INTERNET BASIC

What is Internet

The internet in simple terms is a network of the interlinked computer networking worldwide, which is accessible to the general public. These interconnected computers work by transmitting data through a special type of packet switching which is known as the IP or the internet protocol.
Internet is such a huge network of several different interlinked networks relating to the business, government, academic, and even smaller domestic networks, therefore internet is known as the network of all the other networks. These networks enable the internet to be used for various important functions which include the several means of communications like the file transfer, the online chat and even the sharing of the documents and web sites on the WWW, or the World Wide Web.
It is always mistaken said that the internet and the World Wide Web are both the same terms, or are synonymous. Actually there is a very significant difference between the two which has to be clear to understand both the terms. The internet and World Wide Web are both the networks yet; the internet is the network of the several different computers which are connected through the linkage of the accessories like the copper wires, the fiber optics and even the latest wireless connections. However, the World Wide Web consists of the interlinked collection of the information and documents which are taken as the resource by the general public. These are then linked by the website URLs and the hyperlinks. Therefore World Wide Web is one of the services offered by the whole complicated and huge network of the internet.
The use of IP in the Internet is the integral part of the network, as they provide the services of the internet, through different layers organization through the IP data packets. There are other protocols that are the sub-classes of the IP itself, like the TCP, and the HTTP.

What is Networking

Networking is the word basically relating to computers and their connectivity. It is very often used in the world of computers and their use in different connections. The term networking implies the link between two or more computers and their devices, with the soul purpose of sharing the data stored in the computers, with each other. The networks between the computing devices are very common these days due to the launch of various hardware and computer software which aid in making the activity much more convenient to build and use.
Computer networking is then categorized into several different areas and uses, such as the most common ones like LAN and WAN.
Computer networking is also based on different network designs. The two basic classification categories of the network design are the client-server and peer-to-peer. The client-server networking refers to the computer servers that are centralized, which are mainly used in storing emails, web pages, files and applications. The peer-to-peer network is the most commonly used and all the computers mainly support its functions. The Client server is used extensively in the business functions, whereas the peer-to-peer server is for home use.
Every network requires a topology to work through which the data flows and the computers can communicate with each other. The most common types of topologies are bus, star, ring, and mesh.
Networking also involves a special communication language used by the computer devices. These languages are called network protocols, and most of the computers use a range of protocols which they support. The most common network in the Internet and home networks is the TCP/IP.
Networking can be either wired or wireless. The most common wired networks like Ethernet cables were extensively used but now wireless networking have emerged and the new computer networks mainly support this feature.

What is Firewall

Firewall is actually a system of security for the computers using the network connections either for the internet or for any other purpose. It prevents the unauthorized access from any sort of private computer to your own network.
Firewalls can be installed in the computer in both ways either as hardware or software or sometimes used as a combination. It is required for the prevention of the trespassing of ones private networking connected to the internet, especially involving the use of the intranet.
The working criteria of the firewall is such that every data transmission of the internet first passes through the firewall system and only those messages which pass a certain security criteria are allowed to get through; otherwise the other data is blocked, making it inaccessible for the unauthorized users.
The firewall involves several different techniques one of them is the Packet filter. This is a simple technique of security for the firewall system. It keeps a check on the packets which enter and leave your computer network and then verifies them according to rules previously defined by your network user so as to allow or reject their passage through the network. The packet filtering is transparent to the network users, but its configuration is difficult and requires professional help.
The other firewall techniques include the Application gateway, which is targeted to specific programs such as the FTP, followed by the Circuit-level gateway which is required for the TCP and the UDP connections. And lastly the Proxy servers, which is most commonly used these days for the internet security system.
Firewall is actually considered to be the primary and the first line of defense for the security reasons.

What is LAN Card

With the increasing use of the computers and the networking the local area network of the LAN is one such network type which links the two computers in a connection.
For this connection a Local area network card or the LAN card is required which enables the connection of the computers in a network. It is a piece of hardware which is connected inside the PC linking the computer network.
The LAN Card is of both the common types which are the OSI layer 1 and 2, dealing with the physical as well as the data link layer respectively. It uses the correctly entered MAC addresses for the network to work. This then allows the computers to connect using cables or even wirelessly which then requires a special type of LAN card called the WLAN card.
With the increase in the development and technology, the local area network of the wireless type is now mostly preferred. Therefore a Wireless LAN Card is required for this purpose. The computers with the wireless LAN Card can transmit and receive data via radio waves using the special technology of SST or the Spread-Spectrum technology.
The wireless LANs are available in four basic types which include the 802.11, followed by type a, b and also g.
Any sort of LAN card you use will have some of the typical features of a network card which includes the twisted pair, the AUI socket and also the BNC. It is at the AUI socket that the network cable has to be connected. The LAN cards usually are designed to support the rate transfer to be ranging from 10 to 1000 megabits per second.

Uses of Internet

Internet has been the most useful technology of the modern times which helps us not only in our daily lives, but also our personal and professional lives developments. The internet helps us achieve this in several different ways.
For the students and educational purposes the internet is widely used to gather information so as to do the research or add to the knowledge of any sort of subject they have. Even the business personals and the professions like doctors, access the internet to filter the necessary information for their use. The internet is therefore the largest encyclopedia for everyone, in all age categories.
The internet has served to be more useful in maintaining contacts with friends and relatives who live abroad permanently. The easiest communication means like the internet chatting systems and the emails are the best and the most common for the maintaining contacts with the people around the world.
Not to forget internet is useful in providing with most of the fun these days. May it be all the games, and networking conferences or the online movies, songs, dramas and quizzes, internet has provided the users with a great opportunity to eradicate the boredom from their lives.
Internet is also used to upgrade the internet and use special software to work on the projects and documentation works as the internet enables the user to download a myriad of different software for a variety of different purposes, making it much easier than buying the costly software cds.


Applications of Internet

There are many different applications of the internet used commonly across the world. The most common names are the JAVA, JAVA script and the Flash.
These are the most useful as well as the most frequently used applications which need to be installed on the computer before the full access of the internet can be guaranteed.
The flash is required for the animated videos and pictures. For example the electronic greeting cards these days used extensively for various occasions all require the us if the internet application Flash. Some websites which are used to upload videos online like the most commonly used YouTube also require the latest flash player to work. Every other website consists of flash content these days and so it is one of the most useful applications of the internet.
Another mentioned application which is also well-known is the JAVA; java is also needed for the internet access to a certain extent. For example using the ftp services on the internet, you need to have the JAVA technology JVM to be able to manage and control the documentation transfers.
These applications are basically used to run the applets on the internet web pages which are made to work with them, without these tools the internet though can be easily accessed it does not offer all the features to the user, which might also be some useful information.
The internet applications all reduce the traffic on the network and thus make the server work on a much optimized level. All the applications are interoperable, and support the cross platforms, both of the OS servers and the clients.

Internet tools

Internet tools are basically used so as to make the internet use much easier via some of the applications specially made for a particular internet business.
These tools are advanced and custom-built for the development of the internet, so that the optimal management can be achieved both in the informational and communication solutions. These tools are also available commercially.
Different networks are compatible with different internet tools, as described further.
The tools related to the networking of the TCP/IP most widely used is the "Fifi Ping »"
The Ping is actually used for the basic inquiry to determine whether the host which is governing the internet is alive and transmitting information and signals or not. The ping tool performs this task by sending data to the host of the network used for the internet so as to see the response and the time period required to achieve it.
The internet tool of the "Icestorm NSLookup »" is used to convert your personal domain name into an IP or the internet protocol address, like the form (216.122.237.109) it can then be used for exactly the opposite task, but the DNS server has to be queried for that.
The other internet tool related with the Internet protocol "Dig DNS Check »" is used to gain information from the DNS servers using the domain information groper of the DIG.
The internet tool of the "logic Host Check »" is used by the network of TCP/IP to perform several different tasks and tools of the network in one single host.

World Wide Web

This tutorial covers the basics of the World Wide Web, focusing on its technical aspects. After all, the Web is a technological phenomenon. Therefore it's useful to understand some of the fundamentals of how it works.
The world wide web is a system of Internet servers that supports hypertext and multimedia to access several Internet protocols on a single interface. The World Wide Web is often abbreviated as the web or www.
The World Wide Web was developed in 1989 by Tim Berners-Lee of the European Particle Physics Lab (CERN) in Switzerland. The initial purpose of the Web was to use networked hypertext to facilitate communication among its members, who were located in several countries. Word was soon spread beyond CERN, and a rapid growth in the number of both developers and users ensued. In addition to hypertext, the Web began to incorporate graphics, video, and sound. The use of the Web has reached global proportions and has become a defining element of human culture in an amazingly short period of time.
In order for the Web to be accessible to anyone, certain agreed-upon standards must be followed in the creation and delivery of its content. An organization leading the efforts to standardize the Web is the World Wide Web (W3C) Consortium. Take a look at the W3C Consortium Web site to get an idea of its activities. A lot of the material is technical because, after all, the Web is a technical phenomenon.

