Computer Networks FAQs
Computer Networks FAQs
NOTE : This is just a quick effort to have some probable questions which can be asked
during your CNI viva. This is not an alternative to your reference books but just a
supplement. Some questions are repeated and have multiple answers. So be alert while
reading it. And just don’t blame me for any errors found on this document.
Ans: Hubs operate at ISO layer 1 - physical layer, Switches operates at ISO layer 2 - data
link layer, and Routers operate at ISO layer 3 - network layer.
HUB
When Ethernet was originally designed it used a single fat coax called a backbone.
Individual hosts were physically connected to the backbone. This created a party line.
Each host has to listen for the backbone to be idle before it started talking. It is possible
more then one host will start talking at the same time, in that case the messages collide
making them unintelligible. This condition is detected each transmitter stops talking and
waits a variable interval before attempting to talk again.
The Ethernet network is called a collision domain, since all devices must wait until the
line is clear, and may inadvertently interfere with one another.
When Ethernet was modified to run over Unshielded Twisted Pair (UTP) Category rated
wiring the original coax backbone was shrunk within the hub, called a collapsed
backbone. Functionally a hub operates exactly as the old coax backbone. The ports on the
hub provide a point-to-point connection to the Ethernet interface in each computer. With
a hub each node must wait for the network to be idle and detect collisions between
multiple nodes.
SWITCH
As Ethernet networks grew in speed and size the party line nature was recognized as a
performance limitation. Switches eliminate the collision domain and work much like the
telephone switching system.
When an Ethernet packet arrives at the switch the destination MAC address is examined
and the packet is switched to the proper port. Each Ethernet interface has a Media Access
Controller (MAC) 48-bit address assigned by the hardware vendor. The switch
remembers which MAC addresses are connected to each port. If the Switch does not
know which port to use it floods the packet to all ports. When it gets a response it updates
its internal MAC address table.
This means Port A can talk to C at the same time F is taking to B. This greatly increases
overall performance even though it does not change the speed of individual connections.
Because the collision domain is eliminated connections are able to use full duplex, hosts
can transmit and receive at the same time improving performance even more.
ROUTER
A router is used to interconnect multiple networks.
The Internet is literally “Inter-network” ,a network of networks. Internet router’s work
on IP addresses to determine how best to interconnect the sender to the destination.
Because router’s work at the IP layer different physical networks can be interconnected,
Ethernet, Token Ring, Sonet, even RS232 serial used for dialup can carry IP packets.
Routers intended for home use include Network Address Translation (NAT). This allows
a single address assigned by the ISP to be shared by multiple hosts connected to the local
network.
Ans: Development of the technologies that became the Internet began decades ago. The
development of the World Wide Web (WWW) portion of the Internet happened much
later, although many people consider this synonymous with creating the Internet itself.
No single person or organization created the modern Internet, including Al Gore,
Lyndon Johnson, or any other individual. Instead, multiple people developed the key
technologies that later grew to become the Internet:
• Email - Long before the World Wide Web, email was the dominant
communication method on the Internet. Ray Tomlinson developed in 1971 the
first email system that worked over the early Internet.
ANS: Data transmitted over a network using the Transport Control Protocol/Internet
Protocol (TCP/IP), such as the Internet, includes address information that identifies the
computer (32-bit IP address) and a port. Ports number (16-bit number) the ends of
logical connections used for long-term data transfers between applications.
For example port 80 is the standard File Transfer Protocol (FTP) port used by Hyper
Text Transfer Protocol (HTTP) to send and retrieve web pages. Service contact ports or
"well-known ports" are used to provide services to unknown callers. Port numbers are
divided into three categories and ranges:
Level 2: Up to to 1 MHz.
It is typically used for voice and data transmission rates up 10 Mbps (mega bits per
second).
CAT 5: frequencies up to 100 MHz... Voice and data transmission rates up to 100Mbps.
CAT 5e: frequencies up to 100 MHz. CAT 5e components have better transmission
performance characteristics than CAT 5 and are most suitable for use in high-speed
Gigabit Ethernets. Yes, 100 Mhz.
ANS: Although hubs and switches both glue the PCs in a network together, a switch is
more expensive and a network built with switches is generally considered faster than one
built with hubs.
When a hub receives a packet (chunk) of data ( frame int the Ethernet lingo)on the
network, it transmits (repeats) the packet to all of its ports and, thus, to all of the other
PCs on the network.
If two or more PCs on the network try to send packets at the same time a collision is said
to occur. When that happens all of the PCs have to go though a routine to resolve the
conflict. The process is prescribed in the Ethernet Carrier Sense Multiple Access with
Collision Detection (CSMA/CD) protocol. Each Ethernet Adapter has both a receiver and
a transmitter. If the adapters didn't have to listen with their receivers for collisions they
would be able to send data at the same time they are receiving it (full duplex). Because
they have to operate at half duplex (data flows one way at a time) and a hub retransmits
data from one PC to all of the PCs, the maximum bandwidth is 100 Mhz and that
bandwidth is shared by all of the PC's connected to the hub. The result is when a person
using a computer on a hub downloads a large file or group of files from another computer
the network becomes congested. In a 10 Mhz 10Base-T network the affect is to slow the
network to nearly a crawl. The affect on a small, 100 Mbps (million bits per scond), 5-
port network is not as significant.
An Ethernet switch automatically divides the network into multiple segments, acts as a
high-speed, selective bridge between the segments, and supports simultaneous
connections of multiple pairs of computers which don't compete with other pairs of
computers for network bandwidth. It accomplishes this by maintaining a table of each
destination address and its port. When the switch receives a packet, it reads the
destination address from the header information in the packet, establishes a temporary
connection between the source and destination ports, sends the packet on its way, and
then terminates the connection.
Picture a switch as making multiple temporary crossover cable connections between pairs
of computers (the cables are actually straight-thru cables; the crossover function is done
inside the switch). High-speed electronics in the switch automatically connect the end of
one cable (source port) from a sending computer to the end of another cable (destination
port) going to the receiving computer on a per packet basis. Multiple connections like
this can occur simultaneously. It's as simple as that. And like a crossover cable between
two PCs, PC's on an Ethernet switch do not share the transmission media, do not
experience collisions or have to listen for them, can operate in a full-duplex mode, have
bandwidth as high as 200 Mbps, 100 Mbps each way, and do not share this bandwidth
with other PCs on the switch. In short, a switch is "more better."
Q.)Is CAT 5 (and CAT 5e, 6) network cable a good choice for audio applications;
e.g., connecting speakers to an amplifier?
Ans. I have not used network cable for audio other than telephones, but I understand that
it is an excellent choice for audio (analog and digital) and even video applications. Here
are some references.
"In a recent article, Steve Lampen, a senior audio video specialist for Beldin Wire &
Cable writes, "Digital audio cables make the absolute best analog cables. You can go
farther with flatter frequency response than with any cable designed for analog". This is
because due to it's characteristic low capacitance, data cable is designed to transmit data
at high velocity and wide bandwidths. At audio frequencies, these characteristics will
yield exceptionally flat frequency response, even over very long cable lengths."
As a matter of possible interest, there are all in one cables that have two CAT 5e cables
and two RG-6 cables in them. The last price I saw was $.67/foot. There also cables that
have these cables plus a fiber optic cable for somewhere in the neighborhood of three
times that price. There are probably other cables with “CAT 6” cables. I use “” around
CAT 6 because as far as I know there is no CAT 6 standard yet (but I have not checked in
a couple of months or so). CAT 5e will work for the Gigabit Ethernet (1000BASE-TX) ,
but CAT 6 is supposed to provide more headroom (call it room for error).
Ans. MAC = Media Access Control. Each and every Ethernet device interface to the
network media (e.g., network adapter, port on a hub) has a unique MAC address, which is
"burned" into the hardware when it is manufactured. MAC addresses uniquely identify
each node in a network at the Media Access Control layer, the lowest network layer, the
one that directly interfaces with the media, such as the actual wires in a twisted-pair
Ethernet. In modern Ethernets the MAC address consists of six bytes which are usually
displayed in hexadecimal; e.g.,
00-0A-CC-32-FO-FD
The first three bytes (e.g., 00-0A-CC) are the manufacturer's code and can be used to
identify the manufacturer. The last three are the unique station ID or serial number for
the interface. One can determine the MAC address of an operating Network Interface
Card (NIC or network adapter) in Windows 9X/Me with Start, Run, enter winipcfg, and
select the adapter. In Windows NT, 2000, and XP it can be determined by opening a
DOS Window/Prompt (Start, Programs, Accessories...) and typing:
C:\>ipconfig /all
Many broadband routers can clone a NIC MAC address. That is, make the Wide Area
Network (WAN) Ethernet interface going to a cable or DSL MODEM look like a NIC in
a PC. This is useful in that many MODEMs marry themselves to a specific MAC address
when they are first installed and it can be rather difficult to get them to marry themselves
to a new MAC address. The WAN port MAC address on some routers can be manually
changed (e.g., the SMC7004ABR).
Ans. Cables. Sometime ago, I read that about 70% of network problems are caused by
faulty cables. This figure may have been a holdover from older coaxial thin wire
Ethernet networks (http://duxcw.com/faq/network/thinwire.htm), which were notorious,
and one of the reasons twisted-pair networks were developed; however, my experience
shows the problem has not been entirely solved, by any means, and that cabling still
accounts for the bulk of network problems, and especially when installing new networks.
My experience also shows that that percentage is probably higher than 70% when
crossover cables (http://duxcw.com/digest/Howto/network/cable/cable6.htm) are
involved because many of them are custom made by people who do not know how to
make them, use the wrong kind of cable/connectors, do not have proper tools, and do not
test them (http://duxcw.com/faq/network/catest.htm) at Ethernet frequencies.
Understanding and following the instructions at
http://duxcw.com/digest/Howto/network/cable/cable1.htm and other guidance in these
FAQs can help avoid most of these problems. Anyone who sells an untested custom cable
grossly lacks professional acumen is not worthy of future business. Larry
Test Those Patch Cords. 'Recent patch cord testing shows 70% of Category 5e cords
and 83% of Category 6 cords fail to meet TIA requirements... Most patch cord assembly
houses could not afford the equipment or personnel to test cords... cords are usually only
tested for continuity and wire mapping.' Which does not support the TIA answer to this
FAQ: Will contractors be able to make their own patch cords?
Q.)What is DHCP?
Does it come with windows 2000 when you install it? No.
Is it part of the Operating System? It depends how you define Operating System. The
client is part of the TCP/IP protocol. A DHCP server may come with the Operating
System software.
When you have a cable MODEM from an ISP is the DHCP sitting at the ISP site?
Yes, one of them is. A DOCSIS (Data Over Cable Service Interface Specification) cable
MODEM also has a DHCP server which supplies a local IP address that is used to
connect to the ISP DHCP server top obtain an IP for the Internet.
Is DHCP part part of the Windows 2000 Server the operating system? A DHCP server is
included as a service with Windows NT/2000 Server.
Windows 2000, 98 SE/Me, etc. Internet Connection Server (ICS) software includes a
DHCP server.
Refs:http://www.dhcp.org/
Ans. The Internet Assigned Numbers Authority (IANA) has reserved the following three
blocks of the IP address space for private internets (local networks):
10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255
I usually use 192.168.0.1, 192.168.0.2, etc. and a subnet mask of 255.255.255.0 when
assigning static IP addresses to computers on a small Local Area Networks (LANs). If a
DHCP server is also on the LAN it's scope (range of IP addresses that it can assign to
computers on the LAN set to obtain their IP addresses automatically) should be adjusted
so it does not interfere with locally assigned static IP addresses.
Ans. Windows 98, 98 SE, Me, and 2000 have an Automatic Private IP Addressing
(APIPA) feature that will automatically assign an Internet Protocol address to a computer
on which it installed. This occurs when the TCP/IP protocol is installed, set to obtain it's
IP address automatically from a Dynamic Host Configuration Protocol server, and when
there is no DHCP server present or the DHCP server is not available. The Internet
Assigned Numbers Authority (IANA) has reserved private IP addresses in the range of
169.254.0.0 -169.254.255.255 for Automatic Private IP Addressing.
