Showing posts with label Tech. Show all posts
Showing posts with label Tech. Show all posts

Sunday, November 13, 2016

Planning and Building a Home Network for the Video Gamer

Creating a Gamer-Oriented Home Network
A Network Tech Series Feature (Chapter 1)

by CM Boots-Faubert

The realm of computers and network tech today is so far advanced and so well integrated into the modern home that the vocabulary of the average person includes words like firewall, gateway, router, and phrases like cloud computing, content curation, MAC Address, and virtual private network.

Shorthand like DNS, HTTP, ICMP, IP, IPv4, IPv6, ISP, LAN, NAT, TCP, UDP, URL, WAN and WiFi won't present the tech-savvy engineer a challenge, but today they are well-embedded into the vocabulary of waitresses, auto mechanics, and even the local parish priest but especially youngsters and college-aged students. Which is why when Uncle Ralph and Aunt Molly have a problem with their home network they tend to turn to a nephew or grandchild first before seeking professional help.

These words, phrases, and shorthand have basically crept into the everyday vocabulary of non-technical people, this is true, but unlike said engineer, their interests in the underlying meanings pretty much terminates at the point where they cease to be useful in their life.

So while they know what the words, phrases, and shorthand mean, often the relationships that exist between them are simply beyond their need to know, so they don't know them.

There are logical reasons behind that expansion in vocabulary, and the broader technical understanding of the average person - reasons that can easily be traced to the evolution of technology, and specifically computer and network technology - in the modern home.

Consider this: the presence of a wireless computer network in the average home today is so expected and unremarkable that the lack of such a service is more remarkable than its presence.

When your daughter has her friends over on the weekend for a slumber party -- which by-the-way they don't actually call a slumber party anymore - they call it a LAN Party -- and the first question that the gaggle of tween guests in your home are likely to ask is “what's the WiFi password?” as they pull out their iPads, laptops, and smartphones.

That circumstances that create this scenario - a scenario that unfolds in the world a lot these days - did not happen overnight. Or in a vacuum. In fact we can easily track the various circumstances and events that lead up to it.

The Evolution of the Home Network
In 1990 two events occurred that helped to set in motion a movement that would eventually lead to the Internet in its modern form. The first was the death of ARPANET, which died not because it needed to, but because in 1985 the directors of the National Science Foundation arrived at the conclusion that, if they were going to obtain the level of network and data services that they required, they would have to create it themselves.

After years of argument, the board of directors of the National Science Foundati on proceeded to do just that, authorizing the establishment of a new network in 1986 first by linking creating a very large telecommunications network (called “The Backbone”) through which they connected six strategic member networks - five of which happened to host Supercomputer Centers.

These were - starting from East and heading West - (1) The John von Neumann Supercomputer Center at Princeton University, (2) The Cornell Theory Center at Cornell University, (3) The Pittsburgh Supercomputing Center (PSC) of Carnegie Mellon University and the University of Pittsburgh, and Westinghouse Corporation, (4) The National Center for Supercomputing Applications (NCSA) at the University of Illinois Urbana-Champaign, (5) National Center for Atmospheric Research (NCAR), and (2) The San Diego Supercomputer Center (SDSC) at the University of California, San Diego (UCSD).

The establishment of this new network - which they named NSFNet - resulted in the first high-speed national network to be created without direct input from DARPA - using a series of six backbone sites that were interconnected via leased 56kb/s dedicated always-connected lines.

That may not sound all that fast now, but back in 1986 the best that the average user could hope for in terms of connectivity was a 9600 baud modem connecting via a POT - Plain Old Telephone - single pair of copper wires - or what is otherwise known as a phone line.

Using the V.32 standard for full-duplex connections that were capable of 9600 bit/s at 2400 baud, V.32 modems theoretically allowed for connection and transfer speeds at up to 9.6 Kbps - a figure that probably means nothing to you. Yet.

Here are some numbers that will mean something to you: that 9.6Kbps actually translates to 4.32 MB/hr - or 103 MB/day. Now compare that to the typical modern high-speed Internet connection of around 9MBs -- which translates to around 72 Mbps, or 540 MB / min which totals 32.4 GB/hr or 777 GB per day.

So roughly translated, our ideal net user in 1986 would require roughly five-and-a-half days to transfer 1 minute of modern data rates. If they were connected to that seemingly snail's pace backbone of the original NSFNet, they'd only need around three-hours-twenty-minutes or so which is way better - WAY better - than five days! So yeah, it's not super fast but, at the time, it was.

The new NSFNet rapidly attracted partner networks, with the Canadian National Network connecting almost immediately after its creation, and hundreds of other networks of all sizes joining it over the course of the following two years, at which point the original Backbone failed to maintain the required speeds to service what had become a Global Network - or Internet.

After NSFNET began to accept foreign networks for permanent connection membership, by 1990 the new Global Internet was official the decision was made to upgrade the Backbone - which they did to the tune of a T-1 Connection between each of the Primary Nodes (A T-1 Connection is 1.5 Mbps). To help reduce stress on the Backbone NSFNet was divided into Regional Networks so that, for example, a user in London who requested a page or program that was stored on a UK system, their request would not travel across the main Backbone but used only the Regional Net.

Eventually the Backbone was again upgraded - this time to a T-3 Connection (45 Mb/s) shortly after issuing the license for paid (ISP-based) access to the network - but now we are getting ahead of the story here.


The World is On Fire
The second major event in The Year That Changed Everything (1990) was a small company in Massachusetts called Software Tool & Die (AKA The World) connecting THEIR network to NSFNET.

The World was the first Commercial Internet Service Provider (ISP) and provided anyone willing to pay for an account access to the Internet. The shitstorm that followed from government agencies and universities eventually forced the NSF to grant provisional permission and license to The World to offer ISP services, and within a year that license was extended to ISPs all over the country and, eventually, the world itself. The modern Commercial Internet was born.

As regular people began to use the Internet, larger Value-Added networks like CompuServe and AOL also turned their attention to it, and Internet Access very quickly became a thing that forward-looking real estate companies added to their buildings in places like New York, Boston, and Los Angeles to attract what they thought of as upwardly mobile and thus desirable tenants.

The typical apartment lease form featured a comprehensive Utilities Section, which in 1990 and before, included specifications on who was responsible for electricity, water, and gas services, and reasonable limitations when the landlord or building owner provided some or all of those services.

In 1995 those forms began to include something called an Internet Access Lease Addendum -- a clause that spelled out both access terms for tenants and any use restrictions placed upon the building's 'Net Connection -- like upload and download limits, or using the residential connection for commercial purposes.

These additions to the average lease agreement spelled out the various technical details - whether the building network included a proxy web server, what sort of firewall was used, and what steps the residents needed to take to register their device(s) with the Internet Service Coordinator for the building.

By 2010 the Internet Access Lease Addendum was fully integrated into the Utilities Section in most markets, but thanks to the always-evolving computer threats the average tenant often refused to rely upon whatever firewall protections the building implemented, choosing instead to purchase their own WiFi Firewall Router that they registered with the building coordinator as the “computer” for their apartment.