Protocols of the Web

The surface simplicity of the Web comes from the fact that many individual protocols can be contained within a single Web site. internet protocols are sets of rules that allow for intermachine communication on the Internet. These are a few of the protocols you can experience on the Web:
HTTP (HyperText Transfer Protocol): transmits hyptertext over networks. This is the protocol of the Web.
HTTP
E-mail (Simple Mail Transport Protocol or SMTP): distributes e-mail messages and attached files to one or more electronic mailboxes.
GMail
FTP (File Transfer Protocol): transfers files between an FTP server and a computer, for example, to download software.
FTP download
VoIP (Voice over Internet Protocol): allows delivery of voice communications over IP networks, for example, phone calls.
Skype
The Web provides a single, graphical interface for accessing these and other protocols. This creates a convenient and user-friendly environment. Once upon a time, it was necessary to know how to use protocols within separate, command-level environments. This meant you needed to know the text commands and type them out to make things happen. The Web is much easier, since it gathers these protocols together into a unified graphical system. Because of this feature, and because of the Web's ability to work with multimedia and advanced programming languages, the Web is by far the most popular component of the Internet.

Hypertext and links: the motion of the Web

The operation of the Web relies primarily on hypertext as its means of information retrieval. HyperText is a document containing words that connect to other documents. These words are called links and are selectable by the user. A single hypertext document can contain links to many documents. In the context of the Web, words or graphics may serve as links to other documents, images, video, and sound. Links may or may not follow a logical path, as each connection is created by the author of the source document. Overall, the Web contains a complex virtual web of connections among a vast number of documents, images, videos, and sounds.
Producing hypertext for the Web is accomplished by creating documents with a language called hypertext markup language, or html. With HTML, tags are placed within the text to accomplish document formatting, visual features such as font size, italics and bold, and the creation of hypertext links.
<p> This is a paragraph that shows the underlying HTML code. <strong>This sentence is rendered in bold text</strong>. <em>This sentence is rendered in italic text.</em> </p>
HTML is an evolving language, with new tags being added as each upgrade of the language is developed and released. Nowadays, design features are often separated from the content of the HTML page and placed into cascading style sheets (css). This practice has several advantages, including the fact that an external style sheet can centrally control the design of multiple pages. The World Wide Web Consortium (W3C), led by Web founder Tim Berners-Lee, coordinates the efforts of standardizing HTML. The W3C now calls the language XHTML and considers it to be an application of the XML language standard.

Pages on the Web

The backbone of the World Wide Web are its files, called pages or Web pages, containing information and links to resources - both text and multimedia - throughout the Internet.
Web pages can be created by user activity. For example, if you visit a Web search engine and enter keywords on the topic of your choice, a page will be created containing the results of your search. In fact, a growing amount of information found on the Web today is served from databases, creating temporary Web pages "on the fly" in response to user searches. You can see an example of such a page below, taken from the search engine Hakia. This page only exists as a result of a search.
Hakia results page
Access to Web pages can be accomplished in all sorts of ways, including:
  1. Entering a Web address into your browser and retrieving a page directly
  2. Browsing through sites and selecting links to move from one page to another both within and beyond the site
  3. Doing a search on a search engine to retrieve pages on the topic of your choice (See: The World of Search Engines)
  4. Searching through directories containing links to organized collections of Web pages (See: The World of Subject Directories)
  5. Clicking on links within e-mail messages
  6. Using apps on social networking sites or your mobile phone to access Web and other online content
  7. Retrieving updates via RSS feeds and clicking on links within these feeds (See: RSS Basics)

Retrieving doucuments on the Web: the URL and Domain Name System

url stands for uniform resource locator. The URL specifies the Internet address of a file stored on a host computer, or server, connected to the Internet. Web browsers use the URL to retrieve the file from the server. This file is downloaded to the user's computer, or client, and displayed on the monitor connected to the machine. Because of this relationship between clients and servers, the Web is a client-server network.
Every file on the Internet, no matter what its protocol, has a unique URL. URLs are translated into numeric addresses using the domain name system (dns). The DNS is a worldwide system of servers that stores location pointers to Web sites. The numeric address, called the ip (internet protocol) address, is actually the "real" URL. Since numeric strings are difficult for humans to use, alphneumeric addresses are employed by end users. Once the translation is made by the DNS, the browser can contact the Web server and ask for a specific file located on its site.
For example, 207.46.192.254 is also www.microsoft.com.
Anatomy of a URL
This is the format of the URL:
protocol://host/path/filename
For example, this is a URL from the site of the U.S. Senate of a live video stream sent by a camera pointed at the U.S. Capitol:
http://www.senate.gov/general/capcam.htm
This URL is typical of addresses hosted in domains in the United States. The structure of this URL is shown below.
  1. Protocol: http
  2. Host computer name: www
  3. Second-level domain name: senate
  4. Top-level domain name: gov
  5. Directory name: general
  6. File name: capcam.htm
Note how much information about the content of the file is present in this well-constructed URL.
Several generic top-level domains (gTLDs) are common in the United States:
comcommercial enterprise
edueducational institution
govU.S. government entity
milU.S. military entity
netnetwork access provder
orgusually nonprofit organizations
In addition, dozens of domain names have been assigned to identify and locate files stored on servers in countries around the world. These are referred to as country codes, and have been standardized by the International Standards Organization as ISO 3166. For example:
chSwitzerland
deGermany
jpJapan
ukUnited Kingdom
Additional top-level domain names were approved in 2000 by the Internet Corporation for Assigned Names and Numbers (ICANN): .biz, .museum, .info, .pro (for professionals) .name (for individuals), .aero (for the aerospace industry), and .coop (for cooperatives). Unconventional domain names have been marketed outside of the system, for example, .tv for sites that offer content similar to television broadcasts. In 2011, ICANN decided to open up domain names without restriction, including in any language or written script. The cost of establishing and maintaining a new name is quite expensive - $185,000 for the application fee alone - so the actual effect of this change will be limited.
As the technology of the Web evolves, URLs have become more complex. This is especially the case when content is retrieved from databases and served onto Web pages. The resulting URLs can have a variety of elaborate structures, for example,
http://spills.incidentnews.gov/incidentnews/FMPro?-db=images&-Format=maps.htm
&SpillLink=8&Subject=Waterway%20Closure%20Map&-SortField=EntryDate&
-SortOrder=descend&-SortField=EntryTime&-SortOrder=descend&-Token=8&
-Max=20&-Find
The first part of this URL looks familiar. What follows are search elements that query the database and determine the order of the results. As a growing number of databases serve content to the Web, these types of URLs are appearing more commonly in your browser's address window.

Programming languages and environments

The use of programming languages beyond HTML extend the capabilities of the Web. They are used to write software, process Web forms, fetch and display data, and perform all kinds of advanced functions. It is difficult to talk about these languages without getting into too much technical jargon, but here is an attempt. What follows is a brief guide to some of the more common languages in use on the Web today.
CGI (Common Gateway Interface) refers to a specification by which programs can communicate with a Web server. A CGI program, or script, is any program designed to process data that conforms to the CGI specification. The program can be written in any programming language, including C, Perl, and Visual Basic Script (VBScript). In the early days of the Web, CGI scripts were commonly used to process a form on a Web page. Perl is popular with Google, and is also the language of the Movable Type blog platform.
Active Server Pages (ASP): Developed by Microsoft, ASP is a programming environment that processes scripts on a Web server. The programming language VBScript is often used for the scripting. Lightweight programs can be written with this language. Active Server Pages end in the file extension .asp. For an example, check out Databases and Indexes at the University at Albany Libraries.
.NET framework: Also developed by Microsoft, this development framework is a more powerful one than ASP for writing applications for the Web. Programming languages include C+ and VB.Net. ASP.Net is a related environment, producing pages with the file extensions .aspx. The Microsoft site is a good example of a site created with the .NET framework.
PHP: This is another server-based language. It is frequently the language used to write open source (e.g., nonprofit, community-created) programs found on the Web, including MediaWiki (the software that runs the Wikipedia), and the popular blog software WordPress. While PHP functionality can be installed on Windows servers, it is native to the Linux server environment and commonly used there.
Java/Java Applets: Java is a programming language similar to C++. Developed by Sun Microsystems, the aim of Java is to create programs that will be platform independent. The Java motto is, "Write once, run anywhere." A perfect Java program should work equally well on a Windows, Apple, Unix, or Linux server, and so on, without any additional programming. This goal has yet to be realized. Java can be used to write applications for both Web and non-Web use.
Web-based Java applications are usually in the form of Java servlets. These are small Java programs fetched from within a Web page that can be downloaded from a server and run on a Java-compatible Web browser. A Web page that links to a Java servlet has the file extension .jsp.
JavaScript is a very popular programming language created by Netscape Communications. Small programs written in this language are embedded within a Web page, or fetched externally from within the page, to enhance the page's functionality. Examples of JavaScript include drop-down menus, image displays, and mouse-over interactions. The drop-down menus on the site of the UCLA Library shown below are a good example: when you hover your mouse over the menu item, a set of sub-menus opens up below.
javascript dropdown
XML: XML (eXtensible Markup Language) is a mark-up language that enables Web designers to create customized tags to provide functionality not available with HTML alone. XML is a language of data structure and exchange, and allows developers to separate form from content. With XML, the same content can be formatted for multiple applications. In May 1999, the W3 Consortium announced that HTML 4.0 has been recast as an XML application called XHTML.
AJAX stands for Asynchronous JavaScript and XML. This langauge is used to create interactive Web applications. Its premise is that it sends data to the browser behind the scenes, so that when it is time to view the information, it is already "there." Google Maps is a well-known example of AJAX. A different kind of example can be found with SurfWax LookAhead, an RSS search tool that retrieves feeds as you type your search.
SQL (Structured Query Language): This is a language that focuses on extracting data from databases. Programmers write statements called queries that retrieve data from the tables in the database. Some Web sites are created extensively or entirely from data stored in database tables. You can often tell that a SQL query has produced data on a page by the presence of a question mark (?) and a record number in the URL, as the example below illustrates.
sql"

