Sunday, April 29, 2012

Cryptochrome

Cryptochrome
Cryptochrome 1 (photolyase-like)
Crystal structure of the PHR domain of cryptochrome 1 from Arabidopsis thaliana.
Cryptochromes (from the Greek κρυπτό χρώμα, hidden colour) are a class of blue light-sensitive flavoproteins found in plants and animals. Cryptochromes are involved in the circadian rhythms of plants and animals, and in the sensing of magnetic fields in a number of species. The name Cryptochrome was proposed as a pun combining the cryptic nature of the photoreceptor, and the cryptogamic organisms on which many blue light studies were carried out.
The two genes Cry1 and Cry2 code for the two cryptochrome proteins CRY1 and CRY2. In insects and plants, CRY1 regulates the circadian clock in a light-dependent fashion, whereas in mammals, CRY1 and CRY2 act as light-independent inhibitors of CLOCK-BMAL1 components of the circadian clock. In plants, blue light photoreception can be used to cue developmental signals.
Discovery
Although Charles Darwin first documented plant responses to blue light in the 1800s, it was not until the 1980s that research began to identify the pigment responsible. In 1980, researchers discovered that the HY4 gene of the plant Arabidopsis thaliana was necessary for the plant's blue light sensitivity, and when the gene was sequenced in 1993, it showed high sequence homology with photolyase, a DNA repair protein activated by blue light. By 1995, it became clear that the products of the HY4 gene and its two human homologs did not exhibit photolyase activity and were instead a new class of blue light photoreceptor hypothesized to be circadian photopigments. In 1996 and 1998, Cry homologs were identified in Drosophila and mice, respectively.
Evolutionary history and structure
Cryptochromes (CRY1, CRY2) are evolutionarily old and highly conserved proteins that belong to the flavoproteins superfamily that exists in all kingdoms of life. All members of this superfamily have the characteristics of an N-terminal photolyase homology (PHR) domain. The PHR domain can bind to the flavin adenine dinucleotide (FAD) cofactor and a light-harvesting chromophore. Cryptochromes are derived from and closely related to photolyases, which are bacterial enzymes that are activated by light and involved in the repair of UV-induced DNA damage. In eukaryotes, cryptochromes no longer retain this original enzymatic activity.
The structure of cryptochrome involves a fold very similar to that of photolyase, with a single molecule of FAD noncovalently bound to the protein. These proteins have variable lengths and surfaces on the C-terminal end, due to the changes in genome and appearance that result from the lack of DNA repair enzymes. The Ramachandran plot shows that the secondary structure of the CRY1 protein is primarily a right-handed alpha helix with little to no steric overlap. The structure of CRY1 is almost entirely made up of alpha helices, with several loops and few beta sheets. The molecule is arranged as an orthogonal bundle. Function
Phototropism
In plants, cryptochromes mediate phototropism, or directional growth towards a light source, in response to blue light. This response is now known to have its own set of photoreceptors, the phototropins. Unlike phytochromes and phototropins, cryptochromes are not kinases. Their flavin chromophore is reduced by light and transported into the cell nucleus, where it affects the turgor pressure and causes subsequent stem elongation. Specifically, Cry2 is responsible for blue-light mediated cotyledon and leaf expansion. Cry2 overexpression in transgenic plants increases blue light-stimulated cotyledon expansion, which results in many broad leaves and no flowers, rather than a few primary leaves with a flower.[13] A double loss-of-function mutation in Arabidopsis thaliana Early Flowering 3 (elf3) and Cry2 genes delays flowering under continuous light was shown to accelerates it during long and short days, which suggests that Arabidopsis CRY2 may play a role in accelerating flowering time during continuous light.
In the sponge eyes, blue-light-receptive crptochrome is also expressed. Most animals have some form of visual structure that allowed them to navigate the world, from simple eyespots up to complex refractive and compound eyes. The eyes utilize photo-sensitive opsin proteins expressed in neurons to communicate information of the light environment to the nervous system, while sponge larvae use pigment ring eyes to mediate phototactic swimming. However, despite possessing many other G-protein coupled receptors (GPCRs), the fully sequenced genome of Amphimedon queenslandica, a demosponge larvae, lacks one vital visual component: a gene for a light-sensitive opsin pigment – which is essential for vision in other animals – suggesting that the sponge’s unique eyes might have evolved a completely novel light-detection mechanism. By using RNA probes, Todd Oakley research group determined that one of the two cryptochromes, Aq-Cry2, was produced near the sponge’s simple eye cells. Aq-Cry2 lacks photolyase activity and contains a flavin-based co-factor that is responsive to wavelengths of light that also mediate larval photic behavior. Defined as opsin-clade GPCRs, it possess a conserved Shiff base lysine that is central to opsin function. Like other sponges, A. queenslandica lacks a nervous system. This indicates that opsin-less sponge eyes utilize cryptochrome, along with other proteins, to direct or act in eye-mediated phototactic behavior. Therefore, A. queenslandica pigment ring eyes likely evolved convergently in the absence of opsins and nervous systems, and probably use as-yet-unknown molecular mechanisms that are fundamentally different from those employed by other animal eyes.