In response to this new demand, hardware manufacturers all over the world began to design and manufacture a plethora of new devices that in addition to offering an ever-evolving level of firewall protections, NAT services, and DHCP, also included slots to install hard drives for their Network-Accessible automatic backup software. They even started to make Internet-Connected refrigerators - so yeah, you can easily lay responsibility for The Internet of Things on the The Year That Changed Everything.

To put this in perspective for you, there is a high-rise building in New York City that has fully integrated the Internet into their infrastructure. In each of the flats is a dedicated screen by their entry doors that, in addition to displaying an image of who is standing outside the door in the hall, offers menus that display information on a variety of building conditions.

At the tap of the screen tenants can learn the current temperature at street-level, the air and water temperature for the building pool and hot tubs, whether the sauna is turned on and, if so, its current temp, and they can call up a view of their assigned parking spot in case they want to check on their car.

The interface allows them to summon the concierge, send a text to the doorman or the deskman, and even order groceries from a limited menu of necessaries - milk, bread, bottled water, that sort of thing - provided by a nearby store that offers delivered services to the building.

Using the building's wireless Ethernet service they also have access to a Wiki Server that offers the current calendar of co-op events, as well as a number of maintenance services.

Despite all of that convenience at their fingertips, to maintain fair and impartial network access and speeds, these internal networks often limit residents to one or two Internet-connected devices, and also had limits to data use and access to certain ports or services.

To address those restrictions, the more tech-savvy residents either created their own private networks or hire someone to do it for them. These non-routed 10.10 or 192.168 private networks hid behind the officially registered IP address of their NAT-capable firewall-router, so that from the building network side - or LAN - it appeared that there was only one device, while LAN and WAN access was available to all of the devices on their private network.

Enter the Gamer
That sort of solution works great for the average user whose needs were restricted to email, web surfing, and streaming music or video via services like Netflix and Hulu, or providing their kids with a connection for their iPads and smartphones, it did not work very well for gamers who often found that the network services provided by their building or co-op tended to feature restrictions on large data transfers and the existence of Open Network Address Translation.

The typical video game - whether a console or PC game - often has an aggressive patching and updating model, and most of the games that included online multi-player required open-NAT in order to channel their services via specific ports from their servers to specific ports on the client end.

In most commercial settings those services were intentionally blocked for the protection of their clients, and bandwidth limitations were often applied to any user who exceeded the monthly allotment, which averages between 10 and 20 GB per month.

Basically gamers found that access to desirable services and games -- including a plethora of online multi-player games as well as MMORPGs -- was severely restricted or simply blocked. They also found that the typical game updates and patches could easily eat up their bandwidth allotment with updates to just four or five titles. For example the most recent patch to Tom Clancy's The Division totaled 5.39 GB - so you do the math.

The nature of network services is such that there really is no work-around in this case, which is why most gamers who live in net-connected buildings still tend to contract their own personal net connection from the local ISP - which in recent years pretty much means either a Cable TV modem or high-speed Internet services from the Telephone Company.

In some areas, if the network owner was fortunate enough to obtain cellular Internet services when the wireless phone companies were offering unlimited all-you-can-eat contracts for a set price, you'll see gamers whose firewall router terminates in a cellphone, but that's uncommon today.

The reason that this class of netzien chooses to go their own way in terms of net access is down to their need for open-NAT, the ability to assign specific ports to specific IP Addresses inside their network, either directly or passing through a virtual DMZ, and the need to download huge amounts of data in the form of games, game patches, and updates.

Whether or not the gamer lives in a Net-connected apartment or a house in the middle of the boondocks, the basic needs for creating a network are the same - which is where we begin in this article in our Network Tech Series.

Part I - Planning Your Gamer-Oriented Computer Network

The sexy part of building a computer network is when you sit down to pick your hardware. That's when the typical gamer gets to shine a light on their tech-savvy chops, and maybe brag a little on their choices for hardware infrastructure.

You may be interested to know that despite the fact that it is sexy, the process of creating a new computer network - whether it is a standard data or a gamer's network - does not begin with picking hardware.

It properly starts with the actual network design, which is a process that usually takes place on paper, and covers a number of crucial elements including the three most important decisions that must be made. Of course that presumes that the gamer is following standards of network design.

We've seen more than a few networks that we can only describe as Frankenstein Networks - examples where the gamer started with a net connection in their living room that consisted of a Cable Modem and Router with or without a firewall, to which many things were added piecemeal over time until it turns into a disaster.


A Sample Frankenstein Network
The results of that are what we jokingly refer to as a Distributed Network. An example of this is the network that belonged to a friend who asked us to help them fix their Frankenstein Network. The problem with that is that fixing is not really the best approach. The best approach is to throw it all out and start by designing a proper network, making use of anything that is already present that you can make use of.

To help you understand this let's take a look at the network in question.

What we found when we came to survey it was this: the WAN connection was (A) a cable modem in the master bedroom, which was connected to (B) an older firewall router with four ports and no WiFi. To get WiFi they ran a 60' Cat-5 cable to the other side of the house, where they plugged that into (C) a LinkSys WiFi Router.

There were four client systems in the house - (D) a PC in the living room that was connected to the WiFi router by Cat-5 cable, (E & F ) laptops in the two bedrooms belonging to their kids which connect to the network via WiFi, and (G) a PC in the master bedroom connecting to the firewall router by Cat-5 cable.

There were also some game consoles - three in the living room - but there were only three ports left open on the WiFi Router, so they had purchased an (H) 8-port Ethernet Hub and plugged that into the WiFi Router, plugging their (I) Xbox 360, (J) PlayStation 3, and (K) Wii into the hub. Later they added an (L) Xbox One and (M) PS4 to it.

When they got into playing a specific game a few years ago they ended up building their own (N) game server which, because there was no room elsewhere, they placed in their garage, and connected it to the network by running another 60' Cat-5 cable through the attic to the master bedroom, which was plugged into the firewall router.

At some point they had an almost break-in at their house, so they bought an (O) IP Security Camera System, which they ended up sticking in the garage, buying a surplus (P) 10bT Ethernet Switch which they placed in the garage and plugged the game server and IP Camera server into. They then placed the (Q/R/S/T) four cameras that it came with at various locations outside and inside their home, with one connected to the hub in the living room, one connected to the last available port in the firewall and the other two connected to (U) an Ethernet hub that they placed in the attic, and connected to the living room hub.

It was a mess, but it got the job done (sort of). It did have a number of problems, not the least being lots of collisions and, due to one of the cables getting crushed, some cross-talk on that link. They had no way to know that though, because none of the hardware that they were using was managed hardware so it was incapable of telling them a problem existed.

So let's begin with an inventory of the network...
  • A Black Box Cable Modem provided by the Cable Company (10bT)
  • Netgear RP 114 “Web Safe” Router (10bT / 100bT)
  • Linksys WRT54G WiFi Router (10bT / 100bT)
  • 3Com Unmanaged Switch (10bT)
  • Generic 16-Port Ethernet Hub (10bT / 100bT)
  • Game Server PC (10bT / 100bT / 1000bT)
  • Security Camera Appliance (10bT / 100bT)
  • Security Cameras (x4) (10bT / 100bT)
Network Clients
  • PC A (10bT / 100bT)
  • PC B (10bT)
  • Laptop A (10bT / 100bT / 1000bT)
  • Laptop B (10bT / 100bT / 1000bT)
  • Nintendo Wii (802.11 b/g WiFi)
  • PlayStation 3 (10bT / 100bT / 1000bT)
  • PlayStation 4 (10bT / 100bT / 1000bT)
  • Xbox 360 (10bT / 100bT)
  • Xbox One (10bT / 100bT / 1000bT)
The three major issues that we identified beyond the mess that the physical network represented are:

(1) Divergent Ethernet Speeds
(2) Ancient Hardware
(3) Lack of reporting capability

Our Hardware Recommendations
This is a useful teaching experience for you - because it demonstrates the decision making process as it applies to network design.