Mashups

Programs on the Web can be flexible. Sometimes they are combined with each other to form ehanced presentations. These are known as mashups.
A mashup is a Web application or Web page that combines data from two or more external sources. Mashups give you access in one place to information available in multiple places.
There are all kinds of mashups on the Web. One example is Earthquakes In The Last week, a mashup derived from data from the U.S. Geological Survey along with Google Maps. Another is Mashpedia, a mashup of the Wikipedia encylopedia along with current information gathered from the social Web.

Last but not least: Applications (apps)

Applications, commonly called apps, are small programs that run within various online environments. These programs allow you to enjoy functionalities that enhance your experience within that environment.
Social networking sites often make use of apps. For example, Facebook is well-known for featuring thousands of apps created by Facebook or outside developers. These apps allow you to play games, shop, form issues-based communities, find family or classmates, etc.
Mobile phones are another environment within which apps are both popular and useful. In fact, no decent mobile phone these days comes without the option to add apps. A good example is the iPhone, which offers hundreds of thousands of apps in all sorts of areas, from work and education to travel, lifestyle, entertainment, and so on. Also take a look at the Android Market site to browse the apps available for the Droid phone. It is safe to say that apps make the mobile phone what it is today.
Apps are a very fast-growing area of the networked experience. Some observers believe that apps will be a focus of developments in the online world in the coming years.
  1. internet basic
  2. Come and discover how the Internet works. Find out where you can get great software. Discover the fastest way to connect to the Internet. Learn the secrets of search engines.  Have your questions answered and problems solved.  We are the world’s most popular guide to the Internet and currently read in 148 countries!   We’ve been serving the internet community since 1997!




    The Internet has been around for about 25 years. Here are ten of the events that got us where we are today:
    The World Wide Web
    Tim Berners-Lee created user-friendly “Web pages” that could travel over the Internet, a network built to shuttle research between universities. The world logged on: 747 million adults in January.
    E-mail
    Tech’s answer to the Pony Express . Programs such as 1988’s Eudora made it easy to use. In-boxes have been filling up ever since. Nearly 97 billion e-mails are sent each day.
    VoIP
    The rising buzzword in the Internet community, nowadays, is VoIP phone. What does it mean? How does it affect your life or business? VoIP stands for Voice over Internet Protocol, and that means a phone service that uses broadband Internet connectivity to dial and connect.
    AOL
    AOL turned people on to Web portals, chat rooms and instant messaging. Early subscribers paid by the hour. AOL once boasted 35 million subscribers. It bought Time Warner for $106 billion in 2001.
    Mosaic/Netscape
    Created by Marc Andreessen and others, Mosaic was the first widely-used multimedia Web browser. Spin-off Netscape Navigator ruled the ‘90s until Microsoft’s Internet Explorer took off around ‘98.
    Yahoo!
    Stanford University graduate students Jerry Yang and David Filo created this popular Web portal in 1994. It remains a favorite for email, photo sharing (it owns Flickr) and other services.
    eBay
    Thanks to eBay, we can all now buy and sell almost anything (skip the body parts). eBay has 230 million customers worldwide who engage in 100 million auctions at any given time.
    Amazon.com
    Jeff Bezos’ baby began as an always-in-stock book seller. It survived the tech bubble and now is the definitive big box online store. It was the second most-visited online retailer in December, after eBay.
    Instant Messaging
    LOL! Web surfers began to “laugh out loud” and BRB (“be right back”) in the mid-‘90s, with the launch of ICQ and AOL Instant Messenger. Millions use it to swap messages and photos, even telephone pals.
    Broadband
    The answer to the drip-drip-drip of dial-up, high-speed Internet service fuels online entertainment. About 78% of home Internet users in the U.S. have broadband, up from less than 1% in 1998.  Comcast high speed internet allows you to do today what you only dreamed of doing just a few years ago and all from the comfort of home.

    Let’s get started by learning the basics of the Internet.

    Search Engines

    • Alexa Web Search - analyzes site traffic including ranking, global users, pages linking to the site, and links to related pages of interest
    • Ask.com - general search engine enhanced by a number of specialty searches including a dictionary, thesaurus, currency converter, encyclopedia, maps, news and more
    • Bing - Microsoft engine that displays excerpts from sites retrieved by your search and offers related search suggestions; multimedia and other deep Web results are also displayed. Also check out Bing Maps.
    • Blekko - retrieves results from trustworthy sites and offers filtered searching with the use of slash tags, e.g., global warming /climate; can sort results by relevance or date; allows searchers to integrate their Facebook newsfeed into search results
    • ChaCha - offers live human guides to help answer queries; accepts queries from mobile devices
    • DuckDuckGo - offers results from content-rich sites, displays "zero-click" answers at the top of the search result page, and features numerous search options and site settings; offers unusual search privacy
    • Exalead - offers concept clustering of results, thumbnail images of retrieved sites, and customization options such as organization of results by file type, geography or modification date
    • Factbites - searches for full topic matches and returns meaningful, full sentence excerpts of sites in its results list
    • FindFiles.net - searches for all MIME types found on the Web, for example audio, video, images, software, PDF files, text documents, cascading style sheets, xml documents and zip archives
    • Google - Web's most popular search engine that retrieves results in real time as you type your search. Also check out EcoSmartSearch.com, a Google-powered search engine with a black background display that saves energy. Google offers a number of Services that are worth exploring, including:
    • Google Blog Search, for searching blog entries
    • Google Book Search, for searching the full text of books from most publishers in the U.S.
    • Google Scholar, offers the full text, abstracts, and/or citations to scholarly materials including books, journal articles, documents in academic repositories and the free Web. This link will allow you to access the full text of articles in journals to which the Libraries subscribe when you are off campus.
    • Google U.S. Government Search, a searchable database of U.S. government Web sites (.gov and .mil) ranked by link popularity
    • Hakia - organizes results into types of information sources, including "credible " sites recommended by librarians
    • iSEEK Education - offers authoritative resources from university, government, and established noncommercial providers; organizes results into concept clusters, and also allows users to recommend and rate sites
    • Lycos - general search engine that also offers searches of a few deep Web content sources including people look-up, yellow pages, and multimedia
    • Quintura - displays a type of tag cloud with keywords related to your search that can be selected to generate new results
    • SearchEdu.com - service that limits results to the .edu, domain; also offers to search well-known dictionaries, encyclopedias, almanacs, etc. See also:
    • SearchGov.com - .gov domain
    • SearchMil.com - .mil domain
    • SearchTeam - real-time collaborative search engine that allows you to search, save results, and collaborate with invited others; you can comment, chat, share documents and links, etc. to create a useful SearchSpace on any topic; integrates with such social networks as Facebook, LinkedIn and Twitter
    • SimilarPages.com - search by keyword or website address and retrieve a focused list of related sites; offers a Firefox Add-On that displayst a list of up to 300 sites similar to the one you are currently viewing
    • SnappyFingers - searches millions of Frequently Asked Questions (FAQs) for answers to user queries
    • Wolfram|Alpha - enter a question or calculation, and Wolfram|Alpha uses its built-in algorithms and own collection of data to compute the answer
    • Yahoo! - portal with a general Web search and many other content services
    • Zanran - searches for data and statistics found in graphs, tables and charts; hover your mouse over the item icon for a preview
    Brought to you by Pokerlistings.com

