Objective: To determine the peri-operative analgesic efficacy and quality of block by adding Dexm... more Objective: To determine the peri-operative analgesic efficacy and quality of block by adding Dexmedetomidine as an adjuvant to Bupivacaine for spinal anaesthesia in patients undergoing abdominal hysterectomy. Study Design: Comparative cross-sectional Study. Place and Duration of Study: Anesthesia Department, Nishtar Hospital, Multan Pakistan, Jan to Jun 2019.Methodology: A total of 100 women aged 30-65 years, who were planned for abdominal hysterectomy due to benign causes, and having ASA) status I-II were included. The patients were divided into two equal groups. In Group-B, 12.5mg of 0.5% hyperbaric diluted in 3ml normal saline was administered for induction of spinal anaesthesia. In contrast, in Group-B+D, 10µg Dexmedetomidine and 12.5mg 0.5% hyperbaric Bupivacaine diluted in 3ml normal saline were given. Time of sensory and motor block onset, total duration of the block, and analgesia were noted. Results: The mean time of sensory and motor onset was significantly lower in the Gr...
BackgroundAlzheimer's disease (AD) is a multifactorial neurological disease with neurofibrill... more BackgroundAlzheimer's disease (AD) is a multifactorial neurological disease with neurofibrillary tangles and neuritic plaques as histopathological markers. Due to this, although AD is the leading cause of dementia worldwide, clinical AD dementia cannot be certainly diagnosed until neuropathological post-mortem evaluation. Coffee has been reported to have neurologically protective factors, particularly against AD, but coffee brand and type have not been taken into consideration in previous studies. We examined the discrepancies among popular commercial and instant coffees in limiting the development and progression through Aβ1-40 and Aβ1-42 production, and hypothesized that coffee consumption, regardless of brand or type, is beneficial for stalling the progression and development of Aβ-related AD.MethodsCoffee samples from four commercial coffee brands and four instant coffees were purchased or prepared following given instructions and filtered for the study. 5, 2.5, and 1.25% co...
International Journal of Basic and Applied Sciences, 2017
Data communication is the process of exchanging information between sender and receiver. The basi... more Data communication is the process of exchanging information between sender and receiver. The basic objective of a communication system is to transmit data which is free of error. Advancement in technology has made various revolutions in data communication, with which come greater chances that the data to be sent becomes corrupted. The data is transferred from various transmission impairments and during this period various factors affect the signal, the data received at the receiver is different from the data transmitted. As digital signals exist in two states either high or low, the error occurred will change its state. In today's advance world different techniques have been made to detect and remove error in the data. The paper delivers a simple error correction and detection method which can detect and correct single, multiple and burst error simply by using XNOR and COMPLEMENT. In the proposed method key is calculated and is send as a redundant bits at the receiver different ...
JPMA. The Journal of the Pakistan Medical Association, 2017
Student selection for Undergraduate Medical Education Programmes (UGME) is a highly selective pro... more Student selection for Undergraduate Medical Education Programmes (UGME) is a highly selective process globally. Health care practice requires many attributes like communication skills, professionalism, critical thinking and problem solving in addition to cognitive abilities. This study reports the development and administration of Multiple Mini Interviews (MMI), the descriptive and psychometric properties of the MMI station scores and assesses the validity of MMI stations to ascertain if the stations measured the intended attributes. Nine attributes considered most essential for a successful health care professional were selected. A 5 point rating scale was used to rate each item on the station. The scores were then converted into percentage scores. The mean scores on each MMI station ranged from 27.4% to 80.0%. The reliability of stations using Cronbach's alpha ranged from 0.64 to 0.98. MMI can be used to make reliable and valid decisions to select students with desired non cog...
American journal of respiratory and critical care medicine, Jan 26, 2018
5. @shaz_ramji. #rsjc No mention of co-intervention that play a key role in preventing FEV1 drop ... more 5. @shaz_ramji. #rsjc No mention of co-intervention that play a key role in preventing FEV1 drop ie physiotherapy, mucus clearance technique [posted 2017 Nov 16].