Light capture
Despite much research on the topic, cryptochrome photoreception and phototransduction in Drosophila and Arabidopsis thaliana is still poorly understood. Cryptochromes are known to possess two chromophores: pterin (in the form of 5,10-methenyltetrahydrofolic acid (MTHF)) and flavin (in the form of FAD).[16] Both may absorb a photon, and in Arabidopsis, pterin appears to absorb at a wavelength of 380 nm and flavin at 450 nm. Past studies have supported a model by which energy captured by pterin is transferred to flavin. Under this model of phototransduction, FAD would then be reduced to FADH, which probably mediates the phosphorylation of a certain domain in cryptochrome. This could then trigger a signal transduction chain, possibly affecting gene regulation in the cell nucleus.
Recent research has indicated that a different mechanism may function in Drosophila. The true ground state of the flavin cofactor in Drosophila CRY is still debated, with some models indicating the FAD is in an oxidized form, while others support a model in which the flavin cofactor exists in anion radical form, FAD. Recently, researchers have observed that oxidized FAD is readily reduced to FAD by light. Furthermore, mutations that blocked photoreduction had no effect on light-induced degradation of CRY, while mutations that altered the stability of FAD destroyed CRY photoreceptor function. These observations provide support for a ground state of FAD. Researchers have also recently proposed a model in which FAD is excited to its doublet or quartet state by absorption of a photon, which then leads to a conformational change in the CRY protein.
Circadian rhythm
Studies in animals and plants suggest that cryptochromes play a pivotal role in the generation and maintenance of circadian rhythms. In Drosophila, cryptochrome (dCRY) acts as a blue-light photoreceptor that directly modulates light input into the circadian clock, while in mammals, cryptochromes (CRY1 and CRY2) act as transcription repressors within the circadian clockwork. Some insects, including the monarch butterfly, have both a mammal-like and a Drosophila-like version of cryptochrome, providing evidence for an ancestral clock mechanism involving both light sensing and transcriptional repression roles for cryptochrome.
Cry mutants have altered circadian rhythms, showing that Cry affects the circadian pacemaker. Drosophila with mutated Cry exhibit little to no mRNA cycling. A point mutation in cryb, which is required for flavin association in CRY protein, results in no PER or TIM protein cycling in either DD or LD. In addition, mice lacking Cry1 or Cry2 genes exhibit differentially altered free running periods, but are still capable of photoentrainment. However, mice that lack both Cry1 and Cry2 are arrhythmic in both LD and DD and always have high Per1 mRNA levels. These results suggest that cryptochromes play a photoreceptive role, as well as acting as negative regulators of Per gene expression in mice.
In Drosophila
In Drosophila, cryptochrome functions as a blue light photoreceptor. Exposure to blue light induces a conformation similar to that of the always active CRY mutant with a C-terminal deletion (CRYΔ). The half-life of this conformation is 15 minutes in the dark and facilitates the binding of CRY to other clock gene products, PER and TIM, in a light-dependent manner. Once bound by dCRY, dTIM is committed to degradation by the ubiquitin-proteasome system.
Although light pulses do not entrain, full photoperiod LD cycles can still drive cycling in the ventral-lateral neurons in the Drosophila brain. These data along with other results suggest that CRY is the cell-autonomous photoreceptor for body clocks in Drosophila and may play a role in nonparametric entrainment (entrainment by short discrete light pulses). However, the lateral neurons receive light information through both the blue light CRY pathway and the rhodopsin pathway. Therefore, CRY is involved in light perception and is an input to the circadian clock, however it is not the only input for light information as a sustained rhythm has been shown in the absence of the CRY pathway, in which it is believed that the rhodopsin pathway is providing some light input.[31] Recently, it has also been shown that there is a CRY-mediated light response that is independent of the classical circadian CRY-TIM interaction. This mechanism is believed to require a flavin redox-based mechanism that is dependent on potassium channel conductance. This CRY mediated light response has been shown to increase action potential firing within seconds of a light response in opsin-knockout Drosophila.