After the network adapter has been assigned an automatic IP address, a computer can
communicate with any other computers on the local network that are also configured by
APIPA or have static IP address manually set to the 169.254.x.y (where x.y is the client's
unique identifier) address range with a subnet mask of 255.255.0.0.
• Your network uses routers, including broadband routers with built-in DHCP
servers).
• Your network is connected to the Internet without a NAT or proxy server.
Use Start, Run, enter winipcfg, select the adapter for Windows 98, 98 SE, Me to detect
APIPA and to release and renew the automaitc IP when a DHCP server becomes
available. The windows 2000 equivalent is ipconfig. Use Start, Run, enter cmd and then
enter ipconfig at the command prompt. Enter...
c:\>ipconfig /?
Ans. 10BASE2 (or "thinwire" Ethernet or “Cheapernet”) is denotes the IEEE 802.3
physical Layer specification for a 10 Mbits/sec. data rate, baseband network with a 185-
meter maximum segment length. It uses RG-58/AU stranded core coaxial cable.
10base5 (or "thickwire" Ethernet) is the physical Layer Specification for a 10 Mbps
baseband network with a 500-meter maximum segment length. It uses double-shielded
RG-11 coaxial cable.
Ans. Twisted--pair cable testers capable of certifying twisted-pair cables for operation at
Ethernet speeds cost in the neighborhood of $3,000 to $5,000. Simple continuity testers,
which are relatively inexpensive ($30-$50, or probably less at Radio Shack, etc.), send a
tone down the line and/or perform a roundtrip DC resistance test. They do not measure
impedance/line capacitive loading at RF frequencies, noise, and some of the more
esoteric cable properties. They are not adequate tests for certifying cables and do not
guarantee, by any means, that an Ethernet cable will operate at Ethernet speeds. Ethernet
adapters automatically perform a better test than continuity testers as they send multiple
pulses down the line and Link LEDs on them will not light-up unless the cables are wired
so that the correct Ethernet transmitter pins are connected to the correct Ethernet
Receiver pins. However, the Link LEDs can be lit and the cable may still not work.
Short of expensive test equipment, downloading and running Xixia's
QCheck will provide a good indication of whether or not you have a
marginal cable. This program is free and will measure network
throughput at the tcp level. I get a throughputs of 82 to 84 Mbps
between computers connected to a broadband router and total wire
distances of about 120 feet. That is quite good considering the
network protocol overhead. The program runs on Windows Me, NT,
2000, XP, and Linux. It must be running on both computers at the
ends of the cables being tested.
Ans. Most NICs or network adapters come with one or more floppy disks containing
drivers, etc. for various operating systems. These floppies also usually include a
diagnostic program to test the NIC. Many of these programs are DOS-Based and must be
run by booting the computer to DOS or from a DOS window in Windows. Unless you
have a loopback plug installed, the loopback test will probably fail. A loopback plug
directs signals from the NIC's transmitter back to it's receiver. An indicator that a NIC
and cabling is functioning is to check the LINK (sometimes labeled LNK, etc.) and
Activity (ACT, etc.) LEDs, if there are any, on the NIC and on the device at the other end
of the cable. The LINK should be solid with no flickering and the ACTIVITY should be
blinking, which indicates, of course, network activity. This indication is not as thorough
a test as the diagnostics program and it is not foolproof (see Why would the Link (or
LNK) LEDs be on solid, if there is a faulty cable connecting two Ethernet devices?).
The diagnostics program and LED observations may not conclusively show that the NIC
is fully functional in Windows. Look for exclamation marks beside the NIC driver in the
Windows 9x/Me Device Manager (click Start, Settings, Control Panel, System, Device
Manger...), which indicate a resource conflict and run the Windows Resource Conflict
Troubleshooter if you find any. Look for multiple instances of the NIC driver in the
network configuration (click Start, Settings, Control Panel, Network and remove all of
them, if you find any, restart Windows and reinstall the driver, etc. Run hwinfo (click
Start, Run, and enter hwinfo /ui). To help narrow-down problems, click View in the
main menu and select Devices with Problems. Once these steps are completed and the
NIC passes, try copying about 100 MBytes of files to another computer on the network.
Net diag and ping are useful tools for further testing a NIC and a network. For more info,
open a DOS windows and type:
C:\>ping /?
and
C:\>net /?
Ping requires that the TCP/IP protocol be installed, and IP addresses be assigned at both
ends of the network segment to be tested.
Modern networks support very large numbers of bits per second. Instead of quoting
10,000 bps or 100,000 bps, networkers normally express these quantities in terms of
larger quantities like "kilobits," "megabits," and "gigabits."
In networking, both "kbps" with a lowercase 'k' and "Kbps" with an uppercase 'K' can be
used interchangeably.
Technically, network speed can also be expressed in units of bytes per second,
abbreviated as "Bps" with a capital 'B'. Use of these quantities is discouraged in
networking to avoid confusion with the bits per second standard:
The conventions used for measuring the capacity of computer disks and memory might
appear similar at first to those for networks. Do not confuse these conventions.
• 1 KB = 1,024 bytes
• 1 kB = 1,000 bytes
• 1 MB = 1,024 KB
• 1 GB = 1,024 MB
Q.)What is the difference between Port Forwarding and Port Triggering? (#5799)
Port forwarding:
New connections from the outside to a certain port or port range go to a designated LAN
machine. The ports are determined by the kind of server you want to run, (e.g. 80 for a
web server) and the IP is the private LAN IP of your web server.
Port triggering: new connections from the outside to a certain port go to whatever LAN
machine made a certain outgoing connection (as defined by destination port).
Example: You define port 25 as trigger and 113 as port. If any of your LAN machines
creates a outgoing connection (=trigger) to port 25 (e.g. to send mail), all incoming
connections to port 113 will temporarily go that that machine. After a timeout, new 113
connections will again be dropped as in case (1).
1000Base-LX
Length: 550m (62.5 or 50 multimode fibre)
3000m (10 singlemode fibre)
1000Base-SX
Length: 250m (62.5 multimode fibre)
550m (50 multimode fibre)
1000Base-CX
Length: 25m (requires new type of shielded cable)
*NOTE: These lengths can vary by equipment vendor. Some products enable 100Mbps
Full Duplex over 100km now (or 60Miles).
What is an IP address?
IP addresses are usually not entered directly by end users. Instead, DNS servers are used
to map permanent and user-friendly names like boutell.com to unfriendly and
impermanent IP addresses, such as 64.246.52.10.
An IP address is made up of four numbers, each between 0 and 255. For instance, as of
this writing, the IP address of boutell.com is:
64.246.52.10
The most general information is conveyed by the first number, and the specific
identification of a single computer within a single network is usually made by the last
number. In general, delegation of responsibility for various portions of the IP address
space is carried out by the Asia Pacific Network Information Centre (APNIC), the
American Registry for Internet Numbers (ARIN), the Latin-American And Caribbean
Internet Addresses Registry (LACNIC), and the RIPE Network Coordination Centre
(RIPE NCC).
The above description applies to IPv4, the most commonly used version of the IP
protocol that underlies the Internet and similar networks. A newer system, IPV6,
addresses the fact that the number of IPv4 addresses is limited to approximately four
billion (256 to the fourth power), with the practical maximum considerably lower than
that due to the ways in which addresses are assigned. When much of the Earth's
population begins to use the Internet from a variety of devices, this limitation becomes a
serious problem. IPv6 addresses have a vastly greater range, inexhaustible for all
practical purposes.
You will not always have the same IP address, unless you have specifically arranged for a
fixed IP address, typically from a cable modem, DSL or other high-speed provider.
Therefore, your IP address usually does not uniquely identify you as an individual. When
you dial into your Internet service provider with your modem, an IP address is
temporarily assigned to your computer for the duration of the call. Even web servers such
as boutell.com will typically change their IP address when they move from one hosting
facility to another; DNS servers make this transparent for the end user by automatically
translating domain names to IP addresses. With the exception of the "root" DNS servers,
which are used to resolve the IP addresses of all other DNS servers, all IP addresses are
subject to potential change.
Those who use the Internet at work, or who have a connection-sharing router at home, do
not truly have an Internet IP address for their individual computer. Instead, the
connection-sharing router holds the Internet IP address, carries out the requests made by
the various personal computers "behind" the router, and appears to the rest of the Internet
to be a single, very busy computer. The personal computers "behind" the router have IP
addresses on an intranet. Such IP addresses typically resemble 192.168.2.2 or 10.1.1.7,
because the prefixes 192.168. and 10. are universally reserved for such private networks
and are guaranteed never to be assigned to systems on the Internet.
This lack of a true Internet IP address for each personal computer can be a very good
thing, because it prevents incoming connections to individual PCs, providing some
protection from certain types of attacks. Unfortunately, there are many other ways for
computers to become infected by viruses, spyware and similar software. For more
information, see can my computer catch a virus from a web page? and why is my web
browser broken?
Such setups can also have a downside: if you wish to run a server on one of the
computers behind the connection-sharing router, you must explicitly configure your
router to forward connections on certain ports to that particular computer.
If your ISP provides dynamic IP address service, you can expect your IP address to
change each time you reconnect.
Contrary to popular belief, you do not need a static IP address in order to run a server on
your own computer. Dynamic DNS services provide a way to give your computer an
Internet hostname that does not change, such as example.is-a-geek.com. These services
automatically update the IP address that corresponds to your hostname every time your IP
address changes. For more information about dynamic DNS services, see my article how
do I get a hostname for my own computer?
See also what is TCP/IP, what is a protocol, what is a static IP address, what is an IP
address, should I host my own web server at home, how do I host my own web server at
home.
What is a URL?
2003-09-04: look up at the top of this web page. Above the page you will see the
"location bar" of your web browser, which should contain something very like this:
http://www.boutell.com/newfaq/definitions/url.html
This is the Uniform Resource Locator (URL) of the web page you are looking at right
now. A URL can be thought of as the "address" of a web page and is sometimes referred
to informally as a "web address."
URLs are used to write links linking one page to another; for an example, see the HTML
entry.
A URL is made up of several parts. The first part is the protocol, which tells the web
browser what sort of server it will be talking to in order to fetch the URL. In this
example, the protocol is http.
The remaining parts vary depending on the protocol, but the vast majority of URLs you
will encounter use the http protocol; exceptions include file URLs, which link to local
files on your own hard drive, ftp URLs, which work just like http URLs but link to
things on FTP servers rather than web servers, and mailto URLs, which can be used to
invite a user to write an email message to a particular email address.
The second part of the example URL above is the fully qualified domain name of the
website to connect to. In this case, the fully qualified domain name is www.boutell.com.
This name identifies the web site containing the page. The term "fully qualified domain
name" refers to a complete website or other computer's name on the Internet. The term
"domain name" usually refers only to the last part of the name, in this case boutell.com,
which has been registered for that particular company's exclusive use. For more
information about registering domain names, see the setting up websites entry.
The third part of the example URL is the path at which this particular web page is
located on the web server. In this case, the path is /newfaq/basic/url.html. Similar to a
filename, a path usually indicates where the web page is located within the web space of
the website; in this case it is located in the basic sub-folder of the newfaq folder, which is
located in the top-level web page directory of our website.
For more information, see a beginner's guide to URLs, as well as my article what is my
URL?
Registered domain names are themselves part of a "top-level domain." See the top-level
domains entry for more information about top-level domains such as .com, .edu, .mx, .fr
and so on.
For more information about registering domain names, see how do I register a domain
name, how do I register a .edu domain name, and how do I set up a website.
2006-10-15: FTP (File Transfer Protocol) is an older protocol for moving files back and
forth over the Internet and other networks. All modern web browsers still speak FTP,
which was sometimes used as a substitute for HTTP in the early days of the web. FTP is
still used often as a means of downloading large files.
Many web hosts still offer FTP as the preferred way of uploading new web pages to a
website. However, because there is no encryption of your password, FTP is not the best
choice for this purpose. And since there is no encryption of the files being moved, FTP is
a poor choice indeed for more sensitive information.
SFTP (Secure FTP) is a popular replacement. Built on SSL, SFTP is just as secure as
HTTPS. And most modern FTP clients, such as the free, high-quality FileZilla program
for Windows, support both FTP and SFTP. SFTP offers a set of features quite similar to
FTP and will be immediately familiar to FTP users, although it works quite differently
"under the hood."
