میکس صدا: BlogBloghttps://mixseda.com/Fri, 29 Mar 2024 11:32:18 GMTurn:store:1:blog:post:1152https://mixseda.com/domain-name-systemDomain Name System<p>&nbsp;</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/domain-name-system-چیست" rel="follow"><button>FA (Persian)</button></a></p> <h2 dir="ltr"><img src="/images/uploaded/blog03/294.webp" alt="Domain Name System" width="100%" /></h2> <h2 dir="ltr">Basic concepts to better understand DNS</h2> <p dir="ltr">To better understand DNS or Domain Name System, you need to be familiar with the concept of domain and host. We don't mean <a href="/networks-in-terms-of-managing-access-to-resources">domain model networks</a> here. In fact, it's good that you are familiar with the domain name.</p> <h3 dir="ltr">What is a domain?</h3> <p dir="ltr">In order to have a site, the first step is to register a domain. Domains in the world have different suffixes and have different meanings.</p> <p dir="ltr">My domain can be any name, you can also register my domain name in Farsi, Chinese or any other language in the world; The only limitation that domains have is that you won't be able to register another person's domain under your name.</p> <p dir="ltr">If you plan to register a domain globally, you need to pay an annual rental fee. But in local networks, you can register any domain you want with the desired extension without paying any commission.</p> <p dir="ltr">In fact, if you do this, your domain will only be visible to devices connected to your network. In fact, your domain is created locally and no one in the world will be able to access it if it is not connected to your computer network.</p> <p dir="ltr">Internationally and globally registered domains have standards. A globally registered domain must consist of two parts: domain name and extension.</p> <p dir="ltr">For example, the same Mixseda domain. com from two sections of mixseda as domain name and section. com created as an extension. Domains can also have a prefix such as WWW.</p> <p dir="ltr">Another problem is that you are not allowed to use any font to register your domain. For example, until now it is possible to register Persian domains for the site prefix that. they are not here.</p> <p dir="ltr">When it comes to domains, we don't want to mention trivial topics like how to choose a domain. I'm going to familiarize you with the concept of domain.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/296.webp" alt="Domain چیست؟&nbsp;" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h3 dir="ltr">What is Host?</h3> <p dir="ltr">If I want to thoroughly explain Hosts and types of hosts, it is easy to say that there are many materials in this field. Basically, host means hosting or hosting space.</p> <p dir="ltr">To create a site, you will need some storage space and this storage space must also have features where you can place and run your site.</p> <p dir="ltr">Indeed, in the real world, each physical server is split into several or even hundreds of hosts to provide the service. Hosts have different categories based on operating systems and software and the capacity they have.</p> <p dir="ltr">For example, you may have seen a lot of ads on the Internet about renting Windows or Linux hosts. Also, some hosts are classified according to the application for which they were made.</p> <p dir="ltr">For example, you can rent WordPress hosting to build a website; A WordPress host is a host specifically customized to host WordPress CMS.</p> <p dir="ltr">Or you may come across download hosts in some cases, download hosts are not meant to have a web application on. These hosts provide you with space on the internet so that you can place your files and create a download link.</p> <p dir="ltr">Of course, in the case of download hosts, some of them also have the ability to classify files and create more security. Let me explain better that some of these hosts have web applications to perform specific tasks.</p> <p dir="ltr">A host is quite simply a storage space on your network that has a specific performance of the server that provides it. For example, if you've had a website before, you've certainly met the characteristics of a host.</p> <p dir="ltr">For example, a host involves a certain amount of RAM and CPU of your server. Also, on the Internet, you may have restrictions on exchanging information about your host.</p> <p dir="ltr">Now, assuming you have a host and a domain, the problem is how do you want to connect these hosts to your domain?</p> <h3 dir="ltr">What is an FQDN?</h3> <p dir="ltr">FQDN stands for Fully Qualified Domain Name meaning a domain that is fully qualified. For example www. mixseda. com is considered an FQDN, or <a href="http://www.wordpress.org">www.wordpress.org</a> is considered an FQDN.</p> <p dir="ltr">The FQDN itself consists of the following three parts:</p> <ul dir="ltr"> <li>Hostname</li> <li>Subdomain</li> <li>Domain name</li> </ul> <p dir="ltr">For example, in the FQDN of <a href="https://www.mixseda.com">www.mixseda.com</a>, the components of this FQDN are categorized as follows:</p> <table class="tablemix" dir="ltr"> <tbody> <tr> <td width="208"> <p>Domain name</p> </td> <td width="208"> <p>Subdomain</p> </td> <td width="208"> <p>Hostname</p> </td> </tr> <tr> <td width="208"> <p>mixseda</p> </td> <td width="208"> <p>www</p> </td> <td width="208"> <p>.com</p> </td> </tr> </tbody> </table> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">What is DNS?</h2> <p dir="ltr">DNS stands for Domain Name System, a service in computer networks whose job is to introduce you to other services.</p> <p dir="ltr">Imagine that you have entered a large store; And you intend to search for a specific product. You may want to spend the whole day in the store looking for the item you want to find.</p> <p dir="ltr">It is more logical to ask a salesperson or department manager in which section of the store the product you want is located. For that, you need to ask someone who has a lot of knowledge about that shop.</p> <p dir="ltr">In computer networks, it is not possible to search the entire network for the desired service provider, so you need to ask a computer who has a lot of network knowledge to guide you.</p> <p dir="ltr">In computer networks, this omniscient who knows almost everything about the computer network you are on; It's called DNS Server.</p> <p dir="ltr">DNS has three important functions in computer networks. Next, I'll explain each of these tasks to you:</p> <h3 dir="ltr">Convert FQDN to IP</h3> <p dir="ltr">The first task of a DNS server is to convert FQDN to IP. In fact, when you enter your browser mixseda. com as the URL, your computer does not know where to go to get the web service.</p> <p dir="ltr">Because of this, your computer first asks for the DNS server you set up for it, which is mixseda. Which server does com belong to? And as a result of this query, DNS server sends some information to your computer.</p> <p dir="ltr">For example, depending on the type of question your computer has asked a DNS server, it may receive different DNS responses. Or, for example, a DNS server might have several answers to some of your computer's questions.</p> <p dir="ltr">In response to your question on the mixseda site. com The DNS server may return one or more IPv4 and IPv6 to you. These <a href="/internet-protocol">IP addresses</a> are related to the desired site host.</p> <p dir="ltr">At the next stage, your computer, having the IP address of the desired site, can make a request to the site server and receive information about the URL of the commenter.</p> <p dir="ltr">If you have noticed, when you enter the following command in the Windows terminal (CMD), before the process of pinging and sending ICMP packets takes place, your computer first asks its DNS server to provide the IP address of the desired server. .</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/295.webp" alt="گرفتن ping" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">In the CEH course, you will learn about the structure of these requests in detail, and you do not need to know about them now. Also know that DNS servers don't know everything.</p> <p dir="ltr">You can ask your DNS server a question, then this DNS server will also ask several other servers to get the desired answer. Or, if your DNS server is misconfigured, it may give you a wrong answer.</p> <h3 dir="ltr">Convert IP to FQDN</h3> <p dir="ltr">In computer networks, especially local computer networks, some worker processes require the conversion of IP to FQDN.</p> <p dir="ltr">In computer networks, a computer may need to find out the FQDN of other computers, in this case it can find out the FQDN of the computers using a series of requests from its DNS server using IP addresses.</p> <h3 dir="ltr">Service Locator</h3> <p dir="ltr">The third task of a DNS server is to determine the location of network services in local networks. For example, if there is a print server on the network, it is preferable that this print server be defined for DNS.</p> <p dir="ltr">Or, if you have a domain model network, you will definitely need a DNS server so that computers know which server to access to perform the authentication and authorization process.</p> <p dir="ltr">If you have a Domain Model network with centralized management on a Microsoft operating system platform, when you want to create a Domain, the operating system itself will also install the DNS service.</p> <p dir="ltr">The reason is that you will need at least one DNS server in your computer network to present the domain controller to other computers. Now, if you have other services in your network, DNS will help you introduce them to the computers in your network if needed.</p> <h2 dir="ltr">Free DNS Servers</h2> <p dir="ltr">On the internet, you usually need a DNS server that converts FQDN to IP. For this, you may want to rent a server and set up DNS server on it, which will increase your cost and you need knowledge to set it up.</p> <p dir="ltr">Or you can use a variety of services on the Internet that provide you with DNS service for free or not. One such very popular service provider that provides lots of features for free is cloudflare.</p> <p dir="ltr">Website owners usually use this site as their DNS server. In general, the services that these companies provide to their customers increase the speed and security of sites because they specialize in DNS.</p> <h2 dir="ltr">The best DNS providers</h2> <p dir="ltr">There are a number of DNS servers on the internet to provide DNS services to computers. Except for these things that we present to you here, every Internet Service Provider (ISP) in the world also uses their own DNS servers.</p> <p dir="ltr">For example, users who get Internet from the telecommunications company in Iran are connected to the DNS servers of the telecommunications network by default.</p> <p dir="ltr">In Bezeg networks you will surely have a DNS server for the clients so that you can handle DNS requests. You also respond to some requests however you like.</p> <p dir="ltr">But in smaller networks sometimes a DNS server is not needed or the presence of a DNS server increases the network costs. For this reason, in the case of smaller networks, they use DNS servers that are actively present on the internet.</p> <p dir="ltr">Try not to trust any company regarding DNS server, an inappropriate DNS server may cause problems in your network. For example, if the wrong DNS is selected, computers on the network may not be able to use a specific service on the Internet.</p> <p dir="ltr">Also, choosing a suitable DNS server can affect the speed of your computers. Perhaps you've read articles about increasing Internet speed by choosing DNS. Of course, people who are gamers and engaged in online games are more familiar with this issue.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/297.webp" alt="&nbsp;Google Public DNS" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h3 dir="ltr">&nbsp;Google Public DNS</h3> <p dir="ltr">As you know, Google is one of the biggest companies that offers many services to its users. Google has many services, one of which is <a href="https://developers.google.com/speed/public-dns">Google Public DNS</a>.</p> <p dir="ltr">In Iran, many computers use Google DNS. Google Public DNS is a free and fast DNS that most people are familiar with.</p> <p dir="ltr">Also, this DNS server has high security, which has made many users use it. Many times when you contact your ISP about your internet problems, they will ask you to ping the Google Public DNS.</p> <p dir="ltr">The reason is that no one expects the services provided by Google to be disrupted. To change your DNS to Google Public DNS, you need to enter the following values in the DNS Server section of your device:</p> <p dir="ltr">&nbsp;</p> <table class="tablemix" dir="ltr"> <tbody> <tr> <td colspan="4" width="547"> <p>Google Public DNS</p> </td> </tr> <tr> <td width="149"> <p>Secondary IPv6</p> </td> <td width="149"> <p>Primary IPv6</p> </td> <td width="125"> <p>Secondary IPv4</p> </td> <td width="125"> <p>Primary IPv4</p> </td> </tr> <tr> <td width="149"> <p>2001:4860:4860::8844</p> </td> <td width="149"> <p>2001:4860:4860::8888</p> </td> <td width="125"> <p>8.8.4.4</p> </td> <td width="125"> <p>8.8.8.8</p> </td> </tr> </tbody> </table> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/298.webp" alt="Cloudflare" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h3 dir="ltr">Cloudflare</h3> <p dir="ltr"><a href="https://www.cloudflare.com/">Cloudflare</a> is one of the best known companies that provides DNS and CDN services to their customers. Of course, Cloudflare has a few other services, one of which is the VPN service.</p> <p dir="ltr">Most of the people who have done website designing jobs or intend to provide services over the internet usually know about Cloudflare and use it to improve the quality of their work.</p> <p dir="ltr">Cloudflare offers many features and services to customers for free, and from time to time, offers new services to customers who use it for free.</p> <p dir="ltr">The major issue in using Cloudflare services is its high security. In fact, it can be said that this company is one of the companies that has a lot of capabilities in the field of security of their services.</p> <p dir="ltr">Of course, unfortunately, some of this company's services cannot be used by Iranian filtering system for our country, but Cloudflare DNS is still one of the fastest DNS in Iran.</p> <p dir="ltr">Most gamers know the DNS of this company and use it to play online. Also, when it comes to gaming, this DNS server offers special services to its users.</p> <p dir="ltr">In order to use this popular DNS server, you need to set the following values on your device:</p> <p dir="ltr">&nbsp;</p> <table class="tablemix" dir="ltr"> <tbody> <tr> <td colspan="4" width="547"> <p>Cloudflare Public DNS</p> </td> </tr> <tr> <td width="149"> <p>Secondary IPv6</p> </td> <td width="149"> <p>Primary IPv6</p> </td> <td width="125"> <p>Secondary IPv4</p> </td> <td width="125"> <p>Primary IPv4</p> </td> </tr> <tr> <td width="149"> <p>2606:4700:4700::1001</p> </td> <td width="149"> <p>2606:4700:4700::1111</p> </td> <td width="125"> <p>1.0.0.1</p> </td> <td width="125"> <p>1.1.1.1</p> </td> </tr> </tbody> </table> <p dir="ltr">&nbsp;</p> <p dir="ltr">It goes without saying that this DNS is one of the most popular DNS in the world in terms of IP address. Apart from the high security it has in the field of service delivery, this company also has online support forums.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/299.webp" alt="OpenDNS" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h3 dir="ltr">OpenDNS</h3> <p dir="ltr"><a href="https://www.opendns.com/">OpenDNS</a> is a subset of the Cisco brand. OpenDNS was founded in 2005 and, like Cloudflare, this company also offers many free and free services to its users.</p> <p dir="ltr">One of the features of this DNS that at the beginning of the business many users used OpenDNS due to the same functionality, was that this DNS filters phishing sites by default.</p> <p dir="ltr">Filtering phishing sites helps keep your business safe if your users are not computer savvy.</p> <p dir="ltr">Setting up a DNS server with special features can be very difficult for a novice administrator, and providing security for this structure certainly requires high knowledge and skills.</p> <p dir="ltr">OpenDNS DNS servers allow you to define specific filters for your DNS. Of course, defining these filters and setting up a dedicated DNS server can cost money.</p> <p dir="ltr">In fact, you can have a filtering system for the sites you want in your business for a small fee. But OpenDNS DNS is free for smaller, less capable networks.</p> <p dir="ltr">To be able to use these DNS, it is sufficient to define the IP address of the OpenDNS servers described below in the desired device:</p> <p dir="ltr">&nbsp;</p> <table class="tablemix" dir="ltr"> <tbody> <tr> <td colspan="4" width="499"> <p>OpenDNS Public DNS</p> </td> </tr> <tr> <td width="125"> <p>Secondary IPv6</p> </td> <td width="125"> <p>Primary IPv6</p> </td> <td width="125"> <p>Secondary IPv4</p> </td> <td width="125"> <p>Primary IPv4</p> </td> </tr> <tr> <td width="125"> <p>35:119:2620::35</p> </td> <td width="125"> <p>53:119:2620::53</p> </td> <td width="125"> <p>208.67.220.220</p> </td> <td width="125"> <p>208.67.222.222</p> </td> </tr> </tbody> </table> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/300.webp" alt="Comodo Secure DNS" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h3 dir="ltr">Comodo Secure DNS</h3> <p dir="ltr">Comodo Group is a computer company specializing in security protocols to create greater security in computer networks. This company was founded in UK in 1998. The headquarters of this company is located in America.</p> <p dir="ltr">Comodo Group offers many services and software packages, including VPNs, virus and malware scanners, and software used to increase network security.</p> <p dir="ltr"><a href="https://www.comodo.com/secure-dns/">Comodo Secure DNS</a> is also one of the products of Comodo Group and currently these DNS servers can be said to be one of the largest and most powerful public DNS in the world.</p> <p dir="ltr">In general, Comodo Group products are used for their focus on safety. Comodo Secure DNS, like other products from this company, focuses heavily on DNS security.</p> <p dir="ltr">As for OpenDNS, as I explained above, OpenDNS blocks phishing sites by default, but Comodo Secure DNS goes further and detects not only phishing sites but malware sites as well.</p> <p dir="ltr">One site can store user information or another site can add malicious code to your browser. Comodo Secure DNS detects these sites and warns you about them to be safer on the Internet.</p> <p dir="ltr">Along with the high security of Comodo Secure DNS and the features that this DNS offers you, there are also problems with computers using Comodo Secure DNS.</p> <p dir="ltr">In fact, due to the existence of certain levels of security that this product provides you more than other DNS, its performance also seems slower.</p> <p dir="ltr">This company claims that they have provided special services for game consoles on their DNS servers, but unfortunately the quality of these servers is still not suitable for many online games.</p> <p dir="ltr">Comodo Secure DNS IPv4</p> <p dir="ltr">Primary: 8.26.56.26</p> <p dir="ltr">secondary: 8.20.247.20</p> <p dir="ltr">One of the problems that can be brought to this company is that on its official website there is no version 6 of the IP to be used to set up this DNS.</p> <p dir="ltr">The Comodo Group itself suggests that you set up DNS servers on your home router and modems. But you can also set up these DNS on your computer.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/301.webp" alt="Quad9 DNS" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h3 dir="ltr">Quad9 DNS</h3> <p dir="ltr"><a href="https://www.quad9.net/">Quad9 DNS</a> is a new server to provide hosting and DNS services. As a free and new DNS server, Quad9's capabilities are admirable, but its power is less than other popular DNS servers.</p> <p dir="ltr">This DNS server has been operating since 2014, and among its capabilities, we can mention the detection of malicious sites. But surely Cloudflare and OpenDNS are much stronger and more efficient than Quad9 DNS.</p> <p dir="ltr">In fact, Quad9 DNS does not offer you any special features. As far as security is concerned, it cannot be said to be any better than other public DNS. The only thing that can be mentioned is that this DNS detects infected sites for free. And it does not charge users for providing this feature.</p> <p dir="ltr">However, in Iran, there are many people in this field who have not even heard this company's name, and they definitely don't use this company's DNS. Quad9 claims to be good for gaming, but experience has shown that this DNS cannot work well in this area.</p> <p dir="ltr">To use this company's DNS, simply enter the following information into your computer or device:</p> <p dir="ltr">&nbsp;</p> <table class="tablemix" dir="ltr"> <tbody> <tr> <td colspan="4" width="499"> <p>Quad9 Public DNS</p> </td> </tr> <tr> <td width="125"> <p>Secondary IPv6</p> </td> <td width="125"> <p>Primary IPv6</p> </td> <td width="125"> <p>Secondary IPv4</p> </td> <td width="125"> <p>Primary IPv4</p> </td> </tr> <tr> <td width="125"> <p>2620:fe::9</p> </td> <td width="125"> <p>2620:fe::fe</p> </td> <td width="125"> <p>149.112.112.112</p> </td> <td width="125"> <p>9.9.9.9</p> </td> </tr> <tr> <td width="125"> <p>2620:fe::fe:10</p> </td> <td width="125"> <p>2620:fe::10</p> </td> <td width="125"> <p>149.112.112.10</p> </td> <td width="125"> <p>9.9.9.10</p> </td> </tr> <tr> <td width="125"> <p>2620:fe::fe:11</p> </td> <td width="125"> <p>2620:fe::11</p> </td> <td width="125"> <p>149.112.112.11</p> </td> <td width="125"> <p>9.9.9.11</p> </td> </tr> </tbody> </table> <p dir="ltr">&nbsp;</p> <p dir="ltr">Except for the things I explained above, many DNS servers operate publicly on the Internet, which you can use depending on your needs.</p> <p dir="ltr">In some cases, for games you can play using a VPN, choosing a suitable DNS server can eliminate the need for a VPN.</p> <h2 dir="ltr">DNS Server Setup</h2> <p dir="ltr">There are several ways to change or set DNS server in different operating systems. The first problem is that you, as a network administrator or help desk, can change a computer's DNS servers.</p> <p dir="ltr">Changing DNS on networks that you are not the administrator of could cause problems. In fact, you shouldn't have access to change DNS in networks you're not the administrator of.</p> <p dir="ltr">So if you are an employee of a company and even if your knowledge is higher than the administrator of that network; The best thing is to go to the administrator of that company to change the DNS servers of your computer.</p> <p dir="ltr">In large networks, DNS changes are not applied to computers on the network individually. Even in average networks, you may be dealing with thousands of computers, and changing and applying each setting on each of those computers takes a long time.</p> <p dir="ltr">In networks, DNS settings are done through a set of policies in networks or DNS is set as an option by the DHCP server.</p> <p dir="ltr">Of course, this can be different depending on the scenario you have in your network, you can define a set of scripts for the computers in your computer network that will change the DNS of the computers when this script is run.</p> <p dir="ltr">There can be several methods of changing a computer's DNS based on its operating system, and it is a network administrator's art to choose the best one among them for her job.</p> <p dir="ltr">Next, I'll tell you how to change your DNS server on different operating systems.</p> <h3 dir="ltr">DNS settings in Windows</h3> <p dir="ltr">First, right-click on the network icon in the lower right corner of the screen and select Open Internet and network settings.</p> <p dir="ltr">In the Network Status window that opens, select Change adapter options to display the Network Connections window.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/268.webp" alt="تنظیم DNS در Windows" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">Depending on your version of Windows, the Change adapter options option may look different from my screenshot. You can also access this window from the following path:</p> <p dir="ltr"><code>Control Panel\All Control Panel Items\Network Connections</code></p> <p dir="ltr">There may have been changes in different versions of each operating system based on the graphical environment, that's why network administrators never open such windows through these paths.</p> <p dir="ltr">As for the path above, it's best to do it through the RUN window. For this, just press the "Win+R" buttons to open the RUN window. Then enter the word "ncpa" in the box. cpl" and click ok.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/269.webp" alt="تنظیم DNS در Windows" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">In the Network Connections window, you may have different items depending on the connections you have created for your computer. Or, depending on the software and VPNs you install, you may see items in this window.</p> <p dir="ltr">For example, if your computer has a wireless network card like mine, you'll likely see an entry with the Wi-Fi name or your device manufacturer's name in this window.</p> <p dir="ltr">You can define different DNS servers for each of your computer's network connections. For this, simply right click on each of these connections and select the properties option.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/270.webp" alt="تنظیم DNS در Windows" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">As you can see, there is a security icon next to the properties option. This means that only members of the administrators group can select this option and access the Ethernet Status section. On the Ethernet Status page, you need to select the properties option.</p> <p dir="ltr">By selecting the properties option, a window called Ethernet Properties will appear, where many settings related to each connection on this page are located.</p> <p dir="ltr">If you want to specify a DNS server for your computer, you need to define the IP address of your DNS server for the computer. Now this IP address can be either IPv4 or IPv6.</p> <p dir="ltr">If you want to define an IPv4 for connecting to the desired DNS server, you need to double click on the Internet Protocol Version 4 option in the Ethernet properties window.</p> <p dir="ltr">And if you want to define an IPv6 for your desired DNS server connection, you need to double click the Internet Protocol Version 6 option in the Ethernet properties window.</p> <p dir="ltr">In each of these sections, you can specify two DNS servers for each type of IP address. Your computer's DNS servers may be defined automatically, or you may want to define them manually.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/271.webp" alt="تنظیم DNS در Windows" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">To determine the DNS servers, you need to select the Use the following DNS server address option and enter the IP of the DNS servers under it. Then OK all open windows so that the changes are applied.</p> <p dir="ltr">As for DNS servers, there are more settings for DNS that you will learn about in the future. Actually, about DNS, I didn't really understand DNS until I set up a DNS server.</p> <h3 dir="ltr">Change DNS Server in Android</h3> <p dir="ltr">In Android operating systems, like all other operating systems, you can set the desired DNS server on your connection by installing a series of software.</p> <p dir="ltr">But what we will explain in this article is the DNS setting within the settings that you will have on your phone. What I'm explaining here might be a little different than what's on your phone.</p> <p dir="ltr">My goal of this article is to familiarize you more with DNS settings on different devices. And certainly, most of the devices existing in computer networks need DNS server to perform operations.</p> <p dir="ltr">If you have any questions in doing the things I explain to you or you are having problems setting up DNS on your device, you can let us know through the comments section so that over time this article related to DNS server will be more complete.</p> <p dir="ltr">In Android operating systems, based on the version of Android each phone uses and changes made by manufacturers to each system's firmware; The DNS change process might be a little different.</p> <p dir="ltr">In Android operating systems you can select the Private DNS option by referring to the phone settings (Settings) in the Connection points (Connection and Sharing) section.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/273.webp" alt="Change DNS Server in Android" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">And in the Select Private DNS Mode section, choose Private DNS provider hostname. Then you can enter your DNS server in the created box.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/274.webp" alt="Change DNS Server in Android" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">Please note that the names of these parts may be slightly different depending on the version of Android and the operating system customized by the phone manufacturer. Also, these operations can only be performed on new Androids.</p> <p dir="ltr">Furthermore, in Android operating systems, you can also change the DNS server of your Wi-Fi connection through a series of settings. For this, access the Wi-Fi connection section of your device and set the IP protocol settings (IP Settings) to Static from the Advanced connection section.</p> <p dir="ltr">Pay attention to the fact that in some smartphones the Advanced option is shown with other names, for example the name of this section could be Details or About. And you can't make these settings until you connect your phone to a hotspot.</p> <p dir="ltr">After entering the Network Details section, you can change the settings of each Wi-Fi connection by changing the IP setting from DHCP to Static or Manual. For example, you can change your IP address and your gateway in the network you are connected to.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/275.webp" alt="Change DNS Server in Android" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">Among the settings you can change are the DNS server settings.</p> <h3 dir="ltr">Change DNS Server in Windows Phone</h3> <p dir="ltr">Of course, there are currently very few people using phones with the Windows Phone operating system. Microsoft itself does not support many of these mobile phones.</p> <p dir="ltr">To change the DNS server in the Wi-Fi connection, you must first go to the Settings section from the Menu section.</p> <p dir="ltr">Then enter the WiFi section from the network+wireless section and select the Static IP option at the bottom of the screen.</p> <p dir="ltr">In the next step, you need to activate the settings related to Manually configure network settings and in the DNS section you can manually set the DNS server of the Wi-Fi connection.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/272.webp" alt="Change DNS Server in Windows Phone" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">The best DNS service providers</h2> <p dir="ltr">Since there are many public DNS on the Internet, there are also many companies whose DNS services you can use. If you also live in Iran, you better know that some of these companies boycott Iran and do not provide services to Iranian users.</p> <p dir="ltr">Some other companies are also filtered in Iran based on the services they provide and if you want to use some of the services of these companies then you will face problems.</p> <p dir="ltr">I will introduce you to the best DNS service providers in the future. These providers are best suited to people who intend to provide a service over the Internet.</p> <p dir="ltr">For example, instead of wanting to set up a DNS server on the Internet, you can use the online services of these companies and service providers. Otherwise, you won't really need these servers.</p> <p dir="ltr">Most of these companies that provide DNS services also have public DNS so that in addition to providing services, people can also use their own DNS servers on the Internet.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr">&nbsp;</p>urn:store:1:blog:post:1150https://mixseda.com/internet-protocolInternet Protocol<p>&nbsp;</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/پروتکل-اینترنت" rel="follow"><button>FA (Persian)</button></a></p> <p dir="ltr"><img src="/images/uploaded/blog03/293.webp" alt="Internet Protocol" width="100%" /></p> <p dir="ltr">IP stands for Internet Protocol. The most important task of the IP protocol is to route and specify the origin and destination of a packet. IP, like many other protocols in the network, has different versions and standards.</p> <p dir="ltr">Currently, what is very common in computer networks is IPv4. Naturally, IPv6 should have been used in all computer networks by the end of 2022.</p> <p dir="ltr">In fact, one of IPv4's big problems is how small it is compared to computers around the world. The structure of IPv4 is different from IPv6. The IPv4 structure consists of four 8-bit sections, with a period between each 8 bit; That is, in general, IPv4 is a 32-bit address.</p> <p dir="ltr">That is, in the real world, you will be able to have 4,294,967,296 IPv4 numbers, which is very small compared to the number of computers in the world. The IP address consists of two parts NetID and HostID.</p> <p dir="ltr">NetID or net id determines the extent of your computer network and host ID makes your computer unique in a computer network. Unlike the story we had in different sections of MAC address, in IP address, the value of net id and host id may not be same in one IP address.</p> <p dir="ltr">What I mean is that in the 48-bit MAC address we said, it consists of two parts: OUI and Device ID, each of these parts is 24 bits, that is, the number of their bits is equal to each other. But in IP address, in most cases, network id and host id are not same number of bits.</p> <h2 dir="ltr">Subnet mask</h2> <p dir="ltr">The important question here is: what determines how many bits of each IP address are related to the host ID and how many bits are related to the network ID?</p> <p dir="ltr">Next to each IP address, another component called a subnet is specified, which determines the Net ID bits. In computer networks, the network administrator determines what IP address each computer on which subnet will have.</p> <p dir="ltr">The subnet mask actually determines how much of an IP address belongs to the Net ID. For example, you need to enter a subnet mask when setting the IP on your computer.</p> <p dir="ltr">If you enter the value 255.255.255.0 in this field, it means that your Net id contains 24 bits and your Host id contains 8 bits. In some systems, this value is also referred to as 24.</p> <p dir="ltr">That is, the high value is displayed as "192.168.100.1/24" in some systems. After the "/" sign, the number of bits belonging to the net id is placed. In fact, everything is related to the conversion of decimal numbers to binary.</p> <p dir="ltr">You can't have any subnet mask you want. Actually, since the bits are added one by one, no desired subnet mask can be created.<br />In the table below, I have written for you the available subnet masks for IPv4:</p> <p dir="ltr">&nbsp;</p> <table class="tablemix" dir="ltr"> <tbody> <tr> <td width="185"> <p>Subnet mask</p> </td> <td width="263"> <p>Binary mask</p> </td> <td width="175"> <p>CIDR</p> </td> </tr> <tr> <td width="185"> <p>255.0.0.0</p> </td> <td width="263"> <p>11111111.00000000.00000000.00000000</p> </td> <td width="175"> <p>/8</p> </td> </tr> <tr> <td width="185"> <p>255.128.0.0</p> </td> <td width="263"> <p>11111111.10000000.00000000.00000000</p> </td> <td width="175"> <p>/9</p> </td> </tr> <tr> <td width="185"> <p>255.192.0.0</p> </td> <td width="263"> <p>11111111.11000000.00000000.00000000</p> </td> <td width="175"> <p>/10</p> </td> </tr> <tr> <td width="185"> <p>255.224.0.0</p> </td> <td width="263"> <p>11111111.11100000.00000000.00000000</p> </td> <td width="175"> <p>/11</p> </td> </tr> <tr> <td width="185"> <p>255.240.0.0</p> </td> <td width="263"> <p>11111111.11110000.00000000.00000000</p> </td> <td width="175"> <p>/12</p> </td> </tr> <tr> <td width="185"> <p>255.248.0.0</p> </td> <td width="263"> <p>11111111.11111000.00000000.00000000</p> </td> <td width="175"> <p>/13</p> </td> </tr> <tr> <td width="185"> <p>255.252.0.0</p> </td> <td width="263"> <p>11111111.11111100.00000000.00000000</p> </td> <td width="175"> <p>/14</p> </td> </tr> <tr> <td width="185"> <p>255.254.0.0</p> </td> <td width="263"> <p>11111111.11111110.00000000.00000000</p> </td> <td width="175"> <p>/15</p> </td> </tr> <tr> <td width="185"> <p>255.255.0.0</p> </td> <td width="263"> <p>11111111.11111111.00000000.00000000</p> </td> <td width="175"> <p>/16</p> </td> </tr> <tr> <td width="185"> <p>255.255.128.0</p> </td> <td width="263"> <p>11111111.11111111.10000000.00000000</p> </td> <td width="175"> <p>/17</p> </td> </tr> <tr> <td width="185"> <p>255.255.192.0</p> </td> <td width="263"> <p>11111111.11111111.11000000.00000000</p> </td> <td width="175"> <p>/18</p> </td> </tr> <tr> <td width="185"> <p>255.255.224.0</p> </td> <td width="263"> <p>11111111.11111111.11100000.00000000</p> </td> <td width="175"> <p>/19</p> </td> </tr> <tr> <td width="185"> <p>255.255.240.0</p> </td> <td width="263"> <p>11111111.11111111.11110000.00000000</p> </td> <td width="175"> <p>/20</p> </td> </tr> <tr> <td width="185"> <p>255.255.248.0</p> </td> <td width="263"> <p>11111111.11111111.11111000.00000000</p> </td> <td width="175"> <p>/21</p> </td> </tr> <tr> <td width="185"> <p>255.255.252.0</p> </td> <td width="263"> <p>11111111.11111111.11111100.00000000</p> </td> <td width="175"> <p>/22</p> </td> </tr> <tr> <td width="185"> <p>255.255.254.0</p> </td> <td width="263"> <p>11111111.11111111.11111110.00000000</p> </td> <td width="175"> <p>/23</p> </td> </tr> <tr> <td width="185"> <p>255.255.255.0</p> </td> <td width="263"> <p>11111111.11111111.11111111.00000000</p> </td> <td width="175"> <p>/24</p> </td> </tr> <tr> <td width="185"> <p>255.255.255.128</p> </td> <td width="263"> <p>11111111.11111111.11111111.10000000</p> </td> <td width="175"> <p>/25</p> </td> </tr> <tr> <td width="185"> <p>255.255.255.192</p> </td> <td width="263"> <p>11111111.11111111.11111111.11000000</p> </td> <td width="175"> <p>/26</p> </td> </tr> <tr> <td width="185"> <p>255.255.255.224</p> </td> <td width="263"> <p>11111111.11111111.11111111.11100000</p> </td> <td width="175"> <p>/27</p> </td> </tr> <tr> <td width="185"> <p>255.255.255.240</p> </td> <td width="263"> <p>11111111.11111111.11111111.11110000</p> </td> <td width="175"> <p>/28</p> </td> </tr> <tr> <td width="185"> <p>255.255.255.248</p> </td> <td width="263"> <p>11111111.11111111.11111111.11111000</p> </td> <td width="175"> <p>/29</p> </td> </tr> <tr> <td width="185"> <p>255.255.255.252</p> </td> <td width="263"> <p>11111111.11111111.11111111.11111100</p> </td> <td width="175"> <p>/30</p> </td> </tr> <tr> <td width="185"> <p>255.255.255.254</p> </td> <td width="263"> <p>11111111.11111111.11111111.11111110</p> </td> <td width="175"> <p>/31</p> </td> </tr> <tr> <td width="185"> <p>255.255.255.255</p> </td> <td width="263"> <p>11111111.11111111.11111111.11111111</p> </td> <td width="175"> <p>/32</p> </td> </tr> </tbody> </table> <p dir="ltr">&nbsp;</p> <p dir="ltr">If you use subnet mask 255.255.255.252 in your network then two bits left for hostid and you can generate 4 IPs with these two bits.</p> <p dir="ltr">If you use subnet mask 255.255.255.248 in your network, you will have three bits for hostid and you can generate 8 ip with these three bits. And likewise, if you use the /24 subnet, you can have 256 IPs in total.</p> <p dir="ltr">It means you can produce 0 to 255 numbers with 8 bits. This means that, in total, we will have 256 one-octet numbers. If all host ID bits in an IP address are zero, this IP address is called a network ID.</p> <p dir="ltr">And if all hostid bits in an IP address are equal to one, this IP address is called IP broadcast. It means that it is true that we have the ability to create 256 IP addresses with 8 bits, but we cannot assign this number to hosts on the network.</p> <p dir="ltr">Out of these 256 IP addresses, we have two IP addresses related to Broadcast IP and Network ID. Consequently, out of these 256 IP addresses, we can only assign 254 IP addresses to hosts in the network.</p> <p dir="ltr">That is, if you use the /30 subnet mask, you can only have two hosts in your network.</p> <h2 dir="ltr">IP Address version 6</h2> <p dir="ltr">The main reason for producing IPv6 was that there was a limit on the number of IPs in IPv4. Of course, IPv4 had other flaws that we haven't seen in IPv6.<br />IP is actually the logical address used in the third layer of the alleged OSI model.</p>urn:store:1:blog:post:1148https://mixseda.com/mac-addressMAC Address<p>&nbsp;</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/مک-آدرس-چیست" rel="follow"><button>FA (Persian)</button></a></p> <p dir="ltr"><img src="/images/uploaded/blog03/256_1000.webp" alt="What is MAC address?" width="100%" /></p> <p dir="ltr">MAC stands for Media Access Control, a unique 48- or 64-bit physical address for each network device. The MAC address is defined on network NICs or network cards. MAC is a burn-in address, i.e. it is engraved on the hardware by the manufacturer.</p> <p dir="ltr">Also, the NIC factory is not allowed to put any MACs on the NICs they manufacture. Imagine that all the factories that were going to make network cards randomly chose MAC.</p> <p dir="ltr">If such an event occurs, it is possible that two network cards in a computer network have the same MAC address, the software finds it, and as a result, two devices in the network have the same MAC address and the same physical addresses.</p> <p dir="ltr"><strong>So what's the solution?</strong></p> <p dir="ltr">There is an organization in the world called IEEE, one of the tasks of this organization is to manage all MAC addresses. IEEE stands for Institute of Electrical and Electronics Engineers and actually does the job of standardizing MAC addresses.</p> <p dir="ltr">The standard that IEEE considered for the MAC address is called EUI-48. This standard replaced the MAC-48 and EUI-64 standards. Any devices such as home computers (PCs), laptops, printers, smartphones and gadgets, home modems, etc. that are supposed to work on a network must follow this standard.</p> <p dir="ltr">EUI-48 means unique identifier extended by 48 bits. The EUI-48 and MAC-48 standards are very similar to each other.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/257_1000.webp" alt="Institute of Electrical and Electronics_EUI-48" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">The MAC address has 48 bits, of which 24 bits are always determined by the IEEE organization itself for factories. The second 24 bits are set at the factory. 24 bits means 24 to 0s and 1s. That is, the number of NICs a factory can produce with 24 bits will be 16,777,216.</p> <p dir="ltr">The first part of the MAC address determined by the IEEE is called the OUI, and the second 24 bits of the MAC address, which are engraved on the hardware by the manufacturer, are called the device ID. Also, the physical MAC address has a written structure.</p> <p dir="ltr">The MAC address is written in hexadecimal format and separated by a ":" character. In hexadecimal, the base numbers are 16. That is, in this system, the symbols 0 to 9 are used for the values 0 to 9 and the symbols A to F are used for the values 10 to 15.</p> <p dir="ltr">After 0 to 15 the values are the digits with which the hexadecimal is created. You should know how to convert binary, hexadecimal and decimal numbers between them.</p> <table class="tablemix"> <tbody> <tr> <td width="208"> <p>Hex</p> </td> <td width="208"> <p>Binary</p> </td> <td width="208"> <p>Decimal</p> </td> </tr> <tr> <td width="208"> <p>0</p> </td> <td width="208"> <p>0000</p> </td> <td width="208"> <p>0</p> </td> </tr> <tr> <td width="208"> <p>1</p> </td> <td width="208"> <p>0001</p> </td> <td width="208"> <p>1</p> </td> </tr> <tr> <td width="208"> <p>2</p> </td> <td width="208"> <p>0010</p> </td> <td width="208"> <p>2</p> </td> </tr> <tr> <td width="208"> <p>3</p> </td> <td width="208"> <p>0011</p> </td> <td width="208"> <p>3</p> </td> </tr> <tr> <td width="208"> <p>4</p> </td> <td width="208"> <p>0100</p> </td> <td width="208"> <p>4</p> </td> </tr> <tr> <td width="208"> <p>5</p> </td> <td width="208"> <p>0101</p> </td> <td width="208"> <p>5</p> </td> </tr> <tr> <td width="208"> <p>6</p> </td> <td width="208"> <p>0110</p> </td> <td width="208"> <p>6</p> </td> </tr> <tr> <td width="208"> <p>7</p> </td> <td width="208"> <p>0111</p> </td> <td width="208"> <p>7</p> </td> </tr> <tr> <td width="208"> <p>8</p> </td> <td width="208"> <p>1000</p> </td> <td width="208"> <p>8</p> </td> </tr> <tr> <td width="208"> <p>9</p> </td> <td width="208"> <p>1001</p> </td> <td width="208"> <p>9</p> </td> </tr> <tr> <td width="208"> <p>A</p> </td> <td width="208"> <p>1010</p> </td> <td width="208"> <p>10</p> </td> </tr> <tr> <td width="208"> <p>B</p> </td> <td width="208"> <p>1011</p> </td> <td width="208"> <p>11</p> </td> </tr> <tr> <td width="208"> <p>C</p> </td> <td width="208"> <p>1100</p> </td> <td width="208"> <p>12</p> </td> </tr> <tr> <td width="208"> <p>D</p> </td> <td width="208"> <p>1101</p> </td> <td width="208"> <p>13</p> </td> </tr> <tr> <td width="208"> <p>E</p> </td> <td width="208"> <p>1110</p> </td> <td width="208"> <p>14</p> </td> </tr> <tr> <td width="208"> <p>F</p> </td> <td width="208"> <p>1111</p> </td> <td width="208"> <p>15</p> </td> </tr> </tbody> </table> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/259.webp" alt="MAC های 64 بیتی" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">64-bit mac addresses</h2> <p dir="ltr">In some networks using IPv6, 64-bit MAC addresses are used for each network device. The reason for using these kinds of physical addresses is that the mirroring expectation of 48-bit MAC addresses will end someday.</p> <p dir="ltr">By having 48 bits (that is, 48 numbers 0 and 1 next to each other), it is possible to produce 2 to the power of 48 different ways. This means you'll be able to have 281,474,976,710,656 different ways for 48-bit MAC addresses.</p> <p dir="ltr">In the case of 48-bit MAC addresses, it is expected that until the year 2100 we will not have the problem of missing physical addresses on the basis of Ethernet technology, but nevertheless, in some network devices, the problem of missing these addresses is already expected.</p> <p dir="ltr">Also, when all networks migrate from IPv4 to IPv6, we probably won't have 48-bit MAC addresses anymore. Using 64-bit we would have 18,446,744,073,709,551,616 different states.</p> <h2 dir="ltr">MAC Address numbering</h2> <p dir="ltr">To determine the MAC address, two different numbering methods called UAA (Universally Administered Address) and LAA (Locally Administered Address) are used.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/258_1000.webp" alt="شماره گذاری MAC Address" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h3 dir="ltr">Universally Administered Address</h3> <p dir="ltr">UAA is the physical address that the factory stamps on a NIC's hardware. That is, in fact, UAA includes the default MAC address of a hardware in the network platform, and as we explained above, its 24 bits including OUI are specified by IEEE and the other 24 bits are specified as Device ID from the factory yes .</p> <p dir="ltr">OUI stands for Organizationally Unique Identifier and indicates a unique organizational identifier. For the first time, IEEE allocates one OUI to each company and if all MACs of this OUI are used up, companies can purchase a new OUI by paying a fee to IEEE and use it for their devices.</p> <p dir="ltr">Therefore, through the first 24 bits of the MAC Address of a piece of hardware, it is possible to find out which company it belongs to. I wanted to list you the OUIs of different companies, but unfortunately the number of these OUIs for each company is large.</p> <p dir="ltr">Through the <a href="https://ouilookup.com/">ouilookup site</a>, you can find out which company your hardware is made by, or what OUIs each company has.</p> <h3 dir="ltr">Locally Administered Address</h3> <p dir="ltr">LLA is the address changing MAC value. If a device's LLA changes, that device will use that value as its MAC address on the network. There is a small chance that the MAC address of two devices is the same in networks.</p> <p dir="ltr">Changing the LLA and changing the MAC address usually has other uses in computer networks. But if for any reason you see similar MAC addresses in your computer network, simply change the LLA of one of these devices.</p> <p dir="ltr">For example, if your computer or servers receive a specific service using MAC address, you may need to change your device's MAC and physical address. Or it may be possible in some organizations to access a specific service only through a specific MAC.</p> <p dir="ltr">There are other reasons to change the MAC address, many of these reasons are related to security issues and we will discuss them in the future. As can be seen from the name LAA, this type of MAC address is used for local networks.</p> <h2 dir="ltr">The meaning of MAC Address</h2> <p dir="ltr">MAC addresses, in addition to specifying which company manufactured the NIC devices, can have other meanings as well. For example, you can find out if it's <a href="/logical-classification-of-networks">unicast or multicast</a> from the MAC address.</p> <p dir="ltr">Each 8 bit is called a byte or octet. Therefore, a 48-bit MAC address contains 6 bytes or 6 octets. The eighth bit of the first octet of a MAC address determines whether the MAC address is unicast or multicast.</p> <p dir="ltr">So that if the 8th bit of the first octet equals 0, that MAC address is unicast and if the 8th bit of the first octet equals 1, that MAC address is multicast.</p> <p dir="ltr">Also, the seventh bit of this octet determines whether a MAC address is set globally or locally.</p> <p dir="ltr">The meaning of a global or local MAC address is that this MAC address is set by the network administrator or is set by default by the manufacturer.</p> <p dir="ltr">If the MAC address is set or changed by the network administrator; The seventh bit of its first octet will be equal to 1, and in fact this type of MAC address is of type LAA. If the seventh bit of the first octet equals zero, this MAC address is of type UAA.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/260_1000.webp" alt="معنی MAC Address" width="100%" /></p>urn:store:1:blog:post:1146https://mixseda.com/review-of-the-osi-modelReview of the OSI Model<p>&nbsp;</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/برسی-مدل-osi" rel="follow"><button>FA (Persian)</button></a></p> <p dir="ltr"><img src="/images/uploaded/blog03/251_1000.webp" alt="Review of the OSI Model" width="100%" /></p> <p dir="ltr">If you ask anyone what the most important principle was in learning the net+ course, most people will point to the OSI model. Concept learning of this model is very practical for people and you can learn many concepts better by learning it.</p> <p dir="ltr">Actually, I didn't want this article to be that long and boring. For network+ topics, you may only need half of what I've described in the article below.</p> <p dir="ltr">Even on the protocols of each layer that I explained in the article about it, you don't need to know much about these things and in many classes and trainings they only talk about it.</p> <p dir="ltr">The reason I looked so closely at the OSI model is mainly because I wanted to share everything I knew with you. Also, as I explained to you in the <a href="/network-plus-course-training">introduction to the Network+ training</a>, one of the goals of these educational articles is to learn more about myself and the course of discussions.</p> <p dir="ltr">Due to the length of this article, I have prepared a list of its titles so that you can easily access each part of the article:</p> <p dir="ltr">1.<a href="#Introduction">Introduction</a><br />2.<a href="#What_is_the_OSI_model">What is the OSI model?</a><br />3.<a href="#Components_of_the_OSI_model">Components of the OSI model</a><br />3.1.<a href="#Physical_layer">Physical layer</a><br />3.2.<a href="#Data_link_layer">Data link layer</a><br />3.2.1.<a href="#Arbitration">Arbitration</a><br />3.2.1.1.<a href="#CSMA_CD">CSMA / CD</a><br />3.2.1.2.<a href="#CSMA_CA">CSMA / CA</a><br />3.2.2.<a href="#Physical_Addressing">Physical Addressing</a><br />3.2.3.<a href="#Error_Checking">Error Checking</a><br />3.2.4.<a href="#Datalink_Encapsulation_Decapsulation">Encapsulation/Decapsulation</a><br />3.2.5.<a href="#Famous_protocols_of_data_link_layer">Famous protocols of data link layer</a><br />3.2.5.1.<a href="#PPP">PPP</a><br />3.2.5.2.<a href="#ATM">ATM</a><br />3.2.5.3.<a href="#Ethernet">Ethernet</a><br />3.3.<a href="#Network_layer">Network layer</a><br />3.3.1.<a href="#Routing">Routing</a><br />3.3.2.<a href="#Logical_Addressing">Logical Addressing</a><br />3.3.3.<a href="#Error_Detection">Error Detection</a><br />3.3.4.<a href="#Network_layer_Encapsulation_Decapsulation">Encapsulation/Decapsulation</a><br />3.3.5.<a href="#famous_protocols_of_the_Network_layer">The famous protocols of the Network layer</a><br />3.3.5.1.<a href="#IP">IP</a><br />3.3.5.2.<a href="#ARP">ARP</a><br />3.3.5.3.<a href="#ICMP">ICMP</a><br />3.3.5.4.<a href="#IPsec">IPsec</a><br />3.4.<a href="#Transport_layer">Transport layer</a><br />3.4.1.<a href="#Segmentation">Segmentation</a><br />3.4.2.<a href="#Flow_Control">Flow Control</a><br />3.4.3.<a href="#Error_Handling">Error Handling</a><br />3.4.4.<a href="#Segment_Sequencing">Segment Sequencing</a><br />3.4.5.<a href="#Service_Addressing">Service Addressing</a><br />3.4.6.<a href="#Famous_protocols_of_Transport">Famous protocols of Transport</a><br />3.4.6.1.<a href="#TCP">TCP</a><br />3.4.6.2.<a href="#UDP">UDP</a><br />3.5.<a href="#Session_layer">Session layer</a><br />3.5.1.<a href="#Famous_Session_layer_protocols">Famous Session layer protocols</a><br />3.5.1.1.<a href="#NetBios">NetBios</a><br />3.5.1.2.<a href="#PPTP">PPTP</a><br />3.5.1.3.<a href="#PAP">PAP</a><br />3.6.<a href="#Presentation_layer">Presentation layer</a><br />3.6.1.<a href="#famous_protocols_of_the_Presentation_layer">famous protocols of the Presentation layer</a><br />3.6.1.1.<a href="#SSL">SSL</a><br />3.6.1.2.<a href="#TLS">TLS</a><br />3.7.<a href="#Application_layer">Application layer</a><br />3.7.1.<a href="#Famous_application_layer_protocols">Famous application layer protocols</a><br />3.7.1.1.<a href="#FTP">FTP</a><br />3.7.1.2.<a href="#http">http</a><br />3.7.1.3.<a href="#POP3">POP3</a><br />3.7.1.4.<a href="#SMTP">SMTP</a><br />3.7.1.5.<a href="#IRC">IRC</a><br />3.7.1.6.<a href="#SSH">SSH</a><br />3.7.1.7.<a href="#DNS">DNS</a><br />4.<a href="#Network_Admin_and_Engineering">Network Admin &amp; Engineering</a></p> <h2 id="Introduction" dir="ltr">Introduction - The need for computer networks</h2> <p dir="ltr">After the end of the world war, when the media war became more intense; The discussion about the remote transfer of data and information has become more important. The story started when spies operated in other countries and had problems when they wanted to send their information and findings.</p> <p dir="ltr">For example, spies in Russia wanted to send information to intelligence agencies in America. The story here was that Moscow was far from America, and the story wasn't the only distance. Even the transfer of information should be done in such a way that spies do not get into trouble.</p> <p dir="ltr">That is, in computer networks, like all other technologies, there was a military aspect in the beginning, and governments used this computer networking platform for espionage and other military applications. Among them, there were a number of government-affiliated companies that were responsible for the expansion of this platform.</p> <p dir="ltr">Usually, when a technology is monopolized by a system, it becomes public after a few years and is available to people. This work is beneficial to governments and countries in two respects. First, when a technology is publicly available because more people are working on it; More growth is directed towards technology.</p> <p dir="ltr">Second, governments release a technology to market when they have complete control over it, and by using it, they can spy on their own people or other countries and store their information.</p> <p dir="ltr">Later, in countries like Iran, it became clear that the reason we were weak in some areas was that we were using an information transfer platform originally designed for espionage. For example, after a period of war in the Middle East, soldiers realized they shouldn't use smartphones.</p> <p dir="ltr">The activation of GPS-equipped systems in wars could have irreparable consequences. Or in wars, the use of Internet systems can identify people's location. In a sense it can be said that when we use the Internet we are slaves to the information of developed countries such as the United States.</p> <p dir="ltr">After some time, the Americans themselves realized a major challenge in computer networks. The story began when other sciences were advancing faster than the knowledge of computer networks. Indeed, because the government had kept the Internet as a monopoly and did not make its science available to the public.</p> <p dir="ltr">That is, in general, before computer networking technology went public, it was only developed by a handful of companies like IBM, Xerox, and Intel. And these companies benefit greatly from the fact that this technology is not available to people.</p> <p dir="ltr">The story was not only about the uniqueness of the technologies, each of the companies that were tasked with developing computer networks used their own standards and technologies to develop the network. As a result, the products of IBM companies could not be integrated with Intel.</p> <p dir="ltr">The companies that worked exclusively and under government supervision on computer networks each had a technology to expand and connect the networks. Thanks to this technology, each company used its own <a href="/types-of-network-topology">network topology</a>.</p> <p dir="ltr">And based on this topology used by each company, the manufacturing company produced and marketed a number of parts and devices for itself. If you recall, one of the companies that had a monopoly on expanding computer networks was Xerox.</p> <p dir="ltr">Xerox was a company that used Ethernet technology and BUS topology. In this article, we will talk about Ethernet and its various standards.</p> <h2 id="What_is_the_OSI_model" dir="ltr">The OSI model</h2> <p dir="ltr">Due to the weakness of the networks, the government forced companies developing computer networks to use a single standard for data transmission in computer networks. ISO company, which is an enterprise in the field of global standards, decided to enter the field of network in 1970.</p> <p dir="ltr">ISO or International Organization for Standardization, which you must know, has set standards for manufacturers in the field of many food structures, technologies and products. You must have heard the name of this company in many TV commercials.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/252_1000.webp" alt="شرکت ISO" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">This company specializes in the field of manufacturing and standard products. The ISO company designed a standard called OSI in the field of computer networks. The OSI model stands for Open Systems Interconnection model, i.e. the system connection model in general.</p> <p dir="ltr">OSI is a hypothetical model consisting of seven layers where each of these layers has its own task and does its job. The word Interconnectedness means that there is an internal connection in this model and each level is connected with the two levels before and after it.</p> <p dir="ltr">To simplify the explanation, each layer interacts internally with another layer or layers. The OSI model is exactly like a factory production line; That is, the output product of each layer is ready to be used as feedstock in the next layer.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/250_1000.webp" alt="مدل OSI چیست" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">To better explain this issue, the OSI model is a hierarchical model. The philosophy of the OSI model was for manufacturers to produce and market their products based on the OSI model.</p> <p dir="ltr">On the other hand, as an administrator and manager of a computer network, I also design and expand my own network based on this OSI model. Also, one of the reasons for such a model was to teach students about the network and its components.</p> <p dir="ltr">Another reason was that if you would talk about a concept in the network, you could convey your exact meaning to the other party. For example, if you encountered a problem in your network, you could more easily convey your meaning to the other party using the OSI model.</p> <h2 id="Components_of_the_OSI_model" dir="ltr">Components of the OSI model</h2> <p dir="ltr">Well, we want to go to the different sections of OSI and explain each of these sections. OSI includes the following seven sections:</p> <ol dir="ltr"> <li>First layer: Physical layer</li> <li>Second layer: Data link layer</li> <li>Third layer: Network layer</li> <li>Fourth layer: Transport layer</li> <li>Fifth layer: Session layer</li> <li>The sixth layer: Presentation layer</li> <li>The seventh layer: Application layer</li> </ol> <p dir="ltr">You may see in some of your articles that the names of these layers have been translated into Farsi. Try to learn all the English concepts in the online world so that in the future when you want to read English articles you will understand their concepts.</p> <p dir="ltr">In the layers of the OSI model, the closer the layers are to the application, the more understandable they are. The application is the level closest to the user. Before explaining each of the components of the OSI model, I would like you to familiarize yourself with what port and protocol mean.</p> <p dir="ltr">Imagine me using Persian when I want to talk. If I want to communicate with another person, the other person must be able to communicate with me using the Persian language. This is exactly what protocol means.</p> <p dir="ltr">In the computer world, computers with the same protocols can communicate with each other. If I speak English with someone; The person in front of me must know English to be able to answer me. So, so far, protocol is the common language between systems.</p> <p dir="ltr">Imagine you want to enter a house, well, you definitely enter the house through the door. Your computer is like a house that has many doors for data and information to enter and exit. Each of these ports is called a port.</p> <p dir="ltr">Ports are specific ports on a computer system created for data input and output. On a computer, each port has its own use. And every packet sent to your computer is received by its own port on your computer.</p> <h3 id="Physical_layer" dir="ltr">Physical layer</h3> <p dir="ltr">The first layer of the OSI model is the physical layer. Within network cables, signals are transmitted as voltage between computers. Network card interfaces receive these voltages and your computer's network card converts them into bits.</p> <p dir="ltr">That is, the voltages that exist along the network cable are converted to 0s and 1s after this layer. In fact, for network cards, the algorithm is defined to convert the voltage to 0 and 1 in a certain period of time.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/253_1000.webp" alt="Physical layer" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">It's a bit difficult to explain the conversion of digital signals to bits and vice versa, but you can read about polar and unipolar encodings for a better understanding. In network cards, several voltage levels are usually used to display binary values.</p> <p dir="ltr">For example, imagine that voltages from +3V to +5V are considered bit 1 and voltages from -3V to -5V are considered bit 0 in network adapters. In fact, Manchester is used for data transfer in computer networks.</p> <p dir="ltr">Of course, no one will ask you about this code, but if you're interested in network card circuitry and how to transfer 0s and 1s in computer networks, you can research Manchester and the IEEE 802.3 standard.</p> <p dir="ltr">Such network cards can convert digital signals into digital data using a voltmeter at certain intervals of time.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/254_1000.webp" alt="Physical layer" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h3 id="Data_link_layer" dir="ltr">Data link layer</h3> <p dir="ltr">The tasks of the second layer of the network include 4 important parts:</p> <h4 id="Arbitration" dir="ltr">Arbitration</h4> <p dir="ltr">If you remember, when we were discussing computer network topologies, we explained that we have a concept called collision, which means interference and coincidence of data with each other.</p> <p dir="ltr">Well, no measures have been taken in the physical layer of the network to prevent collisions in the network. Instead, the next layer, which is the data link, has an important job called arbitration, which is supposed to resolve the collision.</p> <h5 id="CSMA_CD" dir="ltr">CSMA / CD</h5> <p dir="ltr">One of the methods of arbitration was the CSMA/CD mechanism designed by Xerox. This mechanism was designed in such a way that before sending information from a computer, it checks the medium and if it is down, sends the information to the destination computer.</p> <p dir="ltr">I would like to explain this problem easier, this mechanism monitors the network and if the network is silent and no other computer sends data, it transfers its data over the network.</p> <p dir="ltr">One possibility that existed in the interim was for two computers to control the media at the same time and upon realizing that the network is down, send the information at the same time; In this case, we will review Collision.</p> <p dir="ltr">For this reason the mechanism has been modified so that the first computer that detects a collision in the network informs all computers in the network that a collision has occurred. The signal that is sent to inform about the occurrence of collisions in networks is called a jam signal.</p> <p dir="ltr">After receiving the jam signal from the computers, all computers wait for a random amount of time and run the CSMA/CD process again. It means to check if the network is down again and if it is free, they will send the information.</p> <p dir="ltr">Since this time is randomly determined between computers, it is very unlikely that the random time of two computers will be equal to each other and the collision will happen again. There was a chance of collision in this mechanism, but this mechanism reduced the probability of collision.</p> <p dir="ltr">Indeed, CD at the end of the name of this mechanism means Collision Detection. That is, a mechanism for detecting collagen in the network.</p> <h5 id="CSMA_CA" dir="ltr">CSMA / CA</h5> <p dir="ltr">The IBM company designed another mechanism called CSMA/CA, i.e. Collision Avoidance, and claimed for the first time that collision and interference do not occur in computer networks. (This mechanism has been called Token Passing.)</p> <p dir="ltr">IBM used ring topology in its structure and designed hardware devices called MAUs, which actually didn't look like a ring topology, but these MAU devices changed the topology to ring.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/255_1000.webp" alt="Physical layer" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">The CSMA/CA mechanism worked in such a way that there was a specific flow called a token on the network. The token was actually a license to exchange information and there was only one token in the network. Now imagine that a computer is going to exchange data for hours.</p> <p dir="ltr">For this case, IBM had set a certain amount of data exchange. That is, a computer had no right to take possession of the token and use it as much as it wants. After exceeding the information exchange limit, the computer should hand over the token to other computers in the network.</p> <p dir="ltr">Not only was there a limit on the amount of data transferred in this mechanism, but there was also a time limit on having the token. So each computer, when it wanted to send information, would check the media and if no one had the token, it would start transferring the information.</p> <p dir="ltr">This mechanism was Collision Free which means you will not have any collision and interference in computer networks using this mechanism. But the interesting thing was that, contrary to IBM's ideas, due to the difficulty of implementing this structure and its high cost, this mechanism was not well received.</p> <p dir="ltr">Regarding the arbitration and its modalities, the following table can be used:</p> <p dir="ltr">&nbsp;</p> <table class="tablemix" dir="ltr"> <tbody> <tr> <td width="104"> <p>Row</p> </td> <td width="104"> <p>Manufacturer</p> </td> <td width="104"> <p>Technology</p> </td> <td width="104"> <p>Topology</p> </td> <td width="104"> <p>Arbitration</p> </td> <td width="104"> <p>Device</p> </td> </tr> <tr> <td width="104"> <p>1</p> </td> <td width="104"> <p>Xerox</p> </td> <td width="104"> <p>Ethernet</p> </td> <td width="104"> <p>BUS / Star</p> </td> <td width="104"> <p>CSMA/CD</p> </td> <td width="104"> <p>HUB</p> </td> </tr> <tr> <td width="104"> <p>2</p> </td> <td width="104"> <p>IBM</p> </td> <td width="104"> <p>Token ring</p> </td> <td width="104"> <p>Ring</p> </td> <td width="104"> <p>Token passing</p> </td> <td width="104"> <p>MAU</p> </td> </tr> </tbody> </table> <p dir="ltr">&nbsp;</p> <p dir="ltr">So, so far, the first task of Data link layer is Arbitration.</p> <h4 id="Physical_Addressing" dir="ltr">Physical Addressing</h4> <p dir="ltr">One of the important tasks of the data link layer is to generate and monitor the physical address of packets in the network. In the OSI model, neither layer should interfere with each other's work. Based on this, the data link layer basically doesn't notice the product being reached by the network layer.</p> <p dir="ltr">In effect, the data link layer should receive the products of the network layer, perform its activities on it, and deliver it to the physical layer. Or take the physical layer product and deliver it to the network layer after performing its functions.</p> <p dir="ltr">Now, one of the tasks of the Data link layer is to transfer all the product received from the higher layer, Network, into a specific container called payload and package it. Just like a parcel post you send out in the real world.</p> <p dir="ltr">Well, this postal package needs the recipient and sender address so that it can be sent to the destination computer. So the data link layer adds a source address and a destination address and a bunch of other stuff on each packet. These items are added to each package in the header section.</p> <p dir="ltr">Also, every package in computer networks has a footer or trailer. Before each packet is sent, everything in the header section is converted into code by a function called CRC (cyclic redundancy check).</p> <p dir="ltr">As a result of the CRC function, we will have a value called FCS, which is also called CRC Checksum. Now this value of FCS or CRC Checksum is written in the Trailer section of each package.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/261_1000.webp" alt="Physical layer" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">I really wanted to explain all the components of the header to you here, but I've come to the conclusion that this article is getting too long. Other than that, there are many specialized concepts and it is difficult to explain them with the knowledge you currently have from reading this article.</p> <p dir="ltr">When the packet reaches a computer, in the second layer, before anything is done to it, it checks if the packet was sent correctly. That is, the FCS value is again included in the reverse CRC function, and if its value equals the header, it is clear that the packet has successfully reached its destination.</p> <p dir="ltr">If the package is not sent successfully, the desired package will be discarded by the computer that received it. Another point is that the physical address is different in different technologies. For example, in Ethernet technology, the physical address is the same as the <a href="/mac-address">MAC address or the media access control address</a>.</p> <p dir="ltr">In ATM technology, which we will learn more about later, the physical address is defined by two concepts, VPI and VCI, which you may have seen when configuring telecommunication modems.</p> <h4 id="Error_Checking" dir="ltr">Error Checking</h4> <p dir="ltr">The data link layer performs the error checking task in two ways. One such method is called LLC or Logic Link Control. LLC is responsible for the integration and coordination of the frames. In short, LLC checks that the package format is correct.</p> <p dir="ltr">I want to explain more easily, packets are not sent like this out of order in the network world. All packets that exist in a network follow a set of standards and LLC is logically responsible for monitoring these standards.</p> <p dir="ltr">The second method for error checking in the data link layer is physical. In the second method, the physical address of each packet is checked so that the data link layer concludes that the packet has successfully reached its destination.</p> <h4 id="Datalink_Encapsulation_Decapsulation" dir="ltr">Encapsulation/Decapsulation</h4> <p dir="ltr">On the sender's side, every packet passing through the data link layer undergoes the encapsulation process before being sent. On the destination computer side, each received packet is first decapsulated before any processes are started on it.</p> <p dir="ltr">The product of the data link layer after encapsulation is frame. That is, in practice, the data link layer receives the network layer packet or payload and converts it into a frame, or it receives the frame and delivers it to the network layer as a packet.</p> <h4 id="Famous_protocols_of_data_link_layer" dir="ltr">Famous data link layer protocols</h4> <h5 id="PPP" dir="ltr">PPP</h5> <p dir="ltr">The PPP protocol, which stands for Point-to-Point, is a protocol in the second layer of the network whose job is to transfer data and information point-to-point. For some reasons, the PPP protocol is used in media where bandwidth is not limited.</p> <p dir="ltr">For example, this protocol is implemented over physical fiber optic links, serial cables, and other high-speed media. PPP protocol itself uses another protocol called LCP or Link Control Protocol for its function.</p> <p dir="ltr">In addition, the PPP communication protocol provides good services to network operators, one of which is the management of link quality and established communication.<br />Among other features and characteristics of the PPP protocol, we can mention the need for authentication in it. The existence of such a feature increases the security of information exchange.</p> <p dir="ltr">The first time this protocol was presented by the IEEE organization (Institute of Electrical and Electronics Engineers), but the company Cisco, modifying this protocol, provided an exclusive version of it called HDLC.</p> <p dir="ltr">Well, in many cases, HDLC is not used because many devices in your network may not be able to understand it, but usually in connections where you are using Cisco products on both sides of the case, it is definitely better to use the HDLC protocol.</p> <p dir="ltr">In the future, we will talk more about applications and how to set up this protocol, and for now, I wanted you to be familiar with this protocol.</p> <h5 id="ATM" dir="ltr">ATM</h5> <p dir="ltr">ATM protocol or asynchronous transfer mode is one of the protocols designed for fast transfer of a certain type of data. This protocol is used to transfer data such as audio and video.</p> <p dir="ltr">In fact, the reason to use this protocol is how it works. The ATM protocol divides digital data into 53-byte segments and sends them on a medium. Each of these parts is called a cell.</p> <p dir="ltr">In reality, each 53-byte cell contains 48 bytes of data or payload and 5 header bits. Then each piece of digital data is processed separately and sent sequentially. We can talk for hours about the mechanism of this protocol, but for now what you should know is limited to applications of the ATM protocol.</p> <p dir="ltr">The structure and mechanism of the ATM protocol has made routers not involved in processing the different sizes of the sent packets. Because of this, the speed of processing and data transfer increases on the basis of this protocol.</p> <p dir="ltr">So that the standard transmission speed of this technology on fiber-optic cables is about 155 megabytes per second, but in ATM networks the data transmission speed can be increased up to 10 gigabits.</p> <h5 id="Ethernet" dir="ltr">Ethernet</h5> <p dir="ltr">The Ethernet protocol is a standard protocol for use in computer networks, usually used in LAN and MAN networks. Computers that exchange information using the Ethernet protocol convert data into smaller pieces called frames.</p> <p dir="ltr">Frame itself includes other parties such as LLC and MAC. We will talk about MAC or Media Access Control in detail in the next article. LLC or Logic Link Control is responsible for the integration and synchronization of the frames.</p> <p dir="ltr">The Ethernet protocol generally operates in two data link and physical layers of the OSI model. In terms of speed, the Ethernet protocol has three standards, which include Standard Ethernet, Fast Ethernet and Gigabit Ethernet.</p> <p dir="ltr">Standard Ethernet was the first Ethernet standard capable of transferring data at a speed of 10 Mbps. Well, this amount of speed was definitely not enough for even a small local area network.</p> <p dir="ltr">For this reason, the IEEE organization worked on the IEEE 802.3 standard and the result was IEEE 802.3u and IEEE 802.3z, which we know as Fast Ethernet and Gigabit Ethernet.</p> <p dir="ltr">Gigabit Ethernet (IEEE 802.3z) is the third generation of Ethernet that is widely used in today's networks. You will be able to transfer information up to 70 km through this standard. Of course, this standard is an expensive standard.</p> <p dir="ltr">Fast Ethernet (IEEE 802.3u) is the second generation of Ethernet and, as the name suggests, this standard has a high speed of data transmission. So that the standard speed of Fast Ethernet reaches 100Mbps. Of course, compared with Gigabit Ethernet, this standard cannot transfer data over long distances.</p> <p dir="ltr">As a standard, Fast Ethernet has the ability to transfer data up to 10 kilometers, which can almost be said to be 14% of the Gigabit Ethernet standard in data transmission.</p> <h3 id="Network_layer" dir="ltr">Network layer</h3> <p dir="ltr">Routers and network devices responsible for routing operate in this layer. The reason for this is that all these devices work based on the IP address.</p> <p dir="ltr">In fact, we have two types of addresses in computer networks, one is physical address, which includes MAC address as I said, and the other is logical address, which includes IP address.</p> <p dir="ltr">It can be said that almost everyone is familiar with the IP address, but I will tell about them separately.</p> <p dir="ltr">The tasks of the third layer of the OSI model include the following:</p> <ul dir="ltr"> <li>Routing</li> <li>Logical Addressing</li> <li>Error Detection</li> <li>Encapsulation/Decapsulation</li> </ul> <p dir="ltr">Of course, there are other activities in the Network layer that we won't mention right now. Now we want to explain each of these cases so that you can understand more precisely what happens in the third layer of the network.</p> <h4 id="Routing" dir="ltr">Routing</h4> <p dir="ltr">To route means to route. It is possible for a packet to reach its destination among network devices multiple times. For example, when you move a file across the internet, the file might be passed between dozens of network devices to reach its destination.</p> <p dir="ltr">Just as in the real world you have the ability to take different paths to reach your destination, a packet in the networked world can also have different ways to reach its destination.</p> <p dir="ltr">Routing means that a packet chooses the best way in the network to reach its destination. You can view the default routes of a system using the route print command in the Windows Terminal (CMD).</p> <p dir="ltr">In the network layer, a virtual circuit is created between the source and the destination and the sent packets move to the destination using this virtual circuit. To explain a little better, logical paths are created in the network layer to send packets.</p> <h4 id="Logical_Addressing" dir="ltr">Logical Addressing</h4> <p dir="ltr">Logical addressing is addressing using the IP or Internet protocol. This type of addressing has similarities to physical addressing, but MAC address is used in physical addressing.</p> <p dir="ltr">The third layer of the OSI model also has a header like the data link layer. In this layer, the logical address of the source and destination of each packet is added to the header section in IPv4 and IPv6.</p> <h4 id="Error_Detection" dir="ltr">Error Detection</h4> <p dir="ltr">You could say that in the data link layer of our network, we have done the error detection process once and why should we repeat this process? The reason is that the process of detecting errors that occurred in the lower layer is different from detecting errors that occur in the network layer.</p> <p dir="ltr">We said that the data link layer lacks the power to understand the higher layers and just puts what it receives from the network layer into a specific format called a payload and adds other elements to it.