The very first step in this process after the inventory was creating a network plan. That meant drawing a layout of the physical structure, and then determining the best place to start the network from. In this case, and because of other issues that the network owner had - and their desire to go in a commercial direction in terms of its format (they had already purchased a rack at the Flea), the direction the plan took was dictated by some of those issues.

Considering that almost all of the network hardware on their network was ancient, it shouldn't be a surprise that we recommended replacing it all - including the cabling. Fortunately for them, I have the tools and the know-how to custom create Ethernet Cable and a box of Cat-6 cable in my basement, so that eliminates what can be a significant expense.

We also live near Boston, Massachusetts, which means that we have access to the MIT Flea Market - an electronics, radio, computer, and networking flea market that runs from April to October one Sunday each month. The deals that you can get at the MIT Flea include relatively modern hardware for dirt cheap dollars, so when you know what you are looking for, you can find some awesome kit at rock-bottom prices!

Using the layout of their house we created a network map for them, which first centralized the network services in one manageable location (the garage) and offered the capability of not only monitoring the network for problems, but also made regular maintenance easier because instead of using the cable modem provided by the cable service provider - which they did not have access to - replacing it with their own model gave them interface access, which is necessary if you need to troubleshoot a problem.

The server rack that they had purchased at the flea prior to consulting me turned out to be a heck of a deal. They somehow bought an APC 42U Netshelter Rack for $100 - this is a rack that sells new for ten times that amount. Unfortunately it was just the primary rack, and lacked the back and front door/enclosures. But we were able to track down some used at the very next flea.

The reason that we needed the enclosures was because they wanted to go with a rack-mounted server capable of supporting VPN and RAID, so that they could just have a single-server solution to the needs on their network, which basically was down to the game server, and the desire to have a media server and a Wiki-style web server that they could use to organize their business.

What we ended up recommending to them was to replace their kit with the following:
  • x1 SB6183 SURFboard Cable Modem ($81.99 via eBay) 1000bT
  • x2 Netgear GS724T Smartswitch ($100 via eBay) 1000bT
  • x1 Netgear Centria N900 Dual Band Gigabit Wireless Router ($55 via eBay) 1000bT
  • x1 Dell PowerEdge 2950 II RM Server with rails ($250 via techmikeny.com) 1000bT
  • x4 WD 2TB Drive w/2950 Caddies ($60 via techmikeny.com)
Owning their own cable modem meant that they could return the one that was costing them $10 a month in rental fees, so basically that new cable modem paid for itself in less than 9 months. In addition to that though, the new cable modem offered them full Gigabit Ethernet on the LAN side of their connection - the ancient cable modem that they had been using since they first obtained their Internet connection was a 10bT connection. Which considering the speed of their Internet package was ludicrous.

The matched pair of GS724T switches were set up at the two ends of the network, one in the Garage Rack, and one in the Livingroom Entertainment Center that contained the games consoles, and the Cablemodem. The two GS724Ts were configured so that ports 22,23, and 24 created a 3GB Trunk Backbone to allow for multiple streaming clients.

The WiFi Router was placed in the Livingroom, as that offered the best overall coverage for its users.

All of the Ethernet Cable was custom made Cat-6, with cable run management via the basement to reduce the mess and clutter it originally presented.

The 2950 II was installed in the Garage Rack, and configured as a VM Server. To the network it appeared to be four different servers - the Game Server, Media Server, Wiki Server, and a Loghost with direct email capability. The logs for all of the network devices were sent to the Loghost, and any alarm conditions generated an email to the owner's account.

We used mostly free utilities to make the networked VMs easier to manage, including FreeNAS/Plex for the Media Server, and Webmin to manage the other three servers. We also used a free for the bulk of the VMs - Ubuntu Linux, though the Game Server required Windows Server.

The network that we started with was quirky, slow, and difficult to manage. The network we ended up with was streamlined, incredibly fast in comparison, and very easy to manage. In the end the total cost for upgrading and replacing the network? $1,247.50 (though I did not charge anything for my help or the Ethernet cables).

They were able to recover almost $200 of that from selling off the hardware we replaced via Craigslist.

Proper Network Design Elements
When you approach the design of a new network, there are specific elements that need to be planned out. Those are:
  • Cable Pathing and Management
  • Network Device Placement
  • Network Service Location
Before we progress any further we need to define what those three important decisions mean.


Cable Pathing and Management: Don't be confused by the term Cable Pathing and Management - it means exactly what it sounds like it means, which is determining how you will manage and place the physical network cables that will connect your systems to the central device space.

If you were thinking that installing and managing physical cable was only going to be necessary for the actual physical cable that connects your firewall and router to the WAN side of the connection, prepare to be disappointed. Because if you are serious about building your own home network that meets gamer-class efficiency and speeds, you are not going to be using WiFi as your primary network connection. The latency will kill you.

When this article was written the standard for Ethernet Cable used in home networks is called Category 6 - though there is a second generation of cable for that Category called Category 6a (or Cat-6a) that is also available. This is the standard for Gigabit Ethernet.

Previously when 100bT speeds were the standard, Category 5 (Cat-5) was the prevailing standard, but with the wider introduction of Gigabit Ethernet, Cat-6 has taken over as the default standard. The reasons for that are simple enough.

Ethernet Cable Technical Differences
Since the original creation of and use of cables for computer networking, a standards committee has routinely specified the minimal technical requirements for these cables because the performance characteristics for said cables operates in a very narrow range.

While the differences in cable specifications are not as easy to see as physical changes in a cable, the specs for each are crucial to their proper function. Each category of cable has the capability to perform at set ranges and it is the very minimum -- not the maximum -- speeds that network engineers are concerned with. Because the ability to at least reach and maintain the minimal traffic load is critical to the success of a network in terms of simple function.

In terms of cable standards, Ethernet Cable is measured by specific requirements which include a standard length for measurement, operating MHz, the aforementioned minimum operational speeds, and finally the capability of offering Power-Over-Ethernet (PoE) without that service negatively impacting the data-side.

Here are the specs for the modern cables that you will find in commercial and home networks right now:



Length
(in meters)
Speed
10Mb/s
Speed
100 Mb/s
Speed
1 Gb/s
Speed
10 Gb/s
PoE
Mhz
Cat-5
100
X
X


X
100
Cat-5e
100
X
X
X

X
100
Cat-6
100
55 for 10Gb/s
X
X
X
X
X
250
Cat-6a
100
X
X
X
X
X
500

It's no coincidence that category number and Mhz of the wire gets higher as each category brings more stringent testing requirements for eliminating crosstalk as well as adding isolation between the wires.