Every Windows, MacOS X and Linux system comes standard with a simple command
line FTP client program. And MacOS X and Linux also have command line SFTP clients
as standard equipment. In addition, MacOS X supports connections to FTP servers in a
user-friendly way, right out of the box (you can find a great tutorial on creativemac.com).
"ASCII mode" is sometimes used for plain-text (usually, .txt) files. ASCII mode, named
for the American Standard Code for Information Interchange which determines what byte
stands for each letter, number or other character in text, corrects for differences in the
way line endings are stored in text files. Windows traditionally uses a carriage return
(represented by an ASCII value of 13) followed by a line feed (represented by 10). Unix
typically expects just the line feed. And MacOS, at least prior to MacOS X, preferred a
carriage return only.
Today, though, most text-editing and viewing programs can view text files that follow
any of these three conventions (including Microsoft Word, and the free WordPad
program that comes with Windows, but excluding a few annoying holdovers like
Windows Notepad). So ASCII mode doesn't do us much good. These days ASCII mode
is mostly an annoyance, something people accidentally leave on in a very old fashioned
command-line FTP program, or accidentally turn on in a newer one. And when you're
moving a program, an image or anything else with an exact file format that must not be
modified, that means you get garbage instead of the file you wanted.
The norm today is for FTP to simply ship files unchanged in binary mode.
Once upon a time there was also something called "TENEX mode," to move files
between computers that didn't even use the same number of bits to represent a byte. Yes,
FTP has been around that long! But TENEX mode doesn't come up as an issue these
days, and we're all happier for it.
when we install a dhcp server into our network then dhcp server works on the basis of
dora process
first dhcp server sends a hello message in to the network to discover the clients pc and
when any client pc found in the network then , dhcp server offers the IP to client pc.
When client pc select any IP from dhcp server then client pc request for selected IP to
dhcp server then dhcp server provide that IP to client pc and both send ackonledgement
to each other.
This process is called DORA process on the basis of this process DHCP server works to
provide IP's dynamically to client pc's in network
Q.)What is HTTPS?
2006-09-11: HTTPS is HTTP over SSL. Now, let me explain that in English!
HTTP, the HyperText Transfer Protocol, is the language or "protocol" that all web
browsers speak when talking to web servers. And SSL, which stands for Secure Sockets
Layer, is a protocol that provides secure communication. When two programs talk to
each other using HTTP, but do it using SSL's secure communications instead of talking
"in the clear," they are speaking HTTPS.
When two programs communicate via HTTPS, they need a way to verify each other's
identity and agree on a method of encryption. They do this via SSL certificates. See what
is an SSL certificate? for more information.
HTTPS URLs can be recognized by the additional s after http. By default, HTTPS
communication happens on TCP/IP port number 443 instead of port 80.
Ans:This is possible in Linux based system's. IP's can be splitted in two IP's !! And it can
be achieved from single NIC card !!
Answer
Sure you can .. if you are using Windows you can configure the TCP/IP Protocol in your
Network Properties and then you can add additional IP addresses
Answer
'''Windows XP''' * Control Panel -> Network Connections -> Local Area Connection ->
Properties -> Internet Protocol (TCP/IP) * Type in a static ip address * Then click
Advanced * Under the "Ip address" group box, click add to add more ip addresses.
You would need to do this in the case where you need to connect to more then one
different subnet where proper routing has not been set up.
now right click on internet explorer then go to properties and then go to connections
and click there lan settings buttons and then in proxy server give the ip of 2nd lan card of
proxy server
Q.)What is router?
A router is a device that forwards data packets along networks. A router is connected to
at least two networks, commonly two LANs or WANs or a LAN and its ISP's network.
Routers are located at gateways, the places where two or more networks connect, and are
the critical device that keeps data flowing between networks and keeps the networks
connected to the Internet. When data is sent between locations on one network or from
one network to a second network the data is always seen and directed to the correct
location by the router. They accomplish his by using headers and forwarding tables to
determine the best path for forwarding the data packets, and they use protocols such as
ICMP to communicate with each other and configure the best route between any two
hosts. The Internet itself is a global network connecting millions of computers and
smaller networks — so you can see how crucial the role of a router is to our way of
communicating and computing.
What is router?
Router is a layer 3 device.Routers are used to connects networks together.Routers routes
packets of data from one network to another.Routers breaks up broadcast domain (it is
the set of all devices on a n/w segment that hears all broadcast sent on that
segment).breaking up a broadcast domain is important because when host or server sends
a n/w broadcast,every device on n/w must read and process that broadcast.but when
router interface receives this broadcast then router discards this broadcast without
forwarding it to another network.
Routers can filter network based on layer 3 information.
Considering there are some very popular Web sites which serve millions of DNS queries
per day e.g., Google.com, Hotmail.com, it is logical that these domain names cannot
solely rely on one single DNS server, cause if that fails, the whole domain could become
unreachable!
It is, for this reason, a fault-tolerant DNS service is put in place, which shares the DNS
queries amongst several different DNS servers. All servers are configured to either
randomly provide clients with IP addresses from a specific pool, or -- by using a round
robin method -- cycle between the pool of IP addresses. This is what gives a DNS name
multiple IP addresses.
What is Client/Server?
Clients and Servers are separate logical entities that work together over a network to
accomplish a task. Many systems with very different architectures that are connected
together are also called Client/Server.
Client/server describes the relationship between two computer programs in which one
program, the client, makes a service request from another program, the server, which
fulfills the request.
Server is computer that provide sservice.client is another computer that use service the
server which can give a service to requested system.
The Client is that which can take the service to a severs.
What is SSL?
2006-09-11: SSL (Secure Sockets Layer), also known as TLS (Transport Layer Security),
is a protocol that allows two programs to communicate with each other in a secure way.
Like TCP/IP, SSL allows programs to create "sockets," endpoints for communication,
and make connections between those sockets. But SSL, which is built on top of TCP,
adds the additional capability of encryption. The HTTPS protocol spoken by web
browsers when communicating with secure sites is simply the usual World Wide Web
HTTP protocol, "spoken" over SSL instead of directly over TCP.
In addition to providing privacy, SSL encryption also allows us to verify the identity of
the party we are talking to. This can be very important if we don't trust the Internet.
While it is unlikely in practice that the root DNS servers of the Internet will be subverted,
a "man in the middle" attack elsewhere on the network could substitute the address of one
Internet site for another. SSL prevents this scenario by providing a mathematically sound
way to verify the other program's identity. When you log on to your bank's website, you
want to be very, very sure you are talking to your bank!
A "public key" is a string of letters and numbers that can be used to encrypt a message so
that only the owner of the public key can read it. This is possible because every public
key has a corresponding private key that is kept secret by the owner of the public key.
How exactly are the public and private key related? That depends on the algorithm
(mathematical method) used. SSL allows several algorithms, of which the most famous is
the RSA algorithm invented by Ron Rivest, Adi Shamir and Len Adleman of MIT in
1977.
Several algorithms, including RSA, depend on properties of very large prime numbers.
For instance, it is very difficult to difficult to factor a number that is a product of two
large primes, unless you already know one of the primes.
Public and private keys can also be used in the opposite way: a message encrypted with
the private key can only be decrypted (read) with the public key. This comes in handy at
the beginning of the conversation, as a way of verifying the other program's identity.
The web server responds with two things: its own public key encoded in an SSL
certificate, which we'll examine more closely later, and the "greeting" encrypted with its
private key.
Jane's web browser then decrypts the greeting with the bank's public key. If the decrypted
greeting matches the original greeting sent by the browser, then Jane's browser can be
sure it is really talking to the owner of the private key - because only the holder of the
private key can encrypt a message in such a way that the corresponding public key will
decrypt it.
Now, let's suppose Bob is monitoring this traffic on the Internet. He has the bank's public
key, and Jane's greeting. But he doesn't have the bank's private key. So he can't encrypt
the greeting and send it back. That means Jane can't be fooled by Bob.
That's why the complete SSL handshake includes more than just the bank's public key.
The public key is part of an SSL certificate issued by a certificate authority that Jane's
browser already trusts.
How does this work? When web browser software is installed on a computer, it already
contains the public keys of several certificate authorities, such as GoDaddy, VeriSign and
Thawte. Companies that want their secure sites to be "trusted" by web browsers must
purchase an SSL certificate from one of these authorities.
But what is the certificate, exactly? The SSL certificate consists essentially of the bank's
public key and a statement identifying the bank, encrypted with the certificate authority's
private key.
When the bank's web server sends its certificate to Jane's browser, Jane's browser
decrypts it with the public key of the certificate authority. If the certificate is fake, the
decryption results in garbage. If the certificate is valid, out pops the bank's public key,
along with the identifying statement. And if that statement doesn't include, among other
information, the same hostname that Jane connected to, Jane receives an appropriate
warning message and decides not to continue the connection.
Now, let's return to Bob. Can he substitute himself convincingly for the bank? No, he
can't, because he doesn't have the certificate authority's private key. That means he can't
sign a certificate claiming that he is the bank.
Now that Jane's browser is thoroughly convinced that the bank is what it appears to be,
the conversation can continue.
But what if Bob is still listening? Bob might receive the symmetric key from Jane, but
that information is itself encrypted with the bank's public key... and can only be
decrypted with the bank's private key. Which Bob doesn't have. So
Jane and the bank now share a symmetric key, also known as a "master secret," that no
one else can know. And this allows them to continue communicating secretly.
Additional Reading
Here I've discussed what a typical SSL conversation looks like and addressed the
essential features of public key cryptography. I've tried to cover the important features
while keeping things understandable. But for simplicity's sake, I've glossed over quite a
bit.
If you're interested in understanding the mathematical details and the many encryption
algorithms that can be employed, you can find a more technical discussion on Wikipedia.
What is TLS?
2006-09-11: TLS, or Transport Layer Security, is another name for the SSL encryption
protocol, version 3 or later. See what is SSL?
What is HTTP?
2003-09-23: In order to fetch a web page for you, your web browser must "talk" to a web
server somewhere else. When web browsers talk to web servers, they speak a language
known as HTTP, which stands for HyperText Transfer Protocol. This language is actually
very simple and understandable and is not difficult for the human eye to follow.
The first line of the server's reply, HTTP/1.0 200 OK, indicates that the server is also
speaking version 1.0 of the HTTP protocol, and that the request was successful. If the
page the browser asked for did not exist, the response would read HTTP/1.0 404 Not
Found. The second line of the server's reply, Content-Type: text/html, tells the browser
that the object it is about to receive is a web page. This is how the browser knows what to
do with the response from the server. If this line were Content-Type: image/png, the
browser would know to expect a PNG image file rather than a web page, and would
display it accordingly.
A modern web browser would say a bit more using the HTTP 1.1 protocol, and a modern
web server would respond with a bit more information, but the differences are not
dramatic and the above transaction is still perfectly valid; if a browser made a request
exactly like the one above today, it would still be accepted by any web server, and the
response above would still be accepted by any browser. This simplicity is typical of most
of the protocols that grew up around the Internet.
Make sure you press ENTER twice after the Host: line to end your HTTP headers.
Your telnet program probably will not show you what you are typing, but after you press
ENTER the second time, you should receive your website's home page in HTML after a
short pause. Congratulations, you have carried out your very own simple HTTP
transaction.
HTTP itself is "layered" on top of another protocol, TCP. For more information, see the
article what is TCP/IP?
What is a firewall?
2003-06-30: a firewall sits between your computer and the rest of the Internet, filtering
out unwanted traffic and foiling attempts to interfere with or take over your computer.
Firewalls can be separate devices, which is very common today, or simply pieces of
software for your own computer, which is also fairly common. Separate firewall devices
are often preferable because their very simplicity makes them less likely to have
unknown security problems; however, it is still important to keep up with "firmware
updates" released by the manufacturer, otherwise your firewall may be vulnerable to
attack. "Cable/DSL routers" and similar devices sold by companies like Linksys provide
simple firewall capabilities which are adequate for most home users.
2004-03-25: Web browser plug-ins (sometimes just spelled plugins) are additional pieces
of software that add extra capabilities to your web browser, such as the ability to view
movies, run Java applets, or see Flash animations. Unfortunately, since plug-ins run with
all the privileges of real applications, they can do absolutely anything to your computer.