</p> <p dir="ltr">Therefore, in the data link layer, it is practically not possible to control the source and destination IP addresses of each packet.</p> <h4 id="Network_layer_Encapsulation_Decapsulation" dir="ltr">Encapsulation/Decapsulation</h4> <p dir="ltr">In the third layer, like other OSI layers; After performing the operations and tasks of each layer, the encapsulation and decapsulation process is performed and then the data is transferred to higher or lower layers. As we said, the data link layer knows this information as a payload.</p> <p dir="ltr">As we explained, different OSI layers don't interfere with each other's work, so the data link layer isn't literate enough to read the third layer's payload, nor is it allowed to interfere with the Netwprk layer.</p> <h4 id="famous_protocols_of_the_Network_layer" dir="ltr">Popular Network layer protocols</h4> <h5 id="IP" dir="ltr">IP</h5> <p dir="ltr">IP stands for <a href="/internet-protocol">Internet Protocol</a>. The most important task of the IP protocol is to route and specify the origin and destination of a packet. IP, like many other protocols in the network, has different versions and standards.</p> <p dir="ltr">You must know that there are two versions of the IP protocol in the world called IPv4 and IPv6. All hosts on the network need a logical address and a physical address.</p> <p dir="ltr">The logical address or logical address used to send each packet is IP. Just as in the real world it is not possible for two houses to have the same zip code, we will never have the same IP addresses in a computer network.</p> <p dir="ltr">Some of the IP addresses are local or some are global or static. Local IP addresses are used in local networks. Typically, global IPs are provided for servers that are supposed to continuously provide services to users around the world.</p> <p dir="ltr">The IP version 4 address contains 32 bits or 4 octets, which is 8 bits separated by a period. Also, the IP address itself includes two parts: Net ID and Host ID.<br />In a separate article, I explained the Internet Protocol, which I suggest you read for a better understanding of subnet mask and IP address types.</p> <h5 id="ARP" dir="ltr">ARP</h5> <p dir="ltr">ARP or Address Resolution Protocol is actually responsible for looking up the MAC address of a specific IP address. Imagine you want to connect to a server; For that, you need to have the IP address of the server you want to connect to, but never use the MAC address to connect to it.</p> <p dir="ltr">Meanwhile, your computer has to send a series of packets to connect to the target server in order for your connection with that server to be established. When these packets want to pass through the second layer of the network, i.e. the data link, this layer must include the physical address of the source and destination in the header section.</p> <p dir="ltr">Well, the important question is: How does your computer know the MAC address of the destination it wants to send a packet to?</p> <p dir="ltr">Here, your computer obtains the physical address of the target computer using the ARP protocol and as a result, the desired packet is sent.</p> <p dir="ltr">Imagine that two computers want to exchange information over a network and one of these computers has an IP from the other computer. Before sending the packet to the second computer, the first one first checks a table called ARP Table to see if the MAC address of the second computer is present or not.</p> <p dir="ltr">If these two computers have already exchanged information with each other, each computer has stored the other computer's MAC address and IP address in the ARP table.</p> <p dir="ltr">If the second computer's MAC address did not exist in the ARP table; The first computer sends a packet over the network called an ARP request. In this packet, which is sent to the second computer's IP address, the broadcast MAC address is used instead of Dst MAC or the destination MAC address.</p> <p dir="ltr">Since the first computer doesn't know the second computer's MAC address, Ver needs its MAC address to send each packet to the other computer, so instead of the destination MAC address, it uses the address FF:FF:FF:FF :FF:FF , which is called Broadcast MAC Address. they say.</p> <p dir="ltr">All computers in the network receive this packet and when the packet reaches the third level of each of these computers, the logical address of these packets is checked. Therefore, if there is a computer on the network other than the destination computer, each of these computers will drop the sent packets.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/265.gif" alt="ARP request" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">But when the ARP request reaches the target computer, considering the logical address of this computer is in the network layer; This computer sends a packet called ARP replay to the first computer. In this packet, the second computer enters its MAC address for the first computer.</p> <p dir="ltr">In fact, when the first computer sent the ARP request, it had sent the MAC Src or MAC address of the source to the second computer, and when the second computer wanted to send the ARP replay, it knew exactly which computer it should send the packet to. .</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/264.webp" alt="Address Resolution Protocol" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">When the ARP playback reaches the first computer; Both computers have each other's MAC address and IP address, so they complete their ARP table so that this process doesn't have to be repeated on the next exchange of information.</p> <p dir="ltr">The ARP protocol has many advantages for computer networks, but it also has disadvantages. Of course, most of these disadvantages are brought up in discussions related to network security. For example, in the ARP protocol, there is no system and mechanism for measuring the accuracy of ARP playback.</p> <p dir="ltr">In other words, if a computer sends an ARP Replay to a computer that has sent an ARP Replay for unknown reasons over the network, the computer cannot verify that the information sent is correct.</p> <p dir="ltr">Or hackers use attacks called ARP Spoofing or ARP Poisoning in computer networks, which you can learn more about in security courses.</p> <h5 id="ICMP" dir="ltr">ICMP</h5> <p dir="ltr">ICMP or Internet Control Message Protocol is one of the most important network layer protocols. This protocol is used to verify the connection and signal the line or the non-arrival of a packet at the destination.</p> <p dir="ltr">The discussions on the ICMP protocol are very extensive and I will limit myself to explaining here how this protocol works in computer networks.</p> <p dir="ltr">The ICMP protocol is responsible for sending different packets in the network and each of these ICMP packets conveys different concepts to the recipient based on the type and code they contain.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/266.webp" alt="Internet Control Message Protocol" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">In general, these packets in computer networks include three main parts:</p> <ul dir="ltr"> <li>Type</li> <li>Code</li> <li>Checksum</li> </ul> <p dir="ltr">The Type section in each packet indicates the purpose for which this message was sent over the network. Sometimes a specific type of packages can have different types that the code distinguishes them from each other.</p> <p dir="ltr">As the name suggests, the Checksum section is sent in each packet to confirm the correctness of sending the Type and Code sections in each packet.<br />The table below shows the types and codes of the ICMP protocol:</p> <p dir="ltr">&nbsp;</p> <table class="tablemix" dir="ltr"> <tbody> <tr> <td width="201"> <p>Description</p> </td> <td width="140"> <p>Code</p> </td> <td width="140"> <p>Type</p> </td> <td width="142"> <p>Type Number</p> </td> </tr> <tr> <td width="201"> <p>Echo reply</p> </td> <td width="140"> <p>0</p> </td> <td width="140"> <p>Echo Reply</p> </td> <td width="142"> <p>0</p> </td> </tr> <tr> <td width="201"> <p>Reserved</p> </td> <td width="140"> <p>-</p> </td> <td rowspan="2" width="140"> <p>Reserved</p> </td> <td width="142"> <p>1</p> </td> </tr> <tr> <td width="201"> <p>Reserved</p> </td> <td width="140"> <p>-</p> </td> <td width="142"> <p>2</p> </td> </tr> <tr> <td width="201"> <p>Destination network unreachable</p> </td> <td width="140"> <p>0</p> </td> <td rowspan="16" width="140"> <p>Destination Unreachable</p> </td> <td rowspan="16" width="142"> <p>3</p> </td> </tr> <tr> <td width="201"> <p>Destination host unreachable</p> </td> <td width="140"> <p>1</p> </td> </tr> <tr> <td width="201"> <p>Destination protocol unreachable</p> </td> <td width="140"> <p>2</p> </td> </tr> <tr> <td width="201"> <p>Destination port unreachable</p> </td> <td width="140"> <p>3</p> </td> </tr> <tr> <td width="201"> <p>Fragmentation required, and DF flag set</p> </td> <td width="140"> <p>4</p> </td> </tr> <tr> <td width="201"> <p>Source route failed</p> </td> <td width="140"> <p>5</p> </td> </tr> <tr> <td width="201"> <p>Destination network unknown</p> </td> <td width="140"> <p>6</p> </td> </tr> <tr> <td width="201"> <p>Destination host unknown</p> </td> <td width="140"> <p>7</p> </td> </tr> <tr> <td width="201"> <p>Source host isolated</p> </td> <td width="140"> <p>8</p> </td> </tr> <tr> <td width="201"> <p>Network administratively prohibited</p> </td> <td width="140"> <p>9</p> </td> </tr> <tr> <td width="201"> <p>Host administratively prohibited</p> </td> <td width="140"> <p>10</p> </td> </tr> <tr> <td width="201"> <p>Network unreachable for ToS</p> </td> <td width="140"> <p>11</p> </td> </tr> <tr> <td width="201"> <p>Host unreachable for ToS</p> </td> <td width="140"> <p>12</p> </td> </tr> <tr> <td width="201"> <p>Communication administratively prohibited</p> </td> <td width="140"> <p>13</p> </td> </tr> <tr> <td width="201"> <p>Host Precedence Violation</p> </td> <td width="140"> <p>14</p> </td> </tr> <tr> <td width="201"> <p>Precedence cutoff in effect</p> </td> <td width="140"> <p>15</p> </td> </tr> <tr> <td width="201"> <p>Source quench (congestion control)</p> </td> <td width="140"> <p>0</p> </td> <td width="140"> <p>Source Quench</p> </td> <td width="142"> <p>4</p> </td> </tr> <tr> <td width="201"> <p>Redirect Datagram for the Network</p> </td> <td width="140"> <p>0</p> </td> <td rowspan="4" width="140"> <p>Redirect Message</p> </td> <td rowspan="4" width="142"> <p>5</p> </td> </tr> <tr> <td width="201"> <p>Redirect Datagram for the Host</p> </td> <td width="140"> <p>1</p> </td> </tr> <tr> <td width="201"> <p>Redirect Datagram for the ToS &amp; network</p> </td> <td width="140"> <p>2</p> </td> </tr> <tr> <td width="201"> <p>Redirect Datagram for the ToS &amp; host</p> </td> <td width="140"> <p>3</p> </td> </tr> <tr> <td width="201"> <p>Alternate Host Address</p> </td> <td width="140"> <p>-</p> </td> <td width="140"> <p>Alternate Host Address</p> </td> <td width="142"> <p>6</p> </td> </tr> <tr> <td width="201"> <p>Reserved</p> </td> <td width="140"> <p>-</p> </td> <td width="140"> <p>Reserved</p> </td> <td width="142"> <p>7</p> </td> </tr> <tr> <td width="201"> <p>Echo request (used to ping)</p> </td> <td width="140"> <p>0</p> </td> <td width="140"> <p>Echo Request</p> </td> <td width="142"> <p>8</p> </td> </tr> <tr> <td width="201"> <p>Router Advertisement</p> </td> <td width="140"> <p>0</p> </td> <td width="140"> <p>Router Advertisement</p> </td> <td width="142"> <p>9</p> </td> </tr> <tr> <td width="201"> <p>Router discovery/selection/solicitation</p> </td> <td width="140"> <p>0</p> </td> <td width="140"> <p>Router Solicitation</p> </td> <td width="142"> <p>10</p> </td> </tr> <tr> <td width="201"> <p>TTL expired in transit</p> </td> <td width="140"> <p>0</p> </td> <td rowspan="2" width="140"> <p>Time Exceeded</p> </td> <td rowspan="2" width="142"> <p>11</p> </td> </tr> <tr> <td width="201"> <p>Fragment reassembly time exceeded</p> </td> <td width="140"> <p>1</p> </td> </tr> <tr> <td width="201"> <p>Pointer indicates the error</p> </td> <td width="140"> <p>0</p> </td> <td rowspan="3" width="140"> <p>Parameter Problem: Bad IP header</p> </td> <td rowspan="3" width="142"> <p>12</p> </td> </tr> <tr> <td width="201"> <p>Missing a required option</p> </td> <td width="140"> <p>1</p> </td> </tr> <tr> <td width="201"> <p>Bad length</p> </td> <td width="140"> <p>2</p> </td> </tr> <tr> <td width="201"> <p>Timestamp</p> </td> <td width="140"> <p>0</p> </td> <td width="140"> <p>Timestamp</p> </td> <td width="142"> <p>13</p> </td> </tr> <tr> <td width="201"> <p>Timestamp Reply</p> </td> <td width="140"> <p>0</p> </td> <td width="140"> <p>Timestamp Reply</p> </td> <td width="142"> <p>14</p> </td> </tr> <tr> <td width="201"> <p>Information Request</p> </td> <td width="140"> <p>0</p> </td> <td width="140"> <p>Information Request</p> </td> <td width="142"> <p>15</p> </td> </tr> <tr> <td width="201"> <p>Information Reply</p> </td> <td width="140"> <p>0</p> </td> <td width="140"> <p>Information Reply</p> </td> <td width="142"> <p>16</p> </td> </tr> <tr> <td width="201"> <p>Address Mask Request</p> </td> <td width="140"> <p>0</p> </td> <td width="140"> <p>Address Mask Request</p> </td> <td width="142"> <p>17</p> </td> </tr> <tr> <td width="201"> <p>Address Mask Reply</p> </td> <td width="140"> <p>0</p> </td> <td width="140"> <p>Address Mask Reply</p> </td> <td width="142"> <p>18</p> </td> </tr> <tr> <td width="201"> <p>Reserved for security</p> </td> <td width="140"> <p>-</p> </td> <td width="140"> <p>reserved</p> </td> <td width="142"> <p>19</p> </td> </tr> <tr> <td width="201"> <p>Reserved for robustness experiment</p> </td> <td width="140"> <p>-</p> </td> <td width="140"> <p>reserved</p> </td> <td width="142"> <p>20-29</p> </td> </tr> <tr> <td width="201"> <p>Information Request</p> </td> <td width="140"> <p>0</p> </td> <td width="140"> <p>Traceroute</p> </td> <td width="142"> <p>30</p> </td> </tr> <tr> <td width="201"> <p>Request Extended Echo (XPing - see Extended Ping (Xping))</p> </td> <td width="140"> <p>0</p> </td> <td width="140"> <p>Extended Echo Request</p> </td> <td width="142"> <p>42</p> </td> </tr> <tr> <td width="201"> <p>No Error</p> </td> <td width="140"> <p>0</p> </td> <td rowspan="5" width="140"> <p>Extended Echo Reply</p> </td> <td rowspan="5" width="142"> <p>43</p> </td> </tr> <tr> <td width="201"> <p>Malformed Query</p> </td> <td width="140"> <p>1</p> </td> </tr> <tr> <td width="201"> <p>No Such Interface</p> </td> <td width="140"> <p>2</p> </td> </tr> <tr> <td width="201"> <p>No Such Table Entry</p> </td> <td width="140"> <p>3</p> </td> </tr> <tr> <td width="201"> <p>Multiple Interfaces Satisfy Query</p> </td> <td width="140"> <p>4</p> </td> </tr> </tbody> </table> <p dir="ltr">&nbsp;</p> <p dir="ltr">Really, if I want to explain all of the above things, except I don't know many of these things, this article is going to be very long. I will explain the ICMP protocol separately later.</p> <p dir="ltr">One of the most common uses that every person tries to communicate is ping. The ping tool is one of the tools that uses the ICMP protocol to measure the connection between the source and destination.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/292.webp" alt="IP security Protocol" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h5 id="IPsec" dir="ltr">IPsec</h5> <p dir="ltr">The IPsec protocol or IP security, as the name suggests, is a protocol for setting up secure, encrypted communications between computers. Actually, IPsec is not a single protocol and consists of several other protocols.</p> <p dir="ltr">This protocol is usually not explained in network basics, it is basically related to security and network. You must be familiar with VPNs. The definition of VPN might be a little different than you think.</p> <p dir="ltr">VPN or virtual private network in networks like the Internet allows you to connect from one public network to another private network and exchange data between your computer and other computers in the private network. Just as if you were directly connected to a private network.</p> <p dir="ltr">Imagine you have activated a VPN on your computer; In this case, a secure tunnel is formed between you and the VPN servers you are using. So every packet you send is first sent to the VPN server and then moves to the destination.</p> <p dir="ltr">One use of the IPsec protocol is to use it to set up a VPN. Additionally, other uses of IPsec include encrypting information on the network, building security for routers that route across the Internet, or for authentication.</p> <p dir="ltr">We will discuss IPsec and its structure and what protocols it includes in the future. What you need to know at this stage is that the IPsec protocol works at the network level and its job is to create a secure connection between workstations.</p> <h3 id="Transport_layer" dir="ltr">Transport layer</h3> <p dir="ltr">This layer is responsible for logical communication such as Connection Oriented (direct connection) or Connection Less (no connection).</p> <p dir="ltr">This layer is responsible for important tasks in the network, and among the tasks of this layer, the following can be mentioned:</p> <ul dir="ltr"> <li>Segmentation</li> <li>Flow Control</li> <li>Error Handling</li> <li>Segment Sequencing</li> <li>Service Addressing</li> <li>Multiplexing</li> </ul> <p dir="ltr">Of course, explaining all these things is a bit difficult, but you will get to know them thoroughly in the CCNA courses.</p> <h4 id="Segmentation" dir="ltr">Segmentation</h4> <p dir="ltr">Segmentation is the first thing that happens after information moves from the Session layer to the Transport layer. In the real world, for better management, the class is divided into smaller groups, or in all countries it is divided into different provinces and states for better country management.</p> <p dir="ltr">In computer networks, in the transport layer, information is broken down into smaller pieces, each of which is called a segment.</p> <h4 id="Flow_Control" dir="ltr">Flow Control</h4> <p dir="ltr">In the network we have a memory called Buffer, which acts as a queue for the created segments. Imagine your computer can't send a packet due to network congestion. Or there is interference in the network and your computer is unable to send packets over the network.</p> <p dir="ltr">In this case, all segments that will be sent to lower levels in the future are stored for a while in the Buffer section. Something doesn't have to happen to the media to use Buffer.</p> <p dir="ltr">For example, if the amount of information sent from the level above this level is large, this information is buffered for better sending.</p> <h4 id="Error_Handling" dir="ltr">Error Handling</h4> <p dir="ltr">Error handling in the transport layer checks whether all segments sent in the network have reached their destination. Imagine a message has reached the transport layer in the session layer.</p> <p dir="ltr">In this case, the desired message is split into several segments and then sent to lower levels. When the receiving-side transport layer receives these segments, it must have all of them in order to produce the initial message and deliver it to the receiving session layer.</p> <p dir="ltr">Error handling is a mechanism for error control, where after sending each packet, the computer waits for confirmation that it has arrived.</p> <h4 id="Segment_Sequencing" dir="ltr">Segment Sequencing</h4> <p dir="ltr">Some people think that when you send a series of packets across the network, these packets will reach their destination in exactly the same order they were sent. But for various reasons, such an event does not occur in computer networks.</p> <p dir="ltr">The order of segments arriving at their destination can be swapped. In this case, we will need a mechanism that corrects the order of these received segments for us.</p> <p dir="ltr">For example, they give you messed up pages of a book and ask you to fix this messed up book. The first thing that catches your attention is that there are a number of page numbers in a book. Even if you don't understand a book written in another language, you can order it using the page number.</p> <p dir="ltr">In the desktop computer world, this happens; The transport layer doesn't have a proper understanding of a message's information and its information model, so it can't understand and organize it properly.</p> <p dir="ltr">For this reason, a sequence number is considered for each segment and the Segment Sequencing process will be able to correct the order of the received segments by placing the numbers next to each other.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/267.webp" alt="sequence number" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">You can see the sequence number of each packet in the network using software like Wireshark.</p> <h4 id="Service_Addressing" dir="ltr">Service Addressing</h4> <p dir="ltr">Imagine that in the real world I am sending a letter to the head of a department of a large company. After the letter arrives, the address on the package, the appearance of the package is checked, and if the package is faultless, it is delivered.</p> <p dir="ltr">The parcel of the letter was opened by the secretary of the company and since it is written on the letter, which person in that company will receive this letter; The consignment letter is handed over to the head of the department head's office. And finally the letter arrives at its destination.</p> <p dir="ltr">In the world of computer networks, the reception and verification of the correctness of the address of each packet takes place from the first to the third level. As mentioned, this is done via MAC address and IP address, which I have explained to you in this article.</p> <p dir="ltr">But the problem is that the package has reached the destination computer, but it is not clear who it should be delivered to. Also, the transport layer lacks the literacy to understand this received packet.</p> <p dir="ltr">For this reason, one of the things the transport layer does for us is use a label on each packet to specify which part of the destination computer this packet should reach. This process is called Service Addressing.</p> <p dir="ltr">How exactly this process is possible, in the Cisco courses, you will cover exactly these topics and, for now, you will not need to know in the Network plus course.</p> <p dir="ltr">In fact, each service in the upper layers of the OSI model, such as the application, is mapped to a number in the transport layer. And when information is received in the Transport layer, the information is delivered to the Service section in the higher layers.</p> <p dir="ltr">For example, if you request to open a page in your browser, after receiving and reaching the transport level of the destination server, this request will be sent to a service assigned by default with the number 80 or 443.</p> <h4 id="Famous_protocols_of_Transport" dir="ltr">Famous&nbsp;transport layer protocols</h4> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img id="TCP" src="/images/uploaded/blog03/291.webp" alt="TCP protocol" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h5 dir="ltr">TCP</h5> <p>TCP or Transmission Control Protocol is one of the existing standards for establishing and maintaining communication between computers. A packet does not use a single protocol for sending over computer networks. In fact, each packet uses different protocols to send to reach its final destination.</p> <p>TCP protocol also always uses IP or internet protocol to communicate. A lot can be said about the structure of TCP and the packets that are sent using this protocol.</p> <p>In this protocol, a communication is established to send any information and until the information is completely transferred and the receiver sends the information receipt message to the sender; The connection is maintained.</p> <p>Actually, when you want to download a file, you use the TCP protocol because all the information is important to you. Imagine downloading a piece of software; If any part of this software is downloaded incompletely, in most cases you will not be able to install it.</p> <p>In general, the TCP protocol is used in cases where it is important that accurate and correct information reaches the destination. Imagine that for whatever reason there is a problem sending a packet and this packet does not reach its destination correctly.</p> <p>Here the TCP protocol is in charge of identifying and fixing the problem in the received packet. In fact, this protocol drops the packet and requests the sender to resend the same packet.</p> <p>On the other hand, this protocol sends an acknowledgment message to the sender, regardless of the number of packets received. On the sender's side, after sending any number of packets, TCP waits for a response.</p> <p>&nbsp;</p> <p dir="ltr"><img id="UDP" src="/images/uploaded/blog03/290.webp" alt="UDP protocol" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h5 dir="ltr">UDP</h5> <p dir="ltr">&nbsp;</p> <h3 id="Session_layer" dir="ltr">Session layer</h3> <p dir="ltr">The session layer in the OSI model has three important tasks for sessions or work sessions in computer networks. In fact, as can be seen from the name of this level, the task of this level is related only to Sessions.</p> <p dir="ltr">Imagine that you are performing an operation on the network. In the first stage, you need to create a session for this activity. So the first task of this level is to create or start a session.</p> <p dir="ltr">The second task is that the created session must be maintained. You certainly don't want your connection to the service provider's server to be dropped in the middle of important activity; Because of this, the next thing this layer does for us is to maintain the created session.</p> <p dir="ltr">The third reason you'll need this layer is to destroy created sessions. In computer networks, creators have tried their best to make everything happen based on some logic.</p> <p dir="ltr">Do you think it makes sense for a Session to always remain open once created?</p> <p dir="ltr">In addition to security issues, this could also increase network traffic. So the best thing is that when a session is created and an operation is performed in the network; When the session ends, the session is closed or session termination occurs.</p> <p dir="ltr">In addition to the operations I explained above, the Session layer is responsible for checkpoints. In face-to-face and online classes, when a teacher or lecturer teaches you something, does she ask if you understand?</p> <p dir="ltr">This question means whether you got all the information she explained and understood or not…</p> <p dir="ltr">Checkpoints also have the same meaning in computer networks. Imagine two computers exchanging thousands of packets with each other. Of course, to transfer a large file, this number may be very small.</p> <p dir="ltr">For example, when you back up from a server and store it on other hardware in the network, your network traffic will be much more than these words.</p> <p dir="ltr">In this case, Check Point is responsible for checking each specific number of packets sent, with the destination computer to ensure that all packets have been received correctly.</p> <p dir="ltr">Indeed, in the Session level, it is verified from which of the Check Points the destination computer received the information. Imagine downloading a movie to your browser. What is very common in Iran is that you may have problems with internet interference for various reasons.</p> <p dir="ltr">Or for whatever reason, the session created between you and the server you download from is terminated. In this case, if you connect to the server again, you don't need to download the file from the beginning.</p> <p dir="ltr">The provider's server can provide information from the last Check Point onwards. This increases the speed of computer networks.</p> <h4 id="Famous_Session_layer_protocols" dir="ltr">Famous Session layer protocols</h4> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img id="NetBios" src="/images/uploaded/blog03/289.webp" alt="NetBios over TCP Protocol" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h5 dir="ltr">NetBios</h5> <p dir="ltr">NetBios is a very old protocol and you actually used NetBios before the TCP protocol was created. Actually, if we talk about NetBios today, we mean NetBios over TCP.</p> <p dir="ltr">I mean, NetBios has used other mechanisms for sensing and communication in the past, which you can read about on the internet if you like.<br />NetBios was a protocol for communication between different computer programs. Of course, today NetBios is no longer used in standard networks.</p> <p dir="ltr">Therefore, a common saying among network hackers is that if you've managed to find a network where NetBios has been used, you've probably hit some interesting places because NetBios isn't used as standard.</p> <p dir="ltr">Typically, one of the tasks network administrators do is to close NetBios-related ports in computer networks. In fact, this can make your network computers more secure.</p> <p dir="ltr">If NetBios is active in a computer network; You can use it to find out the names of computers, some services, etc., which are important information for hackers in a network, which is why scanning NetBios is considered one of the activities of hackers.</p> <p dir="ltr">As far as I know, all older operating systems support NetBios. New Microsoft operating systems also support this protocol for communicating with an older computer. But on newer Linux operating systems you will no longer have NetBios.</p> <p dir="ltr">If you have seen this, it is usually recommended to always disable or block TCP protocol ports 138 and 139 and UDP protocol port 137 in operating system firewalls. These ports are related to NetBios.</p> <p dir="ltr">The NetBios output includes a table where the NetBios name and the service ID are present. Indeed, through NetBios, you can find out the names of computers and the services they provide in the network.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img id="PPTP" src="/images/uploaded/blog03/288.webp" alt="Point-to-Point Tunneling Protocol" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h5 dir="ltr">PPTP</h5> <p dir="ltr">PPTP or Point-to-Point Tunneling Protocol is one of the VPN communication protocols in computer networks. Naturally, this protocol is not used due to security concerns in standard networks and usually the L2TP protocol is used instead of this protocol.</p> <p dir="ltr">This protocol was designed in 1999 by several companies, including Microsoft, and has shown outstanding speed and stability across protocols. PPTP was mainly used when two routers needed to communicate directly with each other.</p> <p dir="ltr">PPTP is one of the simplest protocols available in terms of structure, but in terms of confidentiality of the information sent by this protocol, it has known weaknesses.</p> <p dir="ltr">The reason for the low security of this protocol is that PPTP uses RC4 encryption, which has known vulnerabilities. For this reason, this protocol is currently only used in cases where security is not important.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img id="PAP" src="/images/uploaded/blog03/287.webp" alt="Password Authentication Protocol" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h5 dir="ltr">PAP</h5> <p dir="ltr">PAP or Password Authentication Protocol is a security protocol for password authentication in computer networks.</p> <p dir="ltr">There are protocols like PPP whose job is to establish a secure remote connection. These protocols cannot work independently and need other protocols to authenticate users to perform their tasks.</p> <p dir="ltr">In the past, there was a protocol called SLIP or Serial Line Interface Protocol, which was used for password authentication, but over time, this protocol was abandoned due to its weaknesses and the PAP protocol replaced it.</p> <p dir="ltr">After establishing a connection between a client and a server using the PPP protocol, the client's computer uses the PAP protocol to send sensitive information such as username and password.</p> <p dir="ltr">Of course, today this protocol is not used in a standard network, because this protocol causes a number of security problems. One such problem is that the PAP protocol sends user information in text format.</p> <p dir="ltr">This allows a hacker in a computer network to easily extract sensitive information without any problems and use it for his own purposes after hacking into the network and listening to the information.</p> <p dir="ltr">Usually, in standard networks, they try to use protocols that send sensitive information encrypted. Indeed, now that new news about hackers is heard every day, the concern of most companies is to maintain security.</p> <h3 id="Presentation_layer" dir="ltr">Presentation layer</h3> <p dir="ltr">One of the most important tasks of the presentation layer is to perform encryption and compression operations. Imagine a series of packets being sent across your network as Encrypt. In this case, the sender's presentation layer performs the encryption process for each packet.</p> <p dir="ltr">And on the presentation layer side of the receiver, the received packets; It is decrypted and then delivered to the top layer i.e. Application.</p> <p dir="ltr">The same thing happens with the compression process; If we say that the presentation layer performs the compression, on the other hand, the extraction process takes place so that the received packets can be understood by the application layer.</p> <p dir="ltr">In this level, the packets sent and received are called a message. In general, in the first three layers of the OSI model, namely Session, Presentation and Application, the type of information is given and the packets sent and received in these layers are called messages.</p> <p dir="ltr">In some sources and articles related to computer networking, the presentation layer is also known as translation.</p> <h4 id="famous_protocols_of_the_Presentation_layer" dir="ltr">Famous Presentation layer protocols</h4> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img id="SSL" src="/images/uploaded/blog03/285.webp" alt="Secure Socket Layer protocol" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h5 dir="ltr">SSL</h5> <p dir="ltr">The SSL or Secure Socket Layer protocol was a protocol for establishing a secure connection between the server and the client, which was introduced by Netscape in 1994. Of course, in the initial version of this protocol, no one was willing to use it due to security bugs.</p> <p dir="ltr">But with the release of the second version in 1995 and the third version in 1996, the situation was somewhat different. SSL provides security and users use SSL for both security and privacy.</p> <p dir="ltr">However, when you create a site, you get an SSL certificate for it. You actually think you are getting an SSL certificate.</p> <p dir="ltr">The second version of the SSL protocol was deprecated in 2011 and the third version of this protocol in 2015. The story here was that this protocol was so old that using it caused security problems.</p> <p dir="ltr">In fact, if you are currently getting an SSL certificate for your website, your site uses the TLS protocol for secure communication. In 1999, the first version of the TLS protocol was released as an update to the SSL v3 protocol.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/286.webp" alt="http vs https protocol" width="100%" /></p> <p dir="ltr">The SSL protocol uses several algorithms, including asymmetric encryption algorithms, to create a secure connection. Explaining these algorithms and how each of them works is time consuming.</p> <p dir="ltr">After providing different versions of SSL protocol, many other protocols such as http, SIP, SMTP, POP3 and FTP have used this protocol to create security in sending and receiving information.</p> <p dir="ltr">Using the SSL and TLS protocols requires that both the client and the server have digital certificates. For this reason, a number of digital certificate issuing centers (Certificate Authorities) have been created.</p> <p dir="ltr">The task of the certificate authorities or CAs was to know the identity of the communication parties, account information, certificate expiration date, etc. and authenticate computers based on the cases recorded in it.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img id="TLS" src="/images/uploaded/blog03/284.webp" alt="Transfer Layer Security" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h5 dir="ltr">TLS</h5> <p dir="ltr">The TLS or Transfer Layer Security protocol, as I explained above, was one of the versions of SSL. In 1999, the first version of the TLS protocol was introduced. In 2006, version 1.1 of this protocol was released on the market. Today, the TLS protocol is used for the following applications:</p> <ul dir="ltr"> <li>Ensure the correctness of the data sent and do not change the information</li> <li>Ensure the authenticity of the identity of the parties exchanging information</li> <li>Ensure the security of information and the lack of third party access to the information exchanged</li> </ul> <p dir="ltr">In TLS, three main things happen that provide us with the security of information exchange in networks. As I explained to you in the SSL protocol, we needed a set of certificate authorities or CAs to issue digital certificates.</p> <p dir="ltr">Now, in TLS, the identity of the server and client is first confirmed using a certificate. In fact, the first thing that happens is that the Client checks if the Server providing the service is who it claims to be.</p> <p dir="ltr">Then the service provider's server verifies the client's identity using its certificate. If these two steps are performed correctly, the server and client exchange information using special encryption.</p> <p dir="ltr">&nbsp;</p> <h3 id="Application_layer" dir="ltr">Application layer</h3> <p dir="ltr">As I explained above, this level is the level closest to the user. In this layer, communication between users and the network is established, and application software such as browsers and network communication tools operate in this layer.</p> <p dir="ltr">The application layer is also called the user interface in some articles. In fact, since this layer is the layer closest to the user and all user requests are created directly on this layer, it is also called the user interface.</p> <p dir="ltr">The application layer is specifically related to software and tools programmed by programmers to operate in computer networks.</p> <p dir="ltr">For example, all software and tools like Wireshark or even social networking software like WhatsApp etc, that operate on the network are basically placed in the Application layer.</p> <p dir="ltr">Note that the OSI layers relate only to protocols, tools and software that operate in computer networks. For example, a Notpad software falls into none of the OSI layers.</p> <p dir="ltr">Or, for example, Microsoft Word software is not found in any of the OSI layers, but if you were faced with Word software that stored your files in cloud storage, this software can be said to operate in the Application layer.</p> <p dir="ltr">Don't think that any software that works on a computer definitely works in one of the OSI layers. One of the events that occurs in the application layer is the initiation of the request.</p> <p dir="ltr">Request initiation means that one of the tasks at this level is to create a request. Imagine opening a browser and searching the internet for a word. Or you want to connect to another computer via SMB protocol and check its File Sharing.</p> <p dir="ltr">In all these cases, you create a request and since the user creates all these requests, basically these requests are created on the seventh layer, Application.</p> <p dir="ltr">Or, for example, when you open a web page, you actually use the Http protocol to open a page. Application layer communication packets are called Message. After creating a request and producing a message, these packets are sent to the lower level, i.e. Presentation.</p> <h4 id="Famous_application_layer_protocols" dir="ltr">Famous application layer protocols</h4> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img id="FTP" src="/images/uploaded/blog03/283.webp" alt="File Transfer Protocol" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h5 dir="ltr">FTP</h5> <p dir="ltr">FTP or File Transfer Protocol is a very famous file transfer protocol. This protocol is one of the most used protocols and its job is to transfer files from one host to another.</p> <p dir="ltr">You can use the FTP protocol when you plan to transfer files between the server and client over the network. Prior to this protocol, other methods were used to transfer files to a server.</p> <p dir="ltr">For example, information was placed on a floppy disk and transferred to the server. In 1985, after the standardization of the FTP protocol (RFC 959), FTP was used to transfer data.</p> <p dir="ltr">FTP allowed users to download and upload to servers. Also, it was possible for users to delete or create a directory or folder and report files on the system.</p> <p dir="ltr">Other features of this protocol include file deletion, moving and searching, which made the FTP protocol more popular. The FTP protocol can be accessed using the following three methods:</p> <ul dir="ltr"> <li>Operating systems terminal or Windows command line</li> <li>Browsers</li> <li>FTP client software such as File Zilla</li> </ul> <p dir="ltr">Of course, the FTP protocol also had some shortcomings, among which we can mention the lack of data encryption between client and server. For this reason, SFTP or SSH File Transfer Protocol is used in networks today. In the rest of this article, I will explain more about the SSH protocol.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img id="http" src="/images/uploaded/blog03/282.webp" alt="Hyper Text Transfer Protocol" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h5 dir="ltr">http</h5> <p dir="ltr">The http protocol or Hyper Text Transfer Protocol is a standard protocol for exchanging information in computer networks. After the birth of the first sites, the http protocol was created which allowed users to transfer information.</p> <p dir="ltr">Before the http protocol was created and introduced in 1991, there was no standard method for exchanging information in computer networks.</p> <p dir="ltr">Despite this protocol, information transfer was not limited to text and images only, and http provided audio and video transfer facility for users. In addition, other protocols such as FTP have also been able to work using the http protocol.</p> <p dir="ltr">We can talk for hours about how this protocol works, but in a very simple and concise way; When you open a web page, you send a request to that website's server.</p> <p dir="ltr">As a result of the request sent by each client, a response is sent from the server side. Your requests can be of different types. All these things are events that happen in the background and their result is the opening of a web page in your browser.</p> <p dir="ltr">Each request message sent from the client to the server includes a request line, header, and body. And each response message sent from server to client contains status line, header and body.</p> <p dir="ltr">In CEH courses you will learn about all these components, also learning Http request types is mandatory in network security courses. But considering you aren't familiar with many concepts yet, learning these parts won't help you.</p> <p dir="ltr">The Http protocol also had problems, among these problems it can be mentioned that the communication is not secure. You must have heard that you shouldn't access sites that use http. In the http protocol, in fact, no measures have been taken to secure communication.</p> <p dir="ltr">In a computer network, a hacker could easily notice the information that is exchanged between the Client and the Server with the Http protocol by listening to the network. For this reason, protocols such as SSL and TLS have been used to secure this connection.</p> <p dir="ltr">The story wasn't limited to hackers; In many countries, such as the United States, ISPs or Internet Service Providers could track user information and sell it to advertising companies.</p> <p dir="ltr">For this reason, users had to resort to the Https protocol to protect their privacy. It makes sense that nobody wants others to know what they are doing on the Internet.</p> <p dir="ltr">Indeed, the Http protocol was combined with SSL and the result was the Https protocol, which ensured the security of information between Server and Client using a certificate. Because of this, neither the hacker nor anyone else could notice the received and sent information.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img id="POP3" src="/images/uploaded/blog03/281.webp" alt="Post Office Protocol" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h5 dir="ltr">POP3</h5> <p dir="ltr">POP3 is one of the most popular email sending protocols in computer networks. POP3 or Post Office Protocol is responsible for sending an email to the destination.</p> <p dir="ltr">The point is that after the email reaches the recipient, this protocol drops the message from the POP3 server so that no further information about the message is available on the servers and this is actually done to increase security.</p> <p dir="ltr">As for the POP protocol, what you should know is that newer versions of this protocol have been created and provided, however, the POP3 protocol is very famous and is still used by many users in different networks.</p> <p dir="ltr">There are other protocols for sending email to the destination. For example, one of these protocols is IMAP, which has a more complex structure and mechanism than POP3. But what made the POP3 protocol famous is its ease of use.</p> <p dir="ltr">The function of POP3 is that email senders send their messages to POP3 servers and the server temporarily stores the emails in itself and waits for the users to connect.</p> <p dir="ltr">After the computers connect to this POP3 server, the server sends the messages to the recipients and deletes them from the server after making sure that the email has reached the correct destination.</p> <p dir="ltr">Despite the popularity of POP3, nowadays in computer networks, people try not to use this protocol because it has many disadvantages. Indeed, since this protocol is obsolete, it has many security problems and configuring it in a network can endanger user information.</p> <p dir="ltr">Usually people try to use IMAP protocol instead of POP3 protocol for email in networks because this protocol is more secure than POP3. Furthermore, the existence of a number of services and benefits in the IMAC protocol increases the security of emails.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img id="SMTP" src="/images/uploaded/blog03/280.webp" alt="Simple Mail Transfer Protocol" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h5 dir="ltr">SMTP</h5> <p dir="ltr">SMTP or Simple Mail Transfer Protocol is an older protocol for transferring email. This protocol is an older protocol for sending email from one account to another. Of course, other protocols such as POP3 and IMAP are also used for email.</p> <p dir="ltr">When you send an email, you are actually connecting to a mail server. This SMTP server is responsible for sending your email to its intended destination. Now, if your destination is in the same network, this SMTP server will send your email directly to POP3 and IMAC servers in the same network to reach the destination.</p> <p dir="ltr">If your email destination is not in the same network, the SMTP server must deliver your email to another SMTP server in another network so that the server can send your email to the destination.</p> <p dir="ltr">For example when you send an email to info@mixseda. com, your SMTP server forwards your email to the mixseda domain's SMTP server. com offers. Meanwhile, the SMTP server of the email sender needs to ask the DNS server for help to identify the SMTP server of the email recipient.</p> <p dir="ltr">After the email reaches the destination SMTP server, this server delivers the received email to IMAP and POP3 servers so that these protocols deliver the email to its intended destination.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img id="IRC" src="/images/uploaded/blog03/279.webp" alt="Internet Relay Chat protocol" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h5 dir="ltr">IRC</h5> <p dir="ltr">The IRC protocol or Internet Relay Chat is an old protocol for transmitting messages over the network. In the past, social networks weren't as powerful and accessible as they are now. Therefore, the IRC protocol has been used to chat with others.</p> <p dir="ltr">The IRC protocol was created in 1988 by Jakko Oikarninen. You will be able to connect to an IRC server using this protocol. In fact, IRC clients are authenticated using their nickname, username and IP address on the IRC server.</p> <p dir="ltr">To use this protocol, you need IRC client software. For example, mIRC software used to be one of the most popular software for connecting to an IRC server.<br />In fact, what you see today in many messengers was first introduced to users by the IRC protocol.</p> <p dir="ltr">Even in some IRC servers, voice calls, video calls, file transfer, conferences, etc. are also available for active users. You can communicate with other users using this protocol.</p> <p dir="ltr">Early messengers used a combination of the IRC protocol with a number of other protocols for file transfer or other functions. I can easily say that the creation of this protocol in 1988 was indeed considered a great achievement.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img id="SSH" src="/images/uploaded/blog03/276.webp" alt="Secure Shell protocol" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h5 dir="ltr">SSH</h5> <p dir="ltr">The SSH or Secure Shell protocol is a framework and mechanism for secure communication created in 1995 by Tatu Ylönen. Tatu Ylönen created the SSH protocol to improve communication over the Telnet and rLogin protocols.</p> <p dir="ltr">But he protocol was so well designed that later this protocol was also used to secure other protocols. In a very simple way, this protocol encrypts information on the source computer using the RSA algorithm.</p> <p dir="ltr">The existence of encrypted information in the network read made it impossible to use if that information was intercepted or subjected to MITM attacks.</p> <p dir="ltr">MITM stands for Man In The Middle; It is one of the attack methods in computer networks widely used today.</p> <p dir="ltr">If you do not use encrypted information between your computer and the desired server, and a hacker listens to the information, he can easily find out this information.</p> <p dir="ltr">Of course, if this information is encrypted, it is also possible to crack the password by finding the private password of the computers, but in any case, the security is better using the SSH protocol.</p> <p dir="ltr">Obviously this protocol, like many other protocols, has many weaknesses, and usually network administrators try to have more secure SSH connections by applying a series of restrictions in the firewalls.</p> <p dir="ltr">For example, in some networks, they change the port number of the SSH protocol. Or sometimes it is determined on network firewalls that only specific IP addresses can use the SSH port to increase the security of this protocol.</p> <p dir="ltr">If you want, you can learn more on the Internet about how the SSH protocol was created and how port 22 was assigned to this protocol.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img id="DNS" src="/images/uploaded/blog03/277.webp" alt="Domain Name System Server" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h5 dir="ltr">DNS</h5> <p dir="ltr">In computer networks, a <a href="/domain-name-system">DNS server or Domain Name System server</a> is required so that computers can ask their queries from this server.</p> <p dir="ltr">You may not have much information in the real world. For example, you don't remember all the phone numbers, and to find a phone number for a public place, you can call 911.</p> <p dir="ltr">The same thing happens in computer networks and your computer has to send a request to its DNS server to know a piece of information in the network.</p> <p dir="ltr">Your DNS may not know the answer to this question and has to ask another DNS server or send you to another DNS that knows the answer to this question.</p> <p dir="ltr">The DNS server has three important tasks in computer networks and I will explain each of these tasks in a future article:</p> <ul dir="ltr"> <li>Convert FQDN to IP</li> <li>Convert IP to FQDN</li> <li>Service Locator</li> </ul> <p dir="ltr">A lot can be explained about DNS. Indeed, DNS is one of the topics you can discuss for days. Also, if you've entered the world of security and are familiar with attacks using DNS, you know that DNS is one of the most important and fascinating discussions in the web world.</p> <p dir="ltr">By default, a DNS server uses port 53 to serve clients.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img id="Network_Admin_and_Engineering" src="/images/uploaded/blog03/278.webp" alt="Network Admin &amp; Engineering" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Network Admin &amp; Engineering</h2> <p dir="ltr">In some job interviews you may be asked what is the difference between Network Admin and Network Engineering. It is possible to classify the OSI layers according to the type of information they contain and their functions.</p> <p dir="ltr">This is also a type of OSI layer classification. The network administrator understands the first three layers of the OSI model. In fact, Network Admin includes Application Layer, Presentation Layer, and Session Layer, which administrators are usually responsible for managing.</p> <p dir="ltr">In the CCNA and CCNP courses, which are Cisco courses, the focus is on the first four levels of the OSI model. These layers are communication layers between workstations and the people working on these layers are called Network Engineering.</p> <p dir="ltr">Indeed, in Network Engineering, a platform for communication in computer networks is created, but the three upper levels, i.e., the levels of administration of the network, determine the purpose of communication.</p>urn:store:1:blog:post:1144https://mixseda.com/logical-classification-of-networksLogical classification of networks<p dir="ltr"><img src="/images/uploaded/blog03/246_1000.webp" alt="دسته بندی منطقی شبکه‌های کامپیوتری" width="100%" /></p> <p dir="ltr">In previous articles we talked about the <a href="/type-of-area-networks">classification of computer networks in terms of geography</a> and the <a href="/types-of-network-topology">types of computer networks in terms of topology</a>. In general, networks can be divided into 4 types:</p> <ul dir="ltr"> <li>Geographical scope of computer networks</li> <li>Network topologies</li> <li><a href="/networks-in-terms-of-managing-access-to-resources">Management of computer networks</a></li> <li>Logic and architecture of computer networks</li> </ul> <p dir="ltr">Today we will talk about the logical classification of computer networks. Computer networks are logically divided into three categories:</p> <ul dir="ltr"> <li>P2P</li> <li>Multicast</li> <li>Transmission</li> </ul> <p dir="ltr">When we say logical classification of networks, we are talking about information transmission technology. Below, I'll explain each of these categories to you.</p> <h2 dir="ltr">P2P</h2> <p dir="ltr">Sometimes this category is known as Peer to Peer, Point to Point and unicast. Indeed, it is very easy to define P2P networks, these networks are created by connecting two hosts directly to each other.</p> <p dir="ltr">In peer to peer networks, one of the biggest challenges is finding the shortest path between two computers. This type of logical connection and categorization of opinion is also called as.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/247_1000.webp" alt="P2P or unicast -peer to peer" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Multicast</h2> <p dir="ltr">Multicast is another type of computer-to-computer communication, in which one computer communicates with multiple computers. In this type of communication, the computer responsible for sending the information knows exactly which computer to send the information to.</p> <p dir="ltr">In multicast and P2P networks, the most important issue is that the source and destination computers must exist and be known. For example, as you can see in the following figure, computer F only sends data to recipients, i.e. computers B and E.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/249_1000.webp" alt="multicast" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Broadcast</h2> <p dir="ltr">Broadcast networks are exactly the same as multicast networks, except that in broadcast networks it doesn't matter if the target computers exist or not.</p> <p dir="ltr">Imagine that a computer transmits some information using radio waves. In practice, it does not matter to this computer whether the target computers to which this information is sent are available on the network or not; And the sending computer is only responsible for sending the information.</p> <p dir="ltr">A similar example to this type of computer networks are analog television networks; where analog waves are sent to everyone through a transmitter. Now, if you are online, you will receive this information and if you are not online for any reason, you will not receive this information.</p> <p dir="ltr">A similar thing happens in computer networks; When a packet is broadcast on your network. Anyone actively on your network will receive that packet.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/248_1000.webp" alt="Broadcast" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">Of course, if we want to be more precise and technical on this topic, let's say that every computer located in the collision domain will receive this network packet.</p> <p dir="ltr">Each of the logical network types we mentioned above are designed for their own applications. For example, Broadcast is used in the DHCP service, which we will explain in the future.</p> <p dir="ltr">Or you will become familiar with a service called WDS that uses Multicast in MCSE classes. I would like to give you a brief explanation about this service.</p> <p dir="ltr">WDS stands for <a href="https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh831764(v=ws.11)">Windows Deployment Services</a>; It is a Microsoft service that allows you to install a system on multiple computers at the same time.</p> <p dir="ltr">For example, imagine you want to install a single operating system on 10,000 computers with drivers and software that you have already provided. In fact, if you plan to do it manually, you could be involved for months.</p> <p dir="ltr">However, using the WDS service, you have the option of installing the operating system on several thousand computers at the same time, and if you have the necessary facilities for this service, this work will be completed in one day.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/دسته-بندی-منطقی-شبکه-های-کامپیوتری" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:1142https://mixseda.com/type-of-area-networksType of Area Networks<p><strong><img src="/images/uploaded/blog03/242_1000.webp" alt="دسته بندی جغرافیایی شبکه‌های کامپیوتری" width="100%" /></strong></p> <p>In general, computer networks are divided into geographical and logical categories. Of course, some people also classify computer networks based on <a href="/types-of-network-topology">network topologies</a>, but since most networks have the same topology for communicating with servers and computers; This category is not very important.</p> <p>As far as I know, computer networks are divided into the following five categories in terms of geographic location:</p> <ul> <li>PAN</li> <li>LAN</li> <li>MAN</li> <li>WAN</li> <li>CAN</li> </ul> <p>Of course, in addition to these five categories, we have other categories in the network world, some of which we will mention below. For example, in some articles you will come across networks called SANs and RANs. I want to explain very briefly, in fact, two types of categories are not used by you.</p> <p>In classifying computer networks in terms of geographic scope, these two categories are more important than other categories, and these two categories are LAN and WAN. Before I begin, I want to explain to you that a lot of these things I'm explaining to you are conceptual and just a set of definitions.</p> <h2>PAN (Personal Area Network)</h2> <p>PAN networks are geographically the smallest type of network classification. Existing definitions of this type of network are not very logical in my opinion. Personal Area Network refers to the networks that are found within a person's body.</p> <p>For example, imagine that a smartwatch is connected to an Android smartphone via wireless technologies such as Bluetooth. When that happens we will have a PAN which by definition falls within the scope of a human body.</p> <p>In general, networks that generally consist of two or three hosts are called PAN networks.</p> <h2>LAN (Local Area Network)</h2> <p>Local Area Network refers to networks that are located within a building, room, company, etc. In some sources, the number of hosts that make up this type of computer network is defined as less than 10 or at most 10.</p> <p>But in practice, if the number of clients and servers increases in a LAN, the nature of the network does not change and this type of computer network is still called LANs. That is, if you come across a large network where network cables have been used inside a building, this is a LAN.</p> <p>If we want to make our definition of Local Area Network a little more complete; We can say: LANs are networks that have an infrastructure in a limited geographical location. And the number of clients and servers in the LANs has nothing to do with the geographic area.</p> <p>On the other hand, LAN networks are also related to the type of communication technology and network media, but the most important principle in this type of computer network is that the management of these networks is internal. It means that these networks should not be managed from outside the LANs.</p> <p>&nbsp;</p> <p><strong><img src="/images/uploaded/blog03/241_1000.webp" alt="Local Area Network" width="100%" /></strong></p> <p>&nbsp;</p> <p>In LANs, you can do more with higher access. It means that in terms of network technology and infrastructure, LAN technology is determined by you and me, who are the network administrators.</p> <p>But this doesn't happen in wide area networks. For example, you can't contact your ISP or home internet provider and ask them to increase speed or open access to unauthorized sites and servers.</p> <p>I told you above that PAN networks don't make much sense to me. The reason for this is now easier to understand. The PAN network is limited to a certain geographic area and its management permissions are determined by us. Consequently, PANs are also the same as LANs.</p> <h2>MAN (Metropolitan Area Network)</h2> <p>MAN networks consist of several LANs. As mentioned above, this category is one of the sub-categories of the network in terms of geographic boundaries. The communication management and technology of MAN networks are also designed and implemented by us, just like LANs.</p> <p>For example, imagine you have 4 buildings close to each other and I intend to establish communication between these buildings. In this case, one of the solutions is to provide the possibility of connecting the LAN network of each building with other buildings through wireless communication technologies such as radio.</p> <p>If this happens successfully, I will finally have a MAN or metro network. The problem is that we are not allowed to carry out activities outside of public buildings and places. For example, I can't dig into the ground to connect my networks via fiber optics.</p> <p>Or even I cannot use any radio or wireless solution to implement the MAN network because doing some of these actions requires legal permissions.</p> <p>&nbsp;</p> <p><strong><img src="/images/uploaded/blog03/243_1000.webp" alt="Metropolitan Area Network" width="100%" /></strong></p> <p>&nbsp;</p> <p>The truth is, I don't know much about these types of networks. What I read in an educational video about MAN networks is that MAN networks are generally within a city. Metropolitan means a big city.</p> <h2>WAN (Wide Area Network)</h2> <p>WANs are the largest type of computer networks in terms of geographic scope. The largest WAN in the world; It is called the Internet and we are only active in a very small part of it.</p> <p>The most important principle in WANs is that we don't manage the media. For example, we have a number of MPLS services, which means we use the infrastructure of another company or organization to connect our networks.</p> <p>&nbsp;</p> <p><strong><img src="/images/uploaded/blog03/244_1000.webp" alt="Wide Area Network" width="100%" /></strong></p> <p>&nbsp;</p> <p>For example, imagine that the telecommunications company uses a fiber-optic infrastructure to exchange information between cities. In this case, I can enter into an agreement with the telecommunication company that my connection between two buildings in different cities will be made through the infrastructure of the telecommunication company.</p> <p>Of course, the use of MPLS services is usually very expensive and costly for businesses, and on the other hand, there is no guarantee that the service company will not monitor network traffic. Also, one of the other problems with these services is that it is not known whether there will be an extension after the contract expires.</p> <p>This means that you cannot be sure of the permanent connection and cost of these services in the future.</p> <h2>CAN (Campus Area Network)</h2> <p>There is another network called CAN, which means Campus Area Network. In fact, a WAN network arises from the connection of several CAN networks together. In short, the CAN network includes a LAN defined in a field.</p> <p>For example, consider a university that includes several faculties. The LANs found within each of these faculties are called CAN. Because each of these faculties is a geographical place like a field.</p> <p>Learning these CAN, PAN and MAN networks is only recommended for individuals wishing to take the Network + exam. Basically, in the world of networking, we know LANs and WANs in terms of geography, and it is enough for you to learn just these two types of networks.</p> <p>Except for the things we've explained above, you might also find concepts like BAN, RAN, and SAN with a little internet search. For example, SANs or Storage Area Networks indicate networks for storing information.</p> <p>As far as I know, SANs are used for the connection between servers and storage and you will learn about them later in MCSE courses.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/دسته-بندی-جغرافیایی-شبکه-های-کامپیوتری" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:1140https://mixseda.com/types-of-communication-mediaTypes of communication media<p dir="ltr"><strong><img src="/images/uploaded/blog03/230_1000.webp" alt="Types of communication media" width="100%" /></strong></p> <p dir="ltr">Media refers to infrastructure and communication. What I want to explain in this section are the types of media.</p> <p dir="ltr">The types of media in the network are divided into the following categories:</p> <ul dir="ltr"> <li>Coaxial cables</li> <li>Twisted pair cables</li> <li>Fiber Optic Cables</li> </ul> <p dir="ltr">Below, I'll explain each of these elements to you.</p> <h2 dir="ltr">Coaxial cables</h2> <p dir="ltr">The word Coaxial in Farsi means the same axis. Currently, these cables are used in many CCTV cameras. Some of these cables have two more wires in addition to the main cable for power transmission.</p> <p dir="ltr">Of course, the use of coaxial cables is much broader than just using it in CCTV cameras. In many cases, coaxial cables are used to transmit signals and waves, an example of which are antenna cables in residential buildings.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><strong><img src="/images/uploaded/blog03/231_1000.webp" alt="Coaxial cable components" width="100%" /></strong></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">Coaxial cables consist of the following parts:</p> <ul dir="ltr"> <li>External coating or insulation</li> <li>Director of Afshan</li> <li>Interior lining or insulation</li> <li>Nucleus</li> </ul> <p dir="ltr">In coaxial cables, the function of the internal insulation is to prevent the connection of the conductive conductor with the core. Coaxial cables themselves also have different types based on the type of brain and the amount of signal they can pass through.</p> <p dir="ltr">In some coaxial cables, the core itself consists of multiple cores twisted together. If you look closely, the conductive conductor is also woven quite regularly around the internal insulation. The reason for this is that external induced waves and electric fields are less likely to disturb the cable signal.</p> <h3 dir="ltr">Types of coaxial cables</h3> <p dir="ltr">Coaxial cables can be classified in two ways. First of all, these cables have different types and are divided according to their type. Secondly, these cables are divided according to their impedance.</p> <p dir="ltr">As far as I know, the types of coaxial cables are divided into the following 4 categories:</p> <ul dir="ltr"> <li>RG6</li> <li>RG11</li> <li>RG59</li> <li>RG60</li> </ul> <p dir="ltr">RG6 cables are used to connect televisions to central antennas and home satellites. It can almost be said that this type of coaxial cable is the weakest in signal transmission. Generally, RG6 cables are considered to be the oldest type of coaxial cables.</p> <p dir="ltr">The RG11 cable is used in commercial buildings and large complexes. In general, this type of coaxial cable is used to transmit signals over long distances.</p> <p dir="ltr">RG59 cables are usually used in all types of CCTV cameras. Of course, advanced cameras are usually network controlled and don't need this coaxial cable.</p> <p dir="ltr">RG60, this type of cable is used for high volume data transmission and this type of cable has the ability to transmit the largest volume of data among coaxial cables. Some TVs that use high quality to transmit images use RG60 cables.</p> <p dir="ltr">Coaxial cables are divided into the following two categories in terms of impedance:</p> <ul dir="ltr"> <li>50 <span class="kgnlhe" dir="ltr" tabindex="0" role="button" data-term-type="tl" data-sl="en" data-tl="fa">ohm</span></li> <li>75 <span class="kgnlhe" dir="ltr" tabindex="0" role="button" data-term-type="tl" data-sl="en" data-tl="fa">ohm</span></li> </ul> <p dir="ltr">In the article on the <a href="/types-of-network-topology">types of topologies of computer networks</a>, we talked about the cables of Thick net and Thin net networks in BUS topology. I'm not going to repeat the same content for you here.</p> <p dir="ltr">And I would like to remind you briefly that in thin network networks, due to the lower impedance, the maximum length of your cabling may be 185 meters, but in thick network networks, due to the presence of a higher impedance, the length of your wiring can be up to 500 meters standard. also increase.</p> <h3 dir="ltr">Coaxial cable connectors</h3> <p dir="ltr">Except for some very limited cases where coaxial cables are used directly or with dedicated connectors, BNC connectors are usually used to connect coaxial cables.</p> <p dir="ltr">These connectors themselves have two types:</p> <p dir="ltr">Some of these connectors are pressed and used for the cable by means of special devices, but in other types the core of the coaxial cable is fixed to the connector with a screw and a metal clamp while establishing the connection with the conductive conductor; It also holds the cable.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><strong><img src="/images/uploaded/blog03/232_1000.webp" alt="Coaxial connectors" width="100%" /></strong></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">In video cameras, whose connector type is BNC type, they usually use the BNC push connector type. Also, many CCTV cameras include this type of connector.</p> <p dir="ltr">A BNC screw connector is used on the back of TVs and to connect device antennas. Coaxial cables have the ability to transmit any type of information, but are usually used to transmit images.</p> <p dir="ltr">Some <a href="/digital-mixers">digital audio mixers</a> also have the ability to take audio and video signals from these connectors and work on them.</p> <h2 dir="ltr">Twisted-pair cables</h2> <p dir="ltr">Twisted pair means a pair twisted together and twisted pair cables are cables that have a number of strands twisted together two by two.</p> <p dir="ltr">Perhaps the first question that comes to your mind is why should these cables be twisted together? Indeed, these cables neutralize each other the magnetic effect. Consequently, the amount of magnetic effect created by these cables and the cables adjacent to these cables will have little effect on the signal of these cables.</p> <h3 dir="ltr">Twisted-pair telecommunication cables</h3> <p dir="ltr">Twisted-pair telecommunication cables are used to transmit telecommunication data. These cables are composed of different pairs and types depending on their use.</p> <p dir="ltr">To better distinguish these twisted pairs, a number of main standards have been defined, and in fact all cable factories produce these cables based on these standards.</p> <p dir="ltr">For example, regarding the coloring of these telecommunication pairs, there are a series of main colors and secondary colors, which I will explain to you in the table below.</p> <table class="tablemix" dir="ltr"> <tbody> <tr> <td width="53"> <p>Row</p> </td> <td width="258"> <p>Original coloring</p> </td> <td width="312"> <p>Cable sub-coloring</p> </td> </tr> <tr> <td width="53"> <p>1</p> </td> <td width="258"> <p>white</p> </td> <td width="312"> <p>Blue</p> </td> </tr> <tr> <td width="53"> <p>2</p> </td> <td width="258"> <p>Red</p> </td> <td width="312"> <p>orange</p> </td> </tr> <tr> <td width="53"> <p>3</p> </td> <td width="258"> <p>Black</p> </td> <td width="312"> <p>Green</p> </td> </tr> <tr> <td width="53"> <p>4</p> </td> <td width="258"> <p>yellow</p> </td> <td width="312"> <p>Brown</p> </td> </tr> <tr> <td width="53"> <p>5</p> </td> <td width="258"> <p>Purple</p> </td> <td width="312"> <p>Gray</p> </td> </tr> </tbody> </table> <p dir="ltr">&nbsp;</p> <p dir="ltr">In twisted-pair cables, any primary color can be combined with any secondary color and radiated to each other, but you will never have the combination of two white pairs. It means that two main colors or two secondary colors are never irradiated with each other.</p> <p dir="ltr">The following photo shows 25 twisted pairs that are produced by the color scheme in the table above:</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><strong><img src="/images/uploaded/blog03/226_1000.webp" alt="Color combination of twisted-pair cables" width="100%" /></strong></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">In fact, standard worldwide, the first pair of twisted pairs consists of a white and blue color scheme. Then the next pair of twisted pair cable colors is white and orange and this combination continues until the primary white color is combined with all secondary colors.</p> <p dir="ltr">Then it is the turn of the next main color to be combined with the secondary colors one by one. The next main color is red. This means that the sixth pair of twisted pairs in the world is the red-blue color scheme.</p> <p dir="ltr">The combination of the above colors in twisted pair telecommunication cables produces 25 pairs of cables, but the number of pairs of telecommunication cables reaches several hundred pairs in some cases. Here, what the factories that make these cables do is wrap a blue-white cover around these 25 pairs.</p> <p dir="ltr">Then, the next 25 even numbers placed inside the cable are wrapped around a white and orange cover and so on. If this process continues 4 times, we will have 100 twisted cables and with this combination we can make 625 twisted pairs.</p> <p dir="ltr">In most cases, the cable manufacturer only puts a colored band around the cables instead of a cover. Because practically the presence of a colored band can determine the category of cables and there is no need for a cover.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><strong><img src="/images/uploaded/blog03/227_1000.webp" alt="Twisted-pair telecommunication cables" width="100%" /></strong></p> <p dir="ltr">&nbsp;</p> <h4 dir="ltr">Telecommunication cable sockets</h4> <h5 dir="ltr">4P2C RJ9 Connector</h5> <p dir="ltr">These connectors are usually used to connect phones. Generally, a twisted pair is connected to this type of connector.</p> <h5 dir="ltr">4P4C RJ9 Connector</h5> <p dir="ltr">In the case of switchboards and telephones connected to switchboard devices, these connectors are usually used. Two twisted pairs are connected to this connector and in the telephones, in addition to the main signals, other data is also transmitted through the other pair.</p> <p dir="ltr">In some cases, this type of connector is also used to connect some ADSL and VDSL modems. Of course, this depends on the type of wiring in the building.</p> <h5 dir="ltr">6P4C RJ11 Connector</h5> <p dir="ltr">This type of connector is exactly the same as the 4P4C RJ9 connector, except that in this type of connector you will have two blank pins. In practice, these two connectors will have no difference from each other and the only difference lies in their design format.</p> <h5 dir="ltr">6P6C RJ11 Connector</h5> <p dir="ltr">In many cases, this connector is not used for telecommunication cables. This connector has the ability to connect three pairs of wires and is used for very few tasks.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><strong><img src="/images/uploaded/blog03/228_1000.webp" alt="Telecommunication cable sockets" width="100%" /></strong></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">In the standards you see in the image above, you may have noticed the meaning of P and C. 6P means that this connector has 6 parts to place the pin and 4C means that of these 6 parts, only 4 metal parts are found for connecting to the wire and connector.</p> <h3 dir="ltr">Twisted-pair cables in the network</h3> <p dir="ltr">The twisted pairs in the network are the same as the twisted pairs in telecommunication cables, except that the colors of these cables are different. These cables have 4 pairs twisted together. The color of these cables is such that the white color is combined with 4 secondary colors and each of these 4 secondary colors is repeated once.</p> <table class="tablemix" dir="ltr"> <tbody> <tr> <td width="53"> <p>Row</p> </td> <td width="318"> <p>Composition</p> </td> <td width="252"> <p>The result of the combination</p> </td> </tr> <tr> <td width="53"> <p>1</p> </td> <td width="318"> <p>Main color white + secondary color blue</p> </td> <td width="252"> <p>White-blue</p> </td> </tr> <tr> <td width="53"> <p>2</p> </td> <td width="318"> <p>Blue secondary color</p> </td> <td width="252"> <p>Blue</p> </td> </tr> <tr> <td width="53"> <p>3</p> </td> <td width="318"> <p>Main color white + secondary color orange</p> </td> <td width="252"> <p>White-orange</p> </td> </tr> <tr> <td width="53"> <p>4</p> </td> <td width="318"> <p>Orange subcolor</p> </td> <td width="252"> <p>orange</p> </td> </tr> <tr> <td width="53"> <p>5</p> </td> <td width="318"> <p>Main color white + secondary color green</p> </td> <td width="252"> <p>White-green</p> </td> </tr> <tr> <td width="53"> <p>6</p> </td> <td width="318"> <p>Green secondary color</p> </td> <td width="252"> <p>Green</p> </td> </tr> <tr> <td width="53"> <p>7</p> </td> <td width="318"> <p>White main color + brown secondary color</p> </td> <td width="252"> <p>White-brown</p> </td> </tr> <tr> <td width="53"> <p>8</p> </td> <td width="318"> <p>Brown undertone</p> </td> <td width="252"> <p>Brown</p> </td> </tr> </tbody> </table> <p dir="ltr">&nbsp;</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><strong><img src="/images/uploaded/blog03/233_1000.webp" alt="Twisted-pair cables in the network" width="100%" /></strong></p> <p dir="ltr">&nbsp;</p> <h4 dir="ltr">Structure of twisted-pair cables</h4> <p dir="ltr">The same twisted-pair cables in computer networks have different types based on the type of structure:</p> <ul dir="ltr"> <li>UTP</li> <li>STP</li> <li>FTP</li> <li>SFTP</li> </ul> <p dir="ltr">The letters TP at the end of each of the above types are short for twisted-pair words. Below, I'll give you a brief explanation on each of these types:</p> <h5 dir="ltr">UTP</h5> <p dir="ltr">Unshielded UTP or twisted pair network cables are unshielded cables. In fact, these types of cables have no protection or shielding around the cable, and the only protection is the plastic shell of the cable itself.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><strong><img src="/images/uploaded/blog03/236_1000.webp" alt="UTP Twisted-pair" width="100%" /></strong></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">These cables are usually used in places where there is no noise and magnetic induction. As these cables do not have any kind of protection and running a power cable next to these types of cables can easily cause noise in the network.</p> <h5 dir="ltr">STP</h5> <p dir="ltr">Unlike UTP cables, STP or shielded twisted-pair cables have a braided shield around the wire, which increases the resistance of the wire and reduces the effect of magnetic induction of other cables on this type of cable.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><strong><img src="/images/uploaded/blog03/238_1000.webp" alt="STP Twisted-pair" width="100%" /></strong></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">Of course, we don't discuss cable resistance much in the network discussion, and most of our priority is to use equipment to reduce noise. Surely, if you do standard wiring, you shouldn't worry too much about the resistance of the wires because these wires pass through the conduit and nothing will damage them.