That said, with Ethernet YMMV. We've seen various cables used in ways that are not inline with the specifications. Networks with runs longer than 100m, and networks that used Cat-5 instead of Cat-5e for Gigabit Ethernet connections and totally got away with it.

The reason for that is because the Cat-5 wire that was being used just happened to be of a higher quality than usually found. Cat-5e is not a different design mind you - it's Cat-5 cable, it has just been given more stringent testing standards for crosstalk than are generally applied to Cat-5.

You can often get away with longer runs and using standard Cat-5 as long as it is high quality cable, but use of that sort may not obtain expected results. It may work, but at a lower efficiency.

Conversely just because you're using Cat-6 cable doesn’t mean you are actually obtaining 1000bT network speeds, because every connection on your network must support Gigabit Ethernet to achieve that. Just like Cat-5 and Cat-5e, Cat-6 cable was retested to achieve 500 Mhz communication (compared to Cat-6’s 250 Mhz). The point to certifying higher communication frequency was to eliminated alien crosstalk - which allows for a longer range at 10 Gb/s sustained speeds.

If you are using older hardware and especially if you are using dumb hubs the entire network will slow down to the fastest speed of its slowest member. If a server on your network only offers 100bT any of the 1000bT clients connecting have to step down their speed to talk to it. That is something you need to consider when planning out your network.

You also need to test all new cable runs to verify that they are hitting the certified speeds. If you have a bad run the network devices are not going to simply slow down to say 900bT to talk on it, they will step down to the next standard level - which is 100bT.

Network Device Placement: When you plan out the placement of your network devices, at least part of the decision process needs to include environmental requirements and how they will be deployed. Whether or not the users will require access, and whether the connection environment will change frequently.

Network Service Location: When you can't tailor your device placement to the service location, special care must be taken to ensure that the cable runs from the service location to the network placement is 100% correct and functional as otherwise this will have a major negative impact on the network.

WiFi is a Convenience: Another issue that you need to come to terms with is that WiFi networking is simply a convenience. The rapidity at which a WiFi router can be over-saturated is laughable. If you have systems on your network that need to move large amounts of data, or that depend on maintaining the highest speeds possible, you want to be using cable, not WiFi.

Adding WiFi capability to a network is largely viewed as a courtesy to unsophisticated users - like your kids who just want to jump online with their iPad or Smartphones to check their email. It's really not appropriator for gaming or streaming.

To Rack or Not to Rack?
We personally know more than a few gamers who started this process by purchasing 19” Computer Racks of varying heights as the foundation for their home network; the example we gave in the Frankenstein Network is a case in point.

For the most part they don't do this because they need to - they do it because they WANT to. It looks cool. They like it. It makes them feel like they have a boss network. So here is the thing - despite all that if you can afford it, go ahead and do it!

I use racks for my own home network but that is something of a special case. In addition to a pair of server racks I have a relay rack for my network devices, which are ALL basically rack-mounted kit. If you do decide to go that route, understand that you do NOT have to replace the systems you want to rack with rack-mounted systems. That would be wicked expensive.

You can either purchase standard rack-mounted shelves to place the generic PC cases on, or for about the same price, you can buy a rack-mounted PC case and swap the guts of your PC into it. If you are curious go to eBay and do a search for Rack-mounted PC Case. Prices range from $50 to $500 though the lower-end cases will not come with a power supply. So yeah, it is doable. And yeah, it does look cool.

In addition to looking cool, a fully-enclosed rack will also provide noise management - which means you can use them to reduce the noise of servers and network appliances to levels that make placement acceptable in your house, rather than needing to stick them in a garage or basement.

That said though, racks exist to be home to rack-mounted components, like Ethernet Switches, Routers, Load Balancers, and Servers, not your Xbox 360. Just saying.

Figuring out your needs means knowing how many rack units you will require. A rack unit is a unit of measure used to describe the height of a server, network switch or other similar device mounted in a 19-inch or 23-inch rack (though 19-inch is the most common width).

One rack unit is 44.45 mm (1.75 in) high. One rack unit is commonly designated as "1U"; similarly, 2 rack units are "2U" and so on. The size of a piece of rack mounted equipment is usually described as a number in "U" - so counting up the U for the kit you have will tell you how tall of a rack you might want or need.

If you are going to go with a rack for in-house use, and you plan to use it for noise management, I recommend you choose a half-rack as that is a LOT easier to find space for or camoflage.

Completing Your Network Plan
Now that you know the basics of planning, it's time to complete your network plan. Start by sketching a schematic of your house or apartment, then noting where each piece of hardware will go.

Make a list of all the hardware and network-connected devices you will need to accommodate, and then work out where they will best fit into the new network plan.

One of the most important decisions you will need to make is whether or not you require a backbone. If your home is large and a significant amount of client hardware is located somewhere distant from the Internet Connection where it enters the home, then you will need a backbone.

Planning, Designing, and implementing a Network Backbone is the subject of the next chapter in this series. Hopefully the contents of this chapter have offered you sufficient information to begin the planning of your new network. While you are doing that, as a gamer, remember - this is supposed to be fun.

Wednesday, January 20, 2016

Email Information Management

Back in the day hearing that voice saying "You've Got Mail!" was really something of a big deal for a lot of users and not just the ones on AOL.  I know hackers who added that voice to their email notice programs just because it is both cool and rather retro!  Here we see Tom Hanks (in the film You've Got Mail) getting mail... 
Before we get started in addressing this perennially thorny issue, I thought it might be a good idea to first discuss the matter of just how do we spell let alone capitalize the word around which this post is centered?

This really is one of those issues that appears to have officially come down to personal opinion over empirical declaration, because when we finally sit down to cut bait the fact is that nobody knows officially how to spell email.

Actually would it be more correct to say “nobody knows officially how to spell email,” or would it be less correct? Huh...

The issue surrounding the question of whether it is spelled “email” vs. “e-mail” vs. “Email” vs. “eMail” vs. “E-Mail” vs. E-okay wait this is rapidly growing ludicrous...

The point to this is that the matter raises blood pressures across the world and has actually been the source of bitter arguments, some of which resulted in violence in the workplace!

If you think this is not a serious issue, consider this: as recently as 2011 in one of the semi-annual meetings of the American Copy Editors Society it was announced by the editors of the Associated Press Stylebook (the AP Stylebook is a reference source that pretty much ALL professional journalists and most of the non-professionals use daily) that they had changed their recommended spelling: "e-mail" is now "email."

The results of that announcement? 

Bitter argument by both journalists AND editors over that change. Now we in the Fourth Estate consider our editors to be the final word on questions like this, so when even THEY cannot agree? Well, let's just say that is a disturbing development.  We really don't like it when Mum and Dad fight.

I identified this issue as perennial because it is a constant and ongoing one - in fact it tends to pop up in conversation and concern almost daily when someone asks for the address to which they should address a message intended for me either as a journalist or as a member of the human race!

When a question like this grows violent the best means of settling it is to consult OTHER reference sources - but when we checked with the Chicago Manual of Style and then Merriam-Webster we found that they pretty much demand “e-mail” be used. Across the pond in Old England the Compact OED - which is generally the preferred consult of journos on-the-go gives the word as “email” so no help there...