That means you should never, ever agree to install a plug-in unless you have very
good reason to trust the source. Keep in mind that the Flash plug-in comes with your
computer, and most systems also come with a Java plug-in. Other mainstream plug-ins
include RealPlayer. You will almost never have a good reason to install a plug-in that
isn't one of these, so say "no" when your browser asks you to install one, unless you have
an excellent reason to do otherwise. See what is ActiveX? for more information on this
subject.
2004-08-17: Programs that cause your computer to display ads even when you are not
using the program in question for its intended purpose, as well as those that report
information about your web browsing activities to an advertising firm, are commonly
known as "spyware." Typical examples are programs like "WeatherBug" and
"MemoryMeter." These claim to serve a useful purpose and, in some cases, actually
provide some service, but their main goal is to present annoying and unwanted
advertising throughout your web browsing experience. They are very difficult to remove
manually. Fortunately, there are excellent free tools available to do the job correctly. For
more information, see why is my web browser broken?
Adware programs, strictly speaking, are well-behaved applications that happen to display
some advertising in that program, while you are using that program. Usually this is
offered as an alternative to paying for the software. This is a perfectly legitimate practice,
but with the exception of a few well-known programs like the Opera web browser, true
adware has become quite rare, crowded out by aggressive spyware.
What is ActiveX?
2004-08-17: ActiveX is Microsoft's technology for signing plug-ins that add additional
software to your computer when a web page is accessed. If all goes well, you will be
asked whether you want to trust a plug-in from that particular company and you will have
the option of saying no. In principle, this is a useful way to allow the installation of
worthwhile add-ons, such as Adobe Acrobat Reader, Macromedia Flash Player and
RealPlayer. However, if you do not run Windows Update regularly, all will not go well --
there have been security flaws in Internet Explorer in the past that have resulted in
software being able to install itself without permission.
If you do not have a specific, clear reason to want and trust the software you are
being asked to install -- that is, if it is not the Macromedia Flash Player or the Adobe
Acrobat PDF Reader or something similarly crucial that you really need -- SAY NO!
Many nasty pieces of awful spyware are properly signed and will ask permission to
install, knowing that some people will naively give it. You do NOT, for instance, want to
say yes to installing things like "WeatherBug" or "MemoryMeter," among many others.
For more information about removing such programs you may have installed by mistake,
see why is my web browser broken?
What is DNS?
2003-09-04: every time you follow a link or type in the name of a website, such as
www.boutell.com, that name must be translated into an IP address on the Internet. This
translation is done by the domain name system. A DNS server is a program that
participates in the task of providing this service. Some DNS servers respond to queries
from web browsers and other programs, make further inquiries, and return IP addresses,
such as 208.27.35.236, which is the current IP address of www.boutell.com. Other DNS
servers have primary responsibility for answering DNS inquiries about names within a
particular domain, such as the boutell.com domain. Every time a new domain is
registered, a DNS server must be configured to give out address information for that
domain, so that users can actually find websites in that domain. In most cases, web
hosting companies provide this service for the domains that they host; it is rare for
webmasters to run their own DNS servers. For more information, see setting up websites.
The DNS server of your ISP first talks to one of thirteen "root" DNS servers. The root
DNS servers answer questions at the highest level possible: the top-level domain. For
instance, "who is in charge of DNS for the com domain?"
In practice, your ISP's DNS server caches (remembers) this information for a significant
period of time, and does not contantly harrass the root servers just in case responsibility
for com has changed in the last five seconds. Similarly, your ISP's DNS server
remembers other informaton for appropriate lengths of time as well to avoid extra
queries. But let's assume, just for fun, that no one has ever asked your ISP for the IP
address of www.google.com before!
Now your ISP's DNS server knows which DNS servers are responsible for the com top-
level domain. So your ISP's DNS server reaches out and contacts one of those servers and
asks the next question: who is responsible for DNS in the google.com domain?
The response will list two or more DNS servers that have authority over the google.com
domain.
Finally, your ISP's DNS server contacts one of those DNS servers and asks for the
address of www.google.com, and hands the response back to your computer.
As mentioned above, in real life your ISP's DNS server will remember all of this
information. That means that a typical user will get an immediate response when asking
for the address of a frequently-visited site like Google.
But how long is it safe to remember that information? After all, the IP addresses of
servers do change, though usually not often. Fortunately, your ISP's DNS server doesn't
have to guess! The DNS records that come back from the "upstream" DNS servers
include an "expire" field that indicates how long the information can be kept before the
authoritative server should be asked again.
What is an IP address?
IP addresses are usually not entered directly by end users. Instead, DNS servers are used
to map permanent and user-friendly names like boutell.com to unfriendly and
impermanent IP addresses, such as 64.246.52.10.
An IP address is made up of four numbers, each between 0 and 255. For instance, as of
this writing, the IP address of boutell.com is:
64.246.52.10
The most general information is conveyed by the first number, and the specific
identification of a single computer within a single network is usually made by the last
number. In general, delegation of responsibility for various portions of the IP address
space is carried out by the Asia Pacific Network Information Centre (APNIC), the
American Registry for Internet Numbers (ARIN), the Latin-American And Caribbean
Internet Addresses Registry (LACNIC), and the RIPE Network Coordination Centre
(RIPE NCC).
The above description applies to IPv4, the most commonly used version of the IP
protocol that underlies the Internet and similar networks. A newer system, IPV6,
addresses the fact that the number of IPv4 addresses is limited to approximately four
billion (256 to the fourth power), with the practical maximum considerably lower than
that due to the ways in which addresses are assigned. When much of the Earth's
population begins to use the Internet from a variety of devices, this limitation becomes a
serious problem. IPv6 addresses have a vastly greater range, inexhaustible for all
practical purposes.
You will not always have the same IP address, unless you have specifically arranged for a
fixed IP address, typically from a cable modem, DSL or other high-speed provider.
Therefore, your IP address usually does not uniquely identify you as an individual. When
you dial into your Internet service provider with your modem, an IP address is
temporarily assigned to your computer for the duration of the call. Even web servers such
as boutell.com will typically change their IP address when they move from one hosting
facility to another; DNS servers make this transparent for the end user by automatically
translating domain names to IP addresses. With the exception of the "root" DNS servers,
which are used to resolve the IP addresses of all other DNS servers, all IP addresses are
subject to potential change.
Those who use the Internet at work, or who have a connection-sharing router at home, do
not truly have an Internet IP address for their individual computer. Instead, the
connection-sharing router holds the Internet IP address, carries out the requests made by
the various personal computers "behind" the router, and appears to the rest of the Internet
to be a single, very busy computer. The personal computers "behind" the router have IP
addresses on an intranet. Such IP addresses typically resemble 192.168.2.2 or 10.1.1.7,
because the prefixes 192.168. and 10. are universally reserved for such private networks
and are guaranteed never to be assigned to systems on the Internet.
This lack of a true Internet IP address for each personal computer can be a very good
thing, because it prevents incoming connections to individual PCs, providing some
protection from certain types of attacks. Unfortunately, there are many other ways for
computers to become infected by viruses, spyware and similar software. For more
information, see can my computer catch a virus from a web page? and why is my web
browser broken?
Such setups can also have a downside: if you wish to run a server on one of the
computers behind the connection-sharing router, you must explicitly configure your
router to forward connections on certain ports to that particular computer.
Contrary to popular belief, you do not need a static IP address in order to run a server on
your own computer. Dynamic DNS services provide a way to give your computer an
Internet hostname that does not change, such as example.is-a-geek.com. These services
automatically update the IP address that corresponds to your hostname every time your IP
address changes. For more information about dynamic DNS services, see my article how
do I get a hostname for my own computer?
See also what is TCP/IP, what is a protocol, what is a static IP address, what is an IP
address, should I host my own web server at home, how do I host my own web server at
home.
2006-11-26: A static IP address is a TCP/IP protocol address that does not change.
If your ISP provides static IP address service, you can expect your IP address to stay the
same even if you disconnect from the Internet and reconnect to it later.
Contrary to popular belief, you do not need a static IP address in order to run a server on
your own computer. Dynamic DNS services provide a way to give your computer an
Internet hostname that does not change, such as example.is-a-geek.com. These services
automatically update the IP address that corresponds to your hostname every time your IP
address changes. For more information about dynamic DNS services, see my article how
do I get a hostname for my own computer?
Static IP addresses are required only for those who intend to run their own DNS servers.
In this case, at least two static IP addresses are required. You will still probably want to
pay for another company with a more reliable connection to run your DNS, as this is very
inexpensive. See the article how do I host a real domain name at home? for more
information.
See also what is TCP/IP, what is a protocol, what is a static IP address, what is an IP
address, should I host my own web server at home, how do I host my own web server at
home.
2006-09-11: a site that uses the HTTPS protocol to ensure that your information cannot
be stolen by a third party between the sender and the receiver. For a detailed discussion
of how HTTPS works, see what is HTTPS? and what is an SSL certificate? See also is it
safe to shop online?
What is "caching?"
2004-04-29: Caching refers to the strategy of keeping a copy of a page or image you have
already seen; web browsers typically cache files that they display for you, and simply ask
the server if the page has actually changed rather than always downloading the entire
thing. This speeds up your next visit to the page.
Since caching everything forever would take up too much space, web browsers typically
delete the least recently used file in the cache when a certain total cache size is reached.
Caching also occurs in other places. You may be using a proxy server, in which case the
proxy server is probably caching pages on behalf of you and other users to save trips to
the real Internet.
Users typically become aware of caching when things don't work as expected. For
instance, you might make a change to your own web page, open up your web page in
your web browser, and not see the change until you click the "reload" button, telling your
browser to discard the cached copy of that page.
Of course, some things, such as credit card transactions, should not be cached.
Fortunately, the HTTP protocol that web browsers and servers use to communicate
includes ways for the web server to specify how long a page may be safely cached, if at
all. But sometimes browsers do not perfectly obey such directives. The problem that is
made worse by the tendency of websites built in PHP, ASP or other dynamic web
programming languages to tell the web browser not to cache anything. This problem is
not inherent to those languages, but it is a common result of poorly-thought-out site
design.
Caching can potentially be a privacy issue for those who share their computers; cached
copies of pages on your hard drive can reveal information about your browsing habits.
2004-04-29: proxy servers are specialized web servers that allow web browsers to receive
web pages from web servers without communicating with them directly. Proxy servers
are often used to provide more secure web access in organizations; the proxy server is
allowed to connect to the Internet, but the individual web browsers are only allowed to
"talk" to the proxy server. When there are many users sharing a single proxy server, the
proxy server can also speed up web browsing by caching popular pages.
The HTTP protocol used by web browsers and web servers contains provisions for proxy
servers. In addition, most major Internet Service Providers (ISPs) now run "transparent"
proxy servers without your browser being directly aware of it. This is done by
intercepting Internet packets that are recognized to be part of the HTTP protocol and
silently redirecting them to the proxy server rather than sending them directly to the
intended web server. When an ISP such as America Online has many customers, this can
result in a significant speed increase, because pages can be cached "closer" to the users. It
also provides an opportunity to work around slow modem speeds; the proxy server can
convert large image files to a more compact format, at a considerable cost in quality, and
send those lower-quality images on much more quickly to web browsers that request the
original images.
What are the top-level domains?
2004-05-15: "top-level domains" (TLDs) are the last part of every domain name. In other
words, the top-level domains are .com, .org, .edu, .uk, .net, and so on.
There are two types of top-level domains: two-letter country domains, such as .uk
(United Kingdom), and three-letter domains, such as .com, .org, and .net. National
domain names follow the ISO 3166 standard two-letter codes for each country. The
International Standards Organization adds new two-letter codes to the ISO 3166 list when
the United Nations publishes an updated bulletin of country and region codes. You can
learn more about this on the website of the International Standards Organization.
Once a two-letter code has been assigned, the Internet Assigned Numbers Authority then
identifies the responsible authority within that country that should be permitted to register
subdomains within that country's domain. Some national domains, such as .tv (Tuvalu, a
small island in the Pacific), have become available for commercial registration.
"Generic" domains, such as .com, .org, .edu and .net, are created and overseen by the
ICANN (Internet Corporation for Assigned Names and Numbers). The original generic
domains were .com, .edu, .gov, .int, .mil, .net, and .org. Additional top-level domains
added in recent years are .biz, .info, .name, .pro, .aero, .coop, and .museum.