Cryptochrome, like many genes involved in circadian rhythm, shows circadian cycling in mRNA and protein levels. In Drosophila, Cry mRNA concentrations cycle under a light-dark cycle (LD), with high levels in light and low levels in the dark. This cycling persists in constant darkness (DD), but with decreased amplitude. The transcription of the Cry gene also cycles with a similar trend. CRY protein levels, however, cycle in a different manner than Cry transcription and mRNA levels. In LD, CRY protein has low levels in light and high levels in dark, and in DD, CRY levels increase continuously throughout the subjective day and night. Thus, CRY expression is regulated by the clock at the transcriptional level and by light at the translational and posttranslational level.
Overexpression of Cry also affects circadian light responses. In Drosophila, Cry overexpression increases flies’ sensitivity to low intensity light. This light regulation of CRY protein levels suggests that CRY has a circadian role upstream of other clock genes and components.
In mammals
Cryptochrome is one of the four groups of mammalian clock genes/proteins that generate a transcription-translation negative-feedback loop (TTFL), along with Period (PER), CLOCK, and BMAL1. In this loop, CLOCK and BMAL1 proteins are transcriptional activators, which together bind to the promoters of the Cry and Per genes and activate their transcription. The CRY and PER proteins then bind to each other, enter the nucleus, and inhibit CLOCK-BMAL1 activated transcription.
In mice, Cry1 expression displays circadian rhythms in the suprachiasmatic nucleus, a brain region involved in the generation of circadian rhythms, with mRNA levels peaking during the light phase and reaching a minimum in the dark. These daily oscillations in expression are maintained in constant darkness.
While CRY has been well established as a TIM homolog in mammals, the role of CRY as a photoreceptor in mammals has been controversial. Early papers indicated that CRY has both light-independent and dependent functions. A study in 2000 indicated that mice without rhodopsin but with cryptochrome still respond to light; however, in mice without either rhodopsin or cryptochrome, c-Fos transcription, a mediator of light sensitivity, significantly drops.[35] In recent years, data have supported melanopsin as the main circadian photoreceptor, particularly melanopsin cells which mediate entrainment and communication between the eye and the suprachiasmatic nucleus (SCN). One of the main difficulties in confirming or denying CRY as a mammalian photoreceptor is that when the gene is knocked out the animal goes arrhythmic, so it is hard to measure its capacity as purely a photoreceptor. However, some recent studies indicate that human CRY may mediate light response in peripheral tissues.
Normal mammalian circadian rhythm relies critically on delayed expression of Cry1 following activation of the Cry1 promoter. Whereas rhythms in Per2 promoter activation and Per2 mRNA levels have almost the same phase, Cry1 mRNA production is delayed by approximately four hours relative to Cry1 promoter activation.[38] This delay is independent of CRY1 or CRY2 levels and is mediated by a combination of E/E’-box and D-box elements in the promoter and RevErbA/ROR binding elements (RREs) in the gene’s first intron.[39] Transfection of arrhythmic Cry1-/- Cry2-/- double-knockout cells with only the Cry1 promoter (causing constitutive Cry1 expression) is not sufficient to rescue rhythmicity. Transfection of these cells with both the promoter and the first intron is required for restoration of circadian rhythms in these cells.
Magnetoception
Cryptochromes in the photoreceptor neurons of birds' eyes are involved in magnetic orientation during migration. Cryptochromes are also essential for the light-dependent ability of Drosophila to sense magnetic fields. Furthermore, magnetic fields affect cryptochromes in Arabidopsis thaliana: growth behavior is affected by magnetic fields in the presence of blue ( but not red) light.
According to one model, cryptochrome forms a pair of two radicals with correlated spins when exposed to blue light. The occurrence of such light-generated radical pairs and the correlation of the radical pair state have been confirmed recently in a cryptochrome of Xenopus laevis. However, recent evidence from Arabidopsis thaliana cryptochrome also suggests that radical pairs can be generated by the light-independent dark reoxidation of Flavin protein by molecular oxygen through the formation of a spin-correlated FADH-superoxide radical pairs. Magnetoception is hypothesized to function through the surrounding magnetic fields effect on the correlation (parallel or anti-parallel) of these radicals, which affects the duration that cryptochrome remains activated. Activation of cryptochrome may affect the light-sensitivity of retinal neurons, with the overall result that the animal can "see" the magnetic field.