</p> <h5 dir="ltr">FTP</h5> <p dir="ltr">FTP or twisted-pair cables are cables that have foil wrapped around each pair of cables to reduce the amount of noise created by the magnetic induction of other pairs. In fact, this foil protects each pair from other pairs of cables.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><strong><img src="/images/uploaded/blog03/237_1000.webp" alt="FTP Twisted-pair" width="100%" /></strong></p> <p dir="ltr">&nbsp;</p> <h5 dir="ltr">SFTP</h5> <p dir="ltr">SFTP or shielded twisted-pair cables are cables that, in addition to the shield, also have a foil wrapped around each pair. These cables are thicker than other types of network cables and are not easily flexible. Also, connecting the connector to this type of wire is a bit more difficult than with UTP cables.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><strong><img src="/images/uploaded/blog03/235_1000.webp" alt="SFTP Twisted-pair" width="100%" /></strong></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">But in terms of durability and performance, this type of cable is much better than UTP. Usually, they try to use these cables in places where access is more difficult, because less noise affects the data passing through these cables and also these cables are more durable than other network cables.</p> <p dir="ltr">These four types of cables that we have explained above are also classified by manufacturing factories based on the material used in the artifact and the type of component placement. Perhaps you will come across cables that consist of multiple layers.</p> <p dir="ltr">Usually, these products are custom made and there is no global and international standard defined for them. For example, if you are looking for double shielded cables on the internet, you will definitely see them.</p> <h4 dir="ltr">Classification of network cables based on category</h4> <p dir="ltr">In addition to the type of structure that network cables have and by which they are classified, we also learn about another concept called category or CAT in network cables. Category is a category of network cables that determines the maximum amount of cable bandwidth in networks.</p> <p dir="ltr">The higher the CAT number written on a network cable, the more the wires of the cable are stacked and with this number also increases the data exchange rate and the amount of data the cable can transfer in one second. I have prepared the specifications of these categories for you in the following table.</p> <table class="tablemix"> <tbody> <tr> <td width="42"> <p>Row</p> </td> <td width="119"> <p>UTP category</p> </td> <td width="186"> <p>Data Rate</p> </td> <td width="102"> <p>Max. Length</p> </td> <td width="150"> <p>Cable Type</p> </td> </tr> <tr> <td width="42"> <p>1</p> </td> <td width="119"> <p>CAT1</p> </td> <td width="186"> <p>Up to 1Mbps</p> </td> <td width="102"> <p>-</p> </td> <td width="150"> <p>Twisted pair</p> </td> </tr> <tr> <td width="42"> <p>2</p> </td> <td width="119"> <p>CAT2</p> </td> <td width="186"> <p>Up to 4Mbps</p> </td> <td width="102"> <p>-</p> </td> <td width="150"> <p>Twisted pair</p> </td> </tr> <tr> <td width="42"> <p>3</p> </td> <td width="119"> <p>CAT3</p> </td> <td width="186"> <p>Up to 10Mbps</p> </td> <td width="102"> <p>100m</p> </td> <td width="150"> <p>Twisted pair</p> </td> </tr> <tr> <td width="42"> <p>4</p> </td> <td width="119"> <p>CAT4</p> </td> <td width="186"> <p>Up to 16Mbps</p> </td> <td width="102"> <p>100m</p> </td> <td width="150"> <p>Twisted pair</p> </td> </tr> <tr> <td width="42"> <p>5</p> </td> <td width="119"> <p>CAT5</p> </td> <td width="186"> <p>Up to 100Mbps</p> </td> <td width="102"> <p>100m</p> </td> <td width="150"> <p>Twisted pair</p> </td> </tr> <tr> <td width="42"> <p>6</p> </td> <td width="119"> <p>CAT5e</p> </td> <td width="186"> <p>Up to 1Gbps</p> </td> <td width="102"> <p>100m</p> </td> <td width="150"> <p>Twisted pair</p> </td> </tr> <tr> <td width="42"> <p>7</p> </td> <td width="119"> <p>CAT6</p> </td> <td width="186"> <p>Up to 10Gbps</p> </td> <td width="102"> <p>100m</p> </td> <td width="150"> <p>Twisted pair</p> </td> </tr> <tr> <td width="42"> <p>8</p> </td> <td width="119"> <p>CAT6a</p> </td> <td width="186"> <p>Up to 10Gbps</p> </td> <td width="102"> <p>100m</p> </td> <td width="150"> <p>Twisted pair</p> </td> </tr> <tr> <td width="42"> <p>9</p> </td> <td width="119"> <p>CAT7</p> </td> <td width="186"> <p>Up to 10Gbps</p> </td> <td width="102"> <p>100m</p> </td> <td width="150"> <p>Twisted pair</p> </td> </tr> <tr> <td width="42"> <p>10</p> </td> <td width="119"> <p>CAT8</p> </td> <td width="186"> <p>Up to 40Gbps</p> </td> <td width="102"> <p>30m</p> </td> <td width="150"> <p>Twisted pair</p> </td> </tr> </tbody> </table> <p dir="ltr">&nbsp;</p> <p dir="ltr">Of course, CAT1 to CAT4 cables are no longer used in computer networks and are actually obsolete. CAT1 cables were used in old telecommunication networks for old phones. CAT2 cables have also only been used in token ring network topologies in the past.</p> <p dir="ltr">Maybe the above table raises the question for you, what's the difference between CAT6 and CAT7 cables?</p> <p dir="ltr">CAT6 and CAT6a cables have a transmission power of 10 Gbps only up to 55 meters in length. Meanwhile, CAT7 cables up to 100 meters can transfer this amount of data per second.</p> <h4 dir="ltr">Network cable connectors</h4> <p dir="ltr">The only connector used to connect network cables is the RJ-45 connector, which in turn has different designs based on the material and type of metal used and these connectors are usually based on the type of network cable used. the category is linked to it will be classified.</p> <p dir="ltr">As for connecting cables to this type of connector, there are two types of colors, known as T-568A and T-568B. Of course, the T-568B standard is usually used in computer networks. You can see them in the photo below:</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><strong><img src="/images/uploaded/blog03/239_1000.webp" alt="Network cable connectors" width="100%" /></strong></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">You may be wondering if other colors cannot be used to connect these cables?</p> <p dir="ltr">In fact, you can use any color you want for your network cables. But if you don't use these standards, two problems may arise for you:</p> <p dir="ltr">- Usually these standards are designed in such a way that the least amount of noise affects your network. If you don't use these standards, you may notice a lot of noise on the network.</p> <p dir="ltr">-You are not always in charge of a network. After some time, another person may want to work on your network. In this situation, he should be able to easily do the wiring he needs by knowing these standards.</p> <h4 dir="ltr">Connect the connector to the network cables</h4> <p dir="ltr">You may see two types of network cables in your computer networks.</p> <h5 dir="ltr">Crossover</h5> <p dir="ltr">A crossover network cable is when one of the network cable connectors is connected as T-568B and the other cable connector is connected as T-568A. Of course, this type of cable is not common now and in the past they were used to connect two computers or two switches together.</p> <h5 dir="ltr">Straight</h5> <p dir="ltr">Straight cables are cables with both ends of the RJ-45 connectors connected such as T-568B or T-568A. This means, for example, that you have a cable with Rj-45 connectors connected to the standard T-568B on both ends of this cable.</p> <p dir="ltr">This type of cable is used to connect switches to computers. Currently network cards are smarter than ever and you connect any type of cable to any device, the network card itself recognizes the type of cable and you will not encounter any problems connecting cables.</p> <h2 dir="ltr">Fiber optic cables</h2> <p dir="ltr">Fiber optic cables are the fastest cables for data transmission. These cables have a much higher speed than other network cables. Also, the cost of network implementation using these cables is much higher than with other cables.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><strong><img src="/images/uploaded/blog03/234_1000.webp" alt="Fiber optic cables" width="100%" /></strong></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">Among the advantages of fiber optic networks we can mention:</p> <ul dir="ltr"> <li>high security</li> <li>noise immunity</li> <li>low weight</li> <li>High bandwidth</li> <li>High transfer speed</li> </ul> <p dir="ltr">Additionally, fiber optic cables have fewer cabling restrictions. In fiber optic cables, due to the existing structure, we cannot easily connect them together. The fiber optic cable connector is a device called Fusion, which for us does it easily.</p> <h3 dir="ltr">Types of fiber optic cables</h3> <p dir="ltr">There are two different types of optical fiber cables, and we will examine each of them below:</p> <h4 dir="ltr">Single mode</h4> <p dir="ltr">The core of these cables is smaller than multimode cables. So that the diameter of this core in singlemode fiber optic cables is between 8.3 and 10 microns. The bandwidth of singlemode cables over long distances is more than multimode.</p> <p dir="ltr">But for this type of fiber optic cable it is necessary to use a light source with a narrow spectrum. This means that a laser must be used for this type of fiber optic cable. The cost of implementing the network using singlemode cables is lower than multimode.</p> <p dir="ltr">But these cables have the power to transmit your information up to 80 kilometers. Also, since the light inside this type of fiber optic cables only moves directly, the transmission speed of these cables is also higher than in the Multi mode.</p> <h4 dir="ltr">Multi mode</h4> <p dir="ltr">This type of cable has a thicker core and the diameter of this core is between 50 and 100 microns. You can transfer up to 400 meters of data using this cable. Also, this type of cable has more applications due to its lower cost than singlemode cables.</p> <p dir="ltr">For example, in many data centers and office complexes, this type of cable is used for data transmission because both its cost is lower and you won't have more than 400 meters of cabling in the complexes. Furthermore, the light source of this type of fiber optic cable does not necessarily have to be a laser and LEDs can also be used for this type of cable.</p> <p dir="ltr">If you intend to use multimode fiber optic cables over long distances, you need to use devices called repeaters, which are expensive to use.</p> <p dir="ltr">What repeater devices do is reproduce the signals and waves of a cable. Note that these devices reproduce waves and do not amplify the waves already generated.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><strong><img src="/images/uploaded/blog03/240_1000.webp" alt="Types of fiber optic cables" width="100%" /></strong></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/انواع-مدیا-های-ارتباطی" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:1138https://mixseda.com/types-of-network-topologyTypes of Network Topology<p dir="ltr"><img src="/images/uploaded/blog02/194_1000.webp" alt="Types of Network Topology" width="100%" /></p> <h2 dir="ltr">basic concepts</h2> <p dir="ltr">Before you want to familiarize yourself with the concept of topology and the topology types of computer networks, you need to familiarize yourself with a number of basic concepts. Next, I'll explain each of these concepts:</p> <h3 dir="ltr">Host</h3> <p dir="ltr">Guest means guest. A very important point in the specialist lessons is that there is no attempt to use the translated equivalent of the words. In the future, you need to be able to interact with your colleagues in job interviews, and memorizing the translated words could lead you astray.</p> <p dir="ltr">Any computer system that can analyze data or store it is called a host. Of course, we don't mean a computer system, a device with a mouse, keyboard, etc. A mobile phone that has the ability to analyze data is considered a host.</p> <p dir="ltr">By default, any laptop, computer, server, or any other device that can analyze or store data for you is considered a host.</p> <h3 dir="ltr">Workstation</h3> <p dir="ltr">Computer systems that are connected to a network and use network resources are called workstations. If we want to look at the matter more simply, the hosts that use network resources in your network are called workstations. A printer can act as a workstation on the network.</p> <h3 dir="ltr">Topology</h3> <p dir="ltr">Imagine that you have been provided with a host of hosts and intend to design a computer network using these hosts. The first thing that might come to your mind is how these hosts should connect to each other. This is exactly the concept of topology in the network.</p> <p dir="ltr">Topology is actually how network elements are physically connected. Maybe your idea of physical connection is a little different. The topology does not indicate the type of cable used. In effect, network topologies are communication structures used to network computers.</p> <p dir="ltr">Below, we will evaluate each of the network topologies and explain the advantages and disadvantages of each of these topologies for you loved ones.</p> <h2 dir="ltr">Examining types of topologies</h2> <h3 dir="ltr">Ring</h3> <p dir="ltr">Ring topology, as the name suggests, is created by connecting computer systems in a ring. In the ring topology, as can be seen in the following figure, for a packet to reach destination E from source A, it must pass through several computers.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/195_1000.webp" alt="Ring topology" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">For example, if computer A intends to send a packet to destination E, this packet will also pass through computers B, C and D. In fact, what happens here is that these computers drop it when they realize that the packet being sent is not it is related to them.</p> <p dir="ltr">In the Ring topology, packets do not continue to rotate and pass continuously between computers, but after reaching a point in the Ring, regardless of whether or not they have reached the desired destination, they are discarded.</p> <p dir="ltr">The following are the advantages of the ring topology:</p> <ul dir="ltr"> <li>The cabling length of this topology is less than other topologies.</li> <li>The cost of using this topology is lower and it is among the cheap topologies.</li> </ul> <p dir="ltr">Of course, this topology has many disadvantages. For example, if one of these computers goes off the network for any reason, access to other computers becomes impossible. In terms of security, networks using this topology had a very low security level.</p> <p dir="ltr">Another disadvantage of this topology is the troubleshooting of such networks. Suppose the cable between two computers is unable to transfer data for any reason. In your network, you need to strive to notice the desired cable failure. It will also be difficult for you to update these networks.</p> <p dir="ltr">Adding more computers to these networks can take a long time. To add some computers to the network, it may be necessary to disconnect the old network for some time to connect new connections to the computers you plan to add to the network.</p> <h3 dir="ltr">Mesh</h3> <p dir="ltr">In networks using mesh topology, each <a href="/network-equipment-and-components">network component</a> is connected to each other separately. You can see an example of this network in the image below.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/196_1000.webp" alt="Mesh topology" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">In networks using mesh topology, when a computer is disconnected, the computer's network is not disconnected. That is, what happened in ring networks when a computer is disconnected does not happen in these networks.</p> <p dir="ltr">Also, if a cable is unable to transfer data to the destination, only the connection between the two computers will be broken. Troubleshooting these networks is also much easier than networks that use the ring topology.</p> <p dir="ltr">As for the disadvantages of these networks, what is very clear at first glance is the amount of cabling between the computers. Suppose we want to add another computer in the same image above; For this, you need to get as many cables as there are computers in your network.</p> <p dir="ltr">That is, if I want to add the seventh computer to my network, I have to prepare six cables to connect this computer to other computers in my network. In fact, the formula for calculating the number of cables connected to each computer on the network is "n-1", where n is the number of computers on your network.</p> <p dir="ltr">When the amount of cabling of a topology is high, the cost of implementing that topology will be high. Therefore, the use of mesh topology is very expensive, especially in large networks.</p> <p dir="ltr">On the other hand, it is very difficult to expand networks that use this topology for data transmission.</p> <h3 dir="ltr">Bus</h3> <p dir="ltr">The BUS topology is one of the obsolete topologies that almost as far as I know no one uses this topology anymore. In this topology, the coaxial cable is used for the implementation. Today, coaxial cables are used to transmit images and connect CCTV cameras.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/197_1000.webp" alt="Bus topology" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">When one computer sends a packet to another computer, this packet flows through the cable and each computer receives it. So only one computer keeps this package that belongs to it and other computers release the received package.</p> <p dir="ltr">When the packet reaches the end of the coaxial cable, one of the droppers drops all the packets.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/198_1000.webp" alt="Bus topology" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">Compared to the mesh topology, the BUS topology has fewer cabling and this less cabling reduces costs. On the other hand, the expansion of networks using BUS topology is much easier than networks using mesh or ring topologies.</p> <p dir="ltr">But in practice, we will still have a security problem in this topology because the data sent from one computer will be received by all computers.</p> <p dir="ltr">Another disadvantage of networks using this topology is that the traffic along the cable is very high and in many cases the network slows down. On the other hand, collisions often occur in these networks.</p> <p dir="ltr">Collision means collision or accident. When two computers start sending packets at the same time on a computer network and their sent packets go through the same path, we will see a collision.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/202_1000.webp" alt="data collision in networks" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">Collision in networks will cause a sharp decline in network performance. Therefore, in all technologies and products offered in the field of the network, they try to eliminate the collision or minimize the possibility of its occurrence.</p> <p dir="ltr">The networks that use the BUS topology are of two types:</p> <ul dir="ltr"> <li>Thick net</li> <li>Thin net</li> </ul> <p dir="ltr">Tick net networks use thicker coaxial cables than thin net networks. In fact, the thick network network cable is of the RG-8 type and the thin network network is of the RG-58 type.</p> <p dir="ltr">In thin mesh networks, coaxial cable is thinner and has more flexibility. In addition, RG-58 cables have an impedance of 50 ohms, which makes these cables suitable for use in BUS networks.</p> <p dir="ltr"><br />RG-58 cables are also used in CCTV cameras, image transmission and radio signal transmission. The standard amount of cabling in thin net networks is 185 meters maximum.</p> <p dir="ltr">Thick mesh cables are not easily flexible and in fact these cables are thicker than thin mesh cables. The standard amount of cabling in thick mesh networks is a maximum of 500 meters.</p> <p dir="ltr">Of course, in computer networks, the cabling is tried to be much lower than the defined standard, so that the network does not have to face communication problems in the future.</p> <h3 dir="ltr">Star</h3> <p dir="ltr">The star topology is used in many computer networks today. The data throughput of this topology is much higher than other topologies and its implementation is much simpler than previous topologies.</p> <p dir="ltr">In this topology, all workstations are connected to a central device such as a hob, switch, router or server and this central device performs the packet transmission work.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/199_1000.webp" alt="Star topology" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">The advantages of networks using star topology are many:</p> <ul dir="ltr"> <li>The data transfer speed is very high and this speed depends on the equipment used in the network.</li> <li>If one workstation is disconnected from the network, there will be no problems transferring data to the other workstations.</li> <li>If secure equipment is used as a central device in these networks, these networks will have high security.</li> <li>These networks are easily expandable.</li> <li>Compared to other topologies, this topology has a lower implementation cost.</li> <li>Troubleshooting networks using star topology is much easier than other topologies.</li> </ul> <p dir="ltr">Of course, this network topology also has some disadvantages. If your central device fails, the entire network will fail as well.</p> <h3 dir="ltr">Tree</h3> <p dir="ltr">The tree topology is a topology made up of several star topologies. That is, as you can see in the image below, a tree topology is formed by combining several star topologies.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/200_1000.webp" alt="Tree topology" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">The advantages and disadvantages of networks that use Tree topology are exactly the same as Star topology.</p> <h3 dir="ltr">Hybrid</h3> <p dir="ltr">Hybrid topology is a topology that uses mesh, bus, ring, and star topology. In fact, nobody uses this topology and it is mostly presented as a concept in classes.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/201_1000.webp" alt="Hybrid topology" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">Imagine that if ring and mesh topologies are used in a network and these two topologies are linked together using a star topology, then let's say that the topology used in this network is hybrid. Or it may be that three topologies of ring, bus and star have been used in a network and their combination is called hybrid.</p> <p dir="ltr">In general, different scenarios for hybrid topology can be created and discussed, but what you are dealing with in today's networks is not very related to this topology and you are expected to know the structure of these topologies for knowledge only. by <a href="/network-plus-course-training">Network Plus</a>.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/topology-شبکه-های-کامپیوتری" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:1136https://mixseda.com/what-is-security-identifierwhat is security identifier<p dir="ltr"><img src="/images/uploaded/blog02/183_1000.webp" alt="what is security identifier" width="100%" /></p> <p dir="ltr">SID stands for security identifiers. In Windows operating systems, there are identifiers called SIDs, which actually determine the security level of users and groups. In the first operating systems created by Microsoft there was no user.</p> <p dir="ltr">After the introduction of Windows Vista, Microsoft established a concept called users on its operating systems that distinguished users from each other. At the beginning of the work, there were only two users called guest and admin, obviously, the admin user access was greater than now.</p> <p dir="ltr">With the development of operating systems and their updates, over time, Microsoft has decided to reduce administrator access. Usually, in computer networks, due to the existence of a number of security problems, they try not to have a user with administrator access level.</p> <p dir="ltr">Or maybe you have also heard that in os hardening they say that you should disable admin user to increase the security of your system. Microsoft has done its best in new versions of Windows to not allow access to an admin program as much as possible.</p> <p dir="ltr">If you need to get administrator access for the program, you can only get this access to run that program using Run as administrator. Something similar to the Linux world where you normally use normal users and for jobs that require root access, you get higher access using sudo.</p> <p dir="ltr">There are some security concepts, like user context, that I don't want to talk about right now, but you can read more articles in English. (Regarding what level a program is running at when it is run on Windows.)</p> <p dir="ltr">Before you want to give any further explanation on SIDs, it's best to have an introduction to standard and default Microsoft Windows users and groups.</p> <h2 dir="ltr">Built-in Users &amp; Groups</h2> <p dir="ltr">We have a number of users and groups integrated into Microsoft products. Integrated means that when you install Windows, Windows automatically creates these users. For example, in Windows, if you pay attention to the Description section or the instructions of the administrator user, Built-In is written.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/184_1000.webp" alt="Built-in Users &amp; Groups" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">When installing Windows, the operating system itself creates a large number of groups and users as integrated. In the future, you can install software that will create a user or group to perform specific tasks. You use the lusrmgr console. msc you can view users and groups in your operating system.</p> <p dir="ltr">Just use the <strong>WIN + R</strong> combination keys and type <strong>lusrmgr. msc</strong> in the Run window, open the lusrmgr console.</p> <p dir="ltr">As for built-in groups, I'm just saying this to learn that these groups themselves are divided into two categories:</p> <p dir="ltr">Local built-in groups are groups created by the operating system and you can view them or make a user a member of these groups. In system-integrated groups, you can view these groups in the lusrmgr console. You are not msc.</p> <p dir="ltr">You will also learn in the future that you cannot change the structure and permissions of System Built-in groups. In fact, these groups are groups used by the operating system itself and you don't have permission to change them. You may think that in Windows operating systems, the administrator is the highest access level, but it is good to know that the system has the highest access level.</p> <p dir="ltr">Next, I'll explain each of these groups:</p> <h3 dir="ltr">Local Built-in Groups</h3> <p dir="ltr">As explained above, Local Built-in groups are groups created by the operating system itself or not created by the user. You can create a user and become a member of these groups. Depending on the version of the operating system, some of these groups may not be available on the system.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/185_1000.webp" alt="Local Built-in Groups" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h4 dir="ltr">Administrators Groups</h4> <p dir="ltr">Members of the administrators group are the users who have access to the most powerful user level. It can almost be said that the members of this group have received a lot of powers from the operating system. In addition to the permissions they have, members of the administrators group can also grant access to other users and groups.</p> <p dir="ltr">It can be said that members of the administrators group have all access available.</p> <h4 dir="ltr">Users Group</h4> <p dir="ltr">This group is generally designed for users who should have limited access. For example, the users of a small company are usually part of the user group. The user group does not have permission to install the software on the operating system and, if necessary, must have the password of one of the users in the administrators group.</p> <h4 dir="ltr">Replicator Group</h4> <p dir="ltr">Replica means replication. Replication in Domain mode networks transfers information between server and client. Replication is defined for many services. There are several types of replicas that you can read more about on the internet.</p> <p dir="ltr">In domains there is a feature called directory replication, why and how it works will be explained to you in Microsoft's MCSE classes. On domain networks, users who start the replication service must be members of this group.</p> <p dir="ltr">By default, no users are a member of the Replicator group and this group is created for directory replication access only.</p> <h4 dir="ltr">Backup Operators Group</h4> <p dir="ltr">As you know, one of the most important processes in operating systems, both Windows and non-Windows, is the backup process. The Backup Operators group is created so that a user wants to make a backup copy of system files.</p> <p dir="ltr">In many cases, a user does not do this manually and you add a user to this group and provide their information to the software to prepare a support release. The Backup Operators group does not have a default member such as the Replicator group.</p> <p dir="ltr">Members of the Backup Operators group can back up NTFS file systems even if they do not have access to them. You can use the Backup utility software to perform backup jobs.</p> <h4 dir="ltr">Event Log Readers Group</h4> <p dir="ltr">One of the things that every system, such as routers and switches, needs, and is given a lot of importance in medium to large organizations, is the issue of keeping records and recording systems and services.</p> <p dir="ltr">In CEH classes, the last step in hacking a system is clearly tracing or clearing traces, and most of this includes clearing a system's logs. For this reason, in organizations and large networks, various systems are implemented for record maintenance and logging operations.</p> <p dir="ltr">Users who join the Event Log Readers group can read the logs of a system. The process of reading and analyzing logs is considered a specialty in the world of networks. Of course, in small projects, many software can help you in this area.</p> <p dir="ltr">In criminology topics that you will surely become familiar with in the future, analyzing the logs and performing registration processes in different ways is one of the important tasks. By default, no members are assigned to the Event Log Readers group.</p> <h4 dir="ltr">Guests Group</h4> <p dir="ltr">The major group has very limited access to a system. This group appears in most operating systems or even in user management systems such as home modem systems. The purpose of creating this group is that if you want to give access to a user who is not a member of your network, enable this access level for him.</p> <p dir="ltr">Usually, in networks, due to the existence of security risks, an attempt is made not to have a user with the access level of the Guest Group. If you want to make a user a member of the Guests group, it's best to create a group with specific permissions and then make the desired user a member of that group.</p> <p dir="ltr">By default, in new Microsoft operating systems, the Guest user is a member of the Guests group.</p> <h4 dir="ltr">Power Users Group</h4> <p dir="ltr">The Microsoft company tries to maintain backward compatibility not only in the supply of Windows products, but also in the supply of all its products. For example, in the same replication discussion we explained, Microsoft tried to provide communication between the old and new versions of the services.</p> <p dir="ltr">Or in general, Microsoft products have always tried to ensure that new versions of a software have the ability to support the outputs of the old version. From Windows 7 onwards, the Power Users group was created to allow computers running Windows XP to access a folder in another Windows to retain access to it.</p> <h4 dir="ltr">Remote Desktop Users Group</h4> <p dir="ltr">I think many people are familiar with Remote Desktop Service. This service allows users of Windows operating systems to remotely control a computer on a computer network.</p> <p dir="ltr">In fact, Remote Desktop is a software-like remote service like ANYDESK, with the difference that in Remote Desktop the speed and quality of service is higher and you don't necessarily need the Internet to use it.</p> <p dir="ltr">We can talk about the advantages and disadvantages of Remote Desktop and its protocol in general, the issue that is important to us here is that members of the Remote Desktop Users group are able to connect to a remote computer using the Remote Desktop service.</p> <p dir="ltr">In fact, if we want to be more precise, the members of the Remote Desktop Users Group are able to access a computer remotely.</p> <h4 dir="ltr">Performance Monitor Users Group</h4> <p dir="ltr">Sometimes you may have noticed the slow speed of your computer. Usually, people facing a decrease in the speed of their system check the performance of their system using tools like task manager or more professional tools.</p> <p dir="ltr">The system performance check allows you to understand how much of the system processing volume is involved in which function and process. In larger networks, you don't have the ability to log into any systems and check system performance in case of problems.</p> <p dir="ltr">There are software and tools for this task that actually do Performance Monitor for you. One such tool is PerfMon, which you can run using the run window in Windows.</p> <p dir="ltr">In this article, I will not talk about the performance of these software. The only thing you need to know in this section is that users who are members of the Performance Monitor user group have the ability to access system performance.</p> <p dir="ltr">Members of this group can sit directly behind a computer system and access system performance information or view or collect this information remotely.</p> <p dir="ltr">Usually, in networks with adequate facilities, this information is collected and stored remotely so that, in the event of a problem, the source of the problem can be found.</p> <h4 dir="ltr">IIS_IUSRS Group</h4> <p dir="ltr">IIS stands for Internet Information Service and is a web server designed and provided by Microsoft. In fact, this web server is one of the simplest and easiest web servers in my opinion. The first version of IIS was for Windows NT version 3.51.</p> <p dir="ltr">As you know, Windows NT is one of the oldest operating systems and after Windows NT we have just seen Microsoft's Windows 2000. The iis web server information services use IIS_IUSRS group access.</p> <h4 dir="ltr">Network Configuration Operators Group</h4> <p dir="ltr">In computer networks, one of the things needed to network several computers together is the network configuration. In fact, setting of IP, subnetting, dns, etc. on computers is one of the first things you need to do to network multiple computers.</p> <p dir="ltr">Here, we have nothing to do with whether your network is a <a href="/networks-in-terms-of-managing-access-to-resources">workgroup or a domain</a>. To set up a computer's network card, you can access the change adapter setup section from the control panel or use the run window and ncpa console. Open the cpl.</p> <p dir="ltr">Members of the Network Configuration Operators group have the ability to configure and manage computer networks. Members of this group can change a computer's network settings (such as TCP / IP settings).</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/186_1000.webp" alt="TCP/IP settings" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h4 dir="ltr">Distributed COM Users Group</h4> <p dir="ltr"><strong>The first question that can occupy anyone's mind is what is Distributed COM and what is it for?</strong></p> <p dir="ltr">Distributed COM or Dcom is a protocol that allows direct communication of software elements on a network. Of course, the name of this protocol was OLE Network, but after some time it was changed to Distributed COM. This protocol also uses port 135.</p> <p dir="ltr">In the future we will talk about protocols and their port numbers. Here, you just need to know that every protocol in the computer world uses one or more unique ports and in fact, by using these ports, a protocol in two computers can communicate with each other.</p> <p dir="ltr">There is a lot of discussion about COM and its function, but in short, it can be said that Microsoft created this protocol to create a communication layer under the com + server. And the purpose of Distributed COM is to create this communication in a distributed way.</p> <p dir="ltr">On computers, users who are members of the Distributed COM Users group have the ability to activate and run distributed COM elements. Of course, this group has no members by default.</p> <h4 dir="ltr">Cryptographic Operators Group</h4> <p dir="ltr">In the future and in the topics related to information security, we will talk about cryptography. Currently, at this level of knowledge, it is a bit difficult to explain this content and to explain it I have to explain many concepts to you.</p> <p dir="ltr">For now, you know about cryptography to such an extent that most operating systems run cryptographic processes based on their functionality.</p> <p dir="ltr">Members of the cryptographic operators group have the ability to access or perform covert operations on the computer. And like many of the groups we've explained above, this group has no members by default.</p> <h4 dir="ltr">Hyper-V Administrators</h4> <p dir="ltr">In MCSE courses you will learn about another Microsoft service called Hyper-V. This service is used for virtualization like VMware ESXI. Of course, currently, as far as I know, products like ESXI are more powerful than Hyper-V.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/187_1000.webp" alt="Microsoft Hyper-V" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">The Hyper-V Administrators group is related to the Hyper-V service and we will discuss this group in future MCSE tutorials.</p> <h3 dir="ltr">System Built-in Groups</h3> <p dir="ltr">The members of the groups built into the system have specific criteria and criteria. Another feature of these groups is that via the lusrmgr console. msc cannot be managed, but the network administrator can use these groups to manage network resources.</p> <p dir="ltr">Many of the concepts I explain here are just for familiarity and better learning. You will be introduced to these groups in MCSE classes. So it doesn't matter if you don't understand the significance of some of these groups which I will explain below.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/188_1000.webp" alt="System Built-in Groups" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h4 dir="ltr">Creator Owner</h4> <p dir="ltr">Creator Owner simply indicates the owner of data or processes in Windows operating systems. For example, if the mixseda user creates a folder on their desktop, the Creator Owner is considered a folder. If you create a backup job on your computer, you are the Creator Owner of that job.</p> <p dir="ltr">In fact, the use of Creator Owner serves to specify the exact ownership of a process or data in Microsoft operating systems. When you read the permissions of the Windows OS and try them one by one, you will understand the Creator Owner concept.</p> <p dir="ltr">Actually, as a user in Windows operating systems, since I am the owner and Creator Owner of a file, I have the ability to perform certain activities on that file. without having permission for that file. Of course, this is not an accurate explanation, but I think it suffices.</p> <h4 dir="ltr">Everyone</h4> <p dir="ltr">Everyone who can access your computer belongs to the Everyone group. If you grant Everyone access to a process or file, all users can access that process or data.</p> <p dir="ltr">If your computer joins a domain and you've granted everyone access to a file; Anyone who has joined that domain can view your file. The Everyone group is very similar to a type of group called Users in the Linux world.</p> <h4 dir="ltr">Interactive</h4> <p dir="ltr">Users who consume resources on a local system are members of that system's interactive group.</p> <h4 dir="ltr">Network</h4> <p dir="ltr">when accessing system resources via computer networks; You are part of the Network group.</p> <h4 dir="ltr">Authenticated Users</h4> <p dir="ltr">Authenticated users, as the name suggests, includes all users who use authentic <a href="/authentication-methods">authentication methods</a> for a computer; have had access to it.</p> <p dir="ltr">I want to explain this concept very easily, every user logged into a computer is considered an authenticated user.</p> <h4 dir="ltr">Logon Anonymous</h4> <p dir="ltr">When computers receive a service anonymously and without server authentication, we say that this service is provided anonymously to the computers. When people enter or log on to a computer system without having a valid user account, they are included in the Anonymous Access group.</p> <p dir="ltr">Indeed, many services such as web services and ... in our network can be provided anonymously. Or someone might for some reason create an FTP on their network that they can connect to anonymously. Of course, this is wrong, but it can be given as an example.</p> <p dir="ltr">Another thing you should know about this Anonymous Access group is that in the past the members of this group were also among the subsets of the Everyone group. But from the second Windows XP Service Pack (XP SP2) onwards, Microsoft has decided to separate this group from Everyone.</p> <h4 dir="ltr">Batch</h4> <p dir="ltr">At this point you must be familiar with Batch files; Batch files are called files with the extension. bat and run on any operating system. Typically, in computer networks, we use these files to configure computers or implement a process on a large number of computers.</p> <p dir="ltr">The batch group on computers includes users who log in to batch to perform executive operations. In fact, you shouldn't be doing a lot of things on all computers in computer networks.</p> <p dir="ltr">For example, if you want to set up a file share on all computers in an organization, you definitely won't be logging into each of these computers, because if this organization only has 1000 computers, you could have nightmares for a long time 😊.</p> <p dir="ltr">Instead, you can define a batch file that runs on any computer and performs the tasks related to creating the file share for you on that computer. Now, as for the same batch file, you can go to the computers one by one or you can define a process so that this batch file is run on all computers at a certain time.</p> <h4 dir="ltr">Dial-up</h4> <p dir="ltr">Dial-up was a very old system that may still be used on some computers. If you remember, the computer's Internet was dial-up. That is, you had to dial a number using software or a tool to connect to the Internet.</p> <p dir="ltr">In fact, dial-up can be a communication solution between computers on the network. Members of the remote access group are users who log on to the computer through remote access.</p> <h4 dir="ltr">Service</h4> <p dir="ltr">In the future, you will become familiar with a number of services on servers that users must complete the authentication process to receive these services. The set of user accounts that log on to the computer to receive or run a service are included in the Service group.</p> <h4 dir="ltr">System</h4> <p dir="ltr">This group is used by the operating system itself. As far as I know, System or Local System is considered the most powerful access group and has full access to the entire computer system. On the other hand, when a hacker infiltrates a computer system under Windows, he tries to improve his access to the system.</p> <p dir="ltr">If a service or process can access the local system group and run with its access, that service will have access to all processes and permissions. Therefore, if a hacker can perform the desired operation with access to the system group, there is nothing to prevent it.</p> <p dir="ltr">On Microsoft Windows operating systems, some processes and services run by default with access to the System group.</p> <p dir="ltr">There may be groups here that I haven't covered. Of course, you will not be familiar with all of these groups on the net plus, but I prefer to express all the concepts in full in each article.</p> <h2 dir="ltr">Default value of SIDs</h2> <p dir="ltr">Well, back to our discussion of SIDs:</p> <p dir="ltr">When I have access of any kind on a computer, an access level has finally become personal to me and this access level in the Microsoft Windows world is defined for me using a SID. You can view the user's SID by using the whoami / all command in the command prompt.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/189_1000.webp" alt="Default value of SIDs" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">Also, if you pay attention, you will be able to see the SID of your system groups. SID is what makes a user unique. In fact, if you create two users with the same username, the same login and the same password in your network, the SID will distinguish them from each other.</p> <p dir="ltr">A series of SIDs is called a known. For example, in all Windows operating systems, you can see that the Everyone group's SID is as follows:</p> <p dir="ltr"><code>S-1-1-0</code></p> <p dir="ltr">Or that on all computers the local group has this structure for SID:</p> <p dir="ltr"><code>S-1-2-0</code></p> <p dir="ltr">A very interesting point written in the CEH version 9 book on SIDs is that you have an access level on each computer before you log in. And this access level includes a SID, and this SID follows the following structure on all computers:</p> <p dir="ltr"><code>S-1-5-18</code></p> <p dir="ltr">Another example of a SID is Null SID, which follows the following structure:</p> <p dir="ltr"><code>S-1-0-0</code></p> <p dir="ltr">We have a number of famous SIDs, usually people who have been working in Microsoft networks for several years are familiar with these SIDs:</p> <table class="tablemix" dir="ltr"> <tbody> <tr> <td width="48"> <p><strong>Row</strong></p> </td> <td width="126"> <p><strong>SID name</strong></p> </td> <td width="90"> <p><strong>SID value</strong></p> </td> <td width="360"> <p><strong>Description</strong></p> </td> </tr> <tr> <td width="48"> <p>1</p> </td> <td width="126"> <p>Null SID</p> </td> <td width="90"> <p>S-1-0-0</p> </td> <td width="360"> <p>Null SID means a group that has no members.</p> </td> </tr> <tr> <td width="48"> <p>2</p> </td> <td width="126"> <p>Everyone</p> </td> <td width="90"> <p>S-1-1-0</p> </td> <td width="360"> <p>A group that includes all users except Logon Anonymous.</p> </td> </tr> <tr> <td width="48"> <p>3</p> </td> <td width="126"> <p>Local</p> </td> <td width="90"> <p>S-1-2-0</p> </td> <td width="360"> <p>This group is related to users who use the system locally.</p> </td> </tr> <tr> <td width="48"> <p>4</p> </td> <td width="126"> <p>Creator Owner ID</p> </td> <td width="90"> <p>S-1-3-0</p> </td> <td width="360"> <p>This group is created by the user by creating a process, element or file, and it shows the user's ownership of the file or process.</p> </td> </tr> <tr> <td width="48"> <p>5</p> </td> <td width="126"> <p>Creator Group ID</p> </td> <td width="90"> <p>S-1-3-1</p> </td> <td width="360"> <p>This SID is replaced by creating an element by a group.</p> </td> </tr> <tr> <td width="48"> <p>6</p> </td> <td width="126"> <p>Enterprise Domain Controllers</p> </td> <td width="90"> <p>S-1-5-9</p> </td> <td width="360"> <p>&nbsp;</p> </td> </tr> <tr> <td width="48"> <p>7</p> </td> <td width="126"> <p>Authenticated Users</p> </td> <td width="90"> <p>S-1-5-11</p> </td> <td width="360"> <p>&nbsp;</p> </td> </tr> <tr> <td width="48"> <p>8</p> </td> <td width="126"> <p>Domain Admins</p> </td> <td width="90"> <p>S-1-5-21</p> </td> <td width="360"> <p>&nbsp;</p> </td> </tr> <tr> <td width="48"> <p>9</p> </td> <td width="126"> <p>Users</p> </td> <td width="90"> <p>S-1-5-32-545</p> </td> <td width="360"> <p>&nbsp;</p> </td> </tr> <tr> <td width="48"> <p>10</p> </td> <td width="126"> <p>Guests</p> </td> <td width="90"> <p>S-1-5-32-546</p> </td> <td width="360"> <p>&nbsp;</p> </td> </tr> <tr> <td width="48"> <p>11</p> </td> <td width="126"> <p>Account Operators</p> </td> <td width="90"> <p>S-1-5-32-548</p> </td> <td width="360"> <p>&nbsp;</p> </td> </tr> <tr> <td width="48"> <p>12</p> </td> <td width="126"> <p>Server Operators</p> </td> <td width="90"> <p>S-1-5-32-549</p> </td> <td width="360"> <p>&nbsp;</p> </td> </tr> <tr> <td width="48"> <p>13</p> </td> <td width="126"> <p>Print Operators</p> </td> <td width="90"> <p>S-1-5-32-550</p> </td> <td width="360"> <p>&nbsp;</p> </td> </tr> <tr> <td width="48"> <p>14</p> </td> <td width="126"> <p>Backup Operators</p> </td> <td width="90"> <p>S-1-5-32-551</p> </td> <td width="360"> <p>&nbsp;</p> </td> </tr> <tr> <td width="48"> <p>15</p> </td> <td width="126"> <p>Replicators</p> </td> <td width="90"> <p>S-1-5-32-552</p> </td> <td width="360"> <p>&nbsp;</p> </td> </tr> <tr> <td width="48"> <p>16</p> </td> <td width="126"> <p>Remote Desktop Users</p> </td> <td width="90"> <p>S-1-5-32-555</p> </td> <td width="360"> <p>&nbsp;</p> </td> </tr> <tr> <td width="48"> <p>17</p> </td> <td width="126"> <p>Network Configuration Operators</p> </td> <td width="90"> <p>S-1-5-32-556</p> </td> <td width="360"> <p>&nbsp;</p> </td> </tr> <tr> <td width="48"> <p>18</p> </td> <td width="126"> <p>Incoming Forest Trust Builders</p> </td> <td width="90"> <p>S-1-5-32-557</p> </td> <td width="360"> <p>&nbsp;</p> </td> </tr> <tr> <td width="48"> <p>19</p> </td> <td width="126"> <p>Event Log Readers</p> </td> <td width="90"> <p>S-1-5-32-573</p> </td> <td width="360"> <p>&nbsp;</p> </td> </tr> </tbody> </table> <p dir="ltr">Of course, there are many other cases that are not mentioned here, but they are explained in the SID security related books above.</p> <p dir="ltr">If you remember, we talked about <a href="/what-is-local-security-database">SAM or the security account manager</a> in the last session. It is good to know that SAM stores data on SIDs. You can see many SID structures for different groups using the same command: whoami / all.</p> <h2 dir="ltr">SID structure</h2> <p dir="ltr">The SID itself contains a structure. The meaning of Shhdar is that this identifier is not just a series of random characters and a series of concepts can be reached from the SID itself. For example, consider the following SID:</p> <p dir="ltr"><code>S-1-5-21-925799540-4244847519-4294395161-1000</code></p> <p dir="ltr">SIDs have three main parts in terms of structure:</p> <p dir="ltr">The leading part of the SID, which is equivalent to S-1-5-21, indicates the SID group. For example, if two users have the same groups, their initial part is also the same, such as the following two SIDs:</p> <p dir="ltr"><code>S-1-5-21-925799540-4244847519-4294395161-1000</code><br /><code>S-1-5-21-549688327-91903405-2500298261-1000</code></p> <p dir="ltr">The second part is related to the domain, which we don't want to explain much here. When a domain is created, part of the SID is the same for all computers that join that domain. In the SID we gave an example above, the part "925799540-4244847519-4294395161" is related to this section.</p> <p dir="ltr">The most important part that makes up a SID is the relative identifier, also called relative ID or RID for short. In fact, this section contains a number that distinguishes each user from another user. That is, in fact, users are identified through RID.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/190_1000.webp" alt="SID structure" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">In the RIDs we also have a series of predefined values. For example, the admin user uses a RID of 500 on all computers. Or, for example, the Guest user uses RID 501 by default on all computers.</p> <p dir="ltr">By using the following command and entering it in CMD, you can see the list of all user accounts on your system along with their SIDs:</p> <p dir="ltr"><code>wmic useraccount get name, sid</code></p> <p dir="ltr">SIDs are designed in such a way that it is almost impossible to find two users with the same SID on a computer network.</p> <p dir="ltr">But it is possible to capture an image of a networked system and intentionally create similar SIDs. Of course, this will cause a lot of problems in your network. In the future, I will teach you what to do to change the SID if such an incident occurs.</p> <h2 dir="ltr">وظیفه SID</h2> <p dir="ltr">In general, in Microsoft networks, all users are identified by SID. When you intend to go through the authentication process, in the first step you are sending your username and password to a server.</p> <p dir="ltr">therefore the server that intends to provide you with the service; Create a token for yourself that includes username, SID, and even the group the user is a member of. The service provider's server then sends this token to the client so that it can get the desired service by using it.</p> <p dir="ltr">The token is valid for a certain period of time, and after that period the client must repeat the authentication process to authenticate and continue the service. We will not talk about tokens here. You can read about <a href="https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/manage/understand-special-identities-groups">special identity groups</a> for a better understanding of SIDs.</p> <p dir="ltr">You could really talk about SIDs and how they work for hours, and when I started this article I didn't think it would be that long. If you have any questions about the above, ask in the comment section and I'll get back to you.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/شناسه-های-sid" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:1134https://mixseda.com/authentication-methodsAuthentication methods<p dir="ltr"><img src="/images/uploaded/blog02/180_1000.webp" alt="Authentication methods" width="100%" /></p> <p dir="ltr">Authentication methods are methods by which a computer system authenticates you. Before we begin, I want to note that many of these elements are not part of network + and I am just explaining these elements for familiarity.</p> <p dir="ltr">In many computer systems, you may not see many authentication methods. The reason could be related to the high cost of implementing some of these practices.</p> <p dir="ltr">In many cases, the authentication methods applied by the user are preferable to other biometric methods. The reason for this is very clear. A system can fail in the user authentication process for various reasons, but a user is never expected to enter their password incorrectly.</p> <p dir="ltr">For example, a number of authentication methods may be able to successfully perform the authentication process at a certain temperature and humidity. Fingerprint or fingerprint authentication cannot identify many cases if your fingers are wet.</p> <p dir="ltr">Some authentication methods are also not very secure. For example, in today's era, most people can be seen either on their personal pages or in their conversations; Recorded the sound. It is obvious that the voice-only user authentication method cannot provide much security for systems.</p> <p dir="ltr">Of course, we are not talking about the security of these authentication methods here, because in fact it is not possible to discuss this issue in a specialized way.</p> <p dir="ltr">For example, a company may claim to have succeeded in creating a much more accurate fingerprint system than Iris Recognition authentication. Well, it goes without saying that the manufacturing technology of each of the items we want to talk about is different, you can always compare two items of the same type.</p> <p dir="ltr">For example, you can compare a specific model of a face detection module with another model of this module to see which one performs better identification and which one has fewer authentication errors.</p> <p dir="ltr">I tried to explain the most famous authentication methods to you. It goes without saying that there are many authentication methods and, moreover, some of these methods may not yet be known or may not be used in everyday life for various reasons.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/175_1000.webp" alt="Authentication methods" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Username &amp; Password</h2> <p dir="ltr">One of the simplest and earliest authentication methods in computer systems is authentication using the Username and Password method. The truth is, I don't think I need to explain much about this because almost everyone uses this authentication method many times throughout the day.</p> <p dir="ltr">If you remember, in the old operating systems, even in the first versions of Microsoft Windows, to access you had to enter Username and Password. After some time, the operating systems would show you the users of a computer so that you can more easily enter your user.</p> <p dir="ltr">For example, when I was very young, I remember that we usually didn't have user accounts on some computers for some reason. For example, in schools with computers, they certainly did not allow every student to create an independent user. At the time, students used methods to hide users on operating systems such as Windows XP.</p> <p dir="ltr">Although this was not the right thing to do, I myself preferred to have a user on every computer in the school.😊</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/176_1000.webp" alt="Username &amp; Password" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">Although the Username and Password authentication method is very old, it is considered one of the most used authentication methods. In many cases, systems use this method if they cannot authenticate you with other methods.</p> <p dir="ltr">For example, if a system fails to identify a user using biometric authentication methods after several attempts; Will go to this method. The reason is also very personal; It is possible that an authentication method is not recognizing you correctly due to any problem.</p> <p dir="ltr">But computer system creators expect users to be able to enter their passwords correctly if biometric authentication methods fail to identify them.<br />In future courses, you will also know the weaknesses of each authentication method, and I can talk about the security of these methods with this level of knowledge.</p> <p dir="ltr">Usually, the chosen password is not stored directly or raw on computer systems and different systems try to use different hashing methods to encrypt the chosen password. Even some operating systems, such as Microsoft products, try to make the hashed password largely inaccessible.</p> <p dir="ltr">To choose a username, you can choose limited characters in different systems and you cannot use any characters in your password. Of course, this is different in different systems.</p> <p dir="ltr">In addition, in some cases, they take into account a number of password policies in different systems. For example, users in an organization may not be allowed to choose a 4-digit password and their password must be at least 8 characters in which upper and lower case letters are respected.</p> <h2 dir="ltr">Pattern</h2> <p dir="ltr">One of the most famous methods used to access computer systems, especially smartphones with an Android operating system, is the pattern.</p> <p dir="ltr">In this method, you enter a computer system by entering a selected pattern which is usually performed using 9 points.</p> <p dir="ltr">One of the problems with this authentication method is that you have around 360,000 different choices for choosing a scheme, which, considering you can't choose other points from anywhere, this greatly reduces the number of your choices and as a result you will have much less security than to the Username and Password method.</p> <p dir="ltr">On the other hand, maintaining a pattern because it has physical form can be much easier than a 9-digit number. Because of this, someone could easily mimic your model if they see it.</p> <p dir="ltr">Usually, in Android operating systems, as far as I know, special encryption and encryption are not applied to the selected pattern, although the pattern you considered is stored in protected files, but usually Android operating systems are less secure than others operating systems systems.</p> <p dir="ltr">In short, try not to use a diagram that contains only a 9-point chart. In some Android ROMs, you can change the number of points of these models, or the best option is to use another method for authentication.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/177_1000.webp" alt="Pattern" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">PIN</h2> <p dir="ltr">The word Pin stands for Personal Identification Number. If you pay attention when buying phone SIM cards, you will surely see two numbers PIN and PUK. If you remember, all SIMs had PIN activated in the past and this number may have changed by Arbaran.</p> <p dir="ltr">The reason was that if the SIM card was stolen, no one except the original owner could use it. You were forced to use the PUK by entering the wrong PIN three times.</p> <p dir="ltr">The difference between PIN and using username and password is that you can only use numbers in your PIN. For example, one of the most common uses of the PIN during the day are bank card passwords.</p> <p dir="ltr">You make a lot of purchases throughout the day, and in most of these purchases you use credit cards that require you to enter a PIN for authentication.</p> <p dir="ltr">Normally, users use 4-digit numbers to select a PIN. Even in older systems you didn't have the ability to use numbers with more than 4 digits. Of course, the fewer digits you use to choose a PIN, the less security you will have in your systems.</p> <p dir="ltr">Using 4 digits for a PIN means that you choose a mode in the range of 1000 different modes. Well, guessing a 4-digit number may not be a very difficult task for a hacker. For this reason, the PINs of the bank cards of Swiss banks are 6-digit.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/178_1000.webp" alt="Personal Identification Number" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">In 2002, a PhD student from the University of Cambridge was able to discover a vulnerability in the PIN generation of IBM 3624 systems. The problem was that this vulnerability was found in many production hardware.</p> <p dir="ltr">The attack related to this vulnerability, called the "decimal table attack", allows people with access to banking systems to find the credit card password in an average of 15 attempts.</p> <p dir="ltr">The reason for using the PIN on many systems is that a username and password authentication method is not required. I mean, imagine that if you were to use the Username and Password method in ATM devices, all these devices would have to be connected to a single keyboard.</p> <h2 dir="ltr">Fingerprint</h2> <p dir="ltr">Fingerprint literally means fingerprint. As you know, the fingerprints of every person in the world are unique and you will not normally find the fingerprints of two people alike.</p> <p dir="ltr">Therefore, they try to use fingerprints and other biometric information in authentication methods. According to the research conducted, the chance that two fingerprints are similar to each other is 1 in sixty-four billion, which is almost impossible.</p> <p dir="ltr">Fingerprints are very small bumps that are found on each person's finger. The fingerprint of each finger is also different from the other fingers, and for this reason the fingerprints of all fingers are used in the fingerprint.</p> <p dir="ltr">Fingerprint sensors were originally developed for security locations such as secret services or military locations. These sensors were very expensive and were among the technologies that not all organizations could use.</p> <p dir="ltr">Over time, this technology has been installed on laptops and all kinds of equipment so that users have more confidence in using them. At first, these sensors had little accuracy and exhibited a high error rate.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/179_1000.webp" alt="Fingerprint" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">But over time their accuracy has increased and today, thanks to the simplicity and high safety of this technology, you can see it on all equipment. Some cars are also equipped with fingerprint sensors.</p> <p dir="ltr">As I said above, choosing the fingerprint method in a secure digital sensor system is like choosing a password with sixty-four billion permutations. For this reason it is almost useless to produce hardware capable of testing all possible modes.</p> <p dir="ltr">On the other hand, fingerprints can also reduce the security of devices, if someone can make a mold of your fingerprints, it makes sense that they can enter everything you have access to using the Fingerprint method.</p> <p dir="ltr">So far, I am sure that you have realized that each authentication method has its advantages and disadvantages and because of this, different authentication methods are usually used for security places such as safes which are used for storing valuables.</p> <h2 dir="ltr">Face detection</h2> <p dir="ltr">Facial recognition technology is present in many gadgets such as mobile phones. Many CCTV cameras also offer this functionality to users.</p> <p dir="ltr">Facial recognition means that a computer system is able to identify a human face in an image and record the details of each person's face.</p> <p dir="ltr">Face Recognition technology can offer security centers the ability to store the faces of all people at certain intervals of time. This process improves the facial recognition processes and actually allows you to compare pre-recorded faces.</p> <p dir="ltr">Face detection generally uses the recognition of the components of a person's face, the type of positioning on the face and, in some cases, even the type of facial protrusions on a face. Then the face of each person is stored in the system memory with a series of parameters.</p> <p dir="ltr">The first facial recognition systems had many flaws. For example, many systems were unable to recognize faces and authenticate people in bright or very low light conditions. However, with the passage of time and the introduction of more advanced products in this field, many facial recognition technologies are facing problems.</p> <p dir="ltr">Of course, in many systems, the face detection process is included for authentication. Just like cell phones, you can perform the authentication process on all types of operating systems by setting a face.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/181_1000.webp" alt="Face detection" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Voice</h2> <p dir="ltr">In some Android 4 mobile phones, voice authentication was possible for users, but due to the incompleteness of this process and the ability to impersonate people's voices, this functionality has been completely removed in the following Android operating systems.</p> <p dir="ltr">The system running the Voice process for users must be able to distinguish the sound of their surroundings from the individual's voice. In addition, you can easily hear a person's voice in the virtual space and on social pages.</p> <p dir="ltr">Now, it is not a difficult task for a hacker to be able to mimic their own voice using a variety of computer software to fake a voice. Therefore, systems that perform the authentication process via Voice usually do not use the Voice method alone.</p> <p dir="ltr">The Voice method authenticates by examining audio cues, recognizing the type of speech and pronunciation of words, the type of pause and amount of pauses after uttering a sentence or each word, the tone of each person's voice and the type of voice. Of course, an accurate system can never fully authenticate a user without using one or more quality microphones.</p> <h2 dir="ltr">Iris Recognition</h2> <p dir="ltr">In 1983, the original idea of ​​the separation of identity through the iris of the eye was shown in one of the James Bond films titled "Never Say Never Again". In 1987, Leonard Flom and Aran Safir; Two American ophthalmologists were able to patent this concept. But they have not been able to implement this technology.</p> <p dir="ltr">After the patent, they went to John Daugman, who was a professor at Harvard at the time, to develop the cornea detection algorithm. In 1994 John Daugman managed to create an algorithm for detecting the cornea of ​​the eye, which is currently the basis of all iris recognition systems.</p> <p dir="ltr">Iris Recognition is one of the authentication methods that use biometric methods. In this method, an iris scanner (iris scan) examines the iris of the person's eye. In most of these iris scanners, infrared and visible light are used for better detection.</p> <p dir="ltr">One of the biggest problems with Iris Recognition authentication is that with new technologies it is possible to remotely scan people's corneas. Because of this, someone may remotely scan your cornea without your consent.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/182_1000.webp" alt="Iris Recognition" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><strong>Imagine what will happen if your computer password is published one day? Or even if your mobile number is posted on the Internet?</strong></p> <p dir="ltr">If you are not among the official officials of a country, I don't think anything will happen. You finally want to change your personal computer password or choose another phone number for your personal work. But if your biometric information is stolen for any reason, much more serious problems could occur.</p> <p dir="ltr">The problem is that modifying biometric information is very difficult and in some cases even impossible. For example, you may be able to change your fingerprints, but what do you want to do to change the cornea of ​​your eye? We are not talking about how iris recognition works and how corneal scanners scan, but you have to get information. Further research is possible.</p> <p dir="ltr">Well, this article is over, but there are a lot of authentication methods that I haven't introduced for various reasons. If you know of another method for authentication, please let us know in the comments section so that I can research other methods and post the same content.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/متدهای-authentication" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:1132https://mixseda.com/what-is-local-security-databaseWhat is local security database?<p dir="ltr"><img src="/images/uploaded/blog02/167_1000.webp" alt="What is local security database?" width="100%" /></p> <p dir="ltr">You may think I mean hallucinogenic and psychedelic pills, but no, LSD in the computer world means local security database. In every computer (every operating system) there is a part called LSD or Local Security Database, which is responsible for keeping user information.</p> <p dir="ltr">You may want to use a computer in a workgroup network. For this, we need to have the username and password of the computer. Well, after entering the operating system username and password, the computer checks the information we entered with its LSD.</p> <p dir="ltr">But the importance of LSD is more than what has been said so far. LSD is a collection of user accounts, groups, security identifiers, etc. On the other hand, it can be said that any authentication and authorization process performed by the operating system in WorkGroup networks depends in some way on LSD.</p> <p dir="ltr">If you have recently become familiar with the concept of LSD, this article may be of interest to you. Many people may be interested in knowing the computer password and think that it can be achieved by using this LSD file.</p> <p dir="ltr">Just know that before you and me, the creators of the operating system realized the importance of the LSD file, and in addition to the protections that the operating system itself makes against LSD, even if you access the contents of these files, you won't be able to figure out the password.</p> <p dir="ltr">Of course, there are ways to easily change the password within the LSD, but figuring out the previous password takes time and is sometimes impossible. (Impossible in the sense that this job isn't worth spending so much time on.)</p> <h2 dir="ltr">LSD storage location</h2> <p dir="ltr">Well, the big question is: who is LSD ?! Where is this LSD you say ?! We see...</p> <p dir="ltr">LSD is a concept and in different operating systems such as Windows, Mac, Android or Linux operating systems; The name and storage location are different.</p> <p dir="ltr">Since we've all worked with Microsoft operating systems such as Windows 10, I'll start with Microsoft first.</p> <h3 dir="ltr">LSD in Microsoft operating systems</h3> <p dir="ltr">On Microsoft systems, you will be able to see a file called SAM by going to "<strong>C:\Windows\system32\config</strong>". This file is the LSD in Microsoft operating systems. Of course, in the future, I may be breaking my word, but for now, consider this file as LSD.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/168_1000.webp" alt="LSD on Microsoft operating systems" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">If you want to run this file with a software to find out its contents, the following message will be displayed:</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/169_1000.webp" alt="LSD on Microsoft operating systems" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">You might think that since you don't have access to this file, you can't open it or you might think it's just a permission issue.</p> <p dir="ltr">Or you think that because this file is running, you don't have the ability to run and edit it. I am not saying that these are not cases, but the more important point is that the operating system protects these files due to its great importance.</p> <p dir="ltr">Or rather, the operating system tells us in stupid language: "<strong>I'm too busy ... I don't want to open this file ...</strong>"</p> <p dir="ltr">Now, how to open this SAM file which is Windows LSD?</p> <p dir="ltr">As long as Windows is running, you can't directly open the SAM file and instead have to prepare an offline version so that you can view the information of this file over a period of time.</p> <p dir="ltr">From Linux operating systems, you can easily log into Windows SAM and view it. Or you can copy the contents of the SAM file to a folder named sam on drive C via the following command in the command prompt with administrator access:</p> <p dir="ltr"><code>reg save hklm\sam c:\sam</code></p> <p dir="ltr">Now, if I do that and open the final file, I will see the following images:</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/172_1000.webp" alt="LSD on Microsoft operating systems" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">We were able to open the SAM file, but we still can't read its contents. Since special encryption is used for SAM files, don't worry. There are ways to view the exact contents of a SAM file.</p> <p dir="ltr">In a separate article I will talk about Windows SAM extraction, because the tools to extract this file are many and extensive.</p> <p dir="ltr">Now, if you can see the information in the Windows SAM file, you will see something in the following topics:</p> <p dir="ltr"><code>ali:500:aad3b435b51404eeaad3b435b51404ee:3e24dc ead23468ce597d6883c576f657:::</code><br /><code>Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe 0d16ae931b73c59d7e0c089c0:::</code><br /><code>userd:1000:aad3b435b51404eeaad3b435b51404ee:64f1 2cddaa88057e06a81b54e73b949b:::</code></p> <p dir="ltr">The structure is such that local users of a computer are on the left side and on the other side of the password hash (Passwd hash). The question that may arise here for any beginner is what is the password hash?</p> <p dir="ltr">Cryptography is a very big world and hashing is only a small part of it and I can't fully explain hashing in this article. If I want to look into the matter very simply, hash is an algorithm that converts a string of numbers, characters, or anything else into a character string consisting of a specific number of characters.</p> <p dir="ltr">Exactly like what you see above in front of each user's name. These algorithms are derived from mathematics and the most important thing is that they are irreversible. That is, you can assign a file to a hash function and get a 128-bit hash, but you can't give this 128-bit hash to an algorithm and get the same file.</p> <p dir="ltr">Hash algorithms are designed in such a way that you can almost say that you can't get the same output from two different strings.</p> <h3 dir="ltr">Find a computer password from the LSD</h3> <p dir="ltr">The use of hash algorithms has increased the security of the systems, and even if you have a hashed password, you will not be able to understand it and enter the system.</p> <p dir="ltr">That's why I told you above that changing the password and cracking it is a simple task if you have the physics of the device, or rather, you have access to a system, but it is not an easy task to find out what the other party has set the password for.</p> <p dir="ltr">Even if the user's password is very long, it may be impossible to find it. If you want to change a Microsoft user's password, just use a tool that runs as a bootback before Windows and makes changes to the SAM file.</p> <p dir="ltr">The number of these software and tools for this job is large and you have examples for this in Linux operating systems as well. In fact, in these software, you choose a password for a user and the software stores the chosen password in a hash form in SAM.</p> <p dir="ltr">An example of these software is the pcunlocker software, which is used to reset the forgotten password or bypass the Windows authentication process.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/170_1000.webp" alt="Finding a computer password from LSD" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><strong>But how can we find out what password a user has already entered on his computer?</strong></p> <p dir="ltr">For this, you need to have the hashed password of the desired user in the first two steps. If your user has complete knowledge of all types of files and computers and you don't have physical access to the target computer, it will be very difficult for you to get the password hash.</p> <p dir="ltr">As I said, hashing algorithms are irreversible and no algorithm or software can restore them.</p> <p dir="ltr"><strong>Assuming you get the password hash ...</strong></p> <p dir="ltr">In the second step, you should have a list of passwords that the user can use. The user may have used a combination of name, initials, country code, mobile number, spouse's name, year of birth, pet name, favorite device, lucky number, birthday, etc. for the password.</p> <p dir="ltr">I mean something like this with the password list:</p> <ul dir="ltr"> <li dir="ltr">1qaz@WSX</li> <li dir="ltr">P@ssw0rd</li> <li dir="ltr">1234</li> <li dir="ltr">Ali0912</li> <li dir="ltr">…</li> </ul> <p dir="ltr">Now, in the next step, you need to hash all these passwords and match them with the target user's password hash, that way you will know the user's password. But if the number of characters of the user's password is too long and cannot be guessed, it may be impossible to find the password to a large extent.</p> <p dir="ltr">Because basically, by increasing each character, the user adds a power to the passwords that you need to have in order to guess the user's password. Among them, there are sites that charge you a commission or do it for free.</p> <p dir="ltr">These sites have already got the password hash of many passwords and by matching the entered password hash with their database, they get the final password. The important thing here is that none of these sites are so complete that they can have all the passwords. That you say you have hashed all passwords up to 10 characters is a big statement.</p> <p dir="ltr">That's why many of these sites charge a fee to find your password. If you are familiar with the concept of permutation, you will understand what I mean.</p> <p dir="ltr">Another point is that these sites can usually find passwords made from a combination of English characters, numbers and symbols, and I personally think it is very unlikely that they will be able to find a password that includes Persian characters on these sites.</p> <h3 dir="ltr">What is the engineering password?</h3> <p dir="ltr">In network security and Microsoft courses, we are familiar with a concept called engineering password. In Microsoft courses, students usually say "P @ ssw0rd" as a Microsoft password, which means, from Microsoft's point of view, a password that contains upper and lower case letters, symbols and numbers; It will be a standard password.</p> <p dir="ltr">Security class students usually know these two passwords as engineering passwords:</p> <ul dir="ltr"> <li dir="ltr">P@ssw0rd</li> <li dir="ltr">Pa$$w0Rd</li> </ul> <p dir="ltr">Of course, using these two passwords greatly reduces security, they are very predictable, and the meaning of these concepts is to use a password similar to these two passwords above. It is very important that a password be predictable and not guessable.</p> <h3 dir="ltr">LSD on Linux operating systems</h3> <p dir="ltr">I don't know much about Linux operating systems and I don't work with Linux as it is known. But I had very detailed knowledge of these topics in the CEH class, which I would like to share with you.