Any entity can register a domain in .com, .net, .biz, .info, and .org, although .org is
typically used by nonprofit organizations and .net is typically used by Internet Service
Providers. .com is what most people assume when they can't remember the name of your
site, so it is the preferred choice for businesses of all kinds. The .edu domain is reserved
for accredited four-year academic institutions, and registration is handled solely by
educause. .aero is reserved for the international aviation community, .coop is reserved for
cooperative businesses, .museum is reserved for mseums, .name is reserved for
individuals, and .pro is reserved for "licensed professionals," such as lawyers, doctors and
accountants.
For more information about each of the generic domains and an extensive list of
registrars available, see the ICANN accredited registrars page.
While some early indexes of the web were created by hand, modern search engines rely
on automated exploring, or "spidering," of the web by specialized programs that behave
somewhat like web browsers but do not require a human operator.
As of this writing, Google remains the most popular search engine by a large margin.
MSN Search is also a significant player.
2004-08-26: a site that is easily used by individuals with disabilities, especially blindness
and vision impairment, is known as an "accessible" site. There are at least three good
reasons to design your pages to accommodate such users:
For tips on how to achieve accessibility, see how do I make my website more accessible?
What is a blog?
2004-09-14: a web page that presents short journal entries in chronological order, newest
first, is typically referred to as a "blog" or "weblog." Most blogs emphasize links to other
pages and sites, and most entries are short commentaries or even simple one-sentence
links to an interesting page somewhere else. Many blogs are concerned with current news
events and often provide unabashedly partisan commentary. "Blogging," of course, is the
act of writing a blog; those who write blogs are sometimes referred to as "bloggers."
The term "weblog" was apparently coined by John Barger in 1999. The term was
contracted to "blog" later that same year by Peter Merholz.
What is XML?
What is RSS?
2004-09-14: RSS is an HTML-like, XML-compliant format for blogs. RSS is usually said
to stand for "Really Simple Syndication." RSS was originally invented by Netscape
Communications Corporation as a format for "channels," a feature of the Netscape 3.0
web browser. While channels did not take the world by storm, the format became the
basis for a good idea: by publishing an RSS "feed" and giving the world permission to
reproduce it, anyone can contribute to a virtual "newswire" service. RSS aggregators can
then bring the latest stories from many blogs together in chronological order.
While blogging appears to take control of formatting and presentation away from the
author, the reality is that blog entries (or "items") are typically short summaries or
"teasers" associated with a link to the author's website or another site relevant to the story
in question. In this way, RSS feeds help to bring new readers to many websites.
Despite the fundamental simplicity of the idea, the RSS "industry" is crowded with
competing standards and conflicting histories. Important RSS "standards" in use today
include:
1. RSS 0.91. The original Netscape channels specification. Generated by blosxom and
other tools. Very simple and direct. Entries can contain HTML elements for formatting
and additional links.
1. RSS 1.0. Standardized by the RSS-DEV working group. A very complete standard,
including namespaces, extension mechanisms, and various things perhaps lacking in RSS
0.91. Despite the name, this is NOT related to RSS 2.0, and indeed it is not a superset of
RSS 0.91.
1. RSS 2.0. Published by the Berkman Center at Harvard Law. A much simpler standard
completely unrelated to RSS 1.0, RSS 2.0 attempts to maintain the spirit of RSS 0.91
while filling in gaps.
Perhaps at some future date a single RSS standard will emerge as the preferred format. In
the meantime, however, the major syndication services accept well-formed and not-so-
well-formed blogs in all of the above formats, and more. You may choose any of the
above, with good results. I presently use both RSS 0.91, for Innards, and RSS 1.0, for the
RSS feed of the WWW FAQ.
For a particularly thorough effort to make sense of the history of RSS, see Ronan Waide's
RSS presentation notes.
What is Gopher?
Web browsers supported the Gopher protocol for several years. However, support for
Gopher in Microsoft Internet Explorer ended in 2002 and support in other browsers is
moribund. Very few Gopher servers survive today. For more information, see the
Wikipedia entry on Gopher.
2004-10-19: similar to file extensions but more universally accepted, "MIME types" are
used to identify the type of information that a file contains. While the file extension .html
is informally understood to mean that the file is an HTML page, there is no requirement
that it mean this, and many HTML pages have different file extensions.
In the HTTP protocol used by web browsers to talk to web servers, the "file extension" of
the URL is not used to determine the type of information that the server will return.
Indeed, there may be no file extension at all at the end of the URL.
Instead, the web server specifies the correct MIME type using a Content-type: header
when it responds to the web browser's HTTP request.
Here are some examples of common mime types seen on the web:
Common File
Type Purpose
Extension
text/html .html Web Page
image/png .png PNG-format image
image/jpeg .jpeg JPEG-format image
audio/mpeg .mp3 MPEG Audio File
application/octet- Best for downloads that should just be
.exe
stream saved to disk
The Internet Assigned Numbers Authority website offers a complete listing of the official
IANA-registered MIME types.
MIME stands for "Multimedia Internet Mail Extensions." MIME was originally invented
to solve a similar problem for email attachments.
What is phishing?
2004-12-09: "phishing" is the act of sending out email messages that are more or less
exact copies of legitimate HTML emails that well-known companies such as Amazon
send out. Exactly the same in every way... except that the actual site to be reached by
clicking on the link in the email is the site of the criminals doing the "phishing." That site
then makes every effort to look an awful lot like Amazon, and the uninformed fish will
bite, typing in their Amazon username and password, credit card number or other
requested information when asked to do so.
The best way to avoid phishing: don't click on links in email messages! Go to the site in
question yourself, by using one of your favorites or bookmarks or by typing in the site
name in the location bar at the top of your browser window. Also be sure to heed any
warnings about specific phishing scams in progress that may be mentioned on the home
pages of your bank, Amazon, eBay, and other frequent phishing targets.
2006-06-01: A web browser is what you're probably looking at right now: a program on
your computer that shows you stuff that's on the web. A web server is a program on a
server computer, somewhere out on the Internet, that delivers web pages to web
browsers.
The term web server also refers to an actual, physical computer that is running web server
software.
Cookies are used for two main purposes: session management and long-term user
identification.
1. The website can keep track of who you are by placing a special identifier in every
single URL on the site. But that makes the programming of the site painful and creates
URLs that only work for one user. It's also tricky to make those URLs work again later if
the user bookmarks them.
2. The website can use HTTP authentication, an "old-fashioned" way of forcing users to
log in to a website. But while HTTP authentication works, the browser doesn't give the
designer any control over the appearance of the logon prompt, and there's no way to
create a "log out" button. Also, it's not very secure - your password goes out again with
every single request sent to the web server. So most designers don't use HTTP
authentication, except for simple internal sits.
3. The website can simply set a cookie when you first log in. After that, every request
from your web browser contains the cookie, and the website can just look at the cookie to
confirm that you are who you say you are. No ugly links or broken bookmarks required.
And since the cookie can be generated at random and deleted from the server after, let's
say, 24 hours, it's much more secure than the second method.
Cookies like these usually last only for your current "session" of using your computer.
Most websites also offer a "Log Out" button that will delete the cookie right away.
"Session cookies" like these are both harmless and useful, and it's generally a good idea
for your web browser to accept them. Security and privacy are real concerns, but refusing
to accept any cookies is too drastic. Many useful websites won't work without session
cookies.
This isn't a terrible idea - as long as your computer is private. You don't want that on a
public computer! That's why most sites make it an optional checkbox on the login page.
Other websites set permanent cookies as a way to keep track of your identity, even
though they don't require users to log on. That means that even though the people running
the site might not know your real name, they do know your habits.
When sites that don't require you to log on share cookie data with sites that do, they can
build a complete picture of what you do on the Internet. And that's not good for your
personal privacy.
That's why you may prefer to set your browser to store session cookies only, and reject
cookies if the website insists on storing them for longer periods of time. For more
information, see How do I configure my web browser to accept or reject cookies?
What is a protocol?
2006-08-07: On the Internet, the word "protocol" refers to a set of rules for
communicating. Two programs or computers that follow the same rules are able to
exchange information, even if they don't run the same operating system and are not made
by the same company.
Sometimes protocols are "layered" on top of other protocols, taking advantage of what's
already there and adding additional capabilities.
Examples of Internet protocols include the HTTP protocol spoken by web browsers and
web servers, the FTP protocol for transferring files, and the TCP/IP protocols on which
both of these are based.
What does IP stand for?
2007-01-02: "IP" stands for Internet Protocol. This is why we refer to a computer's
numeric address on the Internet as an "IP address."
For a more complete explanation, see my articles what is TCP/IP? and what is an IP
address?
"IP" also stands for "Intellectual Property." A book, a web page, an image, a movie, an
idea - anything that might conceivably be covered by copyright or patent law.
What is TCP/IP?
1. Internet Protocol (IP), which covers fundamentals like IP addresses and routing of
packets of data from one place to another, but doesn't address issues like reliability and
delivery in the correct order.
2. Transmission Control Protocol (TCP), which adds the idea of a reliable connection that
always delivers a stream of data in the correct order. Telephone modems, Ethernet
networks and other physical connections used on the Internet might not be 100% reliable,
and some types of connections don't guarantee that the second packet won't arrive before
the first one. TCP provides rules for checking the order of the data and for resending
anything that is not received. This is the protocol that HTTP, FTP most other Internet
protocols you are familiar with are built on top of.
3. User Datagram Protocol (UDP) is a simple wrapper around the basic features of
Internet Protocl (IP). UDP is useful when you don't care about reliability or in-order
delivery, and you can't afford the extra time that TCP takes to ensure them. When you
browse the World Wide Web, you are using the DNS protocol to look up the names of
websites. DNS is layered on top of UDP. Online gaming is another popular application of
UDP.
2006-09-11: An SSL certificate is a means by which web servers prove their identity to
web browsers, allowing a secure site to communicate privately with the web browser via
the HTTPS protocol.
2006-11-06: 404 Not Found is the HTTP status code produced by a web server when the
page or file you are trying to access does not exist. If you try to access, for instance,
http://www.example.com/xyzabc, you will get a 404 Not Found error, unless the
webmaster has deliberately set up the web server to redirect you to another page instead.
For a complete list of standard HTTP status codes, see the W3 Consortium's website.
2007-05-16: 403 Forbidden is the HTTP status code produced by a web server when you
are not permitted to access a particular URL. Usually a 403 Forbidden error means that
the page in question does exist but cannot be accessed by you.
Some websites are locked down so that only those on the local company or school
network can access parts of the site. You will often see 403 Forbidden errors when
browsing such sites from "off-campus."
Sometimes webmasters try to set up dynamic web programming features like PHP or
Perl/CGI but fail to do so correctly. This can also result in 403 Forbidden errors until the
web server is correctly configured.
403 Forbidden can appear in other situations at the discretion of the webmaster, so you
may see it in scenarios other than these.
Today website forums have largely replaced UseNet, and most newcomers have never
used UseNet. This is due in part to spam problems and an unenforceable moderation
system which have made UseNet more or less unmanageable as the Internet-using public
grows.
Also, in the early days of UseNet, the idea of thousands or millions of users contacting a
single server to fetch messages was impractical. Internet links were slow - or nonexistent.
Some sites on UseNet were not connected 24/7 to the Internet. And servers weren't able
to handle connections from thousands of people at once. But today's most powerful web
servers can handle thousands of forum visitors simultaneously, though this is still a
challenge for the most popular social networking services. So the need to distribute
messages to multiple servers has been greatly reduced.
What is a CAPTCHA?
2007-05-08: CAPTCHA stands for Completely Automated Public Turing test to tell
Computers and Humans Apart. CAPTCHA systems are used to prevent the automated
misuse of popular websites. The goal is to ensure that the website is talking to a real
human being, and not to an automated program.
So, spammers create bogus Hotmail accounts to spam us with. And they create as many
as possible, as quickly as they can. That's a pain in the butt for everybody, including
Microsoft (the owners of Hotmail).
Websites like Hotmail require people to type in these letters and numbers before they are
allowed to apply for a new account.
2. Some humans can't break 'em! Obviously, blind users can't solve a visual captcha.
Better captcha systems also offer an audio-based option. Even then, deafblind users
(those who are both deaf and blind) are locked out. Sites employing captchas should at
least consider offering special accounts to those with special needs in this area. One
solution is to offer a telephone number - and make sure you accept TDD relay calls!