If you are thinking that this should clarify the matter - after all we ARE talking about the OED and even Dr. Who agrees that the OED is the final word on spelling - considering the bloody-minded and often violent tendencies of the editors of the Compact OED there's still plenty of reason to be concerned.

After all, in 2010 those red-pen-wielding fiends were responsible for one of the bloodiest attacks on the English Language in recent memory when they abruptly severed 16,000 hyphens - but then we are told that on the wall of the offices of the lead editors at the OED there are Voldemort for Prime Minister campaign posters. I'm just saying...

What brought all of this up was a relatively meaningless comment that cropped up in a conversation yesterday between an editor and I with respect to their providing a small packet of information that I would require to work up a time and budget estimate for a small think piece on the effects of mobile games and mobile gaming on productivity hour estimates at companies that lack a firm policy on the use of personal phones in general, and smart phones specifically, in the work place.

I used "email" and they commented that the correct spelling is "e-mail" and there you go.  Game On!

Just because you CAN forward an email does not mean you SHOULD. And sure, Grandma may think it is cute, but really?  Really?

This is NOT About THAT

So yeah, that happened... But since this post is actually about consolidation of email and was prompted by our preparations for our annual Pre-Spring Cleaning Efforts in the office, we will leave the matter as stated above with the qualification that we are going personally with "email" and will refuse to argue that point because hey, that train has sailed!

Yesterday a sub-editor for a gaming publication I occasionally write for asked me why half-a-day had passed before I replied to their email.

My simple answer was that the email address they used for me is one of the webmail accounts I have and I only check that a couple times a day.  

If they need to get my immediate attention they would be best served using my main email address, which is POP-3 based, so I get those mail notifications pretty much instantly throughout the day thanks to the wonders of the smartphone.

They did not find that amusing.

The thing is email in this modern day comes in several flavors, with the two most popular being POP3 and WebMail.

POP3 - or Post Office Protocol 3 - works in many ways just like the physical post office but is a bit more flexible too. What I mean by that is that it has several layers of physical security that protects your email.

Layer 1: Email Service
When anyone anywhere in the world sends you email and your email service provider supports POP3 the email that they send you goes into your POP3 queue.  It is then stored there until you access and download it. So the people who send you messages will be able to verify that the message was delivered - but not read.

When you retrieve (read) the email, your local computing device basically downloads that email from the POP3 Server of your service provider, allowing you to read it immediately or later, if you don't have the time then.

The beauty of that is that you can connect to the server and download your mail in one big package and then later, when you have time, you can view and reply to any messages on your local computing device regardless of whether or not you have a 'net connection.

The next time you use your email app to check your mail the app will automatically upload (send) any messages you have replied to that are in its send queue at that time.  Isn't tech cool?

POP3 is like this guy delivering your email!  Okay not really. But then Cliffy was on Cheers back when mail did not usually HAVE an "e" in front of it.  Just saying...

Layer 2: Email Storage
If you have set your POP3 email app to both download the email messages AND leave a copy on the server, unlike the real post office it will actually retain a copy of that message for you.  

Should your local computing device be destroyed or stolen, you can still retrieve copies of any of your email messages from the server via another device.  Which makes it a sort of email message archive if you like.

You can ALSO set your email app to download your new messages and then delete the original so that it is NOT stored on the POP3 Server. It is entirely your call.

Basically the POP3 protocol makes it easy for anyone to check their email from any computer in the world, provided they have configured their email program / app properly to work with the protocol.

In addition to that and depending on the complexity of their POP3-capable email app, they may even be able to use a single app to download, read, and reply to ALL of their email accounts. And that is pretty much where this is headed.

WebMail on the other hand is just what it sounds like - a web-based email services.  

Examples of webmail include sites like Yahoo, GMail, and the web-based email services that are provided by a lot of ISPs and Website Hosting outfits these days.

Like POP3 the webmail server will accept email messages on your behalf, and then when you log into the webmail interface, present any messages you have received to you, in your inbox.

Unlike POP3 though, just reading a message does not make it go away from the server.  You have to personally delete the message when you are done reading or replying.

Both have different pro and con aspects to them.  For example with POP3 - assuming you have a properly configured email client like Thunderbird or Outlook - you can basically have ALL of your email in one place.  

These email clients are even smart enough to insert the correct reply to address in any email you write, and you can even configure them to use specific security or confidentiality settings based on that address you are replying from!

POP3 allows you to grab your mail from the server and read or reply to it later, whereas with webmail you have to do all of that online - so you cannot write an email message while you are offline - say traveling on a train or in a car - you have to wait until you have 'net access to do that.

One of the serious cons for POP3 - and this is usually the one that webmail fans immediately bring up when the two types of email service are compared - is the fact that POP3 often can serve as an infection point for computing devices that are not properly secured with anti-virus and security software.

Basically with POP3 you are physically downloading a copy of the mail - and any attachments - to your local device.  So if that email contains an evil payload and your security is not up to snuff, you could end up either infected, or running a hostile app.

With webmail all of the interaction takes place on some remote webmail server out there in the cloud, so if you get a nasty delivery chances are a lot smaller that it will actually succeed in delivering its nefarious payload to your local computing devices.

Another point in its favor is that webmail users never have to worry about whether they are running out of hard drive space on their local device - they only have to worry about exceeding the storage limit on the webmail server itself.

The Conveniences of POP3

Now having taken all of this into consideration, the conveniences of POP3 email are sufficient - and this is especially true if you are forced via your career to maintain a number of different email addresses - to make the efforts of properly securing your local computing device worth doing.

Actually - and I am not being mean here - you should be properly securing it anyway.  So really you could view switching to POP3 to be a bonus since it will encourage you to practice safe surfing and safe computing - which like I said, you should already be doing!

Filtering Email
One of the best aspects of using your local computing device in conjunction with POP3 apps is that, depending on the app, they can really be smart AND useful.  Specifically they tend to support some pretty useful utilities - like email filtering.

With email filtering you can set up all sorts of rules that the email that you receive has to follow.  When you get on a mailing list from an aggressive company, you can add their domain to your DO NOT ACCEPT list, and any offending email is deleted behind the scenes so you never see it.  Your app simply drops it into the round filing cabinet for you.

By using the Spam filters on your email app it will eventually build a list of the various companies, email domain names, and the like who you prefer not to receive email from, and present you everything except the email from those people or businesses.

You can also set up keyword rules - for example you can add Viagra and Penis Enlargement as either a single rule -- your app will delete any email messages that contain the words "Viagra" and "Penis Enlargement" before you ever see them.  Or you can set that up as two rules, and so never see another Viagra advertisement OR a Penis Enlargement advertisement again.  Yeah, that's a good thing.

How Popular is POP3?
Obviously using a POP3 App/Client to pull all of your mail into one convenient place will only work if you CAN pull all of your mail into one convenient place, right?

With that in mind, there are some simple steps you can take - and before you ask, I recommend using the Thunderbird Email App from OpenOffice/Mozilla because it works well, it is free, and it is easy.  You can also use Microsoft's Email program - they call it Outlook - and obtain the same results as long as you are willing to pay for it depending on the version.

Regardless of the app/client you use, you should be aware that they all treat the email process the same way - that is to say that they all consider receiving email to be ONE side of the process, and sending email to be another side.