</p> <p dir="ltr">Just as the username and passwords are transferred to the "SAM" file in Windows operating systems, there is also a local location for storing passwords in Linux operating systems. In the past, all usernames and passwords could be viewed in a file called passwd.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/173_1000.webp" alt="LSD on Linux operating systems" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">That is, you can easily view the contents of the passwd file and easily get the password hash using the following command in a Linux operating system:</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><code>root@mixseda:~# cat /etc/passwd</code></p> <p dir="ltr">Due to a number of security issues, after a while they removed the passwords from this file and transferred them to another file called shadow. In the passwd file you can see the users, but the password is displayed with the letter X in front of each user. You will be able to see the hash of active passwords on a system using the following command and viewing the shadow file:</p> <p dir="ltr"><code>root@mixseda:~# cat /etc/shadow</code></p> <p dir="ltr">The password structure in the shadow file is designed as follows:</p> <p dir="ltr"><code>“Username”:“Password Hash”:“Password History”:“Minimum password life”:“Maximum password life”:“warndays”:“inactive”:“Disable time”:“Reserve”</code></p> <p dir="ltr">If you take a closer look at the structure of the shadow file, it is designed exactly like a table to store user information. And each column is separated from the next column using the ":" character. Below, I intend to briefly talk about each of the concepts.</p> <h4 dir="ltr">Username</h4> <p dir="ltr">The simplest concept you can understand by looking at the contents of the shadow file is the username itself. The username indicates which users exist locally on this system.</p> <p dir="ltr">Be aware that any user in this section will not be able to log into your computer system.</p> <p dir="ltr">&nbsp;</p> <h4 dir="ltr">Password Hash</h4> <p dir="ltr">The password set for a Linux operating system is not stored as clear text. Passwords entered in different operating systems are encrypted and hashed by irreversible algorithms.</p> <p dir="ltr">Obviously, if a password is stored as a hash, there will be no function capable of returning this hash to the original password. Of course, there are ways to get the initial password.</p> <p dir="ltr">In the "Hash password" section, your password is hashed in your Linux operating system. After each login and authentication; The operating system converts the entered password into a hash using algorithms and matches it with this value.</p> <p dir="ltr">"Password Hash" itself includes the following three parts and follows the following structure:</p> <p dir="ltr"><code>$type$salt$hashed</code><code></code></p> <h5 dir="ltr">Type</h5> <p dir="ltr">Type indicates the type of algorithm used for hashing. For example, for the following algorithms, the values from the following table are inserted first in the "Password Hash" value.</p> <table class="tablemix" dir="ltr"> <tbody> <tr> <td width="312"> <p><strong>Hashing algorithm</strong></p> </td> <td width="312"> <p><strong>Type</strong></p> </td> </tr> <tr> <td width="312"> <p>MD5</p> </td> <td width="312"> <p>$1$</p> </td> </tr> <tr> <td width="312"> <p>Blowfish</p> </td> <td width="312"> <p>$2a$</p> </td> </tr> <tr> <td width="312"> <p>Eksblowfish</p> </td> <td width="312"> <p>$2y$</p> </td> </tr> <tr> <td width="312"> <p>SHA-256</p> </td> <td width="312"> <p>$5$</p> </td> </tr> <tr> <td width="312"> <p>SHA-512</p> </td> <td width="312"> <p>$6$</p> </td> </tr> </tbody> </table> <p dir="ltr">You may see a combination of these algorithms with some changes in a custom operating system. Or you can use other algorithms to hash the password.</p> <h5 dir="ltr">Salt</h5> <p dir="ltr">Imagine that two users have the same passwords, with this description their password hashes will also be the same. Salt is a value included in the hash and makes the password hash different. Just like the seasoning you add to your food.</p> <p dir="ltr">The existence of this amount has many advantages and is calculated by an algorithm.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/171_1000.webp" alt="Salt in hashing" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h5 dir="ltr">Hashed</h5> <p dir="ltr">This value is also the hash of your password, which means that according to the explanation above, your password plus the hash function with a specific salt value is equal to this value.</p> <p dir="ltr">&nbsp;</p> <h4 dir="ltr">Password History</h4> <p dir="ltr">Password History shows the last time each username's password was changed. In fact, this value shows us the history of a password in Linux. This value is also known as "last_change".</p> <p dir="ltr">&nbsp;</p> <h4 dir="ltr">Minimum password life</h4> <p dir="ltr">As can be seen from the name of this part, this value indicates the minimum age of the password.</p> <p dir="ltr">&nbsp;</p> <h4 dir="ltr">Maximum password life</h4> <p dir="ltr">As in the section "Minimum password age"; The Maximum password age section determines the maximum password age assigned to the user. This value is also known as "max_age".</p> <p dir="ltr">&nbsp;</p> <h4 dir="ltr">warndays</h4> <p dir="ltr">It is very obvious that if a password is about to expire within a certain time, the user should be informed of this first. In case of failure to notify, the user will never be able to change his password or not realize that his access is limited.</p> <p dir="ltr">"warndas" indicates how long it takes to warn the user before the password expires.</p> <p dir="ltr">&nbsp;</p> <h4 dir="ltr">inactive</h4> <p dir="ltr">This section shows each user's inactivity after the password has expired.</p> <p dir="ltr">&nbsp;</p> <h4 dir="ltr">Disable time</h4> <p dir="ltr">This value indicates the number of days a user is inactive. This value is also known as "expiration".</p> <p dir="ltr">&nbsp;</p> <h4 dir="ltr">Reserve</h4> <p dir="ltr">In many databases, programmers have come up with measures so that if you need to add a value to the database, you can easily add it.</p> <p dir="ltr">This problem can also be found in hardware parts and most equipment, especially in the network field, has spare connectors. This can be seen in many databases.</p> <p dir="ltr">Here, too, the "Reserve" value has such a use and its use has not yet been determined.</p> <p dir="ltr"><br />It is possible that if you see the shadow file on your operating system, many of the values described above may be missing. In some Linux operating systems that have been customized, such as some mobile phone operating systems, some values have been changed.</p> <p dir="ltr">Or you might see that different algorithms are used to hash passwords in an operating system. An example of a shadow file I found on the Internet is the following:</p> <pre dir="ltr"> root:$6$dSx6v.3w$NXENWxEl.eIlbCLSkbInpKpCHapHqwnyBzOxfu5R7p9zcdP4K3ucUkXZXPNbyr.rz6J9IaFQArxCa9fzXXwiW.:16835:0:99999:7:::<br /> daemon:*:16471:0:99999:7:::<br /> bin:*:16471:0:99999:7:::<br /> sys:*:16471:0:99999:7:::<br /> sync:*:16471:0:99999:7:::<br /> games:*:16471:0:99999:7:::<br /> man:*:16471:0:99999:7:::<br /> lp:*:16471:0:99999:7:::<br /> mail:*:16471:0:99999:7:::<br /> news:*:16471:0:99999:7:::<br /> uucp:*:16471:0:99999:7:::<br /> proxy:*:16471:0:99999:7:::<br /> www-data:*:16471:0:99999:7:::<br /> backup:*:16471:0:99999:7:::<br /> list:*:16471:0:99999:7:::<br /> irc:*:16471:0:99999:7:::<br /> gnats:*:16471:0:99999:7:::<br /> nobody:*:16471:0:99999:7:::<br /> libuuid:!:16471:0:99999:7:::<br /> mysql:!:16471:0:99999:7:::<br /> colord:*:16471:0:99999:7:::<br /> usbmux:*:16471:0:99999:7:::<br /> miredo:*:16471:0:99999:7:::<br /> ntp:*:16471:0:99999:7:::<br /> Debian-exim:!:16471:0:99999:7:::<br /> arpwatch:!:16471:0:99999:7:::<br /> avahi:*:16471:0:99999:7:::<br /> beef-xss:*:16471:0:99999:7:::<br /> dradis:*:16471:0:99999:7:::<br /> pulse:*:16471:0:99999:7:::<br /> speech-dispatcher:!:16471:0:99999:7:::<br /> haldaemon:*:16471:0:99999:7:::<br /> sshd:*:16471:0:99999:7:::<br /> snmp:*:16471:0:99999:7:::<br /> iodine:*:16471:0:99999:7:::<br /> postgres:*:16471:0:99999:7:::<br /> redsocks:!:16471:0:99999:7:::<br /> stunnel4:!:16471:0:99999:7:::<br /> statd:*:16471:0:99999:7:::<br /> sslh:!:16471:0:99999:7:::<br /> Debian-gdm:*:16471:0:99999:7:::<br /> rtkit:*:16471:0:99999:7:::<br /> saned:*:16471:0:99999:7:::<br /> </pre> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/174_1000.webp" alt="A visual display of /etc/shadow" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">There is a lot to be said about groups in Linux operating systems, but for now you should know that the storage location of groups in Linux operating systems is in a file called group and you will be able to view it with the following command. :</p> <p dir="ltr"><code>root@mixseda:~# cat /etc/group</code></p> <p dir="ltr">Groups in Linux operating systems have a simpler structure and usually use the following structure:</p> <p dir="ltr"><code>“groupname”:“x”:“group_ID”:“[username[,username]...]”</code></p> <p dir="ltr">I briefly explain each of these values in the table below:</p> <table class="tablemix" dir="ltr"> <tbody> <tr> <td width="312"> <p><strong>value</strong></p> </td> <td width="312"> <p><strong>explanation</strong></p> </td> </tr> <tr> <td width="312"> <p>groupname</p> </td> <td width="312"> <p>The name of the defined group</p> </td> </tr> <tr> <td width="312"> <p>x</p> </td> <td width="312"> <p>Group password (not supported in some operating systems)</p> </td> </tr> <tr> <td width="312"> <p>group_ID</p> </td> <td width="312"> <p>The unique identifier of the group</p> </td> </tr> <tr> <td width="312"> <p>username</p> </td> <td width="312"> <p>Usernames belonging to this group</p> </td> </tr> </tbody> </table> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/فایل-lsd-چیست" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:1130https://mixseda.com/networks-in-terms-of-managing-access-to-resourcesNetworks in terms of managing access to resources<p dir="ltr"><img src="/images/uploaded/blog02/158_1000.webp" alt="Networks in terms of managing access to resources" width="100%" /></p> <p dir="ltr">One of the network divisions is based on managing access to resources. Access to a network can be managed in two modes: workgroup and domain. Workgroup networks are called peer to peer and domain networks are also called client-server.</p> <p dir="ltr">When we talk about managing access to resources in the network, it means that when our computers are networked, how they communicate with each other in terms of (logical) software.</p> <p dir="ltr">In operating systems, we have an object called User Account, which in turn has a number of attributes. Attribute means attribute in English.<br />For example, the attributes of a user account can include the following:</p> <ul dir="ltr"> <li>username</li> <li>password</li> <li>name and surname</li> <li>AND…</li> </ul> <p dir="ltr">You will work with these attributes in general computer networking and MCSE classes.</p> <h2 dir="ltr">Workgroup</h2> <p dir="ltr">When you want to create a user account on your computer, the operating system may provide you with that page and ask you to complete it.<br />These are the attributes of the user account you want to create.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/159_1000.webp" alt="add User account" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">After you enter this information, this information is stored locally (on the computer itself) in workgroup networks. This information is stored in a database on the hard drive.</p> <p dir="ltr">Database means database and it has several types. In general, databases include a series of tables that contain a series of classified information.<br />The database name in Microsoft Windows is LSD or Local Security Database.</p> <p dir="ltr">This LSD is logically located in the operating system at the following address:</p> <p dir="ltr" style="text-align: left;">C:\Windows\System32\config</p> <p dir="ltr"><strong>Perhaps you have been asked where your username and password are stored in Windows?</strong></p> <p dir="ltr">The answer is that your username and password along with other information are in this folder and in a file called SAM. Due to a variety of reasons, as long as the operating system is running, it cannot be viewed online.</p> <p dir="ltr">What I mean by the word online is that you can't run this file yourself, but using a number of tools, you'll be able to make a copy of it and open that copy. (View offline)</p> <p dir="ltr">In the Computer Management console, as in the image below, you will be able to graphically view the users created on the LSD of a computer.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/160_1000.webp" alt="Computer Management" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">In the image above, next to some computers, an arrow may be drawn pointing down, which means that this user was created by the System itself. (integrated)</p> <p dir="ltr"><em>tip:</em><br /><em>Computer Management is not a computer LSD file. In fact, you will learn in the MCSE class that Computer Management is a toolbox that helps us see a number of tools.</em><br /><em>In the future, you can customize a toolbox in this section to have only the tools you need.</em></p> <p dir="ltr">In workgroup networks, each computer (PC) has an LSD file, and each computer's LSD is stored on the same computer.</p> <p dir="ltr">The reason we call these networks work group networks is that the management in these networks is independent and decentralized. It means that each computer manages access to itself individually.</p> <p dir="ltr">In the workgroup network, in order to access my user account, my user account must exist in the local security database of the computer I want to access.</p> <p dir="ltr"><strong>Now the question is: when I go through the login process on PC1, what are the steps?</strong></p> <h3 dir="ltr">Login in workgroup networks</h3> <p dir="ltr">Generally, in both workgroup networks and other networks, you have to go through three parts to log in. These three sections, which include authentication, authorization, and accounting, are called AAA, which I will give a brief explanation of here.</p> <h4 dir="ltr">Authentication</h4> <p dir="ltr">Logically, when you want to log into your computer, you have to log in as a user like other users. For example, you have a vehicle and you need a key to enter this vehicle even if it is yours.</p> <p dir="ltr">For example, I have defined a user account on PC1 including User: Wings and password: 123. Now suppose we want to enter the user account I created. The first step in logging in is authentication. Authentication means if you are really Ali and if you have permission to log into this computer or not.</p> <p dir="ltr">For example, when you want to board the plane, your photo will be checked with your national card to see if you are really Ali Porsehi, in the next step it will be checked if Ali Porsehi is allowed to board this plane.</p> <p dir="ltr">Now this information is written on LSD. That is, after entering the username and password, the computer checks its local security database file and checks if there is a user named Ali and password 123 on it.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/161_1000.webp" alt="Authentication" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h4 dir="ltr">Authorization</h4> <p dir="ltr">After authentication, your eligibility to access system resources is measured. In short, you are logged in, but you only have access to specific resources or you have been authorized to access these specific resources.</p> <p dir="ltr">For example, you have been able to enter a residential unit, but are not allowed to use any facilities or enter any rooms.<br />Authorization topics are generally divided into the following three categories:</p> <h5 dir="ltr">permission</h5> <p dir="ltr">There is a concept in the network called authorization, which determines the level of access to system resources, and this concept of authorization itself is divided into the following three categories, which are authorization levels:</p> <ul dir="ltr"> <li>Read</li> <li>write</li> <li>Full control</li> </ul> <h6 dir="ltr">Read</h6> <p dir="ltr">This type of permission is granted to you only in the case of files that you can only see, or according to the meaning of the word, you can read these files, but you will not be allowed to modify these files.</p> <h6 dir="ltr">Write</h6> <p dir="ltr">This type of permission is granted to files that you can edit.</p> <h6 dir="ltr">Full control</h6> <p dir="ltr">This type of permission is like having both read and write access to a file. Of course, access also includes other elements and permissions which we will explain in the future and are not the subject of our discussion at the moment.</p> <p dir="ltr">In previous versions of Microsoft Windows, when you grant access to a file, a permission called Change is displayed. This access was the same as read and write access, but obviously Microsoft realized the error in its later versions and removed this permission.</p> <p dir="ltr">For example, the permission defines the amount of access you have to a file, which is one of your system's resources.</p> <h5 dir="ltr">Right</h5> <p dir="ltr">The right is access to the system itself. In a simpler sense, if you want to reboot a system or change system settings in the control panel or elsewhere, you will need Right access.</p> <p dir="ltr">Now the right access permission can be issued through the operating system itself or an admin user can give you this access.</p> <h5 dir="ltr">Access</h5> <p dir="ltr">The discussion of access is slightly different from Right and Authorization. Access means physical access to the hardware. When we say you have access to a server, it means your physical access to the server.</p> <p dir="ltr">It is possible that you have the right and authorization to a computer, but you do not have access. so that you are logged into this computer from behind another computer.<br />In most cases, when you have Access, that is, you have access to the hardware, you can also get Rights and Permissions.</p> <p dir="ltr">For example, if you have access to the hardware of a computer, you can change the password of this computer and define right and authorization. For this reason, server hardware is usually stored in server rooms that have security protocols and no one has the right to access them.</p> <p dir="ltr">The authentication and authorization process is done together, that is, when a user is authenticated, he is also authorized.</p> <p dir="ltr">This means that you shouldn't think that you have to wait for authorization after authenticating, i.e. don't think that if you run a file at the same time, since your access level has not been determined, this file will fail.</p> <h4 dir="ltr">Accounting</h4> <p dir="ltr">The word accounting means auditing. This section specifies the scope of your access and your access restrictions. For example, it is assumed that you access the Internet, the volume of your Internet access can be defined with a concept called accounting.</p> <p dir="ltr">Accounting means that a restriction has been applied to your access. Accounting itself can be defined both as Quota and Credit, which we do not intend to explain here.</p> <p dir="ltr">I want to explain very simply, the amount of your access and the amount and volume of the access are defined by accounting.<br />You see this in most companies where, for example, employees have speed limits or can use a certain amount of internet volume during the day.</p> <h3 dir="ltr">Communication between two computers in workgroup networks</h3> <p dir="ltr">One of the biggest drawbacks of this type of network is the lack of centralized management. If you want to access PC2 resources on a network via PC1; First, you need to go through the login process on PC1, then you need to go through the login process on PC2 again to access the resources of this computer.</p> <p dir="ltr">In fact, for example, we must provide the user with both the authentication information on PC1 and the login information on PC2. This case doesn't cause much trouble for you in the small size.</p> <p dir="ltr">But assuming that in a network where the user intends to connect to 10 computers for various tasks, this problem creates a lot of problems. First of all, we should provide each user with a list of users and passwords because it is difficult for ordinary users to keep such information.</p> <p dir="ltr">Second, if a user, for example, changes their user password, a new list must be issued to inform everyone in the company again that a particular user has changed their computer password.</p> <p dir="ltr">To solve the second problem, what can be done is to define two users on each computer, so that if the PC2 user changes his password, the PC1 user can still access the resources of this computer.</p> <p dir="ltr">The third problem that arises in these cases is that the PC1 user can log into PC2 with the information in his possession and the username and password stored on the PC2 LSD. As a result, our network will have low security.</p> <p dir="ltr">To solve the first problem, it is sometimes seen that the network administrator (admin) enters the same username and password of all computers to solve this problem. In this case, for reasons that will be explained later, instead of PC1 using PC2 resources, it is not necessary to complete the authentication process.</p> <p dir="ltr">If we want to say it more correctly, the authentication process is finished, but it takes place in the background. But you will have the security problem again.</p> <p dir="ltr">It means that each user knows the username and password of other computers and has the ability to log in and make changes on these computers. We encountered the security issue again.</p> <p dir="ltr">This is just like installing the same lock and keys for all units within an apartment. This is truly a disaster in a network.</p> <p dir="ltr">In the workgroup network, you will not have a limit for clients and servers, and if you want to have very normal security, you have to define user accounts on each computer as many employees as possible. If the user wants to work on a computer, his user should be defined on the LSD of this computer.</p> <p dir="ltr">The problem that arises for you here is that if a user makes a change to one of her user attributes; You need to manually apply this change to all of these computers.</p> <p dir="ltr">As a standard, the number of computers in a workgroup network is defined as between 2 and 10 computers. Note that I am not saying that you have a limit of 10 computers, I am saying that if there are more than this number, it will be more difficult to manage.<br />I suggest you think of another network if the number of your computers and servers exceeds this number.</p> <h4 dir="ltr">Background Authentication</h4> <p dir="ltr">Above, I explained to you that we could run the authentication process in the background. Now we want to examine how this happens.<br />First of all, I want to talk about some internal parts of the computer so that you can understand this problem better. You should have an overview of RAM, CPU and hard work:</p> <h5 dir="ltr">CPU</h5> <p dir="ltr">As you know, the CPU is the central processor of the computer and performs three main actions to execute the processes:</p> <h6 dir="ltr">Fetch</h6> <p dir="ltr">In plain language, retrieving means asking for information. It is logical that the CPU needs a series of information for processing, it needs a series of zeros and ones.<br />As long as they are not 0 and 1 there is nothing to process. So, in the first step, the CPU has to retrieve this information.</p> <h6 dir="ltr">Decode</h6> <p dir="ltr">Decoding is the main activity of the CPU, which means that the CPU processes the information it retrieved in the previous step.</p> <h6 dir="ltr">Execute</h6> <p dir="ltr">In the final step, the decoded instructions are sent to the relevant CPU components for execution.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/162_1000.webp" alt="Computer processor" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h5 dir="ltr">Hard</h5> <p dir="ltr">Your computer's main memory is hard and we won't discuss the technology and types here. The only thing that matters to us here is that Hard is slower than RAM and CPU.<br />This slow speed reduces the performance and efficiency of our computer.</p> <h5 dir="ltr">RAM</h5> <p dir="ltr">The hard data exchange rate is much lower than the CPU processing speed. Therefore, a component called RAM was added to the computers to be placed between the hard drive and the CPU.<br />Suppose you work on a production line and the person in front of you is slow and your work depends on him. In this case, your work will be reduced based on that person's speed.</p> <p dir="ltr"><strong>Now how does RAM help you?</strong></p> <p dir="ltr">Explaining how RAM works requires a separate article, but in summary if I want to explain; RAM uses a number of mathematical algorithms to store information you may have a lot so that you don't have to go to the hard drive every time to get this information.</p> <p dir="ltr">As far as I know, RAM usually stores information you recently accessed and information you access frequently.<br />The hard drive volume in computers is much more than the RAM volume, so the RAM cannot take all the information from the hard drive and only takes the information from the hard drive that is most referenced.</p> <p dir="ltr"><strong>Now, based on the contents we have explained, we want to switch to Background Authentication:</strong></p> <p dir="ltr">Assuming you are logged in on a computer with a user. In this case, the first thing that happens is that your user account is cached in the computer's RAM.</p> <p dir="ltr">Now you want to access a file share from another computer. For this, as shown in the image below, you need to browse the IP address of the target computer in the RUN window (using the combination Win + R keys), which looks like the image below.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/164_1000.webp" alt="File Sharing" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">For this, you need to use two backslashes (\) and then the ip of the target computer. (Of course, there are other ways to do this.)</p> <p dir="ltr">If your computer's username and password are the same as the target computer's, the authentication process will run in the background and will no longer authenticate your second computer.</p> <p dir="ltr">Put simply, what happens here is that the target computer checks the cached information in the source computer's RAM to see if there is a user account it can trust.</p> <p dir="ltr">This is the same point where we said that the network administrator has defined a unique account for each user on LSD and each of the computers in order to make her job easier.</p> <h2 dir="ltr">Information exchange between two computers</h2> <p dir="ltr">The exchange of information between two computers occurs in two ways: clear txt and cipher txt. Suppose there is a middle man listening to the media on your network, this is the information that is exchanged between the computers.</p> <p dir="ltr">In this case, if the information exchanged between two computers or in general between computers in a computer network is of type Clear txt. This person has all the information you sent to another computer.</p> <p dir="ltr">For example, if a computer intends to send a username and password to another computer, a third party who is listening to the information sent by these two people will find out the computer's username and password.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/165_1000.webp" alt="Information exchange between two computers" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">In this case, the computers send their information as a txt cipher. Let me explain to you in plain language, they speak to each other in a different language so that no one can understand what information they are exchanging.</p> <p dir="ltr">This event and the sending of information in the form of txt encryption are called encryption. In the discussion of encryption, we need a few things to be able to convert a clear txt into an encrypted txt.</p> <p dir="ltr">One of these requirements is the existence of a powerful algorithm. There are many algorithms, as far as I know, all these algorithms are derived from mathematical functions.Here I will not explain the algorithms because explaining the algorithms takes time. Each algorithm has at least one key.</p> <p dir="ltr">The existence of the algorithm alone is like an unfinished puzzle that is completed using (Key). Most of these algorithms are available on the internet and you can see how they work and their equations.</p> <p dir="ltr">But what makes these algorithms unique between two computers is the existence of this key. Some algorithms have multiple keys.</p> <p dir="ltr">The key is sent by the sender of the information to the recipient and the recipient of the information needs this key to break the encryption of the txt and decrypt it. This makes the third party aware of the information exchange but not of the information content.</p> <p dir="ltr">The sender encrypts a message using the f (x) function. Then send the txt code and the algorithm key to the recipient. But this time, the recipient can decrypt the message with the inverse of the function f (x) or f '(x).</p> <p dir="ltr">The middle man can try different types of keys to decrypt the message, this takes time but not impossible.</p> <p dir="ltr">For this reason, keys usually have a life so that if someone learns about the key, he cannot decrypt all messages between two computers. (as a dynamic password)<br />Now the important question is: when will the key be sent to the target computer?</p> <p dir="ltr">The answer is very simple, before all these tasks, these two computers establish a connection with each other via a protocol and, when this connection is established, the source computer sends the encryption key of the txt which it will send to the target computer in the future .</p> <p dir="ltr">During communication between two computers, the key may not be sent to the target computer and only the algorithm can be specified. In this case, when sending the txt cipher itself, the key is also sent along with it.</p> <p dir="ltr">What I have explained to you here is a very brief explanation of cryptography.To talk about this topic, you need days to fully understand such a concept.</p> <h2 dir="ltr">I-land networks</h2> <p dir="ltr">One way to manage a computer network with more than 10 users is the I land method. This way, instead of having a Workgroup network, you have multiple I-lands, each of which is a Workgroup network.</p> <p dir="ltr">This method of network management is also called an island. For example, you may have several plots of land, one of which is related to the administrative unit, another to the accounting unit, another to the control of the project, etc.</p> <p dir="ltr">In the next step, it is best to have an administrator or help desk for each of the i-lands. Otherwise, you have to do all these things manually.</p> <p dir="ltr">In the i-land network, there are all the problems and concerns of a network of working groups. The only thing that has happened here is that it has become easier to manage thanks to the management in the form of a computer island. But you should still do the same things you were supposed to do in the Workgroup network here in each of the i-lands.</p> <p dir="ltr">Furthermore, the problem here is that there is no connection between the i-lands, and practically the employees of the financial unit should not have access to the computers of the administrative unit.</p> <p dir="ltr">Of course, access can be defined, but it is not logically possible for someone from behind the computers of the financial unit; Log into the computers of the administrative unit.</p> <p dir="ltr">You are not facing any particular complexity in Workgroup and i-land networks, although these networks cause you a lot of worry. It means that the problem of maintaining such networks is very high, but there is no special complexity in them and you can manage these networks with minimal knowledge.</p> <p dir="ltr">So far we have found that workgroup networks are easier to implement but more difficult to manage. Furthermore, these networks have lower costs.</p> <h2 dir="ltr">Domain networks</h2> <p dir="ltr">Aside from the security issues and problems it created for the network administrator, the workgroup networks had one serious weakness.</p> <p dir="ltr">Users in workgroup networks have to keep a large number of usernames and passwords, and the biggest problem is that they have to enter these usernames and passwords every time they want to use a service.</p> <p dir="ltr">In another sense, there is no centralized management in workgroup networks and each computer independently manages its own access. The problem with workgroup networks is that its implementation is easy and its costs are lower, but maintaining and maintaining its security is a disaster.</p> <p dir="ltr">Centralized or domain model networks are networks that, unlike workgroup networks, are not independently managed. The solution to avoid workgroup network problems is to switch to domain networks. The point is, you need an AAA server to solve these problems.</p> <p dir="ltr">You need a server that takes responsibility for authentication, authorization, and accounting on your network. The use of this AAA Server is that instead of each computer referencing its own LSD for each of the above actions, it refers to the AAA Server.</p> <p dir="ltr">This AAA server has a database that stores information about each of these computers in the first step. Computers that are within the AAA server range (eg Join AAA server) should receive help from the AAA server to perform authentication, authorization, and accounting.</p> <p dir="ltr">When a computer in the domain is active, we say that this computer is a join domain. Well, the best name that can be chosen for a domain controlling server is Domain Controller or DC for short. This is why AAA Server is called DC in networks.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/166_1000.webp" alt="Domain networks" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">On Windows Server operating systems, which currently have the best AAA servers in the world, the service this domain controller should provide to manage and control your domain is the Active Directory service.</p> <p dir="ltr">In fact, Active Directory has all the uses of LSD to control computers. And most importantly, computers should no longer be independently controlled.</p> <p dir="ltr">The process of authentication, administrative level determination and auditing in domain networks is almost no different from workgroup networks and the only difference is that instead of referring to LSD, computers go to the Active Directory database, called NTDS. It's DIT.</p> <p dir="ltr">Now that the file is NTDS. How is DIT, we will talk about it in the next articles. (MCSE topics)</p> <p dir="ltr"><strong>Now, do you think that if there is a domain in the network, another computer that is not a join domain can connect to the computers?</strong></p> <p dir="ltr">The answer is very simple. You can connect a computer that is not a workgroup logon domain to other computers that are a workgroup logon, but if this computer wants to access the domain controller access levels and use the Active Directory database, it must be a domain login.</p> <p dir="ltr">I want to explain in a much simpler way, a computer that is not a join domain cannot use the Active Directory service.</p> <h3 dir="ltr">DNS in domain networks</h3> <p dir="ltr">When networks were in the form of workgroups, you knew which computer you had to connect to to receive a service. But when you create a model domain network, your computer won't know where the AAA server is, so it wants to connect to another computer and receive the service after connecting to it.</p> <p dir="ltr">For example, if you want to move to a destination for the first time, it makes sense that you don't know how to move to your destination for the first time. In this situation, a wise person takes help from Google Map or any other software to find her destination. Or he gets help from someone to help him. For example, you can call 118 to find your destination or find a number from your destination.</p> <p dir="ltr">Now let's get back to our discussion; In computer networks, computers have to ask a server who their domain controller is and where the Active Directory service is located on my network.</p> <p dir="ltr">The task of this work is entrusted to a server called DNS Server, whose real name is Domain Name Services. The DNS server's job is domain name resolution, which means it performs three main tasks:</p> <ul dir="ltr"> <li>Convert IP to FQDN</li> <li>Convert FQDN to IP</li> <li>service locator</li> </ul> <p dir="ltr">Now what is FQDN? At this point, assume that FQDN is your server name so I can explain it in the near future.</p> <p dir="ltr">The third thing a DNS server does is what we are looking for. service locator means DNS tells you from which server each service is provided to you.</p> <p dir="ltr">DNS should help domain-joining computers on the network so that they can find the server providing the desired service.</p> <h2 dir="ltr">The difference between logon and login</h2> <p dir="ltr">Basically, these two are no different from each other. Suppose you have a house and inside this house you have a computer. When you open the door to this house and enter this house, you actually enter the interior of the house, which means that you are surrounded.</p> <p dir="ltr">I want to explain more simply, when you sit at your computer desk and turn on your computer, you are actually logged into your operating system (OS). In the next step, when you want to access your office automation system through the browser, please go through the login procedure to access this software.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/163_1000.webp" alt="The difference between logon and login" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">If we want to speak correctly, they log on to the computer, and logging on to the computer makes no sense. That is, to enter means to get on board, it means to be surrounded.<br />Login and login have nothing to do with the password; The fact that you log into your computer has nothing to do with whether or not you have a password.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/شبکه-ها-از-نظر-مدیریت-دسترسی-به-منابع" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:1128https://mixseda.com/network-equipment-and-componentsNetwork equipment and components<p dir="ltr"><img src="/images/uploaded/blog02/157_1000.webp" alt="Network equipment and components" width="100%" /></p> <h2 dir="ltr">What is a network?</h2> <p dir="ltr">In the social network we call the connection of two or more people who have gathered around each other for a specific purpose, a network of friends. Now, this goal can be sharing content, exchanging an item, or whatever.</p> <p dir="ltr">Now, according to this definition, a network in the world of computer systems can be said to refer to the connection of two or more computers for a specific purpose. In the world of networking, our goal in creating a network is to share resources.</p> <p dir="ltr">If we want to explain more correctly the network in the computer world, we will finally arrive at this sentence:</p> <p dir="ltr">A set of two or more computers connected to each other through a means (media) to share resources.</p> <p dir="ltr">Furthermore, we find that this media is the infrastructure we use to share resources.</p> <p dir="ltr">Well, computer networks include a number of components. Be aware that I don't mean network equipment, the word components is different from the word equipment. According to the definition above, the components of the computer network include the following:</p> <ul> <li dir="ltr" style="text-align: left;">The computers themselves in the network</li> <li dir="ltr" style="text-align: left;">average</li> <li dir="ltr" style="text-align: left;">Resources that have been shared</li> <li dir="ltr" style="text-align: left;">and resources that have not yet been shared</li> </ul> <p dir="ltr">We also have unshared resources on the network, including our own network. For example, when someone tells you to get a support version of information on the network, it means not only shared information, but also unshared information.</p> <p dir="ltr">Now we want to discuss each of these cases. We don't have only PCs in our network, if we want to explain more precisely, the computers in our network are classified into two categories: server and client.</p> <h2 dir="ltr">What is a server?</h2> <p dir="ltr">In some of the Network Plus books that have been translated into Persian, the word "servant" has been used in place of the word "server".</p> <p dir="ltr">In a very simple sense, a server is one of the network components that provides services in the network. We have a wide variety of IT services, for example, some examples of services include the following:</p> <ul> <li dir="ltr" style="text-align: left;">A file server that provides a file sharing service.</li> <li dir="ltr" style="text-align: left;">A domain controller (DC) server provides Active Directory service.</li> <li dir="ltr" style="text-align: left;">Servers are known by their role in the network. For example, some servers are web servers. Others are print servers.</li> </ul> <p>&nbsp;</p> <p><img src="/images/uploaded/blog03/263_1000.webp" alt="What is a server?" width="100%" /></p> <p>&nbsp;</p> <h2 dir="ltr">The difference between server and client</h2> <p dir="ltr">Clients are computers that connect to the server to receive services from the server. The difference between client and server is in two ways.</p> <p dir="ltr">A server is different from a client in terms of both software and hardware. A server that is supposed to provide services to other computers is superior both physically (hardware) and logically (software) to a client.</p> <h3 dir="ltr">The superiority of the server in physical terms (hardware)</h3> <p dir="ltr">The hardware of a server, since the server is always in service, must always be active, so it must have physically stronger hardware to avoid problems.</p> <p dir="ltr">The hardware of a server is designed to provide service 24 hours a day, 365 days a year. A concept called SLA is usually defined in corporate contracts. SLA (Service Level Agreement) means service agreement.</p> <p dir="ltr">That is, within the contract, a certain amount is defined as Downtime, to the extent that the server service may not be available throughout the year.</p> <p dir="ltr">Obviously, if the amount of the unavailability of your service exceeds the amount indicated in the SLA, you are at your expense.</p> <p dir="ltr">In SLAs, there are other concepts that are not the subject of our discussion at the moment. Just know that this agreement is a kind of liability agreement on the part of the service provider.</p> <p dir="ltr">We said all of this to come to the conclusion that the server, in both hardware and software terms, must have the foundation and power of this amount of service.</p> <p dir="ltr">I don't really like to review server hardware in this section, I hope to have the opportunity to publish a series of articles on server + for you in the future.</p> <p dir="ltr">In general, servers are designed in such a way that they do not fail easily. For example, a server has 2 power supplies, each of which can supply power to the server by itself. If one of the power supplies fails, the other power supply can fully power the server with electricity (redundancy).</p> <p dir="ltr">This design pattern is considered in all parts of the server. The servers are also designed in such a way that their parts can be replaced or upgraded while they are running.</p> <p dir="ltr">You can change the central processors of a server at the same time it is active, without any problems in processing your servers (I suggest you read it before doing so).</p> <p dir="ltr">In terms of graphics, servers may also be weaker than clients, because servers will practically not need a graphics card. In other words, graphics processing shouldn't be done on a server. But if someday you need a server capable of graphics processing, you can increase the power of your server by adding a graphics card.</p> <h3 dir="ltr">The superiority of the server in terms of logic (software)</h3> <p dir="ltr">The servers are also superior in terms of software. Here I mean the OS software or the operating system. It makes sense that the software and software configuration performed on a server are different from a client.</p> <p dir="ltr">A server's operating system is built to provide us with services, while a client's operating system is designed to receive services.</p> <p dir="ltr">In fact, the programmer of a server-side operating system has programmed this operating system in such a way as to be able to provide us with a series of services compared to a client-side operating system.</p> <p dir="ltr">Here I will introduce you to some examples of server-side operating systems:</p> <ul dir="ltr"> <li>Windows 2008 R2 Server</li> <li>Windows Server 2012</li> <li>Windows Server 2016</li> <li>Windows Server 2019</li> <li>Ubuntu 20 LTS</li> <li>Ubuntu 22.04 LTS</li> <li>AND...</li> </ul> <p dir="ltr">As for the client-side operating systems we all know, like Microsoft Windows 10, Microsoft Windows 11 and ...</p> <p dir="ltr"><strong>Maybe this question has arisen for you, why hasn't an operating system been produced that is both client-side and server-side?</strong></p> <h3 dir="ltr">Why are the operating systems separate?</h3> <p dir="ltr">For example, if Microsoft were to offer an operating system that provides services and can receive services, instead of offering two types of operating systems, we would be faced with several problems:</p> <p dir="ltr">The first problem was that you had a tool that could be installed on both the server and the client, so you definitely had to pay for it more than the capabilities of this operating system.</p> <p dir="ltr">The second thing is that the volume of this operating system would certainly be much higher due to the features and services on it, and in the simplest case, installing such an operating system could take time.</p> <p dir="ltr">Thirdly, such an operating system would certainly imply more system resources due to its capabilities and features.</p> <p dir="ltr">Fourth, you will need less knowledge to work with a client-side operating system than a server-side operating system.</p> <p dir="ltr">For this reason, Microsoft introduces two types of operating systems. Now, if I needed a server-side operating system, I'd install a server operating system; Otherwise, I'll settle for a client-side OS.</p> <p dir="ltr">Let me also tell you that these client-side operating systems also have different types, which is not currently the subject of our discussion.</p> <h2 dir="ltr">What are the media?</h2> <p dir="ltr">For example, we have a number of computers that should be linked together to share resources.</p> <p dir="ltr">If you don't have a connection between your computers, you won't be able to network them together. Now this connection can be in several ways:</p> <p dir="ltr">This connection can be in the form of a cable that you can see, or it can be in the form of a series of waves that we cannot see (wireless).</p> <p dir="ltr">We call this collection of multimedia communication platform (Media). Another point is that many people think the Internet is also media; While the Internet is not considered a medium.</p> <h2 dir="ltr">resources</h2> <p dir="ltr">You may have a computer in your network where some of its resources are shared or unshared in your network.</p> <p dir="ltr">For example, a printer can be connected to a computer but not shared among other computers on the network. We call these resources resources.</p> <p dir="ltr">While these resources are not shared among other computers in our network, they are part of our network. We may decide to share these resources in the future.</p> <h2 dir="ltr">Shared resources</h2> <p dir="ltr">As you can see from its sources, it includes shared resources in our network. Shared resources can be anything. It can be a file, hardware or whatever ...</p> <h2 dir="ltr">Network equipment</h2> <p dir="ltr">In computer networks, we need a variety of equipment to communicate and access information sources, which include the following:</p> <ul dir="ltr"> <li>router</li> <li>switch</li> <li>Sockets and patch panels</li> <li>Radio</li> <li>AND...</li> </ul> <p dir="ltr">These elements are all equipments that help us to establish the network environment and, on the other hand, their existence is mandatory for our network.</p> <p dir="ltr">You can't have a network that doesn't include these devices. In the simplest case, you need to connect two computers with a cable to have a network. In this case, the cable being used is part of the network equipment.</p> <h3 dir="ltr">Switch</h3> <p dir="ltr">One of the widely used equipment in computer networks is a switch. Switches are in the second layer of the OSI model, but some of these devices are in the third layer of the OSI model. That is, in fact, they have the ability to understand the network layer.</p> <p dir="ltr">Switches have different categories based on the capabilities and facilities they provide in computer networks. For example, some switches are classified by the number of ports they have. Some other switches are classified in terms of manageable and unmanageable.</p> <p dir="ltr">And some other network devices are also classified according to the network layer that has the power to understand and operate in that layer. It's good to know that the switches are Plug &amp; Play and you won't need a driver to connect them to a computer.</p> <p dir="ltr">The location of switches in computer networks is between workstations. That is, what you see in practice, computer switches are actually in the middle of computer networks.</p> <p dir="ltr">We will talk about these network devices in detail in the future, and you don't need to know everything about Switch. At this point, it's good to be familiar with these devices on your network.</p> <p>&nbsp;</p> <p><img src="/images/uploaded/blog03/262_1000.webp" alt="Switch" width="100%" /></p> <p>&nbsp;</p> <p>The most important job of the switch is to perform switching. In the past, telecom centers did not have intelligent servers to transfer calls. Telecommunication calls, in fact, were not transferred automatically by the system.</p> <p>You may have seen in very old movies that when a person picks up the phone, he talks to an operator and says who he wants to talk to. The main task of these operators in the past was Switching.</p> <p>Now, a switch in computer networks is responsible for the same operator, i.e. Switching means that the switch can detect which computer a packet belongs to in the network.</p> <p>Therefore, these hardware shouldn't send a packet to everyone as a HUB. Switches have the ability to recognize the sender and recipient of each packet and deliver only the packet to its recipient.</p> <p>We have nothing to do with how a switch does this, but it's good to know that switching in computer networks increases the security and performance of the network.</p> <h2 dir="ltr">The advantages of having a network</h2> <p dir="ltr"><strong>The main question is why should we spend money to have a network?</strong></p> <h3 dir="ltr">Reduce costs:</h3> <p dir="ltr"><br />The first advantage of having a network is the reduction of costs:</p> <p dir="ltr">Suppose in a business you want everyone to have access to a printer. If you don't have a network, you should buy a printer for everyone.</p> <p dir="ltr">If, on the other hand, you have a network in the same company, the presence of a printer is sufficient. Because all people can connect to it through the network.</p> <p dir="ltr">Additionally, you can share your servers' resources and processing between clients in networks. This means that your servers on a network can help clients process faster.</p> <h3 dir="ltr">Time saving:</h3> <p dir="ltr">For example, if you want to share a file between 100 people without accessing the network. You need to burn this file to 100 CDs or save this file to 100 memory, which could take hours depending on the type and size of the file.</p> <p dir="ltr">This is only if there are no problems during the file saving process. While if you have a network, you can share a file on other computers in minutes.</p> <h3 dir="ltr">risk management:</h3> <p dir="ltr">You can reduce the risk of data loss in the presence of a network.</p> <p dir="ltr">Instead, you will be able to manage online through integrated management systems and administrative automation. In general, you will not have to worry about data loss on the network, or rather, you will have less.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/تجهیزات-و-اجزای-شبکه" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:1126https://mixseda.com/network-plus-course-trainingNetwork plus course training<p dir="ltr"><img src="/images/uploaded/blog02/155_1000.webp" alt="Network plus course training" width="100%" /></p> <p dir="ltr">The first question that can occupy every person's mind is what is Network Plus?</p> <p dir="ltr">There is a company called comptia, which for the first time has decided to define a series of practical courses for students who want to decide on a job or a field.</p> <p dir="ltr">That is, for example, as a student, I want to know if a certain specialist field will be useful to me in the future or not? Either I have the ability to understand and analyze a job or not.</p> <p dir="ltr">The existence of such courses helps us to know from the first entry into a specialized field that this field is compatible with our mentality and type of thinking or not.</p> <p dir="ltr">I don't want to explain too much about the Comptia company, each of us can get a lot of information about this company and the courses it organizes with a simple Google search.</p> <p dir="ltr">I just want to say that the Camptia Institute itself claims that it is not for profit and does not make a profit through these courses and trainings; While this institution, like all other institutions, earns a lot of income for teaching and taking exams for these courses.</p> <p dir="ltr">All these courses are introduced with pluses, such as the following:</p> <ul> <li dir="ltr" style="text-align: left;">Network +</li> <li dir="ltr" style="text-align: left;">Server +</li> <li dir="ltr" style="text-align: left;">Security +</li> </ul> <p dir="ltr">So we are reading these articles to have a vision and an attitude on the Network + (Network) period. Learning these courses is great for us, but in our dear country (Iran), due to a number of sanctions, the exams of this company do not take place.</p> <p dir="ltr">I want to keep in mind that even if you have all of these courses in your work schedule, they won't give you a specialized job in companies.</p> <p dir="ltr">Because these courses should only introduce a specialty and not for learners of that specialty. What we express here is a summary on Network Plus.</p> <p dir="ltr">And according to the words of my teacher and according to the result I achieved a year ago, no Persian article or course in the field of computer networks is complete in the Persian language.</p> <p dir="ltr">And most of these courses have shortcomings. Hence, I recommend that you read books and articles in English in the field of networking + at the same time or after completing this course.</p> <p dir="ltr">The breadth and depth of the content you can find in English is much more than Persian-language articles and resources on the Internet.</p> <p dir="ltr">At first it was very difficult for me to read articles in English, but over time I realized that by reading articles in English I can achieve the desired result much earlier.</p> <p dir="ltr">In this learning process, you may need some basic knowledge, which I suggest during your learning, or search everywhere you don't understand, or ask me for help through the comment section.</p> <p dir="ltr">You should remind yourself of the concepts you learn and deal with them every day so you don't forget them.</p> <p dir="ltr">More than 80% of the Network Plus course includes definitions and concepts, and you won't do much practical work in this course.</p> <p dir="ltr">Unlike many other courses, Network Plus is not about a specific product or company. For example, the MCSE course is about Microsoft products and services, but in Network Plus we won't talk about a specific product or company.</p> <p dir="ltr">or the CCNA and CCNP courses are based on Cisco products and equipment. In other words, they are called courses like network + courses without suppliers.</p> <p dir="ltr">You should try your best to learn the concepts in the courses. What can differentiate you from thousands of others is learning concepts.</p> <h2 dir="ltr">Basics of Network Plus</h2> <p dir="ltr">So what should we learn in Network Plus?</p> <ul> <li dir="ltr" style="text-align: left;">What is a network?</li> <li dir="ltr" style="text-align: left;">What is the network for?</li> <li dir="ltr" style="text-align: left;">What types of networks are there?</li> <li dir="ltr" style="text-align: left;">How are network types classified?</li> <li dir="ltr" style="text-align: left;">What is the existential philosophy of computer networks?</li> <li dir="ltr" style="text-align: left;">Let's talk about dare</li> <li dir="ltr" style="text-align: left;">Learn portkeys</li> <li dir="ltr" style="text-align: left;">Learning standards and potions</li> <li dir="ltr" style="text-align: left;">Know the services and services it provides</li> <li dir="ltr" style="text-align: left;">How do we identify ourselves in the world of the web?</li> <li dir="ltr" style="text-align: left;">What are the methods of identification in the world of the network?</li> </ul> <p dir="ltr">Our goal is to conceptually learn all of these things at the end of this course. For example, we won't learn how to ping; We will understand what ping is.</p> <p dir="ltr">Almost anyone can explain what pinging is for, but you and I need to learn what ping is and what exactly it does.</p> <h2 dir="ltr">What is Ping?</h2> <p dir="ltr">Ping is basically software (an application) that helps us provide some information. Ping gives us a solution to check, for example, the connection between two computers. Or, for example, check the time interval between the equipment and many other cases ...</p> <p dir="ltr">The main goal of the Network Plus course is that by the end of this course, you will come to a conclusion whether you can work in this field or not!</p> <p dir="ltr">If at the end of the course you come to the conclusion that you can work in this field, after this course you should take more specialized courses such as MCSE or CCNA and ...</p> <p dir="ltr">Usually, people interested in graphic work choose the MCSE courses, and people who want to work non-graphic on Cisco equipment and infrastructure choose the CCNA course. Of course, I myself prefer to study the mcse course before the ccna ... you should study both of these courses first and the last one.</p> <p dir="ltr">After these two courses, you should specialize in virtualization and clouding because the world is moving in this direction.</p> <p dir="ltr">For people who want to work abroad, it is best to learn Cisco courses such as CCNA and CCNP because companies are more willing to hire people in this field from other countries.</p> <p dir="ltr">Companies prefer a person who has just been hired from another country to work in a position that doesn't have much direct contact with the military, because she may not be familiar with that country's culture.</p> <p dir="ltr">As a person who has learned mcse, you have direct contact with the user and the language and culture are a concern for you.</p> <p dir="ltr">Therefore, if you have an immigration plan, you may be more successful at CCNA.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/آموزش-دوره-نتورک-پلاس" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:1124https://mixseda.com/vocal-recording5 Vocal Recording Mistakes You May Be Making<p dir="ltr"><img src="/images/uploaded/blog02/129_1000.webp" alt="5 Vocal Recording Mistakes You May Be Making" width="100%" /></p> <p dir="ltr">Everybody wants a great vocal sound on their recording, right? Most engineers can give you tips for techniques you should use, but there are some things that you will definitely want to avoid – details that are frequently overlooked. Doing these may be keeping you from achieving great vocal tracks.</p> <h2 dir="ltr">1. Ignoring Bad Acoustics</h2> <p dir="ltr">We get it — if you’re recording at home or in any less than ideal environment, then you’re unlikely to have studio-quality acoustics. You’re going to have to compromise, but there’s a limit to what you can ignore without totally trashing your sound.</p> <p dir="ltr">Room tones and resonant buildup are absolute tone killers, because they artificially boost or cut narrow frequency bands, resulting in tonal imbalances you simply can’t fix.</p> <p dir="ltr">While other reflection patterns (room modes) cause serious issues, flutter echo, which is what you get from parallel walls, is one of the biggest culprits of bad, resonant sound. In most cases, a small amount of acoustic foam (or even just moving the couch) to break up parallel walls can work wonders.</p> <p dir="ltr">You can also avoid or reduce the effects of parallel walls by pointing the nulls on your mic’s polar pattern at the offending parallel surfaces.</p> <h2 dir="ltr">2. Being Unaware of Rumble</h2> <p dir="ltr">Most engineers recognize the importance of preventing mic bleed and broadband noise, but they often overlook the need to block out low-frequency noise.</p> <p dir="ltr">Low-frequency noise, such as vibrations from passing cars or HVAC systems, can completely destroy low-end definition, turning your recordings into mud. This problem can be undetectable until it’s too late, and you find yourself trying to fix the unfixable in the mix.</p> <p dir="ltr">An exposed hardwood floor can act like a giant speaker, transmitting the rumble of traffic into the kind of deep vibration even a top-quality shockmount can’t block out.</p> <p dir="ltr">Thick carpeting can often do the trick, but you might need to record at off-prime hours to avoid truck traffic. The best way to prevent HVAC noise is to simply switch off the HVAC (along with all your fluorescent lights, your fridge, and other noisy electronics).</p> <p dir="ltr">You can also use baffles or diverters on the A/C supply vents to change the direction of air flow if it’s disturbing your mics.</p> <h2 dir="ltr">3. Using Excessive Color/Processing</h2> <p dir="ltr">Recording with some in-line processing, such as compression and EQ, can be a serious time-saver. What’s more, even if you prefer to track clean, you have to appreciate the natural warmth and colored sound you get from the right kind of preamp. The biggest problem with tracking while using processors and warm preamps is that you have to commit to that one sound.</p> <p dir="ltr">This isn’t to say that you need to go 100% clean — you just need to be sensible. Until someone invents a de-compressor, you’re going to want to be conservative with dynamics on the way in.</p> <p dir="ltr">Likewise, overloading your preamps is a great way to find yourself in a bad spot when you try to get a smooth mix from vocals that sound vaguely like they were recorded through a megaphone.</p> <h2 dir="ltr">4. Not Perfecting the Headphone Mix</h2> <p dir="ltr">Similar to applying or not applying color to your vocals as you record, prioritizing the monitor mix can be hard to sort out. For instance, as the engineer, you know that the most important thing is for the final mix to sound as good as possible, and in order to do that, you need to get a great mix going in the control room.</p> <p dir="ltr">While you may get requests for obnoxiously bright or totally uncompressed headphone mixes that offend your sensibilities, it’s still your responsibility to set up a headphone mix that will deliver the sound your vocalist needs.</p> <p dir="ltr">At the same time, you can only humor your talent so far. When he or she starts requesting mixes dripping with so much reverb or delay that it becomes impossible to sing on key or in time, then you need to put your foot down and come to some form of compromise.</p> <p dir="ltr">The bottom line is that you need to do what’s best for the song/mix, and that means getting the best possible performance out of your vocalist.</p> <h2 dir="ltr">5. Moving Too Fast While Recording</h2> <p dir="ltr">Rushing the recording process is nothing short of repeatedly telling yourself that you can “fix it in the mix,” a mentality rarely adopted by studio professionals, and for good reason.</p> <p dir="ltr">While it may be tempting to get a halfway decent take or two (or 15!) and move on to the next song, this expedience will cause you frustration and lost time, as you spend hours trying to edit together and tune and polish vocals that will never sound quite as good as you hoped they would.</p> <p dir="ltr">Fixing up poor vocal tone with a complex signal path is an entire issue on its own, but trying to correct for poor vocal performance in the mix is a waste of time and energy.</p> <p dir="ltr">For one thing, although advances in pitch and timing software have been truly staggering in the past few years, they can only effectively fix mild errors without imparting some artificial character to your vocals. It’s always best to start with the best performance possible.</p> <p dir="ltr">Starting with the best vocal take will save you from the biggest limitation of mix-rescuing vocal processors, which is that there’s no software out there that can correct for poor expression, inflection, or character.</p> <p dir="ltr">So if your vocals don’t sound great already, chances are, you’re better off taking your time and getting it as right as you can in the first place.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/5-اشتباه-در-ضبط-صدا" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:1122https://mixseda.com/audio-interfaceAudio Interface Buying Guide<p dir="ltr"><img src="/images/uploaded/blog02/123_1000.webp" alt="Audio Interface Buying Guide" width="100%" /></p> <p dir="ltr">Choosing the right audio interface may seem a little overwhelming. There are all kinds of different input and output configurations, connection types, formats and many other options to consider.</p> <p dir="ltr">So, how do you find the right one for you? This Mixseda Buying Guide will help you navigate the choices you need to make so that you find the interface that best meets your needs.</p> <h2 dir="ltr">What is an audio interface?</h2> <p dir="ltr">An audio interface is the hardware that connects your microphones and other audio gear to your computer. A typical audio interface converts analog signals into the digital audio information that your computer can process. It sends that digital audio to your computer via some kind of connection (e.g. Thunderbolt, USB, FireWire, or a special PCI/PCIe card).</p> <p dir="ltr">This same audio interface also performs the same process in reverse, receiving digital audio information from your computer and converting it into an analog signal that you can hear through your studio monitors or headphones.</p> <p dir="ltr">Most audio interfaces include line-level analog inputs and outputs, one or more microphone preamplifiers, and may even include digital inputs and outputs such as AES, S/PDIF or ADAT (Lightpipe).</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/124_1000.webp" alt="What is an audio interface?" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Why do you need an audio interface?</h2> <p dir="ltr">There are several reasons to use a dedicated audio interface, rather than the sound card built into your computer. Technically speaking, a sound card is an audio interface, but its limited sound quality and minimal I/O make it less than ideal for recording.</p> <p dir="ltr">Many sound cards only have a consumer-grade stereo line level input, a headphone output, and possibly also a consumer-grade stereo line level output. Electromagnetic and radio interference, jitter, and excessive latency all degrade or negatively affect audio both on the way in and on the way out.</p> <p dir="ltr">It’s also impossible to track a full drum kit (let alone a full band) with only two channels of input. Sound cards are great for hooking up a pair of Hi-Fi speakers and playing back compressed audio, but you’re going to need a reliable audio interface for recording and monitoring production-quality audio.</p> <h2 dir="ltr">Choosing the right I/O configuration</h2> <p dir="ltr">With the possible exception of computer connectivity (more on that below), no other feature is as important for choosing your audio interface as its I/O (input and output) configuration.</p> <p dir="ltr">The number and type of inputs and outputs you need depends entirely on what you want to be able to record, now and in the future. The range of audio interfaces includes everything from 2-channel desktop units to systems that can record hundreds of channels.</p> <p dir="ltr">If you’re a singer-songwriter, than you may only need a pair of inputs, as long as they’re the right inputs. Most audio interfaces include two or more microphone preamps.</p> <p dir="ltr">If you’re going to use condenser microphones you’ll want to make sure that your interface’s preamps are also equipped with phantom power. If you’re going to plug your guitar or keyboard straight into your interface, make sure that the interface you buy has instrument-level (also called “hi-Z”) inputs.</p> <p dir="ltr">Line-level inputs and outputs are great for hooking up outboard processors, headphone amps (for creating separate headphone mixes) and studio monitors.</p> <p dir="ltr">Digital I/O may not seem important when you’re first starting out, but it can be incredibly useful down the road. For instance, some high-end 1- or 2-channel microphone preamplifiers come equipped with digital outputs, which lets you hook them up to your audio interface without depriving you of line-level inputs.</p> <p dir="ltr">If your interface comes equipped with standard ADAT lightpipe I/O, you can easily expand your system with an ADAT-equipped 8-channel mic pre. Eight extra channels can turn your personal recording rig into a system that’s ready to track a full band.</p> <h2 dir="ltr">Computer connectivity options</h2> <p dir="ltr">One of the constants of the recording industry is that technology doesn’t sit still for long. In computer-related technology “standard” is next to “obsolete.” That said, a few audio interface connection types are considered standard, and those are: Thunderbolt, USB, FireWire, and PCIe.</p> <p dir="ltr">Most PC and Mac computers come equipped with USB ports (either USB 2 or USB 3), whereas FireWire (either 400 or 800) is mostly found on Macs. Both of these protocols average the same speed (480Mbps), which is fast enough to record up to 64 tracks at once under ideal conditions.</p> <p dir="ltr">Also, there are some simple interfaces that still use USB 1.1, which is much slower, but fast enough to record one or two channels.</p> <h2 dir="ltr">Thunderbolt</h2> <p dir="ltr">Due to its incredibly high speed and low latency, Thunderbolt is the new reference standard for connecting audio interfaces. Thunderbolt 3 (found on the latest Macs) is twice as fast as Thunderbolt 2 and 8 times faster than USB 3, supporting speeds up to 40 Gbps and cable lengths of up to 100 meters using optical cable.</p> <p dir="ltr">There are many high-end interfaces that now support Thunderbolt.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/125_1000.webp" alt="Thunderbolt" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Firewire</h2> <p dir="ltr">The advantage of FireWire is that it transfers data at more consistent rate than USB, which makes it slightly more reliable when you’re recording more channels at once.</p> <p dir="ltr">The disadvantage is that there are less interfaces that use FireWire than USB, and less computers that come equipped with FireWire ports. If you own a PC, you might need to install a FireWire card.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/126_1000.webp" alt="Firewire" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">USB</h2> <p dir="ltr">The advantage to USB (3.0, 2.0, and 1.1) is that there are many interfaces designed to run on USB bus power (rather than an external power supply), which is excellent if you plan on doing mobile recording with your laptop.</p> <p dir="ltr">There is also a small selection of PC Express and PCMCIA card-based interfaces, which are specifically designed for laptops.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/127_1000.webp" alt="USB" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">PCIe</h2> <p dir="ltr">That brings us to the fourth standard audio interface connection, which is PCIe (PCI Express). PCIe is an internal card-based interface, which (by its very nature) means you can’t use these interfaces with laptop computers.</p> <p dir="ltr">By effectively installing your audio interface into your computer’s motherboard, you gain the advantage of bypassing some of the data conversion processes that cause latency and limit bandwidth.</p> <p dir="ltr">The majority of PCIe audio interfaces are designed to handle high track counts and the near-instantaneous speed required by professional studios, and are consequently more expensive than FireWire or USB interfaces.</p> <p dir="ltr">That said, there are some affordable PCIe interfaces that allow even entry-level users to take advantage of this format.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/128_1000.webp" alt="PCIe" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Tech specs and how to read them</h2> <p dir="ltr">People often ask us, do things like bit depth and sample rate really matter? They’re some of the specs listed with almost every interface out there. The answer isn’t simple, but yes, they do matter. Let’s start with bit depth. When it comes to processing audio, bit depth has a huge impact on your sound.</p> <p dir="ltr">The simple math is that 1 bit = 6dB. That means 16-bit audio (CD standard) has a total dynamic range of 16-bits x 6 db/bit for a total of 96dB.</p> <p dir="ltr">The problem is that the digital noise floor is pretty high, and the remaining dynamic range is pretty small. The result is that if you work at 16-bit, the quieter sections of your audio will tend to be noisy.</p> <p dir="ltr">With 144dB of range, 24-bit audio gives production professionals the range they need to process audio smoothly. That’s why 24-bit is considered the professional standard and is highly recommended.</p> <p dir="ltr">On the flip side, sample rate is much more subjective. Each sample is a digital snapshot of the captured audio. The CD standard 44.1kHz takes 44,100 digital pictures of the incoming audio every second.</p> <p dir="ltr">Digital to analog conversion only needs two samples (the top and the bottom) of a wave form to generate a frequency, so the 44.1kHz sample rate is theoretically capable of reproducing frequencies as high as 22.05kHz. The uppermost range of human hearing (in young females) is 20kHz, so technically, 44.1kHz is more than enough to capture and reproduce every sound you can hear.</p> <p dir="ltr">However, there are additional considerations (all of which are technical) that may or may not suggest higher sample rates capture valuable information. That’s why most audio professionals choose to work at 48kHz, 88.2kHz, 96kHz, or even 176.4 or 192kHz.</p> <p dir="ltr">In the end, it’s all relative. If you’re planning on releasing your demo on CD or posting MP3s online you’ll probably be fine working at or mixing down to 16-bit/44.1kHz. If you plan to release jazz in a high resolution format, don’t even consider working at less than 24-bit/96kHz.</p> <p dir="ltr">Higher sample rates, such as 192kHz are also extremely useful for sound design. Record a dog snarling at 192kHz, and import it into a 96kHz session (half the speed and pitch but no loss of resolution), and you instantly have the ominous guttural growl used in countless sci-fi monster movies.</p> <p dir="ltr">Just remember, higher sample rates and bit depths eat up more disc space and limit your track count, so you’ll need to work within the limits of your equipment.</p> <p dir="ltr">The most important thing to remember about sample rate and bit depth is that they are less significant than the quality of the digital converters you use. The same way that a soapbox derby car with a Ferrari engine in it may be able to go 130mph, but you wouldn’t want to be along for the ride, a low-end converter may do 24-bit/96kHz, but it’s not going to give you the professional fidelity you’re after.</p> <p dir="ltr">If you’re interested in learning more about sample rates, digital converters, and digital audio in general, check out the excellent books in our Instructional Books section.</p> <h2 dir="ltr">Additional considerations</h2> <p dir="ltr">Here are some additional things you want to keep in mind. First, although the list gets shorter every year, there are some audio interfaces that are Mac- or PC-compatible only.</p> <p dir="ltr">At Sweetwater, we try to make this as clear as possible, so be sure to read the features section at the bottom of each interface’s detail page. Of course, if you’re still not sure, please feel free to call your Sweetwater Sales Engineer.</p> <p dir="ltr">More and more interfaces include some kind of integrated software control and DSP for mixing. This feature is incredibly handy. Software mixing allows you to do everything from setting up headphone mixes, add reverb or delay to headphone mixes, and allow you talkback communication to the artists in the studio.</p> <p dir="ltr">What’s more, software control over onboard DSP does all of this without adding latency, draining CPU power, or affecting your DAW software in any way.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/راهنمای-خرید-کارت-صدا" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:1120https://mixseda.com/professional-selection-tool-in-photoshop-softwareProfessional selection tool in Photoshop software<div class="entry-content wd-entry-content woodmart-entry-content"><img src="/images/uploaded/blog02/112_1000.webp" alt="Professional selection tool in Photoshop software" width="100%" /> <h2 dir="ltr">Professional selection tool in Photoshop software</h2> <p dir="ltr">In this article, I want to explain Rajab, a professional selection tool in Photoshop software. You don't always have enough time to select the shape all around. In large shapes, selecting the shape around it also takes time for punctuation.</p> <p dir="ltr">Ultimately, your selection may not be what you want it to be. To do this, you need precise, smart and fast tools. The keyboard shortcut for these tools is "<strong>W</strong>".</p> <br /> <p><img style="display: block; margin-left: auto; margin-right: auto;" src="/images/uploaded/blog02/113.webp" alt="Professional selection tool in Photoshop software" width="285" height="101" /></p> <h3 dir="ltr">Object Selection Tool</h3> <p dir="ltr">This tool was added to the Photoshop software in the 2020 version. In fact, this tool is a combination of the two tools "<strong>Quick Selection Tool</strong>" and "<strong>Magic Wand Tool</strong>". By offering this tool, Adobe actually intends to save time.</p> <p dir="ltr">This tool intelligently detects the background of the shape and sets the red limit, which we intend to minister, in fact this tool, after recognizing the background of the shape, removes the background from the whole shape.</p> <p dir="ltr">As a result, the desired shape is selected by the Select software. To use this tool, just select the 200 of this tool and select the area where the yellow fog is visible, the area that is simply, where the spindle is, the spindle is, the spindle is, the spindle is the chuck, chuck is chuck, chuck is chuck Shake Shke Shke Shke Shke Shke Shke Shke Shke Endere</p> <p dir="ltr">Given the way this tool works, it is very obvious that this tool knows the ism in images that have a crowded background. This is because due to the large number of colors in the background, the tool cannot keep the shape of the background lesson.</p> <h4 dir="ltr">Object Selection Tool <strong>option bar</strong></h4> <p dir="ltr">Well, for this tool in the "<strong>options bar</strong>" section, there are four modes, which include the following modes:</p> <ul dir="ltr"> <li>new selection: this mode is the normal selection mode.</li> <li>add to selection: this tool adds a new area to the previous Select workbench.</li> <li>subtract from selection: this tool removes a new area from the previous Select environment.</li> <li>intersect with selection: this tool selects a new and an old selection area.</li> </ul> <p dir="ltr">Since these elements are fully explained in the previous tools, I will not explain this any more. In the "<strong>options bar</strong>" there is a section called "<strong>Mode</strong>" which determines the type of selection. In this section you can select the following two modes:</p> <p dir="ltr">Rectangle: rectangle selections<br />Lasso: manual selections</p> <p dir="ltr">The "<strong>Lasso</strong>" option is actually the same as the "<strong>Lasso Tool</strong>" where you have to go around the shape with the mouse. If you hold down the "<strong>Alt</strong>" key when selecting "<strong>Lasso</strong>", the selection is "<strong>Polygonal</strong>".</p> <p dir="ltr">This means that your choices will be dashed. In the "<strong>options bar</strong>" there is also an option called "<strong>Select object</strong>". You can make your choice with any of the Photoshop tools and then select this option.</p> <p dir="ltr">After selecting this option, this tool deletes the background area.