These are voice calls placed through an interpreter. Your telephone support staff should
be educated about this and encouraged to create accounts or carry out other captcha-
protected tasks on behalf of legitimate users who contact you via phone.
3. Captchas can take up extensive CPU resources (that is, slow down your web server
generating all of those images).
4. Bad guys will, in some cases, hire humans to do the data entry instead, or at least to do
the captcha-solving part. If your troublemakers are determined to get past the captcha,
they can.
2007-05-17: Web browsers and search engines both talk to web servers in order to
retrieve web pages. But while a web browser then shows that page directly to a human
being, a search engine does not. Instead, the search engine analyzes the page, looking for
uncommon words and indexing the content so that users can search for the pages they
want.
2007-05-30: Streaming audio is audio (speech, music, et cetera) that plays back as it is
downloaded. In other words, when you click on the link to hear the song, the song starts
playing right away - or at least before the entire song has been sent to your computer.
Early audio players, like the first versions of the RealAudio Player, worked around this
problem by using "metafiles." Rather than linking directly to the actual audio file, a
website would link to a special "metafile." These were simply text files containing the
URLs of one or more audio files. When the user clicked on the link to the metafile, the
web browser would launch the external player program and hand it the tiny metafile - at
which point the external player would open the first URL in the text file and start
streaming the music.
For the most part, this technique is no longer necessary. Modern web browsers "hand
over" the audio data to the player program as the data arrives, allowing the music to start
playing much sooner. And many music websites use Flash-based music players, taking
advantage of the built-in streaming features of Flash. However, .m3u files are still
popular as a simple way to create a "playlist" that works with just about any player that
can handle MP3 files.
Even if the user's Internet connection is fast enough, it is still possible for the web server's
connection to be overwhelmed. Multiply the bytes per second for the MP3 file by 100
simultaneous listeners and you're looking at a lot of bytes!
But if the user's connection is fast enough, and the web server's connection is fast enough,
then you're all set... right? Well, not quite. There's one more bottleneck: the Internet
itself. With more and more people listening to streaming audio and watching streaming
video, the "backbone" Internet connections that tie everything together can also become
overwhelmed at times. This is why it is important to keep improving the infrastructure of
the Internet.
What is MP3?
2007-05-30: MP3 is the most popular format for audio (sound and music) on the Internet.
Technically known as MPEG-1 Audio Layer 3, the MP3 format is a "lossy" format. That
means that an MP3 file does not contain 100% of the original audio information. Instead,
MP3 files use "perceptual coding." In English, that means that the stuff your ear doesn't
notice gets thrown away to make the file smaller.
Why are "lossy" formats useful? Because "raw" audio files are much too large to travel
quickly over the Internet. Audio CDs - which store the original, complete audio without
loss - require 176,000 bytes per second. That "maxes out" a typical high-speed Internet
connection. Just forget about a low-cost DSL or old-fashioned dialup modem!
But MP3 can compress by a factor of ten to one without much noticeable loss. And
17,600 bytes per second is much more reasonable. DSL and cable modem users can listen
to it "on the fly" as streaming audio, and even dialup users don't have to wait an
unbearably long time to download the song and then begin listening.
MP3 files can be compressed (shrunk) even more, but quality begins to suffer as the
compression rate is increased.
Legal Issues
The algorithm (mathematical technique) used to encode and decode MP3 files has been
patented. That means that MP3 files can't be created or played back without paying
license fees to the appropriate companies - at least, not in countries where software
patents are legal. However, the primary patent holders (Thomson Consumer Electronics
and Fraunhofer IIS) have largely chosen to leave individual users alone and pursue patent
claims against software companies. As a result, there is a general belief that MP3 files are
"free," which has led to popularity for the format - even though truly free alternatives like
Ogg Vorbis offer better quality without legal worries.
Patents relating to MP3 are expected to expire in 2011, 20 years after the publication of
the MP3 standard.
What is PHP?
2007-06-26: PHP is a popular programming language for extending web pages with
dynamic features. While plain-vanilla HTML can lay out an attractive page and perhaps
present forms for users to enter information, HTML can't actually do anything with the
data that the user enters in the form. This is where web server extension languages like
PHP come in, providing a way to handle form submissions and other user requests by
accessing databases, sending email, generating images on the fly and performing other
actions.
PHP is currently the most popular web server extension language, used by many websites
both large and small. Its popularity is partly due to its free, open-source nature and partly
due to its friendliness and convenience. Tasks such as reading an entire file and
outputting it to the web browser can be accomplished with a single line of PHP code.
And PHP programmers can begin by sprinkling a small amount of code into a page
otherwise made up entirely of HTML— a convenience also available in Microsoft's
ASP.NET and other extension languages.
For more information, visit www.php.net, PHP's home on the web. See also my article
how can I receive form submissions, which provides a quick overview of PHP
programming.
PHP stands for "PHP Hypertext Preprocessor." Yes, you read that right— "PHP" does
appear in its own expansion. Recursive acronyms like this one are a popular inside joke
in the open source community.
What are ASP and ASP.NET?
2007-12-05: ASP (Active Server Pages) and ASP.NET are server-side dynamic web
programming languages. Webmasters use them to extend their web sites by
communicating with databases, collecting form submissions from users, and generating
content on the fly. ASP and ASP.NET offer capabilities similar to PHP. Unlike PHP,
ASP and ASP.NET are products of Microsoft. You can find Microsoft's official "portal
site" for ASP.NET programmers at www.asp.net.
ASP was Microsoft's original server-side web programming language, based on their
earlier Visual BASIC language. ASP.NET is part of Microsoft's new family of ".NET"
programming languages, which are thoroughly object-oriented and substantially different
from what went before. Since Microsoft strongly recommends ASP.NET over ASP, I do
not recommend starting new projects in ASP.
Bear in mind that all server-side dynamic web programming languages are the same as
far as the end user is concerned. That's because what ultimately reaches the web browser
is just HTML anyway. That means you can build your site in PHP (which is available for
free server operating systems like Linux) and reach just as many people as you would
with an ASP.NET site. So use the language that works best for you and your client.
In more recent years, the World Wide Web Consortium has taken steps to correct the
problem. SGML has been largely replaced by XML (Extensible Markup Language), a
new general-purpose markup language that is easier to work with than SGML. And
XHTML, which replaces HTML, is a newer standard which complies fully with the
requirements of XML but remains compatible with older web browsers.
A Simple Example
Here is a simple example of a valid XHTML document. To try this out for yourself,
simply create a new file called mypage.html with any text editor, such as Windows
notepad. Paste in the HTML below, make any changes that please you, and save the
document. Then pick "open" from the File menu of your web browser, locate the file you
have just made, and open it. If you make further changes, you will need to "save" again
and then click "reload" or "refresh" in your browser to see the results.
Of course, this is just a simple example. XHTML can do far, far more than this. A
complete tutorial can be found at Dave's HTML Guide.
The DOCTYPE tells the web browser what version of XHTML we're using. In this case
I've specified XHTML 1.0 Strict, because this code is 100% compliant with the rules of
XHTML. You don't need to understand this line in detail - just know that you should
include it if you plan to write standards-compliant web pages. And you should.
Those who must use HTML elements that aren't included in strict XHTML can use the
"transitional DTD" (Data Type Declaration) instead:
The text between <h1> and </h1> is displayed as a "level one heading," which is
typically a very large, bold font.
The p element encloses a paragraph. In strict XHTML, most elements such as images and
links must be enclosed in a paragraph or another "block-level" element.
The text between the opening and closing <a> and </a> "tags" becomes a link to another
web page; the URL of the web page to be linked to is found in the HREF attribute of the
<a> element as shown in the example above.
The <img> element includes an image in the page; the image is displayed at that point in
the page, as long as the image file specified by the URL in the src attribute actualy exists.
Since the src attribute I used here contains a simple filename, the cat picture will be
shown as long as the file cat.jpg is in the same directory as the page. The same trick can
be used in href attributes in <a> elements, to conveniently link to pages in the same
directory. For more information about images and how to create them in formats
appropriate for the web, see the image file formats entry.
The alt attribute of the img element contains text to be displayed to blind users. XHTML
requires it, and since this text is also read by search engines like Google, it's important to
include it - Google probably won't know your page is about cats if there is no text about
cats on the page!
The "alt text" should describe the image in a useful way for those (including both
computers and people) who cannot otherwise see it.
The <img> element has a / before the > to signify that it is not a container and that no
closing </img> is expected.
2004-09-29: cascading style sheets are the recommended method of expressing the
precise "look and feel" of a web page. By associating a CSS file with a web page, the
exact appearance and behavior of every HTML element can be specified.
a{
text-decoration: none;
}
And the web page page.html contains the following <link> element within its <head>
element:
<link href="/main.css" rel="stylesheet" type="text/css">
Then any <a> elements (ordinary links) in the page will not be underlined as they
otherwise would be in most browsers.
You can also attach a style to a specific HTML element in the page itself, like so:
Why do style sheets exist? Why are they separate from HTML?
HTML was always intended to express the content and structure of web pages, rather
than their appearance. The original HTML specification offered elements like <cite> (for
citations), <a> (anchor, for links), and <p> (paragraph). These express the structure and
meaning of a document's parts, but not the way those parts are expected to appear. The
look and feel was left up to the programmers of the web browser and the preferences of
the reader.
Of course, designers clamored for better control over the appearance of web pages.
Various "quick fixes" were introduced, like the <font> and <center> elements, which are
now discouraged. The difficulty with elements like these is that they do not express
anything about the meaning of the page. What if the user is blind? What if the browser is
actually a site-indexing program? Knowing that the text should be "red, and 24 pixels
tall" doesn't convey as much to these users as <cite> or <h1>.
A better solution is to let HTML elements express the structure of the document in a way
that all users and programs can understand, and let cascading style sheets express the
exact appearance the designer prefers for each element -- when the web browser is
actually capable of displaying such things.
WORKGROUP:
1)No Centralized Administration.
2)Not much security for Data, User & Groups. (Depends on Configuration)
3)No Server & Client Matter..Each pc reacts like a Client as well as Server.
4)Basically Windows 98 & XP is going to used in Clients side.
5)We can assign permission to drives & folder & files but much security than Domain
2 types of duplex:
1)Half duplex
2)Full duplex
EXAMPLE:
CIDR
From To Representation
10.0.0.0 10.255.255.255 10/8
172.16.0.0 172.31.255.255 172.16/12
192.168.0.0 192.168.255.255 192.168/16
It selects one of many analog or digital data sources and outputs that source
into a single channel.
You can also perform the same operation to a computer remotely by typing the following
command: regfind -m \computer name -p
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipparameters "old
DNS value" -r "new DNS value(s)"
Where computer name is the NetBIOS name or the Internet Protocol (IP) address of the
remote computer.
Physical Addres: It Is a physical address that we can't change, It is present in NIC Card,
Given by INTERNIC Organization.
Logical Address: It Can be changed as you like, used for assigning a ip address to clients.
A Physical address is a 48-bit flat address burned into the ROM of the NIC card which is
a Layer1 device of the OSI model. This is divided into 24-bit vendor code and 24-bit
serial address. This is unique for each system and cannot be changed.
A Logical address is a 32- bit address assigned to each system in a network. This works
in Layer-3 of OSI Model. This would be generally the IP address.
Physical Address is nothing but your actual real address like MAC. for that Storage
device should be required. Physical Address can't be changed. It is present in NIC Card.
Logical Address is noting but your IP address which is used to create client. It will
change whenever change required.
1.Broadband :In this type .Every host sends the packet/message to all the host.
The message has a source address and a destination address. Destination address helps
the host to identify whether the message is indeed for them or somebody else
the source address allows them to identify from whom the message has come.
2.Point to Point :In this type of technology there are multiple connections (transmission
lines) between 2 hosts. so the packet can take different routes if a particular route is
congested.
PPP works at the data link layer it is a path (leased line /ISDN line ) through which two
dissimilar networks (wan connections) can be joined.
What is OSPF?
It is an Internet routing protocol that scales well, can route traffic along multiple paths,
and uses knowledge of an Internet's topology to make accurate routing decisions.