Friday, April 27, 2012

Active directory

Installation of Windows Server 2003 Active DirectoryMicrosoft Windows Server 2003 will not work optimally if Active Directory is not installed.All related services and Active Directory domain is in this.So if you do not install Active Directory means that your computer is only used as a Workgroup only.When used as a workgroup, then the Active Directory does not need to be installed.
Active Directory can only be installed if already installed a network card (NIC) is good and right and the hard drive must be formatted NTFS.For that you must install Microsoft Windows Server 2003 in NTFS format.
To install Active Directory Microsoft Windows Server 2003 a lot of the way, can by typing DCPROMO from RUN,you can also avail the facility Manager Your Server. For that you can perform the most simple.
Active Directory Installation
When finished installing the Microsoft Windows Server 2003 and no mistake, the next step is to install Active Directory.There are two ways you can do is to install Active Directory.First by writing or typing DCPROMO from the RUN or can also use the facilities Wizard provides.As the following illustration will explain the procedure you have to do is as follows:

    
Windows Server 2003 setup window appears in a state
    
Select Add or remove a rool. After you press the button Add or remove a rool, the computer will work and immediately perform the next show
    
Click the Next button when you've read everything that appears in the window.
    
Let the computer work that will perform all the components you have and have not been a previous installation
    
Select the Control Domain (Active Directory), as previously you have not finish the job.
    
After selecting the Domain Control'd click Next to continue.
    
Click Next again. After that the computer will return to work, then look at the statement of Active Directory
    
Installation Wizard appears click OK to continue your work. Then the computer will display a dialog box
    
Welcome to the Active Directory Installation Wizard.
    
Click Next to continue. Microsoft Windows will display a dialog box Operating System Compatibility.
    
Note the dialog box and if you are sure click Next to continue.
    
At the dialog box appears Domain Control Type, select Domain Controller for a New domain
    
Click Next to continue your work. Return a dialog box Create a new domain appears, you select Domain in a new Fores
    
Click Next again, then on a New Domain Name dialog box, type your domain name, for example DATAKOM.COM
    
Click Next and let the computer work and if no errors or conflicts, then automatically the NetBIOS Domain Name dialog box
    
will be filled at the Datakom
    
Click Next again. After that the computer will display a dialog box Database and Log Folders to store data related
    
with the Database and Log.
    
Click Next to continue your work. Re-named the next dialog box will appear Shared System Volume
    
Of the Shared System Volume dioalog box above you click Next to continue.
    
DNS Registration Diagnostics dialog box appears immediately, if you will make it automatically DNS for your server,
    
then you select the Install and configure the DNS on this computer
    
Click Next. Then will appear the statement, if the server can be used by any computer running Microsoft Windows 2000 and 2003
    
to bottom or just a Microsoft Windows 2000 and 2003 alone. In this book I chose to have all Windows 2003-based computer
    
down to join the server.
    
Click Next. Password dialog box to write the Directory Services Restore Mode Administrator Password instantly appear.
    