You receive mail via a POP3 Server, but you SEND all of your replies via an SMTP Server.  So you are going to need to set up for both when you are consolidating - and I strongly recommend you test every account you have set up in the app/client to verify that it is in fact working as intended.

The Steps You Need to Take
Once you have picked the POP3 App/Client you want to use, and installed it, you will need to do the following - and this is true whether you are just getting started or you have decided to consolidate all of your mail accounts like us:
  1. Contact your ISP to get the instructions from them on how to configure your email app to access their POP3 services.  You will also need - in addition to the address of their POP3 email server and the login settings as well as any special settings they may require, such as alternate port numbers - the SMTP Server settings and login information as well.
  2. The POP3/SMTP settings for any alternate email service providers - specifically and including Webmail providers - so you can add them to your Client/App.
About number 2...  To help you out I went looking to see what commercial and personal email services actually include POP3 as part of their services, and this is the list of companies that I found DO support it:
There you go - those are the big ones that pretty much everybody uses.  If your provider is not on the list check their site for POP3 Settings.

Bear in mind that some of the free webmail services that offer point-to-point automatic encryption do NOT offer POP3 services - they can't and protect your email with encryption.

Really was not kidding about you needing to maintain proper security on your computing device.  If you make the switch to POP3 you will need to do that.  Anti-Virus, Anti-Phishing and email scanning are a given in this world today.
Email Encryption?
That noted though you CAN do email encryption AND digital signing of email using Firefox with the free Enigmail Add-On.  Just saying....  You will want to get one of the free PGP Encryption programs for your OS though, as well.

Friday, March 6, 2015

the Apple iPhone "Slide to Accept" Mystery. . .


Three young men sat in their luxurious offices in the vintage travel trailer concealed under a massive pile of ancient automobile bodies and large commercial appliances that created something of a mountain near the exact center of the junk yard.  Jones Salvage Yard, tucked away on the edge of the Pacific Coast Highway near Santa Monica, California, offered a little bit of practically every technology of the past 100 years, much of it helping to conceal their headquarters and offices. 

"Technically it's not a junkyard," their leader, Jupiter Jones was quick to point out.

"Technically and, perhaps more important, at least as far as the State of California is concerned, it is a licensed and insured Salvage Yard," he explains.

The seemingly random stacks of rusting automobiles, commercial washers, and an even dozen massive commercial sheet drying machine from what was at one time the largest hotel laundry services in the San Francisco area before Jupiter's Uncle Titus and his helpers salvaged the hardware, trucking it back to Santa Monica.

Concealed underneath the mountain in a void that was created from wielded I-Beams salvaged when the Jones crew tore down the six-story turn-of-the-century Wells Fargo Bank of Santa Monica, the .  Jones Salvage Yard was full of objects of dubious historical value, it being in the business of the salvage and repair if a massive list of goods.

Jones Salvage did a lot of business with Hollywood, and in particular the movie studios - the prop departments of most of the major motion picture studios considering the Yard as a treasure trove.  If you saw a movie last year that was made by an America studio, chances were 100% that something in the background came from the Jones Salvage Yard!

What could not be re-purposed, cleaned up and resold, was torn apart by the two Hungarian cousins who constituted the Precious Metals Reclamation Departmant - both Hugo and Fritz had an eye for that which shines, able to find gold, silver, and platinum burind deep in ancient electronics.

Once they had the precious metals recovered, the pair went after the other metals, using the Yard's blast furnace to turn the aluminium, copper, and nickel into five-pound ingots.  Whereas all of the iron along with the different grades of stainless steel were loaded directly into a 40-foot shipping container and sold to a foundry in Japan that has a standing order for the scrap.

Occupying that void, beneath a carefully supported set of arches that provide almost bomb-shelter grade structural safety and protection, sits what appears to be a vintage model 1948 Airstream "Whirlwind" travel trailer.


The Whirlwind model of Airstream offered cutting-edge tech and luxury in its day - and is the HQ of The Tree Investigators.
Brand new and just off of the assembly line at the Airstream factory in Long Beach, California, the standard model Whirlwind '28 would have weighed just over 3,000 pounds and cost $3996. 

Comfortably sleeping up to 6 adults, the Whirlwind has a full bathroom with shower, basin, and toilet, full galley (kitchen) with propane oven and four-burner range, rounded off by a large and flexible combination refrigerator/freezer powered by both electricity or propane.  This Whirlwind was not, however, a standard model.  

The Air Force Whirlwind - it was obvious that the travel trailer had a connection to the US Air Force considering that it wore Air Force livery with the emblem of the Strategic Air Command ten feet tall on the roof - was anything but a stock model.

It was itself a bit of a mystery and so the three young men who now called the hidden trailer their office and headquarters set about solving that mystery, learning both how the trailer had ended up in the yard at Jones Salvage and just what all of the ancient high-tech hardware installed inside was for.

This particular trailer - Airstream number 48-1-0103 was the one-hundred-third manufactured in 1948 at the Long Beach plant - that being a translation of the serial number punched into its frame.  Airstream Whirlwind had been on a government "watch list" at the request of the US Air Force Museum at Wright-Patterson Air Force Base in Ohio since it was "misplaced" by the Air Force.

Since there was official interest in the trailer, the boys restricted their "official" inquiries as discrete and anonymous queries to avoid setting off any alarms.  When it was necessary to deal with the government itself - after all they did not want to lose their comfortable office to a team of Air Force types from the museum!

Fortunately the trio was very good at secretly ferreting out facts - after all they were in the private investigations business.

It turned out that the trailer had not been misplaced - it was a sacrifice of sorts, having been sold at government auction along with a large number of late-1940s era heavy bombers that the Air Force had designated as surplus. 

The trailer had arrived in the Jones Salvage Yard because the man who owned the salvage yard - Jupiter's grandfather - had been the winning bidder for that auction.

They had scrapped the planes after literally cutting them into easier-to-transport pieces, but according to the Yard records from the period there was a plan to convert the trailer into a mobile office for use at larger salvage jobs where an on-site office would be beneficial.

For some reason the special conversion that its new career would require never quite happened, and so there it sat, eventually ending up buried by layer-upon-layer of other salvage.

The first recorded piece of nose art was a sea monster painted on the nose of an Italian flying boat in 1913...

Of course all of this happened long before Jupiter was born - and as his grandfather was now deceased that was a dead end in more ways than one.

As their investigation deepened, young Jupiter and his partners (and best mates) Pete and Bob discovered that the sale of the salvage lot at Tucson's Davis–Monthan Air Force Base was actually part of a larger mystery and conspiracy  - the investigation eventually ending up documented as The Case of the Aluminium Plot!

It worked out that the sale of the trailer was part of a then-recent initiative to shrink the number of mothballed heavy bombers at the reclamation center.  There was a method to this madness.

The Air Force needed to get rid of that squadron of brand new Boeing B-47 Stratojet Heavy Bombers (coincidentally those bombers had been brand new in 1946) by accidentally adding them to a list of miscellaneous resources then in storage at the desert storage base near Tucson, Arizona.

The items on the list and declared "scrap" consisted of practically anything made primarily of aluminium that was not obviously valuable with the exception, of course, of the 12 brand new bombers.

