entries in host file but failed to find any.

  4. Results of Ping and Tracert operations

    I can successfully ping the website from command prompt but tracert operation failed at first hop itself. It seems very strange for me. The screenshot is added below but I want to remove my client's website name from the picture.
    cable broadband blocks a website


    It seems BSNL modem itself is blocking the packets (from tracert test) to the specific website and that is why the website is not opening in BSNL Internet connection. Then how comes ping operation work ? I am very much confused at this point.

  5. Accessing the blocked website via Proxy Server

    Whenever I try to access this site via proxy servers, I can access the website. So it is clear that something from BSNL end is wrong and that is why I am unable to Access this site.

  6. Reset browser settings and removed all unwanted plugin

    It seems my computer is able to communicate with the website (ping test) but browsers are not. So I reset the browser settings and removed all unwanted add-on.

  7. Only BSNL is blocking this Domain

    I have double checked the issue with other ISPs (Reliance and Tata communication) and there is no issue with accessing this website.

  8. Opera Turbo enabled (Updated Tip)

    After enabling Turbo, I can access this site on Opera browser. Click here to see more details.
    Start Opera Turbo

Experience With BSNL Customer Service

I called BSNL customer service for more assistance and they agreed the issue seems to be from BSNL. They suggested me to perform following steps.
  1. Reset and Reconfigure BSNL Modem

    We reset and reconfigured the modem but the issue persists. I cannot open the site even after reconfigure the modem.
    How to Reset BSNL Modem to Factory Default Settings

  2. Bridge the BSNL modem

    MY BSNL modem is configured in PPPoE mode and we changed it to bridge mode. Though we bridged the modem, it also failed.

Since both steps failed, they gave me one of their supervisor's email address and requested to send him an email regarding this issue. Anyway I would like to add one thing, the BSNL customer care executive was very helpful and kind. Even though the issue is not fixed I would like to thank her for her efforts.

No:Recent Tutorials
Can Ping Global DNS Server IP Address But Unable To Open URL
How to Test Local Network For Connectivity Issues
3 How to Configure Idea 3G on Android Phone
PING: Transmit failed. General Failure
Solution for Destination Net Unreachable - Error
Destination host unreachable
How to Enable Disabled Adapter
Resolve Windows Automatic IP Address
Asianet Dataline Cable Broadband Modem WiFi Connectivity
How to Solve TTL Expired in Transit
Ping Request Could not Find Host
Steps to Reset Winsock On Your Computer
Important Network Commands

Check Last Facebook Login Details With Location, Browser, OS

Facebook is one of the favorite place of hackers to pick confidential information from users by Social engineering, phishing etc because of its popularity. It is our duty to ensure the safety of our social network accounts due to its importance in our real life. If some one gets access to our social networking accounts, he can ruin our total public image. One of my friend's email ID got hacked by some unknown persons and they send fake information to his business clients. We were celebrating our weekends that time but fortunately one of his friend called him and inquired more details about the email. Then only my friend understood the activities of a third person in his email account. Though we informed police about this issue we couldn't find the actual person behind the act. We strongly believe he lost his password by signed in to his email account on a computer where root kits were installed.

We find the above case immediately after the hacker send emails to my friend's clients and fortunately we did not give him enough time to change the password and other login information of my friend's email account (may be he planed to use my friend's account anonymously). So now a days I am very cautious about my email and Facebook account security and always check if there any third person accessed my Facebook account. One of the best ways to check the third person activities in Facebook is to check the last login information because he cannot delete current session information while he is logged in.


How to Check Last Facebook Login Information

To check the last Facebook login information you may login to your Facebook account and follow the steps below.

  1. Click on Accounts
    find Facebook hacker

  2. Click on Account Settings

  3. Click on Account Security
    all logon log file

  4. In Facebook Account security, you can see the last login details with browser, Operating System and location.
    last signup
If you doubt the details provided about your last Facebook login information, it is better change the password and other password reset details as soon as possible.

Technology Blog

Difference Between Static (WEP) and Dynamic (WPA) Wireless Encryption

Wireless LAN reduces the physical work needed to connect each devices in an office using Ethernet cables. All devices with WiFi feature can directly connect to the Wireless router or Access Point. WLAN is easy to setup and maintain compared to traditional LAN. However, with the introduction of WLAN, need of higher security arise. This article explains two important type of Wireless encryption; static and dynamic. WiFi works on the second layer of OSI reference model. So wireless encryption is also done at data link layer. Wireless data transfer is in the form of frames and bothy static and dynamic WiFi security works data link layer. Here we are not going in the details of data frames but we discuss the differences between both static and dynamic technologies by comparing WEP and WAP. WEP is an example of static encryption but WPA uses dynamic encryption.