</p> <h3 dir="ltr">Quick Selection Tool</h3> <p dir="ltr">This tool is very similar to the "<strong>Magic Wand Tool</strong>". In fact, the Quick Selection Tool is a professional version of the Magic Wand tool. In the "<strong>Magic Wand Tool</strong>" tool, you select by selecting a pixel.</p> <p dir="ltr">In the "<strong>Quick Selection Tool</strong>" you can select the font and its size to select. How to work with this tool is very simple. You can select this tool from the "<strong>Tools</strong>" menu or call it with the "<strong>W</strong>" hotkey.</p> <p dir="ltr">In the "<strong>options bar</strong>" section, you can select the size and characteristics of the desired brush (Brush). Then you can select the area you want. In large shapes with irregular edges, it may not be appropriate to use this tool.</p> <p dir="ltr">Because it takes a lot of care and time and you can't do it easily. Note that if you select a part of a color's environment using this tool, the tool itself selects the entire area.</p> <p dir="ltr">This is the use of the "<strong>Magic Wand Tool</strong>" which I will explain below. In the "<strong>Options bar</strong>" section of this tool, like other selection tools, you will encounter the following options:</p> <ul dir="ltr"> <li>new selection: this mode is the normal selection mode.</li> <li>add to selection: this tool adds a new area to the previous Select workbench.</li> <li>subtract from selection: this tool removes a new area from the previous Select environment.</li> </ul> <p dir="ltr">Since this tool is a smart selection tool, there is no "<strong>Intersect with Selection</strong>" option in the "<strong>Options Bar</strong>".</p> <h3 dir="ltr">Magic Wand Tool</h3> <p dir="ltr">This tool is one of the most used professional selection tools in Photoshop for selection. This tool finds all similar colors on your project page and selects them.</p> <p dir="ltr">This allows you to select pixels with similar colors. As I explained in previous articles, the meaning of each color to the computer is the same as a number.</p> <p dir="ltr">The only difference with a number is that in addition to the numbers 0 to 9, the letters "<strong>A</strong>" to "<strong>F</strong>" have been added. I don't want to get into the discussion of colors and pixels, I will explain colors in future articles.</p> <p dir="ltr">Just know that this tool works by reducing the number of colors to find similar colors. What makes this tool so popular is that you can tell the difference between the colors yourself.</p> <p dir="ltr">As far as I can remember, this tool is the fastest tool for same color selections. Of course, there are a few points to using this tool:</p> <ul dir="ltr"> <li>This tool is not suitable for low quality images.</li> <li>This tool does not work well in images that have a lot of colors.</li> <li>The setting of this tool is different for each shape and there is no fixed setting for it.</li> <li>Circle selections with this tool reduce the sharpness of the image</li> <li>If you want to remove a color from the image, use the "<strong>Color Gamut</strong>" tool as much as possible.</li> </ul> <h4 dir="ltr">Magic Wand Tool <strong>option bar</strong></h4> <h5 dir="ltr">selection</h5> <p dir="ltr">In the "<strong>options bar</strong>" section of this tool, like other tools, there are the following items:</p> <ul dir="ltr"> <li>new selection: select normally</li> <li>add to selection: adds a new environment to the selected environment (Select)</li> <li>subtract from selection: subtracts a new environment from the previous Select environment</li> <li>intersect with selection: select the sharing space of the two selected areas (Select)</li> </ul> <h5 dir="ltr">Sample Size</h5> <p dir="ltr">Below is a drop-down menu asking you to select the sample size. There are several options in the Sample Size drop-down menu.</p> <p dir="ltr">As I'm writing this beginner tutorial, I don't intend to explain it right now. Just know that the greater the number, the greater the sample space.</p> <p dir="ltr">This means that the accuracy of your instrument is minimal, because the greater the gap, the less accurate it is. This means that if you set the sample size to 101, your instrument will have the least accuracy.</p> <p dir="ltr">And if you put this article on "<strong>Sample Point</strong>", the accuracy of your instrument is as high as possible.</p> <h5 dir="ltr"><strong>Tolerance</strong></h5> <p dir="ltr">In the next section you will find an item called "<strong>Tolerance</strong>". In this section you will determine how different the selected area is from other areas. In other words, any area that is so different from the selected area is selected.</p> <p dir="ltr">This is the concept of color difference in Photoshop. The lower the number, the smaller the difference and the less the selected colors differ from the sample environment.</p> <p dir="ltr">And the larger this number, the greater the color difference and the greater the color difference the sample area has with the selected area. In the "<strong>options bar</strong>" section, there are three options, which include the following:</p> <ul dir="ltr"> <li>Anti-aliased: Enable this option to select circles.</li> <li>Contiguous: Selects only contiguous areas when illuminated.</li> <li>Sample All Layers: considers all layers in the selected area</li> </ul> <h5 dir="ltr">Anti-alias</h5> <p dir="ltr">If this option is deactivated, the circular selections are selected step by step. Therefore, if you want to select a circle, it is better to enable this option.</p> <p dir="ltr">In fact, enabling this option reduces some accuracy. As a result, the tool also considers the other colors next to a selected circle.</p> <h5 dir="ltr">Contiguous</h5> <p dir="ltr">If this option is active, only this tool will be applied to a part of the project. It is effectively applied to interconnected environments and the selected area can be separated by a boundary.</p> <p dir="ltr">If this option is disabled, the selected environment of this tool will be examined over the entire figure. For example, suppose you disable this option and select a red pixel.</p> <p dir="ltr">In this case, all the red pixels are selected. But if this option is enabled, only red pixels attached to the same area will be selected.</p> <h5 dir="ltr">Sample All Layers</h5> <p dir="ltr">In Photoshop, layers below and above a layer can affect the colors of a layer. If this option is enabled, the software will treat all layers as one layer.</p> <p dir="ltr">Just as you combine different levels first and then work on them. If this option is disabled, the software will only consider the selected level. And it examines and analyzes the pixels of the same layer.</p> <p dir="ltr">Well, we've come to the part where we talk about the middle ground. I hope this content was useful to you. Let us know if you have any questions or concerns about Photoshop Professional's selection tools.</p> </div> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/ابزار-انتخاب-حرفه-ای" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:1118https://mixseda.com/manual-selection-tool-in-photoshop-softwareManual selection tool in Photoshop software<div class="entry-content wd-entry-content woodmart-entry-content" dir="ltr"><img src="/images/uploaded/blog02/110_1000.webp" alt="Manual selection tool in Photoshop software" width="100%" /> <h2>Manual selection tool</h2> <p>The manual selection tools in Photoshop include the image below. These tools are used for manual selection. This means that you have to manually select the environment around you.</p> <p><img style="display: block; margin-left: auto; margin-right: auto;" src="/images/uploaded/blog02/111.webp" alt="Manual selection tool in Photoshop software" width="287" height="101" /></p> <p>Here's what I have to say to beginners:</p> <ul> <li>First, this tool is not suitable for precise selections</li> <li>Secondly, don't use this tool to select as many circles as possible.</li> <li>Third, using this tool in large, circular shapes is time-consuming.</li> <li>This set of tools is called by the letter "<strong>L</strong>".</li> </ul> <p>Each Photoshop tool has a specific application. Again, there are thousands of ways to do something, but only a few make sense. I do not mean that these tools cannot be used for circular selections.</p> <p>My point is that it doesn't make sense for you to use these Photoshop tools for circular selections. Always try to choose a tool that takes less time and does a better job.</p> <h3>Lasso tool</h3> <p>This tool is the simplest Select tool. Working with this tool is very simple and does not need to be explained. After selecting this tool, you can select any shape you want with the mouse.</p> <p>All you have to do is draw a line around it with the mouse. Note that you should not remove your hand from the mouse button while the mouse is moving in the selected area. Despite its simplicity, this Photoshop tool isn't very versatile.</p> <p>I don't remember using this tool once, except two or three times. This is due to the very low accuracy of this tool, this tool is by no means suitable for accurate selections.</p> <p>If you remember, one of the most popular photo editing tools used in the past was "<strong>Paint</strong>". Of course, few people use this software now because it is very limited software.</p> <p>However, it is still available in the Windows 10 software list. In the "<strong>Paint</strong>" software, one of the two selection tools was the "<strong>Lasso Tool</strong>". It is, of course, known as "<strong>Free Selection</strong>" in the "<strong>Traverse</strong>" software.</p> <p>If the line drawn with this tool is not closed, the server software itself connects it with a straight line. Well, for this tool in the "<strong>options bar</strong>" section, there are four modes, which include the following modes:</p> <ul> <li>new selection: this mode is the normal selection mode.</li> <li>add to selection: this tool adds a new area to the previous Select environment.</li> <li>subtract from selection: this tool removes a new area from the previous Select environment.</li> <li>intersect with selection: this tool selects a new and an old selection area.</li> </ul> <br /> <h3>Polygonal Lasso Tool</h3> <p>If you want to choose polygon shapes, I suggest you use the "<strong>Polygonal Lasso Tool</strong>". Of course, remember, as I said above, this Photoshop toolset is not suitable for circular selections.</p> <p>You can use this tool to select corner shapes or even selections that include a wide range of environments. Start by selecting this tool and clicking on a point of your choice.</p> <p>It is not necessary to be constantly on the mouse while working with this tool. After returning to the starting point, a small circle will appear next to the mouse tool, which will be selected by clicking on the environment.</p> <p>You may have a long way to go back to the first point and your selection work is done. In this case, with two clicks at the same time, the software connects the end point to the starting point.</p> <p>This tool may seem simple and trivial, but it is very useful, but not only.</p> <h3>Magnetic Laaso tool</h3> <p>The word "<strong>magnetic</strong>" in Persian means magnetic and magnetic. Well, the logic of this tool is that it uses the colors of the image to guess which environment you want to choose.</p> <p>The computer uses a number of specific parameters to recognize colors. To put it simply, each color is like a number to the computer. This tool is actually a more advanced type of "<strong>Polygonal Lasso Tool</strong>".</p> <p>The only difference with "<strong>Polygonal Lasso</strong>" is that after selecting a point, the tool guesses in which direction you will move. The tool may point to some points in the mouse path.</p> <p>Using this tool is very effective in choices where the color difference is noticeable. Of course, using this tool in an environment where most of the colors are close together can be difficult and inefficient.</p> <p>And it might even be impossible because this tool tries to choose a path dominated by multiple color differences. This tool reduces the pixel color value and gets the amount of color difference between the pixels.</p> <p>Then select the path that has the most differences. Of course, the type of mouse movement and the path of the mouse, which is related to you, are also important in the functioning of this tool.</p> <p>Well, the introduction of these tools is over. Other tools and other elements in Photoshop software may be relevant. Through this link you can view all the contents related to Photoshop training.</p> </div> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/ابزار-انتخاب-دستی" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:118https://mixseda.com/select-tools-in-photoshopSelect tools in Photoshop<p dir="ltr"><img src="/images/uploaded/blog02/108_1000.webp" alt="ابزار انتخاب (Select) اشکال هندسی" width="100%" /></p> <p dir="ltr">The tools you see in the following figure are geometry selection tools. Another of the most useful tools in Photoshop software is the Select tool. I intend to choose to make separate edits to a part of the image.</p> <p dir="ltr">These changes can include color change, transfer, restore, remove, resize, and more. The important thing here is how to select the desired area.</p> <p dir="ltr">This section of the Select tool is only a limited part of the Select tool in the software. In this section you can only have selections with geometric shapes. These tools are also known as branded tools.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img style="display: block; margin-left: auto; margin-right: auto;" src="/images/uploaded/blog02/109.webp" alt="ابزار انتخاب (Select) اشکال هندسی" width="289" height="133" /></p> <p dir="ltr">For starters, the question may be: why isn't there a triangular geometric shape in this section?</p> <p dir="ltr">The answer to this question is very simple. The purpose of working with Photoshop software is to make our graphics as quickly as possible. There is a simpler tool for selecting triangle shapes in Photoshop, which I will explore in future sections.</p> <p dir="ltr">tool for selecting a rectangular area</p> <p dir="ltr">You can use this tool to select square shapes. If you hold down the Shift key while working with this tool, your choices will be square.</p> <p dir="ltr">A very useful thing for beginners is that if you want to delete the selected environment for any reason, use the "ctrl + d" keys. If we hold down the "space" key while selecting an environment, we can move the selected environment.</p> <p dir="ltr">Note that if you want to move "Select", you shouldn't take your hand off the mouse. Also, after selecting a section, you can move it with the arrow keys.</p> <p dir="ltr">Well, for this tool, there are four modes in the "options bar" section, which include the following modes:</p> <p dir="ltr">new selection: this is the normal selection mode.<br />add to selection: this tool adds a new area to the previous Select environment.<br />subtract from selection: this tool removes a new area from the previous Select environment.<br />intersect with selection: this tool selects a new and an old selection area.</p> <p dir="ltr">Well, usually very few professionals use these options above. This is because when you do a "Select", you can do all of these things using the combination keys.</p> <p dir="ltr">In "Select", you can add a new area to the previous environment by pressing the "Shift" key. If you notice, when you hold down Shift, a "+" sign appears next to the mouse indicating "add to selection".</p> <p dir="ltr">If you hold down the "Alt" key, the selected environment will be removed from the previous environment. This is actually the "subtract from selection" option. If you are careful, holding down the "Alt" key will display a "-" sign next to the mouse.</p> <p dir="ltr">Finally, if you hold down the key combination "Alt + Shift", your shared area will be selected. In effect, this is the "intersect with selection" option.</p> <p dir="ltr">Elliptical Marquee Tool</p> <p dir="ltr">This tool is similar to the Rectangular Marquee tool, except for circular selections. Everything I said above for the Rectangular Marquee tool applies to this tool as well.</p> <p dir="ltr">By holding down the "Shift" button, all selected shapes are circular. That is, the length and width of the selections are the same. Well, in the "options bar" you have a variable called "Feather".</p> <p dir="ltr">Well, as the name suggests, the task is to try. People who do lengthy and editing jobs are familiar with the concept. When making circular selections, try setting this variable to a number other than zero.</p> <p dir="ltr">Set this number to zero pixels if you want to make square or angled selections. In fact, any number you choose equals the amount of pixels at a time. Indeed, the application of this section is experimental.</p> <p dir="ltr">In the "options bar" there is a "Style" section where you can set the ratio between the length and the width of the options. The "Elliptical Marquee" and "Rectangular Marquee" tools can be called "M".</p> <p dir="ltr">This means that instead of activating them from the tools menu on the right, you can activate them by typing the letter "M" on your keyboard.</p> <p dir="ltr">Single row selection tool</p> <p dir="ltr">The Single Row Marquee Tool is actually the Rectangular Marquee Tool. The only difference is that the width of the selected rectangle is 1 pixel. Indeed, this tool selects for you a one-pixel line along the horizon.</p> <p dir="ltr">Single column selection tool</p> <p dir="ltr">This tool helps you to select a vertical line. As I explained above, you can use the arrow keys to move your selection.</p> <p dir="ltr">Keep in mind that wherever you use the arrow keys to move, there are two things to keep in mind:</p> <p dir="ltr">First, each time you press a navigation key, only one pixel of the navigation operation is performed.<br />If you hold down "Shift" while moving, you will move 10 pixels each time you press the arrow keys.</p> <p dir="ltr">Well, the "Single Column Selection Tool" was the last tool for selecting geometric shapes. The tools that I will present to you from now on are not geometric.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/ابزار-انتخاب-اشکال-هندسی" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:116https://mixseda.com/transfer-tool-in-photoshopTransfer tool in Photoshop<div class="entry-content wd-entry-content woodmart-entry-content"> <div class="entry-content wd-entry-content woodmart-entry-content"> <div class="entry-content wd-entry-content woodmart-entry-content" dir="ltr"><img src="/images/uploaded/blog01/086_1000.webp" alt="Transfer tool in Photoshop" width="100%" /> <p>Move tool</p> <p>The most important transfer tool in Photoshop is the "Move Tool". As the name suggests, this tool is used to move around. The keyboard shortcut for this tool is the letter "V".</p> <p>With this tool you can move an image layer. Or move part of a layer using the Select tool. By holding down the "Alt" key and moving a selected layer or environment with the "Move" tool, you can get a copy of your selection.</p> <p>If you hold down the "Shift" key while moving with the "Move" tool, the image will move horizontally and vertically. If you want to activate this (Move) tool when working with other tools, simply press the "Ctrl" key.</p> <p>After selecting an image layer with the "Move" tool, you can move it with the arrow keys. Note that a 1-pixel image is transmitted each time the arrow keys are pressed.</p> <p>If the working space is large or the image transfer distance is large, the transfer may take a long time. If you hold down the "Shift" key while moving with the arrow keys, you will move the image 10 pixels each time.</p> <p>In Photoshop, whichever tool you choose, this tool has a number of settings. Most of these settings appear in the "options bar" (at the top of the worksheet).</p> <p>Auto selection</p> <p>Well, in the "options bar" section, when you select the "Move Tool", the first option is "Auto Select". If this option is enabled, you can select it by clicking on a layer. If this option is not enabled, you can only select via "Levels" in the "Panels" section.</p> <p>The "Levels" section is located in the lower left corner of the software and its task is to manage the levels. Using this section it is possible to view all the levels of a project and copy them and….</p> <p>Of course, don't forget that the position of the tool in Photoshop can be changed and this section may be different for you. There is a drop-down menu in front of the "Auto Select" option in the "Options Bar".</p> <p>This drop-down menu includes two options "Level" and "Group". This refers to the concept that the "Move Tool" makes automatic choices based on level or group.</p> <p>Suppose multiple photos are in the same group. If you select the "Layer" option and select one of the photos, only the same photo will be selected. But if you select the "Group" option, selecting one of the photos, they will all be selected.</p> <p>shows the transformation control</p> <p>The next option in the "options bar" is the "show transform control" option. If you enable this option, a box will be drawn around each selected layer.</p> <p>The good thing about this tool is that you can easily change the length and width of the layers. Or you can easily rotate a layer. Another advantage of this option is that you can see the environment of your level.</p> <p>Where the start and finish of each level are in big projects can help you a lot.</p> <p>Alignment and distribution of the layers</p> <p>The most important use of the "Move Tool" is the alignment and distribution of layers. Alignment means leveling and distribution means adjusting the distance between the layers. If you look closely at the "options bar" section, you will see that the software itself has separated the alignment and distribution tools.</p> <p>There are three points in the "options bar" that if you click on it, you will see the alignment and distribution tools.</p> <p>Align</p> <p>Well, in our alignment software, we have six modes.</p> <p><img src="/images/uploaded/blog01/087.webp" alt="Align - Transfer tool in Photoshop" width="183" height="304" /></p> <p>&nbsp;</p> </div> <div class="entry-content wd-entry-content woodmart-entry-content" dir="ltr"> <p>Defining these 6 modes is very simple:</p> <p>Align the layers from the right<br />Align the layers from the left<br />Line up the layers from the top<br />Line up the layers from below<br />Align the layers vertically from the center<br />Align the layers from the center horizontally</p> <p>Well, in Photoshop, you need to have at least 3 layers to line up different layers.</p> <p>To do this, select three layers in the "Layer" section (simply hold down the "Ctrl" button and select).</p> <p>After selecting the layers, the "Align and Distribute Layers" tool is activated in the "Options Bar" section.</p> <br /> <table style="border-collapse: collapse; width: 99.825%;" border="1"> <tbody> <tr> <td style="width: 32.0947%;"><img style="display: block; margin-left: auto; margin-right: auto;" src="/images/uploaded/blog01/088.webp" alt="" width="100%" /></td> <td style="width: 32.0947%;"><img style="display: block; margin-left: auto; margin-right: auto;" src="/images/uploaded/blog01/089.webp" alt="" width="100%" /></td> <td style="width: 32.0947%;"><img style="display: block; margin-left: auto; margin-right: auto;" src="/images/uploaded/blog01/090.webp" alt="" width="100%" /></td> </tr> <tr> <td style="width: 32.0947%;"><img style="display: block; margin-left: auto; margin-right: auto;" src="/images/uploaded/blog01/091.webp" alt="" width="100%" /></td> <td style="width: 32.0947%;"><img style="display: block; margin-left: auto; margin-right: auto;" src="/images/uploaded/blog01/093.webp" alt="" width="100%" /></td> <td style="width: 32.0947%;"><img style="display: block; margin-left: auto; margin-right: auto;" src="/images/uploaded/blog01/092.webp" alt="" width="100%" /></td> </tr> </tbody> </table> </div> <div class="entry-content wd-entry-content woodmart-entry-content" dir="ltr"> <figure class="wp-block-gallery columns-3 is-cropped"> <figcaption class="blocks-gallery-caption">Align - The red line is just a hypothetical line and does not normally exist.</figcaption> </figure> <p>To distribute</p> <p>In Photoshop, like align, you have six distribution modes.</p> <p>In this section, you must have at least three modules to use the Deploy tool.</p> <br /> <p><img src="/images/uploaded/blog01/094.webp" alt="Distribute" width="183" height="267" /></p> <p>Distribute is divided into the following six modes:</p> <p>distribute the upper edges<br />distribute the vertical centers<br />distribute the lower edges<br />distribute the left edges<br />distribute the horizontal centers<br />distribute the straight edges</p> <p>As I explained above, to select multiple layers at once, select Multiple Layers in the "Layer" section.</p> <p>All you have to do is hold down the "Ctrl" key and select the desired layers.</p> <p>Once you have selected at least three image layers, the distribution options are activated.</p> <br /> <div class="entry-content wd-entry-content woodmart-entry-content"> <p>.</p> <table style="border-collapse: collapse; width: 99.825%;" border="1"> <tbody> <tr> <td style="width: 32.0947%;"><img style="display: block; margin-left: auto; margin-right: auto;" src="/images/uploaded/blog01/095_1000.webp" alt="" width="100%" /></td> <td style="width: 32.0947%;"><img style="display: block; margin-left: auto; margin-right: auto;" src="/images/uploaded/blog01/096.webp" alt="" width="100%" /></td> <td style="width: 32.0947%;"><img style="display: block; margin-left: auto; margin-right: auto;" src="/images/uploaded/blog01/097.webp" alt="" width="100%" /></td> </tr> <tr> <td style="width: 32.0947%;"><img style="display: block; margin-left: auto; margin-right: auto;" src="/images/uploaded/blog01/098.webp" alt="" width="100%" /></td> <td style="width: 32.0947%;"><img style="display: block; margin-left: auto; margin-right: auto;" src="/images/uploaded/blog01/099.webp" alt="" width="100%" /></td> <td style="width: 32.0947%;"><img style="display: block; margin-left: auto; margin-right: auto;" src="/images/uploaded/blog01/100.webp" alt="" width="100%" /></td> </tr> </tbody> </table> </div> <figure class="wp-block-gallery columns-3 is-cropped"> <figcaption class="blocks-gallery-caption">Distribute - The red line is just a hypothetical line and does not normally exist.</figcaption> </figure> <p>3D mode</p> <p>In the continuation of the transfer tool in Photoshop, in the "options bar" section, there is also a block called "3D mode".</p> <p>Using this section requires a basic understanding of the entire Photoshop environment.</p> <p>So I'm not going to get into this part of the software right now.</p> <p>If you have any questions about this article (transfer tool in Photoshop), ask via the comment section.</p> </div> <p>&nbsp;</p> </div> </div> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/ابزار-انتقال-در-فتوشاپ" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:114https://mixseda.com/get-started-with-photoshopGet started with Photoshop<div class="entry-content wd-entry-content woodmart-entry-content"> <p dir="ltr"><img src="/images/uploaded/blog02/101_1000.webp" alt="Get started with Photoshop" width="100%" /></p> <h2 dir="ltr">Start with Photoshop software</h2> <p dir="ltr">To get started with Photoshop, you first need to familiarize yourself with the Photoshop environment.</p> <h3 dir="ltr">introduction</h3> <p dir="ltr">Photoshop is a graphics processor developed by Adobe. The main task of this software is photo editing and editing, which can be used to make many and varied changes with the features available in the photos.</p> <p dir="ltr">In Photoshop, you have a variety of ways to do a task. It is up to you which method to use to achieve your goal in less time and with better quality.</p> <p dir="ltr">The latest official stable version of the software is the 21st version, released in April 2020, known as Adobe Photoshop "CC 2020". Of course, the 2021 version of Adobe software has just been released now.</p> <p dir="ltr">You need to know that this version has already been released on a trial basis. This release does not cover all Adobe software and is currently limited to a limited number of software.</p> <p dir="ltr">Do not assume that you will lose or lag behind if you install the 2020 version. In every update from Adobe companies; Users experience very small changes. So that some users don't notice these changes at first glance.</p> <p dir="ltr">I assure you that users who have worked with older versions of Adobe can easily work with newer versions. Finally, in some updates, one or two tools have been added to the software, which are very easy to work with.</p> <p dir="ltr">I assure you that if you fully learn these tutorials, you can easily connect with the newest versions. In order to work with Photoshop software, you must first be familiar with the working environment of this software.</p> <h3 dir="ltr">Working with Photoshop</h3> <p dir="ltr">The first thing you need to know when learning software is the work environment. Almost all Adobe software is designed to be very sophisticated and incomprehensible.</p> <p dir="ltr">The Photoshop workspace includes menus, toolbars, and panels that allow quick access to a variety of tools and options for editing and adding elements to an image.</p> <p dir="ltr">Create a new project</p> <p dir="ltr">Well, let's go step by step. After opening Adobe Photoshop software, you may encounter two modes. In new versions of this program, after opening the software, you will encounter the New Document creation page.</p> <p dir="ltr">In some versions you will see a dark page which you can select "New" from the "File" menu. In this case, a window will open in which to enter the details of the new project.</p> <p dir="ltr">Hot key</p> <p dir="ltr">In many graphics software such as Photoshop, Premier, After Effects, AutoCAD and ... we encounter a concept called "hot key". This means that there is a key combination for almost everything we do with the mouse.</p> <p dir="ltr">During the tutorials, I will explain the key combinations for each activity as needed.</p> <p dir="ltr">You may also be wondering why we should use these hotkeys?</p> <p dir="ltr">First, using these keys will speed up your work. Secondly, when you go to work for a company, it's not very interesting to use a mouse.</p> <p dir="ltr">If I want to explain myself better, the principles of professional work are defined with the keyboard and not with the mouse. If you want to show your work, working with a keyboard is definitely more powerful than a mouse.</p> <p dir="ltr">Thirdly, I myself prefer to work with the mouse rather than the keyboard, so work as you feel comfortable. Well, back to our main topic, which was "creating a new project".</p> <p dir="ltr">You can use the key combination "Ctrl + N" to open the "New Document" page. After opening this page, you will see the following image.</p> <p dir="ltr">&nbsp;</p> <figure class="wp-block-image size-large" dir="ltr"><img class="wp-image-5532" src="https://mixseda.com/wp-content/uploads/2020/10/002-1024x526.jpg" sizes="(max-width: 1024px) 100vw, 1024px" srcset="https://mixseda.com/wp-content/uploads/2020/10/002-1024x526.jpg 1024w, https://mixseda.com/wp-content/uploads/2020/10/002-scaled-150x77.jpg 150w, https://mixseda.com/wp-content/uploads/2020/10/002-scaled-600x308.jpg 600w, https://mixseda.com/wp-content/uploads/2020/10/002-300x154.jpg 300w, https://mixseda.com/wp-content/uploads/2020/10/002-768x394.jpg 768w, https://mixseda.com/wp-content/uploads/2020/10/002-1536x788.jpg 1536w, https://mixseda.com/wp-content/uploads/2020/10/002-2048x1051.jpg 2048w" alt="ایجاد پروژه جدید - شروع کار با فتوشاپ" width="1024" height="526" loading="lazy" /></figure> <p dir="ltr">&nbsp;</p> <p dir="ltr">You will need several things to create a new document, each of which I will describe below.</p> <p dir="ltr">Width: length of the page<br />Height: width of the page<br />Orientation: The page is vertical or horizontal<br />Artboards - I'll explain this option in the future<br />Resolution: pixel density, or in a simpler sense, quality<br />Color Mode: The color structure of the document<br />Background Contents: Default background color<br />Length</p> <p dir="ltr">Determine the length of the page you want to work on. Next to this option there is a drop down menu where you can select your drive.</p> <p dir="ltr">For example, you can choose pixel length units, centimeters, inches and ... It is important to note that everything you select for the longitudinal unit is also selected for the transverse unit.</p> <p dir="ltr">Height</p> <p dir="ltr">Specify the width of the page you want to work on.</p> <p dir="ltr">Orientation</p> <p dir="ltr">All you need to do is set the screen vertically or horizontally. As a beginner, you might type the latitude and longitude numbers incorrectly, in which case you can rotate the page with one click.</p> <p dir="ltr">Sometimes professionals need to work on a project vertically and horizontally.</p> <p dir="ltr">Resolution</p> <p dir="ltr">This article is one of the most important elements of quality work. In general, the quality of digital products is measured by a unit called resolution. If you've just bought a new TV, monitor, or phone, you must have heard the word resolution.</p> <p dir="ltr">Resolution actually determines the pixel density of your work. That is, you determine; Each square unit of your page should contain a few pixels. To be more specific, you specify how many color codes each square inch or square centimeter contains.</p> <p dir="ltr">This number varies depending on the object you are creating a project for. So, if you are offered a project, ask the employer or a consultant for the final resolution of the job. One thing that many people, myself included, do is choose a high resolution of the job,</p> <p dir="ltr">Finally, I adjust the output to a lower quality. In newer versions of Photoshop, you don't need to learn these numbers a lot. Photoshop itself saves a series of numbers and resolutions by default.</p> <p dir="ltr">For example, if you want to create a web graphic design, select the "Web" option at the top of the "New Document" window. Then, based on the size of the object, select an option from the bottom and then click "Create".</p> <p dir="ltr">In the table below, I have written some resolutions for graphic works for you:</p> <table class="tablemix"> <thead> <tr> <th class="has-text-align-center" data-align="center">ردیف</th> <th class="has-text-align-center" data-align="center">نوع پروژه و کار گزافیکی</th> <th class="has-text-align-center" data-align="center">Resolution</th> </tr> </thead> <tbody> <tr> <td class="has-text-align-center" data-align="center">1</td> <td class="has-text-align-center" data-align="center"><strong>&nbsp;طراحي هاي چاپ افست</strong></td> <td class="has-text-align-center" data-align="center">300DPI</td> </tr> <tr> <td class="has-text-align-center" data-align="center">2</td> <td class="has-text-align-center" data-align="center"><strong>طراحي براي چاپ بنر و پلات</strong></td> <td class="has-text-align-center" data-align="center">100-170DPI</td> </tr> <tr> <td class="has-text-align-center" data-align="center">3</td> <td class="has-text-align-center" data-align="center"><strong>طراحي براي سايت و اينترنت</strong></td> <td class="has-text-align-center" data-align="center">72DPI</td> </tr> </tbody> </table> <p dir="ltr">Since there is a lot of discussion about this, I will address this in a separate article.</p> <p dir="ltr">Color mode</p> <p dir="ltr">Well, this article is a world of debate. What Rajab needs to know now is that each color we see has a specific structure. LED TVs, for example, are made up of a series of tiny LED bulbs.</p> <p dir="ltr">Each of these lamps acts like a pixel. In these lamps, all colors consist of three colors: red (red), green (green), blue (blue). If we put the first letters of these three colors next to each other, we will get the word "RGB".</p> <p dir="ltr">This means that in the "RGB" color spectrum, all screen colors are made up of a combination of the three colors above. We have different color spectra, each with different uses.</p> <p dir="ltr">For example, the "CMYK" color spectrum is used for some prints. I will try to explain the meaning and concept of color spectra in future articles. In the work you will be able to convert your project to another color spectrum and thus output.</p> <p dir="ltr">In front of the color spectrum, there is a drop-down menu through which you can change the bit rate of the color spectrum. This means that if you increase this number, you will have more colors.</p> <p dir="ltr">As the bit rate of each color code increases, more color codes are formed. (The computer recognizes each color with a code.) Newer versions also have a section called "Advanced Options".</p> <p dir="ltr">I suggest you do not touch the defaults of this section if you are a beginner. Clicking "Create" will open the desktop in Photoshop.</p> <p dir="ltr">Photoshop environment</p> <p dir="ltr">The Photoshop workspace consists of seven main sections:</p> <p dir="ltr">Menu bar<br />Options bar<br />Instrument panel<br />Work spaces menu<br />Panels</p> <p dir="ltr">Well, here are some tips.</p> <p dir="ltr">First, these divisions were done by me and you may find tutorials discussing the Photoshop environment in more detail. Second, some of your tools may not be available in Photoshop.</p> <p dir="ltr">For example, when I installed the 2020 version on my computer, there was no "Timeline" option. While in previous updates, next to the "Mini Bridge Card" option, there was a "Timeline" option.</p> <p dir="ltr">Well, you don't need a "Timeline" to get started with Photoshop.</p> <p dir="ltr">Menu bar</p> <p dir="ltr">In almost all graphics software there is a bar at the top of the software. This bar, located at the top of the software, is called the "Menu Bar". As far as I can remember, "Menu Bar" is a drop-down menu in all applications.</p> <p dir="ltr">The "menu bar" also has a number of items and subcategories. I will briefly explain each of them.</p> <br /> <p dir="ltr">&nbsp;</p> <figure class="wp-block-image size-large" dir="ltr"><img class="wp-image-5533" src="https://mixseda.com/wp-content/uploads/2020/10/003-1024x526.jpg" sizes="(max-width: 1024px) 100vw, 1024px" srcset="https://mixseda.com/wp-content/uploads/2020/10/003-1024x526.jpg 1024w, https://mixseda.com/wp-content/uploads/2020/10/003-scaled-150x77.jpg 150w, https://mixseda.com/wp-content/uploads/2020/10/003-scaled-600x308.jpg 600w, https://mixseda.com/wp-content/uploads/2020/10/003-300x154.jpg 300w, https://mixseda.com/wp-content/uploads/2020/10/003-768x394.jpg 768w, https://mixseda.com/wp-content/uploads/2020/10/003-1536x788.jpg 1536w, https://mixseda.com/wp-content/uploads/2020/10/003-2048x1051.jpg 2048w" alt="Menu bar - شروع کار با فتوشاپ" width="1024" height="526" loading="lazy" /></figure> <p dir="ltr">File</p> <p dir="ltr">This menu is available on most software.</p> <p dir="ltr">In Photoshop, you can do the following via this menu:</p> <p dir="ltr">Open a new project<br />Create a new project<br />Get the project output in different formats<br />Sharing the project<br />Close the project<br />Print the project<br />Add a description of the Rajab project<br />AND…<br />Change</p> <p dir="ltr">The applications of this section are very numerous. Some of these activities include the following.</p> <p dir="ltr">Back to work done (Undo and Redo)<br />Copy and paste<br />Color settings<br />Access the "Preferences" section.<br />Research<br />clean<br />AND…</p> <p dir="ltr">The uses of the "Preferences" section are so wide that I'll have to explain it separately in another article.</p> <p dir="ltr">Image</p> <p dir="ltr">Through this section, you will be able to change the color spectrum of the image and the amount of bits of the image color code. Other features of this section are project resizing and image resolution.</p> <p dir="ltr">This section has other features that you will be familiar with in the future.</p> <p dir="ltr">Layer</p> <p dir="ltr">Photoshop is one of the software that allows you to create your project from different layers. In this section you can use and manage the features and tools related to image layers.</p> <p dir="ltr">For example, you can create a new layer, group layers, copy layers and ...</p> <p dir="ltr">Guy</p> <p dir="ltr">This menu is for text settings and functions.</p> <p dir="ltr">To select</p> <p dir="ltr">In Photoshop you can select part of the frame and image. Various tools are available in this menu to select the desired section. For example, you can use this section to select what you haven't selected in the image.</p> <p dir="ltr">Select a specific color code or night colors.</p> <p dir="ltr">Filter</p> <p dir="ltr">In Photoshop, you can apply a variety of filters to each layer or image. One of the uses of this menu is to apply filters to image layers.</p> <p dir="ltr">3D</p> <p dir="ltr">As the name suggests, this section is used for 3D creation tools.</p> <p dir="ltr">Some of the features in this section include the following.</p> <p dir="ltr">Create a three-dimensional layer<br />Panoramic settings<br />Combine two 3D layers with each other<br />Output from a 3D (3D) layer.<br />3D grouping<br />3D editing<br />3D printing (on 3D printers)<br />AND…</p> <p dir="ltr">Visualization</p> <p dir="ltr">As the name suggests, this section is related to the show. The most useful feature of this section is the zoom on the image.</p> <p dir="ltr">Window</p> <p dir="ltr">All Photoshop tools can be managed through this section. The arrangement of tools and projects that you have open at the same time in Photoshop can also be managed through this menu.</p> <p dir="ltr">You can create a layout for yourself, selecting this layout will show only the tools you have selected. To select the desired layout, you can access the "Workspace" section via this menu.</p> <p dir="ltr">Photoshop itself has a number of predefined layouts named after your activities. For example, for photography, you are provided with a layout with special tools.</p> <p dir="ltr">You don't need a "Timeline" in your photo, so Photoshop doesn't enable it, and if it's enabled, it will disable it. I suggest activating only the tools you need.</p> <p dir="ltr">Enabling all tools only clutters the desktop and can slow down the software on some computers.</p> <p dir="ltr">Help</p> <p dir="ltr">The "Help" section is used in most software to get help and manage the software version. In Photoshop software, in this section, you can manage your account or update your software version.</p> <p dir="ltr">In this section, there is a description of the Rajab plugins and the software itself. Of course, we Iranians cannot use many of these capabilities because Iran is one of the software sanctions.</p> <p dir="ltr">We Iranians (but not all Iranians) use more cracked and modified versions of the software. Attempting to link the software to an Adobe account or software update can disable the crack.</p> <p dir="ltr">As a result, it can cause loss of software functionality.</p> <p dir="ltr">Options bar</p> <br /> <figure class="wp-block-image size-large" dir="ltr"><img class="wp-image-5535" src="https://mixseda.com/wp-content/uploads/2020/10/005-1024x526.jpg" sizes="(max-width: 1024px) 100vw, 1024px" srcset="https://mixseda.com/wp-content/uploads/2020/10/005-1024x526.jpg 1024w, https://mixseda.com/wp-content/uploads/2020/10/005-scaled-150x77.jpg 150w, https://mixseda.com/wp-content/uploads/2020/10/005-scaled-600x308.jpg 600w, https://mixseda.com/wp-content/uploads/2020/10/005-300x154.jpg 300w, https://mixseda.com/wp-content/uploads/2020/10/005-768x394.jpg 768w, https://mixseda.com/wp-content/uploads/2020/10/005-1536x788.jpg 1536w, https://mixseda.com/wp-content/uploads/2020/10/005-2048x1051.jpg 2048w" alt="Options bar - شروع کار با فتوشاپ" width="1024" height="526" loading="lazy" /></figure> <p dir="ltr">&nbsp;</p> <p dir="ltr">In Photoshop, each tool has a number of functions and settings. In fact, the "options bar" is the easiest way to access any of these tools. When you start working with Photoshop, many elements may be incomprehensible to you.</p> <p dir="ltr">Don't worry, learning Photoshop is a lot easier than you think. Most of the tools have limited settings which are displayed in the "options bar".</p> <p dir="ltr">But some tools also have more professional settings. Usually for these tools, the "Options Bar" contains only part of the functionality. And the full functionality can be changed in a new tap or in another panel.</p> <p dir="ltr">Instrument panel</p> <br /> <p dir="ltr">&nbsp;</p> <div class="wp-block-image" dir="ltr"> <figure class="aligncenter size-large"><img class="wp-image-5536" src="https://mixseda.com/wp-content/uploads/2020/10/006-1024x526.jpg" sizes="(max-width: 1024px) 100vw, 1024px" srcset="https://mixseda.com/wp-content/uploads/2020/10/006-1024x526.jpg 1024w, https://mixseda.com/wp-content/uploads/2020/10/006-scaled-150x77.jpg 150w, https://mixseda.com/wp-content/uploads/2020/10/006-scaled-600x308.jpg 600w, https://mixseda.com/wp-content/uploads/2020/10/006-300x154.jpg 300w, https://mixseda.com/wp-content/uploads/2020/10/006-768x394.jpg 768w, https://mixseda.com/wp-content/uploads/2020/10/006-1536x788.jpg 1536w, https://mixseda.com/wp-content/uploads/2020/10/006-2048x1051.jpg 2048w" alt="Tools panel - شروع کار با فتوشاپ" width="1024" height="526" loading="lazy" /></figure> </div> <p dir="ltr">&nbsp;</p> <p dir="ltr">Getting started with Photoshop If you can't work with tools, it's like you don't know anything. Since in this article I just want to introduce Photoshop software, so I won't go into the tools for now.</p> <p dir="ltr">In the next few articles I will fully explain the Photoshop tools. I would like to remind you of one thing. Photoshop isn't just single function software. Photoshop is a world, what I'm teaching you is how to work with it.</p> <p dir="ltr">Photoshop is like a strategy game that, no matter how good you are, still has room to learn. To get started with Photoshop, you need to know that a graphic designer must be creative before they want to learn anything.</p> <p dir="ltr">Basically, getting started with Photoshop takes creativity. In Photoshop, you can perform a single task in several ways. It's your creativity to choose how to get the job done in less time and with better quality.</p> <p dir="ltr">Work spaces menu</p> <br /> <div class="wp-block-image" dir="ltr"> <figure class="aligncenter size-large"><img class="wp-image-5537" src="https://mixseda.com/wp-content/uploads/2020/10/004-1024x526.jpg" sizes="(max-width: 1024px) 100vw, 1024px" srcset="https://mixseda.com/wp-content/uploads/2020/10/004-1024x526.jpg 1024w, https://mixseda.com/wp-content/uploads/2020/10/004-scaled-150x77.jpg 150w, https://mixseda.com/wp-content/uploads/2020/10/004-scaled-600x308.jpg 600w, https://mixseda.com/wp-content/uploads/2020/10/004-300x154.jpg 300w, https://mixseda.com/wp-content/uploads/2020/10/004-768x394.jpg 768w, https://mixseda.com/wp-content/uploads/2020/10/004-1536x788.jpg 1536w, https://mixseda.com/wp-content/uploads/2020/10/004-2048x1051.jpg 2048w" alt="Workspaces menu - شروع کار با فتوشاپ" width="1024" height="526" loading="lazy" /></figure> </div> <p dir="ltr">&nbsp;</p> <p dir="ltr">As explained above, the "Workspaces menu" determines the arrangement of tools in the workplace. The icon for this section is located at the top right of the software and you can use it to set up the software for your user.</p> <p dir="ltr">You can also access this section through the "Window" section of the "Menu Bar".</p> <p dir="ltr">Panels</p> <br /> <figure class="wp-block-image size-large" dir="ltr"><img class="wp-image-5538" src="https://mixseda.com/wp-content/uploads/2020/10/008-1024x526.jpg" sizes="(max-width: 1024px) 100vw, 1024px" srcset="https://mixseda.com/wp-content/uploads/2020/10/008-1024x526.jpg 1024w, https://mixseda.com/wp-content/uploads/2020/10/008-scaled-150x77.jpg 150w, https://mixseda.com/wp-content/uploads/2020/10/008-scaled-600x308.jpg 600w, https://mixseda.com/wp-content/uploads/2020/10/008-300x154.jpg 300w, https://mixseda.com/wp-content/uploads/2020/10/008-768x394.jpg 768w, https://mixseda.com/wp-content/uploads/2020/10/008-1536x788.jpg 1536w, https://mixseda.com/wp-content/uploads/2020/10/008-2048x1051.jpg 2048w" alt="Panels - شروع کار با فتوشاپ" width="1024" height="526" loading="lazy" /></figure> <p dir="ltr">&nbsp;</p> <p dir="ltr">The applications in this section are very, very, very broad. So that at least I can't list specific and limited applications for it. The applications in the "Panels" section are not fixed and, by changing the "Working Spaces" space, some of their tools may change.</p> <p dir="ltr">In my opinion, the most important parts of "Panels" include the following.</p> <p dir="ltr">Histogram<br />Navigator<br />Libraries<br />Adjustments<br />Layers<br />Channels<br />Histogram</p> <p dir="ltr">A "histogram" is a diagram that shows the relationship of colors in an image. If you select a part of the image using the selection tool,</p> <p dir="ltr">The "histogram" shows a diagram of the same part of your project. If I want to explain more specifically, the histogram shows how much shadow, midtones and highlights are in the image.</p> <p dir="ltr">Navigator</p> <p dir="ltr">"Navigator" offers an overview of the project. It also indicates where you are currently swimming. If you don't see full screen, a red box will appear on the "Navigator" image.</p> <p dir="ltr">This box indicates where you are editing. This feature may not be very interesting, but it is very useful for large and heavy projects.</p> <p dir="ltr">Libraries</p> <p dir="ltr">This section is one of the most interesting sections of the Adobe series in the new releases. Unfortunately, we are unable to access this section because we are using cracked versions.</p> <p dir="ltr">If you are not using the cracked version, log into your Adobe account to enable this feature.</p> <p dir="ltr">Adjustments</p> <p dir="ltr">The whole section includes filters that you can apply to image layers.</p> <p dir="ltr">Layers</p> <p dir="ltr">It is one of the most important parts of the "Panels". In this section you can manage the levels that make up your project.</p> <p dir="ltr">Channels</p> <p dir="ltr">This section is for managing the color spectrum of your image creator. Depending on the color spectrum your project is made up of, you may be different in this area. You don't need to learn everything to get started with Photoshop.</p> <p dir="ltr">My purpose in this article was simply to introduce the Photoshop workspace. In future tutorials on the MixSound site, I intend to fully explain the Photoshop software tutorial.</p> <p dir="ltr">If you have any questions or issues with the content, please let us know in the comments. Click here to see more about Photoshop tutorials.</p> </div> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/شروع-کار-با-فتوشاپ" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:112https://mixseda.com/introducing-adobe-audition-softwareIntroducing Adobe Audition software<p><img src="/images/uploaded/blog02/148_1000.webp" alt="Introducing Adobe Audition software" width="100%" /></p> <p>&nbsp;</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/معرفی-نرم-افزار-ادوب-ادیشن" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:110https://mixseda.com/echochang-sound-mixerechochang sound mixer<p><img src="/images/uploaded/blog02/150_1000.webp" alt="echochang sound mixer" width="100%" /></p> <p>&nbsp;</p> <p>&nbsp;</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/میکسر-اکوچنگ" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:108https://mixseda.com/types-of-microphonesTypes of microphones<p><img src="/images/uploaded/blog01/084_1000.webp" alt="Types of microphones" width="100%" /></p> <h2>انواع میکروفن‌ها</h2> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/انواع-میکروفن" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:106https://mixseda.com/should-i-record-at-the-high-sample-ratesShould I Record at the High Sample Rates ?<p dir="ltr"><img src="/images/uploaded/blog02/153_1000.webp" alt="Should I Record at the High Sample Rates ?" width="100%" /></p> <p dir="ltr">This is one of those “it depends” and “let your ears decide” questions/answers. Almost every interface these days can record up to at least a 96kHz sample rate; some go to 192kHz or in a few cases, even higher. But the question is, will you hear a sonic benefit from that high of a sample rate?</p> <p dir="ltr">Some older interfaces sounded better at higher sample rates due to their internal sampling filters. With newer interfaces, the converter quality is greatly improved, and the sonic impact of the filters is less of an issue. Another area where higher sample rates are said to provide benefit is with plug-ins. Certain plug-ins perform better sonically when operating at higher rates than at standard rates.</p> <h2 dir="ltr">But there are other things to keep in mind:</h2> <p dir="ltr">But there are other things to consider: high sample rate audio takes up more hard drive space, more <a href="https://en.wikipedia.org/wiki/Central_processing_unit">CPU</a> power to process, streaming high sample rate tracks is more taxing on hard drives, and so on. So there are trade offs. However, as technology improves — faster hard drives, faster computers, more RAM, and so on, these trade offs have diminished in impact substantially. With a current computer and solid-state drives or fast disk-based hard drives, higher sample rates are no problem.</p> <p dir="ltr">In some cases, such as audio-for-video work, you’ll generally want to stick to 48kHz or 96kHz for best compatibility with video requirements. For CD release, 44.1kHz is still the standard, though working at higher rates and sample rate converting the audio down to 44.1k is always an option.</p> <h2 dir="ltr">We suggest you test it yourself</h2> <p dir="ltr">Our first recommendation is to do some testing. Record tracks at standard (44.1 or 48kHz) and at higher rates (88.2, 96kHz, 176.4, or 192kHz). Try to cover a few different scenarios; loud rock, delicate acoustic, and so on. Now put your ears to work comparing — preferably in a “blind” listening situation where you don’t know what sample rate you’re hearing. Can you hear a difference? If you can, then it’s worth using the higher rate. If not, then maybe a standard sample rate will do the job.</p> <p dir="ltr">Our preference these days is to track and mix at 96kHz. We’re confident of the sound quality, and we feel that files at higher rates are better for archival. For mastering, 96kHz or even archival mastering at 192kHz is usually a good idea.</p> <p dir="ltr">Regardless, recording at 44.1 or 48kHz through a high-quality modern audio interface will give you excellent results, depending on the situation, very similar to what you’d get at higher rates. But if you want that little bit of extra confidence, higher rates provide potentially even better results. Let your ears and the final destination of your audio be your guide when making your decision.</p> <p dir="ltr">You can view this article in <a href="http://mixseda.com/%d8%a7%d8%b3%d8%aa%d9%81%d8%a7%d8%af%d9%87-%d8%a7%d8%b2-%d9%86%d8%b1%d8%ae-%d9%86%d9%85%d9%88%d9%86%d9%87-%d8%a8%d8%b1%d8%af%d8%a7%d8%b1%db%8c-%d8%a8%d8%a7%d9%84%d8%a7/">Persian</a> (High Sample Rates).</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/استفاده-از-نرخ-نمونه-برداری-بالا" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:104https://mixseda.com/the-difference-between-component-and-coaxialThe difference between component and coaxial<p dir="ltr"><strong><img src="/images/uploaded/blog02/151_1000.webp" alt="The difference between component and coaxial" width="100%" /></strong></p> <h2 dir="ltr">Component or coaxial? And why?</h2> <p dir="ltr">One question that came to my mind was which component or coax is better? The component is in fact the same coaxial whose components are separate.</p> <p dir="ltr">This means that in a normal and coaxial speaker, all components (tweeter, woofer) are in one set, but in the component these components are separated from each other and by a crossover (passive) a certain area of ​​activity and the frequency range is defined for them.</p> <p dir="ltr">(In fact, the component typically consists of a pair of woofers, a pair of tweeters, and a pair of crossovers.) This is how low and mid frequencies suffer for the woofer and mids for the tweeter.</p> <h3 dir="ltr">Advantages of the difference between component and coaxial</h3> <ul dir="ltr"> <li>Due to the crossover, the component has a better sound than the coaxial and the more accurate the crossover, the better the final sound.</li> <li>Component prices are also higher (typically 12db / oct for the tweeter and 6db / oct for the woofer).</li> <li>Since the crossover analyzes the sound and prepares the separate frequency for the tweeter, the woofer, so it can easily be said that due to the elimination of annoying and unnecessary frequencies, the component is also more powerful than its speaker in terms of sound power. output and can be watts. Have more power.</li> <li>Thanks to the separation of the components, you will be able to consider the best position and the best position for the tweeter and the woofer, which can be very effective in improving the final sound.</li> <li>The disassembly of the components can lead to the possibility of using a single head (aluminum mesh material for cooling) for the tweeter, allowing it to cool down faster. In components, thanks to the separate location of the woofer and tweeter, DOSCAP can be used to prevent debris and chips from entering the voice coil.</li> <li>In most crossovers you will be able to adjust the intensity and change the frequency, which will help you a lot in getting the sound you want.</li> <li>In the construction of crossovers usually lens capacitors or lamps or other objects are used, which have the task of protecting the tweeter at high volume, especially during distortion (distortion of the sound due to high pressure), and this can guarantee the health of the tweeter. .</li> <li>In 3-way components, it is possible to design and build wider and more efficient midranges than coaxial.</li> </ul> <p dir="ltr">Finally, you can install the tweeter at different angles and positions, depending on the instruments inside the package.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><strong><img src="/images/uploaded/blog02/152_1000.webp" alt="Advantages of the difference between component and coaxial" width="100%" /></strong></p> <p dir="ltr">&nbsp;</p> <h3 dir="ltr">Disadvantages of the difference between component and&nbsp;coaxial</h3> <ul dir="ltr"> <li>Due to the high power of the components, an amplifier will often be required to drive them.</li> <li>Components cost more than their coaxial counterparts.</li> <li>Due to the fragmentation of the components, they will be more difficult to install and use than a single speaker.</li> <li>Finally, 2 additional points: First, the components are often round, but occasionally the oval components are also seen, and secondly, the components are generally 2-way, but 3-way components are also available.</li> </ul> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/تفاوت-بین-کامپوننت-و-کواکسیال" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:102https://mixseda.com/digital-deck-in-the-dynacord-mixerDigital screen in Dynacord mixer<p dir="ltr"><img style="float: left;" src="/images/uploaded/blog02/133_1000.webp" alt="صفحه دیجیتال در میکسر دایناکورد" width="100%" /></p> <p dir="ltr" style="text-align: left;">There is a digital screen in Dynacord mixers that uses the following:</p> <ul dir="ltr" style="text-align: left;"> <li dir="ltr" style="text-align: left;">Show settings</li> <li dir="ltr" style="text-align: left;">Adjust Effects (Fx)</li> <li dir="ltr" style="text-align: left;">Save Effects (Fx Save)</li> <li dir="ltr" style="text-align: left;">USB output</li> <li dir="ltr" style="text-align: left;">Determines the graphic equalizer</li> <li dir="ltr" style="text-align: left;">Adjusting the output power (Watts)</li> <li dir="ltr" style="text-align: left;">Apply the Tap button</li> <li dir="ltr" style="text-align: left;">Settings for "Midi"</li> <li dir="ltr" style="text-align: left;">Screen settings</li> <li dir="ltr" style="text-align: left;">AND…</li> </ul> <p dir="ltr" style="text-align: left;">The adjustment of all features and capabilities of the screen is done via five buttons and a rotating screw. Although the digital screen is rarely seen in the Dynacord mixer, it is one of the most useful elements.</p> <p dir="ltr" style="text-align: left;">If the digital screen is not present in the Dynacord mixer or is damaged for any reason, the <a href="/apply-effects-in-master">effect</a> cannot be applied practically.</p> <h2 dir="ltr" style="text-align: left;">Four buttons below the screen</h2> <p dir="ltr" style="text-align: left;">Below the screen there are 4 buttons, the function of which is written in each menu below the screen. These four buttons are used to change the default effects, save the new effect, and some other settings.</p> <p dir="ltr" style="text-align: left;">In all sections of the menu, the first button on the right is used to cancel (Esc) the settings made. And the second button from the right is for exiting (Back) from any page of the menu.</p> <p dir="ltr" style="text-align: left;">On some menu and setting pages, the use of these two buttons is different. On such pages, the device itself writes the application of each of these buttons below the screen (above each button).</p> <p dir="ltr" style="text-align: left;">This count only applies to the four buttons below the screen and the Tap button is separate. To enter the device menu, simply press the knob next to the (Parameter) screen once.</p> <p dir="ltr" style="text-align: left;">Of course, you can only enter the device menu after turning on the device. Before entering the Menu section, a screen appears where you can select the preset effects.</p> <p dir="ltr" style="text-align: left;">Dynacord mixers can <a href="/apply-effects-to-mon-and-aux-outputs">apply two different effects</a> at the same time. Each effect that exists on Dynacord devices or that you store has a number (effect number) and a short description (name).</p> <p dir="ltr" style="text-align: left;">Both of the four buttons I described above for changing an effect type are device effects. You can use both buttons to change the effect number of the "Fx1" and "Fx2" sections. That is, increasing or decreasing the numbers to achieve the desired effect.</p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <p dir="ltr" style="text-align: left;"><img src="/images/uploaded/blog02/134_1000.webp" alt="چهار دکمه‌ی زیر صفحه نمایش" width="100%" /></p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <h2 dir="ltr" style="text-align: left;">Effect mode page</h2> <p dir="ltr" style="text-align: left;">After you turn on your device and see the device manufacturer logo, a page will appear for you. This page is called the Effect Mode page.</p> <p dir="ltr" style="text-align: left;">On this page you can see some information. On this page you can select the preset effects. Each selected effect is applied to the "Fx1" and "Fx2" effect lines.</p> <p dir="ltr" style="text-align: left;">In the following figure you can see the elements of the Effect Mode page.</p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <p dir="ltr" style="text-align: left;"><img src="/images/uploaded/blog02/135_1000.webp" alt="صفحه افکت‌مود ( Effect Mode )" width="100%" /></p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <ol dir="ltr" style="text-align: left;"> <li dir="ltr" style="text-align: left;">This indicator is for speaker protection. This indicator shows the output power of the device. If the device is more powerful than the <a href="/what-is-a-speaker">speakers</a>, the bands may be damaged.</li> <li dir="ltr" style="text-align: left;">Shows the "LPN" optimizer selection mode.</li> <li dir="ltr" style="text-align: left;">This item shows the USB output peak.</li> <li dir="ltr" style="text-align: left;">This indicator shows the "Midi" output.</li> <li dir="ltr" style="text-align: left;">This indicator shows the "Fx2" effect pattern.</li> <li dir="ltr" style="text-align: left;">This indicator shows the number of the "Fx2" effect.</li> <li dir="ltr" style="text-align: left;">This section contains a description of the "Fx2" effect.</li> <li dir="ltr" style="text-align: left;">This index is used to increase the number of the "Fx2" effect.</li> <li dir="ltr" style="text-align: left;">This item indicates the type of effect.</li> <li dir="ltr" style="text-align: left;">This indicator is used to reduce the number of the "Fx2" effect.</li> <li dir="ltr" style="text-align: left;">This indicator is used to increase the number of the "Fx1" effect.</li> <li dir="ltr" style="text-align: left;">Indicates the type of effect.</li> <li dir="ltr" style="text-align: left;">This indicator is used to reduce the number of the "Fx1" effect.</li> <li dir="ltr" style="text-align: left;">The description shows the value of the "Fx1" effect.</li> <li dir="ltr" style="text-align: left;">This indicator shows the number of the effect "Fx1".</li> <li dir="ltr" style="text-align: left;">This indicator shows the "Fx1" effect pattern.</li> </ol> <p dir="ltr" style="text-align: left;">Well this is the first page you will come across after turning on the device.</p> <h3 dir="ltr" style="text-align: left;">Edit Effects</h3> <p dir="ltr" style="text-align: left;">As I explained, there is a digital volume button next to the screen. You can access the main menu of the Dynacord device by pressing it once.</p> <p dir="ltr" style="text-align: left;">Well, you will need this menu to access any of the digital settings of the device. After entering the menu, you will be able to switch between menu options by turning the volume key next to the screen.</p> <p dir="ltr" style="text-align: left;">You can access any menu item by pressing the volume key again.</p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <p dir="ltr" style="text-align: left;"><img src="/images/uploaded/blog02/136_1000.webp" alt="ویرایش افکت ها" width="100%" /></p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <p dir="ltr" style="text-align: left;">After entering the device menu, the first and second options from the top of the menu include "Edit Fx 1" and "Edit Fx 2". As the name suggests, these two options are used to change the effects of the device (Fx1 / Fx2).</p> <p dir="ltr" style="text-align: left;">You will not be able to change the effect type in this menu. In this section you can edit only the effect parameters you want.</p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <p dir="ltr" style="text-align: left;"><img src="/images/uploaded/blog02/137_1000.webp" alt="ویرایش افکت ها" width="100%" /></p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <p dir="ltr" style="text-align: left;">There are several types of Effects (Fx) by default on Dynacord devices. On these devices you will not be able to create a new type of effect.</p> <p dir="ltr" style="text-align: left;">And you can only use the default effects of the device and change the parameters of each effect to achieve the desired effect. On the first screen you will encounter after turning on the device, you can see the effects stored on the device.</p> <p dir="ltr" style="text-align: left;">To do this, simply increase or decrease the number of effects on the device using the four buttons below the screen. The type of each effect you use with the four buttons on the effect lines "Fx1" and "Fx2" is written above the effect number.</p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <p dir="ltr" style="text-align: left;"><img src="/images/uploaded/blog02/138_1000.webp" alt="ویرایش افکت ها" width="100%" /></p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <p dir="ltr" style="text-align: left;">The most commonly used effects include the following:</p> <ul dir="ltr" style="text-align: left;"> <li dir="ltr" style="text-align: left;">Mono Delay effect</li> <li dir="ltr" style="text-align: left;">Stereo delay</li> <li dir="ltr" style="text-align: left;">Ping pong effect</li> </ul> <p dir="ltr" style="text-align: left;">One of the most important uses of a digital screen in a Dynacord mixer is to help you adjust the effects.</p> <h3 dir="ltr" style="text-align: left;">Effects settings</h3> <p dir="ltr" style="text-align: left;">First of all, let me say that in each parliament the tastes of the singer and the listener are different from the other parliament. You can't have the same effect that you throw at a wedding party for a fan or at a radio job.</p> <p dir="ltr" style="text-align: left;">In my opinion, the effect you give to the sound depends on what your definition of the right effect is. I intend to define the basis of your work in each work.</p> <p dir="ltr" style="text-align: left;">For example, in our eulogy, different types of stylistic features such as passion, background, lament, roza, dodmeh, unity, and 5 rozas are recited very slowly. After the roza, little by little the praise comes into play, who is a little faster. (In some cases, it's called a lament instead of context, which is more acute than context.)</p> <p dir="ltr" style="text-align: left;">Among the styles of praise, passion and attack have the most acute rhythm. The basis of my work in the style of lament, roza, dudmeh is to adjust the effect so that the last word is repeated once after the sentence is completed.</p> <p dir="ltr" style="text-align: left;">And in contextual and unitary styles, I try to repeat the last words after the conversation. I have said all this to get to this point: the effects are not one when one reaches only one number.</p> <p dir="ltr" style="text-align: left;">The web is the best kind of effect anywhere. In radio and television work the effect is much less on sound because the radio and television audience is not always young.</p> <p dir="ltr" style="text-align: left;">Usually in meetings where the majority of the population is younger, you should increase the volume of effects and bass. Slightly older people usually don't like low sounds and prefer high pitched sounds.</p> <p dir="ltr" style="text-align: left;">Also, reduce the sound of the effect a bit in crowded meetings.</p> <h3 dir="ltr" style="text-align: left;">Adjust the effects</h3> <p dir="ltr" style="text-align: left;">I myself have seen several methods that people use to adjust the effect. For example, some adjust the effect by the multiplication distance of the sound. Others keep their effects and numbers.</p> <p dir="ltr" style="text-align: left;">I keep the range of the effect alone and adjust the exact number after listening to the effect. Then I use the sound multiplier to see if the effect I have set is correct.</p> <p dir="ltr" style="text-align: left;">I think 90% of the effects and learning setting is experimental and I can only teach you a maximum of 10 things I know. Well, let's go to set the effect, first of all you should know that each effect contains a number of parameters.</p> <p dir="ltr" style="text-align: left;">You need to know what each parameter sets or what you can do with each parameter. What you are reading here is for Dynacord devices only.</p> <p dir="ltr" style="text-align: left;">In digital mixers you may encounter more complex parameters and settings.</p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <p dir="ltr" style="text-align: left;"><img src="/images/uploaded/blog02/139_1000.webp" alt="تنظیم کردن افکت ها" width="100%" /></p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <h4 dir="ltr" style="text-align: left;">Delay</h4> <p dir="ltr" style="text-align: left;">Delay is the distance between each effect and the next effect. In older mixers, the Speed ​​names can also be used to specify this parameter. Delay is, in my opinion, the most important parameter for setting the effect.</p> <p dir="ltr" style="text-align: left;">If you enter the wrong amount of feedback, you can compensate largely by changing the Fx level or effect feeders. But if you set the delay amount incorrectly, there is no way to compensate for it.</p> <p dir="ltr" style="text-align: left;">Note that I am not saying that the feedback parameter is not important, I am saying that the daily setting is more important than the setting of the feedback and other parameters. If you want to change the effect quickly, remember to change the Delay first.</p> <h4 dir="ltr" style="text-align: left;">Feedback</h4> <p dir="ltr" style="text-align: left;">In my opinion, the feedback parameter is a completely experimental thing. The feedback expresses the percentage of the original sound which is then repeated with a delay interval.</p> <p dir="ltr" style="text-align: left;">In general, the greater the feedback, the more repetitive the effect sound after the original sound. If the feedback reaches zero (0%), zero percent of the original sound is repeated, so it makes sense that you won't have any effect.</p> <p dir="ltr" style="text-align: left;">On Dynacord devices, you don't have the option to increase the feedback rate to 100%. I'm just saying for information that if the feedback reaches 100%, the effect sound will never stop.</p> <p dir="ltr" style="text-align: left;">This means that if I say a word, the effect is the same word with the same volume. In other words, the effect never ends and repeats itself constantly.</p> <p dir="ltr" style="text-align: left;">In some audio editing software, you have the option to increase the feedback rate by more than 100%. For example, if your feedback rate is 150%, the effect sound will be 50% louder than the original sound.</p> <p dir="ltr" style="text-align: left;">Also, the next sound is 50% of the previous sound, which is twice the original sound. This means that not only does the effect sound not stop and continue, but the sound increases every moment.</p> <p dir="ltr" style="text-align: left;">Well, turning up the volume can distort your sound. I myself have never tried to increase the volume of the audio feedback by more than 50%.</p> <h4 dir="ltr" style="text-align: left;">Low cut</h4> <p dir="ltr" style="text-align: left;">As the name suggests, this parameter can cut a certain amount of <a href="/parametric-equalizer">Lo sound</a>. Let me remind you that the sounds are the same low frequency sounds that make up the bass sounds.</p> <p dir="ltr" style="text-align: left;">Please note that the premises you apply in this section only affect your effect. I always set Low Cut to 50Hz and increase it if necessary.</p> <p dir="ltr" style="text-align: left;">For example, if I see letters like "P" sound very low, I turn up the volume. The higher the bass cut, the more frequencies the device filters from the bass section.</p> <p dir="ltr" style="text-align: left;">Consequently, the lower the cut, the more bass will be lost.</p> <h4 dir="ltr" style="text-align: left;">High cut</h4> <p dir="ltr" style="text-align: left;">High Cut does the same thing as Low Cut. The only difference with Low Cut is that Locat filters out the low frequencies but Cut cuts the high frequencies.</p> <p dir="ltr" style="text-align: left;">Again, high frequencies include high-pitched and high-pitched sounds. I always set High Cut to 16,000Hz or 16kHz and reduce it if necessary.</p> <p dir="ltr" style="text-align: left;">If you see that the volume is too loud, you can reduce the High Cut a bit. The point here is that the High Cut and Low Cut you set up here are for sound effects only.</p> <p dir="ltr" style="text-align: left;">This means that if I reduce the High Cut, the sharpness of the original sound will not decrease. The only thing that happens here is that the sharpness of the sound effect that repeats after the original sound decreases.</p> <h3 dir="ltr" style="text-align: left;">Set Mono Delay</h3> <p dir="ltr" style="text-align: left;">I stress once again that the setting of the effect is up to you and the one I present here is just my personal experience. Mono Delay is the simplest effect in my opinion.</p> <p dir="ltr" style="text-align: left;">In this case, the sound of the left and right bands and the effect that is applied to them are exactly the same. This effect is very useful in delegations for reciting the Quran and mentioning the background of the main sound.</p> <p dir="ltr" style="text-align: left;">Adjusting the Mono Delay effect is, in my opinion, a very experimental thing. And the more I think about it, the more I come to the conclusion that it is difficult to explain in writing.</p> <p dir="ltr" style="text-align: left;">The Quran effect is applied to sound in mono, or at least I haven't seen it applied in stereo to sound. The following numbers can help you adjust the mono effect in your praise styles:</p> <table class="tablemix" style="float: left;"> <thead> <tr style="height: 44px;"> <th class="has-text-align-center" style="width: 6.39963%; height: 44px;" data-align="center">Row</th> <th class="has-text-align-center" style="width: 12.6335%; height: 44px;" data-align="center">Praise style</th> <th class="has-text-align-center" style="width: 23.5575%; height: 44px;" data-align="center">Minimum Delay</th> <th class="has-text-align-center" style="width: 23.8061%; height: 44px;" data-align="center">Maximum Delay</th> <th class="has-text-align-center" style="width: 20.7551%; height: 44px;" data-align="center">Feedback rate</th> </tr> </thead> <tbody> <tr style="height: 22px;"> <td class="has-text-align-center" style="width: 6.39963%; height: 22px;" data-align="center">1</td> <td class="has-text-align-center" style="width: 12.6335%; height: 22px;" data-align="center">Quran</td> <td class="has-text-align-center" style="width: 23.5575%; height: 22px;" data-align="center">530ms</td> <td class="has-text-align-center" style="width: 23.8061%; height: 22px;" data-align="center">570ms</td> <td class="has-text-align-center" style="width: 20.7551%; height: 22px;" data-align="center">35</td> </tr> <tr style="height: 22px;"> <td class="has-text-align-center" style="width: 6.39963%; height: 22px;" data-align="center">2</td> <td class="has-text-align-center" style="width: 12.6335%; height: 22px;" data-align="center">roze</td> <td class="has-text-align-center" style="width: 23.5575%; height: 22px;" data-align="center">560ms</td> <td class="has-text-align-center" style="width: 23.8061%; height: 22px;" data-align="center">680ms</td> <td class="has-text-align-center" style="width: 20.7551%; height: 22px;" data-align="center">19-23</td> </tr> <tr style="height: 22px;"> <td class="has-text-align-center" style="width: 6.39963%; height: 22px;" data-align="center">3</td> <td class="has-text-align-center" style="width: 12.6335%; height: 22px;" data-align="center"><span class="VIiyi" lang="en"><span class="JLqJ4b ChMk0b" data-language-for-alternatives="en" data-language-to-translate-into="fa" data-phrase-index="0" data-number-of-phrases="1"><span class="Q4iAWc">Background</span></span></span></td> <td class="has-text-align-center" style="width: 23.5575%; height: 22px;" data-align="center">530ms</td> <td class="has-text-align-center" style="width: 23.8061%; height: 22px;" data-align="center">570ms</td> <td class="has-text-align-center" style="width: 20.7551%; height: 22px;" data-align="center">24-26</td> </tr> <tr style="height: 22px;"> <td class="has-text-align-center" style="width: 6.39963%; height: 22px;" data-align="center">4</td> <td class="has-text-align-center" style="width: 12.6335%; height: 22px;" data-align="center">monody</td> <td class="has-text-align-center" style="width: 23.5575%; height: 22px;" data-align="center">490ms</td> <td class="has-text-align-center" style="width: 23.8061%; height: 22px;" data-align="center">530ms</td> <td class="has-text-align-center" style="width: 20.7551%; height: 22px;" data-align="center">23-25</td> </tr> <tr style="height: 22px;"> <td class="has-text-align-center" style="width: 6.39963%; height: 22px;" data-align="center">5</td> <td class="has-text-align-center" style="width: 12.6335%; height: 22px;" data-align="center">vahed</td> <td class="has-text-align-center" style="width: 23.5575%; height: 22px;" data-align="center">720ms</td> <td class="has-text-align-center" style="width: 23.8061%; height: 22px;" data-align="center">730ms</td> <td class="has-text-align-center" style="width: 20.7551%; height: 22px;" data-align="center">18-20</td> </tr> <tr style="height: 44px;"> <td class="has-text-align-center" style="width: 6.39963%; height: 44px;" data-align="center">6</td> <td class="has-text-align-center" style="width: 12.6335%; height: 44px;" data-align="center">fast vahed</td> <td class="has-text-align-center" style="width: 23.5575%; height: 44px;" data-align="center">480ms</td> <td class="has-text-align-center" style="width: 23.8061%; height: 44px;" data-align="center">490ms</td> <td class="has-text-align-center" style="width: 20.7551%; height: 44px;" data-align="center">18-23</td> </tr> <tr style="height: 22px;"> <td class="has-text-align-center" style="width: 6.39963%; height: 22px;" data-align="center">7</td> <td class="has-text-align-center" style="width: 12.6335%; height: 22px;" data-align="center">shoor</td> <td class="has-text-align-center" style="width: 23.5575%; height: 22px;" data-align="center">450ms</td> <td class="has-text-align-center" style="width: 23.8061%; height: 22px;" data-align="center">475ms</td> <td class="has-text-align-center" style="width: 20.7551%; height: 22px;" data-align="center">25-32</td> </tr> <tr style="height: 44px;"> <td class="has-text-align-center" style="width: 6.39963%; height: 44px;" data-align="center">8</td> <td class="has-text-align-center" style="width: 12.6335%; height: 44px;" data-align="center">Single vahed</td> <td class="has-text-align-center" style="width: 23.5575%; height: 44px;" data-align="center">450ms</td> <td class="has-text-align-center" style="width: 23.8061%; height: 44px;" data-align="center">530ms</td> <td class="has-text-align-center" style="width: 20.7551%; height: 44px;" data-align="center">20-22</td> </tr> <tr style="height: 44px;"> <td class="has-text-align-center" style="width: 6.39963%; height: 44px;" data-align="center">9</td> <td class="has-text-align-center" style="width: 12.6335%; height: 44px;" data-align="center">Mention the context</td> <td class="has-text-align-center" style="width: 23.5575%; height: 44px;" data-align="center">530ms</td> <td class="has-text-align-center" style="width: 23.8061%; height: 44px;" data-align="center">550ms</td> <td class="has-text-align-center" style="width: 20.7551%; height: 44px;" data-align="center">35-38</td> </tr> <tr style="height: 44px;"> <td class="has-text-align-center" style="width: 6.39963%; height: 44px;" data-align="center">10</td> <td class="has-text-align-center" style="width: 12.6335%; height: 44px;" data-align="center">Mention the shore</td> <td class="has-text-align-center" style="width: 23.5575%; height: 44px;" data-align="center">455ms</td> <td class="has-text-align-center" style="width: 23.8061%; height: 44px;" data-align="center">470ms</td> <td class="has-text-align-center" style="width: 20.7551%; height: 44px;" data-align="center">35-40</td> </tr> </tbody> </table> <p style="text-align: left;">These numbers are my personal experience, and well, I do not always follow these numbers, but it may help you adjust the volume.