American journal of respiratory and critical care medicine, Nov 13, 2017
Individuals with cystic fibrosis (CF) suffer frequent acute pulmonary exacerbations, which lead t... more Individuals with cystic fibrosis (CF) suffer frequent acute pulmonary exacerbations, which lead to decreased lung function and reduced quality of life. The goal of this study was to determine if an intervention directed toward early detection of pulmonary exacerbations using home spirometry and symptom monitoring would result in slower decline in lung function compared to controls. A multicenter randomized trial at 14 CF centers in subjects ≥14 years. The Early Intervention arm measured home spirometry and symptoms electronically twice/week. Sites were notified if a participant met criteria for an exacerbation and contacted participants to determine if treatment for acute exacerbation was required. Participants in the Usual Care arm were seen every three months and asked to contact the site if they were concerned about worsening pulmonary symptoms. The primary outcome was the 52 week change in FEV1. Secondary outcomes included time to first exacerbation and subsequent exacerbation, ...
A 58-year-old Chinese woman with well controlled type 1 diabetes mellitus presented with acute an... more A 58-year-old Chinese woman with well controlled type 1 diabetes mellitus presented with acute and progressive bilateral lower limb weakness. Investigations revealed severe hypokalaemia (1.3 mmol/L) and hypophosphataemia (<0.32 mmol/L) with rhabdomyolysis and electrocardiogram changes, without other concurrent biochemical abnormalities. Immediate intravenous and oral potassium and phosphate replacement was initiated with objective improvement in weakness with replenished electrolyte levels. Urine studies confi rmed renal potassium wasting. Further history revealed frequent dental caries, xerostomia and recent weight loss. A computerised tomography scan showed atrophy of her salivary glands and a skin lesion biopsied by her GP in the past had been histologically characterised as anetoderma. The constellation of these fi ndings and subsequent positive anti-SSA/SSB levels confi rmed her diagnosis of primary Sjögren's syndrome (PSS). PSS has a wide spectrum of renal involvement and should be a differential diagnosis when investigating interstitial nephritis and electrolyte abnormalities, particularly in patients with coexisting autoimmune conditions.
An 86-year-old Chinese female patient was brought to the emergency department by her family for p... more An 86-year-old Chinese female patient was brought to the emergency department by her family for progressive lethargy and fluctuating conscious level over the past 3 days. There was no history of fever, infective symptoms, changes in bowel habits, recent falls, or trauma. However, 1 week ago, she had been prescribed a course of trimethoprimsulfamethoxazole for a urinary tract infection by her urogynecologist.
The aim of this study was to determine the efficacy and safety of scleral buckling surgery in ret... more The aim of this study was to determine the efficacy and safety of scleral buckling surgery in retinal detachment due to retinal dialysis. This study was a prospective, interventional case series. A total of 48 eyes of 48 consecutive patients were included after obtaining informed written consent. Besides taking a thorough history, all eyes were examined by a retinal surgeon. The macula status, site, and extent of retinal dialysis and rhegmatogenous retinal detachment (RRD) were particularly noted. Proliferative vitreoretinopathy grading was done. Buckling was performed by a single surgeon. At every follow-up, visual acuity, intraocular pressure, retina status, and buckle position were noted. Any complication found was recorded. Follow-up was done for at least 6 months. SPSS version 16 was used for data analysis. We included 48 cases of RRD due to retinal dialysis. The mean ± SD age of the patients was 26.85 ± 15.1 years. The macula was detached in 85.4% of the cases, and proliferative vitreoretinopathy grade C was found in 25% of the cases. A surgical reattachment rate of 95.8% was attained after a single primary buckling procedure. Final Snellen best-corrected visual acuity of 6/18 or better was attained in 12.5% of the cases. However, 62.5% of the cases had best-corrected visual acuity in the range of 6/24 to 6/60. Subretinal hemorrhage occurred in 8.3% of cases intraoperatively after subretinal fluid drainage. We conclude that scleral buckling has a definite role in the management of RRD due to retinal dialysis.