Static WiFi Encryption


WEP (Wired Equivalent Privacy ) is a static Wireless Encryption to protect WiFi from intruders. Here we set encryption key on Access Point and share the network with computers who know the same key. The key remains constant and that is why this kind of wireless encryption is known as Static Wireless Encryption. Right now WEP is not secure because many weakness make it vulnerable.

Dynamic WiFi Encryption

Dynamic Wireless encryption works in a different concept where the master key is changed during time. Master key the key which is needed to communicate between Access Point and the clients. Even if a hacker captures the key, he will not be able to receive signal contentiously from Access Point since the master key will change with time. WPA (Wi-Fi Protected Access) and WPA2 are examples of this technology.

Differences

Now let us check the differences between these two technologies. Static technology uses the same wireless key to connect and communicate where Dynamic technologies use different set of keys. Now let us compare the working of Wi-Fi Protected Access and Wired Equivalent Privacy. WPA uses preshared key to establish a connection between Access Point and client. After establishing connection, WPA uses a master key generated by TKIP(Temporal Key Integrity Protocol) to communicate further and the key is constantly changed. WEP uses same key all the time. So Dynamic Wireless Encryption is more secure than Static Wireless Encryption.

Different Types of WEP Standards and Risks

WEP protocol uses different standards. WEP 128 and WEP 64 were very popular once. WEP 64 bit standard uses 10 digit hexadecimal key (0 to 9 and A to F) and WEP128 bit encryption uses stronger key. Right now these two protocols are obsolete and most of the users opt for dynamic security standards. There are so many hacking software products claim, they breached WEP protection within minutes. Right now using WEP encryption to protect a WiFi connection is not secure at all.

WPA Standards

WPA and WPA2 are two important dynamic security protocols. WPA (Wi-Fi Protected Access ) is better than Wired Equivalent Privacy. Tow different modes of WPA protocol are WPA-Personal (WPA-PSK ), WPA-Enterprise. Both standards of WPA protocol support these two modes. WPA is strong enough to protect a WiFi network from intruders unless you use Wi-Fi Protected Setup.

Popular Tutorials

  1. No Signals Found in Range

  2. Importance of WDS in Interconnecting two IEEE802.11 Networks

No: Recent Posts
Wireless Network Getting Disconnected
Restart WLAN AutoConfig (WLANSVC Service) On Windows 10
restart WZC on Windows
How to Setup MTNL Broadband ADSL Modem
Setup Idea 4G on Android Phone
Delete Beneficiary Fund Transfer in HDFC Netbanking
Setup Asianet WiFi Router
Manage and Delete Wireless Filters On Windows
Wireless Router Shows Wireless Packet Drops
Setup Log Files for IP Messenger
Wireless N is backward compatible with wireless G
Remote Procedure Call (RPC)
Error 797: A Connection to the Remote Access Server was not Made
How to Reset BSNL WiFi Modem
How to Check Your Tata Photon Plus Internet Usage
Destination Net Unreachable

Adobe Flash Player has Stopped a Potentially Unsafe Operation

Today morning I have seen one email send from the reader of CoreNetworkZ.com about informing me the presence of a potentially dangerous application running on our blog. He says whenever he visit my blog, he is getting an error message from adobe saying "Adobe Flash Player has Stopped a Potentially Unsafe Operation". I decide to check if he is correct about the infection. I opened this blog in my favorite browser Firefox without any issues. I checked again in Opera, IE and Google Chrome. Oh yes! he is right. Google Chrome shows the same alert about CoreNetworkZ and Adobe Flash Player has stopped one risky process. You can see the message displayed by Chrome about this below.
Corenetworkz

According to the window, a local application in my computer is trying to communicate with an Internet enabled location " resources.infolinks.com ". What does it mean ? Does Infolinks start hosting risky malware applications ? No, it doesn't mean that because Infolinks is a trusted online advertisement company. Infolinks is as reputed as Google AdSense and they are a genuine company. But the issue is still unresolved and I want to fix it immediately because it can ruin my blog's reputation.

I face this issue only in Google Chrome and other browsers like Firefox, Opera etc are fine with my blog. So it may be some kind of misunderstanding between adobe or Google Chrome with infolinks. While searching for an answer, it is clear that this is not an issue from Infolinks or Chrome. Macromedia Flash Player is the real source of the issue. Policy of Adobe Flash Player stops some type of communication from the content stored on a PC to prevent any malicious programs to send sensitive user data to unknown sources. Though it is their policy, a user is always free to set different policy for his computer. We can set the certain communication as trusted by changing the settings.