</p> <h3 dir="ltr" style="text-align: left;">Set stereo effect (Stereo Delay)</h3> <p dir="ltr" style="text-align: left;">Usually, to set the stereo effect, select 50 of the saved effects and work with it. Well, since I've explained the effect parameters above, I won't explain them in full anymore.</p> <ul dir="ltr" style="text-align: left;"> <li dir="ltr" style="text-align: left;">Delay: the distance between each effect and the next effect</li> <li dir="ltr" style="text-align: left;">Feedback: determines the amount of repetition of the sound</li> <li dir="ltr" style="text-align: left;">Low Cut: Filter to reduce bass effects</li> <li dir="ltr" style="text-align: left;">High Cut: a filter for sharp effects</li> </ul> <p dir="ltr" style="text-align: left;">Firstly, as I explained above, the basis of my effect is to repeat the last word once after the main sound. In stereo delay, individual effects always go to one line and effects are also transferred to another line.</p> <p dir="ltr" style="text-align: left;">For example, when I say a word, the first effect of my word goes to the right bands at a lower volume than the original sound. And the next effect of my word goes to the left bands with a lower sound than the first effect.</p> <p dir="ltr" style="text-align: left;">In stereo effects, I try not to increase the feedback by more than 30 and usually set it between 17 and 25.</p> <h4 dir="ltr" style="text-align: left;">Adjust the stereo effect in praise</h4> <p dir="ltr" style="text-align: left;">Well, to distinguish the eulogy effect from the empirical discussion of my work, I have memorized a series of numbers that help me adjust the effect correctly.</p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <table class="tablemix" style="float: left;"> <thead> <tr> <th class="has-text-align-center" data-align="center">Row</th> <th class="has-text-align-center" data-align="center">Praise style</th> <th class="has-text-align-center" data-align="center">Minimum Delay</th> <th class="has-text-align-center" data-align="center">Maximum Delay</th> <th class="has-text-align-center" data-align="center">Feedback rate</th> </tr> </thead> <tbody> <tr> <td class="has-text-align-center" data-align="center">1</td> <td class="has-text-align-center" data-align="center">roze</td> <td class="has-text-align-center" data-align="center">560ms</td> <td class="has-text-align-center" data-align="center">680ms</td> <td class="has-text-align-center" data-align="center">17-23</td> </tr> <tr> <td class="has-text-align-center" data-align="center">2</td> <td class="has-text-align-center" data-align="center">before zamine</td> <td class="has-text-align-center" data-align="center">630ms</td> <td class="has-text-align-center" data-align="center">680ms</td> <td class="has-text-align-center" data-align="center">19-22</td> </tr> <tr> <td class="has-text-align-center" data-align="center">3</td> <td class="has-text-align-center" data-align="center">zamine</td> <td class="has-text-align-center" data-align="center">530ms</td> <td class="has-text-align-center" data-align="center">570ms</td> <td class="has-text-align-center" data-align="center">23-24</td> </tr> <tr> <td class="has-text-align-center" data-align="center">4</td> <td class="has-text-align-center" data-align="center">monody</td> <td class="has-text-align-center" data-align="center">530ms</td> <td class="has-text-align-center" data-align="center">550ms</td> <td class="has-text-align-center" data-align="center">18-22</td> </tr> <tr> <td class="has-text-align-center" data-align="center">5</td> <td class="has-text-align-center" data-align="center">vahed</td> <td class="has-text-align-center" data-align="center">530ms</td> <td class="has-text-align-center" data-align="center">720ms</td> <td class="has-text-align-center" data-align="center">18-23</td> </tr> <tr> <td class="has-text-align-center" data-align="center">6</td> <td class="has-text-align-center" data-align="center">fast vahed</td> <td class="has-text-align-center" data-align="center">450ms</td> <td class="has-text-align-center" data-align="center">470ms</td> <td class="has-text-align-center" data-align="center">18-23</td> </tr> <tr> <td class="has-text-align-center" data-align="center">6</td> <td class="has-text-align-center" data-align="center">Single vahed</td> <td class="has-text-align-center" data-align="center">470ms</td> <td class="has-text-align-center" data-align="center">480ms</td> <td class="has-text-align-center" data-align="center">23-26</td> </tr> <tr> <td class="has-text-align-center" data-align="center">7</td> <td class="has-text-align-center" data-align="center">shoor</td> <td class="has-text-align-center" data-align="center">450ms</td> <td class="has-text-align-center" data-align="center">465ms</td> <td class="has-text-align-center" data-align="center">25-31</td> </tr> <tr> <td class="has-text-align-center" data-align="center">8</td> <td class="has-text-align-center" data-align="center">The final lament</td> <td class="has-text-align-center" data-align="center">590ms</td> <td class="has-text-align-center" data-align="center">690ms</td> <td class="has-text-align-center" data-align="center">17-20</td> </tr> </tbody> </table> <p style="text-align: left;">These numbers are my personal experience, and well, I do not always follow these numbers, but it may help you adjust the volume.</p> <p dir="ltr" style="text-align: left;">The faster the fan or singer sings and the faster the pace or style, the less you have to delay. And the slower the fan or singer sings and the slower the rhythm or style, the more you need to increase the Delay.</p> <p dir="ltr" style="text-align: left;">The fewer delays, the more feedback needed to make the effect feel. If not, the effect is too dry to hear or may be difficult to hear with loud noises.</p> <p dir="ltr" style="text-align: left;">Be careful not to overfeed the feedback, as this may cause the effect sound to be muted. So it may also be difficult for you to adjust the volume and not notice the effect.</p> <p dir="ltr" style="text-align: left;">In the background and passion styles, if Zakir starts to mention, you should increase the feedback of the lead vocal to be audible. Otherwise, the original sound effect is difficult to hear and it seems that the original sound has no effect.</p> <p dir="ltr" style="text-align: left;">This is if you played the Zakir sound according to lines 8 and 9 of the previous table.</p> <h3 dir="ltr" style="text-align: left;">Effects storage</h3> <p dir="ltr" style="text-align: left;">Any effect that modifies and deactivates is considered a modified or modified effect. If you return to the Effect Mode page, you will see the letter "E" next to the number of the effect you have edited.</p> <p dir="ltr" style="text-align: left;">This stands for Edit, which indicates that this effect is not predefined. Once you have edited the desired effect and achieved the desired effect, you can save it in the same effect edit page.</p> <p dir="ltr" style="text-align: left;">All you have to do is press the first button on the left, from the series of buttons below the screen. If you've noticed, the word "Save" is written at the top of this button.</p> <p dir="ltr" style="text-align: left;">After pressing this button, specify an effect number for the edited effect and a description for it. Saving is a very basic and simple effect, so I don't need to explain it.</p> <p dir="ltr" style="text-align: left;">If you have any questions about saving or changing the effect, you can ask your question in the comments section.</p> <h3 dir="ltr" style="text-align: left;">Other effects</h3> <p dir="ltr" style="text-align: left;">The parameters I described above are only for setting the Mono Delay and Stereo Delay effects. In my opinion, these two effects are the most used effects.</p> <p dir="ltr" style="text-align: left;">You may need to be familiar with other parameters to adjust other effects. I do not intend to comment on these parameters at this time because I do not think it would be useful to explain them.</p> <p dir="ltr" style="text-align: left;">Some examples of these parameters include "Predelay", "Reverb Decay" and "Liveliness".</p> <h3 dir="ltr" style="text-align: left;">Tap the button</h3> <p dir="ltr" style="text-align: left;">Next to the digital screen in the Dynacord mixer is a button called Tap. Some mixers have one or more tap buttons. Using Tap allows the recorder to adjust the Delay effect of the effect by multiplying the sound.</p> <p dir="ltr" style="text-align: left;">Pressing this button twice determines the time interval between these two presses of this switch. I suggest you try using this function less in Dynacord mixers.</p> <p dir="ltr" style="text-align: left;">Because I was unable to properly adjust the delay switch after a test or two. This is because my hands and brain have delays which, although small, are not ineffective in sounding the effect.</p> <p dir="ltr" style="text-align: left;">Especially in the stereo delay effect, 5ms (milliseconds) are also important to me. At the top of the Tap button, there is a light that indicates the taps of the Tap button.</p> <p dir="ltr" style="text-align: left;">This light helps you to find out if you have adjusted the dial according to the beat of the sound after applying this button.</p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <p dir="ltr" style="text-align: left;"><img src="/images/uploaded/blog02/140_1000.webp" alt="Tap button" width="100%" /></p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <h4 dir="ltr" style="text-align: left;">Apply the Tap button</h4> <p dir="ltr" style="text-align: left;">In the main menu of the Dynacord mixer digital screen there is an option called "Fx Control Setup". The "TAP Button Ctrl" option allows you to specify which effect the Tap button is applied to.</p> <p dir="ltr" style="text-align: left;">You can set this value to "Fx2", "FX1" or both (FX 1 + 2). This means that the Tap button you apply will be applied to any effect.</p> <h3 dir="ltr" style="text-align: left;">Effects control configuration</h3> <p dir="ltr" style="text-align: left;">Since I've explained the Tap button, I'll give you a brief explanation of the other sections of this menu. This menu is for general device effect settings.</p> <ul dir="ltr" style="text-align: left;"> <li dir="ltr" style="text-align: left;">Footswitch Ctrl: This item is used to apply the <a href="/effect-control-jack-in-dynacord-mixer">footswitch device</a> to the effects of the device.</li> <li dir="ltr" style="text-align: left;">FX1 Start Preset: The number in front of this item indicates which number the FX1 starts with after the device is turned on.</li> <li dir="ltr" style="text-align: left;">FX2 Start Preset: The number in front of this item indicates which number the FX2 starts with after the device is turned on.</li> <li dir="ltr" style="text-align: left;">FX1 MIDI Channel: When turned on, the MIDI jack on the back of the power supply is used to output an effect.</li> <li dir="ltr" style="text-align: left;">FX2 MIDI Channel: When turned on, the MIDI jack on the back of the power supply is used to output an effect.</li> <li dir="ltr" style="text-align: left;">MIDI PrgCh Count: control valve of the MID jack for the bytes of the effector</li> </ul> <p dir="ltr" style="text-align: left;">&nbsp;</p> <p dir="ltr" style="text-align: left;"><img src="/images/uploaded/blog02/141_1000.webp" alt="Fx Control Setup menu" width="100%" /></p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <h2 dir="ltr" style="text-align: left;">USB output settings</h2> <p dir="ltr" style="text-align: left;">After entering the main menu, selecting the "USB Record Routing" option, you can access the USB output settings (USB). If you pay attention, there is a plug called "Digital Audio Interface" on top of the Dynacord mixers.</p> <p dir="ltr" style="text-align: left;">This socket is a USB 2.0 socket.</p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <p dir="ltr" style="text-align: left;"><img src="/images/uploaded/blog02/142_1000.webp" alt="USB output settings" width="100%" /></p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <p dir="ltr" style="text-align: left;">With this socket you can connect your Dynacord device to your computer or laboratory. This will give you the ability to play Dynacord audio via USB.</p> <p dir="ltr" style="text-align: left;">In other words, you can use this feature to record audio. A "Digital Audio" interface is required to record audio through this output.</p> <p dir="ltr" style="text-align: left;">On the "USB Record Routing" page, you have two choices, or in other words, you can output audio in two ways.</p> <h3 dir="ltr" style="text-align: left;">Live</h3> <p dir="ltr" style="text-align: left;">In Live mode you will have two audio channels in the audio output. One master output channel (Master L + R) and one <a href="/aux-in-dynacord-mixers">Aux output</a> (Aux 1 + 2). Note that the document record output (REC Send) is controlled by a black volume.</p> <p dir="ltr" style="text-align: left;">Here, too, the output of the Master in "Digital Audio" can be controlled through the same volume. In this case you will also have an Iux output channel (Aux 1 + 2) which can be controlled via Iux power supplies.</p> <h3 dir="ltr" style="text-align: left;">Studio</h3> <p dir="ltr" style="text-align: left;">Studio mode is used for four-channel recording.</p> <p dir="ltr" style="text-align: left;">In this case you will have the following 4 output channels:</p> <ul dir="ltr" style="text-align: left;"> <li dir="ltr" style="text-align: left;"><a href="/mon-in-dynacord-mixers">Mon1</a></li> <li dir="ltr" style="text-align: left;"><a href="/mon-in-dynacord-mixers">Mon2</a></li> <li dir="ltr" style="text-align: left;">Aus1</li> <li dir="ltr" style="text-align: left;">Aux2</li> </ul> <p dir="ltr" style="text-align: left;"><br />As I explained above, the sound of the Ayux output channels (Aux 1 + 2) can be controlled via the Ayux power supplies. And it makes sense that the sound of the mon channels can also be controlled via the blue power supplies.</p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <p dir="ltr" style="text-align: left;"><img src="/images/uploaded/blog02/143_1000.webp" alt="حالت استودیو ( Studio ) برای ضبط به صورت چهار کاناله" width="100%" /></p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <h3 dir="ltr" style="text-align: left;">USB recording prerequisites</h3> <p dir="ltr" style="text-align: left;">Well, it makes sense that you need a "Digital Audio" interface to record via the USB output. You also need a computer system or a laboratory.</p> <p dir="ltr" style="text-align: left;">Dynacord mixers have a driver, which means you need to install the device driver on your computer before you can start recording. Installing the Dynacord drivers is as simple as installing the software and I see no reason to explain it.</p> <p dir="ltr" style="text-align: left;">If you are having trouble installing the drivers, you can raise the issue via the comments section. Many professional applications have the ability to record via USB input.</p> <p dir="ltr" style="text-align: left;">These include QUBIS and Adobe Addition.</p> <h4 dir="ltr" style="text-align: left;">Apply graphic equalization</h4> <p dir="ltr" style="text-align: left;">You can adjust the output to which the <a href="/graphic-equalizer">graphic equalizer</a> is applied via the digital screen in the Dynacord mixer. To do this, you need to enter the "Equalizer Routing" page through the main menu.</p> <p dir="ltr" style="text-align: left;">On this page you can apply the graphic equalizer to Master, Mon 1, Mon 2 or both. Note that if you apply the graphic equalizer to the Moon, this equalizer will no longer be applied to the <a href="/Master-control">master</a>.</p> <p dir="ltr" style="text-align: left;">In this case the main master's output will be the same as master B without equalization. Next to the digital screen in the Dynacord mixer there is a volume button through which you can change the applied equalizer.</p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <p dir="ltr" style="text-align: left;"><img src="/images/uploaded/blog02/144_1000.webp" alt="اعمال اکولایز گرافیکی" width="100%" /></p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <h2 dir="ltr" style="text-align: left;">Internet Settings (LPN)</h2> <p dir="ltr" style="text-align: left;">Another application of the digital display in the Dynacord mixer is the LPN settings. The LPN voice is used to modify and optimize the bass sound.</p> <p dir="ltr" style="text-align: left;">In fact, as far as I know, this option works for subwoofers. You can increase or decrease the bass volume by adjusting the LPN settings. To access the LPN settings, you need to select the "LPN Processing" option after entering the main menu of the device.</p> <p dir="ltr" style="text-align: left;">In this menu, there are three options that are used to control the bass sound:</p> <ul dir="ltr" style="text-align: left;"> <li dir="ltr" style="text-align: left;">High: This option is recommended for small to medium sized woofers. (15, 12, 8 inch size wafers)</li> <li dir="ltr" style="text-align: left;">Medium: This option is recommended for large woofers with a wide Hz range. (12 '' and 15 '' size wafers)</li> <li dir="ltr" style="text-align: left;">Flat: If you select the Flat option, you have effectively disabled the LPN filter.</li> </ul> <p dir="ltr" style="text-align: left;">One thing to note here is that the "CMS" versions of the Dynacord mixers do not have this feature.</p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <p dir="ltr" style="text-align: left;"><img src="/images/uploaded/blog02/145_1000.webp" alt="تنظیمات ال‌پی‌ان ( LPN )" width="100%" /></p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <h2 dir="ltr" style="text-align: left;">Power output settings</h2> <p dir="ltr" style="text-align: left;">Another application of the digital display in the Dynacord mixer is the adjustment of the output power of the device. Use this part of the device to match the output power (device output power) with the band (speakers).</p> <p dir="ltr" style="text-align: left;">You can limit the maximum output power of the device via this section and not allow the output power to exceed a certain value. If the output power of the device is higher than the power of the bands, this could cause damage to the bands.</p> <p dir="ltr" style="text-align: left;">To access this section, you need to select the "Speaker Protection" option from the device menu. To choose the right option, you first need to figure out how many watts your bands are and how much power they have.</p> <p dir="ltr" style="text-align: left;">Their power level is usually written on the back of the bands. Try setting the maximum output power of the device a little more than the power of the bands. For example, if your bands are 350 watts (W), you can set the device's maximum power to 400 watts.</p> <p dir="ltr" style="text-align: left;">If you select the "Power Control Off" option, the output power of the 4 ohm device will be 1000 watts per output. A very obvious thing here is that device power is only available in PowerMit mixers.</p> <p dir="ltr" style="text-align: left;">This feature is not available in the "CMS" versions of Dynacord mixers.</p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <p dir="ltr" style="text-align: left;"><img src="/images/uploaded/blog02/146_1000.webp" alt="تنظیمات قدرت خروجی پاور" width="100%" /></p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <h2 dir="ltr" style="text-align: left;">Screen settings</h2> <p dir="ltr" style="text-align: left;">You have a number of digital display settings in the Dynacord mixer that help you enable a number of settings. In the device menu there is an option called "Device Setup" which includes the following settings:</p> <h3 dir="ltr" style="text-align: left;">Display Brightness</h3> <p dir="ltr" style="text-align: left;">As the name suggests, it refers to the brightness of the screen. You can adjust the brightness of the mixer screen via this option. The screen brightness is applicable as a percentage.</p> <h3 dir="ltr" style="text-align: left;">Screensaver</h3> <p dir="ltr" style="text-align: left;">It is a screensaver and turns on or off after the specified interval.</p> <h3 dir="ltr" style="text-align: left;">Personalize</h3> <p dir="ltr" style="text-align: left;">When the device is switched on, a text is displayed under the Dynacord logo. By default, this text is set to the name "Dynacord", which is the name of the device manufacturer. You can edit this post with this option.</p> <h3 dir="ltr" style="text-align: left;">Tooltips</h3> <p dir="ltr" style="text-align: left;">Dynacord devices are equipped with guides. Enabling this option activates the device guide.</p> <h3 dir="ltr" style="text-align: left;">Play USB To 2Track</h3> <p dir="ltr" style="text-align: left;">Since I have fully explained Rajab "<a href="/rca-inputs-and-outputs">2Track</a>" in previous articles, I don't see the need to repeat it. All you need to know is that by activating this option, you can access the device via USB.</p> <p dir="ltr" style="text-align: left;">When this option is enabled, you can play audio on USB lines 1-2 and 3-4 via a lab or computer.</p> <h3 dir="ltr" style="text-align: left;">Factory Reset</h3> <p dir="ltr" style="text-align: left;">I don't think anyone is familiar with using this option, this option is for restoring the device to <a href="https://en.wikipedia.org/wiki/Reset_(computing)">factory settings</a>. If the device is formatted, all effects and device parameters will revert to their default state.</p> <h3 dir="ltr" style="text-align: left;">Firmware Info</h3> <p dir="ltr" style="text-align: left;">This option will show you the device specifications. Through this option it is possible to view all the information of the device.</p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <p dir="ltr" style="text-align: left;"><img src="/images/uploaded/blog02/147_1000.webp" alt="Firmware Info" width="100%" /></p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <p dir="ltr" style="text-align: left;">If there is a problem with the digital page content in the Dynacord mixer, please let us know in the comments section.</p> <h2 dir="ltr" style="text-align: left;">Frequent questions</h2> <p dir="ltr" style="text-align: left;">Many friends have asked me questions about the above article, some of which I intend to answer in this section ...</p> <h3 dir="ltr" style="text-align: left;">Set the Dinacord equalizer for praise</h3> <p dir="ltr" style="text-align: left;">There is no uniform equalizer for praise. The whole work of the equalizer depends on the type of sound you intend to reproduce from the bands. Usually before the eulogy, several people on staff do a sound test to make sure the sound is suitable for the meeting.</p> <p dir="ltr" style="text-align: left;">How you set up the Dinacord equalizer also depends on the following:</p> <ul dir="ltr" style="text-align: left;"> <li dir="ltr" style="text-align: left;">Microphone type or microphone equalizer (microphone perception of different frequencies)</li> <li dir="ltr" style="text-align: left;">Type of bands and speakers and related equalizers</li> <li dir="ltr" style="text-align: left;">The sex of the preacher</li> <li dir="ltr" style="text-align: left;">The tastes of parliamentarians and admirers</li> <li dir="ltr" style="text-align: left;">AND…</li> </ul> <h4 dir="ltr" style="text-align: left;">Microphone type</h4> <p dir="ltr" style="text-align: left;">Some mics have bass sound and others have clearer sound. This goes back to using the microphone, and if you choose the right microphone for your job, your equalizer will have a better effect on the sound.</p> <p dir="ltr" style="text-align: left;"><a href="https://en-de.sennheiser.com/">Sennheiser</a> or <a href="https://www.shure.com/en-US/products/microphones">shure</a> microphones are commonly used in religious services for the principal member.</p> <h4 dir="ltr" style="text-align: left;">Type of Speaker</h4> <p dir="ltr" style="text-align: left;">Just as each microphone has a different perception of sound, so do the straps and speakers, each depending on the structure and design. This is why external speakers use different speakers to reproduce audio than internal ones.</p> <p dir="ltr" style="text-align: left;">The power of dual-band audio playback of different models at a different sound frequency, which has different reasons.</p> <p dir="ltr" style="text-align: left;">Some of these reasons include the following:</p> <ul dir="ltr" style="text-align: left;"> <li dir="ltr" style="text-align: left;">Headband design type and body shape</li> <li dir="ltr" style="text-align: left;">Insulation and build quality of the loudspeaker body</li> <li dir="ltr" style="text-align: left;">Twitter speaker type</li> <li dir="ltr" style="text-align: left;">Twitter frequency speaker</li> </ul> <p dir="ltr" style="text-align: left;">Also, in some active bands you have the option to apply a special equalizer to the sound. The settings you make on these active bands will certainly affect the sound quality of the audio player.</p> <h4 dir="ltr" style="text-align: left;">The sex of the preacher</h4> <p dir="ltr" style="text-align: left;">Some people's voices are high-pitched and others are low. You should try to balance the sound everywhere; The sound should be neither too high nor too low. If you notice that the praiseer's voice is so low that the words he is saying are difficult to understand, turn the volume down.</p> <p dir="ltr" style="text-align: left;">And if you notice that the praiseer's voice is so high that it annoys the ear, reduce the pitch of the voice.</p> <h4 dir="ltr" style="text-align: left;">The tastes of parliamentarians and admirers</h4> <p dir="ltr" style="text-align: left;">Fans usually like their voice to be low or high, and I have rarely seen a fan accepting any sound that is bad for him. Some fans like the bass sound more than the high pitched sound and the high pitched sound more than the bass sound.</p> <p dir="ltr" style="text-align: left;">Do not forget that you are responsible for adjusting the volume, if you see that the voice of the praise annoys people's ears, it is your duty to change the voice, even if it is not the wishes of the praise. If you do your job well, you no longer need to judge the admirer's opinion.</p> <p dir="ltr" style="text-align: left;">Apart from these, you should also evaluate the tastes of the people present in parliament. Usually young people don't like high voices very much and old people don't like bass sounds very much.</p> <p dir="ltr" style="text-align: left;">If you find that the fan wants a different sound than people approved, try giving that sound to that fan. For example, praise likes a strong voice, but this high-pitched voice annoys other people:</p> <p dir="ltr" style="text-align: left;">In this case, sharpen the sound of the fan monitors and keep the sound balanced in the other bands.</p> <h3 dir="ltr" style="text-align: left;">Dynacord arrangement for the Koran</h3> <p dir="ltr" style="text-align: left;">At the top of the article, I explained that I suggest using the mono effect with Daily 530 to 570 on 35 feedbacks for the Quran effect. However, there are other effects you can use, but I suggest the same effect to you.</p> <h3 dir="ltr" style="text-align: left;">Dynacord digital mixer</h3> <p dir="ltr" style="text-align: left;">In Dynacord mixers, the effects section is generally done digitally and parts of this device are digital. But we don't have something called a Dynacord digital mixer, or at least it's not a popular device if there is one.</p> <p dir="ltr" style="text-align: left;">My definition of a digital mixer is that all the work you do in any part of a mixer is digital. I haven't seen this in any of the mixers from the Dynacord series of mixers.</p> <p dir="ltr" style="text-align: left;">If any of Rajab's information friends have such a device, please let me know so I can edit this article.</p> <h3 dir="ltr" style="text-align: left;">Arrange Dynacord for praise</h3> <p dir="ltr" style="text-align: left;">In the tables I explained in the article above with the effect of setting the effect, you can set the device for the desired effect. If you have any questions about how to apply the effect on your Dynacord device, please refer to the following articles:</p> <p dir="ltr" style="text-align: left;"><a href="/apply-effects-in-master">Apply effects</a></p> <p dir="ltr" style="text-align: left;"><a href="/apply-effects-to-mon-and-aux-outputs">Apply effects to the outputs</a></p> <p dir="ltr" style="text-align: left;"><br />There are many friends who ask to set the Dynacord effect to praise, so I have decided to add some additional explanations to this article. Again, the type of effect you give varies depending on the type of encounter and the effect the fan can refer to.</p> <p dir="ltr" style="text-align: left;">There are a number of ready-made effects in Dynacord devices that have the closest effect and settings for eulogy effects. You can use the same effects, but the problem is you can't give the device a consistent effect this way.</p> <p dir="ltr" style="text-align: left;">However, the eulogist changes his style of him during the eulogy, or he can read a part of the poem quickly and a part of the poem slowly. You need to modify these effects.</p> <p dir="ltr" style="text-align: left;">Number of effects close to praise effects</p> <p dir="ltr" style="text-align: left;">Some of these effects include the following: (In the table below, the number refers to the device effect number.)</p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <table class="tablemix" style="float: left;"> <tbody> <tr> <td class="has-text-align-center" data-align="center">Row</td> <td class="has-text-align-center" data-align="center">Dynacord device effect number</td> </tr> <tr> <td class="has-text-align-center" data-align="center">1</td> <td class="has-text-align-center" data-align="center">Number 90</td> </tr> <tr> <td class="has-text-align-center" data-align="center">2</td> <td class="has-text-align-center" data-align="center">Number 89</td> </tr> <tr> <td class="has-text-align-center" data-align="center">3</td> <td class="has-text-align-center" data-align="center">Number 60</td> </tr> <tr> <td class="has-text-align-center" data-align="center">4</td> <td class="has-text-align-center" data-align="center">Number 59</td> </tr> <tr> <td class="has-text-align-center" data-align="center">5</td> <td class="has-text-align-center" data-align="center">Number 58</td> </tr> <tr> <td class="has-text-align-center" data-align="center">6</td> <td class="has-text-align-center" data-align="center">Number 50</td> </tr> <tr> <td class="has-text-align-center" data-align="center">7</td> <td class="has-text-align-center" data-align="center">Number 20</td> </tr> <tr> <td class="has-text-align-center" data-align="center">8</td> <td class="has-text-align-center" data-align="center">Number 05</td> </tr> </tbody> </table> <p style="text-align: left;">Number of effects suitable for praise on the Dynacord device</p> <p dir="ltr" style="text-align: left;">Also note that changing the effect while reading the eulogy is not correct at all, as these effects are digital and after changing the effect number, you need to wait for the device to run on the sound for a few seconds.</p> <p dir="ltr" style="text-align: left;">In other words, the change in the effect number of the device is applied to the sound after a few seconds, and in these few seconds the sound is reproduced without effect and the listener is fully aware of the change in the effect.</p> <p dir="ltr" style="text-align: left;">I personally don't recommend using the effects from the table above without modifying them. The important thing in adjusting the effect is to fine-tune it. In stereo effects, even a 5 millisecond difference can affect the sound, or the 5 millisecond cartridge may not be able to pronounce the dhikr correctly and the dhikr may remain on the original sound.</p> <p dir="ltr" style="text-align: left;">So one must always be at the top of the fixture to adjust the correct effect. The sound effect is an experimental thing in my opinion, but I try to explain some of the effects in certain situations.</p> <p dir="ltr" style="text-align: left;">I would also like to say that dinacord mixers are analog and, for example, the zero volume of one device is different from the zero volume of another device. The settings of an effect in one mixer can be completely different from the settings of the same effect in another mixer.</p> <h4 dir="ltr" style="text-align: left;">Adjust the praise effect for the shrine</h4> <p dir="ltr" style="text-align: left;">To set the praise effect for the sanctuary, I make the following settings on the Dynacord device:</p> <p dir="ltr" style="text-align: left;">&nbsp;</p> <table class="tablemix" style="float: left;"> <thead> <tr> <th class="has-text-align-right" data-align="right"><strong>Adjust the eulogy effect for roze</strong></th> </tr> </thead> <tbody> <tr> <td class="has-text-align-right" data-align="right">mono effect</td> </tr> <tr> <td class="has-text-align-right" data-align="right">mono delay effect</td> <td class="has-text-align-center" data-align="center">480- 485 ms</td> </tr> <tr> <td class="has-text-align-right" data-align="right">Mono feedback effect</td> <td class="has-text-align-center" data-align="center">40 percent</td> </tr> <tr> <td class="has-text-align-right" data-align="right"><strong>Stereo effect</strong></td> </tr> <tr> <td class="has-text-align-right" data-align="right">Stereo effect number</td> <td class="has-text-align-center" data-align="center">Number 50</td> </tr> <tr> <td class="has-text-align-right" data-align="right">Delay stereo effect</td> <td class="has-text-align-center" data-align="center">470 ms</td> </tr> <tr> <td class="has-text-align-right" data-align="right">Feedback stereo effect</td> <td class="has-text-align-center" data-align="center">25 percent</td> </tr> <tr> <td class="has-text-align-right" data-align="right"><strong>Other settings to determine the amount of effect</strong></td> </tr> <tr> <td class="has-text-align-right" data-align="right">Microphone sound line input effect</td> <td class="has-text-align-center" data-align="center">be placed on the number 5</td> </tr> <tr> <td class="has-text-align-right" data-align="right">Effect fader</td> <td class="has-text-align-center" data-align="center">Set to zero</td> </tr> </tbody> </table> <p style="text-align: left;">Necessary settings for the roza effect in the Dynacord mixer</p> <p dir="ltr" style="text-align: left;">Depending on the bandwidth of the monitor and the amount of effect the fan likes, the amount of feeder effect and the input effect of the microphone's audio line, or fx1 and fx2, may be different. So don't try to insert exactly these effects with exactly the same numbers.</p> <h4 dir="ltr" style="text-align: left;">Adjust the praise effect for the background</h4> <p dir="ltr" style="text-align: left;">&nbsp;</p> <table class="tablemix" style="float: left;"> <thead> <tr> <th><strong>Set the eulogy effect for </strong>zamine</th> </tr> </thead> <tbody> <tr> <td><strong>Stereo effect</strong></td> </tr> <tr> <td>Stereo effect number</td> <td class="has-text-align-center" data-align="center">Number 50</td> </tr> <tr> <td>Daily stereo effect</td> <td class="has-text-align-center" data-align="center">475 ms</td> </tr> <tr> <td>Stereo effect feedback</td> <td class="has-text-align-center" data-align="center">25 percent</td> </tr> <tr> <td><strong>Other settings to set the effect</strong></td> </tr> <tr> <td>Microphone sound line input effect</td> <td class="has-text-align-center" data-align="center">Be on the number 5</td> </tr> <tr> <td>Effect feeder</td> <td class="has-text-align-center" data-align="center">Set to zero</td> </tr> </tbody> </table> <p style="text-align: left;">Necessary settings for background effect in Dynacord mixer</p> <h4 dir="ltr" style="text-align: left;">Adjust the praise effect to mention the background</h4> <table class="tablemix" style="float: left;"> <thead> <tr> <th><strong>Set the eulogy effect for </strong>zekr zamine</th> </tr> </thead> <tbody> <tr> <td><strong>Mono effect</strong></td> </tr> <tr> <td>Stereo effect number</td> <td>Number 60</td> </tr> <tr> <td>Daily stereo effect</td> <td>490 ms</td> </tr> <tr> <td>Stereo effect feedback</td> <td>38 percent</td> </tr> <tr> <td><strong>Other settings to set the effect</strong></td> </tr> <tr> <td>Microphone sound line input effect</td> <td>Set to zero</td> </tr> <tr> <td>Effect feeder</td> <td>Set to zero</td> </tr> </tbody> </table> <p style="text-align: left;">Necessary settings for the background mention effect in Dynacord mixer</p> <h4 dir="ltr" style="text-align: left;">Adjust the eulogy effect for passion</h4> <table class="tablemix" style="float: left;"> <thead> <tr> <th><strong>Set the eulogy effect for </strong>shoor</th> </tr> </thead> <tbody> <tr> <td><strong>Stereo effect</strong></td> </tr> <tr> <td>Stereo effect number</td> <td>Number 50</td> </tr> <tr> <td>Daily stereo effect</td> <td>465-460 ms</td> </tr> <tr> <td>Stereo effect feedback</td> <td>20 percent</td> </tr> <tr> <td><strong>Other settings to set the effect</strong></td> </tr> <tr> <td>Microphone sound line input effect</td> <td>Be on the number 5</td> </tr> <tr> <td>Effect feeder</td> <td>Set to zero</td> </tr> </tbody> </table> <p style="text-align: left;">Necessary settings for the salt effect in the Dynacord mixer</p> <h4 dir="ltr" style="text-align: left;">Adjust the praise effect to mention the passion</h4> <table class="tablemix" style="float: left;"> <thead> <tr> <th><strong>Set the eulogy effect for </strong>shoor zekr</th> </tr> </thead> <tbody> <tr> <td><strong>Mono effect</strong></td> </tr> <tr> <td>Stereo effect number</td> <td>Number 60</td> </tr> <tr> <td>Daily stereo effect</td> <td>465 ms</td> </tr> <tr> <td>Stereo effect feedback</td> <td>43-45 percent</td> </tr> <tr> <td><strong>Other settings to set the effect</strong></td> </tr> <tr> <td>Microphone sound line input effect</td> <td>Be on the number 5</td> </tr> <tr> <td>Effect feeder</td> <td>Set to zero</td> </tr> </tbody> </table> <p style="text-align: left;">Necessary settings for the salt mention effect in Dynacord mixer</p> <h4 dir="ltr" style="text-align: left;">Rajab Effects Tips</h4> <p dir="ltr" style="text-align: left;"><br />Effects number 5 and 20 The Reverb effect, or more colloquially so-called, is a room that is mainly used for Arabic speech or praise.<br />Effects number 58 and 59 are used for those who are used to old effects (examples of these effects can be found in old echo devices or mobile or old echoes).<br />Effects number 89 and 90 are also useful for breastfeeding. Especially if you want to reproduce the sound of the chest inside the house from the bands, I suggest you to use these effects.</p> <h3 dir="ltr" style="text-align: left;"><br />Adjust the effect of the Dinacord 1000 series 2</h3> <p dir="ltr" style="text-align: left;">The digital screen of the Dynacord mixer is slightly different from the rest of the models, and if you learn how to work with one of the Dynacord mixers, you will have no problem working with the rest of them.</p> <h3 dir="ltr" style="text-align: left;">Adjust the Dynacord effect</h3> <p dir="ltr" style="text-align: left;">Adjusting the effect is done using a digital screen in the Dynacord mixer.</p> <h3 dir="ltr" style="text-align: left;">Dynacord driver</h3> <p dir="ltr" style="text-align: left;">In the future I will publish an article titled Dynacord Driver so that you, dear ones, can do your job by connecting Dynacord to your computer. For now, if you need these drivers, you can visit the Dynacord site.</p> <h3 dir="ltr" style="text-align: left;">Set up the mixer for the wedding</h3> <p dir="ltr" style="text-align: left;">At weddings, a song is usually played and a person eventually sings with the singer if he doesn't speak. In this case, there is no need to adjust the Dynacord mixer.</p> <p dir="ltr" style="text-align: left;">Here are just a few:</p> <ul dir="ltr" style="text-align: left;"> <li dir="ltr">First of all, most wedding halls don't have the correct band arrangement, so don't use stereo effects at all.</li> <li dir="ltr">If a word is to be read, try to elevate the everyday to reading a beautiful word.</li> <li dir="ltr">If a singer sings a song, do not alter his voice at all and, if necessary, try to make this effect as minimal as possible.</li> <li dir="ltr">If the hall space was closed, make sure that the sound of the bands is not too low. Because people who are close to bands have headaches.</li> <li dir="ltr">Try not to increase the gain of the sound too much. If the bands start booing, people will think of you as an amateur and nothing else.</li> <li dir="ltr">In any case, even if the sound is broken and something special has happened, try to stay calm.</li> <li dir="ltr">Nobody expects you to do a professional job at a wedding party with a Dinacord mixer, so don't force yourself to do a professional job.</li> </ul> <h2 dir="ltr" style="text-align: left;">Text updates</h2> <ul dir="ltr" style="text-align: left;"> <li style="text-align: left;">A table of mono effects and effect numbers for praise styles has been added.</li> <li style="text-align: left;">Some stereo effect numbers have been changed.</li> <li style="text-align: left;">Added Quran effects to the mono effects table.</li> <li style="text-align: left;">Added the FAQ section of the article Digital Page in Dynacord Mixer</li> <li style="text-align: left;">Add the number of effects suitable to be praised on the digital screen in the Dynacord mixer</li> <li style="text-align: left;">Add tables to adjust the eulogy effect on the digital screen in the Dynacord mixer</li> </ul> <p dir="ltr" style="text-align: left;">See this article in another language: <a href="/changelanguage/2?returnUrl=/صفحه-دیجیتال-در-میکسر-دایناکورد" rel="follow"><button>FA (Persian)</button></a></p> <p dir="ltr" style="text-align: left;">&nbsp;</p>urn:store:1:blog:post:100https://mixseda.com/amplifier-power-control-lightAmplifier power control light<p><img src="/images/uploaded/blog02/132_1000.webp" alt="Amplifier power control light" width="100%" /></p> <h2 dir="ltr">Amplifier power control lamp</h2> <p dir="ltr">The amplifier power control light is commonly seen in <a href="/power-mixers">power mixers</a>. However, in some <a href="/what-is-a-sound-mixer">mixers</a>, this indicator is also available to control the volume of the output sound. In power mixers, a light is usually placed on the power supply of the device to measure the volume of the incoming sound.</p> <p dir="ltr">This light is a good indicator for checking and adjusting the volume of the output sound.</p> <p dir="ltr">In mixers, the <a href="/dynacord-company">Dynacord</a> power control lights (amplifier) ​​include two lights:</p> <ul dir="ltr"> <li>Protect the light</li> <li>Limit lamp</li> </ul> <p dir="ltr">These lights are found in Dynacord mixers under the <a href="/graphic-equalizer">equalizer lights</a>.</p> <h3 dir="ltr">Limit the lights</h3> <p dir="ltr">In mixers, this light is usually off or green. This light comes on when the power of the device increases. In fact, this indicator lights up when the volume of the output sound exceeds the limit of the <a href="https://en.wikipedia.org/wiki/Guitar_amplifier">amplifier</a>.</p> <p dir="ltr">In mixers, this light usually turns yellow and red when it wants to show a large volume.</p> <h3 dir="ltr">Protect the light</h3> <p dir="ltr">If the sound exceeds the allowable level and reaches the maximum power of the amplifier, the Protect lamp lights up. Always try to prevent this light from coming on. If the light stays on for too long, the device turns off.</p> <p dir="ltr">This means that the device has a sensor that turns the device off if the light stays on for too long. Keeping this light on for a long time can be dangerous for your device.</p> <p dir="ltr">Or the power outputs of the device may be damaged. Mixer lights or power lights are not present in all mixers. In some <a href="/digital-mixers">digital mixers</a> you can control the power of the amplifier in detail.</p> <p dir="ltr">Or don't allow the volume to increase by applying a sound compressor. In <a href="/analog-mixer">analog mixers</a> you don't have the ability to compress. Or rather, I have not seen an analog mixer that has this feature completely and as well as a digital mixer.</p> <p dir="ltr">Some analog mixers have a button that applies a fixed compressor to the sound. However, you can use compression devices and connect them to analog mixers.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/چراغ-کنترل-قدرت-میکسر" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:98https://mixseda.com/graphic-equalizerGraphic equalizer<p><img src="/images/uploaded/blog02/130_1000.webp" alt="Graphic equalizer" width="100%" /></p> <h2 dir="ltr">Equalizer and its types</h2> <p dir="ltr">As far as I know, we have two types of <a href="/equalizers-in-the-mixer">equalizers</a>. One of them is the graphic equalizer.</p> <ul dir="ltr"> <li><a href="/parametric-equalizer">Parametric equalizer</a></li> <li>Graphic <a href="https://en.wikipedia.org/wiki/Equalization_(audio)">equalizer</a></li> </ul> <p dir="ltr">As I explained in previous articles, the parametric equalizer is made up of multiple volumes. And as the name suggests, you can get the sound you want by setting a number of parameters across these volumes.</p> <p dir="ltr">In graphic equalizers, the sound equalization is done more accurately, and in fact you can tell that your hands are more open to equalize the sound. This type of equalizer was widely seen as analog on older radios, but has now been replaced by digital equalizers.</p> <p dir="ltr">The equalizer you see in home audio and car recorders is also a kind of parametric or graphic equalizer, except that it is digitally applied to the sound, just like <a href="/digital-mixers">digital mixers</a>.</p> <h2 dir="ltr">What is a graphic equalizer?</h2> <p dir="ltr">Graphic equalizers usually contain 10 to 15 audio channels. It goes without saying that each of these channels is <a href="https://en.wikipedia.org/wiki/Stereophonic_sound">stereo</a>. Usually each channel of these graphic equalizers can be changed from 10 to 15 <a href="https://en.wikipedia.org/wiki/Decibel">decibels (db)</a>.</p> <p dir="ltr">In <a href="/dynacord-company">Dynacord</a> <a href="/what-is-a-sound-mixer">mixers</a>, graphic equalizers include 11 channels. Each of these channels can be increased or decreased by 10 decibels (db). In previous versions the number of channels was not more than 10.</p> <p dir="ltr">In <a href="/pm-502">PowerMixer 502</a> Dynacord, the number of channels of the graphic equalizer is 7 toast. Usually in equalizers, the high frequency (high - low sound) is on the right, the middle frequency (medium - medium) is in the center, and the low frequency (low - low sound) is on the left.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/131_1000.webp" alt="What is a graphic equalizer?" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h3 dir="ltr">Work with the graphic equalizer</h3> <h4 dir="ltr">High frequency</h4> <p dir="ltr">The 12Khz <a href="https://en.wikipedia.org/wiki/Frequency">frequency</a> channel includes the high frequency which determines the following sound in the output sound. The sound becomes lower as the frequency decreases by 12Khz.</p> <h4 dir="ltr">High frequency range (treble - bass sounds)</h4> <p dir="ltr">The 6.3 Khz to 2.5 Khz frequency range is the range of the following frequencies up to the middle frequencies. This range includes the frequencies that make up the following sound. You can make the output sound clearer by amplifying this frequency range.</p> <p dir="ltr">Be careful not to overdo it with this graphic equalizer. Increasing this range creates feedback or whistling in the bands. Especially when the volume (Hi) in the parametric equalizer is high.</p> <h4 dir="ltr">Mid frequency range (mid-midrange)</h4> <p dir="ltr">The frequency range from 1.6Khz to 630Hz is the frequency range of the middle range. This range is used to relieve hoarseness and fill in sound. Normally I always try to keep this range of sounds below the two frequencies of high and low frequency.</p> <p dir="ltr">Blocking the channels in this area causes the sound to become hoarse or the sound to become nasal.</p> <h4 dir="ltr">Low frequency range (bass - bass sound)</h4> <p dir="ltr">The frequency range from 400 Hz to 125 Hz is the range of frequencies in between the bass frequency. As this range increases, the volume increases or, in a simpler interpretation, the volume of the bass increases.</p> <p dir="ltr">When you reduce the channels associated with this range, the sound becomes darker and the volume disappears.</p> <h4 dir="ltr">Low frequency</h4> <p dir="ltr">The 63 Hz frequency channel includes the low frequency which determines the bass sound in the output sound. As this channel increases, the sound becomes thinner and hollow and as this frequency decreases, the sound becomes hollow.</p> <h3 dir="ltr">Equalization setting</h3> <p dir="ltr">The important thing here is that we don't have a unique equalization. Or we have no equal to say that this is the best of all and we have no better than this equal. You have to adjust the equalizer channels according to the singer's sound and the sound you want to have output.</p> <p dir="ltr">Of course, the type of sound emitted also depends on the following factors:</p> <ul dir="ltr"> <li><a href="https://en.wikipedia.org/wiki/Microphone">Microphone</a> type</li> <li>Microphone EQ type (on some microphones)</li> <li>Type of parametric equalization</li> <li>Type of <a href="/what-is-a-speaker">speakers</a></li> <li><a href="/what-is-a-speaker">speakers</a> equalization (only in active speakers)</li> <li>And most importantly, the genre of the singer's voice</li> </ul> <p dir="ltr">Knowing the types of sound depends on your personal experience.</p> <h3 dir="ltr">Types of graphic equalizers</h3> <p dir="ltr">There are well-known examples of graphic equalizers, with which professionals are almost generally familiar and in which each of them is used.</p> <p dir="ltr">Usually the name given to these equalizers is the use and type of sound you will get as a result of adjusting these equalizers.</p> <p dir="ltr">Some of these equations include the following:</p> <ul dir="ltr"> <li>Pop</li> <li>Inhabit</li> <li>Club</li> <li>Rock</li> <li>Bass</li> <li>High</li> <li>Vocal</li> <li>Powerful</li> <li>Dance</li> <li>Soft</li> <li>Party</li> <li>Classic</li> <li>Jazz</li> </ul> <h2 dir="ltr">Apply a graphic equalizer to the outputs</h2> <p dir="ltr">In mixers like Dynacord, you'll be able to determine which of your outputs your equalizer will be applied to. Of course, not all hands are open on all exits.</p> <p dir="ltr">You can only specify to apply the graphic equalizer to the following three outputs.</p> <ul dir="ltr"> <li><a href="/dynacord-device-outputs">Main outputs</a></li> <li><a href="/mon-in-dynacord-mixers">Mon 1 outputs (Mon 1)</a></li> <li>Mon 2 outputs (Mon 2)</li> </ul> <p dir="ltr">If you look under the graphic equalizer in Dynacord mixers, you will see that there are three lights. At the top of these lights you can see the words "Graphic Eq To". These lights determine which graphic equalizer output of the device is applied.</p> <p dir="ltr">That is, if the equalizer is assigned to the master, then the green light will turn on. And if you assign the equalizer to our channels (Mon 1 / Mon 2), the yellow lights come on.</p> <p dir="ltr">I stress once again that the graphic equalizer outputs are never applied to the following outputs:</p> <ul dir="ltr"> <li><a href="/aux-in-dynacord-mixers">AUX outputs</a></li> <li>Master B output</li> <li><a href="/fx-send-output">Effects send outputs</a></li> </ul> <p dir="ltr"><br />In digital mixers, your hand is much more open to applying digital and graphic equalizers to the audio output channels.</p> <h2 dir="ltr">Frequent questions</h2> <p dir="ltr">Some of Rajab's friends have asked a number of questions in this article, which I think I need to explain in this section. One thing to note here is that reading this section is not part of the tutorial and I may need to explain the past again.</p> <h3 dir="ltr">Graphic equalizer setting</h3> <p dir="ltr">One of the most important parts of mixing and adjusting the sound is the question of sound equalization. The sound equalizer is very important in live performances and mixing. There are many benefits to sound equalization, including:</p> <h4 dir="ltr">Separation of frequency ranges from each other</h4> <p dir="ltr">For example, in concerts, a separate equalization is applied to each of the microphone outputs so that each microphone does not pick up the sound of other instruments and feed them into the system.</p> <p dir="ltr">This type of sound separation has several advantages:</p> <p dir="ltr">First, you can easily check the sounds in the live broadcast. Secondly, for the record, the sound is recorded separately and is easier to mix.</p> <p dir="ltr">Third, it is easier and more accurate to apply the effect to any sound.</p> <h4 dir="ltr">Amplify the sound</h4> <p dir="ltr">One of the most important uses of an equalizer is the amplification of sound. Of course, this does not mean amplifying the sound of the amplifier. For example, you can mute or lower the singer's voice, in fact you are amplifying different frequencies of the singer's voice.</p> <h4 dir="ltr">Preventing distortion of sound</h4> <p dir="ltr">There are several reasons for sound <a href="https://en.wikipedia.org/wiki/Distortion">distortion</a>, one of which is improper sound equalization. If you equalize the sound input to the mixer based on the equalization of each speaker, the speakers are less likely to whistle or the sound will be distorted during live broadcast.</p> <p dir="ltr">Adjusting the sound equalizer, both graphic and parametric, requires experimental knowledge. No matter how much you read about the types of EQs, I don't think you will learn, or rather become a pro, unless you do it yourself.</p> <h3 dir="ltr">Dynacord equalizer adjustment</h3> <p dir="ltr">The equalizer setting of the Dinacor device is not very different from that of other analog devices. You just have to pay attention to the fact that in both Dynacord mixers and other mixers, changing one millimeter of each of these bands (equalizer feeder) is important and affects the sound output.</p> <p dir="ltr">So be careful to equalize the sound and especially to change the equalizer when playing the sound. Especially when playing audio because the changes in the sound are very noticeable right now.</p> <h4 dir="ltr">Adjusting the Dinacord 1000 equalizer</h4> <p dir="ltr">The Dynacord Model 1000 has 11 bands for graphic equalizer adjustment. 6 sound files of this mixer have 4 volumes of parametric equalizer and 4 sound files of this mixer have 3 volumes of parametric equalizer.</p> <h4 dir="ltr">Dinacord 600 equalizer adjustment</h4> <p dir="ltr">The old Dynacord Model 600 has 7 units and the new Dynacords Model 600 has 9 bands for adjusting the graphic equalizer. This device has 8 sound files or sound lines, all featuring 3 parametric EQ volumes.</p> <p dir="ltr">There is no Khz volume in the Dynacord 600's parametric equalizer and it is not possible to define a variable value to define the volume of the mids. In other words, Mid is always at a certain kilohertz.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/اکولایزر-گرافیکی" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:96https://mixseda.com/standby-button-in-the-sound-mixerStandby button in the sound mixer<p><img src="/images/uploaded/blog02/122_1000.webp" alt="Standby button in the sound mixer" width="100%" /></p> <h2 dir="ltr">Standby button on the Dynacord mixer</h2> <p dir="ltr"><a href="/what-is-a-sound-mixer">Mixers</a> usually have a standby button in addition to the on / off button. This button is actually the mixer standby mode. Turn off all <a href="/mixer-microphone-input">input</a> and <a href="/dynacord-device-outputs">output</a> <a href="https://en.wikipedia.org/wiki/Signal">signals</a> when this button is on.</p> <p dir="ltr">In fact, it appears that you have <a href="/mute-button-in-dynacord-mixer">mutated</a> all the lines of the device. It goes without saying that, as I explained in the previous sections, this button has no effect on "TrackIn" and "Digital Audio Interface".</p> <p dir="ltr">"Digital audio interface" means the same as <a href="https://en.wikipedia.org/wiki/USB">USB input</a>. This button is usually present in professional <a href="/analog-mixer">analog mixers</a> and is present in all <a href="/digital-mixers">digital mixers</a>, physically or not physically. So don't look for it in regular analog mixers.</p> <p dir="ltr">The presence of this button in digital mixers, in addition to blocking inputs and outputs, limits the activity of the CPU. In digital mixers; When the mixer is turned on but you are not using it, processing is done normally.</p> <p dir="ltr">For example, all mixer inputs are checked at all times, or processes may be running on the mixer's RAM and CPU due to the effect of the active device effect. You will cancel all these activities by setting the mixer to Standby mode.</p> <p dir="ltr">As far as I can remember, this button is not available in <a href="/sound-software-mixers">software mixers</a> because most of these <a href="/types-of-mixers">mixers</a> rely on the operating system itself, which will perform the standby operation much better than the software.</p> <p dir="ltr">You may want to know the <a href="/comparison-of-digital-and-analog-sound-mixers">differences between analog and digital mixers</a>.</p> <p dir="ltr">The point here is that if you are a beginner or want to use a mixer recently, look for Standby first. You can make changes to the sound and be surprised to find that there is no sound coming out of the mixer outputs.</p> <p dir="ltr">In this case, it could be one of the reasons the Standby button is active, so be sure to check it so it doesn't go black when you continue working with the mixer.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/دکمه-ی-استندبای" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:94https://mixseda.com/dynacord-mixer-lamp-inputDynacord mixer lamp input<p><img src="/images/uploaded/blog02/121_1000.webp" alt="Dynacord mixer lamp input" width="100%" /></p> <h2 dir="ltr">Dynacord mixer lamp input</h2> <p dir="ltr">What you see on many <a href="/what-is-a-sound-mixer">mixers</a> is a lamp input (LAMP). Most mixers have this input for <a href="https://en.wikipedia.org/wiki/Audio_engineer">Audio engineer</a>.</p> <p dir="ltr">Now, sometimes for the simplicity of the mixer, there is only one plug or for the professionalism of the mixer, there are several inputs for the lamp.</p> <p dir="ltr">The lamp input is used to connect the <a href="https://en.wikipedia.org/wiki/LED_lamp">LED lamps</a> to the device. The use of these lamps serves to keep the workplace illuminated when working with the mixer. The input socket of the mixer lamp is of the "<a href="/Audio-connectors">XLR</a>" type.</p> <p dir="ltr">You can use ready-made lamps with the input of this plug to use this function or personally connect a lamp of 12 volts (V) and 5 watts (W) to the mixer. Make sure that if you connect a lamp to the fixture, it has the same specifications so that there are no problems. (12V / 5Watt / DC)</p> <p dir="ltr"><a href="/dynacord-company">Dynacord</a> <a href="/cms-1000-3">CMS-1000</a>, <a href="/cms-1600-3">CMS-1600</a>, <a href="/cms-2200-3">CMS-2200</a>, <a href="/powermate-1000-3">powermate-1000</a>, <a href="/powermate-1600-3">powermate-1600</a> and <a href="/powermate-2200-3">powermate-2200</a> mixers have a lamp input number.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/ورودی-لامپ-میکسر" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:92https://mixseda.com/power-amp-input-in-dynacord-mixerPower amp input in Dynacord mixer<p><img src="/images/uploaded/blog02/119_1000.webp" alt="Power amp input in Dynacord mixer" width="100%" /></p> <h2 dir="ltr">Power amplifier input in the Dynacord mixer</h2> <p dir="ltr">Inputs Power Amp is used to connect the side device or <a href="/what-is-a-sound-mixer">mixers</a> to the <a href="/dynacord-company">Dynacord</a> device's power supply device. That is, use this input to use the device power supply independently.</p> <p dir="ltr">Also, when using this input, no volume or power supply will affect this input. One thing some people do is connect the <a href="/mon-in-dynacord-mixers">Mon outputs</a> to this input.</p> <p dir="ltr">And after the <a href="/Audio-connectors">specon output</a>, they receive the output device. The reason is to use a feedback filter in the audio output. Well, of course, this input only exists in <a href="/difference-mixer-and-power-mixer">PowerMate mixers</a>.</p> <p dir="ltr">At the top of these inputs is a master audio output that you can use to connect your device to an effector and feed the effector's output back into the mixer.</p> <p dir="ltr"><br />This will allow you to apply the desired effect to the output sound of the device by connecting an effector to your device if the Dynacord device does not have the desired <a href="https://en.wikipedia.org/wiki/Sound_effect">sound effect</a> (FX).</p> <p dir="ltr"><br />The power amplifier input, except for the above, will allow you to continue using the amplifier in case of mixer failure or noise in the mixer.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/120_1000.webp" alt="Power amplifier input in the Dynacord mixer" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/ورودی-پاور-آمپ" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:90https://mixseda.com/dynacord-device-outputsDynacord device outputs<p><img src="/images/uploaded/blog02/118_1000.webp" alt="Dynacord device outputs" width="100%" /></p> <h2 dir="ltr">Dynacord mixer outputs</h2> <p dir="ltr"><a href="/dynacord-company">Dynacord</a> devices, with the exception of the <a href="/mon-in-dynacord-mixers">Mon</a> and <a href="/aux-in-dynacord-mixers">Aux</a> outputs, have several outputs, which include the Master Out, Master B Out, and Headphone Out.</p> <h3 dir="ltr">Main output</h3> <p dir="ltr">Dynacord's main output (Master A Out) is stereo "<a href="/Audio-connectors">XLR</a>". Used for connection to power supplies and <a href="/what-is-a-speaker">active speaker</a>. System-wide settings have a <a href="/fx-send-output">fx send</a> on this output.</p> <p dir="ltr">That is, the equalizer settings are parametric, including <a href="/gain-in-the-mixer">Gain</a>, switches, <a href="/fx-volume-in-dynacord-mixer">effects (Fx)</a> and <a href="/pan-volume-in-the-sound-mixer">Pan volumes</a>. In simpler language, with the exception of the Aux, Mon and Fx Send outputs, the rest of the settings relate to this output.</p> <p dir="ltr">Well, if you are careful, we have a graphic <a href="/equalizers-in-the-mixer">equalizer</a> on Dynacord devices. In the future I will explain how to set this equalizer. Just know that if you want to apply this equalizer to the master master, the "On" button at the top right of this equalizer must be active.</p> <h3 dir="ltr">Master B output</h3> <p dir="ltr">This output is similar to the Master A output. But with the difference that it is of the "<a href="/Audio-connectors">TS</a>" type. And the <a href="https://en.wikipedia.org/wiki/Equalization_(audio)">graphic equalizer</a> has no effect on Master B.</p> <p dir="ltr">Of course, in one case, the graphic equalizer will affect Master B if the Pre / Post button is active. When this button is active, Master B is controlled by a Master A power supply.</p> <p dir="ltr">That is, the sound is not sent to the output of Master B until the main main power supply is open. The Master B outputs are controlled by the red volume (Master B).</p> <p dir="ltr">If you pay attention, next to the Pre / Post button, there is another button called Stereo / Mono. This button is for the <a href="https://en.wikipedia.org/wiki/Stereophonic_sound">stereo</a> or mono output of Master B.</p> <p dir="ltr">If this button is low, the Master B output sound is mono. And if it's high, Master B's output is (Stereo).</p> <h3 dir="ltr">Headphone output</h3> <p dir="ltr">The headphone output (Phones) is a stereo jack for connecting headphones with an impedance of 32 to 600 ohms. The audio signals of the sound lines are activated with the PFL button and sent to this output.</p> <p dir="ltr">When no <a href="/Pre-Fader-Listen">PFL (Pre Fader Listen) button</a> is activated, only the main main output signal is sent to this output. The output of the headphones (Phones) occurs with the black "Phones" volume.</p> <h2 dir="ltr">Frequent questions</h2> <p dir="ltr">Since a number of questions are commonly asked by users on this topic, I will answer some of these questions here.</p> <h3 dir="ltr">Connect the USB cable to the Dynacord</h3> <p dir="ltr">With a USB 2.0 cable, you can connect your <a href="https://dynacord.com/">Dynacord</a> device to a computer, laptop, tablet or even some <a href="/digital-mixers">digital mixers</a>. The point here is that the operating system of these devices must be Windows or Linux.</p> <p dir="ltr">Obviously I don't know if the drivers for this device can be defined on Apple operating systems, but I think it is possible that Dynacord drivers can also be defined on Apple systems, since dinosaur drivers can be defined on Linux.</p> <p dir="ltr">You can connect the Dynacord device to your computer like a sound card via a cable. This function allows you to record the sound of some mixer channels directly using this cable.</p> <p dir="ltr">But it is not possible to play the audio from the mixer through the laboratory or the computer. In fact, Dynacord has provided you with a sound card through which you can only receive mixer sound and this sound card will have no input.</p> <p dir="ltr">There is a cable connection on the device called Digital audio interface, to better understand this I suggest you read the following article:</p> <p dir="ltr"><a href="/Digital-screen-in-Dynacord-mixer" rel="follow"><button>Digital screen in Dynacord mixer</button></a></p> <h3 dir="ltr">Dynacord mixer outputs</h3> <p dir="ltr">The outputs of a CMS dinosaur mixer include MON outputs, AUX outputs, Master outputs, and record outputs. Of course, you can also output from any of the insert jacks, in addition to which you can use a USB 2.0 cable to output the digital output from the mixer.</p> <p dir="ltr">Powermate mixers have all CMS mixer outputs, plus these mixers also include two speaker outputs. Through these outputs you can connect passive bands to your device.</p> <p dir="ltr">Of course you should also pay attention to the power of the mixer and the power of each of these bands, not paying attention to these elements could damage your equipment.</p> <h3 dir="ltr">Active speaker connection to Dynacord</h3> <p dir="ltr">You can use the MON or AUX outputs to connect an active speaker to the mixer.</p> <p dir="ltr">But before you do that, I suggest you read the following articles to make a better decision given the capabilities and limitations of each of these two outputs.</p> <p dir="ltr"><a href="/aux-in-dynacord-mixers" rel="follow"><button>AUX in Dynacord mixers</button></a> <a href="/mon-in-dynacord-mixers" rel="follow"><button>MON in Dynacord mixers</button></a></p> <p dir="ltr">The IWC and Mon outputs are the most important outputs of the Dynacord device.</p> <h3 dir="ltr">The difference between mono and stereo sound</h3> <h4 dir="ltr">Mono and stereo sound</h4> <p dir="ltr">This is one of the most obvious problems in audio work and I remember Rajab having explained it before. In general, the meaning of the word "mono" means single, one, unique, only translated.</p> <p dir="ltr">When we say that a sound is mono, it means that it is single. If you listen to quality music, you must have noticed that the sound coming from the left speaker differs from the sound coming from the right speaker.</p> <p dir="ltr">This type of sound is called stereo sound; In a simpler sense, a stereo sound is made up of two mono or single sounds.</p> <h3 dir="ltr">Mono and stereo effects</h3> <p dir="ltr">Likewise, the stereo effect is an effect composed of two mono effects, which means that if you are a professional, you can produce a stereo effect with two mono effects. Of course, combining two mono effects with a stereo effect is a little different, but it's possible.</p> <p dir="ltr">Also note that changing a stereo effect is much quicker and easier than changing or editing two mono effects at the same time. I said it to finally get to the stereo effect; The effect applied to the left voice differs from the effect applied to the right voice.</p> <p dir="ltr">In the Dynacord mixer, some outputs are mono or single channel and some outputs are stereo or dual channel. You won't encounter this in Dynacord mixers, but it's good to know that in terms of multichannel audio, we also have more channels.</p> <p dir="ltr">For example, you may have noticed that some sound cards use <a href="https://en.wikipedia.org/wiki/Surround_sound">7.1</a> or <a href="https://en.wikipedia.org/wiki/5.1_surround_sound">5.1</a> text. These items are also found on the packaging of some motherboards and indicate the number of input and output channels of the motherboard's sound card.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/خروجی-های-دستگاه-دایناکورد" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:88https://mixseda.com/rca-inputs-and-outputsRCA inputs and outputs<p><img src="/images/uploaded/blog02/114_1000.webp" alt="RCA inputs and outputs" width="100%" /></p> <h2 dir="ltr">RCA inputs and outputs</h2> <p dir="ltr"><a href="/dynacord-company">Dynacord</a> mixers have a range of RCA inputs and outputs, including track inputs, <a href="/Audio-connectors">RCA</a> inputs, and document record output (REC Send).</p> <p dir="ltr">Most audio mixers, including Dynacord mixers, have a variety of RCA inputs and outputs.</p> <h3 dir="ltr"><br />RCA input</h3> <p dir="ltr">RCA inputs for sound reproduction with independent <a href="/parametric-equalizer">parametric equalizer</a> settings from microphone lines thirteen-fourteen and fifteen-sixteen (13-14 and 15-16) on the <a href="/powermate-1600-3">Dynacord 1600</a>.</p> <p dir="ltr">This is the seven-eight and nine-ten line input (7-8 and 9-10) of the microphone line in the <a href="/powermate-1000-3">Dynacord 1000</a> model. And the nine-ten and eleven-twelve (9-10 and 11-12) of the microphone line in the <a href="/powermate-600-3">Dynacord 600</a> is.</p> <p dir="ltr">These inputs are usually used to play <a href="https://en.wikipedia.org/wiki/Music">songs or music</a> under the sound. Sometimes the reader reads the word. You can use music to increase the impact on the audience.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/115_1000.webp" alt=" RCA input" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h3 dir="ltr">Track entrance</h3> <p dir="ltr">The track input is RCA type. Track input for playing the sound before the power supply from the main master. That is, if the main main power supply is opened and closed, it has no effect on the audio output.</p> <p dir="ltr">This input is controlled by the red "2Track To Master" volume. The point here is that if this input is used to play audio, the output audio will not be sent to Master B unless the Pre / Post button is on.</p> <p dir="ltr">The Pre / Post button is located next to the Master B volume. Another point is that the Standby button does not affect this audio input.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/116_1000.webp" alt="Track entrance" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h3 dir="ltr">REC Send output</h3> <p dir="ltr">The document record output (REC Send), as the name suggests, is an output for capturing the record. This output is used in stereo to <a href="https://en.wikipedia.org/wiki/Sound_recording_and_reproduction">record audio</a>.</p> <p dir="ltr">The output of the document record (REC Send) is the same as the main output of the master device without graphic equalizer (graphic equalizer). This means that the sound is recorded with the <a href="https://en.wikipedia.org/wiki/Sound_effect">sound effect</a> (Fx).</p> <p dir="ltr">The quality of the sound recorded by this output depends on the parametric <a href="/equalizers-in-the-mixer">equalizer</a> settings. That is, the sound equalizer (microphone line), no matter how it is set, the sound is recorded the same way.</p> <p dir="ltr">In fact, the graphic equalizer has no effect on the output of the document record (REC Send). The document record output (REC Send) is controlled by the black "REC Send" volume.</p> <p dir="ltr">Of course, you can also record this audio via USB. In fact, the document recording volume (REC Send) is also used to control the USB output.</p> <p dir="ltr">I will explain <a href="/digital-deck-in-the-dynacord-mixer">audio recording via USB</a> in future articles.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog02/117_1000.webp" alt="REC Send output" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/ورودی-و-خروجی-های-آر-سی-ای-rca" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:86https://mixseda.com/mon-in-dynacord-mixersMon in Dynacord mixers<p dir="ltr"><img src="/images/uploaded/blog01/085_1000.webp" alt="Mon in Dynacord mixers" width="100%" /></p> <p dir="ltr">One of the most important outputs in Dynacord <a href="/types-of-mixers">mixers</a> that you can use is the MON output. There are two Mon output channels in Dynacord mixers.</p> <h2 dir="ltr">Out Mon</h2> <p dir="ltr">Mon Output There are two types of outputs.</p> <ul> <li dir="ltr" style="text-align: left;">One is the stereo output, which is in the form of an "<a href="/Audio-connectors">XLR</a>".</li> <li dir="ltr" style="text-align: left;">The second is the "Mono" output, which is in the form of "<a href="/Audio-connectors">TS</a>".</li> </ul> <p dir="ltr">Usually, since these outputs have effects independent of the master, they are used to connect monitors and active bands. The application that <a href="/dynacord-company">Dynacord</a> has in mind for these outputs is the monitor itself.</p> <p dir="ltr">These outputs have a weak effect and, at the peak of the singer's voice, the sound effect (Fx) becomes even weaker as the volume increases. The <a href="/apply-effects-to-mon-and-aux-outputs">Mon effect</a> is applied independently.</p> <p dir="ltr">Above the <a href="/apply-effects-in-master">effect feeders (Fx)</a> are two blue volumes that you can use to apply the desired effect to your Mon outputs. This output is useful for recording four-channel audio via 4-channel via USB.</p> <p dir="ltr">Well, one problem with this output is that it has a weaker effect, and at the peak of the sound, the effect gets even weaker. If possible, try not to use the Mon output for your monitor if the Dynacord <a href="/aux-in-dynacord-mixers">Aux outputs</a> are empty.</p> <p dir="ltr">Try using this output for <a href="https://en.wikipedia.org/wiki/Sound_recording_and_reproduction">audio recording</a> or the output for the back lanes of the house.</p> <h2 dir="ltr">mon feders (Mon in the mixer)</h2> <p dir="ltr">Mon The outputs are controlled using our mon power supplies. It goes without saying that the volume of our output volume also depends on the <a href="/audio-output-volumes-in-each-row">volume of Mon</a> (Mon) in each line of the sound.</p> <h2 dir="ltr">Mon filter feedback (Mon in mixer)</h2> <p dir="ltr">Feedback Filter Mon volumes, or FEEDB for short. FILTER ”are located above our power supplies. The job of these volumes is to reduce or cancel the feedback or whistle the sound.</p> <p dir="ltr">These volumes are used at high <a href="https://en.wikipedia.org/wiki/Frequency">frequencies</a> only on the Mon outputs. This means that if the mon output is used for the monitor, these volumes can be used at a certain frequency to blur the audio feedback.</p> <h2 dir="ltr">Filter feedback button</h2> <p dir="ltr">To use the Feedback Filter Mon volumes, the Feedback Filter button below the volumes must be active. If you are using Dynacords Series 2, these outputs are AUX.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/مون-در-میکسر-های-دایناکورد" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:84https://mixseda.com/aux-in-dynacord-mixersAUX in Dynacord mixers<p><img src="/images/uploaded/blog01/083_1000.webp" alt="AUX in Dynacord mixers" width="100%" /></p> <h2 dir="ltr">AUX output in the mixer</h2> <p dir="ltr">The Aux Send output is commonly used to acquire the output for an effector, <a href="https://en.wikipedia.org/wiki/Guitar_amplifier">power amplifier</a> or <a href="https://en.wikipedia.org/wiki/Sound_recording_and_reproduction">recorder</a>. Of course, in some cases, this output is also used to connect active <a href="/what-is-a-speaker">speakers</a>, which is not very common.</p> <p dir="ltr">Most often it uses the Mon output for active bands. Aux outputs are used to capture long range audio output. That is, these outputs are used to acquire a long, noise-free output.</p> <p dir="ltr">I think it is a mistake to use these outputs for your active bands because DinaCord itself offers these outputs for recording.</p> <p dir="ltr">In some cases, an audio output that has less effect than the original sound is required for live playback outside the main audio output on virtual platforms such as Instagram. In this case it is possible to use the AUX outputs.</p> <h2 dir="ltr"><br />Registration of AUX releases</h2> <p dir="ltr">Some <a href="https://en.wikipedia.org/wiki/Microphone">microphones</a>, which are usually capacitive, use "Phantom Power" or "48+". In Dynacord, you don't have the option to create this for every line.</p> <p dir="ltr">In <a href="http://nop.mixseda.com/%D8%A8%D8%B1%D9%86%D8%AF-%D8%AF%D8%A7%DB%8C%D9%86%D8%A7%DA%A9%D9%88%D8%B1%D8%AF">Dynacord mixers</a> (or most <a href="/analog-mixer">analog mixers</a>), capacity is provided for a number of lines in general. When a ceiling microphone is connected to the device, in most cases the sound of this microphone will not be reproduced from the bands.</p> <p dir="ltr">Or rather, you only record the sound of the ceiling microphone.</p> <p dir="ltr">To do this, you need a different output from the Master output and the REC Send output, which I suggest is the Aux output. Aux outputs have standalone and mono effects.</p> <p dir="ltr">If you want to use these outputs for recording, you need to create an interface that has one end of the "TRS" headphone jack and one end of the headphone (TS) jack. (TRS plug to connect to Labtab and Benoni plug to connect to the mixer).</p> <p dir="ltr">Of course, you can also use the Benon to Benon (TS) or Benon (TS) to Canon plug, depending on the type of recorder. Because many recorders now have internal and current inputs.</p> <p dir="ltr">Always try to use quality cables for connections and conversions. Using poor quality cables can cause disc noise. Don't forget that to output from Aux Send, the <a href="/audio-output-volumes-in-each-row">Aux volume of the sound line</a> you want to output from must be open.</p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">AUX button placed in the mixer</h2> <p dir="ltr">If this button (Aux Post) is enabled, the entire Aux line will be assigned to the audio feeders. This means that if the sound line power supply changes, the Aux output sound also changes.</p> <p dir="ltr">In other words, the AUX lines will depend on the faders, and changing the faders will also change the AUX audio output.</p> <h2 dir="ltr"><br />AUX power supplies in the mixer</h2> <p dir="ltr">The Aux Faders are used to control and adjust the volume of the Aux outputs. As I explained above, the Aux Send outputs are also used for audio recording.</p> <p dir="ltr">You can use this fader when recording live audio via USB or cable.</p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">How to apply sound to AUX output</h2> <p dir="ltr">To apply sound to the AUX outputs of Dynacord mixers, do the following:</p> <ul> <li dir="ltr" style="text-align: left;">First open the AUX output of the sound line you want to exit.</li> <li dir="ltr" style="text-align: left;">Then open the feeders for the same output. (Here are the "Aux" outputs)</li> <li dir="ltr" style="text-align: left;">Make sure the Aux Post button is disabled.</li> <li dir="ltr" style="text-align: left;">You can then output a sound from the Aux Send output by connecting the (TS) or USB (USB) cables.</li> <li dir="ltr" style="text-align: left;">Be careful not to turn the volume up too high so as not to distort and create noise.</li> </ul> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/آیوکس-در-میکسرهای-دایناکورد" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:82https://mixseda.com/apply-effects-in-masterApply effects in Master<p><img src="/images/uploaded/blog01/081_1000.webp" alt="اعمال افکت در مستر" width="100%" /></p> <h2 dir="ltr">Apply effects in the Dynacord mixer</h2> <p dir="ltr">Applying effects and adjusting the volume of <a href="https://en.wikipedia.org/wiki/Sound_effect">sound effects</a> is very important. Setting the sound effects for a sound work helps you to keep the sound effects clear and noiseless in the output sound.