The tragic loss of the 12 Boeing B-47 - regrettable as it was - required their immediate replacement since they were part of the ready-reserve and, Lord knew, with the situation in Korea being what it was, they could be at war any time now!

It was a thinly disguised nudge to Congress to get them to approve a test squadron of the newest design in the Air Force arsenal for Heavy Bombers; the Convair XB-46.

That unproven model had been tested, and it was found to be valuable, but it had not been approved for induction into the fleet and so had not gone into production.  Yet.  

The Convair XB-46 - when it positively absolutely has to be there overnight!

There was a small cadre of officers in the Air Force who meant to see it go into production, and not just because they all owned stock in the company that made it - but also because they were convinced that the nation needed that bomber.

Despite being the air-combat equivalent of a greyhound bus for bombs, the XB-46 looked like the mean, lean bombing machine that it was!  And with those four monster jet engines bolted on, the XB-46 became that lean, mean, bombing machine!

With that part of the mystery solved, the three investigators turned their attention to the trailer, which they discovered had been specially ordered by the United States Air Force to serve as the mobile quarters and command center for a general in the Air Force for a special project.

The custom-built Whirlwind was the largest model of single-axle trailer then manufactured by the company, and other than its rather distinctive paint scheme, looked to be a standard Whirlwind model from the outside.

Inside was a different story - the trailer having been carefully engineered by the brightest minds in the military to provide the dual-functions of Bachelor Officer Quarters (Mobile BOQ") and mobile headquarters (Mobile "HQ").

While mainly a military tradition, in recent years civilian airliners operated by the Virgin Group feature "Virgin Girls" nose art and names as part of their standard livery.  Pictured above is "Skye Blue" a Boeing 737-800 registration  VH-VOC...  Other cute names include Betty Blue (VH-VBC), Blue Belle (VH-VOA), Matilda Blue (VH-VOB), and Little Blue Peep (VH-VOM).

It was equipped with three different radios that covered all of the frequencies then used by military and civilian radio, several different voice and data encryption and decryption devices,a radar scope.  It contained three different safes - a documents safe in its office section, a documents and sensitive hardware safe in the small electronics bay, and a weapon safe inside what can only be called the bedroom.

The walls, floor, and roof were lightly armored, and the doors were reinforced and armored with gun ports in them.  All of its windows were bulletproof and blast-resistant, and the Whirlwind was equipped with a state-of-the-art air conditioning system as well as its own electric generator.  

It was, to put a fine point on it, the 1949 equivalent to the modern-day Air Force One - a portable military command headquarters with radar and communications capabilities that was at least on a temporary basis, self-sufficient.

In 1949 the standard Whirlwind model had a retail price of $3996 and weighed just over 3,000 pounds.  In today's money that would be slight more than $38,970 in 2015 dollars!  But the version that the Air Force bought had a sticker price of $19,456 - which works out to just over $189K - and that did not include the special military hardware, all of which was still present!

After digging through online DoD documents their electronic whiz and hacker Bob found the entire file on the trailer, which it turned out had been ordered to serve as the mobile headquarters for the General of the Air Force during an operation called "Project Bookbinder"on 26 February 1949.

The trailer was moved to Carswell Air Force Base near Fort Worth, Texas in mid-February in preparation for the operation, which was then the home of the US Air Force 43rd Bombardment Group.

Boeing B-47 - Grandparent of the venerable B-52!

Project Bookbinder was a semi-secret military operation in which a Boeing B-50 Superfortress bomber called the Lucky Lady II belonging to the 43rd Bombardment Group became the first airplane to circle the world nonstop.

The flight of the Lucky Lady II demonstrated the Air Force’s capability to fly, non-stop round the world, showing it could take off from the U.S. and drop bombs anywhere in the world.
 
The Lucky Lady II started its round-the-world trip with a crew of 14 under the command of Capt. James Gallagher, departing from Carswell Air Force Base at 12:21 PM on February 26, 1949, and heading east over the Atlantic Ocean.

After flying 23,452 miles, Lucky Lady II passed the control tower back at Carswell AFB on March 2 at 10:22 AM, marking the end of the circumnavigation, and landed there at 10:31 AM after having been in the air for 94 hours and one minute, landing two minutes before the estimated time of arrival calculated at take-off.

The custom-built trailer was used as the headquarters and command-and-control base by its senior officer, Lieutenant General Curtis LeMay of the Strategic Air Command.

General LeMay greeted the crew of the Lucky Lady II upon their arrival, and then, addressing the dignitaries, airmen, and officers, pointed out the significance of the mission, noting that with its successful completion the Air Force now had the capability to take off on bombing missions from anywhere in the United States to "any place in the world that required the atomic bomb" - to which the Russians responded "Whaaaaa?!"

Lucky Lady II crew members are greeted by Air Force Secretary Stuart Symington and General Hoyt Vandenberg following the first non-stop flight around the world. (Carswell AFB, Ft. Worth, Texas)
 
When Jupiter and his mates discovered the trailer in the back lot of the Salvage Yard they decided it would be the perfect headquarters and secret offices for their private investigations company, which they operated under the name "The Three Investigators."

Their company consisted of Jupiter Jones, whose family owned Jones Salvage Yard,  Peter Crenshaw and Bob Andrews.  Jupiter was the brains of the outfit - though the other two were far from stupid.  

Diagnosed a genius at age three, Jupiter could read and write at collegiate level by the time he was seven, and spoke 14 different languages fluently by age twelve.  He was still a virgin at 17 but he was working on that problem.

Pete - who is not a virgin - is the athlete of the trio, having lettered in Football, Basketball, and Track at their high school - the trio attend Santa Monica High School - and is an avid firearms enthusiast and life member NRA.

Bob is the technical side of the outfit and is a genius in his own right.  By the time he was ten he was fully fluent in five different programming languages and by the time he reached his 12th birthday was suspected by the FBI of having pulled three of the most spectacular hacks of the decade.

Thanks to Bob's inquisitive mind and near-legendary hacking abilities, the company has full and unrestricted access to the California Department of Motor Vehicles network, as well as the FBI's Integrated Automated Fingerprint Identification System (IAFIS), the National Combined DNA Index System (CODIS), the National Crime Information Center (NCIC), and dozens of foreign law enforcement and intelligence networks.

After moving the trailer into the void in the largest pile of salvage in the center of the yard, they carefully buried it there, constructing its armored cave-like covering and a dozen different paths and tunnels that gave access from all over the yard.

The Chief - Jupiter Jones (left), The Cleaner - Pete Crenshaw (center), and the Hacker known as Captain Midnight - Bob Anderson (right) - The Three Investigators!
The Apple iPhone "Slide to Accept" Mystery

March of 2015 was shaping up to be a a great month as far as The Three Investigators were concerned.  Thanks to Bob's phone phreaking talents Jupiter Jones had been caller number 12 (and thanks to Bob having seized control of the radio station PBX callers 1 through 11 as well).  The prize was 12 engagements of a Rolls Royce Limo belonging to Worthington Limo Service - which nicely if temporarily solved their transportation problems.

Jupiter sat at his desk in the concealed offices of The Three Investigators, the private investigations firm owned by Jupiter and his best mates, Bob and Pete.  He was waiting for them to arrive so that he could brief them on the resolution of a case that Pete had taken on behalf of the company when he'd been approached by the Assistant Principal at their high school.