Prevent Adobe Flash Player from stopping the Local content communication

You can change the default security policy by clicking the Settings button on Flash Player Security warning dialog box. To view the settings button, check the picture I have listed above. By using this button you can make the Flash trust a directory and its sub directories with content in them. To read more about this, I recommend you to read the official tutorial from Adobe.
http://kb2.adobe.com/cps/093/4c093f20.html

Popular Tutorials
  1. Read Our Popular Security Articles

  2. Full Web Page Screenshot in Just One Click

  3. How to Improve The Speed Of Your Broadband Connection

Technology Blog

Advantages of Using Wireless N over Wireless G Standard

802.11g and 802.11n are two important IEEE wireless standards. G standard operates in 2.4GHz frequency with maximum 54 Mbit/s data transfer speed. Wireless N standard is an improvement over it predecessor with the help of additional antennas. This additional antennas improves the data transfer rate up to 600 Mbit/s. Another advantage of 802.11n standard over 11g standard is its capability to work in two different frequencies. It supports both 2.4GHz and 5GHz frequencies. This article explains both WiFi standards and compare the features.


Advantages of 802.11n over 802.11g

802.11n is based on Multiple Input Multiple Output antennas and have relatively higher throughput than 802.11g. 11g is working on 2.4 GHz frequency but 11n can work in 5 GHz band and2.4 GHz. This dual band working of n helps to reduce interference. It is because mostly of interference is due to devices like cordless phone or microwave oven which work at 2.4GHz frequency. If you are using these devices at your home, you can simply change the frequency mode in n router to 5GHz. So we can avoid most of the interference chances. 11g has backward compatibility with 802.11b but N standard offers Backward compatibility with 802.11a, 11b and 802.11g. Another major advantage of N standard over g is about the data transfer rate. Wireless g offers maximum 54 Mbit/s but the maximum data transfer rate of wireless n standard is 600 Mbit/s. It is possible due to the usage of Multiple Input Multiple Output(MIMO) antennas and it also helps to reduce the noise. Now let us consider the WiFi range. 11n standard offers higher range than 11g standard. Wireless n Access Point can cover almost 70 meters but wireless g has just the half of its range.


Why should we choose Wireless n over Wireless g

11n has many advantages of 11g. Some of them are listed below to help you choose between  n and g standards.

  1. Range of Wireless n Network is double the range of  g networks

  2. IEEE802.11n works in 2.4GHz and 5 GHz frequencies where IEEE802.11 g works in 2.4 GHz

  3. Data transfer speed of 11n (max 600 Mbps) is higher than that of 11g (max 54 Mbps)

  4. 11n is compatible to 11a in addition to b and g

  5. N technology has reduced amount of noise compared to its predecessors

  6. N devices can be connected to g network but the maximum data transfer speed will be 54Mbps.

Popular Guides

  1. Importance of WDS in Interconnecting two WiFi networks

  2. My Laptop is not getting WiFi signal and no Internet

No: Recent Posts
Wireless Network Getting Disconnected
Restart WLAN AutoConfig (WLANSVC Service) On Windows 10
restart WZC on Windows
How to Setup MTNL Broadband ADSL Modem
Setup Idea 4G on Android Phone
Delete Beneficiary Fund Transfer in HDFC Netbanking
Setup Asianet WiFi Router
Manage and Delete Wireless Filters On Windows
Wireless Router Shows Wireless Packet Drops
Setup Log Files for IP Messenger
Wireless N is backward compatible with wireless G
Remote Procedure Call (RPC)
Error 797: A Connection to the Remote Access Server was not Made
How to Reset BSNL WiFi Modem
How to Check Your Tata Photon Plus Internet Usage
Destination Net Unreachable

Throughput is Halved by WDS in Repeater Mode

Wireless Distributed System (WDS) is a system that makes the interconnection of Access Points by supporting wireless cascading. Before the introduction of it, there was no way to connect two Access Points with wireless. As we can see, this new technology limited the size of a WLAN. So we can say this feature helped a lot to migrate offices from using traditional Ethernet cable based LAN to IEEE802.11 networks. WDS is necessary to interconnect two wireless networks (IEEE 802.11 standard) and the working of Wireless Range Expander is based on it. This article tells the advantages and drawbacks of WDS including how throughput is halved by each retransmission.

Advantages of WDS
  1. Preserve client MAC Address in Wireless frames

  2. Wireless Cascading of two routers is possible with WDS

Wireless Distributed System enables cascading of two WiFi devices and makes WLAN easily. If one device does not support WDS, it cannot offer WiFi cascading feature. So this feature is the major player in Interconnecting two IEEE802.11 networks.