Clinical infectious diseases : an official publication of the Infectious Diseases Society of America, 2014
Pseudomonas aeruginosa is a key respiratory pathogen in people with cystic fibrosis (CF). Due to ... more Pseudomonas aeruginosa is a key respiratory pathogen in people with cystic fibrosis (CF). Due to its association with lung disease progression, initial detection of P. aeruginosa in CF respiratory cultures usually results in antibiotic treatment with the goal of eradication. Pseudomonas aeruginosa exhibits many different phenotypes in vitro that could serve as useful prognostic markers, but the relative relationships between these phenotypes and failure to eradicate P. aeruginosa have not been well characterized. We measured 22 easily assayed in vitro phenotypes among the baseline P. aeruginosa isolates collected from 194 participants in the 18-month EPIC clinical trial, which assessed outcomes after antibiotic eradication therapy for newly identified P. aeruginosa. We then evaluated the associations between these baseline isolate phenotypes and subsequent outcomes during the trial, including failure to eradicate after antipseudomonal therapy, emergence of mucoidy, and occurrence of...
International Petroleum Technology Conference, 2008
In the past, thin reservoirs (less than 30 ft.) were considered economically unattractive due to ... more In the past, thin reservoirs (less than 30 ft.) were considered economically unattractive due to typical low production rates. The development of modern drilling and real time logging technologies have made it possible place horizontal wells by geosteering within good porosity sections of very thin reservoirs. This have been a game changer for development of thin reservoirs as it is now feasible to drill wells with sufficient reservoir contact to yield commercial oil production rates. In 2003, Saudi Aramco drilled the first Maximum Reservoir Contact (MRC) multilateral well for exploitation of thin reservoir sections. At this point in time, MRC wells completed with smart inflow control valve (ICV) completions have become the standard Saudi Armco well type for thin reservoir developments. The introduction of advanced technology has helped to reduce well placement uncertainty and increase reservoir contact by utilization of directional and deep resistivity tools for boundary detection combined with close to bit measurements from high resolution resistivity borehole imaging tools to monitor variation in formation dip. This poster would demonstrate successful placement by deep resistivity boundary detection geosteering of a very challenging multilateral MRC well drilled in an onshore carbonate field in Saudi Arabia. This well presented unique geological challenges in terms of formation dip, reservoir thickness and carbonate facies variability by virtue of its location on the flanks of a dipping anticlinal structure.
Publisher Summary This chapter explains how failover operation works on the PIX firewall. To supp... more Publisher Summary This chapter explains how failover operation works on the PIX firewall. To support high availability, the Cisco PIX firewall has the capability of dealing with firewall failures using the failover features, which provides redundancy. Failover is only supported on the high-end models of the PIX firewall. Failover can be configured either in active/standby or in active/active mode. Active/active is only available if using multiple contexts; it does not provide true load balancing, but it does enable contexts to be assigned to one of two failover groups, and load balancing and redundancy can be implemented at the failover group level. When failover is configured, it designates one firewall as primary and the other as secondary. During normal operations, the primary firewall is active and handles all the network traffic. The secondary firewall remains on standby, ready to take over the functions of the primary firewall if it fails. When the primary fails, the secondary firewall becomes active, and the primary firewall goes into the standby state. To exchange information between the two firewalls in a failover pair, a failover link needs to be established. This can either be done using a special serial cable known as the failover cable, or a designated and dedicated Ethernet link can be created between the two firewalls. In all types of environments, the PIX can be set up to operate in regular or stateful mode. By enabling stateful failover, clients can maintain their network sessions even when a switchover occurs from the active to standby.