    On Pokerlistings.com you can search for anything related to poker; news, strategy, rules and how to play. Recommended searches:
    Best poker sites
    Online poker sites for U.S. players

    Meta Search Engines

    • 43 Marks - offers separate searches of Google, Yahoo!, Bing and Wikipedia with a one-click toggle between search results; also serves as a personal home page for collecting bookmarks
    • Browsys - offers Search Assistant for searching numerous sources including the social and the deep Web; Virtual Folders allow users to create, save and bookmark custom folders containing up to 12 favorite sites
    • Cacti Search - search Google, Yahoo, MSN and Ask, and retrive a collated results list with an option to view results from each engine separately
    • Dogpile - search numerous search engines and presented collated results; also presents concept clusters for viewing results organized by keywords or topics
    • iBoogie - offers searches of the Web and multimedia, and supplies real-time concept clustering of results
    • Ixquick - ranks results based on top ten rankings from the source sites; allows any type of search syntax and will translate and direct your search accordingly
    • Mamma - retrieve results from numerous sources; also offers search suggestions related to your search
    • MetaCrawler - retrieve results from Google, Yahoo!, Bing and Ask; also offers search suggestions related to your search
    • Searchzooka - offers advanced search options on Google, Yahoo!, Bing, Ask, Digg and Technorati with a single mouse click; users can save searches for future use, organize the searches into folders, and clone new searches from existing ones
    • Virtual Learning Resources Center - searches several high quality directories; also offers its own directory
    • ZapMeta - searches a handful of sources, and offers concept clusters for organizing search results
    • Zuula - searches the Web, images, news, blogs and jobs postings, and returns results from multiple search tools in configurable separate tabs
    See also: Searchenginesindex.com, a collection of search engines from around the world.
    Networking - All About Networking

    What is a computer Network?

    A network is any collection of independent computers that communicate with one another over a shared network medium. A computer network is a collection of two or more connected computers. When these computers are joined in a network, people can share files and peripherals such as modems, printers, tape backup drives, or CD-ROM drives. When networks at multiple locations are connected using services available from phone companies, people can send e-mail, share links to the global Internet, or conduct video conferences in real time with other remote users. When a network becomes open sourced it can be managed properly with online collaboration software. As companies rely on applications like electronic mail and database management for core business operations, computer networking becomes increasingly more important.
    Every network includes:

    • At least two computers Server or Client workstation.
    • Networking Interface Card's (NIC)
    • A connection medium, usually a wire or cable, although wireless communication between networked computers and peripherals is also possible.
    • Network Operating system software, such as Microsoft Windows NT or 2000, Novell NetWare, Unix and Linux.

    Types of Networks:

    LANs (Local Area Networks)

    A network is any collection of independent computers that communicate with one another over a shared network medium. LANs are networks usually confined to a geographic area, such as a single building or a college campus. LANs can be small, linking as few as three computers, but often link hundreds of computers used by thousands of people. The development of standard networking protocols and media has resulted in worldwide proliferation of LANs throughout business and educational organizations.

    WANs (Wide Area Networks)

    Wide area networking combines multiple LANs that are geographically separate. This is accomplished by connecting the different LANs using services such as dedicated leased phone lines, dial-up phone lines (both synchronous and asynchronous), satellite links, and data packet carrier services. Wide area networking can be as simple as a modem and remote access server for employees to dial into, or it can be as complex as hundreds of branch offices globally linked using special routing protocols and filters to minimize the expense of sending data sent over vast distances.

    Internet

    The Internet is a system of linked networks that are worldwide in scope and facilitate data communication services such as remote login, file transfer, electronic mail, the World Wide Web and newsgroups.

    With the meteoric rise in demand for connectivity, the Internet has become a communications highway for millions of users. The Internet was initially restricted to military and academic institutions, but now it is a full-fledged conduit for any and all forms of information and commerce. Internet websites now provide personal, educational, political and economic resources to every corner of the planet.

    Intranet

    With the advancements made in browser-based software for the Internet, many private organizations are implementing intranets. An intranet is a private network utilizing Internet-type tools, but available only within that organization. For large organizations, an intranet provides an easy access mode to corporate information for employees.

    MANs (Metropolitan area Networks)

    The refers to a network of computers with in a City.

    VPN (Virtual Private Network)

    VPN uses a technique known as tunneling to transfer data securely on the Internet to a remote access server on your workplace network. Using a VPN helps you save money by using the public Internet instead of making long–distance phone calls to connect securely with your private network. There are two ways to create a VPN connection, by dialing an Internet service provider (ISP), or connecting directly to Internet.

    Categories of Network:

    Peer to Peer and Server/Client NetworkNetwork can be divided in to two main categories:

    • Peer-to-peer.
    • Server – based.
    In peer-to-peer networking there are no dedicated servers or hierarchy among the computers. All of the computers are equal and therefore known as peers. Normally each computer serves as Client/Server and there is no one assigned to be an administrator responsible for the entire network.

    Peer-to-peer networks are good choices for needs of small organizations where the users are allocated in the same general area, security is not an issue and the organization and the network will have limited growth within the foreseeable future.

    The term Client/server refers to the concept of sharing the work involved in processing data between the client computer and the most powerful server computer.

    The client/server network is the most efficient way to provide:

    • Databases and management of applications such as Spreadsheets, Accounting, Communications and Document management.
    • Network management.
    • Centralized file storage.
    The client/server model is basically an implementation of distributed or cooperative processing. At the heart of the model is the concept of splitting application functions between a client and a server processor. The division of labor between the different processors enables the application designer to place an application function on the processor that is most appropriate for that function. This lets the software designer optimize the use of processors--providing the greatest possible return on investment for the hardware.

    Client/server application design also lets the application provider mask the actual location of application function. The user often does not know where a specific operation is executing. The entire function may execute in either the PC or server, or the function may be split between them. This masking of application function locations enables system implementers to upgrade portions of a system over time with a minimum disruption of application operations, while protecting the investment in existing hardware and software.

    OSI ModelThe OSI Model:

    Open System Interconnection (OSI) reference model has become an International standard and serves as a guide for networking. This model is the best known and most widely used guide to describe networking environments. Vendors design network products based on the specifications of the OSI model. It provides a description of how network hardware and software work together in a layered fashion to make communications possible. It also helps with trouble shooting by providing a frame of reference that describes how components are supposed to function.

    There are seven to get familiar with and these are the physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and the application layer.
    • Physical Layer, is just that the physical parts of the network such as wires, cables, and there media along with the length. Also this layer takes note of the electrical signals that transmit data throughout system.
    • Data Link Layer, this layer is where we actually assign meaning to the electrical signals in the network. The layer also determines the size and format of data sent to printers, and other devices. Also I don't want to forget that these are also called nodes in the network. Another thing to consider in this layer is will also allow and define the error detection and correction schemes that insure data was sent and received.
    • Network Layer, this layer provides the definition for the connection of two dissimilar networks.
    • Transport Layer, this layer allows data to be broken into smaller packages for data to be distributed and addressed to other nodes (workstations).
    • Session Layer, this layer helps out with the task to carry information from one node (workstation) to another node (workstation). A session has to be made before we can transport information to another computer.
    • Presentation Layer, this layer is responsible to code and decode data sent to the node.
    • Application Layer, this layer allows you to use an application that will communicate with say the operation system of a server. A good example would be using your web browser to interact with the operating system on a server such as Windows NT, which in turn gets the data you requested.

    Network Architectures:

    Ethernet Network ArchitectureEthernet

    Ethernet is the most popular physical layer LAN technology in use today. Other LAN types include Token Ring, Fast Ethernet, Fiber Distributed Data Interface (FDDI), Asynchronous Transfer Mode (ATM) and LocalTalk. Ethernet is popular because it strikes a good balance between speed, cost and ease of installation. These benefits, combined with wide acceptance in the computer marketplace and the ability to support virtually all popular network protocols, make Ethernet an ideal networking technology for most computer users today. The Institute for Electrical and Electronic Engineers (IEEE) defines the Ethernet standard as IEEE Standard 802.3. This standard defines rules for configuring an Ethernet network as well as specifying how elements in an Ethernet network interact with one another. By adhering to the IEEE standard, network equipment and network protocols can communicate efficiently.