WDS works in Two modes:
  1. WiFi Bridging

  2. WiFi Repeater

Drawbacks of Wireless Distributed System
  1. Throughput will be halved

    If we use WDS in repeater mode, by every retransmission, throughput may be halved. This process is explained below.

    • PC-1 connected to Access Point 1 using Ethernet cable send data

    • Access Point 2 received the signal and send data to PC-2 connected by Ethernet cable

    • Here throughput is not halved because there is no retransmission. Here WDS doesn't act as repeater

    Now let us check another scenario where PC-1 is connected to AP1 by Ethernet cable. A WiFi laptop is connected to AP2.

    • PC-1 sends data through AP1

    • AP2 receives the signal and retransmit it to laptop with WiFi adapter

    • Laptop receives the data but throughput is halved

    Here throughput is halved because there is one retransmission. Now let us consider another scenario where both PCs are connected to respective APs via WiFi.

    • PC-1 sends data to AP1 (same throughput)

    • AP-1 retransmit data to AP-2 (half of the actual throughput)

    • AP-2 retransmit data to PC-2 (one by fourth of actual throughput)

  2. Dynamic Encryption may not work

    Another issue with Interconnecting two WiFi networks is the difficulty to implement tight security. Wireless Distribution System doers not support Dynamic Wireless Encryption. WPA and WPA2 (except WPA pre-shared key )are not supported by WDS while bridging two WiFi networks. It supports WEP only and no dynamic key exchange security encryption works with it. It really makes WiFi network by WDS less secure in the eyes of security specialists. To read more about the importance of using Dynamic Encryption over static encryption, click on the link below.
    Choosing Between WEP and WPA


Popular Articles
  1. Backward Compatibility Check of IEEE802.11 Standards

  2. Unable to Join a Connection

No: Recent Posts
Wireless Network Getting Disconnected
Restart WLAN AutoConfig (WLANSVC Service) On Windows 10
restart WZC on Windows
How to Setup MTNL Broadband ADSL Modem
Setup Idea 4G on Android Phone
Delete Beneficiary Fund Transfer in HDFC Netbanking
Setup Asianet WiFi Router
Manage and Delete Wireless Filters On Windows
Wireless Router Shows Wireless Packet Drops
Setup Log Files for IP Messenger
Wireless N is backward compatible with wireless G
Remote Procedure Call (RPC)
Error 797: A Connection to the Remote Access Server was not Made
How to Reset BSNL WiFi Modem
How to Check Your Tata Photon Plus Internet Usage
Destination Net Unreachable

Is Submitting Same Article in Multiple Article Submission Directories a Good Practice ?

Article submission is one of most popular SEO strategies to acquire backlinks to a website. Everybody have been doing this method to improve the backlink profile. However, recent changes like Panda updates, SEO experts are not so fond of this technique. The good days of getting valuable links from Article Directories are over and some even fear the links form them may hurt as well. This tutorial explains the risks associated with submitting same posts to multiple submission sites like Ezinearticles, Goarticles etc.

History
Remember the golden days where, as long as we provided high quality content, we got quality dofollow links. It was a win win situation where Google spiders and submission directory got new quality content for a backlink to our blog or website from relevant pages of a trusted domain. It was a good method to promote our websites both in terms of Search Rank position and traffic. These days no longer exist. Google Panda punished domains having duplicate and low quality content. It reduced the influence of Article Submission sites. Later with Penguin, Google punished domains who acquired links in unnatural methods. Many of of the leading sites like Ezinearticles stop providing dofollow links.


Is it Worth to Submit Articles ?

Good articles may bring so many visits to our websites by tempting users click resources links in the articles if they feel the post is so nice and want to know more.

Submitting Same article in Multiple Article Directories is not a Good Method


Though article submission is a good link building method, some people are too lazy to create new content so they submit same one in multiple submission directories to get backlinks to their websites. Will this help to improve the Search Rank of their website ? Submitting the same post many times will not improve the ranking. It is because this method just increases the number of duplicate content in Internet and Google hate it. Google is not going to give any importance to duplicate content. It may attract Panda penalty for domains which publish duplicate content. In past, when Google spiders found multiple copies of your article from different sources, they sat one source of your post as the original and marked others as duplicate content. However, right now they changed it and start giving penalty for the submission site. In addition to this, the links from those pages will be devalued by Google and block any PR flow to your website. So it is not a good practice to submit same article in multiple article submission directories for the sake of link building.


Technology Blog