"Mr. Crenshaw, you are supposed to be a PI?  Well then tell me why some of the calls on my iPhone prompt me to 'Slide to Answer' while others allow me the option of either Accepting or Rejecting the call?  This is driving me crazy!"

Much to Jupiter's dismay Pete had not only accepted the commission, but had promised immediate results - so he had been up late verifying what he suspected he already knew.

Jupiter heard someone coming in through Tunnel Two about the same time as he heard the entrance they called Green Gate One.  Soon enough Bob and Pete were present and in their seats at the desk, at which point Jupiter began speaking.

"Right, so Pete accepted a commission - without even bothering to get a contract or set the rate" Jupiter scowled.

"Sorry," Pete muttered,

We totally get called from the NSA like all the time!  Really!
 
"The mystery I am calling "The Apple iPhone Slide to Accept Mystery" is actually a very basic question with respect to the functional parameters of the wireless phone otherwise known as an iPhone," Jupiter continued.

"There has been a lot of confusion surrounding that device - truly a fascinating phenomenon I must admit.

"For example I have noticed that every advertisement for Apple's devices the iPhone and iPad depicts the devices with their clocks displaying a time of  9:41 a.m.  Why is that?  I had to wonder!  In fact it kept me awake at night more than once, so Pete's taking this case on gave me the excuse to answer that and many other questions I believe you will find as fascinating as I do..."

"Here here!" Bob cried, as both Pete and himself began tapping their fingers on the desktop - which was the Three Investigators version of applause.

"So it turns out that the ads used to show the time at 9:42 a.m. - because that was the exact time that device inventor Steve Jobs first unveiled it back in January 2007. 

"The change to 9:42 happened in 2010, when for reasons known only to Jobs and God, he unveiled the iPad at exactly one minute earlier in the day -- at 9:41 -- and ever since then 9:41 has been the standard time for all Apple products in ads, both the new iPad and now the new iPhone alike."

"Huh," Pete grunted.  "I heard Steve Jobs was very fond of marijuana."

"I pulled his file via NCIC," Bob admitted.  "There are a number of confirmations of that - he actually listed his drug use on all of his security clearance applications for both the DoD and other agencies.  He admits to using LSD over 15 times and he was a chronic pot smoker," Bob confirmed.

"Only Dopes smoke Dope!" Pete and Jupiter cried, laughing.

"But seriously, Jobs credits his drug use with providing the creative spark behind a number of Apple products, including the iPhone," Bob pointed out.  "Maybe there is something to that?

"Have you noticed that some apps have a blue dot next to them on the screen?" Jupiter asked.

"Yes," Bob admitted.  "What's the deal with that?" Pete asked.

"It turns out that is the replacement icon for the 'old 'New' badge," Jupiter said.  When you install a new app - or you update an existing one, iOS adds that dot to indicate that it's new.  It goes away after you run the app for the first time.

"They changed a lot between iOS7 and the previous OS's" Pete complained.  "You used to be able to add someone who messaged you to your Contacts by tapping the Contacts button - that no longer works."

"Actually it does still work sort of," Jupiter said.  "Just tap the soft Contacts Button - which is located in the upper-right corner of the screen - then tap the little 'info' icon..."

"Info icon?" Pete interrupted Jupiter.

"Yes, its the little  'i' inside a circle.  Anyway tap that and then choose Create New Contact or Add to Existing Contact, whichever makes more sense," Jupiter allowed.

"By the way Bob, your Mom asked me to find out how to force close apps - you do that by double-tapping the Home Button to bring up the new 'card' view for all running apps, then choose the app you want to close and flick it up - in relative terms - to close it.  Swish your finger and presto!  Running app all gone!"

"Thanks Jupe!" Bob smiled.

"Now as for this Slide to Accept mystery," Jupiter sighed.  

"If you check online you will find all sorts of speculation - that it depends on whether the person calling you is in your Contacts, or you have received a call from hem before...  

"Another popular theory has it that the Accept / Reject side only appears when the phone calling you is another Apple product," Jupiter said.

"Well?  Which is it?" Pete asked.

"None of the above.  It turns out that the true culprit is your phone.  Specifically the lock state of your phone," Jupiter revealed.

"Wait, what?" Bob asked, eyebrows raised.

"If your phone is locked - that is to say you would need to enter the unlock code to use it, the message is the "Slide to Accept" one - if your phone is not locked - that is to say you can access it without putting in the code, it gives the Accept / Reject option.

"Basically it is part of the security feature, Jupiter explained.

"Well that is a bit anti-climatic don't you think?" Peter asked.

"It is what it is," Jupiter signed.  "Now let's go see if Uncle Titus left any of Aunt Mathilda's blueberry pie for us?" Jupe ordered, heading for the nearest exit.


"It's just a little snow... How bad could it be?  Seriously?" she asked.  "Flamethrower," he replied.  "What?" she sounded confused.  "It's either that or napalm, you decide," he answered.  Meanwhile at the asylum B.A. Baracus  and Templeton Peck were using the old Transfer Orders scam to spring Howling Mad Murdoch because someone had to save the day...

Afterword

I get a lot of email asking me tech-related questions.  No doubt the reason for that is my having written a tech column for the Cape Cod Times for almost a decade...  

When the question is a good one - or its answer is something I suspect that other readers might either enjoy or benefit from, I will often answer it in the blog instead of just replying to the email - but over the years that process has grown very predicable.

A few days ago I received just that sort of email about the different answering options for the iPhone, and I thought, I would answer via the blog since it was a rather interesting question.  That got me to thinking - why not make the process more interesting?

I mean, why can't an answer to a tech question also include lots of other information about that device?

And then I thought - why restrict it to just that tech?  Why not combine other subjects that I am interest in?  This post is the result.

For the record the entertaining background on the Lucky Lady II and its history making, record-breaking around the world nonstop flight is all true.  And General LeMay really did announce that the US Air Force was now ready to drop the Atom Bomb anywhere, anywhen!

The business with the XB-46 and its engine is made up - I threw that in for flavoring - but the bits about the Airstream Whirlwind are all true.  The Air Force really did have several custom models that were used by Generals as mobile command posts!

As for the characters around which this post was written - Jupiter, Pete, and Bob really do exist - as the fictional characters and protagonists of the Three Investigators series of juvenile mystery-fiction books.

When I was a preteen I read -- make that devoured -- all of the original books from the first series as my friends and I really enjoyed then and were genuine fans of those teenaged P.I.s.

If you have preteen and teen kids you think might enjoy a good teen-focused mystery or three, the information that you need to find these at your local library is:

Series Names: Alfred Hitchcock and The Three Investigators.
Author: Robert Arthur, Jr.
Genres: Mystery literature / Juvenile literature / Crime fiction
Publisher: Random House
Published: 1964-1987

I hope you found this departure from my usual approach entertaining - I certainly enjoyed researching it and writing it!

Next time maybe I will use Huckleberry Fin as the homage?

NB

I want to thank all of you guys and gals who emailed me and sent cards, flowers, and prezzies while I was in the hospital.  Thank you!  Thank you very much!  And next time (if there is a next time) remember that PIZZA is probably one of the best gifts you can give an invalid - that and your company, so hey, bring a pizza, hang out!