For that you type your password in the fields provided, for example datakom2005, type the password once again that last, datakom2005.
    
If you are unclear click the Active Directory Help.
    
Click Next to continue.
    
Directory Services Restore Mode Administrator Password, ie write Password Directory Services Restore Mode Administrator Password
    
Click Next again and let the computer work. Here you can rest or leave the computer for a while.
    
After you press the Finish button the computer will display the two statements on whether the computer will restart or not.
    
Select and click Restart and let the computer boot automatically.
    
At the login you will see a difference, where as before you installed Active Directory Domain not found,
    
while after Active Directory is installed, your Domain name Datakom will perform the installation.
    
At the first login and you install Active Directory by using Add or remove a facility rool,
    
then the computer will be a little slow and it will appear next show, then you click Finish to close it.
IP Address on the Server
Real Server IP Address for this when the Active Directory installation process will be directly asked whether filled or not.
    
If you have not filled during the installation you have to fill it.
IP Address purpose is to give an address for a server or computer on a network.Simply put the computer in the network can be recognized by all client and himself should be given an address.This address is the IP Address. IP address is a specific number that will be used as a benchmark forgave an address on an existing client in a LAN-based Client Server or Workgroup.
Problem granting IP address or delivery address can not be arbitrary, especially if your computer is used as a Web Server.It is clear from the IP Address does not provide any, should be tailored to the needs and the existing rules.In this example I give the IP address for my server named Datakom the number 192.168.53.1Then another number for all clients should refer to this number, for example for Client numbers should start from 192.168.53.11 to 192.168.53.100or according to the number of computers that will connect to the network. To learn more about IP addresses and TCP / IPYou can read my book about the IP Address and TCP / IP.
If there are two or more servers you can use the Child Domain (CDC) or Primery Domain (PDC).Even if you want a backup can also be added to Backup Domain Controller (BDC), but the latter did not I explain in this book.
Then if you'll put a server there are two different segments, then you have to give IP the two segments,A server that is a number such as 192.168.53.1 and the group is all clients must begin with IP 192.168.53.xx.As for the server B can use a number 192.168.10.1 or as needed, then if such IP numbersfor this client group should be preceded by IP number 192.168.10.xx. As for the subnet mask is 255.255.255.0 itTo find out about these classes of IP addresses you can read in the previous section.
Then if you want to combine two different server segment, then the server must be one of the Router.The way you do not need to buy a router but simply adding 1 (one) another network card or NIC on one server that exist,for example on Server A with IP tailored to servers that are used as routers.
IP Address
Server computer so that you can be recognized, it must be given the address of the IP Address. Procedures that have to do is as follows:

    
From the Desktop right click the mouse just above the LAN indicator on the blade side of your screen.
    
Once the dialog box will appear that Local Area Connection Status. Or you can go through the Start button,
    
and select Connect to and select Show all connections. After that just right click on Local Area Connection and select Properties.
    
Select and click Properties. After that will appear Local Area Connection Properties window will appear.
    
Click the Show icon in taskbar when connected to Local Area Connection showing signs of the taskbar
    
Click Internet Protocol (TCP / IP)
    
Click on Properties. Once the dialog box will appear that Internet Protocol (TCP / IP) Properties
    
Click Use the Following IP Address
    
Type the IP address 192.168.53.1 in field
    
Click the tab on the keyboard
    
Subnet mask column does not need to fill in, by pressing the tab Subnet mask 255.255.255.0 is automatically filled
Fill the DNS Server
To fill the DNS services can be directly on the General tab in the Preferred DNS server field.However, you also can use the way which I will explain the following:

    
Click the Advanced tab. Once the dialog box that will appear the Advanced TCP / IP Settings
    
Click the DNS tab
    
Click the Add
    
Type 192.168.53.2 in the column under DNS server
    
Click the Add
    
Click OK to close the dialog box
    
Click OK
    
Click OK again to close the Local Area Connection Properties dialog and store the provisions of the settings you have done
Try to check whether your work has been successful or not. The way of typing RUN PING 192.168.53.1 you should configureand check the network card (NIC) or LAN cards, cables, etc. used in your computer. Until here, the explanationregarding the installation of Active Directory is. Information and settings associated with Active Directory I will explain in the next section.

use a mikrotik bandwidth management

use a mikrotik bandwidth management
explanation of the installation mikrotik. How to set up the MikroTik as a gateway and bandwidth management in a LAN. Before getting into the configuration process, make it easier to understand the following I describe the network topology as an example the case will then be implemented in the form of MikroTik configuration.