Sniffer Pro Network Optimization and Troubleshooting Handbook, 2002
Sniffer Pro can be used to hack a network and this chapter looks at the analysis of viruses and w... more Sniffer Pro can be used to hack a network and this chapter looks at the analysis of viruses and worms, Telnet, SNMP, e-mail, and any other clear-text password protocol and its dangers. A Domain Name System (DNS) zone transfer capture is examined along with eavesdropping and replaying. It is demonstrated how the SCP can use Sniffer Pro to examine a network vulnerability in the same way an evidence technician would use a microscope to examine a crime scene. The power of this tool lies in its ability to capture and analyze data to as fine a granularity as desired. The latest threat to the internet and some of the emerging issues of concern to corporate chief security officers as well as system administrators has been covered. DNS vulnerabilities, including the topics of zone transfer reconnaissance and DNS cache poisoning have been examined. The chapter also looks at SMB signing as a means to prevent man-in-the-middle attacks.
Sniffer Pro Network Optimization and Troubleshooting Handbook, 2002
This chapter describes how to configure the Sniffer Pro to capture traffic and presents the real-... more This chapter describes how to configure the Sniffer Pro to capture traffic and presents the real-life applications of using Sniffer Pro proactively and reactively with regard to network applications. The steps to start and stop a capture with Sniffer Pro have been covered. The proper positioning of the workstation with Sniffer Pro installed is also described. The concepts of monitoring applications and application response time (ART) have also been discussed along with how Sniffer Pro monitors ART. The Sniffer Pro is broken down to see how it is customized, what each layer represents, and how to use it for troubleshooting and analysis. The Sniffer Pro Decode tab is studied in great detail to show what each pane does, how to read it, how to customize it, and what to look for while doing analysis work. Two complex problems have been sampled with how to apply all this knowledge that decides to capture, decode, and analyze possible problems with Sniffer Pro.
Sniffer Pro Network Optimization and Troubleshooting Handbook, 2002
and toolbars Sniffer Pro offers. In learning how to use this interface, the chapter focuses on th... more and toolbars Sniffer Pro offers. In learning how to use this interface, the chapter focuses on the navigation of the product. Sniffer Pro is a graphical user interface (GUI) network analyzer that includes a DHTML-based Dashboard. The Sniffer Pro Dashboard consists of gauges that display utilization and error statistics, a Detail tab that displays a tabular view with detailed statistics on network utilization, size distribution, and errors, topology-specific tabs that display tabular views with detailed statistics, and customizable graphs that show network utilization, errors, and size distribution. The Detailed Errors section provides a breakdown of the errors that are shown on the errors-per-second dial. These errors include CRCs, runts, oversizes, fragments, jabbers, alignment errors, and collisions. Sniffer Pro provides monitor applications that run in promiscuous mode to gather statistical information from the network and calculate and display these statistics in real time. The monitor applications do not require data capture. The software also provides a number of additional tools that aid in troubleshooting, such as Packet Generator, the Address Book, the ping, Trace Route, DNS lookup finger, and Who Is utilities. The Sniffer Pro Expert analyzes data in real time to find objects, symptoms, and diagnoses on the network.
The Best Damn Cisco Internetworking Book Period, 2003
Publisher Summary This chapter discusses routing, which is the processes that get traffic to its ... more Publisher Summary This chapter discusses routing, which is the processes that get traffic to its destination using network addresses such as Internet protocol (IP). Specialized intermediaries called routers make this movement of traffic from its origin to its destination possible. Routing protocols enable routers to gather and exchange the information needed to build the necessary tables containing path information to reachable destinations. This chapter explains routing protocol concepts and terminology. The chapter describes the various routing mechanisms used, including static and dynamic techniques: classless interdomain routing (CIDR), router information protocol (RIP), interior gateway routing protocol (IGRP), enhanced interior gateway routing protocol (EIGRP), open shortest path first (OSPF), intermediate system to intermediate system (IS–IS), border gateway protocol (BGP), and dial-on-demand routing (DDR). One of the most important things to for routing is planning. It must be ensured that the user understands network architecture before deploying any routing protocol. Also, the chosen routing protocol should reflect and support the network architecture.