    Fast Ethernet

    For Ethernet networks that need higher transmission speeds, the Fast Ethernet standard (IEEE 802.3u) has been established. This standard raises the Ethernet speed limit from 10 Megabits per second (Mbps) to 100 Mbps with only minimal changes to the existing cable structure. There are three types of Fast Ethernet: 100BASE-TX for use with level 5 UTP cable, 100BASE-FX for use with fiber-optic cable, and 100BASE-T4 which utilizes an extra two wires for use with level 3 UTP cable. The 100BASE-TX standard has become the most popular due to its close compatibility with the 10BASE-T Ethernet standard. For the network manager, the incorporation of Fast Ethernet into an existing configuration presents a host of decisions. Managers must determine the number of users in each site on the network that need the higher throughput, decide which segments of the backbone need to be reconfigured specifically for 100BASE-T and then choose the necessary hardware to connect the 100BASE-T segments with existing 10BASE-T segments. Gigabit Ethernet is a future technology that promises a migration path beyond Fast Ethernet so the next generation of networks will support even higher data transfer speeds.

    Token Ring ArchitectureToken Ring

    Token Ring is another form of network configuration which differs from Ethernet in that all messages are transferred in a unidirectional manner along the ring at all times. Data is transmitted in tokens, which are passed along the ring and viewed by each device. When a device sees a message addressed to it, that device copies the message and then marks that message as being read. As the message makes its way along the ring, it eventually gets back to the sender who now notes that the message was received by the intended device. The sender can then remove the message and free that token for use by others.

    Various PC vendors have been proponents of Token Ring networks at different times and thus these types of networks have been implemented in many organizations.

    FDDI architectureFDDI

    FDDI (Fiber-Distributed Data Interface) is a standard for data transmission on fiber optic lines in a local area network that can extend in range up to 200 km (124 miles). The FDDI protocol is based on the token ring protocol. In addition to being large geographically, an FDDI local area network can support thousands of users.

    Protocols:

    Network protocols are standards that allow computers to communicate. A protocol defines how computers identify one another on a network, the form that the data should take in transit, and how this information is processed once it reaches its final destination. Protocols also define procedures for handling lost or damaged transmissions or "packets." TCP/IP (for UNIX, Windows NT, Windows 95 and other platforms), IPX (for Novell NetWare), DECnet (for networking Digital Equipment Corp. computers), AppleTalk (for Macintosh computers), and NetBIOS/NetBEUI (for LAN Manager and Windows NT networks) are the main types of network protocols in use today.

    Although each network protocol is different, they all share the same physical cabling. This common method of accessing the physical network allows multiple protocols to peacefully coexist over the network media, and allows the builder of a network to use common hardware for a variety of protocols. This concept is known as "protocol independence,"

    Some Important Protocols and their job:
    ProtocolAcronymIts Job
    Point-To-PointTCP/IPThe backbone protocol of the internet. Popular also for intranets using the internet
    Transmission Control Protocol/internet ProtocolTCP/IPThe backbone protocol of the internet. Popular also for intranets using the internet
    Internetwork Package Exchange/Sequenced Packet ExchangeIPX/SPXThis is a standard protocol for Novell Network Operating System
    NetBIOS Extended User InterfaceNetBEUIThis is a Microsoft protocol that doesn't support routing to other networks
    File Transfer ProtocolFTPUsed to send and receive files from a remote host
    Hyper Text Transfer ProtocolHTTPUsed for the web to send documents that are encoded in HTML.
    Network File ServicesNFSAllows network nodes or workstations to access files and drives as if they were their own.
    Simple Mail Transfer ProtocolSMTPUsed to send Email over a network
    Telnet Used to connect to a host and emulate a terminal that the remote server can recognize

    Introduction to TCP/IP Networks:

    TCP/IP-based networks play an increasingly important role in computer networks. Perhaps one reason for their appeal is that they are based on an open specification that is not controlled by any vendor.

    What Is TCP/IP?

    TCP stands for Transmission Control Protocol and IP stands for Internet Protocol. The term TCP/IP is not limited just to these two protocols, however. Frequently, the term TCP/IP is used to refer to a group of protocols related to the TCP and IP protocols such as the User Datagram Protocol (UDP), File Transfer Protocol (FTP), Terminal Emulation Protocol (TELNET), and so on.

    The Origins of TCP/IP

    In the late 1960s, DARPA (the Defense Advanced Research Project Agency), in the United States, noticed that there was a rapid proliferation of computers in military communications. Computers, because they can be easily programmed, provide flexibility in achieving network functions that is not available with other types of communications equipment. The computers then used in military communications were manufactured by different vendors and were designed to interoperate with computers from that vendor only. Vendors used proprietary protocols in their communications equipment. The military had a multi vendor network but no common protocol to support the heterogeneous equipment from different vendors

    Net work Cables and Stuff:

    In the network you will commonly find three types of cables used these are the, coaxial cable, fiber optic and twisted pair.

    Thick Coaxial Cable

    This type cable is usually yellow in color and used in what is called thicknets, and has two conductors. This coax can be used in 500-meter lengths. The cable itself is made up of a solid center wire with a braided metal shield and plastic sheathing protecting the rest of the wire.

    Thin Coaxial Cable

    As with the thick coaxial cable is used in thicknets the thin version is used in thinnets. This type cable is also used called or referred to as RG-58. The cable is really just a cheaper version of the thick cable.

    Fiber Optic Cable

    As we all know fiber optics are pretty darn cool and not cheap. This cable is smaller and can carry a vast amount of information fast and over long distances.

    Twisted Pair Cables

    These come in two flavors of unshielded and shielded.

    Unshielded Twisted Pair and Shielded Twisted Pair

    Shielded Twisted Pair (STP)

    Is more common in high-speed networks. The biggest difference you will see in the UTP and STP is that the STP use's metallic shield wrapping to protect the wire from interference.

    -Something else to note about these cables is that they are defined in numbers also. The bigger the number the better the protection from interference. Most networks should go with no less than a CAT 3 and CAT 5 is most recommended.

    -Now you know about cables we need to know about connectors. This is pretty important and you will most likely need the RJ-45 connector. This is the cousin of the phone jack connector and looks real similar with the exception that the RJ-45 is bigger. Most commonly your connector are in two flavors and this is BNC (Bayonet Naur Connector) used in thicknets and the RJ-45 used in smaller networks using UTP/STP.

    Unshielded Twisted Pair (UTP)

    This is the most popular form of cables in the network and the cheapest form that you can go with. The UTP has four pairs of wires and all inside plastic sheathing. The biggest reason that we call it Twisted Pair is to protect the wires from interference from themselves. Each wire is only protected with a thin plastic sheath.

    Ethernet Cabling

    Now to familiarize you with more on the Ethernet and it's cabling we need to look at the 10's. 10Base2, is considered the thin Ethernet, thinnet, and thinwire which uses light coaxial cable to create a 10 Mbps network. The cable segments in this network can't be over 185 meters in length. These cables connect with the BNC connector. Also as a note these unused connection must have a terminator, which will be a 50-ohm terminator.

    10Base5, this is considered a thicknet and is used with coaxial cable arrangement such as the BNC connector. The good side to the coaxial cable is the high-speed transfer and cable segments can be up to 500 meters between nodes/workstations. You will typically see the same speed as the 10Base2 but larger cable lengths for more versatility.

    10BaseT, the “T” stands for twisted as in UTP (Unshielded Twisted Pair) and uses this for 10Mbps of transfer. The down side to this is you can only have cable lengths of 100 meters between nodes/workstations. The good side to this network is they are easy to set up and cheap! This is why they are so common an ideal for small offices or homes.

    100BaseT, is considered Fast Ethernet uses STP (Shielded Twisted Pair) reaching data transfer of 100Mbps. This system is a little more expensive but still remains popular as the 10BaseT and cheaper than most other type networks. This on of course would be the cheap fast version.

    10BaseF, this little guy has the advantage of fiber optics and the F stands for just that. This arrangement is a little more complicated and uses special connectors and NIC's along with hubs to create its network. Pretty darn neat and not to cheap on the wallet.

    An important part of designing and installing an Ethernet is selecting the appropriate Ethernet medium. There are four major types of media in use today: Thickwire for 10BASE5 networks, thin coax for 10BASE2 networks, unshielded twisted pair (UTP) for 10BASE-T networks and fiber optic for 10BASE-FL or Fiber-Optic Inter-Repeater Link (FOIRL) networks. This wide variety of media reflects the evolution of Ethernet and also points to the technology's flexibility. Thickwire was one of the first cabling systems used in Ethernet but was expensive and difficult to use. This evolved to thin coax, which is easier to work with and less expensive.

    Network Topologies:

    What is a Network topology?

    A network topology is the geometric arrangement of nodes and cable links in a LAN,

    There are three topology's to think about when you get into networks. These are the star, rind, and the bus.

    Star, in a star topology each node has a dedicated set of wires connecting it to a central network hub. Since all traffic passes through the hub, the hub becomes a central point for isolating network problems and gathering network statistics.