OSPF is Open shortest path first, basically comes into the category that uses link state as
the routing info communication. OSPF is used in a particular Autonomous system, not
used on the internet but its limited to internal routing in an organization.
On top of OSPF we run BGP to facilitate the communication across multiple autonomous
systems in the internet.
What is Kerberos?
It is an authentication service developed at the Massachusetts Institute of Technology.
Kerberos uses encryption to prevent intruders from discovering passwords and gaining
unauthorized access to files.
Kerberos is an authentication service, it has really robust architecture built in it.
The basic components in kerberos include the Key distribution service from which the
client communicates to get a token to reach a server, this enables the way to keep the
passwords secure from not transferred a lot of times across the network.
Once u get a key to interact to the servers you use that session key with an encryption on
it, so its really a cool authentication service.
Telnet - 23
SNMP - 161
FTP - 21
What is the subnet mask of this network if interface address is 130.237.14.25/23
- what is the subnet mask of this network
- how many usable IP address in this network
- what is the Subnet ID(IP) of this network
-
what is broadcast IP of this network
POP3 is Email clients download your emails onto your computer. Using a specialized
email program such as Outlook Express or Apple Mail has the advantage of giving you
complete control over your email; every email you receive is placed on your computer
and you can keep as many large file attachments as you want.
IMAP is protocol that is being used in webmail. Checking your email through our
webmail is similar to using Hotmail or YAHOO! Mail. You never actually copy your
messages to your computer; in fact, you are looking at them through your web browser
on somebody else's computer. When you are not online, you are not able to see your
email.
Frame relay is a high-performance WAN protocol that operates at the physical and data
link layers of the OSI reference model. Frame Relay originally was designed for use
across Integrated Services Digital Network (ISDN) interfaces. Today, it is used over a
variety of other network interfaces as well. This chapter focuses on Frame Relay's
specifications and applications in the context of WAN services.
• Variable-length packets
• Statistical multiplexing
Variable-length packets are used for more efficient and flexible data transfers. These
packets are switched between the various segments in the network until the destination is
reached.
A network router is a computer device that connects users and networks by buffering and
forwarding information to a particular place. The network gateway serves as a data
transfer point between the internet and a private network. Most routers contain a network
gateway, however, many computers these days also contain a server that can function as a
gateway. The firewall is a security device used in software or hardware forms as a means
of playing guard to incoming information. The firewall permits, denies, and proxies data
as per instructions by a computer user or computer security settings. Each of these
devices work together to provide connection to the internet and security while connected.
If you want to connect to the internet, especially with today's wireless options then you'll
need them. You'll have to go out and buy a router. The router will generally have a
network gateway, as mentioned, your PC might have one as well.
LAN, MAN, CAN, and WAN: What are the differences? What is each one used
for?
LAN, MAN, CAN, and WAN are all different types of networks used when connecting
to the internet and/or other computers. LAN is a local area network used in small areas
such as homes or offices. LANs offer quick data transferring due to its small area and
transfer area. Additionally, LANs don't need an external telecom device in order to be
accessed. MANs are metropolitan area networks, so they are used for larger areas, such
as entire cities. CANs are a type of MAN meaning campus area network. As the name
implies, they are commonly used on academic campuses, but can also be used in most
any moderate area. WAN is a wide area network and is good for a larger area. WAN are
often compared to LAN connections. They have a slower data transfer due to the wide
range. WANs are commonly used in large organizations due to their extensive area.
Network Topologies: What are they? And what are the characteristics?
Network topologies are the way in which a network is arranged. More specifically, how
different nodes are shaped. Nodes are devices in a network that are connected. Thus, the
shape of these devices connection is what is called the "network topology." There are
several different types of topologies, some of which are bus, mesh, ring, tree, and star. So
what exactly are these network communication shapes?
A Bus is a network topology that is connected by a "backbone" or a line from which all
nodes are connected. This means that all the data that is transmitted over a bus network is
sent over the same transmission medium, this being the "backbone."
A Ring device is named after its very apparent and obvious ring shape. All the nodes are
enclosed within the ring shape creating a communications loop.
A Tree is a form of network topology that utilizes different forms of network topology
within its own. The tree configuration is comprised of groups of star network topologies
that are connected to one another through a single line that resembles the backbone of the
bus network shape.
SECTION 1.
Perhaps most important, you can run backups. This is not as important
for palmtops with small internal RAM drives, because the software
needed to run effective backups will take up proportionally more room,
and besides, a small flash card will do the job nicely and be more
portable and probably less expensive. If you have NO money, you can
still do a serial port backup to your hard drive in a relatively short
amount of time. However, for larger palmtop RAM drives, such as
32MB, the backup problem becomes critical. A flash card big enough to
hold all of the data on your RAM drive is fairly expensive, and who
wants to waste 32MB of flash card? Serial port backups are way too
slow for a full 32MB backup. This is where the Ethernet card shines. It
is relatively inexpensive compared to a flash card, and yet allows high-
speed backups.
But backups are only one of the many applications of palmtop Ethernet!
What you can do depends largely on what software you can run, and is
covered more fully in section 3. For now, suffice it to say that you can
run remote applications, print to other printers, communicate via e-mail,
run network diagnostics, and... well, pretty much any reason you'd wish
to be connected to another computer in the first place!
Additionally, the distance between you and the computer you are
communicating with must be fairly short-- a few hundred feet at most.
(Unless, of course, your remote computer is hooked up to another
network with a longer range, such as the Internet, and can redirect you.
In that manner, you can go around the world via Ethernet. However,
direct computer-to- computer connections are fairly limited in distance.)
All things considered, comparing a modem connection with an Ethernet
connection is like comparing apples and oranges. Each has its own use.
Serial connections are often used with programs like LapLink to transfer
files from desktop to palmtop, or vice-versa. It's a simple matter to buy
a cable and set up some file transfer software so you can copy things to
and from your 200LX.
Most every desktop PC has a serial port you can hook up your cable to,
so the serial connection is probably the most common. The
disadvantage here is that it's the slowest type of connection; the best you
can do is 115,000 bps, which translates to roughly 10K per second (and
that's if you're extremely lucky).
Parallel connections on the palmtop are much rarer, because the 200LX
has no parallel port built in. There are at least two parallel port cards
that work in the 200LX, the better of which seems to the be Transdigital
card. With one of these, it is possible to connect (via LapLink or
InterSvr or other connection software) and do transfers at speeds from
2-5 times faster than a serial connection. Not bad at all, but still not as
fast as we'd like.
HARDWARE
2.1. What sort of Ethernet hardware will work in the palmtop?
The most obvious requirement for an Ethernet adapter that will work in
the palmtop is that it be a PCMCIA card. Second, it must not draw more
power than the palmtop can supply, or
roughly 150 milliamps. Finally, it must have drivers that allow it to
work with the palmtop's non-standard PCMCIA hardware.
The only two types of Ethernet card that work with the 200LX are the
Silicom Ethernet Card (www.silicom.co.il) and the Accton
(www.accton.com) EN2212/6 cards.
The Silicom card was specifically designed with drivers from the
company to work in the HP DOS palmtops. It ships with all necessary
drivers and documentation to allow you to use packet-driver applications
(more on this later) or log in to a NetWare server. The card itself has a
female jack on it, and a proprietary twisted-pair cable with an RJ-45
connector on the end of it comes with the card. This allows you to plug
directly into a wall jack; perhaps not the most elegant of solutions, since
the cable is not very long and, if damaged, the user must buy a new one
from Silicom. (There have been at least two reported cases of the
Silicom cable being defective and needing to be exchanged.) The other
disadvantage of the Silicom card is that the drivers do not work with a
double-speed palmtop; the memory on the card reports as damaged in
the double-speed unit. Silicom has no plans to fix this problem.
The Accton EN2212 and EN2216 cards were not factory designed with
the 200LX in mind. However, there are drivers available on SUPER
(www.palmtop.net) called LXETHER3 which allow use of this card in
the palmtop. The EN2216-1 is the recommended model for palmtop
usage. The card itself has a female jack on it, where a proprietary
breakout box plugs in. This box has a female RJ-45 jack on it, so you
can plug your own twisted-pair cable into it. This breakout box is much
shorter and more durable than the Silicom cable, and provides the
advantage of having LEDs for connection and data movement. Also, the
drivers for the Accton cards work on both single- and double-speed
palmtops. The disadvantage of the Accton card is that it only includes
support for packet- driver applications. Other functions, such as logging
in to a NetWare server, must run over the packet driver if desired,
leading to greater complexity.
It is worth noting that there are numerous cards (such as some made by
USLogic, a brand sold by Computer City) which are identical to the
Accton cards and which will work with the drivers on the SUPER site.
2.2. How much will these cards cost me?
2.3. What is the difference between the EN2216-1 and the EN2216-2?
The cards themselves are identical, but the breakout boxes are different.
The EN2216-1 includes just an RJ-45 jack, while the EN2216-2 includes
both an RJ-45 jack and a coaxial cable
connector. The -2 model is therefore larger in size, weight, and probably
current usage. For the palmtop, you can't use a coaxial cable network
anyway; it draws too much current. Hence, stick with the 2216-1.
The computer you want to connect to must either be on a LAN and have
an Ethernet connection to a hub, or at least an Ethernet card installed. If
you are only going to be connecting your 200LX to your
otherwise-isolated computer, you will probably not have an Ethernet
card installed and will need to buy and install one. Something like the a
Dlink SN2000 (for ISA bus) or 530-TX (for PCI bus) would be a good,
low-cost solution. These cards generally run from $30-$50 and can be
found at almost any computer store.
SOFTWARE
3.1. Okay, what software can I run now that I have my hardware
installed?
First, let's cover some basics. To run ANYTHING, you need to be able
to see the Ethernet card in the palmtop. Unfortunately, the drivers for
most cards won't see them in the palmtop, because the 200LX does not
use a standard Intel PCIC compatible controller for its socket.
Enter the enablers. Both the Silicom and Accton cards need to have
enablers run before you can do anything with them. Basically, these
enabler programs allow other applications to see the card and talk to it--
much like CIC100 allows programs to see and talk to modems.
The enabler for the Silicom card is called SEHP.EXE. You put the
Silicom card in the socket and run SEHP and it enables the card. After
that, you can run the packet driver, or the NetWare ODI driver.
The enabler for the Accton card is OP2216.EXE. It works the same as
the Silicom enabler; place the card in the socket and run OP2216.
These enablers are not TSR's like CIC100 is; there is no resident code,
so they take up no memory. They merely configure the card and the
palmtop and then exit.
Then you can run the actual drivers for the card, whatever they may be.
Probably the most common driver type is a packet driver. A packet
driver is a TSR that will transfer data to and from the card. Other driver
types include ODI drivers (for logging in to a NetWare server) or NDIS
drivers (for use with MS LanMan and other SMB clients). There are
many others
that I won't get into because, frankly, it's getting late.
A lot. The ODI driver will allow you to log in to a NetWare server,
which is extremely useful-- but only if you have a NetWare server to log
in to. In this day of Windows NT, those are becoming more and more
rare. Still, if you do have a NetWare server, you then have access to the
server's drive and can do backups, run other programs, etc. Very useful.
The packet driver, however, is even better. There are ton of applications
that can run over a packet driver, including telnet clients, FTP clients,
web browsing applications, e-mail
programs, etc. Of course, you must consider their system requirements;
a 32-bit graphical web browser won't run on the palmtop. Best of all
would be a SysMan compliant program. One example of this is PNR. It
is designed for a modem and PPP, but can be run over an Ethernet
packet driver instead of a PPP packet driver. In this way, you can get
full SysMan
compliance and the super-speed of Ethernet.
- Printer clients. With the right server running, these can be mounted by
NFS software, and allow you to print to remote printers.
- Windows 95/98 network clients. With these, you can login to your
Win95/98 drives and printers.
- NetWare login clients. Although the Accton cards do not come with an
ODI client, you can still log in to a NetWare server by running PDIPX
from Intel.
- FTP, Telnet, ping, IRC, and other TCP/IP clients and servers.
3.4. Okay, okay, I get the picture. Are there any palmtop- specific
programs in the works that take advantage of Ethernet?
TROUBLESHOOTING
4.1. Help! I installed a network card in the palmtop, and in the desktop,
and ran a cable between them, but they don't see each other! The
connection light is not even on!