Objective: To determine the peri-operative analgesic efficacy and quality of block by adding Dexm... more Objective: To determine the peri-operative analgesic efficacy and quality of block by adding Dexmedetomidine as an adjuvant to Bupivacaine for spinal anaesthesia in patients undergoing abdominal hysterectomy. Study Design: Comparative cross-sectional Study. Place and Duration of Study: Anesthesia Department, Nishtar Hospital, Multan Pakistan, Jan to Jun 2019.Methodology: A total of 100 women aged 30-65 years, who were planned for abdominal hysterectomy due to benign causes, and having ASA) status I-II were included. The patients were divided into two equal groups. In Group-B, 12.5mg of 0.5% hyperbaric diluted in 3ml normal saline was administered for induction of spinal anaesthesia. In contrast, in Group-B+D, 10µg Dexmedetomidine and 12.5mg 0.5% hyperbaric Bupivacaine diluted in 3ml normal saline were given. Time of sensory and motor block onset, total duration of the block, and analgesia were noted. Results: The mean time of sensory and motor onset was significantly lower in the Gr...
BackgroundAlzheimer's disease (AD) is a multifactorial neurological disease with neurofibrill... more BackgroundAlzheimer's disease (AD) is a multifactorial neurological disease with neurofibrillary tangles and neuritic plaques as histopathological markers. Due to this, although AD is the leading cause of dementia worldwide, clinical AD dementia cannot be certainly diagnosed until neuropathological post-mortem evaluation. Coffee has been reported to have neurologically protective factors, particularly against AD, but coffee brand and type have not been taken into consideration in previous studies. We examined the discrepancies among popular commercial and instant coffees in limiting the development and progression through Aβ1-40 and Aβ1-42 production, and hypothesized that coffee consumption, regardless of brand or type, is beneficial for stalling the progression and development of Aβ-related AD.MethodsCoffee samples from four commercial coffee brands and four instant coffees were purchased or prepared following given instructions and filtered for the study. 5, 2.5, and 1.25% co...
International Journal of Basic and Applied Sciences, 2017
Data communication is the process of exchanging information between sender and receiver. The basi... more Data communication is the process of exchanging information between sender and receiver. The basic objective of a communication system is to transmit data which is free of error. Advancement in technology has made various revolutions in data communication, with which come greater chances that the data to be sent becomes corrupted. The data is transferred from various transmission impairments and during this period various factors affect the signal, the data received at the receiver is different from the data transmitted. As digital signals exist in two states either high or low, the error occurred will change its state. In today's advance world different techniques have been made to detect and remove error in the data. The paper delivers a simple error correction and detection method which can detect and correct single, multiple and burst error simply by using XNOR and COMPLEMENT. In the proposed method key is calculated and is send as a redundant bits at the receiver different ...
JPMA. The Journal of the Pakistan Medical Association, 2017
Student selection for Undergraduate Medical Education Programmes (UGME) is a highly selective pro... more Student selection for Undergraduate Medical Education Programmes (UGME) is a highly selective process globally. Health care practice requires many attributes like communication skills, professionalism, critical thinking and problem solving in addition to cognitive abilities. This study reports the development and administration of Multiple Mini Interviews (MMI), the descriptive and psychometric properties of the MMI station scores and assesses the validity of MMI stations to ascertain if the stations measured the intended attributes. Nine attributes considered most essential for a successful health care professional were selected. A 5 point rating scale was used to rate each item on the station. The scores were then converted into percentage scores. The mean scores on each MMI station ranged from 27.4% to 80.0%. The reliability of stations using Cronbach's alpha ranged from 0.64 to 0.98. MMI can be used to make reliable and valid decisions to select students with desired non cog...
American journal of respiratory and critical care medicine, Jan 26, 2018
5. @shaz_ramji. #rsjc No mention of co-intervention that play a key role in preventing FEV1 drop ... more 5. @shaz_ramji. #rsjc No mention of co-intervention that play a key role in preventing FEV1 drop ie physiotherapy, mucus clearance technique [posted 2017 Nov 16].