    Ring, a ring topology features a logically closed loop. Data packets travel in a single direction around the ring from one network device to the next. Each network device acts as a repeater, meaning it regenerates the signal

    Bus, the bus topology, each node (computer, server, peripheral etc.) attaches directly to a common cable. This topology most often serves as the backbone for a network. In some instances, such as in classrooms or labs, a bus will connect small workgroups

    Collisions:

    Ethernet is a shared media, so there are rules for sending packets of data to avoid conflicts and protect data integrity. Nodes determine when the network is available for sending packets. It is possible that two nodes at different locations attempt to send data at the same time. When both PCs are transferring a packet to the network at the same time, a collision will result.

    Minimizing collisions is a crucial element in the design and operation of networks. Increased collisions are often the result of too many users on the network, which results in a lot of contention for network bandwidth. This can slow the performance of the network from the user's point of view. Segmenting the network, where a network is divided into different pieces joined together logically with a bridge or switch, is one way of reducing an overcrowded network.

    Ethernet Products:

    The standards and technology that have just been discussed help define the specific products that network managers use to build Ethernet networks. The following text discusses the key products needed to build an Ethernet LAN.

    Transceivers

    Transceivers are used to connect nodes to the various Ethernet media. Most computers and network interface cards contain a built-in 10BASE-T or 10BASE2 transceiver, allowing them to be connected directly to Ethernet without requiring an external transceiver. Many Ethernet devices provide an AUI connector to allow the user to connect to any media type via an external transceiver. The AUI connector consists of a 15-pin D-shell type connector, female on the computer side, male on the transceiver side. Thickwire (10BASE5) cables also use transceivers to allow connections.

    For Fast Ethernet networks, a new interface called the MII (Media Independent Interface) was developed to offer a flexible way to support 100 Mbps connections. The MII is a popular way to connect 100BASE-FX links to copper-based Fast Ethernet devices.

    Network Interface CardsNetwork Interface Cards:

    Network interface cards, commonly referred to as NICs, and are used to connect a PC to a network. The NIC provides a physical connection between the networking cable and the computer's internal bus. Different computers have different bus architectures; PCI bus master slots are most commonly found on 486/Pentium PCs and ISA expansion slots are commonly found on 386 and older PCs. NICs come in three basic varieties: 8-bit, 16-bit, and 32-bit. The larger the number of bits that can be transferred to the NIC, the faster the NIC can transfer data to the network cable.

    Many NIC adapters comply with Plug-n-Play specifications. On these systems, NICs are automatically configured without user intervention, while on non-Plug-n-Play systems, configuration is done manually through a setup program and/or DIP switches.

    Cards are available to support almost all networking standards, including the latest Fast Ethernet environment. Fast Ethernet NICs are often 10/100 capable, and will automatically set to the appropriate speed. Full duplex networking is another option, where a dedicated connection to a switch allows a NIC to operate at twice the speed.

    Hubs/Repeaters:

    Hubs/repeaters are used to connect together two or more Ethernet segments of any media type. In larger designs, signal quality begins to deteriorate as segments exceed their maximum length. Hubs provide the signal amplification required to allow a segment to be extended a greater distance. A hub takes any incoming signal and repeats it out all ports.

    Ethernet hubs are necessary in star topologies such as 10BASE-T. A multi-port twisted pair hub allows several point-to-point segments to be joined into one network. One end of the point-to-point link is attached to the hub and the other is attached to the computer. If the hub is attached to a backbone, then all computers at the end of the twisted pair segments can communicate with all the hosts on the backbone. The number and type of hubs in any one-collision domain is limited by the Ethernet rules. These repeater rules are discussed in more detail later.
    Network TypeMax Nodes
    Per Segment
    Max Distance
    Per Segment
    10BASE-T
    10BASE2
    10BASE5
    10BASE-FL
    2
    30
    100
    2
    100m
    185m
    500m
    2000m

    Adding Speed:

    While repeaters allow LANs to extend beyond normal distance limitations, they still limit the number of nodes that can be supported. Bridges and switches, however, allow LANs to grow significantly larger by virtue of their ability to support full Ethernet segments on each port. Additionally, bridges and switches selectively filter network traffic to only those packets needed on each segment - this significantly increases throughput on each segment and on the overall network. By providing better performance and more flexibility for network topologies, bridges and switches will continue to gain popularity among network managers.

    Bridges:

    The function of a bridge is to connect separate networks together. Bridges connect different networks types (such as Ethernet and Fast Ethernet) or networks of the same type. Bridges map the Ethernet addresses of the nodes residing on each network segment and allow only necessary traffic to pass through the bridge. When a packet is received by the bridge, the bridge determines the destination and source segments. If the segments are the same, the packet is dropped ("filtered"); if the segments are different, then the packet is "forwarded" to the correct segment. Additionally, bridges do not forward bad or misaligned packets.

    Bridges are also called "store-and-forward" devices because they look at the whole Ethernet packet before making filtering or forwarding decisions. Filtering packets, and regenerating forwarded packets enable bridging technology to split a network into separate collision domains. This allows for greater distances and more repeaters to be used in the total network design.

    Ethernet Switches

    Ethernet Switches:

    Ethernet switches are an expansion of the concept in Ethernet bridging. LAN switches can link four, six, ten or more networks together, and have two basic architectures: cut-through and store-and-forward. In the past, cut-through switches were faster because they examined the packet destination address only before forwarding it on to its destination segment. A store-and-forward switch, on the other hand, accepts and analyzes the entire packet before forwarding it to its destination.

    It takes more time to examine the entire packet, but it allows the switch to catch certain packet errors and keep them from propagating through the network. Both cut-through and store-and-forward switches separate a network into collision domains, allowing network design rules to be extended. Each of the segments attached to an Ethernet switch has a full 10 Mbps of bandwidth shared by fewer users, which results in better performance (as opposed to hubs that only allow bandwidth sharing from a single Ethernet). Newer switches today offer high-speed links, FDDI, Fast Ethernet or ATM. These are used to link switches together or give added bandwidth to high-traffic servers. A network composed of a number of switches linked together via uplinks is termed a "collapsed backbone" network.

    Routers:

    Routers filter out network traffic by specific protocol rather than by packet address. Routers also divide networks logically instead of physically. An IP router can divide a network into various subnets so that only traffic destined for particular IP addresses can pass between segments. Network speed often decreases due to this type of intelligent forwarding. Such filtering takes more time than that exercised in a switch or bridge, which only looks at the Ethernet address. However, in more complex networks, overall efficiency is improved by using routers.

    What is a network firewall?

    A firewall is a system or group of systems that enforces an access control policy between two networks. The actual means by which this is accomplished varies widely, but in principle, the firewall can be thought of as a pair of mechanisms: one which exists to block traffic, and the other which exists to permit traffic. Some firewalls place a greater emphasis on blocking traffic, while others emphasize permitting traffic. Probably the most important thing to recognize about a firewall is that it implements an access control policy. If you don't have a good idea of what kind of access you want to allow or to deny, a firewall really won't help you. It's also important to recognize that the firewall's configuration, because it is a mechanism for enforcing policy, imposes its policy on everything behind it. Administrators for firewalls managing the connectivity for a large number of hosts therefore have a heavy responsibility.

    Network Design Criteria:

    Ethernets and Fast Ethernets have design rules that must be followed in order to function correctly. Maximum number of nodes, number of repeaters and maximum segment distances are defined by the electrical and mechanical design properties of each type of Ethernet and Fast Ethernet media.

    A network using repeaters, for instance, functions with the timing constraints of Ethernet. Although electrical signals on the Ethernet media travel near the speed of light, it still takes a finite time for the signal to travel from one end of a large Ethernet to another. The Ethernet standard assumes it will take roughly 50 microseconds for a signal to reach its destination.

    Ethernet is subject to the "5-4-3" rule of repeater placement: the network can only have five segments connected; it can only use four repeaters; and of the five segments, only three can have users attached to them; the other two must be inter-repeater links.

    If the design of the network violates these repeater and placement rules, then timing guidelines will not be met and the sending station will resend that packet. This can lead to lost packets and excessive resent packets, which can slow network performance and create trouble for applications. Fast Ethernet has modified repeater rules, since the minimum packet size takes less time to transmit than regular Ethernet. The length of the network links allows for a fewer number of repeaters. In Fast Ethernet networks, there are two classes of repeaters. Class I repeaters have a latency of 0.7 microseconds or less and are limited to one repeater per network. Class II repeaters have a latency of 0.46 microseconds or less and are limited to two repeaters per network. The following are the distance (diameter) characteristics for these types of Fast Ethernet repeater combinations:
    Fast EthernetCopperFiber
    No Repeaters
    One Class I Repeater
    One Class II Repeater
    Two Class II Repeaters
    100m
    200m
    200m
    205m
    412m*
    272m
    272m
    228m
    * Full Duplex Mode 2 km


    When conditions require greater distances or an increase in the number of nodes/repeaters, then a bridge, router or switch can be used to connect multiple networks together. These devices join two or more separate networks, allowing network design criteria to be restored. Switches allow network designers to build large networks that function well. The reduction in costs of bridges and switches reduces the impact of repeater rules on network design.