 Topology of the above, there are some things we will be doing, namely:
Determine the IP Address for the Interface on the Public and Local Gateway MikroTik, where the Public Interface
The network will be connected to the Internet is to be connected to a Local Interface Local Network.
• Determine the IP Address on each client, adjust as shown topology.
Determine that MikroTik Routing on the Gateway itself had to be connected to
Internet.
Enable NAT on the Gateway MikroTik so that each client can connect to the Internet.
Limit download and upload bandwidth usage for each client, as shown
on the image topology.
Of the things we did above as a guide for us to determine what should we do, following the step by step configuration process:
A. Configuration steps MikroTik IP Address Gateway Server
Because MikroTik Gateway will connect local area and the public area on the Gateway PC should have installed at least 2 pieces of Ethernet Card, in this case the Public Interface and Local Interface. As a first step we must ensure that both interfaces have been recognized by the PC Gateway. For that go to the MikroTik system after login, then type the following command at the prompt:
[admin @ MikroTik]> interface ethernet print
If the interface is detected then it will appear as shown in figure 1.1

 Configuring the IP Address for the Interface

2. Configuring the Client IP Address-01, the same way done on Client and Client-02-03, which is differentonly IP Address provided.

3. MikroTik Gateway Routing determines to be connected to the InternetTo configure the Gateway MikroTik this time we will use the tools themselves are called congenital MikroTik Winbox, the main reason for using the Winbox GUI-based application is making it easier and has been running on the Windows OS. How to obtain the application by downloading it from Winbox MikroTik Gateway via the Web, to make sure that before the PC Client has been connected to the Gateway MikroTik. The easiest way to make sure it is to do a test PING from the Gateway Client MikroTik, if it already exists Reply message means is connected properly. Then on the client that use Windows, open Internet Explorer or another Web browser program and then on the Address type the IP address of Gateway MikroTik.


Run the program winbox, will appear as shown below



Setting Routing to the Internet Gateway, see the re-drawing the network topology as a guide.
4. Enabling NAT on the Gateway MikroTik so that each client can connect to the Internet.Open Windows Firewall, then go to open the NAT table.

Enter the IP Address Client in Client NAT rules in order to access the Internet. Repeat the above steps for the Client and Client-02-03.

NAT table view should now look like the following figure.

 

At this stage all clients should be able to connect to the Internet.5. Limit the bandwidth usage for each Client no single client that will monopolize the use of bandwidth. We will use the "Queue Tree" to limit the bandwidth usage on the client. Because the Queue Tree method we will be more flexible in applying the rules of the bandwidth limitation, not if we are using the "Simple Queue".The first step we have to create rules in the Firewall in the mangle table, to provide a "mark" on the packages in and out of Gateway MikroTik to each Client.


Previous picture is a step to create a 'Mark Connection' or markers connection, hereinafter step is a continuation of the previous step, but this time we'll make 'Mark Packet "or marker package, please follow the steps as shown. The first step begins by clicking the '+' Tab Mangle, as shown in step 4 of the previous image.


Repeat the steps of making 'Mark Connection' and 'Mark Packet "for Client and Client-02-03, which differ only in part: Src. Address, New Connection Mark and Mark New Packet that will be tailored to the Client and Client-02-03. The end result as shown below:

Configuration 'Queue Tree', for a large download and upload bandwidth to each ClientPlease refer back to the image network topology.Download bandwidth settings for Client-01


Perform the same steps to set download and upload bandwidth for Client and Client-02-03. Only in different parts: Name, Packet Mark, Limit and Max Limit at. End view bandwidth settings for each client will look as shown below:




 The picture above also will be used to monitor bandwidth usage Download and Upload for each Client.



 

 

 
Best Regard 


Pinardi