American journal of respiratory and critical care medicine, Nov 13, 2017
Individuals with cystic fibrosis (CF) suffer frequent acute pulmonary exacerbations, which lead t... more Individuals with cystic fibrosis (CF) suffer frequent acute pulmonary exacerbations, which lead to decreased lung function and reduced quality of life. The goal of this study was to determine if an intervention directed toward early detection of pulmonary exacerbations using home spirometry and symptom monitoring would result in slower decline in lung function compared to controls. A multicenter randomized trial at 14 CF centers in subjects ≥14 years. The Early Intervention arm measured home spirometry and symptoms electronically twice/week. Sites were notified if a participant met criteria for an exacerbation and contacted participants to determine if treatment for acute exacerbation was required. Participants in the Usual Care arm were seen every three months and asked to contact the site if they were concerned about worsening pulmonary symptoms. The primary outcome was the 52 week change in FEV1. Secondary outcomes included time to first exacerbation and subsequent exacerbation, ...
A 58-year-old Chinese woman with well controlled type 1 diabetes mellitus presented with acute an... more A 58-year-old Chinese woman with well controlled type 1 diabetes mellitus presented with acute and progressive bilateral lower limb weakness. Investigations revealed severe hypokalaemia (1.3 mmol/L) and hypophosphataemia (<0.32 mmol/L) with rhabdomyolysis and electrocardiogram changes, without other concurrent biochemical abnormalities. Immediate intravenous and oral potassium and phosphate replacement was initiated with objective improvement in weakness with replenished electrolyte levels. Urine studies confi rmed renal potassium wasting. Further history revealed frequent dental caries, xerostomia and recent weight loss. A computerised tomography scan showed atrophy of her salivary glands and a skin lesion biopsied by her GP in the past had been histologically characterised as anetoderma. The constellation of these fi ndings and subsequent positive anti-SSA/SSB levels confi rmed her diagnosis of primary Sjögren's syndrome (PSS). PSS has a wide spectrum of renal involvement and should be a differential diagnosis when investigating interstitial nephritis and electrolyte abnormalities, particularly in patients with coexisting autoimmune conditions.
An 86-year-old Chinese female patient was brought to the emergency department by her family for p... more An 86-year-old Chinese female patient was brought to the emergency department by her family for progressive lethargy and fluctuating conscious level over the past 3 days. There was no history of fever, infective symptoms, changes in bowel habits, recent falls, or trauma. However, 1 week ago, she had been prescribed a course of trimethoprimsulfamethoxazole for a urinary tract infection by her urogynecologist.
The aim of this study was to determine the efficacy and safety of scleral buckling surgery in ret... more The aim of this study was to determine the efficacy and safety of scleral buckling surgery in retinal detachment due to retinal dialysis. This study was a prospective, interventional case series. A total of 48 eyes of 48 consecutive patients were included after obtaining informed written consent. Besides taking a thorough history, all eyes were examined by a retinal surgeon. The macula status, site, and extent of retinal dialysis and rhegmatogenous retinal detachment (RRD) were particularly noted. Proliferative vitreoretinopathy grading was done. Buckling was performed by a single surgeon. At every follow-up, visual acuity, intraocular pressure, retina status, and buckle position were noted. Any complication found was recorded. Follow-up was done for at least 6 months. SPSS version 16 was used for data analysis. We included 48 cases of RRD due to retinal dialysis. The mean ± SD age of the patients was 26.85 ± 15.1 years. The macula was detached in 85.4% of the cases, and proliferative vitreoretinopathy grade C was found in 25% of the cases. A surgical reattachment rate of 95.8% was attained after a single primary buckling procedure. Final Snellen best-corrected visual acuity of 6/18 or better was attained in 12.5% of the cases. However, 62.5% of the cases had best-corrected visual acuity in the range of 6/24 to 6/60. Subretinal hemorrhage occurred in 8.3% of cases intraoperatively after subretinal fluid drainage. We conclude that scleral buckling has a definite role in the management of RRD due to retinal dialysis.