</p> <p dir="ltr">If you can properly adjust the sound effect but fail to adjust the correct amount in the mixer outputs, your effect will be damaged.</p> <h3 dir="ltr"><br />Peak effect lights</h3> <p dir="ltr">If you look at the effect feeders (which are green) in Dynacord mixers, you will see that there are two lights in green and red. The peak effect light is red.</p> <p dir="ltr">These lamps light up when the <a href="https://en.wikipedia.org/wiki/Microphone">microphone</a> sound effect line input (Line) is too loud. Or to put it simply, this light comes on when the sound effect is distorted.</p> <p dir="ltr">For example, if you open the <a href="/fx-volume-in-dynacord-mixer">sound effect of an audio line</a> (FX1) all the way to the end, the light of the peak effect (Fx Pk) will most likely turn on. If you see this indicator light up while the player is reading, be sure to reduce the effect.</p> <p dir="ltr">Because if this light is on, the sound effect will be severely degraded. In fact, in layman's terms, your effect is <a href="https://en.wikipedia.org/wiki/Distortion">distorted</a>.</p> <h3 dir="ltr"><br />Effect button</h3> <p dir="ltr">There is a green light at the bottom of the Fx Pk light. This light indicates whether the device is on or off internally. When this light is on, it means that the internal effect of the device is active.</p> <p dir="ltr">Now you may not have any effect on the output sound for various reasons, but the device's internal effect is active. Next to this green light, there is a switch that you can use to turn the internal effect of the device on or off.</p> <p dir="ltr">It goes without saying that the effect of the mixers can be controlled via the "<a href="/effect-control-jack-in-dynacord-mixer">FootSwitch</a>" control or the "<a href="https://en.wikipedia.org/wiki/MIDI">MIDI</a>" device. In most <a href="/types-of-mixers">mixers</a>, the internal effect control fails when adding external controls to control the <a href="/what-is-a-sound-mixer">mixer</a> effect.</p> <h3 dir="ltr">PFL effect (Pre Fader Listen)</h3> <p dir="ltr"><a href="/powermate-2200-3">Dynacord mixers</a> have a <a href="/Pre-Fader-Listen">PFL button</a> for the effects section to apply the effect smoothly and to make fewer mistakes for recorders. This button allows you to hear the output sound before applying it.</p> <p dir="ltr">If you remember, as I said in previous articles, this button is before the power supply circuit. This means that if the power supply is completely closed, you can still hear the sound via the PFL button.</p> <p dir="ltr">The volume of the sound output of this button is independent and preset and I think the volume of the effect output of this button is 0db. I mean, in my opinion, when you turn on this button, you can hear 100% of the sound coming out through the Phone output.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/082_1000.webp" alt="PFL effect (Pre Fader Listen)" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h3 dir="ltr">Effects power supplies</h3> <p dir="ltr">At the bottom of the PFL button are the sound effects of two stereo effects (Effect Fader). These power supplies are used to adjust the volume of the effect applied to each row of microphones.</p> <p dir="ltr">The effect sound is louder when moving these power supplies upwards.</p> <p dir="ltr">And when you reduce these feeders, the effect of the effect on the output sound decreases. It goes without saying that the performance of these volumes depends on the effect of the volume (Fx1 / Fx2) in each line of the sound.</p> <p dir="ltr">This means that if the sound of your effect is closed in a soundtrack, it makes sense that no effects are applied to that soundtrack. Usually the <a href="/fx-volume-in-dynacord-mixer">volume effect (Fx1 / Fx2)</a> is adjusted so that the power effects are close to -0-.</p> <p dir="ltr">Of course, the setting of these feeders depends on the type of effect applied and the amount of feedback, which I will discuss in future articles.</p> <p dir="ltr">I suggest you read <a href="/Digital-screen-in-Dynacord-mixer">this article</a> to learn how to adjust the effect.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/اعمال-افکت" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:80https://mixseda.com/apply-effects-to-mon-and-aux-outputs-2Apply effects to MON and AUX outputs<p><img src="/images/uploaded/blog01/080_1000.webp" alt="Apply effects to MON and AUX outputs" width="100%" /></p> <h2 dir="ltr">Apply effects to the MON and AUX outputs</h2> <p dir="ltr">In <a href="/dynacord-company">Dynacord</a> <a href="/what-is-a-sound-mixer">mixers</a>, you need to use the Fx to Aux and Fx to Mon volumes at the top of the effects feeder (Fx) to apply the <a href="https://en.wikipedia.org/wiki/Sound_effect">effect</a> to the <a href="/audio-output-volumes-in-each-row">Mon and Aux outputs</a>.</p> <p dir="ltr">In fact, since a different amount of sound effects may be required for these outputs, different effect volumes are defined for each AUX and MON output.</p> <p dir="ltr">In larger, more <a href="/types-of-mixers">professional mixers</a> where you can connect multiple <a href="https://en.wikipedia.org/wiki/Microphone">microphones</a> to the mixer, you may have multiple AUX outputs. Usually such mixers do not have an effector, and if you need an effector, you need to connect the outputs of your mixer to an effector or to another mixer that has an effector.</p> <h3 dir="ltr">Apply effects to AUX (effects on outputs)</h3> <p dir="ltr">The volumes "Fx1 to Aux" and "Fx2 to Aux" are the volumes used to apply the effect to the Iux outputs. These volumes work independently and, more importantly, these volumes are related to the effect volumes (Fx1 / Fx2) of each row of sounds.</p> <p dir="ltr">This means that if you close the <a href="/fx-volume-in-dynacord-mixer">effect volumes</a> (Fx) on each line and then open the "Fx to Aux" volumes, the effect sound will not be sent to the Aux output. By independent I mean these volumes have nothing to do with the effects regulating power supplies.</p> <p dir="ltr">This means that if you completely close the feeder effect (Fx), there is no reason not to send the effect to the "Aux" outputs. Another point is that if the main effect of the Dynacord device is turned off, no effects will be sent to the outputs, including the Aux and Mon outputs.</p> <h3 dir="ltr">Apply effects to mon (effects on outputs)</h3> <p dir="ltr">The volumes "Fx1 to Mon" and "Fx2 to Mon" are the volumes used to apply effects to our releases. These volumes work independently and, more importantly, these volumes are related to the effect volumes (Fx1 / Fx2) of each row of sounds.</p> <p dir="ltr">This means that if you close the effect volumes (Fx) on each line and then open the "Fx to Mon" volumes, the effect sound will not be sent to our output (Mon). By independent I mean these volumes have nothing to do with the effects regulating power supplies.</p> <p dir="ltr">This means that if you completely close the feeder effect (Fx), there is no reason not to send the effect to the "Mon" outputs.</p> <p dir="ltr">I suggest you read <a href="/Digital-screen-in-Dynacord-mixer">this article</a> to learn how to adjust the effect.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/اعمال-افکت-در-خروجی-ها" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:78https://mixseda.com/fx-send-outputFx Send output<p dir="ltr"><img src="/images/uploaded/blog01/079_1000.webp" alt="Fx Send output" width="100%" /></p> <p dir="ltr">effect Send output (Fx Send) is an output without effects. In fact, the Fx Send has two connectors (Fx1 / Fx2) that give you the sound of sound lines without an <a href="https://en.wikipedia.org/wiki/Sound_effect">effect</a>.</p> <p dir="ltr">The use of this output is to connect the effector or recorder to the <a href="/types-of-mixers">mixer</a>. At the bottom of these jacks are two valves "Fx1" and "Fx2", which are used to control the volume of the sound output from these jacks.</p> <p dir="ltr">For example, you want to record a raw (no effect) sound. In this case, if a beginner intends to do so, use the <a href="/audio-output-volumes-in-each-row">AUX or MON outputs</a> for this purpose, but the makers of Dynacord have already predicted that wherever you have an effect sound, you may need a raw sound as well.</p> <p dir="ltr"><br />The Fx Send outputs help you get the raw sound of any sound line to which you apply the Fx1 or Fx2 effects.</p> <p dir="ltr">One thing to note here is that the <a href="/fx-volume-in-dynacord-mixer">effect volumes (Fx)</a> of the line of the sound you want to output without effects must be open.</p> <p dir="ltr">You may encounter a problem during this process, if you open the volume effect Fx1 or Fx2 for multiple lines of sounds, you will have a combination of raw lines of multiple lines in the Fx Send output.</p> <p dir="ltr"><br />In general, the Fx Send output has many uses for people who have used the AUX or MON outputs in their <a href="/what-is-a-sound-mixer">mixer</a> for other tasks and have no other outputs to <a href="https://en.wikipedia.org/wiki/Sound_recording_and_reproduction">record</a> the raw sound.</p> <p dir="ltr"><br />Besides sound recording, another application of this output is that you can connect this output to an effector and apply a separate effect from your mixer on it.</p> <p dir="ltr"><br />Let's say you want the sound of a part of your event to have a distinct effect and this effect may not be present on the default effects of your Dynacord mixer; In this case, these releases will be more useful to you than ever.</p> <p dir="ltr"><br />In <a href="/digital-mixers">digital mixers</a> or <a href="/sound-software-mixers">software mixers</a>, you won't have to worry too much about getting raw sound, so this output is only available in <a href="/analog-mixer">analog mixers</a>.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/خروجی-افکت-سند" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:76https://mixseda.com/effect-control-jack-in-dynacord-mixerEffect control jack in Dynacord mixer<p><img src="/images/uploaded/blog01/078_1000.webp" alt="Effect control jack in Dynacord mixer" width="100%" /></p> <h2 dir="ltr">Effect control socket</h2> <p dir="ltr"><strong>For many, the question may be: what is an <a href="https://en.wikipedia.org/wiki/Sound_effect">effects</a> control jack?</strong></p> <p dir="ltr">This input is used to control the effect. I intend to control the effect by turning the effect off and on again. In some mixers, this jack helps the player to turn the mixer effect on and off using a FootSwitch.</p> <p dir="ltr">In some other <a href="/types-of-mixers">mixers</a>, too, you have the ability to control the amount of delay (Delay) with the beat rhythm of this pedal. (Actually like the Tab button which I'll explain in future articles)</p> <p dir="ltr">This feature is usually less used in concerts and is only used when the singer is alone. This pedal helps the player to turn on the sound (Fx) when he wants and to turn off the effect whenever he doesn't need the effect.</p> <p dir="ltr">Well, I personally do not recommend using this pedal to adjust the effect because if you have worked with the Tab key you will understand how irregular the rhythms we define by hand for the device are.</p> <p dir="ltr">Better yet: you have to be very professional in beating the beat in order to properly adjust the mixer effect. The effects control jack (Fx On / Off) is a stereo jack that can be controlled in most mixers through the digital part of the mixer (such as the <a href="/powermate-2200-3">Dynacord 2200 power mixer</a>)</p> <h3 dir="ltr">Use the effect control grip in the staff</h3> <p dir="ltr">Usually people on the card don't use this jack because most fans don't have much experience in audio discussions and can't adjust the sound on their own. Also, adjusting praise effects is more difficult than singing, and adjusting these effects with the pedal is difficult even for professionals.</p> <p dir="ltr">For example, suppose you want to control the Zakir effect sound with these pedals. Even 5 milliseconds (5Ms) high or low in the memory effect will affect the output sound. As a result, your error rate will be too high and you may not be able to adjust the sound effect to match the original sound.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/جک-کنترل-افکت" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:74https://mixseda.com/feeders-and-signal-lights-in-sound-mixersFeeders and signal lights in sound mixers<p><img src="/images/uploaded/blog01/076_1000.webp" alt="Feeders and signal lights in sound mixers" width="100%" /></p> <h2 dir="ltr">Feeders in mixers</h2> <p dir="ltr">Adjusting the power supply and <a href="https://en.wikipedia.org/wiki/Signal">signal</a> lights is one of the most important details of audio recording work. The volume of the fader slider is usually in analog mixers to adjust the volume of the output sound of each sound line.</p> <p dir="ltr"><a href="/analog-mixer">Analog mixers</a>, such as <a href="/dynacord-company">Dynacord</a> mixers, have a power supply for each sound line that helps the recorder control the volume of each section. In some digital mixers this sliding volume is used not only to adjust the volume but also to adjust the <a href="https://en.wikipedia.org/wiki/Equalization_(audio)">equalizer</a>, and even in some mixers these feeders can change the pitch of each line.</p> <p dir="ltr">One of the important points of analog mixers is that a <a href="https://en.wikipedia.org/wiki/Audio_engineer">professional sound</a> engineer always tries to keep these feeders sliding close to the graduated zero number next to the feeder. He tries to adjust the volume gain and <a href="/parametric-equalizer">parametric equalizer</a> so that the feeders are neither too nor too small.</p> <p dir="ltr">In other words, low or high volume gain is not meant to compensate for the slider feeder (fader). On the other hand, if the gain volume is too high, the flirtatious variation in the power supply volume will be clearly recognizable and audible. And this makes it very difficult for the recorder to reduce a sound smoothly.</p> <p dir="ltr">In practice, the presence of sliding volumes is due to the high precision. Nowhere do you see graphic equalizers adjusted as screw volumes. Sliding feeders are always used to adjust graphic equalizers because the accuracy of the adjustment is very important.</p> <p dir="ltr">You can hardly turn the volume down using <a href="https://en.wikipedia.org/wiki/Gain_(electronics)">Gain</a>, but you can easily do it with scrollable volumes. Easy to use scrollable volumes that are also used in software mixers.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/077_1000.webp" alt="Feeders in mixers" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h3 dir="ltr">our suggestion</h3> <p dir="ltr">I suggest you, <a href="https://en.wikipedia.org/wiki/Audio_engineer">sound engineers</a>, always find a suitable place for the devices. Whenever possible, you should have all four of these components in place for launch to maximize profits. Try to cover them after each use of the mixers so that the dust settles on them.</p> <p dir="ltr">Typically, if power supplies and their circuitry are constantly exposed to dust, the life of the power supplies is reduced. And after a while you will notice that the volume of the power supply suddenly increases or decreases or the power supply is not working properly. Due to the high price of audio equipment in Iran, always try to deal with the thesis of these equipments properly.</p> <h2 dir="ltr">Peak lights in the mixer (power supply and signal lights)</h2> <p dir="ltr">Usually, a series of buttons and lights are placed next to the power supply. The most important of these lights are the signal (Sig) and peak (Pk) lights. Usually the courier light is red. This light indicates the arrival of a high volume signal.</p> <p dir="ltr">When this light is lit, the audio signal is out of range or distorted. In these cases it is necessary to use one of the following two methods to adjust the acoustic signal so that the Pk indicator goes out:</p> <ul> <li dir="ltr" style="text-align: left;">Decrease the <a href="/gain-in-the-mixer">gain volume</a></li> <li dir="ltr" style="text-align: left;">Adjust the <a href="/parametric-equalizer">parametric equalizer</a> so that the sound is not distorted</li> <li dir="ltr" style="text-align: left;">Don't forget that these methods are for the mixer and you have other ways to reduce the volume of the sound input to the mixer, such as creating a distance between the microphone and the sound source and ...</li> </ul> <p dir="ltr">Decreasing the volume of the power supply has nothing to do with the peak light and increasing or decreasing it does not change the turning on and off of the peak light. If the courier light stays on constantly, in addition to damaging your equipment, it will likely cut the conduit.</p> <p dir="ltr">Don't forget that the distortion of the sound quality of your record will be strangely destroyed. This means that the recorded sound is heavily scratched.</p> <h2 dir="ltr">Signal lights in the mixer (power supply and signal lights)</h2> <p dir="ltr">In <a href="/types-of-mixers">mixers</a>, a green light is usually placed under the Pk light to indicate the amount of signal being input to the device. It goes without saying that some mixers use multiple lights to indicate the input signal.</p> <p dir="ltr">The reason for this light is more to understand the incoming sound of a sound line. My personal opinion is that the gain volume should be adjusted so that the indicator light (Sig) is on when speaking and the pk is off.</p> <p dir="ltr">I mean, the input signal is not so high as to make the sound distorted, nor so low as to make the input signal forcibly intelligible.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/فیدر-و-چراغ-های-سیگنال" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:72https://mixseda.com/mute-button-in-dynacord-mixerMute button in Dynacord mixer<p dir="ltr"><img src="/images/uploaded/blog01/075_1000.webp" alt="Mute button in Dynacord mixer" width="100%" /></p> <p dir="ltr">In <a href="/dynacord-company">Dynacord</a> <a href="/what-is-a-sound-mixer">mixers</a>, below the <a href="/pan-volume-in-the-sound-mixer">Pan volume</a> and above the <a href="/Pre-Fader-Listen">PFL button</a>, there is a button called muff in each volume row. As the name suggests, this button works by turning the volume off and on again.</p> <p dir="ltr">When you activate this button, the sound of the desired line is turned off and no sound is played from this line of sounds. Usually in <a href="/analog-mixer">analog mixers</a> you don't need all the lines at once, so try to mute the extra lines and lines of sound.</p> <p dir="ltr"><br />This way you don't have to worry about configuring the other lines. Also, a line may have a small amount of noise that is not easily audible; Turning off the extra lines in these cases will give you a cleaner output sound.</p> <p dir="ltr"><br />Also, if the other person is with you when she is working, it will be easier for them to understand what you are doing because she will not be involved in adapting the rest of the sections.</p> <p dir="ltr"><br />There are many uses for this button, for example, before connecting the microphone to the mixer, there is no need to mute the microphone line output sound, just press this button and then plug in the microphone.</p> <p dir="ltr"><br />If you are careful when connecting the <a href="https://en.wikipedia.org/wiki/Microphone">microphone</a> <a href="/Audio-connectors">connector</a> to the mixer, most of the time there will be a noise, activating this button will avoid this noise.</p> <p dir="ltr"><br />Note that the Mute button circuit is separate from the PFL button. In fact, turning on the Miut button does not silence the signal. So you can activate the mute button and use the PFL button whenever you reach this conclusion, you need this line; Turn off the mute button to play the sound.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/دکمه-میوت" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:70https://mixseda.com/pre-fader-listenPre Fader Listen<p><img src="/images/uploaded/blog01/074_1000.webp" alt="Pre Fader Listen" width="100%" /></p> <h2 dir="ltr">What is the Pre Fader Listen?</h2> <p dir="ltr">First of all, I mean the sound of the signal that goes to the headphones. In other words, the sound emitted from the headphone section of the <a href="/what-is-a-sound-mixer">mixer</a>. This section is also known as Telephone.</p> <p dir="ltr">The sound signal in the mixer allows the operator to listen to one or more channels by monitoring or through headphones without the sound of those channels being output. And reach out to listeners.</p> <p dir="ltr">This system can also be used for monitoring, but the main use is to play the next song or part of the program, which should be played first for the operator or <a href="https://en.wikipedia.org/wiki/Audio_engineer">sound engineer</a>. To be able to adjust the sound before playing. This use is also useful for <a href="https://en.wikipedia.org/wiki/Disc_jockey">DJs (Disc jockeys)</a>. Signals in the direction of the signal usually go to a headphone <a href="/amplifier-classes">amplifier</a>. Or they might go for tracking.</p> <h2 dir="ltr">PFL button</h2> <p dir="ltr">The PFL button on the mixer means Pre-Fade Listen. And if this button is disabled, the sound in ALF will mean listening after the feeder. Usually the input columns have the ability to activate the PFL of the sound without going to the outputs, the path of the headphones and being audible inside it.</p> <h2 dir="ltr">SIP button</h2> <p dir="ltr">SIP switches may also be available on <a href="/types-of-mixers">advanced mixers</a>. Unlike PFL, this key affects the output sound. You see a lot of this in software mixers. (Usually denoted by the letter S.)</p> <p dir="ltr"><br />Assume that the signal sent from the synthesizer to the mixer may be too strong to cause the clip. To easily find this problem, let's activate the SIP key. By activating this button, all channels will be disconnected except the selected channel with fast output, and we can easily set the channel and then deactivate SIP again.</p> <p dir="ltr">Be careful with this key while running the program. Because if an error is triggered, all channels except the channel itself will be disabled and muted.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/صدای-نشانه" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:68https://mixseda.com/pan-volume-in-the-sound-mixerpan Volume in the sound mixer<h3><img src="/images/uploaded/blog01/073_1000.webp" alt="pan Volume in the sound mixer" width="100%" /></h3> <h2 dir="ltr">Volume pen in analog mixers</h2> <p dir="ltr">In <a href="/dynacord-company">Dynacord</a> <a href="/what-is-a-sound-mixer">mixers</a>, there is a volume called Pan at the bottom of the <a href="/audio-output-volumes-in-each-row">Aux and Mon volumes</a>. This volume is used to adjust the <a href="https://en.wikipedia.org/wiki/Signal">signal</a> input to the left (left) and right (right) channels.</p> <p dir="ltr">In simpler language, this volume determines what percentage of the <a href="https://en.wikipedia.org/wiki/Audio_signal">signal</a> goes to the left and right channels. In many older standing mixers this volume is also known as Balance.</p> <p dir="ltr">In some mixers this volume is not available for each row of sounds separately. And instead of this volume, there is a total balance volume for the output sound. Well, in fact, these types of mixers are less common these days.</p> <p dir="ltr">Usually in mixers, the letters "R" and "L" are written next to this letter. Indicating the direction of the audio channels. However, this volume offers a very simple possibility for the recorder.</p> <p dir="ltr">But this Pan volume can be very useful. This volume is used when two singers or two fans are singing at the same time.</p> <p dir="ltr">Also, in some applications, they point to ceiling <a href="https://en.wikipedia.org/wiki/Microphone">microphones</a>. Because when the sound of ceiling mics is stereo, it has a much greater effect on the sound. Like recorded live music.</p> <h2 dir="ltr">Volume pen in digital mixers</h2> <p dir="ltr">This mixer is also available in <a href="/digital-mixers">digital mixers</a>. The only difference is that in these mixers the volume pen is digital. And it's easier to adjust because the device itself shows the exact percentage of the amount of sound going into the left and right channels.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/ولوم-پن-در-میکسر" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:66https://mixseda.com/audio-output-volumes-in-each-rowAudio output volumes in each row<p><img src="/images/uploaded/blog01/070_1000.webp" alt="Audio output volumes in each row" width="100%" /></p> <h2 dir="ltr">introduction</h2> <p dir="ltr">Except for old <a href="/analog-mixer">analog mixers</a>, usually in all mixers we have a volume to get the output in each line of the sound. You may want to record some of the lines separately.</p> <p dir="ltr">Or try playing them separately for different reasons. For example, for active <a href="/what-is-a-speaker">speakers</a>, you can control their sound separately. Or, for example, on many bulletin boards, the voice of the praise is mentioned separately.</p> <p dir="ltr">These output volumes can help us get these outputs from any line.</p> <p dir="ltr">Well, in this article, I want to address three issues:</p> <ul> <li dir="ltr" style="text-align: left;">Ivory volumes in the Dynacord mixer</li> <li dir="ltr" style="text-align: left;">Lunar volumes in the Dynacord mixer</li> <li dir="ltr" style="text-align: left;">Output to digital mixers</li> </ul> <h2 dir="ltr">AUX volumes in the Dynacord mixer</h2> <p dir="ltr">In mixers, these volumes are usually found below the <a href="/parametric-equalizer">parametric equalizer</a>. But in <a href="https://dynacord.com/">Dynacord</a> mixers, these volumes are below the <a href="/fx-volume-in-dynacord-mixer">FX volumes</a>. In <a href="/dynacord-company">Dynacord</a> <a href="/what-is-a-sound-mixer">mixers</a>, the Aux and Mon volumes have independent effects.</p> <p dir="ltr">Auxiliary volumes are usually used for sound quality due to their good quality. Of course, this volume is also used to get the output from USB, which I will explain in future articles.</p> <p dir="ltr">Another point here is that the mute button at the bottom of each row affects this volume. This means that if this button is active, you will not hear any sound from this output volume.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/071_1000.webp" alt="AUX volumes in the Dynacord mixer" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">MON volumes in the Dynacord mixer</h2> <p dir="ltr">These volumes with this name do not exist in all analog mixers. The Mon volumes in Dynacord mixers are located below the Aux volume. The use of these volumes is usually to connect the monitor to the mixer.</p> <p dir="ltr">Of course, this output can be used to record sounds, series mixers and power supplies, and monitor active bands. Of course, I must also say that the effect output of these outputs is weak.</p> <p dir="ltr">So it's not a good option for active band output. In fact, I have personally run into the problem many times that the quality of these outputs is lower than that of Ivex volumes. And when the praiseor or singer starts singing on the steps above, the sound of the effect is hard to hear. And in some cases, the effect sound is distorted.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/072_1000.webp" alt="MON volumes in the Dynacord mixer" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Output to digital mixers</h2> <p dir="ltr">In fact, the placement structure of the volumes for the output in each line of sound is specific to analog mixers. <a href="/digital-mixers">Digital mixers</a> do not need this type of structure at all. However, some of these mixers support this structure.</p> <p dir="ltr">In digital mixers you will not have many limits for the output from a sound line. In digital mixers it is possible to digitally define the outputs for the device. For example, a row of sounds can have ten outputs.</p> <p dir="ltr">In fact, this is one of the <a href="/comparison-of-digital-and-analog-sound-mixers">reasons digital mixers</a> are so popular. This is why digital mixers are used more in programs with a large number of outputs, such as concerts.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/ولوم-های-خروجی-صدا-در-هر-ردیف" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:64https://mixseda.com/fx-volume-in-dynacord-mixerFX Volume in Dynacord mixer<p><img src="/images/uploaded/blog01/069_1000.webp" alt="FX Volume in Dynacord mixer" width="100%" /></p> <h2 dir="ltr">Volume effect in the mixer</h2> <p dir="ltr">The effect or echo (FX) volumes in <a href="https://dynacord.com/">Dynacord</a> <a href="/what-is-a-sound-mixer">mixers</a> are located below the <a href="/parametric-equalizer">parametric equalizer</a> of each line. Generally, effects are known by the letters "FX" in both software and devices.</p> <p dir="ltr">This is not only for audio work, but you can also see it in various editing and graphics software. <a href="/دایناکورد-dynacord">Dynacord mixers</a>, such as the <a href="/powermate-2200-3">PM 2200</a>, have two volume effects for each sound line.</p> <p dir="ltr">This means that you can apply two effects to the input sound from each row of sounds at the same time. Well, in fact, this is a limitation for recorders. In <a href="/digital-mixers">digital</a> and <a href="/sound-software-mixers">software mixers</a>, the ability to apply effects to the sound of each sound line is greater.</p> <p dir="ltr">You have another limitation in Dynacord mixers. The total effects that you can apply on all rows at the same time are no more than two effects. It may be necessary to provide three different effects to three microphones in one application.</p> <p dir="ltr">Well, it makes sense that a dinosaur mixer won't work for you.</p> <h2 dir="ltr">What is the volume effect for?</h2> <p dir="ltr">Effect volumes control the amount of effects the device has on each of the sound lines. Put simply, the higher the volume, the more repetitive the sound repeating after the original sound. The volume of the effect depends on several things compared to the original sound:</p> <ul> <li dir="ltr" style="text-align: left;">Volume effect of each line</li> <li dir="ltr" style="text-align: left;">Effect type set for the device</li> <li dir="ltr" style="text-align: left;">Feeder effect rate</li> <li dir="ltr" style="text-align: left;">The amount of effects sent to the outputs</li> <li dir="ltr" style="text-align: left;">Daily rate and feedback adjusted for the effect</li> </ul> <p dir="ltr">Of course, the items I mentioned above are related to the mixer itself. It is quite logical that the type of microphone and the type of bands and equalization set on each band will affect the type of sound and the type of sound of the effect. Usually in the tables, the sound of the memory is adjusted in such a way that after each word, the same word is repeated with the same volume. I will explain how to adjust the sound effects in the future.</p> <p dir="ltr">Some programs use two effects for each sound line at the same time. This is completely experimental. In some ensembles, two mono and stereo effects are used simultaneously when the praise in the midst of passionate praise begins to act. If you combine the menu effect with Daily 60ms with other effects at the same time, the sound is usually laser. Of course, this is completely experimental.</p> <p dir="ltr">I suggest you read <a href="/Digital-screen-in-Dynacord-mixer">this article</a> to learn how to adjust the effect.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/ولوم-افکت-در-میکسر-دایناکورد" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:62https://mixseda.com/parametric-equalizerParametric equalizer<p><img src="/images/uploaded/blog01/067_1000.webp" alt="Parametric equalizer" width="100%" /></p> <h2 dir="ltr">introduction</h2> <p dir="ltr">In most <a href="/analog-mixer">analog mixers</a> we have a parametric <a href="https://en.wikipedia.org/wiki/Equalization_(audio)">equalizer</a> to adjust the volume of each line. In many digital mixers this equalizer is also available, but the difference is that in digital mixers this part is usually applied digitally to the <a href="https://en.wikipedia.org/wiki/Audio_signal">audio signal</a>.</p> <p dir="ltr">In older mixers, we had two volumes to adjust the volume, one to adjust the volume and the other to adjust the sharpness. After a while a volume was added to the parametric equalizer. This was the average volume. Working with these volumes is more experimental. By increasing the volume of the medium volume, the sound becomes louder.</p> <p dir="ltr">In more professional mixers such as the <a href="/dynacord-company">Dynacord</a> <a href="/powermate-2200-3">PM 2200 mixer</a>, another volume called KHz has been added to these volumes, which helps to apply the Mid volume to different hertz of the audio signal.</p> <p dir="ltr">In the slightly more professional mixers we have two Mid volumes. One of these volumes is called HiMid and the other is LoMid. And it makes sense to have two KHz volumes since we have two Mid volumes.</p> <p dir="ltr">In some analog mixers, we have a 10 to 15 band equalizer for each of the audio input lines, but it is more professional than digital mixers which have no restrictions on giving an equalizer to the lines. Well, in this article I will go through each of these volumes:</p> <ul> <li dir="ltr" style="text-align: left;">Acoustic volume control (Hi)</li> <li dir="ltr" style="text-align: left;">Bass Volume Control (Lo)</li> <li dir="ltr" style="text-align: left;">Medium volume</li> </ul> <p>&nbsp;</p> <p><img src="/images/uploaded/blog01/068_1000.webp" alt="Parametric equalizer" width="100%" /></p> <h2 dir="ltr"><br />Acoustic volume control</h2> <p dir="ltr">This volume has different names in different mixers. But the most common are the names (Hello). The function of this volume is to control the underlying volume. The higher the volume, the clearer the line input sound will be. In fact, this volume controls the high frequencies. Be careful in setting the volumes (Hello). One reason for whistling may be high volume.</p> <p dir="ltr">Excessive volume (Hi) causes scratches and air in the sound. What I mean is that the death in the harrow increases. It also annoys the listener too much. Some fans like the high pitched sound so the sound has to be high pitched in order to get their attention. Be sure to note that the sound should be balanced so that the listener does not get tired of listening to it or the sound is not disturbed.</p> <h2 dir="ltr">Volume control</h2> <p dir="ltr">This volume is for controlling the low frequencies. This volume is also known by various names such as bass, but the most common is Lo. The higher the volume, the higher the volume. I intend to increase the volume of the singer's or praise's voice. The lower the volume, the louder the sound.</p> <p dir="ltr">For example, if you play a song from one line. Increasing the bass volume increases the bass volume and the drum beat. I suggest you try not to increase this volume too much. Boosting low frequencies with loud noises can severely damage the listener.</p> <p dir="ltr">In the scoreboards, try adjusting the volume (Hi) for the praise voice more than the volume (Lo) so that the praise voice is clear. For the Zakir sound, the higher the volume of Lo (Hi) than the volume (Hi), the lower the sound. Especially when saying dhikr as "Hussein", the voice is heard much better. However, try to keep these relationships in balance so that the words spoken by the reader or praise are clear to the listener.</p> <p dir="ltr">If the volume is high, the microphone may pick up the feedback sound of the bands and create a "wow" sound in the bands. Of course, this depends on several things, such as:</p> <ul> <li dir="ltr" style="text-align: left;">To adjust the bands</li> <li dir="ltr" style="text-align: left;">Sound coming out of the mixer</li> <li dir="ltr" style="text-align: left;">To adjust the microphone</li> <li dir="ltr" style="text-align: left;">Microphone type</li> <li dir="ltr" style="text-align: left;">Band type and band equalization</li> <li dir="ltr" style="text-align: left;">Amount of gain and sound power supply</li> <li dir="ltr" style="text-align: left;">Position of bands and subwoofers</li> <li dir="ltr" style="text-align: left;">AND…</li> </ul> <h2 dir="ltr">Volume kHz (KHz)</h2> <p dir="ltr">In a parametric equalizer, this volume depends on the average volume. In effect, this volume determines which signals the mid-range volume is applied to. Or rather, this volume is used to determine the frequency of the midrange. Well, in my opinion, using this volume is entirely experimental, and the more I think about it, the more I come to the conclusion that I can't explain it in writing. One thing I want to point out here is that sometimes the sound of the praise or singer's voice becomes a horn. This can be due to several things:</p> <ul> <li dir="ltr" style="text-align: left;">Medium-high volume</li> <li dir="ltr" style="text-align: left;">Lack of volume adjustment (KHz)</li> <li dir="ltr" style="text-align: left;">The genre type of the singer's voice</li> <li dir="ltr" style="text-align: left;">Type of bands and their equalization</li> <li dir="ltr" style="text-align: left;">Use of inappropriate and poor quality microphones</li> <li dir="ltr" style="text-align: left;">Wrong setting of the main equalizer of the mixer</li> </ul> <h2 dir="ltr">Medium volume</h2> <p dir="ltr">The volume of the mids, also known as the mids, is used to adjust the average frequency. Medium volume is used in many boards to thicken the sound of memory. It is also called the "exhaust" sound. To do this, set the kHz volume to about 5KHz in the middle. Now, by reducing the volume of the mid-range, the sound becomes more voluminous. Note that the higher the kHz volume, the louder the sound will be.</p> <h2 dir="ltr">Notes</h2> <ul> <li dir="ltr" style="text-align: left;">The volumes (Hi) and Lo (LO) are opposite to each other. If you have a whistle in the letters "s" and "sh", you can increase the volume of Lo instead of decreasing the volume (Hi).</li> <li dir="ltr" style="text-align: left;">Try not to change these volumes when the sound is playing from the line.</li> <li dir="ltr" style="text-align: left;">The slightest change during audio playback is clearly recognizable to the listener. Especially in the medium and kilohertz volumes.</li> <li dir="ltr" style="text-align: left;">Try to preset the volumes before starting and do not touch them during the program.</li> <li dir="ltr" style="text-align: left;">Adjust the parametric equalizer for each person individually because people's sex is different.</li> <li dir="ltr" style="text-align: left;">Some people's larynx is already damaged for various reasons and their voice is scratched. For these people, try increasing Lo's sound so that their scratches don't bother the listener.</li> </ul> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/اکولایزر-پارامتریک" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:60https://mixseda.com/voice-filter-button-on-the-sound-mixerVoice filter button on the sound mixer<p><img src="/images/uploaded/blog01/066_1000.webp" alt="Voice filter button on the sound mixer" width="100%" /></p> <h2 dir="ltr">Voice filter button in the mixer</h2> <p dir="ltr">The Voice Filter button on <a href="/dynacord-company">Dynacord</a> <a href="/what-is-a-sound-mixer">mixers</a> is <a href="/locate-button-on-the-sound-mixer">locuted</a> below the Lo Cut button. The function of this button is to increase the oscillation of the <a href="https://en.wikipedia.org/wiki/Audio_signal">sound signal</a>.</p> <p dir="ltr">It makes sense that as the signals increase, the sound quality also increases. This button increases the sound quality up to three times in a given frequency range. Typically in most staves, this button is used on the fan microphone line.</p> <h2 dir="ltr">How the voice filter button works in the mixer</h2> <p dir="ltr">If this button is activated, the frequencies responsible for the quality, resolution and clarity of the sound will be separated from the inappropriate frequencies in a better order and arrangement and enter the preamp. Which ultimately increases the purity of the sound and corrects the noise and <a href="https://en.wikipedia.org/wiki/Distortion">distortion</a> of the sound. With an example, let me tell you that if there are ten kilograms of metal bullets in a container and you put all those bullets in this sieve to separate large and small and you only want to use small bullets, you will see that large bullets remain inside the sieve small bullets are launched and a percentage of your inventory will be practically subtracted.</p> <p dir="ltr">We have provided this example so that dear users know that when the Weiss filter key is active, the volume and sound quality will be subtracted from its volume, and to compensate for this volume, the user will need high-pitched, low and medium together with Open More the volume slider (feeder) of the sound so that it has the same volume as the transparency.</p> <p dir="ltr">Keep in mind that the <a href="/locate-button-on-the-sound-mixer">Locut</a> and Weiss filter keys, when exposed to dust, will interrupt the sound and interfere with quality, so prevent dust and moisture from reaching your device.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/دکمه-وویس-فیلتر-در-میکسر" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:58https://mixseda.com/locut-button-on-the-sound-mixerLo Cut button on the sound mixer<p dir="ltr"><img src="/images/uploaded/blog01/065_1000.webp" alt="Lo Cut button on the sound mixer" width="100%" /></p> <p dir="ltr">The Lo Cut button on <a href="/dynacord-company">Dynacord</a> <a href="/what-is-a-sound-mixer">mixers</a> is located below the <a href="/gain-in-the-mixer">Gain volume</a>. This button is used to remove sounds with a frequency below 80 Hz. Usually in this range the signals are related to the sound of the air and the bass of the audio. Obviously, I must say that signals below 80 Hz are not completely eliminated by pressing this button. In fact, this button is used to apply a special type of filter or <a href="https://en.wikipedia.org/wiki/Equalization_(audio)">equalizer</a> to the input sound.</p> <p dir="ltr">By pressing this button, you will hear signals below 80 Hz less than other <a href="https://en.wikipedia.org/wiki/Signal">signals</a>. But these signs still exist. In audio work, never try to eliminate a hertz or a range of hertz as this will drastically change the sound material. Always try to reduce the amount of annoying signals by applying an equalizer correctly.</p> <p dir="ltr">If you encounter any problems or ambiguities in the educational materials and articles on the <a href="mixseda.com">Mixseda site</a>, we would appreciate if you let us know so that we can correct it.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/دکمه-لوکات-در-میکسر" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:56https://mixseda.com/gain-in-the-mixergain in the mixer<p><img src="/images/uploaded/blog01/063_1000.webp" alt="gain in the mixer" width="100%" /></p> <h2 dir="ltr">What is the gain?</h2> <p dir="ltr">The gain volume in the mixer is a volume below the <a href="/input-control">input</a> sections of each channel. The job of this volume is to amplify the sound and adjust the amount of input signals from each of the sound lines to the <a href="/what-is-a-sound-mixer">mixer</a>.</p> <p dir="ltr">The higher the volume, the more sensitive the <a href="https://en.wikipedia.org/wiki/Microphone">microphone</a> is to ambient sounds. And the lower the volume, the lower the sensitivity of the sound. Increasing the volume gain usually causes the bands to hiss (distortion of the sound and feedback).</p> <p dir="ltr">I will explain why in the next articles. Usually before the ceremony, be it concerts or groups, the volume is preset and is not touched during the program.</p> <p dir="ltr">The slightest change in Volume Gain during audio playback is clearly visible. So, if you are going to change this volume while the singer or fan is reading, be very kind and gentle with this volume. Try to do this as much as possible when no sound is playing from that line.</p> <h3 dir="ltr">Adjusting the volume gain depends on several things:</h3> <ul dir="ltr"> <li>Microphone type</li> <li>Microphone equalization type</li> <li>The gender of the singer or the praise</li> <li>Distance of the microphone from the person</li> <li>To position the microphone and its height</li> <li>The direction of the <a href="/what-is-a-speaker">speakers</a> and their downward angle</li> <li>The type of mixer the sound engineer works with</li> <li>Mixer equalization and output sound</li> <li>The type of effect set for each sound line</li> <li>The amount of feeders in each row and the sound that comes out of each row</li> </ul> <p dir="ltr">In some other normal or old mixers you don't have a volume called Gain. In fact, the gain is combined with the power supply in each row and there is usually a screw called volume. You can see this mainly in standing mixers. For example, the <a href="https://www.dynacord.com/">Dynacord</a> <a href="/pm-502">PM 502 power mixer</a> is like this.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/ولوم-گین-در-میکسر" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:54https://mixseda.com/insert-jack-in-mixerInsert jack in mixer<p><img src="/images/uploaded/blog01/061_1000.webp" alt="Insert jack in mixer" width="100%" /></p> <h2 dir="ltr">Insert the jack into the audio mixers</h2> <p dir="ltr">The insert jack in the mixer is designed for simultaneous sound input and output. If you remember, in the <a href="/line-input-in-the-mixer">previous article (line input in the mixer)</a> I told you that the <a href="https://en.wikipedia.org/wiki/Microphone">microphone</a> <a href="/mixer-microphone-input">input (Mic)</a> and the <a href="/line-input-in-the-mixer">line</a> (Line) are not used at the same time.</p> <p dir="ltr">Or at least I suggest you don't use both at the same time. This is because it interferes with sound signals. Of course, this jack is also used for audio output. The insert is a <a href="/Audio-connectors">TRS connector</a>. This means that, if you remember, the only difference with the line input is that it is two channels (Stereo).</p> <p dir="ltr">One thing here is that we have a dynamic equalizer in every sound line in the <a href="/dynacord-company">Dynacord</a> mixers. Of course, I will cover this section in full in the not too distant future.</p> <p dir="ltr">But just know that there are three to four volumes in each row for a dynamic equalizer. The task of these volumes is to adjust the volume of the incoming sound. These volumes are located under the Gain volume.</p> <p dir="ltr">These volumes are generally known as HI, LO, MID and KHz in different mixers. What I want to point out in this article is that if you insert a plug into the insert input, the one-line dynamic equalizer will not work. In the mixer, control of the insert's output is performed using volume gain.</p> <p dir="ltr">An insert jack is usually used to connect a compressor or effector or to output audio for audio recording. Well, it is quite logical that if you output from this jack, the effects applied in the line you output from will not apply to the insert output. This means that the sound is completely dry. The following figure shows the output and input circuit to the insert jack.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/062_1000.webp" alt="Get the output and input of the insert jack into the mixer" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Get the output and input of the insert jack into the mixer</h2> <p dir="ltr">Well, there are some spots in Injet. First, use a high quality cable to connect the upper circuit to the device. Using non-standard high circuit cables can cause conversion noise. Or connecting the cable wires can cause serious damage to the mixer or devices connected to the converter. If the cable is connected, the entire line of the main unit is likely to burn out, which could cost you a lot in this situation. Secondly, you need to insert a stereo plug into the insert, and if you insert a mono channel into this section, the main microphone will turn off.</p> <p dir="ltr">My advice is not to use this section as much as possible. If you are doing this, be very careful that the solder type and conversion cable are safe. I suggest you check the soldering every time you want to use this cable. And place the cable in a place where it is not damaged after each use. Or not spoiled.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/064_1000.webp" alt="Get the output and input of the insert jack into the mixer" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/جک-اینسرت-در-میکسر" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:52https://mixseda.com/line-input-in-the-mixerLine input in the mixer<p><img src="/images/uploaded/blog01/060_1000.webp" alt="Line input in the mixer" width="100%" /></p> <h2 dir="ltr">introduction</h2> <p dir="ltr">Line input is commonly used to connect electronic devices. Electronic instruments such as a <a href="https://en.wikipedia.org/wiki/Personal_computer">computer, laboratory</a> or any high-level signal device such as additional mixers, effects and ... The line jack is also used for series mixers and power mixers. Of course, the Line input is a Mono input. This means that this load has one channel and no separate left and right channels (Stereo). Also know that balanced sounds are called NOT balanced sounds and NOT balanced sounds are called NOT balanced sounds.</p> <p dir="ltr">Usually in <a href="/analog-mixer">analog mixers</a> that have both a microphone input (XLR) and a line input (TS) <a href="/Audio-connectors">connector</a>, these two should not be used at the same time. Since the input signals interfere with each other, they will reduce the level of the input sound. Of course, it's not just about <a href="/types-of-mixers">mixers</a> and if we connect two input signals to an input line to the inputs of any device, such as a computer, these two signals interfere with the sound and reduce each other's volume.</p> <p dir="ltr">In other words, the simultaneous use of line input and microphone (Mic) interferes with the audio signals and thus reduces the sound level. It is less common for professionals to use the line input to inject <a href="https://en.wikipedia.org/wiki/Microphone">microphone</a> sound into a <a href="/what-is-a-sound-mixer">mixer</a>. This input is typically used to connect other electronic equipment to mixers. Of course, I don't know the exact reason for this, but I assume that in some mixers, 48+ or Phantom Power are not applied to the line input.</p> <p dir="ltr">I hope the content provided will be useful to you. Anyway, if you have any ambiguity or problem in the above content, I will be happy for you to share it with us….</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/ورودی-لاین-در-میکسر" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:50https://mixseda.com/mixer-microphone-inputMixer microphone input<p><img src="/images/uploaded/blog01/059_1000.webp" alt="Mixer microphone input" width="100%" /></p> <h2 dir="ltr">introduction</h2> <p dir="ltr">This input, also known as the Mic input in mixers, usually has an <a href="/Audio-connectors">XLR connector</a>. This connector is usually used to connect a microphone to mixers. This type of input is also known as a cannon.</p> <p dir="ltr">So don't be surprised if you hear somewhere that says hollow cannon. I suggest you read the section on <a href="/Audio-connectors">audio connectors</a> to understand it better. As far as I can remember, all microphones have cannon connectors, with the exception of the old microphones, which, as far as I remember, had a cannon connector. This input is extremely quiet and generally any microphone can be connected.</p> <p dir="ltr">I suggest that you use good quality microphone cables to connect the microphone to this input, as using a non-standard cable and incorrect soldering can damage the <a href="https://en.wikipedia.org/wiki/Electrical_device">electronics</a> of the <a href="/what-is-a-sound-mixer">mixer</a> or cause noise in the input sound. While it doesn't cause noise, it will definitely weaken the sound.</p> <h2 dir="ltr">Phantom power button on the mixer input</h2> <p dir="ltr">When connecting condenser <a href="https://en.wikipedia.org/wiki/Microphone">microphones</a> to mixers, you need to keep in mind that you need to activate the Phantom Power button. The location of this button varies in different mixers, and there are also a number of converters for mixers that convert the input to phantom power using a battery. In fact, by activating the phantom button, 48+ volts of power are fed into the microphone through the mixer. I'll cover this in a separate article. Just know that you need to disable this button when using dynamic mics.</p> <p dir="ltr">If you have any problems or serious ambiguities in the above content, please let us know in the comments section so we can correct it.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/ورودی-میکروفن-میکسر" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:48https://mixseda.com/dynacord-mixer-trainingDynacord mixer training<p><img src="/images/uploaded/blog01/057_1000.webp" alt="Dynacord mixer training" width="100%" /></p> <h2 dir="ltr">introduction</h2> <p dir="ltr">As the use of Dynacord mixers is very common in Iran, I intend to provide you with complete tutorials on this mixer on the <a href="mixseda.com">MixSeda website</a>.</p> <p dir="ltr">The first thing about these tutorials is that the tutorials are my personal experience and may have some drawbacks. If you have any issues or ambiguities in these tutorials, please let us know in the comments section.</p> <p dir="ltr">Secondly, these tutorials are expressed in plain language and can be easily learned by first-time users of <a href="/dynacord-company">Dynacord mixers</a>. The third of these tutorials is for the Dynacord <a href="/powermate-600-3">600</a>, <a href="/powermate-1000-3">1000</a>, <a href="/powermate-1600-3">1600</a> and <a href="/powermate-2200-3">2200</a> models.</p> <p dir="ltr">However, many parts of it are general concepts and can be used in many other mixers. The fourth point is that in Dynacord mixers there is not much <a href="/difference-mixer-and-power-mixer">difference between CMS and PM</a> models, so many of these parts are common among power mixers and no power mixers. And the last point is that this tutorial series does not include the <a href="/pm-502">PM 502</a> mixer, although some content is related to this mixer.</p> <h2 dir="ltr">Targets</h2> <p dir="ltr">Dynacord mixers are used in many councils, schools and mosques. The reason for this reception is actually the low price of these mixers relative to their capabilities. Furthermore, learning Dinacor devices is very simple and does not take much time. What we are faced with is that in many places all the capabilities of these mixers are not being used properly; My purpose in writing this is to help the sound engineers minimize the recording pain points, especially in the staff.</p> <p dir="ltr">In future articles, I will introduce Dynacord mixers and how to work with them. I sincerely hope the <a href="https://dynacord.com/">Dynacord</a> device training will be useful to you. Below, I suggest that to view Dynacord training related content in plain language, simply click on any of the topics mentioned in the following section.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/058_1000.webp" alt="Dynacord mixer training" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Training topics</h2> <p dir="ltr">For your convenience, dear ones, I prefer to express the chapters of this training on this page so that you can choose the training you want by visiting this page in the future.</p> <ol> <li dir="ltr" style="text-align: left;"><a href="/mixer-microphone-input" rel="bookmark">Mixer microphone input</a></li> <li dir="ltr" style="text-align: left;"><a href="/line-input-in-the-mixer" rel="bookmark">Line input in the mixer</a></li> <li dir="ltr" style="text-align: left;"><a href="/insert-jack-in-mixer" rel="bookmark">Insert jack in mixer </a></li> <li dir="ltr" style="text-align: left;"><a href="/gain-in-the-mixer" rel="bookmark">gain in the mixer </a></li> <li dir="ltr" style="text-align: left;"><a href="/LoCut-button-on-the-sound-mixer" rel="bookmark">Lo Cut button on the sound mixer </a></li> <li dir="ltr" style="text-align: left;"><a href="/voice-filter-button-on-the-sound-mixer" rel="bookmark">Voice filter button on the sound mixer </a></li> <li dir="ltr" style="text-align: left;"><a href="/parametric-equalizer" rel="bookmark">Parametric equalizer </a></li> <li dir="ltr" style="text-align: left;"><a href="/fx-volume-in-dynacord-mixer" rel="bookmark">FX Volume in Dynacord mixer </a></li> <li dir="ltr" style="text-align: left;"><a href="/audio-output-volumes-in-each-row" rel="bookmark">Audio output volumes in each row </a></li> <li dir="ltr" style="text-align: left;"><a href="/pan-volume-in-the-sound-mixer" rel="bookmark">pan Volume in the sound mixer </a></li> <li dir="ltr" style="text-align: left;"><a href="/Pre-Fader-Listen" rel="bookmark">Pre Fader Listen </a></li> <li dir="ltr" style="text-align: left;"><a href="/mute-button-in-dynacord-mixer" rel="bookmark">Mute button in Dynacord mixer </a></li> <li dir="ltr" style="text-align: left;"><a href="/feeders-and-signal-lights-in-sound-mixers" rel="bookmark">Feeders and signal lights in sound mixers </a></li> <li dir="ltr" style="text-align: left;"><a href="/effect-control-jack-in-dynacord-mixer" rel="bookmark">Effect control jack in Dynacord mixer </a></li> <li dir="ltr" style="text-align: left;"><a href="/fx-send-output" rel="bookmark">Fx Send output </a></li> <li dir="ltr" style="text-align: left;"><a href="/apply-effects-to-mon-and-aux-outputs" rel="bookmark">Apply effects to MON and AUX outputs </a></li> <li dir="ltr" style="text-align: left;"><a href="/apply-effects-in-master" rel="bookmark">Apply effects in Master </a></li> <li dir="ltr" style="text-align: left;"><a href="/aux-in-dynacord-mixers" rel="bookmark">AUX in Dynacord mixers </a></li> <li dir="ltr" style="text-align: left;"><a href="/mon-in-dynacord-mixers" rel="bookmark">Mon in Dynacord mixers </a></li> <li dir="ltr" style="text-align: left;"><a href="/rca-inputs-and-outputs" rel="bookmark">RCA inputs and outputs </a></li> <li dir="ltr" style="text-align: left;"><a href="/dynacord-device-outputs" rel="bookmark">Dynacord device outputs </a></li> <li dir="ltr" style="text-align: left;"><a href="/power-amp-input-in-dynacord-mixer" rel="bookmark">Power amp input in Dynacord mixer </a></li> <li dir="ltr" style="text-align: left;"><a href="/dynacord-mixer-lamp-input" rel="bookmark">Dynacord mixer lamp input </a></li> <li dir="ltr" style="text-align: left;"><a href="/standby-button-in-the-sound-mixer" rel="bookmark">Standby button in the sound mixer </a></li> <li dir="ltr" style="text-align: left;"><a href="/graphic-equalizer" rel="bookmark">Graphic equalizer </a></li> <li dir="ltr" style="text-align: left;"><a href="/amplifier-power-control-light" rel="bookmark">Amplifier power control light </a></li> <li dir="ltr" style="text-align: left;"><a href="/digital-deck-in-the-dynacord-mixer" rel="bookmark">Digital screen in Dynacord mixer </a></li> </ol> <p dir="ltr"><br />I think you will know everything and be able to easily set up a mixer using these 27 about Dynacord mixer tutorials. If you think I haven't explained the article, thank you for letting us know through this page.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/آموزش-دایناکورد" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:46https://mixseda.com/audio-connectorsAudio connectors<p><img src="/images/uploaded/blog01/049_1000.webp" alt="Audio connectors" width="100%" /></p> <h2 dir="ltr">introduction</h2> <p dir="ltr">If you are also a sound engineer or are planning to become a sound engineer, it is important to know the types of audio connectors and jacks. Connector names are very important and are somewhat a prerequisite for the job. In fact, the connectors are used to connect two cables to transmit audio to each other.</p> <p dir="ltr">Basically, there are many types and categories of audio connectors that neither my knowledge nor my time will allow them to be fully introduced. In this site I want to introduce you to a limited number of the most used ones.</p> <h2 dir="ltr">XLR connector</h2> <p dir="ltr">This connector is usually used for (Balance) connections such as a microphone to the <a href="/what-is-a-sound-mixer">audio mixer</a> and for the output from mixers to power. This connector is also used to send the mixer to active bands. The good thing about these connectors is that there is no noise inside them. This connector consists of two types of male and female, which are usually male for signal input and female for signal output. Of course, there are no restrictions on the use of inputs and outputs in this connector, and what I have said is only a contract between the manufacturers of electronic equipment. There are three pins in this connector:</p> <ul dir="ltr"> <li>Pin number one: Shield or Homa is a ground connection.</li> <li>Pin number two: positive pole</li> <li>Pin number three: negative pole</li> </ul> <p>&nbsp;</p> <p><img src="/images/uploaded/blog01/050_1000.webp" alt="XLR connector" width="100%" /></p> <p>&nbsp;</p> <h2 dir="ltr">TS connector</h2> <p dir="ltr">This TS Unbalance connector is available in quarter and eighth inch sizes. This connector is commonly used in mixers, power mixers and <a href="https://en.wikipedia.org/wiki/Guitar_amplifier">amplifiers</a>. The audio transmission in this connector takes place in single channel and mono (Mono). The standard professional connector has a 1/4 inch (6.35mm) diameter. Its smallest size, used for portable devices such as cell phones and laptops, is 3.5mm (one eighth of an inch).</p> <p dir="ltr">&nbsp;</p> <p><img src="/images/uploaded/blog01/051_1000.webp" alt="TS connector" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">TRS connector</h2> <p dir="ltr">This Cain connector is shaped like a Balsnce, available in quarter and eighth inch sizes. This connector is typically used for inline and stereo sound transmission. Of course, this connector is also widely used for records. In some mixers, you will see that there is a jack called insert, which has different uses, and I will talk about this in a separate article. Just know that this connector is also used for the output from the insert jack. Among the mixers with this jack are <a href="/dynacord-company">Dynacord</a> mixers.</p> <p dir="ltr">&nbsp;</p> <p><img src="/images/uploaded/blog01/052_1000.webp" alt="TRS connector" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">RCA connector</h2> <p dir="ltr">This connector is in the form of UNBalance. This connector is used for both audio and video transmission. Surely you've seen these connectors too. The connectors are connected to the AV cables. In televisions, these connectors are used to transmit audio and video from other devices such as DVDs or VCDs. In <a href="/digital-mixers">digital</a>, <a href="/analog-mixer">analog</a> and <a href="/DJ-Mixer">DJ mixers</a>, these connectors are also used for audio input and output. Mixers usually have a section called REC Send or Record و which is used to <a href="https://en.wikipedia.org/wiki/Sound_recording_and_reproduction">record sound</a>. Usually in analog mixers, the connector in this section has an RCA connector. Among these mixers we can mention the Dynacord mixers.</p> <p dir="ltr">&nbsp;</p> <p><img src="/images/uploaded/blog01/053_1000.webp" alt="RCA connector" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Speakon connector</h2> <p dir="ltr">This connector is used to connect amplifiers (power supplies). But most of it is used to connect bands. Due to the connector's ability to lock, this connector has many capabilities. On the back of the mixers there are usually 2 Speakon connectors which are used to output the sound to the <a href="/what-is-a-speaker">bands and speakers</a>.</p> <p dir="ltr">&nbsp;</p> <p><img src="/images/uploaded/blog01/054_1000.webp" alt="Speakon connector" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Powercon connector</h2> <p dir="ltr">At first glance, the slim connector is very similar to the Speakon connector. And it can be said that almost the same structure is used in it. This connector is used to transfer power to active bands. This connector is capable of passing direct current up to 40 amps. And thanks to its sturdy plastic body, it's impact resistant. In other words, we are confident it will not break in any way. Another advantage of this connector is that, because it is similar to Speakon connectors, it can be locked.</p> <p dir="ltr">&nbsp;</p> <p><img src="/images/uploaded/blog01/055_1000.webp" alt="Powercon connector" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/کانکتور-های-صدا" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:44https://mixseda.com/amplifier-classesAmplifier classes<p><img src="/images/uploaded/blog01/040_1000.webp" alt="Amplifier classes" width="100%" /></p> <h2 dir="ltr">Class A amplifier</h2> <p dir="ltr">These amps are the best amps in terms of quality. Vacuum lamps also fall into this category. Lamps are sometimes worth millions for high quality WiFi systems.</p> <p dir="ltr">But in the transistor type, these amplifiers are designed in such a way that their transistor is always on and at its specific operating point, and as soon as the signal enters, it amplifies it and gives it to the output.</p> <h2 dir="ltr">Advantages and disadvantages of the class A amplifier</h2> <h3 dir="ltr">Benefit</h3> <p dir="ltr">The amplifier is of the highest quality, especially if we use good transistors. The frequency response of the amplifier is also nearly linear and is sensitive and amplifies frequencies that have a weak amplitude. So the best option for headphone amps and some monitor <a href="/what-is-a-speaker">speakers</a> are very high quality systems.</p> <h3 dir="ltr">Disadvantages</h3> <p dir="ltr">First, a very low efficiency of 6 to 25 percent.For example, if you want a 30-watt <a href="https://en.wikipedia.org/wiki/Guitar_amplifier">amplifier</a>, you need to use at least 100-watt transformers in the circuit. This is justified for less powerful consumers such as headphones, preamps, because again in general we see that a lot of power is not consumed at all, but it is very expensive for large speakers.</p> <p dir="ltr">Second, high heat and premature heating, so that it produces a lot of heat, and if this heat is especially for high power, it is more difficult to dissipate. As a result, both the transistor and the vacuum tube both become electronically more sensitive when heated and burn out quickly in the event of a small error (such as shorting the output).</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/042_1000.webp" alt="Class A amplifier" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Class B amplifier</h2> <p dir="ltr">If we do not turn on the output transistor of the amplifier and let it turn off and on again after the signal arrives, then we have designed a class B amplifier.</p> <p dir="ltr">But the problem is that the transistor cuts a certain amount of input voltage depending on whether it is a junction or a field effect, and whether it is an open junction of germanium or silicon, until it reaches the illumination threshold, so begins to amplify. This voltage is approximately 0.2 volts in germanium transistors and 0.7 volts in silicon transistors.</p> <p dir="ltr">But since silicones are more common, silicones are commonly used. But the problem is that the voltage required to illuminate the waveform distorts our waveform and causes distortion of the sound and amplification of frequencies with lower amplitudes which are not desirable at all. So even though we were able to increase the efficiency by force to 50%, the class B amplifier for audio work remains only a definition and is not used at all.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/043_1000.webp" alt="Class B amplifier" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Class AB amplifier</h2> <p dir="ltr">If we come to make transistors not always on, which is not like class A losses and body heat, and not always off to cause distortion, then we have made a class AB amplifier.</p> <p dir="ltr">So the transistors in this method are about to turn on, which cannot be said to be either off or on. This is the best working point for an amplifier to turn the amplifier on as soon as the signal arrives and start amplifying, but when there is no signal, turn it off and cause no loss.</p> <p dir="ltr">So for this cob, we need to polarize the transistors with another voltage of 0.7 so that they are on the verge of firing. This is done in three ways:</p> <ul> <li dir="ltr" style="text-align: left;">Resistor voltage distribution</li> <li dir="ltr" style="text-align: left;">Two or more bursts in a row</li> <li dir="ltr" style="text-align: left;">Transistor regulator</li> </ul> <p dir="ltr">We consider the efficiency of these amplifiers to be around 65%. The advantage of the good quality of these amplifiers is a much higher efficiency than the Class A and its commercial application.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/044_1000.webp" alt="Class AB amplifier" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Class C amplifier</h2> <p dir="ltr">These amplifiers are generally designed for high efficiency but only amplify a small portion of the input signal. Which are suitable for telecommunication circuits but have no place in audio circuits. As they will damage the sound, they are almost like Class B amplifiers but on a larger scale.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/044_1000.webp" alt="Class C amplifier" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Class D amplifier</h2> <p dir="ltr">MOSFET transistors didn't have much to say about analog signal amplifiers and amplifiers, but they were the best in switching circuits. The high switching speed of these transistors made them ideal for digital circuits and they had very high efficiency. What if these transistors fit well into high-loss industry and analog signal amplifiers?</p> <h3 dir="ltr">Build a class D amplifier</h3> <p dir="ltr">To build a class D amplifier, we had to first convert the analog signal to digital in some way, then amp it up like a switch, and finally convert it back to an analog signal. So a class D amplifier is made up of three main parts:</p> <p dir="ltr">PWM modulator; Which converts the analog signal to digital via the PWM method.<br />booster; That includes the power MOSFETs and their drivers.<br />demodulator; A device that converts a digital signal to analog.</p> <p dir="ltr">The modulators first modulate the sound signal at a frequency from about 250 to about 600 by modulating the pulse width. These signals are then ready to be turned on and switched by the MOSFETs, and finally the signal is demodulated and returned to the analog by a low pass filter which includes inductor, capacitor and resistor. The advantage of class D amplifiers is their very high efficiency, between 90 and 95%, and they produce very little heat.</p> <h3 dir="ltr">Class D amplifier quality</h3> <p dir="ltr"><strong>But at what price?</strong> Class D amplifiers are still in their infancy. They have a much lower quality than Class A amplifiers and are instead very suitable for subwoofers because they work very well at low frequencies and have considerable power and good quality (only at low frequencies). Their technology is still not good enough to say that they are at least better than the AB class. And they are by no means suitable for quality projects and are more useful for car subwoofers and finally PA subwoofers because they have high power.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/046_1000.webp" alt="Build a class D amplifier" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Class G amplifier</h2> <p dir="ltr">If we want to use class AB amplifiers for higher powers, we have to increase the efficiency again. So in class G amplifiers to use the high voltage such as 1400 volts in the power line which can support loudspeakers with high power and impedance, we divide the power supply voltage in half, which becomes 70 volts. We now use two levels of transistors, each connected 70 volts down or up. Voltage amplifiers can therefore be obtained with transistors that supply high current but do not have a good medium voltage.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/047_1000.webp" alt="Class G amplifier" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Class H amplifier</h2> <p dir="ltr">This class of amplifier is the same as class G except, for example, 135 volts, 5 volts on 1 transistor and another 130 volts on other transistors. This greatly increases the quality. It completely eliminated the distortion that was present in Class B, and this distortion was also slightly present in Class AB, and increased both the efficiency and power used to make amplifiers up to the effective power of 1500 watts.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/048_1000.webp" alt="آمپلی فایر کلاس H" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/کلاس-های-آمپلی-فایر-ها" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:42https://mixseda.com/what-is-a-speakerWhat is a speaker?<p dir="ltr"><img src="/images/uploaded/blog01/039_1000.webp" alt="What is a speaker?" width="100%" /></p> <h2 dir="ltr">introduction</h2> <p dir="ltr">Maybe you have a question what a speaker is ... pretty much anything that can reproduce sound is called a speaker, speaker, or band. Of course, Bond's story is a bit different. In fact, bulldozers that are placed in a specific box or body are called "band".</p> <p dir="ltr">You may be wondering what a speaker is, pretty much anything that can play audio is called a speaker, speaker, or band. In fact, speakers are devices that convert electrical energy into sound. The loudspeaker, together with the amplifier, is used to <a href="https://en.wikipedia.org/wiki/Guitar_amplifier">amplify the sound</a>.</p> <p dir="ltr">Well, the speaker consists of several parts. Each of these components does a specific job and their presence or absence can be critical or in some way non-critical.</p> <h2 dir="ltr">Critical parts</h2> <p dir="ltr">Critical parts are parts of the speaker that are required in all speakers to reproduce audio. In fact, in order for a speaker to reproduce sound, these parts or components are required which can do the equivalent job of these components.</p> <p dir="ltr">As you know, there are different types of speakers and not all of them follow the same structures and components. The vital parts of a speaker are the parts that exist in all speakers and are somehow the common point of all speakers.</p> <p dir="ltr">These vital parts include the following:</p> <ul dir="ltr"> <li>Diaphragm</li> <li>Surand</li> <li>Weiss Coyle</li> <li>Spider</li> <li><a href="https://en.wikipedia.org/wiki/Magnet">magnet</a></li> <li>basket</li> </ul> <p dir="ltr">In the following explanation, I will explain each of these parts to you.</p> <h3 dir="ltr">Cone</h3> <p dir="ltr">A good speaker needs a vibrating screen to produce sound, which is a mechanical wave. This screen is usually made in a conical way, but in rare cases it is made in a pyramid shape, three-sided, four-sided or six-sided (like some Sony brand subwoofers) and ...</p> <p dir="ltr">This plate is usually made of plastic, foam, paper (most commonly used), aluminum. And the genre affects the sound quality, the release of the sound. And each material is used in a specific place. For example, more paper is used in paper tapes and more plastic is used in car speakers.</p> <h3 dir="ltr">Surround</h3> <p dir="ltr">The sonic diaphragm needs a suand to control its movements and return to its place after each vibration.</p> <p dir="ltr">Surround The screen is designed around the sound diaphragm and is usually made of foam, or paper, experience shows that foams are more desirable in terms of quality, strength, durability, flexibility and repairs better than paper because if paper is torn, the only way is to replace the entire speaker diaphragm.</p> <p dir="ltr">But Surand's foam comes easily with a razor. It can be glued with iron glue.</p> <h3 dir="ltr">Coil</h3> <p dir="ltr">The loudspeaker must convert electrical energy into mechanical energy (sound). We know that the use of inductors can create mechanical force.</p> <p dir="ltr">The same thing happens with electric motors. Because the inductor around itself creates a magnetic field, and if we put this field in another field opposite to the inductor field, it becomes like two magnets that are close to each other, or if we place it in the opposite field, it's like two magnets moving away from each other. LT is.</p> <p dir="ltr">This coil is made of lacquered copper wire, aluminum (in very rare cases) and gold (WiFi audio systems worth millions) and is best wrapped around a copper or aluminum cylinder, which is comfortable to heat. and longer speaker life.</p> <h3 dir="ltr">Spider</h3> <p dir="ltr">Spider is actually a kind of heated fabric that is a bit thick, thick and hard and obviously has good flexibility in the direction of moving the voice coil. Spider's work is the same as Surandeh's, except that Surande was in control of the opening of the sound. The spider is further inside the magnet groove to control the voice coil and maintain its balance.</p> <h3 dir="ltr">Magnets</h3> <p dir="ltr">A speaker can have from one to more magnets, depending on the type. The magnet is needed to create a permanent magnetic field for the moving coil.</p> <p dir="ltr">The new and very good magnets are made of neodymium. But due to the high cost, ferrite or cerium-cobalt or alnico (a type of permanent magnet alloy) is still used instead of neodymium.</p> <h3 dir="ltr">Basket (speaker body)</h3> <p dir="ltr">A basketball is an integrated piece on which all speaker components are mounted. Baskets are usually made from strong or light metals such as iron, aluminum and, in rare cases, stone! They use and use plastic and ... it's not common at all.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/041_1000.webp" alt="Vital parts of the speaker" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Non-critical parts</h2> <h3 dir="ltr">Handcuffs</h3> <p dir="ltr">The speakers use a cover, usually made of paper or plastic, to prevent dirt from entering the voice coil and causing damage or damage to the sound. The cup is located in the center of the sound opening.</p> <h3 dir="ltr">Spider</h3> <p dir="ltr">It is true that we have also defined Spider as a vital part. But it can also be useless on Twitter. Because the moving coil of the tweeters is usually very light and the Twitter page itself does the weight and control of the voice coil.</p> <h3 dir="ltr">Double cone</h3> <p dir="ltr">This second cone is mounted on the first cone (aperture) and its function is to help certain types of loudspeakers such as the mid range and full range in the transmission and production of high frequencies so that those frequencies are better distributed.</p> <p dir="ltr">Using standard speakers is very important for sound quality and recording. So, if you use quality <a href="/power-mixers">mixer</a> for <a href="https://en.wikipedia.org/wiki/Sound_design">Sound design</a> but your sound quality is still not good, one of the reasons could be improper use of the speakers.</p> <h2 dir="ltr">All kinds of speakers</h2> <p dir="ltr">Speakers, like many audio equipment, have different types. Sometimes we see that speakers are classified according to the type of tweeter and their structures, but usually speakers are classified according to the type of audio frequency reproduction and the quality and functionality they have. I am going to introduce you to some of these types here.</p> <p dir="ltr">As you know, speakers are used for <a href="https://mixseda.com/pa-system">sound transmission</a> and the sound transmission process is not done the same in all environments. In fact, when it comes to sound, you buy a specific type of speaker based on what you need.</p> <h3 dir="ltr">Decorative speaker</h3> <p dir="ltr">Decorative speakers are wall-mounted speakers. Of course, these speakers are of higher quality than regular in-wall speakers and are usually used where sound quality matters to us.</p> <p dir="ltr">Most of these speakers have separate woofers and tweeters, so these speakers are easily able to separate the bass sounds from the underlying sounds and this increases their quality.</p> <p dir="ltr">Decorative speakers are usually used in places where sound quality is important. For example, these speakers are widely used in religious places, for speeches, entertainment venues and for playing music.</p> <p dir="ltr">Decorative bells themselves also have two different types:</p> <ul dir="ltr"> <li>2-way decorative speaker</li> <li>Full range decorative speaker</li> </ul> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/203_1000.webp" alt="Decorative speaker" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">The difference between these two types is in the internal structure of these speakers. In the 2-way version of this product, we see two woofer speakers and a tweeter in the components of this speaker. Also, a crossover is responsible for separating the sound. As a result, this type of speaker produces superior quality sound.</p> <p dir="ltr">Another type of these speakers, called full range, consists of a single speaker. These speakers have the ability to reproduce mid frequencies well. Of course, each of these types has its own uses and is used in different places.