    Each network connected via one of these devices is referred to as a separate collision domain in the overall network.

    Types of Servers:

    Device Servers

    A device server is defined as a specialized, network-based hardware device designed to perform a single or specialized set of server functions. It is characterized by a minimal operating architecture that requires no per seat network operating system license, and client access that is independent of any operating system or proprietary protocol. In addition the device server is a "closed box," delivering extreme ease of installation, minimal maintenance, and can be managed by the client remotely via a Web browser.

    Print servers, terminal servers, remote access servers and network time servers are examples of device servers which are specialized for particular functions. Each of these types of servers has unique configuration attributes in hardware or software that help them to perform best in their particular arena.

    Print Servers

    Print servers allow printers to be shared by other users on the network. Supporting either parallel and/or serial interfaces, a print server accepts print jobs from any person on the network using supported protocols and manages those jobs on each appropriate printer.

    Print servers generally do not contain a large amount of memory; printers simply store information in a queue. When the desired printer becomes available, they allow the host to transmit the data to the appropriate printer port on the server. The print server can then simply queue and print each job in the order in which print requests are received, regardless of protocol used or the size of the job.

    Multiport Device Servers

    Devices that are attached to a network through a multiport device server can be shared between terminals and hosts at both the local site and throughout the network. A single terminal may be connected to several hosts at the same time (in multiple concurrent sessions), and can switch between them. Multiport device servers are also used to network devices that have only serial outputs. A connection between serial ports on different servers is opened, allowing data to move between the two devices.

    Given its natural translation ability, a multi-protocol multiport device server can perform conversions between the protocols it knows, like LAT and TCP/IP. While server bandwidth is not adequate for large file transfers, it can easily handle host-to-host inquiry/response applications, electronic mailbox checking, etc. And it is far more economical than the alternatives of acquiring expensive host software and special-purpose converters. Multiport device and print servers give their users greater flexibility in configuring and managing their networks.

    Whether it is moving printers and other peripherals from one network to another, expanding the dimensions of interoperability or preparing for growth, multiport device servers can fulfill your needs, all without major rewiring.

    Access Servers

    While Ethernet is limited to a geographic area, remote users such as traveling sales people need access to network-based resources. Remote LAN access, or remote access, is a popular way to provide this connectivity. Access servers use telephone services to link a user or office with an office network. Dial-up remote access solutions such as ISDN or asynchronous dial introduce more flexibility. Dial-up remote access offers both the remote office and the remote user the economy and flexibility of "pay as you go" telephone services. ISDN is a special telephone service that offers three channels, two 64 Kbps "B" channels for user data and a "D" channel for setting up the connection. With ISDN, the B channels can be combined for double bandwidth or separated for different applications or users. With asynchronous remote access, regular telephone lines are combined with modems and remote access servers to allow users and networks to dial anywhere in the world and have data access. Remote access servers provide connection points for both dial-in and dial-out applications on the network to which they are attached. These hybrid devices route and filter protocols and offer other services such as modem pooling and terminal/printer services. For the remote PC user, one can connect from any available telephone jack (RJ45), including those in a hotel rooms or on most airplanes.

    Network Time Servers

    A network time server is a server specialized in the handling of timing information from sources such as satellites or radio broadcasts and is capable of providing this timing data to its attached network. Specialized protocols such as NTP or udp/time allow a time server to communicate to other network nodes ensuring that activities that must be coordinated according to their time of execution are synchronized correctly. GPS satellites are one source of information that can allow global installations to achieve constant timing.

    IP Addressing:

    An IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network. An IP address is a 32 bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. This is known as "dotted decimal" notation.

    Example: 140.179.220.200

    It is sometimes useful to view the values in their binary form.

    140 .179 .220 .200

    10001100.10110011.11011100.11001000

    Every IP address consists of two parts, one identifying the network and one identifying the node. The Class of the address and the subnet mask determine which part belongs to the network address and which part belongs to the node address.

    Address Classes:

    There are 5 different address classes. You can determine which class any IP address is in by examining the first 4 bits of the IP address.

    Class A addresses begin with 0xxx, or 1 to 126 decimal.

    Class B addresses begin with 10xx, or 128 to 191 decimal.

    Class C addresses begin with 110x, or 192 to 223 decimal.

    Class D addresses begin with 1110, or 224 to 239 decimal.

    Class E addresses begin with 1111, or 240 to 254 decimal.

    Addresses beginning with 01111111, or 127 decimal, are reserved for loopback and for internal testing on a local machine. [You can test this: you should always be able to ping 127.0.0.1, which points to yourself] Class D addresses are reserved for multicasting. Class E addresses are reserved for future use. They should not be used for host addresses.

    Now we can see how the Class determines, by default, which part of the IP address belongs to the network (N) and which part belongs to the node (n).

    Class A -- NNNNNNNN.nnnnnnnn.nnnnnnn.nnnnnnn

    Class B -- NNNNNNNN.NNNNNNNN.nnnnnnnn.nnnnnnnn

    Class C -- NNNNNNNN.NNNNNNNN.NNNNNNNN.nnnnnnnn

    In the example, 140.179.220.200 is a Class B address so by default the Network part of the address (also known as the Network Address) is defined by the first two octets (140.179.x.x) and the node part is defined by the last 2 octets (x.x.220.200).

    In order to specify the network address for a given IP address, the node section is set to all "0"s. In our example, 140.179.0.0 specifies the network address for 140.179.220.200. When the node section is set to all "1"s, it specifies a broadcast that is sent to all hosts on the network. 140.179.255.255 specifies the example broadcast address. Note that this is true regardless of the length of the node section.

    Private Subnets:

    There are three IP network addresses reserved for private networks. The addresses are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. They can be used by anyone setting up internal IP networks, such as a lab or home LAN behind a NAT or proxy server or a router. It is always safe to use these because routers on the Internet will never forward packets coming from these addresses

    Subnetting an IP Network can be done for a variety of reasons, including organization, use of different physical media (such as Ethernet, FDDI, WAN, etc.), preservation of address space, and security. The most common reason is to control network traffic. In an Ethernet network, all nodes on a segment see all the packets transmitted by all the other nodes on that segment. Performance can be adversely affected under heavy traffic loads, due to collisions and the resulting retransmissions. A router is used to connect IP networks to minimize the amount of traffic each segment must receive.

    Subnet Masking

    Applying a subnet mask to an IP address allows you to identify the network and node parts of the address. The network bits are represented by the 1s in the mask, and the node bits are represented by the 0s. Performing a bitwise logical AND operation between the IP address and the subnet mask results in the Network Address or Number.

    For example, using our test IP address and the default Class B subnet mask, we get:

    10001100.10110011.11110000.11001000 140.179.240.200 Class B IP Address

    11111111.11111111.00000000.00000000 255.255.000.000 Default Class B Subnet Mask

    10001100.10110011.00000000.00000000 140.179.000.000 Network Address

    Default subnet masks:

    Class A - 255.0.0.0 - 11111111.00000000.00000000.00000000

    Class B - 255.255.0.0 - 11111111.11111111.00000000.00000000

    Class C - 255.255.255.0 - 11111111.11111111.11111111.00000000

    CIDR -- Classless InterDomain Routing.

    CIDR was invented several years ago to keep the internet from running out of IP addresses. The "classful" system of allocating IP addresses can be very wasteful; anyone who could reasonably show a need for more that 254 host addresses was given a Class B address block of 65533 host addresses. Even more wasteful were companies and organizations that were allocated Class A address blocks, which contain over 16 Million host addresses! Only a tiny percentage of the allocated Class A and Class B address space has ever been actually assigned to a host computer on the Internet.

    People realized that addresses could be conserved if the class system was eliminated. By accurately allocating only the amount of address space that was actually needed, the address space crisis could be avoided for many years. This was first proposed in 1992 as a scheme called Supernetting.

    The use of a CIDR notated address is the same as for a Classful address. Classful addresses can easily be written in CIDR notation (Class A = /8, Class B = /16, and Class C = /24)

    It is currently almost impossible for an individual or company to be allocated their own IP address blocks. You will simply be told to get them from your ISP. The reason for this is the ever-growing size of the internet routing table. Just 5 years ago, there were less than 5000 network routes in the entire Internet. Today, there are over 90,000. Using CIDR, the biggest ISPs are allocated large chunks of address space (usually with a subnet mask of /19 or even smaller); the ISP's customers (often other, smaller ISPs) are then allocated networks from the big ISP's pool. That way, all the big ISP's customers (and their customers, and so on) are accessible via 1 network route on the Internet.