Clinical infectious diseases : an official publication of the Infectious Diseases Society of America, 2014
Pseudomonas aeruginosa is a key respiratory pathogen in people with cystic fibrosis (CF). Due to ... more Pseudomonas aeruginosa is a key respiratory pathogen in people with cystic fibrosis (CF). Due to its association with lung disease progression, initial detection of P. aeruginosa in CF respiratory cultures usually results in antibiotic treatment with the goal of eradication. Pseudomonas aeruginosa exhibits many different phenotypes in vitro that could serve as useful prognostic markers, but the relative relationships between these phenotypes and failure to eradicate P. aeruginosa have not been well characterized. We measured 22 easily assayed in vitro phenotypes among the baseline P. aeruginosa isolates collected from 194 participants in the 18-month EPIC clinical trial, which assessed outcomes after antibiotic eradication therapy for newly identified P. aeruginosa. We then evaluated the associations between these baseline isolate phenotypes and subsequent outcomes during the trial, including failure to eradicate after antipseudomonal therapy, emergence of mucoidy, and occurrence of...
International Petroleum Technology Conference, 2008
In the past, thin reservoirs (less than 30 ft.) were considered economically unattractive due to ... more In the past, thin reservoirs (less than 30 ft.) were considered economically unattractive due to typical low production rates. The development of modern drilling and real time logging technologies have made it possible place horizontal wells by geosteering within good porosity sections of very thin reservoirs. This have been a game changer for development of thin reservoirs as it is now feasible to drill wells with sufficient reservoir contact to yield commercial oil production rates. In 2003, Saudi Aramco drilled the first Maximum Reservoir Contact (MRC) multilateral well for exploitation of thin reservoir sections. At this point in time, MRC wells completed with smart inflow control valve (ICV) completions have become the standard Saudi Armco well type for thin reservoir developments. The introduction of advanced technology has helped to reduce well placement uncertainty and increase reservoir contact by utilization of directional and deep resistivity tools for boundary detection combined with close to bit measurements from high resolution resistivity borehole imaging tools to monitor variation in formation dip. This poster would demonstrate successful placement by deep resistivity boundary detection geosteering of a very challenging multilateral MRC well drilled in an onshore carbonate field in Saudi Arabia. This well presented unique geological challenges in terms of formation dip, reservoir thickness and carbonate facies variability by virtue of its location on the flanks of a dipping anticlinal structure.
Publisher Summary This chapter explains how failover operation works on the PIX firewall. To supp... more Publisher Summary This chapter explains how failover operation works on the PIX firewall. To support high availability, the Cisco PIX firewall has the capability of dealing with firewall failures using the failover features, which provides redundancy. Failover is only supported on the high-end models of the PIX firewall. Failover can be configured either in active/standby or in active/active mode. Active/active is only available if using multiple contexts; it does not provide true load balancing, but it does enable contexts to be assigned to one of two failover groups, and load balancing and redundancy can be implemented at the failover group level. When failover is configured, it designates one firewall as primary and the other as secondary. During normal operations, the primary firewall is active and handles all the network traffic. The secondary firewall remains on standby, ready to take over the functions of the primary firewall if it fails. When the primary fails, the secondary firewall becomes active, and the primary firewall goes into the standby state. To exchange information between the two firewalls in a failover pair, a failover link needs to be established. This can either be done using a special serial cable known as the failover cable, or a designated and dedicated Ethernet link can be created between the two firewalls. In all types of environments, the PIX can be set up to operate in regular or stateful mode. By enabling stateful failover, clients can maintain their network sessions even when a switchover occurs from the active to standby.