</p> <h3 dir="ltr">Monitoring speaker</h3> <p dir="ltr">In studies and when compiling large projects, the most important thing is very important to you; It is the use of speakers that can provide you with the sound you are working on.</p> <p dir="ltr">Many people prefer using a quality headphone to a monitoring speaker because headphones made for this purpose are usually cheaper and more affordable than these speakers.</p> <p dir="ltr">But in general, monitoring speakers are usually used in studios where multiple people are supposed to be working on a project at the same time. As I said, these speakers are more expensive than other speakers. The reason is clear.</p> <p dir="ltr">These speakers are professionally designed to deliver sound frequencies to your ears in the best possible way. The error rate of these speakers is very low and it can be said that everything you hear from these speakers is the same sound you are working on in your mixer.</p> <p dir="ltr">Maybe if you've worked as an amateur, you've come across projects where after mixing you realized that this sound only sounds so good from your speakers and doesn't have proper EQ sound in other speakers.</p> <p dir="ltr">This is because you didn't use any monitoring speakers during the mixing process.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/206_1000.webp" alt="Monitoring speaker" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">You can fully understand a music using these speakers. In fact, due to the separation of frequencies between them and the so-called clean sound, the monitoring speakers will play an audio file exactly as it was recorded.</p> <p dir="ltr">There are several types of monitoring speakers. Some of these speakers have an internal power source and others are able to operate using an external power source. In fact, what can be said about these speakers is that they fall into the following two categories:</p> <ul dir="ltr"> <li>active</li> <li>passive</li> </ul> <p dir="ltr">You may find active models like many bands that have a power source inside them; Make some noise. This noise is due to the <a href="/amplifier-classes">amplifier</a> used inside this type of speaker.</p> <p dir="ltr">Of course, this amount of noise can only be heard at a distance of a foot if you pay close attention to the output signals when the speaker is on and there is no sound coming out of it. Indeed, this amount of noise causes no interference in the output frequencies.</p> <h3 dir="ltr">Wall speakers</h3> <p dir="ltr"><a href="https://mixseda.com/wall-speaker">Wall speakers</a> are another type of speakers that can be installed on the wall. Wall speakers themselves are divided into many types. Some of these speakers are also designed to be placed exactly inside the wall.</p> <p dir="ltr">Only one of the wall speaker subsets are decorative speakers. Another type of wall-mountable column speaker.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/205_1000.webp" alt="Wall speakers" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">In home theaters and some small studios, they sometimes use wall-mounted speakers to get good sound. Also, in some places, they use these speakers instead of using other types of speakers due to space limitations.</p> <h3 dir="ltr">Column speakers</h3> <p dir="ltr"><a href="https://mixseda.com/column-speaker">Column speakers</a> are speakers that often have a rectangular appearance and can be installed on the wall or on a base. There are many types of column speakers. Some of these speakers are used for outdoor installation.</p> <p dir="ltr">Such speakers are of high quality and are often waterproof, dustproof and also resistant to sunlight. Due to the reasonable price of these speakers compared to other products, they are usually used in hospitals, parks and schools.</p> <p dir="ltr">These speakers have acceptable sound quality and, thanks to their metal body, are generally more durable than other speakers. These speakers are usually used for information and we rarely see that they use these speakers independently to play music.</p> <p dir="ltr">In fact, as I explained above, the most important principle for preparing a speaker is what you intend to use it for and where. Although the music can be played through these speakers, you will not see any restaurants or bars that use this speaker to play music.</p> <p dir="ltr">When playback quality becomes important and you want your customers to experience impressive music; In general, you should choose decorative speakers. In short, the purpose of column speaker construction was not specifically to reproduce the highest quality sound.</p> <p dir="ltr">Of course, in the expensive models of this product, you may also find music playback products that are tailor-made for this purpose.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/204_1000.webp" alt="Column speakers" width="100%" /></p> <p dir="ltr">As you can see in the photo above, the column speaker structure is made up of several full-range speakers. These speakers can be used both ohmic and volt.</p> <p dir="ltr">Sometimes, in special cases, they use woofers together with these column speakers so that their sound reaches the audience more favorably.</p> <h3 dir="ltr">Horn speakers</h3> <p dir="ltr">Horn loudspeakers, also known as horn loudspeakers, are loudspeakers that use an acoustic horn to reproduce sound. Usually, these speakers have more compact components than other speakers.</p> <p dir="ltr">Also, in this type of speakers, metal diaphragms are used to produce the sound, so the produced sound is transferred to the horn. These speakers do not have the ability to reproduce quality sound, but the sound produced by these speakers has a very high efficiency.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/207_1000.webp" alt="Horn speakers" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">Although the existence of an unfavorable frequency answer has prevented the use of these speakers in many places, it is the cause of the capacity to produce more volume compared to other speakers, these speakers have many uses in surround systems, in stadiums and in Grand Luoghi.</p> <p dir="ltr">Gli altoparlanti a tromba are generally classified based on the type of tromba they have. Come molti altri altoparlanti, anche questi altoparlanti hanno molti tipi. The structure of this type of speakers is used as a tutorial in many bands.</p> <p dir="ltr">Il tipo di trombe di questi altoparlanti si calla corno e parleremo di como funzioneranno in futuro. In fact, i super tutor sono chiamati corna. I tipi di corna include quanto segue:</p> <ul dir="ltr"> <li>Corni parabolici</li> <li>Multicella</li> <li>Trombe radiali</li> <li>Corna Traktrix</li> <li>Trombe a direzione fissa</li> <li>Corna di Mantara</li> <li>Bicorna radiali</li> <li>Trombe multicanale</li> </ul> <h3 dir="ltr">Ceiling speakers</h3> <p dir="ltr"><a href="https://mixseda.com/ceiling-speaker">Ceiling speakers</a> have many uses for paging. These speakers are divided into two categories based on the type of installation:</p> <ul dir="ltr"> <li>Integrated ceiling speakers</li> <li>Ceiling speakers</li> </ul> <p dir="ltr">The built-in ceiling speakers can be installed on the ceiling using screws or clips. These speakers are usually used when building a room or installing a suspended ceiling. And of course, before installing such speakers, you need to have done the necessary wiring.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/208_1000.webp" alt="Ceiling speakers" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">In large buildings or organizations, these loudspeakers are typically used in corridors to inform or broadcast announcements in emergency situations. Here we will not explain how to install these built-in speakers and it is sufficient that you are familiar with these products.</p> <p dir="ltr">In cases where the ceiling is in a single piece and it is not possible to make a hole for recessed ceiling speakers; They use the example of its coating. These speakers are usually fixed to the ceiling with screws.</p> <p dir="ltr">Of course, these speakers are only used in cases where their built-in models cannot be installed, because the use of surface-mount equipment usually draws too much attention.</p> <p dir="ltr">The ceiling speakers are mono and single channel. Of course, some of these speakers also feature wireless and wireless technologies based on the applications that are expected of them. For example, some of these ceiling speakers have Bluetooth technology.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog03/209_1000.webp" alt="Ceiling speakers with lights" width="100%" /></p> <p dir="ltr">Some of these speakers also have other features such as lamps, light dancing, etc., in addition to their work.</p> <h2>Speaker volume measurement unit</h2> <p>You may have been asked how sound and sound waves are measured. The decibel is a logarithmic unit to express the relationship between a physical quantity and a specific reference. Sound intensity is also measured in decibels.</p> <p>When shopping for speakerphones, headsets, and speakers, if you pay close attention to product packaging or specifications, you may have noticed that the sound intensity in all of these products is displayed in dB, which is an abbreviation for the unit of decibels.</p> <p>Regarding logarithmic units, it is good to know that the decrease and increase of these units are exponential. For example, in the same decibel unit, a sound of 10dB; That's ten times a 0dB sound. But a 50dB sound is a hundred thousand times a 0dB sound.</p> <p>In fact, every 10dB you add to the loudness of a sound acts as a factor of 10, and as a result, the decibel algorithm graph increases exponentially. We said about the sound intensity level, the decibel expresses the relationship between a physical quantity and a specific reference.</p> <p>In the table below I have written some sound measurements in decibels:</p> <table class="tablemix"> <tbody> <tr> <td width="60"> <p>Row</p> </td> <td width="300"> <p>Measurement reference</p> </td> <td width="212"> <p>sound volume</p> </td> </tr> <tr> <td width="60"> <p>1</p> </td> <td width="300"> <p>The sound of a terrible explosion</p> </td> <td width="212"> <p>140dB</p> </td> </tr> <tr> <td width="60"> <p>2</p> </td> <td width="300"> <p>pain threshold</p> </td> <td width="212"> <p>130dB</p> </td> </tr> <tr> <td width="60"> <p>3</p> </td> <td width="300"> <p>The sound of a jet engine</p> </td> <td width="212"> <p>120dB</p> </td> </tr> <tr> <td width="60"> <p>4</p> </td> <td width="300"> <p>The sound of rock music, the sound of children screaming</p> </td> <td width="212"> <p>110dB</p> </td> </tr> <tr> <td width="60"> <p>5</p> </td> <td width="300"> <p>The sound of the subway</p> </td> <td width="212"> <p>100dB</p> </td> </tr> <tr> <td width="60"> <p>6</p> </td> <td width="300"> <p>The sound of industrial machinery at a distance of one meter</p> </td> <td width="212"> <p>90dB</p> </td> </tr> <tr> <td width="60"> <p>7</p> </td> <td width="300"> <p>The sound of a busy street, the sound of an alarm</p> </td> <td width="212"> <p>80dB</p> </td> </tr> <tr> <td width="60"> <p>8</p> </td> <td width="300"> <p>Mobile phone ringtone</p> </td> <td width="212"> <p>70dB</p> </td> </tr> <tr> <td width="60"> <p>9</p> </td> <td width="300"> <p>Normal conversation at a distance of one meter</p> </td> <td width="212"> <p>60dB</p> </td> </tr> <tr> <td width="60"> <p>10</p> </td> <td width="300"> <p>Calm work environment</p> </td> <td width="212"> <p>50dB</p> </td> </tr> <tr> <td width="60"> <p>11</p> </td> <td width="300"> <p>Quiet residential area, park environment</p> </td> <td width="212"> <p>40dB</p> </td> </tr> <tr> <td width="60"> <p>12</p> </td> <td width="300"> <p>A quiet whisper while reading a book</p> </td> <td width="212"> <p>30dB</p> </td> </tr> <tr> <td width="60"> <p>13</p> </td> <td width="300"> <p>The sound of clock gears</p> </td> <td width="212"> <p>20dB</p> </td> </tr> <tr> <td width="60"> <p>14</p> </td> <td width="300"> <p>the sound of breathing</p> </td> <td width="212"> <p>10dB</p> </td> </tr> <tr> <td width="60"> <p>15</p> </td> <td width="300"> <p>the sound of the air</p> </td> <td width="212"> <p>1dB-10dB</p> </td> </tr> </tbody> </table> <p dir="ltr">&nbsp;</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/بلندگو-چیست" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:40https://mixseda.com/dj-mixerDJ Mixer<p><img src="/images/uploaded/blog01/034_1000.webp" alt="DJ Mixer" width="100%" /></p> <h2 dir="ltr">introduction</h2> <p dir="ltr">Some DJs use these mixers to play music seamlessly in places where <a href="https://en.wikipedia.org/wiki/Music">music</a> is played. In hip hop, they try to remix songs and create new songs and sounds using these mixers and the players attached to them.</p> <p dir="ltr">DJs who work in nightclubs and electronic music productions try to change songs smoothly.<br />The sound source for these mixers can be a phonograph screen, a cassette, a CD or in the flash memory of today's world or laptops and tablets and ...</p> <p dir="ltr">DJ <a href="/types-of-mixers">mixers</a> have a headphone output that allows the DJ to hear and adjust to the next track before the listener hears it. Many inexpensive DJ mixers have two channels, but more professional mixers can have four main input channels.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/035_1000.webp" alt="DJ mixer" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Differences with studio mixers</h2> <p dir="ltr">DJ mixers are much smaller than studio mixers or sound reinforcement systems. While an audio amplifier mixer can have up to 24 or more channels and studio mixers can have up to 96 input channels, DJ mixers typically have two to four main input channels.</p> <h2 dir="ltr">Capacity</h2> <p dir="ltr">The key feature of these mixers is that the track sent to the channel can be sent to the headphones and listened to in the headphones while the feeder is closed and not playing in the main output. This is done by the cue button.</p> <p dir="ltr">Each channel with this button activated will send its signal to the <a href="/Pre-Fader-Listen">headphone output</a> without depending on the channel power supply. Another key feature of these mixers is the cross feeder. A cross feeder is a horizontal feeder in which only the left channel sound is output when shifted to the left and only the right channel sound is shifted to the right.</p> <p dir="ltr">Four-channel mixers have a select button for each channel, which can be set to go to section 1 or section 2 of each channel at the cross-feeder. If the cross feeder is in the middle, the sound from both channels is mixed and goes to the output.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/036_1000.webp" alt="DJ mixer capabilities" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">amplifier</h2> <p dir="ltr">Some DJ mixers, especially the more expensive professional ones and those for phonographs, have a phonograph preamp to hook the cymbals to themselves.</p> <p dir="ltr">The signal received from the phonograph screens is very weak and cannot be sent to the <a href="https://en.wikipedia.org/wiki/Guitar_amplifier">amplifiers</a> without amplification.</p> <p dir="ltr">DJ mixers are also used for recording and remixing. The equalizers used in these mixers are generally three-band equalizers for each channel and use rotating volumes.</p> <p dir="ltr">From 2010 onwards, effects can also be found on DJ mixers, which can be digital or electronic. Effects like Reverb, Echo and….</p> <p dir="ltr">Some of these more expensive mixers also come with a USB sound card so they can be easily connected to computers. No additional sound card required.</p> <p dir="ltr">DJ mixers usually also have a microphone input that allows DJs to speak announcements!</p> <p dir="ltr">There is a key called kill which is present in some DJ mixers and its function is to cut a channel or frequency band from the equalizer.</p> <p dir="ltr">The mixers also have sound level meters next to each channel and for the outputs, which show the signal strength in decibels.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/037_1000.webp" alt="Amplifier in DJ mixer" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Production</h2> <p dir="ltr">The output of these mixers is usually connected to power amplifiers to amplify the signal and send it to the speakers.</p> <p dir="ltr">If DJs are mixing on radio or TV stations, their mixer output is sent to the main mixer, which is used to broadcast radio waves.</p> <p dir="ltr">If the DJ is recording a work in the studio, the output of his mixer is connected to the main mixer and then a signal is sent to the recorder, which can be a CD, a memory or a cassette.</p> <p dir="ltr">In some cases, such as live performances that are also sent to the TV, the output of these mixers is connected to the main mixer to go to both the transmitter and the main amplifiers.</p> <p dir="ltr">Some DJ mixers, in addition to headphones, also have a monitor speaker output that can directly monitor the sound playing in the system. (CABIN in the mixer below)</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/038_1000.webp" alt="DJ mixer outputs" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Source of power</h2> <p dir="ltr">These mixers are generally powered by <a href="https://en.wikipedia.org/wiki/Alternating_current">alternating current</a>, but some, built for portable work, can also run on batteries, the output of which is sent to an audio system that also runs on batteries.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/میکسر-دی-جی" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:38https://mixseda.com/sound-software-mixersSound software mixers<p><img src="/images/uploaded/blog01/033_1000.webp" alt="Sound software mixers" width="100%" /></p> <h2 dir="ltr">What are software mixers?</h2> <p dir="ltr">In fact, in today's world, <a href="https://en.wikipedia.org/wiki/Electrical_device">electronic devices</a> such as computers and cell phones have become so advanced that physical and <a href="/types-of-mixers">hardware mixers</a> are no longer required to <a href="https://en.wikipedia.org/wiki/Dubbing">mix sound</a>, and software mixers can be used to compose and mix.</p> <p dir="ltr">For sounds recorded or generated by the computer, the sounds can be combined on the computer itself. These software can mix sound like real mixers.</p> <p dir="ltr">And take the input from the computer and the output to the sound card.</p> <p dir="ltr">Plus, with audio production software like FL Studio, you don't need large mixers in <a href="https://en.wikipedia.org/wiki/Recording_studio">studios</a>.</p> <p dir="ltr">All computer-generated sounds are combined there with virtual power supplies to create the final sound.</p> <h2 dir="ltr">Examples of these mixers</h2> <p dir="ltr">Among the software mixers we can mention:</p> <ul dir="ltr"> <li>Steinberg Cubase</li> <li>Studio FL</li> <li>Adobe audition</li> <li>HYA ONDA</li> <li>sound</li> <li>Audacity</li> <li>Ashampoo Music Studio 2018</li> <li>Garage Band</li> <li>Ocenaudio</li> <li>Reaper</li> <li>MAGIX Samplitude Pro X5 Suite</li> <li>Serato DJ</li> <li>Acoustica Mixcraft recording studio</li> </ul> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/میکسر-های-نرم-افزاری" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:36https://mixseda.com/comparison-of-digital-and-analog-sound-mixersComparison of digital and analog sound mixers<p><img src="/images/uploaded/blog01/028_1000.webp" alt="Comparison of digital and analog sound mixers" width="100%" /></p> <h2 dir="ltr">introduction</h2> <p dir="ltr">Comparison of <a href="/digital-mixers">digital</a> and <a href="/types-of-mixers">analog</a> <a href="/what-is-a-sound-mixer">mixers</a>: In the past, all mixers were analog. But after the introduction of digital mixers in the 1990s, the use of digital mixers has increased dramatically.</p> <p dir="ltr">Digital mixers are more versatile than analog mixers. And they can have more performance. For example, they send a signal to a signal only with a <a href="https://en.wikipedia.org/wiki/Switch">button</a>. In addition, digital mixers also offer <a href="https://en.wikipedia.org/wiki/Signal">signal</a> processing capabilities.</p> <p dir="ltr">Such as compressor, noise gate, reverb, automatic feedback eliminator, delay and…. Digital mixers also have the ability to install plug-ins. This allows them to be up to date and any plug-ins needed to shape and shape the sound can be installed on them.</p> <p dir="ltr">On-screen digital mixers can easily show spectrum analyzers and other sound analyzers, while spectrum analyzers alone are an expensive device, and inexpensive examples don't show much accuracy and detail.</p> <p dir="ltr">Digital mixers also have better settings for speaker management. Like crossovers with very steep slopes and power limiters. Digital processor <a href="https://en.wikipedia.org/wiki/Audio_signal">signals</a> can be automatically mixed for some simple tasks.</p> <p dir="ltr">Consoles with motor starters can read or download power information.</p> <h2 dir="ltr">Comparison of diffusion delay of digital and analog mixers</h2> <p dir="ltr">One of the advantages of analog mixers is their very high speed. It appears at the output as soon as the signal enters the circuit.</p> <p dir="ltr">But digital mixers have inevitable amounts of delay. This speed can be as low as 1 millisecond or as low as 10 milliseconds, depending on how the Micro model works.</p> <p dir="ltr">This low latency is not a problem for speakers which are for listeners or even monitors. But only on in-ear monitors, both on stage and in the studio, a singer or artist can hear her voice with a delay, which is a bit unpleasant.</p> <p dir="ltr">Any analog to digital or digital to analog conversions in digital mixers will cause a delay. The inserts in these mixers to connect the effects to the basses of the mixer will double this delay.</p> <p dir="ltr">Because the signal has to be converted twice, once from analog to digital, again to analog for effect and again from analog to digital for the bass mixer. It will also delay digital format converters, such as ADAT to AES3.</p> <p dir="ltr">In a digital mixer, there can be different latency modes, depending on how busy the DSP is and how many interface buses we have used.</p> <p dir="ltr">If we process a signal in two ways and each in different ways, the effect of the comb filter on the signals could occur. Some digital mixers have a combination of methods to correct and minimize latency.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/029_1000.webp" alt="Comparison of diffusion delay of digital and analog mixers" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Comparison of the ease of use of digital and analog mixers</h2> <p dir="ltr"><a href="/powermate-2200-3">Analog mixers</a> are still popular today and it is safe to say that they will no longer be obsolete. They have dedicated columns for signals, physical losses, switches and power supplies for each channel, which are logical and familiar to many people.</p> <p dir="ltr">Analog mixers are physically very large, but you can quickly access any point and change parameters. Digital mixers greatly reduce physical space, but only if the user is able to adjust only one channel at a time.</p> <p dir="ltr">Subsequently, digital mixers have virtual screens and are layered. Each of these virtual pages has a bank of power supplies to control a section, such as controlling AUX and equalizers.</p> <p dir="ltr">This combination of levels can be confusing for some users as they do not have direct access to any of the required settings.</p> <h2 dir="ltr">Comparison between digital and analog mixers</h2> <p dir="ltr">In analog mixers, the sound path can be better understood. Of course, digital mixers also have some conveniences. For example, to change a channel, you don't need to remove the connector, but you can easily assign any input to any channel you want.</p> <p dir="ltr">On the other hand, digital mixers allow you to carry out the process of reading and modifying stored information in the simplest way. USB flash drives and other data storage devices are used to transfer previously stored data to a new location.</p> <p dir="ltr">In the new location, the sound engineer easily feeds the information to the mixer and adjusts it quickly. And quickly prepares for the new program.</p> <p dir="ltr">Some digital mixers allow you to edit the mix offline. For example, in a show, the sound engineer can quickly change the sound instead of the mixer on the laptop and play it at the same time, which speeds up some tasks.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/030_1000.webp" alt="مقایسه کاربری میکسر های دیجیتال و آنالوگ" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Comparison of the sound quality of digital and analog mixers</h2> <p dir="ltr">Both analog and digital mixers require analog preamps for the microphones. A high gain circuit that amplifies the weak microphone signal.</p> <p dir="ltr">To the extent that it mixes with the working values ​​of the mixer, so that the working point of both mixers is the same. In digital mixers, after the microphone amplifier, there is an analog-to-digital converter.</p> <p dir="ltr">Ideally, this process is specifically designed to prevent clipping of the signal, particularly from the converter.</p> <h3 dir="ltr">Audio signal processing</h3> <p dir="ltr">In digital mixers, signal processing and mixing is done with the best quality if there is no clipping or saturation in the circuits (especially the analog parts).</p> <p dir="ltr">Also, in analog mixers, saturation of the microphone amplifier or interface bus circuits must be avoided. High frequency frequencies can always be present in analog mixers.</p> <p dir="ltr">With proper mixer management, it can be reduced and unused channel power supplies and gain volumes can be completely closed. In analog mixers, even clear, unused subsets can cause hiss.</p> <p dir="ltr">In digital mixers, this problem has been solved with noise gates. Digital circuits, however, are also more sensitive to disturbances such as radio and mobile frequencies. Noise can be eliminated with noise reduction circuits and equalizers.</p> <p dir="ltr">In general, in terms of sound quality, it's hard to tell whether analog mixers are better or digital. Many professional engineers will answer this question by saying that the sound quality depends more on the microphone and speaker than on the mixer, because in both digital and analog, the sound quality is tried to be as high as possible.</p> <p dir="ltr">But which one is best depends on the location used, the recording experience and the type (model) of the console.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/031_1000.webp" alt="Audio signal processing" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">remote controller</h2> <p dir="ltr">In the past, analog mixers had the ability to use separate devices for processing tasks. But in other digital mixers, connecting other devices to the mixer is very popular. Now you can mix sounds from a computer, laptop, tablet and ...</p> <p dir="ltr">Computer networks allow you to network and control remote devices from a computer. Of course this doesn't just apply to digital mixers, but to new active bands as well.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/032_1000.webp" alt="remote controller" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Popularity</h2> <p dir="ltr">There is a huge difference in price between digital and analog mixers. You can mix the sound using analog mixers at a much lower cost. On the other hand, analog mixers require less knowledge, and in the event of a breakdown, the repair of the device will cost less.</p> <p dir="ltr">The cost of an audio mixer that works with a digital mixer is much higher than that of an audio mixer that works with an analog mixer. Also, creating an effect in a digital mixer is much more difficult than an analog mixer, because more variables and parameters are defined in digital mixers to adjust the effect.</p> <p dir="ltr">Digital mixers require more care and can be easier to steal because they are more valuable. On the other hand, the plug-ins and software installed on some of these mixers need to be updated from time to time.</p> <p dir="ltr">In light of all the cases I explained above, although digital mixers have more capabilities, analog mixers like Dynacord are more in demand in the <a href="https://en.wikipedia.org/wiki/Iran">Islamic Republic of Iran</a>.</p> <p dir="ltr">In terms of price in Iran, except for companies and large groups, other commercial organizations do not have the power to purchase and use digital mixers. Also, in many cases it is not necessary to spend a lot of money to buy a digital mixer and just have an analog mixer.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/مقایسه-میکسر-های-دیجیتال-و-آنالوگ" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:34https://mixseda.com/mirroring-two-mixers-togetherMirroring two mixers together<p><img src="/images/uploaded/blog01/027_1000.webp" alt="Mirroring two mixers together" width="100%" /></p> <h2 dir="ltr">Mirror two audio mixers together</h2> <p dir="ltr"><br />Mirroring two mixers together means that the two <a href="/types-of-mixers">mixers</a> match and coordinate with each other. Some (digital) mixers allow the two mixers to be linked together, mirrored, and their inputs, outputs and settings to be the same.</p> <p dir="ltr">So if you change the settings in one of them, the other settings will change as well. This will allow the recorder to make a single setting on each mixer.</p> <h2 dir="ltr"><br />Mirroring application of two mixers</h2> <p dir="ltr"><strong>But why use two mixers for one job and they both do the same thing?</strong></p> <p dir="ltr">In fact, one is the main mixer and the other is remotely controlled. Suppose on radio and television in important programs and ... If one of the mixers fails, the second mixer intervenes immediately and takes the first place.</p> <p dir="ltr">For example, when you are watching TV, it is unpleasant not to have audio for several hours! The second reason is in big concerts. One of the <a href="https://en.wikipedia.org/wiki/Sound_design">Sound designers</a>, which is located near the stage, may hear the sound slightly differently or may not be able to adjust and raise the <a href="/Master%20control">master's voice</a> well due to the presence of monitor bands.</p> <p dir="ltr">To do this, the second mixer in the crowd is used. To be able to convey the sound to the listener in the best possible way. Today, of course, digital mixers that allow tablets to connect and be linked have simplified things and halved the cost of using two mixers for live performance.</p> <p dir="ltr">But always in radio and television, due to the mentioned problem, two mixers should be used. Nowadays, not only some digital mixers can be remotely controlled, but also many audio devices such as bands.</p> <p dir="ltr">The digital world is slowly evolving and there will surely be a day in the future when analog mixers have completely disappeared. And it will be replaced by digital mixers.</p> <h2 dir="ltr">How to mirror two mixers together</h2> <p dir="ltr">As far as I know, this is only possible with digital mixers and to do this both mixers must be on the same computer network.</p> <p dir="ltr">You can use modems or switches to plug two audio mixers into a computer network. It makes sense that if your mixers are very far apart, you should use other tools like routers and radios to be able to communicate between your mixers.</p> <p dir="ltr"><br />For the connection between the two audio mixers to be properly justified, both mixers must be able to ping each other's <a href="https://en.wikipedia.org/wiki/Internet_Protocol">IPs</a>.</p> <p dir="ltr"><br />In the next step, you need to make settings on the two mixers so that the two mixers can exchange information with each other. Since the settings for each digital mixer in this section are different, I won't explain it.</p> <p dir="ltr"><br />Usually mixers that have this feature provide their customers with an instructional video on how to mirror two mixers.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/آینه-کردن-دو-میکسر" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:32https://mixseda.com/routing-and-patching-soundRouting and patching sound<p><img src="/images/uploaded/blog01/025_1000.webp" alt="Routing and patching sound" width="100%" /></p> <h2 dir="ltr">Routing and patching</h2> <p dir="ltr">In this article, I will explain routing and patching. Many <a href="/types-of-mixers">mixers</a> have the ability to link to each other for easy out-of-channel sound transfer.</p> <p dir="ltr">In mixers used for <a href="https://en.wikipedia.org/wiki/Sound_recording_and_reproduction">recording</a>, this function is most needed. And also a little bit for live performance mixers.</p> <p dir="ltr">Look for INSERT connectors in more professional screw-on mixers. In live performances where the number of microphones can be high, for example at least 7 for drums and one or two for singers and for example 4 for other instruments and strings, so that all these cables, separately if they want to Go to the mixer clutter the stage floor (especially if the mixer is further away from the stage). Here, routing and sound assignment are used.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/026_1000.webp" alt="Routing and patching" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">For this reason, they are connected to a patch device and reach the patch device next to the mixer via a cable known as a multipole cable. And the sound is transmitted from the patch device to the mixer.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/مسیردهی-و-پچ-کردن" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:30https://mixseda.com/sound-measurementSound measurement<p><img src="/images/uploaded/blog01/023_1000.webp" alt="Sound measurement" width="100%" /></p> <h2 dir="ltr">Sound level meter</h2> <p dir="ltr">If you look at a mixer in a program, you will see lights on indicating the volume. The set of these lights is called the vu meter or peak meter and we use these lights to find out the volume of each section or the mixer output.</p> <p dir="ltr">In digital mixers, there is usually a vu meter for each section and the volume of each section is displayed digitally on the digital mixer display. In digital mixers, the vu meter uses a much more accurate mixer, so much so that it can be safely said that digital mixers do not have the slightest mistake in this area.</p> <p dir="ltr">There is usually one or more, vu meters or peak meters, in <a href="/types-of-mixers">mixers</a>. To show the <a href="https://en.wikipedia.org/wiki/Audio_signal">signal</a> strength in each channel and master. To control the signal level and, above all, to prevent <a href="https://en.wikipedia.org/wiki/Signal">signal</a> clipping.</p> <p dir="ltr">Sound engineers usually open each channel so that even with the highest channel power supply, the signal does not clip or receive feedback. If I want to explain this concept more simply, the vu meter helps us not to distort the sound and not to go beyond its allowed limits.</p> <h2 dir="ltr">What is distortion?</h2> <p dir="ltr">All audio and music equipment has some restrictions on signal reproduction. This means that any musical instrument can produce a certain amount of loud sound, and if it goes outside its specific range, the sound will be distorted.</p> <p dir="ltr">One of the characteristics of distorted sound is the presence of a hoarse or so-called distorted sound. The distortion sound is of low quality and prevents the listener from enjoying a music due to the presence of annoying sounds.</p> <p dir="ltr">An example of a distortion is drawing nails on a chalkboard. Most people inadvertently hate this sound, and according to scientific evidence, hearing such a sound kills human brain cells.</p> <p dir="ltr">Having a distorted sound in the mix can cause the listener to dislike a piece of music, or hearing a distorted sound for a long time for a listener can cause physical harm.</p> <p dir="ltr">Despite all these disadvantages, distortion sound also has its advantages.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/024_1000.webp" alt="What is distortion?" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Benefits and applications of distortion</h2> <p dir="ltr">Distortion also has applications in various industries:</p> <ul> <li dir="ltr" style="text-align: left;">In some ceremonies and concerts, the distorted sound of a guitar or synthesizer is used to enhance the sound.</li> <li dir="ltr" style="text-align: left;">In some types of music, distorted sounds are used to create a kind of rhythm and song.</li> <li dir="ltr" style="text-align: left;">Distortion is also used to add volume to the sound.</li> <li dir="ltr" style="text-align: left;">A series of distortion sounds are used to announce or warn. (Because it has more power.)</li> <li dir="ltr" style="text-align: left;">I don't like talking about this, but in some prisons these voices are also used for torture.</li> </ul> <p dir="ltr">One of the characteristics of a good audio mixer is that the sound output from the mixer is not distorted. If you turn up the mixer volume to such an extent that the speakers cannot reproduce it, the sound will be distorted. This means that the reproduced sound loses its original quality.</p> <p dir="ltr">The equipment and instruments used to compose or mix, record or reproduce audio can have a huge impact on whether or not the sound is distorted. (Unwanted distortion)</p> <p dir="ltr">If you want to produce a distorting sound, you can use tools such as <a href="https://en.wikipedia.org/wiki/Distortion">distortion</a>. (Sometimes distortion with the name distortion is also used in sound transmission.)</p> <h2 dir="ltr"><br />Types of distortion:</h2> <p dir="ltr">Distortion can occur wherever audio signals pass. If I want to explain more simply, you have a duty to control distortion in audio recording, sound mixing, equalizer settings, sound effects settings, amplifier settings, audio output settings and so on.</p> <p dir="ltr">Distortion can occur wherever an audible signal is present. Here I want to explain some examples of distortion types:</p> <h3 dir="ltr">clipping:</h3> <p dir="ltr">You may have seen that when mixing the sound, the so called sound is clipped, the clipping of the sound is a kind of distortion of the sound that we have all experienced. If you increase the volume of the <a href="/input-control">input sound</a> or the volume of the output sound (Overdrive), the clip type sound may be distorted.</p> <p dir="ltr">In this case, the sound loses its original quality and if you turn up the volume too much, the sound quality will change.</p> <h3 style="text-align: left;">Downsampling</h3> <p dir="ltr">This type of sound distortion occurs due to the reduced transmission speed. If you reduce the audio signal by a certain amount, your audio signal loses its quality and by definition; The sound is distorted.</p> <p dir="ltr">As we have described the two types of distortion, it can be concluded that in the process of sound measurement, the amount of sound signals must be within certain limits. Neither the volume is loud enough for clipping to occur, nor is the volume low enough for downsampling.</p> <h3 dir="ltr">Impedance</h3> <p dir="ltr">Impedance As the name suggests, impedance is caused by a mismatch between audio equipment. For example, if the volume of the audio signal produced by the sound source does not match that of the microphone, impedance occurs.</p> <p dir="ltr">Sound that enters from one mixer to another, or sound that is produced or processed by one audio equipment and enters another device, will have an impedance or impedance mismatch if it is not set correctly.</p> <p dir="ltr">Sometimes you will find that you have done all the settings correctly on a mixer, but when you listen to the <a href="/Pre-Fader-Listen">PFL sound</a>, you will still find that the sound is not of the required quality. In this case it is necessary to check the inputs and the sound source in order to prevent impedance.</p> <p dir="ltr">All three of the sound distortions mentioned above are unwanted distortions, which means that in the above cases it is not intended to distort the sound, but depending on the system in which the sound is processed, the sound is distorted.</p> <p dir="ltr">Today, in many styles of <a href="https://en.wikipedia.org/wiki/House_music">House</a>, <a href="https://en.wikipedia.org/wiki/Hip_hop_music">Hip hop</a>, etc., you see the act of distorting the sound as a process of producing rhythm. In fact, if the distortion is used correctly; The distortion process is very practical and makes music very enjoyable.</p> <p dir="ltr">There are devices that produce distorted sound effects.</p> <h2 dir="ltr">Sound measurement lights</h2> <p dir="ltr">Having a signal with its maximum strength also increases the signal-to-noise ratio. The audio signal strength level meters (<a href="https://en.wikipedia.org/wiki/VU_meter">vu meters</a>) can be both on top of the master power supplies and in each channel, they can have a smaller vu meter, with, for example, two LEDs, one of which indicates the presence of the signal. Another shows signal clipping.</p> <p dir="ltr">Or a small vu meter with 4 LEDs. In non-manual vu meters, the LEDs are generally green, indicating the presence of signal and power, yellow, indicating high signal strength and clipping threshold, and red, indicating signal clips are present.</p> <p dir="ltr">VU meters are rated in decibels due to the logarithmic nature of the human auditory response.</p> <p dir="ltr">Note that correct gain setting and sound measurement have a great effect on the quality of the output sound.</p> <p dir="ltr">Just to inform you, in some mixers, such as <a href="/dynacord-company">Dynacord devices</a>, by pressing the PFL button at the bottom of each line, a portion of the vu meter is assigned to the signal level of the same line or lines. That is, the signal from the master section is displayed as a mono and single line.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/اندازه-گیری-صدا" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:28https://mixseda.com/master-controlMaster control<p><img src="/images/uploaded/blog01/021_1000.webp" alt="Master control" width="100%" /></p> <h2 dir="ltr">Main control</h2> <p dir="ltr">In audio mixers, the main sound output is called the master. Mixers with multiple audio outputs usually name their master with numbers or letters. For example, Master A and Master B. Of course, these are just names.</p> <p dir="ltr">The main control is the part of the mixer that is designed to generally adjust the main output of the mixer. Master Voice Control is one of the easiest things to do if you can't get it right, the sound may be distorted or you may not get the desired result for whatever reason.</p> <p dir="ltr">Suppose that in a live performance, where singers and musicians perform together, the master feeders allow the recorder to adjust the total volume of all of them with a single number of feeders. Or, if it's stereo, do it with two left and right power supplies.</p> <p dir="ltr">The total duration of a program; From start to finish all sound senses as well as other settings must also be at these power supplies.</p> <p dir="ltr">In conventional and low-end mixers, the master volumes are rotary, but in semi-professional and professional mixers, the main master volumes are in the form of linear volumes to the right of the mixer. (Usually the main main power supply from the left side of the audio mixer is the last power supply)</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/022_1000.webp" alt="Main control" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Main control tool</h2> <p dir="ltr">In many mixers (lying down), the master is controlled by a power supply. But in cheap (standing) mixers, this control can be done with rotating volumes.</p> <p dir="ltr">Examples of standing mixers include <a href="/powermate-1600-3">PM 1600-3</a> and examples of standing mixers include <a href="/dynacord-company">Dynacord's</a> <a href="/pm-502">PM 502</a>.</p> <p dir="ltr">Master mixers usually have sub-feeders, such as accelerators and monitors, and control the talkback microphone (a standalone microphone to communicate with those far away from it, or a singer in the studio. The room is isolated, communicates), they have a key main and also have a matrix mix (which is a mix with multiple inputs and multiple outputs).</p> <h2 dir="ltr">Position</h2> <p dir="ltr">Small mixers have their main mixer on the right side of the mixer and large mixers in the center of the mixer.</p> <p dir="ltr">The reason the master is in the middle of large mixers is the ever easier access to this part of the recorder.</p> <p dir="ltr">If in large mixers this section is to the right of the mixer as in small mixers, access to this section will be difficult for the recorder and may lose focus on handling and mixing the lines.</p> <p dir="ltr">Small mixers include the <a href="/powermate-600-3">PowerMate 600-3</a> and relatively large mixers include <a href="https://www.dynacord.com/">Dynacord's</a> <a href="/powermate-2200-3">PowerMate 2200-3</a>.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/کنترل-مستر" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:26https://mixseda.com/vca-groupsVCA groups<p><img src="/images/uploaded/blog01/019_1000.webp" alt="VCA groups" width="100%" /></p> <h2 dir="ltr">What is a VCA?</h2> <p dir="ltr">Some <a href="/digital-mixers">expensive mixers</a> with a large number of channels use VCA power supplies for convenience.</p> <p dir="ltr">This section is a subset of the mixer that allows you to control multiple channels with a single power supply.</p> <p dir="ltr">For example, suppose you have a 48-channel mixer, one part of the battery is connected to channel 3 and the other to channel 39.</p> <p dir="ltr">Due to the large size of the mixer, you have to move a lot to check each power supply!</p> <p dir="ltr">There are buttons next to each channel that send those channels to VCA groups and you can now control two channels with one power supply.</p> <p dir="ltr">This function is commonly used in digital mixers such as <a href="https://www.midasconsoles.com/">Maidas</a> mixers.</p> <p dir="ltr">The number of VCA channels can be more than two. There is a point, and that is that the channel's power supply also affects the volume.</p> <p dir="ltr">For example, if you set the channel power supply to 5dB and the other to 7dB, if the VCA power supply is fully open, it appears that those channels power supply is also on 5 and 7.</p> <p dir="ltr">And if you turn it down, the power supply starts to decrease from one to 7 and the other to 5.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/020_1000.webp" alt="What is a VCA?" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">What is the use of the VCA?</h2> <p dir="ltr">VCAs are very efficient at hearing sounds. For example, 6 mixer channels can be dedicated to drums, 4 of which to vocal sound and 5 of the mixer channels to acoustic instruments.</p> <p dir="ltr">You can separate and adjust the sounds as needed by assigning each group to a VCA controller with a power supply.</p> <p dir="ltr">For example, just open the dedicated drum power supply and listen to the drum sound, adjust the heat and growl of the drum, and finally open the next feeders to hear the effect of the adjustment on the mix.</p> <p dir="ltr">VCAs, however, aren't useful for sending signals to effects, and <a href="/input-control">AUX</a>s are better for that.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/vca" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:24https://mixseda.com/sound-mix-pathSound mix path<p><img src="/images/uploaded/blog01/018_1000.webp" alt="Sound mix path" width="100%" /></p> <h2 dir="ltr">Route of the mixture</h2> <p dir="ltr">First of all, I mean that the mix path is the path that an acoustic <a href="https://en.wikipedia.org/wiki/Audio_signal">signal</a> travels to reach the <a href="/میکسر-چیست">mixer</a> output.</p> <p dir="ltr">Each mixer channel has a volume. Which is called the power supply. And determines the volume of the channel sound in the main mix. You can see these feeders in all professional and semi-professional mixers.</p> <p dir="ltr">This volume is generally linear. But in small mixers it could rotate. Linear feeders are easier to move, allowing the recorder to easily control the volume.</p> <p dir="ltr">Rotation volumes are more difficult to control and the slightest movement can greatly affect the sound output. Rotating volumes are usually used when a certain amount of sound is used, but linear (feeder) volumes are used where it is necessary to constantly change the volume.</p> <p dir="ltr">For example, most mixers set a rotary volume for gain because you don't need to change it by default during a run. (Try to set the gain to a fixed number before starting the program and during the run adjust the volume only with the volume through the feeders).</p> <p dir="ltr">Of course, this is different in digital mixers, because these mixers have a high level of intelligence and I would like to say that the manufacturer has thought about it here, however, in digital mixers, you should also know what you were doing.</p> <p dir="ltr"><br />The signals are aggregated after passing through rows of sound and linear volumes (feeders) to form the original mixed signal, or they can go and be processed in the bass paths of the main mix subset and then return to the channels and be mixed.</p> <p dir="ltr">Meanwhile, sounds can pass through effects before arriving at the mixer or amplifier outputs, which are applied to the effects in different directions.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/مسیر-میکس" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:22https://mixseda.com/equalizers-in-the-mixerEqualizers in the mixer<p><img src="/images/uploaded/blog01/016_1000.webp" alt="Equalizers in the mixer" width="100%" /></p> <h2 dir="ltr">Check the equalizers in th e mixer</h2> <p dir="ltr">In the <a href="/what-is-a-sound-mixer">mixer</a> channel, there is an option to decrease or increase a certain amount of <a href="https://en.wikipedia.org/wiki/Frequency">frequency</a> bandwidth, which is called a dynamic equalizer.</p> <p dir="ltr">Cheap and small mixers only have bass and treble. Some other mixers have three frequency bands: low (medium), medium (medium), and high (high).</p> <p dir="ltr">In the more advanced types, they maneuver on the middle band, they can have four frequency bands, the middle range is divided into two parts: medium and medium-low.</p> <p dir="ltr">However, many <a href="/types-of-mixers">mixers</a> use a parametric equalizer in the mid-range.</p> <p dir="ltr">Many mixers have a graphic equalizer with 5 channels, usually up to 10 frequency bands, output and master.</p> <p dir="ltr">This equalizer to control the tone of the sound in the final stage, which affects the sound of all channels.</p> <h2 dir="ltr">Analog and digital equalization</h2> <p dir="ltr">In some digital mixers, this equalizer is applied digitally, which is not limited to the number of bands.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/017_1000.webp" alt="Analog and digital equalization" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">Outside the mixers, there are equalizer devices that adjust the audio signals to the desired equalizer effect.</p> <p dir="ltr">Some of these devices work digital and others work analog.</p> <p dir="ltr">Analog equalizers are generally more popular than digital equalizers for several reasons:</p> <p dir="ltr">First, the price of analog equalizers is lower.<br />Digital equalizers have a delay compared to analog equalizers.<br />It is easier and faster to use analog equalizers for live work.</p> <p dir="ltr">In Dynacord mixers, 3 to 4 volumes of dynamic equalization are designed for each line.</p> <p dir="ltr">And for the master output, there is an analog equalizer that has 9 to 15 bands (equalizer-related volume feeders) depending on the device model.</p> <p dir="ltr">This analog equalizer is usually found to the right of analog mixers.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/اکولایزر-میکسر" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:20https://mixseda.com/input-controlInput control<h2 dir="ltr"><img src="/images/uploaded/blog01/014_1000.webp" alt="Input control" width="100%" /></h2> <h2 dir="ltr">Entrance control</h2> <p dir="ltr">Below the input jacks in mixers, there are usually several volumes and knobs. Usually the first lean is the control of the gain.</p> <p dir="ltr">In <a href="/dynacord-company">Dynacord</a> mixers such as the <a href="/powermate-2200-3">PowerMate 2200-3</a>, after the gain volume, there are the dynamic equalization volumes.</p> <p dir="ltr">Dynamic EQ volumes are generally four parts. Usually after the dynamic equalization there is an AUX SEND section or signal send.</p> <p dir="ltr">Gain controls the amount of amplification or attenuation of the input signal.</p> <p dir="ltr">Most of the noise is received at this stage, so it is highly recommended to use balanced connectors to provide input to the mixer.</p> <h2 dir="ltr">Preamplifier</h2> <p dir="ltr">A <a href="https://en.wikipedia.org/wiki/Microphone">microphone</a>, connected directly to an <a href="https://en.wikipedia.org/wiki/Amplifier">amplifier</a>, may not be able to produce sound because the microphone output is very poor.</p> <p dir="ltr">Therefore, the microphone output must first be amplified.</p> <p dir="ltr">So first the amplifiers amplify this signal enough that the signal is ready to be sent to the amplifier.</p> <p dir="ltr">For some signals taken from electronic devices and sufficiently powerful, we should use a gain with lower interest rates, with numbers between 15 and 20 decibels (dB).</p> <h2 dir="ltr">Adjust the gain</h2> <p dir="ltr">For the best way to adjust the <a href="https://en.wikipedia.org/wiki/Gain_(electronics)">gain</a>, we first need to increase the gain until the clip light flickers slightly, then decrease the gain until the light goes out, in which case we want the best signal-to-noise ratio. no longer reports the clip.</p> <p dir="ltr">Plug-in connectors may be present in the mixer ducts after the preamplifier.</p> <p dir="ltr">These jacks send signals to processors or effects and receive them again after processing.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/015_1000.webp" alt=" AUX SEND" width="100%" /></p> <h2 dir="ltr"><br />Axillary Send Paths or AUX SEND</h2> <p dir="ltr">The axillaries take a branch from the channel's input signal and send it to their lows. These outputs can be connected to external devices.</p> <p dir="ltr">Axillaries can also be post-feeder or pre-feeder.</p> <p dir="ltr">In pre-feeders, this bifurcation is taken before the channel feeder and the volume of the sound sent depends on the amount of axillary volumes.</p> <p dir="ltr">What volume of sound should be sent. But if they are post feeder, the volume of the sound sent to the axillaries will also follow the channel feeder.</p> <h2 dir="ltr">Axillary application</h2> <p dir="ltr">The axillary output can also be used to send the effect as a post-feeder and the effect output can be connected to another channel. Or it can be fed to the monitors from the axillary outlet.</p> <p dir="ltr">This can be done for direct monitor control, post feeder. In radio and television, the axillaries exist in the form of keys called programmers.</p> <p dir="ltr">If, for example, we connect Program 1 to the radio input and Program 2 to the monitor, by activating or deactivating the buttons in each channel, we can determine whether the sound of the channel goes for example to the monitor or to the radio transmitter.</p> <p dir="ltr">Since the transmitted signal must usually be the same as the heard signal, the axillaries in these mixers no longer have volume.</p> <p dir="ltr">For example, the sound in the monitor is the same sound sent to the radio transmitter.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/کنترل-ورودی-ها" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:18https://mixseda.com/building-sound-mixersBuilding sound mixers<p dir="ltr"><img src="/images/uploaded/blog01/010_1000.webp" alt="Building sound mixers" width="100%" /></p> <p dir="ltr"><a href="/what-is-a-sound-mixer">Mixer</a> construction is one of the most important issues any sound engineer should know.</p> <p dir="ltr">An analog mixer board is divided into several parts. Some of these parts are also divided into smaller parts.</p> <p dir="ltr">In this article, I will explain the channel input strip in mixers from the mixer building.</p> <h2 dir="ltr">Channel entry bar</h2> <p dir="ltr">The input bars can be <a href="https://en.wikipedia.org/wiki/Stereophonic_sound">mono or stereo</a> with the capabilities of each in their respective columns.</p> <p dir="ltr">Usually, each channel column has rotary levers (switches), switches, power supplies (linear volumes) to control the gain of the amplifier.</p> <p dir="ltr">Which can adjust the channel equalizer. Check the direction of the incoming signal.</p> <p dir="ltr">And check the channel's participation in the mix. The inputs that can be connected to mixer channels can be multipurpose or multiple.</p> <p dir="ltr">Like the XLR jacks, for microphones and DI BOX, or the 1.4-inch phone jacks for line inputs from audio sources.</p> <p dir="ltr">DJ mixers use RCA inputs to capture sound from CD players and phonographs to digital devices.</p> <p dir="ltr">Depending on the type of mixer, the input columns may have different paths for the channel to be monitored, they may have autos to reduce the signal strength to prevent clipping, or active functions such as high pass filters and some more expensive mixers have graphics or semiparametric equalizers, especially for the frequency band.</p> <h2 dir="ltr">Mixer input components</h2> <p dir="ltr">Each channel usually has a number so that the sound engineers can separate the channels (like the <a href="/dynacord-company">Dynacord</a> <a href="/powermate-2200-3">PowerMate 2200-3 mixer</a>).</p> <p dir="ltr">This helps a lot to make the soundtrack less misunderstood. Channel input jacks can also have a number, such as jacks 1, 2, 3 and ... for each channel.</p> <p dir="ltr">Usually the input part of <a href="/types-of-mixers">mixers</a> has the following parts:</p> <ul dir="ltr"> <li>Input jacks and connectors</li> <li>Microphone preamplifier</li> <li>equalizers</li> <li>Compressors</li> <li>Routing</li> <li>Axillary</li> <li>Monitoring and writing</li> <li>Feeders (can be linear or rotary)</li> <li>Mono input</li> <li>Masterful part</li> <li>Stereo input</li> </ul> <p dir="ltr">Not all mixers can include the above mixer components.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/ساختمان-میکسر" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:16https://mixseda.com/what-is-a-sound-mixerWhat is a sound mixer?<p dir="ltr"><img src="/images/uploaded/blog01/008_1000.webp" alt="What is a sound mixer?" width="100%" /></p> <p dir="ltr">If you are new to the subject of recording and mixing sound, you may be wondering what exactly a mixer is. To answer the question of what a mixer is, we need to know:</p> <p dir="ltr">Mixer consoles have many applications and are used in different places. Such as recording studios, sound systems, sound systems, nightclubs, radios, film production and ...</p> <p dir="ltr">In a simple application, the mixer collects the sounds from the microphones and passes them to the <a href="https://en.wikipedia.org/wiki/Amplifier">amplifiers</a> to amplify the signal and distribute it to the listeners.</p> <p dir="ltr">A DJ mixer can only have two channels for mixing two recorded sounds.</p> <p dir="ltr">A mixer in a coffee shop needs no more than 6 channels, for drummers, guitars and singers.</p> <p dir="ltr">A live rock music mixer can have up to 24 channels, for the rhythm section, guitarists and singers, a professional studio mixer can have up to 96 channels.</p> <h2 dir="ltr">Functionality of the mixer</h2> <p dir="ltr">In practice, mixers have capabilities beyond the sum of two electronic sound signals. Features such as Phantom Power for condenser microphones, control panel for sending sound to the left or right, filters and equalizers, which allow sound engineers to amplify and weaken parts of the frequency band, compressors for the sound engineer Allow to keep the volume at the maximum possible in the system, so that the signal does not enter the saturated part of the amplifiers and is not <a href="https://en.wikipedia.org/wiki/Distortion">distorted</a>, voice tracking functionality to send the signal from the mixer to other devices such as recorders and ...</p> <p dir="ltr">Routing to monitors to send signals to monitors or headphones for listening, usually without these paths affecting the main output.</p> <p dir="ltr">Some mixers, like Dynacord, can have effects like Reverb, Daily, Stereo and روی on themselves.</p> <p dir="ltr">Or other options such as amplifiers useful for live performances, such as <a href="/power-mixers">power mixers</a>.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/میکسر-چیست" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:14https://mixseda.com/digital-mixersDigital mixers<p><img src="/images/uploaded/blog01/007_1000.webp" alt="Digital mixers" width="100%" /></p> <h2 dir="ltr">What is a digital mixer?</h2> <p dir="ltr">In effect, digital mixers are computers that perform audio work through digital circuits and not through analog circuits; That's why they have more capabilities than <a href="http://nop.mixseda.com/analog-mixer">analog mixers</a>.</p> <h2 dir="ltr">Weakness of analog mixers</h2> <p dir="ltr">The biggest drawback of analog gear is indirect access to effects. Some effects can be accessed directly, such as echo, delay, equalizer (which is an effect in itself) and other effects that can be created with analog circuitry, and this is an important and significant point.</p> <p dir="ltr">But it becomes more difficult when we need digital effects or professional effects with multiple settings and sound production.</p> <h2 dir="ltr">What is a digital mixer?</h2> <p dir="ltr">While this can be done with a computer, the limited size of a computer, or even a tablet, makes input and output difficult and access is very limited (both in the studio and especially live and live) .</p> <p dir="ltr">Since they are not made for this purpose, and no matter how powerful they are, the number of inputs and outputs is still limited. That's why they made these devices.</p> <p dir="ltr">If we have a computer on which we can easily program, create melodies and play with a multimedia controller, we have many inputs, effects and latency, time and horoscope effects, equalizer effects, average effects, harmony and it has all the other features, we call it digital mixer .</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/011_1000.webp" alt="What is a digital mixer?" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Advantages of the digital mixer over analog</h2> <p dir="ltr">We might be able to do all the work of a digital mixer with analog, but with very complex setups, big circuits, but with processors the sound can be simulated, so you don't need all those bulky and maybe expensive analog circuits anymore and expensive Don't be.</p> <p dir="ltr">The digital mixer does all of this. The biggest drawback of digital mixers is indirect access to each channel's settings.</p> <p dir="ltr">But you can consider an infinite number of settings for each channel. MIDI, USB, and analog inputs and outputs eliminate the need for a sound card mixer.</p> <p dir="ltr">Internal memory and processors are efficient even when there are no other computers. Wireless communications, software updates, color and sometimes touch screens are all characteristics of these devices.</p> <p dir="ltr">There are digital mixers on the market today that can be as powerful as a Series 2 or 3 Dynacord, but they no longer work wirelessly from your mixer, but from your smartphone, tablet or laptop and whatever The musician may have a tablet with him and adjust your voice! (The best kind of devices for live are digital devices).</p> <p dir="ltr">Digital mixers have no boundaries and put an infinite world in front of the recorders.</p> <h2 dir="ltr">Disadvantages of digital mixers</h2> <p dir="ltr">The only thing here is that most digital mixers aren't power mixers and most require external <a href="https://en.wikipedia.org/wiki/Amplifier">amplifiers</a>.</p> <p dir="ltr"><a href="https://www.midasconsoles.com/">Maidas</a> is one of the companies that produces such mixers and has popular products in Iran.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/میکسر-های-دیجیتال" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:11https://mixseda.com/power-mixersPower mixers<p dir="ltr"><img src="/images/uploaded/blog01/006_1000.webp" alt="Power mixers" width="100%" /></p> <p dir="ltr">Power mixers are actually <a href="http://nop.mixseda.com/analog-mixer">analog mixers</a> to which an amplifier has been added. An analog mixer can have many functions, but it's another feature that isn't useful for studio mixers, but is vital for recording elsewhere. Active bands have their configuration problems, but passive bands require an amplifier. Non-professionals may find it a little difficult to connect the mixer to a power pump. On the other hand, the mixers are very large and have the option of placing a power <a href="https://en.wikipedia.org/wiki/Amplifier">amplifier</a> inside. So a power mixer, in addition to being a mixer, has powerful amplifiers that can run the bands directly.</p> <p dir="ltr">Or if, for example, the number of bands were high and we still had to use more power amps, eventually the internal power of the mixer would also reduce an <a href="https://en.wikipedia.org/wiki/Amplifier">amplifier</a>, and this would make the work easier and the installation and .. In meetings, which require you to pick up your equipment and then run a four to five hour program and reassemble the system, it also makes things easier.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/012_1000.webp" alt="Power mixers" width="100%" /></p> <p dir="ltr">&nbsp;</p> <p dir="ltr">So the power mixer is actually a mixer that has an internal amplifier to make the band work. Mixers on the market usually have stereo amplifiers of 300 to 1000 watts per 4 ohms of impedance. Using power mixers in the studio only adds to costs, as it consumes a lot of energy and is sensitive to frequent switching on and off!</p> <p dir="ltr"><a href="https://www.dynacord.com/">Dynacord</a> Power Mixer:</p> <ul dir="ltr"> <li><a href="http://nop.mixseda.com/%D9%BE%D8%A7%D9%88%D8%B1%D9%85%DB%8C%DA%A9%D8%B3%D8%B1-%D8%AF%D8%A7%DB%8C%D9%86%D8%A7%DA%A9%D9%88%D8%B1%D8%AF-powermate-2200-3/">PM 2200-3</a></li> <li><a href="http://mixseda.com/%d9%be%d8%a7%d9%88%d8%b1%d9%85%db%8c%da%a9%d8%b3%d8%b1-%d8%af%d8%a7%db%8c%d9%86%d8%a7%da%a9%d9%88%d8%b1%d8%af-powermate-1600-3/">PM 1600-3</a></li> <li><a href="http://mixseda.com/%d9%be%d8%a7%d9%88%d8%b1%d9%85%db%8c%da%a9%d8%b3%d8%b1-%d8%af%d8%a7%db%8c%d9%86%d8%a7%da%a9%d9%88%d8%b1%d8%af-powermate-1000-3/">PM 1000-3</a></li> <li><a href="http://mixseda.com/%d9%be%d8%a7%d9%88%d8%b1%d9%85%db%8c%da%a9%d8%b3%d8%b1-%d8%af%d8%a7%db%8c%d9%86%d8%a7%da%a9%d9%88%d8%b1%d8%af-powermate-600-3/">PM 600-3</a></li> </ul> <p dir="ltr"><br />I suggest you know the <a href="http://nop.mixseda.com/difference-mixer-and-power-mixer">difference between mixer and power mixer</a> to better understand this matter.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/پاورمیکسر-ها" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:10https://mixseda.com/analog-mixerAnalog mixer<p><img src="/images/uploaded/blog01/005_1000.webp" alt="Analog mixer" width="100%" /></p> <h2 dir="ltr">Analog mixer</h2> <p dir="ltr">An analog mixer has audio inputs, audio outputs, and audio settings, all of which are analog.</p> <h2 dir="ltr">The analog mixer is better or digital</h2> <p dir="ltr">The good thing about these mixers is their very high quality. However, they are better than digital mixers in terms of Wi-Fi because they don't create the slightest <a href="https://fa.wikipedia.org/wiki/%D8%A7%D8%B9%D9%88%D8%AC%D8%A7%D8%AC">distortion</a> and process the sound very linearly.</p> <p dir="ltr">They don't hang at all, as long as they use the right wires and cables and good power (from the manufacturer), they have very little noise. These mixers can also be polarized with creative drums and minimize noise! (This should be done by an electronics specialist).</p> <h2 dir="ltr">Advantages of the analog mixer</h2> <p dir="ltr">These mixers are supposed to be much cheaper than the market price and the reason for this is the branding and a little manipulation of the brokers in the market. However, the mixers are very cheap.</p> <p dir="ltr">They are reliable and very easy to use, have direct access to all settings and are therefore very suitable for both studio and live performances. These mixers have different functions depending on the price range. One of the most important characteristics in choosing these mixers is the number of channels.</p> <h2 dir="ltr">Number of audio channels of the analog mixer</h2> <p dir="ltr">Each mixer has a certain number of channels and starts from two channels and, depending on the type and application, include multiple channels. For semi-professional studios, especially today where all work is done on the computer, no more than 10 channels may be needed.</p> <p dir="ltr">Because the recorded sounds can be easily mixed and mastered on the computer after recording. But for live performances you need at least 8 channels to be able to respond to all the musicians, singers and speakers.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/013_1000.webp" alt="Number of audio channels of the analog mixer" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Disadvantages of analog mixers</h2> <p dir="ltr">The biggest drawback of these mixers are their effects. Due to the fact that in mixers like Dynacord Series 3, they have internal effects, but it is not yet possible to directly access effects from analog mixers. These mixers have virtually no processor and do all the work with analog circuitry.</p> <p dir="ltr">In these mixers, you can directly access analog audio and its inputs and settings, but not audio files. And they definitely need a laptop next to them to process sound and a sound card. This is one of the biggest drawbacks of digital mixers.</p> <p dir="ltr"><a href="https://www.dynacord.com/">Dynacord</a> analog mixers:</p> <ul> <li dir="ltr" style="text-align: left;"><a href="http://mixseda.com/%d9%85%db%8c%da%a9%d8%b3%d8%b1-%d8%af%d8%a7%db%8c%d9%86%d8%a7%da%a9%d9%88%d8%b1%d8%af-cms-2200-3-2/">CMS 2200-3</a></li> <li dir="ltr" style="text-align: left;"><a href="http://mixseda.com/%d9%85%db%8c%da%a9%d8%b3%d8%b1-%d8%af%d8%a7%db%8c%d9%86%d8%a7%da%a9%d9%88%d8%b1%d8%af-cms-1600-3/">CMS 1600-3</a></li> <li dir="ltr" style="text-align: left;"><a href="http://mixseda.com/%d9%85%db%8c%da%a9%d8%b3%d8%b1-%d8%af%d8%a7%db%8c%d9%86%d8%a7%da%a9%d9%88%d8%b1%d8%af-cms-1000-3/">CMS 1000-3</a></li> <li dir="ltr" style="text-align: left;"><a href="http://mixseda.com/%d9%85%db%8c%da%a9%d8%b3%d8%b1-%d8%af%d8%a7%db%8c%d9%86%d8%a7%da%a9%d9%88%d8%b1%d8%af-cms-600-3/">CMS 600-3</a></li> </ul> <p dir="ltr">&nbsp;</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/میکسر-آنالوگ" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:8https://mixseda.com/types-of-mixersTypes of mixers<p><img src="/images/uploaded/blog01/004_1000.webp" alt="Types of mixers" width="100%" /></p> <h2 dir="ltr">Types of audio mixers</h2> <p dir="ltr">Suppose we have a concert. We have a drummer, a guitarist, a keyboard player, a singer, an artist, a flutist and a violinist.</p> <p dir="ltr">It is better to put a microphone for each of these and connect it to separate amplifiers, and for each of them to put a separate and expensive speaker separately, right? Only a very high cost is one of the disadvantages of this work.</p> <p dir="ltr">Not playing and mixing sounds with each other and a lot of other problems. That's why there is a mixer. The mixer collects the sounds from the inputs, processes them and finally delivers them to the outputs. So the mixer is a system. Mixer types help us to have higher and better sound quality.</p> <h2 dir="ltr">Mixer application</h2> <p dir="ltr">We now have 7 audio inputs. But the vacuum mixing, which is possible with a simple and very economical circuit, can be 20,000 Toman.</p> <p dir="ltr">What we want is sound processing. For example, the vocals of the singer and the drummer should be strong, currently the flutist is not doing the job, the sound of the violin should be medium and the sound of the guitar should be the background.</p> <p dir="ltr">The violinist starts playing but his high-pitched voice is very strong. The singer wants voice, effects and echo. The drummer's voice should have more lows and highs. We have two monitors, each of which should reproduce the voices of the people in front of them.</p> <p dir="ltr">All of this is regulated by a device called a mixer, and then it goes to the amplifiers to amplify the sound and then to the speakers to reproduce it.</p> <h2 dir="ltr">Functionality of the mixer</h2> <p dir="ltr">A mixer should generally have settings such as equalizer for each channel (dynamic equalizer), volume for each channel, volume or left and right balance for each channel, volumes to send each channel to the monitor, standby buttons, cut-off filters (for sound), Master Equalizer, preferably internal effects, microphone inputs, phantom power, line and insert (for external effects), multimedia inputs, multimedia outputs, outputs for amplifiers, flash player and recorder, documents and retrieval (send and receive) and ... To be.</p> <p dir="ltr">Depending on the performance, each mixer can have one of these characteristics or, like the very powerful and popular Dynacord Series 3 mixers, have all these characteristics together.</p> <p dir="ltr">&nbsp;</p> <p dir="ltr"><img src="/images/uploaded/blog01/009_1000.webp" alt="Functionality of the mixer" width="100%" /></p> <p dir="ltr">&nbsp;</p> <h2 dir="ltr">Types of mixers</h2> <p dir="ltr">The mixers are divided into three general categories:</p> <p dir="ltr">Analog mixer<br />Power mixer<br />Digital mixer</p> <p dir="ltr"><a href="/dynacord-company">Dynacord</a> analog mixers:</p> <ul> <li dir="ltr" style="text-align: left;"><a href="http://mixseda.com/%d9%85%db%8c%da%a9%d8%b3%d8%b1-%d8%af%d8%a7%db%8c%d9%86%d8%a7%da%a9%d9%88%d8%b1%d8%af-cms-2200-3-2/">CMS 2200-3</a></li> <li dir="ltr" style="text-align: left;"><a href="http://mixseda.com/%d9%85%db%8c%da%a9%d8%b3%d8%b1-%d8%af%d8%a7%db%8c%d9%86%d8%a7%da%a9%d9%88%d8%b1%d8%af-cms-1600-3/">CMS 1600-3</a></li> <li dir="ltr" style="text-align: left;"><a href="http://mixseda.com/%d9%85%db%8c%da%a9%d8%b3%d8%b1-%d8%af%d8%a7%db%8c%d9%86%d8%a7%da%a9%d9%88%d8%b1%d8%af-cms-1000-3/">CMS 1000-3</a></li> <li dir="ltr" style="text-align: left;"><a href="http://mixseda.com/%d9%85%db%8c%da%a9%d8%b3%d8%b1-%d8%af%d8%a7%db%8c%d9%86%d8%a7%da%a9%d9%88%d8%b1%d8%af-cms-600-3/">CMS 600-3</a></li> </ul> <p dir="ltr">Dynacord Power Mixer:</p> <ul> <li dir="ltr" style="text-align: left;"><a href="https://mixseda.com/%d9%be%d8%a7%d9%88%d8%b1%d9%85%db%8c%da%a9%d8%b3%d8%b1-%d8%af%d8%a7%db%8c%d9%86%d8%a7%da%a9%d9%88%d8%b1%d8%af-powermate-2200-3/">PM 2200-3</a></li> <li dir="ltr" style="text-align: left;"><a href="http://mixseda.com/%d9%be%d8%a7%d9%88%d8%b1%d9%85%db%8c%da%a9%d8%b3%d8%b1-%d8%af%d8%a7%db%8c%d9%86%d8%a7%da%a9%d9%88%d8%b1%d8%af-powermate-1600-3/">PM 1600-3</a></li> <li dir="ltr" style="text-align: left;"><a href="http://mixseda.com/%d9%be%d8%a7%d9%88%d8%b1%d9%85%db%8c%da%a9%d8%b3%d8%b1-%d8%af%d8%a7%db%8c%d9%86%d8%a7%da%a9%d9%88%d8%b1%d8%af-powermate-1000-3/">PM 1000-3</a></li> <li dir="ltr" style="text-align: left;"><a href="http://mixseda.com/%d9%be%d8%a7%d9%88%d8%b1%d9%85%db%8c%da%a9%d8%b3%d8%b1-%d8%af%d8%a7%db%8c%d9%86%d8%a7%da%a9%d9%88%d8%b1%d8%af-powermate-600-3/">PM 600-3</a></li> </ul> <p>&nbsp;</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/انواع-میکسر" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:6https://mixseda.com/difference-mixer-and-power-mixerWhat is the difference between a mixer and a power mixer?<p><strong><img src="/images/uploaded/blog01/002_1000.webp" alt="What is the difference between a mixer and a power mixer?" width="100%" /></strong></p> <h2 dir="ltr">Mixer and Power Mixer</h2> <p dir="ltr">What is a mixer and a power mixer and what is the difference between them?</p> <p dir="ltr">Perhaps the first question that comes to newcomers' minds is what is the difference between a mixer and a power mixer.</p> <p dir="ltr">The mixers are divided into the following two categories in terms of feeding:</p> <ul> <li dir="ltr" style="text-align: left;">(cm) Mixer</li> <li dir="ltr" style="text-align: left;">Power mixer</li> </ul> <p dir="ltr">In fact, the power mixers, in addition to doing the job of mixer, also have an amplifier (sound amplifier), or in other words the power mixers are a combination of two mixers (Mixer) and Power (Power).</p> <p dir="ltr">Not to mention that regular mixers are also known as "Unpowered Mixers".</p> <p dir="ltr">Now the question that arises here is how can we know if it is a mixer or a power mixer?</p> <p dir="ltr">Specifications of the mixer and power mixer</p> <p dir="ltr">Usually the mixer specifications are written on the body or in the booklet or box of the mixers, and you can easily read them to find out if the mixer is an ordinary type or also contains power.</p> <p dir="ltr">Normally the type of mixer is written under the company logo of the device on the body of the mixer.</p> <p dir="ltr">In <a href="/dynacord-company">Dynacord mixers</a>, if the mixer is an ordinary type, the word "CMS" is written under the Dynacord logo.</p> <p>&nbsp;</p> <p><img src="/images/uploaded/blog01/003_1000.webp" alt="Mixer and Power Mixer" width="100%" /></p> <p>&nbsp;</p> <p dir="ltr">Another thing that matters here is how powerful your mixer is. Normally, the power output (W) of the power output is written next to or in front of the PowerMixer text.</p> <p dir="ltr">For example, 700.2 means this device can give you 700 watts of power in two output lines.</p> <p dir="ltr">700 watts for the right line and 700 watts for the left line, which is listed in the PowerMix Dynacord 1000 (<a href="/powermate-1000-3">Dynacord PM 1000</a>) as 1000.2, which means that the two-line output provides 1000 watts.</p> <p dir="ltr">Another difference between mixers and mixers is in weight and size: mixers are usually (not all mixers) thicker and heavier than mixers, although this is a natural feature.</p> <p dir="ltr">The only thing about dinacord mixers is that the body color of normal mixers is darker than power mixers so that the mixer type can be seen from a distance.</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/تفاوت-میکسر-و-پاورمیکسر" rel="follow"><button>FA (Persian)</button></a></p>urn:store:1:blog:post:4https://mixseda.com/dynacord-companyIntroducing Dynacord Company<p><strong><img src="/images/uploaded/blog01/001_1000.webp" alt="Introducing Dynacord Company" width="100%" /></strong></p> <h2 dir="ltr">Dynacord Company</h2> <p dir="ltr"><a href="https://www.google.com/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwiltI3D8vn3AhV1gv0HHYOODEkQFnoECBUQAQ&amp;url=https%3A%2F%2Fdynacord.com%2F&amp;usg=AOvVaw14n-iTmqEbLL185AGNWFN4"><strong>Dynacord</strong></a> began in 1947 with the production of the amplifier tube. After a few years and with Dynacord establishing itself in the German market, the company started producing loudspeakers. Dynacord's work gradually developed and it became one of the largest in the industry with the production of audio mixers and other audio equipment. Few people today haven't heard of Dynacord; People who are less familiar with the audio industry are also familiar with DinaCord. Dynacord currently manufactures products such as <strong>audio mixers, audio power mixers, amplifiers, speakers and public address systems.</strong></p> <h2 dir="ltr">Dynacord amplifier</h2> <p dir="ltr"><strong>The Dynacord <a href="https://en.wikipedia.org/wiki/Amplifier">amplifier</a></strong> is another flagship product of this brand. DinaCord's 70 years of experience in amplifier construction have made the company one of the best and largest amplifier manufacturers in the world. It is now considered by many to be the best Dynacord amplifier brand. In each amplifier category, whether dual-channel, 4-channel amplifier or 6-channel amplifier, DinaCord has a variety of products for customers to use. One of the most popular Dynacord power amplifiers is Dynacord sl1800 and Dynacord power sl2400, currently available on the market with a connection guarantee. Any user can use a variety of Dynacord amplifiers. School amplifier, mosque amplifier, on-board amplifier; Dynacord provided a single solution for all of these needs.</p> <h2 dir="ltr">Dynacord mixer</h2> <p dir="ltr">One of Dynacord's most popular products today is the <strong>Dynacord audio mixer</strong>. In Iran, more than any other type of product, Dynacord is known for its power mixers and mixers; <strong>Dynacord 1600 Power Mixer, Dynacord 2200 Power Mixer and Dynacord 600 Power Mixer</strong> are among the most famous Dynacord products in Iran. If you ask many users for the best audio mixer or the best power mixer, they will introduce you to the Dynacord audio mixer. Even if it's a small electric mixer or a cheap audio mixer, you can still recommend Dynacord products. Dynacord mixer price and Dynacord mixer price can be considered the strengths of this product, which is very affordable for users. Dynacord mixer and power mixer can be used in a variety of applications; In the sound system of a concert hall and amphitheater, in the sound system of schools and in the sound system of mosques and tables.</p> <p dir="ltr">On the <a href="http://mixseda.com">Mixseda</a> site we intend to provide you with training on Dynacord products ...</p> <p dir="ltr">See this article in another language: <a href="/changelanguage/2?returnUrl=/دایناکورد-dynacord" rel="follow"><button>FA (Persian)</button></a></p>