    It is expected that CIDR will keep the Internet happily in IP addresses for the next few years at least. After that, IPv6, with 128 bit addresses, will be needed. Under IPv6, even sloppy address allocation would comfortably allow a billion unique IP addresses for every person on earth

    Examining your network with commands:

    Ping

    PING is used to check for a response from another computer on the network. It can tell you a great deal of information about the status of the network and the computers you are communicating with.

    Ping returns different responses depending on the computer in question. The responses are similar depending on the options used.

    Ping uses IP to request a response from the host. It does not use TCP

    .It takes its name from a submarine sonar search - you send a short sound burst and listen for an echo - a ping - coming back.

    In an IP network, `ping' sends a short data burst - a single packet - and listens for a single packet in reply. Since this tests the most basic function of an IP network (delivery of single packet), it's easy to see how you can learn a lot from some `pings'.

    To stop ping, type control-c. This terminates the program and prints out a nice summary of the number of packets transmitted, the number received, and the percentage of packets lost, plus the minimum, average, and maximum round-trip times of the packets.

    Sample ping session

    PING localhost (127.0.0.1): 56 data bytes
    64 bytes from 127.0.0.1: icmp_seq=0 ttl=255 time=2 ms
    64 bytes from 127.0.0.1: icmp_seq=1 ttl=255 time=2 ms
    64 bytes from 127.0.0.1: icmp_seq=2 ttl=255 time=2 ms
    64 bytes from 127.0.0.1: icmp_seq=3 ttl=255 time=2 ms
    64 bytes from 127.0.0.1: icmp_seq=4 ttl=255 time=2 ms
    64 bytes from 127.0.0.1: icmp_seq=5 ttl=255 time=2 ms
    64 bytes from 127.0.0.1: icmp_seq=6 ttl=255 time=2 ms
    64 bytes from 127.0.0.1: icmp_seq=7 ttl=255 time=2 ms
    64 bytes from 127.0.0.1: icmp_seq=8 ttl=255 time=2 ms
    64 bytes from 127.0.0.1: icmp_seq=9 ttl=255 time=2 ms

    localhost ping statistics

    10 packets transmitted, 10 packets received, 0% packet loss
    round-trip min/avg/max = 2/2/2 ms
    meikro$

    The Time To Live (TTL) field can be interesting. The main purpose of this is so that a packet doesn't live forever on the network and will eventually die when it is deemed "lost." But for us, it provides additional information. We can use the TTL to determine approximately how many router hops the packet has gone through. In this case it's 255 minus N hops, where N is the TTL of the returning Echo Replies. If the TTL field varies in successive pings, it could indicate that the successive reply packets are going via different routes, which isn't a great thing.

    The time field is an indication of the round-trip time to get a packet to the remote host. The reply is measured in milliseconds. In general, it's best if round-trip times are under 200 milliseconds. The time it takes a packet to reach its destination is called latency. If you see a large variance in the round-trip times (which is called "jitter"), you are going to see poor performance talking to the host

    NSLOOKUP

    NSLOOKUP is an application that facilitates looking up hostnames on the network. It can reveal the IP address of a host or, using the IP address, return the host name.

    It is very important when troubleshooting problems on a network that you can verify the components of the networking process. Nslookup allows this by revealing details within the infrastructure.

    NETSTAT

    NETSTAT is used to look up the various active connections within a computer. It is helpful to understand what computers or networks you are connected to. This allows you to further investigate problems. One host may be responding well but another may be less responsive.

    IPconfig

    This is a Microsoft windows NT, 2000 command. It is very useful in determining what could be wrong with a network.

    This command when used with the /all switch, reveal enormous amounts of troubleshooting information within the system.

    Windows 2000 IP Configuration

    Host Name . . . . . . . . . . . . : cowder
    Primary DNS Suffix . . . . . . . :
    Node Type . . . . . . . . . . . . : Broadcast
    IP Routing Enabled. . . . . . . . : No
    WINS Proxy Enabled. . . . . . . . : No
    WINS Proxy Enabled. . . . . . . . : No
    Connection-specific DNS Suffix . :
    Description . . . . . . . . . . . :
    WAN (PPP/SLIP) Interface
    Physical Address. . . . . . . . . : 00-53-45-00-00-00
    DHCP Enabled. . . . . . . . . . . : No
    IP Address. . . . . . . . . . . . : 12.90.108.123
    Subnet Mask . . . . . . . . . . . : 255.255.255.255
    Default Gateway . . . . . . . . . : 12.90.108.125
    DNS Servers . . . . . . . . . . . : 12.102.244.2
    204.127.129.2

    Traceroute

    Traceroute on Unix and Linux (or tracert in the Microsoft world) attempts to trace the current network path to a destination. Here is an example of a traceroute run to www.berkeley.edu:

    $ traceroute www.berkeley.edu

    traceroute to amber.Berkeley.EDU (128.32.25.12), 30 hops max, 40 byte packets

    1 sf1-e3.wired.net (206.221.193.1) 3.135 ms 3.021 ms 3.616 ms

    2 sf0-e2s2.wired.net (205.227.206.33) 1.829 ms 3.886 ms 2.772 ms

    3 paloalto-cr10.bbnplanet.net (131.119.26.105) 5.327 ms 4.597 ms 5.729 ms

    4 paloalto-br1.bbnplanet.net (131.119.0.193) 4.842 ms 4.615 ms 3.425 ms

    5 sl-sj-2.sprintlink.net (4.0.1.66) 7.488 ms 38.804 ms 7.708 ms

    6 144.232.8.81 (144.232.8.81) 6.560 ms 6.631 ms 6.565 ms

    7 144.232.4.97 (144.232.4.97) 7.638 ms 7.948 ms 8.129 ms

    8 144.228.146.50 (144.228.146.50) 9.504 ms 12.684 ms 16.648 ms

    9 f5-0.inr-666-eva.berkeley.edu (198.128.16.21) 9.762 ms 10.611 ms 10.403 ms

    10 f0-0.inr-107-eva.Berkeley.EDU (128.32.2.1) 11.478 ms 10.868 ms 9.367 ms

    11 f8-0.inr-100-eva.Berkeley.EDU (128.32.235.100) 10.738 ms 11.693 ms 12.520 ms
    What's a Server?
    A main computer which manages the resources in a network is known as a server. Servers are specialized today. The types of servers depend on its function. These computer servers do not have any other function than to do their server tasks. For example a print server manages two or more printers.

    Server Types:

    Application Servers:

    Application servers are sometimes called as “middleware” as they link the user to a database server and returns data as requested by the user. For example there are servers in the network between a user and the Web server. These middleware servers process the specific page requested by the user and collects it from the server to return to the user. Such servers which connect two applications or computers are known as application servers.

    Video Servers:

    Multimedia like audio and video are brought from the website to the user with a video server in between. These intermediate servers are known as video servers. It functions as a load balancing server.

    Fax Servers:

    Fax servers are used between two fax machines to store the data faxed from one and printed in another.

    Newsgroup Servers:

    Newsgroups are online bulletin boards where millions of users can share data about any interest in specialized groups. These newsgroups in USENET are maintained by newsgroup servers.

    Telnet Servers:

    Telnet servers allow users to connect their remote computer to a network through a telnet (telecommunication network).

    Proxy Servers:

    Proxy servers are servers between a web browser and another server in the Web to process requests and improve efficiency.

    Wireless Servers:

    Computers or hardware in a network are connected to other hardware without wires in a wireless server. Common wireless servers are printer servers.

    Cluster Servers:

    One of most important type of server is cluster servers. Software that enables clustering of servers is installed into a computer. Clustering servers also serve as load balancing servers between two computers. This is a common small business server. Clustering servers are used to avoid server failover. Server failover is the capability to shift to another standby server if the main server fails.

    Dedicated Servers:

    Dedicated web server is the rental and usage of Web servers and its software. Dedicated servers are used for websites with huge amount of traffic or a large business. The actual computer server is present with the web hosting company.
    Service is provided in two types:
    1. Managed Dedicated Server Hosting: The web host maintains the dedicated servers while the client only needs to provide data. The web host also takes care of any server problems providing a reliable and trouble-free experience for the client.
       
    2. Unmanaged Dedicated Server Hosting: The server is maintained by the client. The web host only provides physical security. Server problems are solved by the web host for an additional fee.

    Remote Network Monitoring (RMON):

    Servers are used in remote network monitoring to collect data from remote computers and share it to another computer.



    more tips comming soon......AJAY SWARNKAR..