Sniffer Pro Network Optimization and Troubleshooting Handbook, 2002
Sniffer Pro can be used to hack a network and this chapter looks at the analysis of viruses and w... more Sniffer Pro can be used to hack a network and this chapter looks at the analysis of viruses and worms, Telnet, SNMP, e-mail, and any other clear-text password protocol and its dangers. A Domain Name System (DNS) zone transfer capture is examined along with eavesdropping and replaying. It is demonstrated how the SCP can use Sniffer Pro to examine a network vulnerability in the same way an evidence technician would use a microscope to examine a crime scene. The power of this tool lies in its ability to capture and analyze data to as fine a granularity as desired. The latest threat to the internet and some of the emerging issues of concern to corporate chief security officers as well as system administrators has been covered. DNS vulnerabilities, including the topics of zone transfer reconnaissance and DNS cache poisoning have been examined. The chapter also looks at SMB signing as a means to prevent man-in-the-middle attacks.
Sniffer Pro Network Optimization and Troubleshooting Handbook, 2002
This chapter describes how to configure the Sniffer Pro to capture traffic and presents the real-... more This chapter describes how to configure the Sniffer Pro to capture traffic and presents the real-life applications of using Sniffer Pro proactively and reactively with regard to network applications. The steps to start and stop a capture with Sniffer Pro have been covered. The proper positioning of the workstation with Sniffer Pro installed is also described. The concepts of monitoring applications and application response time (ART) have also been discussed along with how Sniffer Pro monitors ART. The Sniffer Pro is broken down to see how it is customized, what each layer represents, and how to use it for troubleshooting and analysis. The Sniffer Pro Decode tab is studied in great detail to show what each pane does, how to read it, how to customize it, and what to look for while doing analysis work. Two complex problems have been sampled with how to apply all this knowledge that decides to capture, decode, and analyze possible problems with Sniffer Pro.
Sniffer Pro Network Optimization and Troubleshooting Handbook, 2002
and toolbars Sniffer Pro offers. In learning how to use this interface, the chapter focuses on th... more and toolbars Sniffer Pro offers. In learning how to use this interface, the chapter focuses on the navigation of the product. Sniffer Pro is a graphical user interface (GUI) network analyzer that includes a DHTML-based Dashboard. The Sniffer Pro Dashboard consists of gauges that display utilization and error statistics, a Detail tab that displays a tabular view with detailed statistics on network utilization, size distribution, and errors, topology-specific tabs that display tabular views with detailed statistics, and customizable graphs that show network utilization, errors, and size distribution. The Detailed Errors section provides a breakdown of the errors that are shown on the errors-per-second dial. These errors include CRCs, runts, oversizes, fragments, jabbers, alignment errors, and collisions. Sniffer Pro provides monitor applications that run in promiscuous mode to gather statistical information from the network and calculate and display these statistics in real time. The monitor applications do not require data capture. The software also provides a number of additional tools that aid in troubleshooting, such as Packet Generator, the Address Book, the ping, Trace Route, DNS lookup finger, and Who Is utilities. The Sniffer Pro Expert analyzes data in real time to find objects, symptoms, and diagnoses on the network.
The Best Damn Cisco Internetworking Book Period, 2003
Publisher Summary This chapter discusses routing, which is the processes that get traffic to its ... more Publisher Summary This chapter discusses routing, which is the processes that get traffic to its destination using network addresses such as Internet protocol (IP). Specialized intermediaries called routers make this movement of traffic from its origin to its destination possible. Routing protocols enable routers to gather and exchange the information needed to build the necessary tables containing path information to reachable destinations. This chapter explains routing protocol concepts and terminology. The chapter describes the various routing mechanisms used, including static and dynamic techniques: classless interdomain routing (CIDR), router information protocol (RIP), interior gateway routing protocol (IGRP), enhanced interior gateway routing protocol (EIGRP), open shortest path first (OSPF), intermediate system to intermediate system (IS–IS), border gateway protocol (BGP), and dial-on-demand routing (DDR). One of the most important things to for routing is planning. It must be ensured that the user understands network architecture before deploying any routing protocol. Also, the chosen routing protocol should reflect and support the network architecture.
Uploads
Papers by Umer Khan