For a direct connection (i.e. without a hub) between two computers, you
need to use a special "crossover" cable. This is analogous to the
"null-modem" serial cable that programs like LapLink need to establish
a serial connection. The theory is that you must connect the transmit pin
of one side to the receive pin of the other, and the receive pin to the
transmit pin, to get communication.
You can buy these crossover cables, or make one yourself if you have
RJ-45 ends (available at Radio Shack and most electronics stores) and a
crimper. You must cross over the following wires:
Pin 1 would be the first one on the left when looking at the RJ- 45
connector from the bottom.
Q1 Piggybacking Suggests
Q2 The network address made available to the transport layer should use a
uniform numbering plan
In a session
Short for Media Access Control address, a hardware address that uniquely identifies each
node of a network. In IEEE 802 networks, the Data Link Control (DLC) layer of the OSI
Reference Model is divided into two sublayers: the Logical Link Control (LLC) layer and
the Media Access Control (MAC) layer. The MAC layer interfaces directly with the
network medium. Consequently, each different type of network medium requires a
different MAC layer.
On networks that do not conform to the IEEE 802 standards but do conform to the OSI
Reference Model, the node address is called the Data Link Control (DLC) address.
See a breakdown of the seven OSI layers in the Quick Reference section of Webopedia.
LANs
• A Local Area Network is a small network which is usually contained within one
building or campus. It is usually a private network, unlike the public internet. An
Administrator in charge controlls file sharing, access and many other factors.
LANs can be connected to public networks like the Internet, with some
precautions (against hackers, viruses etc). Usually a firewall/proxy server/router
acts as the gateway between the LAN and the Public Network. A popular wired
LAN technology is the Ethernet (Sometimes called IEEE 802.3). These days
Wireless LANs are becoming popular. They are collectively known as IEEE
802.11 LANs.
• I could spend hours going into detail about this question, but I won't. Basically the
proxy server will go to internet to pull a webpage for the client requesting it. It
also will store a copy of this page (cache) for future requests. Another function of
the proxy is that is hides the clients IP address from the "outside world", and uses
its own. Therefore, the webmaster of the webpage cant see the IP of the client
requesting the page because in actuallity the proxy is requesting the page.
Answer
You need to use "crossover" cable. Search on google and you can find the schematics.
Router <==> Switch ===Regular Cat 5 Switch <==> Switch === Crossover cable Router
<==> Router === Crossover cable
Crossover PIN layout of RJ-45 1 Rx+ 3 Tx+ 2 Rc- 6 Tx- 3 Tx+ 1 Rc+ 6 Tx- 2 Rc-
Answer
The hardware initially is more expensive slightly. However, the cost of the cable you
need to run can quickly overcome this initial price difference. Add to that the labor cost
of running cable, and the cost usually works out to be at least even, if not cheaper, for
wireless networking.
Answer
yes
Answer
Networks can run slowly for a variety of reasons. I assume that your network is running
slowly because you have a lot of traffic. The best way to speed up an overloaded network
is to segment it. In other words, divide it into two networks. Then each network will
support only half the traffic.
You need two hubs/switches to be able to do this. Each hub/switch will support one of
the networks. If you have multiple servers, one of your servers should probably be
"multi-homed". That means it should have two network cards and be attached to both
networks. Then it can serve as a "router". A "router" will pass packets from one network
to the other if they need passing.
How do you network two computers that are about 150 ft apart?
You could hard wire the two together but it's easier to go wireless. each computer
must be capable of wireless reception, if they are not go buy one or two usb adapters for
hooking up to the computer. They come with software that takes you step by step to
install the software so no worries there. Also buy a wireless router, linksys, dlink, belkin,
netgear etc., plug ethernet line from cable modem into router instead of computer. You
can install the software (sometime they want you to install it first before hooking up the
router but you can just go to 192.168.0.1 or 192.168.1.1 in your web browser and go from
there. Just remember you would probably want to enable encryption, 64 bit is fine. Enter
a SSID unique to your desires 9Just name it something you like) and the generate the
keys there'll be for rows of key number and letters remember the first row because you'll
need it to log on next time you want to join you new network. There is a checkbox so that
the key will be remembered so that you won't have to re-enter it every time you join your
network. It'll do it automatically but no one outside of your two computer will get in.
Tada!
Answer
Put the ethernet card in the computer. Then connect the cables from both computers to
the hub and then from the cable modem to the hub. That should do it.
Answer
if you both want to be able to use the internet access, then the easiest way is purchase a
network card(ethernet), some CAT5 cable(as previously mentioned), and a router(linksys,
d-link, etc). first install the network card in the machine without one. then connect the
cable modem to the routers WAN port, it should be labeled that. then in ports 2 and 3, use
the CAT5 cable to connect to the yours and your partners computers. after that follow the
instructions in the routers manual on final configurations(should be mostly automatic),
and you're done.
Answer
While wireless is a great, inexpensive, and easy way to network, its speed and throughput
is limited (56kbps-108kbps on average for 'turbo mode' links). So you could use the 1
gigabit ethernet copper wire solution (1000kbps) and get more potential speed, but if you
have enterprise grade servers on a business campus say, buildings apart, that need more
speed and throughput than 1Gb ethernet can provide, you can connect your servers using
10GbE fiberoptic links, using 10GbE fiber PCIe cards. The IEEE standard for 1000base-
LX (long range) fiber is about 5km distance, and the 1000base-SX (short range) fiber can
reach around 550m distance using the larger diameter 50 micron fiber. Keep in mind that
most people's average computer uses a PCI bus for add-in cards, and the regular 32-bit
PCI bus is not even fast enough to keep up with true 1Gb speeds, so that is why they only
make the 10GbE cards to fit computers with PCIe buses on the motherboards. The rest of
the computer needs to be pretty beefy too, in order to even be able to run even near the
speeds that the network card is capable of.
Answer
You need what is called a crossover cable. This cable is special because there are a few
wires switched that allow the computer to send and receive all has to do with the network
card and how communication is done. Don't want to get to blah blah
Answer
Use a router.
Connect your cable or DSL modem to router, router to hub. Some cable and DSL
modems have built-in capabilities to act as a router and perform Network Address
Translation (NAT). The router can assign separate IPs for each computer, but all will
access the Internet through the 1 IP address assigned to the port of the router/modem
connected to the Internet service provider's network.
If you are using a slower dial-up modem, the computer connected to the Internet using
the modem can have 'Internet Connection Sharing' turned on. This computer will connect
to other computers in your home using a hub/switch. The other computers will use the
modem connected computer as their Default Gateway.
Alternatively... We can have same ip address on two or more computers in the SAME
network. They should be in same collision domain. Let their MAC address be same first
& then assign them same ip address. You can do it by installing a cheap network hub.
Watch my associated video on www.metacafe.com/channels/austinium2002/
How does TCP and IP address works on networking?
Answer
NetBIOS is a protocol that allows computers running windows operating systems before
Windows 2000 to join a Windows 2000(or later) network.
Older operating systems ran NetBIOS over IPX/SPX or IEEE 802.2 (NBF).
NETBIOS is an acronym for Network Basic Input/Output System. The NetBIOS API
allows applications on separate computers to communicate over a LAN. In modern
networks, it normally runs over TCP/IP(NBT), giving each computer in the network both
a NetBIOS name and an IP address corresponding to a (possibly different) host name
Answer
There are lots of types of modems. Modem stands for MOdulator/DEModulator. A cable
modem really is a modem because it modulates and demodulates RF on coax cabling. a
phone modem does this using audible tones over a copper pair.
Answer
A V.32 modem supports 9600 baud data communications. It is unlikely that any of these
are still for sale, but many are still in use at companies. IBM got into a lot of trouble at
the Olympics in Atlanta when foreign news organizations came with modems that could
only do 9600 baud to a system that expected a higher rate of data transfer. A V.32 bis
modem supports 14,400 baud data communications. This is a good solid middle of the
road standard unit. Data compression and error recovery typically use V.42 bis protocol.
A V.34 is the latest standard. It supports communications at 28,800 baud. Vendors spent
the last few months developing and testing hardware. Now volume production has begun
and these units are beginning to appear in stores. Expect pricing around $250. Some
modems run a bit faster than 28,800. There is no standard here, so you have to buy the
same type of modem at both ends of the connection. Otherwise, they will fall back to the
V.34 standard. Though not strictly a modem, an ISDN adapter can be used with ISDN
digital phone service if it is offered by the local phone company. This can provide
support speeds of 64000 bits per second. More will be said about this option later on.
What is the minimum number of pins of COM port needed to make a serial network
between two computers?
Answer
Four.
Answer
Four pins ie.,TXD,RXD,RTS and CTS. U wil need to use the others in case of devices
like modem ,etc.For communication between 2 computers u can avoid thm.
How do you install the Network Operating Systems and server and which one is best
for a network with less than 10 computers?
Answer
With a network that has less than 10 computers, you really dont need a server. Installing
network operating systems is the same as installing any operating system, insert the cd
and install.
For a network with less than 10 computers, a peer to peer networking topology would be
the best.
Answer
The transport layer provides additional function to compensate for the limitations and
impairments of the network layer, in order to meet requirements (e.g. QoS) of the upper
layer. For example in TCP/IP, IP provides only best effort service. To provide the reliable
service required by some applications - that is, to compensate for the shortcomings of
best effort service - TCP establishes connections and implements flow control and
congestion control on an end-to-end basis.
Answer
Typically, the request will ask the server to "recurse", i.e. if it cannot answer the question
from it's own local memory, it should go ask other servers on behalf of the client. This
behavior helps the local server build up it's own cache of addresses frequently looked up.
Answer
sure, just get 2 wireless NIC Cards and install them both into the computers, then get a
Wireless Router, and depending on your operating system, you may need to install more
networking protocols. As far as having them both use A dial up connection. that i have
never done before, but you should be able to do that using Internet Connection sharing
If you have installed two network cards in your PC will your PC have two IP
addresses?
Answer
Yes. Each MAC address (each network card has its own MAC address) requires an
individual IP address on a network.
In XP you can bridge the connections in Network Connections, but I have never actually
figured out why this is preferrable (perhaps if each card is connected to separate
networks).
How do you get the MAC address of another computer in a Novell network?
Answer
If you are using novell server with windows workstations and you know the IP address of
the PC, then you can type nbtstat -A in a dos window.
Answer
The only possible solution is setting up ad hoc wireless network between these 3
computers, but you will need 3 wireless adapters.
Answer
Without a hub, you will have to use crossover cables (not standard or 'patch' cables).
Answer
If the computers all have NIC cards then you would probably be better off by using a
switch or a router even a wireless router they don't cost more than 40 or 60 dollars. You
don't want to use a Hub they are passe.(No Good Any More)
How can you access a com port on a network from one PC to the next?
Answer
There generally r 2 com ports, com1 and com2. They are RS232 ports which r serial
ports.one way to communicate between 2 PCs is to use a software called
hyperterminal..its there in evry computer.( accessories-> communication tools). if not u
can also install it. u can find more infomation on it online..in case.. 1> u can either use an
RS232 to IR converter device connected to the respective ports of both the comps to
communicate.u'l be usin IR communication in dis case. 2> u can connect a cable between
these two ports of both the comps( female-female...as RS232 is a male port).but ure
comps wud need to b in close proximity for a physical connection like dis.
Answer
YES, the first thing to understand is that there is a vast difference in the two. HUB and
ROUTERS (Hub is a Traffic Cop, that is able to focus on the job at hand and perform
exactly as needed with traffic. A router is merely a traffic light that performs exactly as
commanded.) Now any wireless hub or router will connect any wireless device, but to
share a high speed intenet (Cable or DSL)you MUST have a HUB. Hubs are designed to
recieve a broadband carrier and wireless traffic. But if you having difficulty connecting
most likely your wireless devices are not finding or detecting the wireless router or hub.
Winxp is unusual, but the best fail safe here is install software for all devices and
SHUTDOWN everything! Broadband modems, wireless hub/router and all connected
computers. Disconnect power to Broadband modems and wireless hub/router. Wait 10-15
seconds then Plug in power to Braodband modem first. Then wait about 5 seconds and
plug in wireless hub/router. Once bioth devices are light up normall
Answer
Set up your own network at home by getting the help from networking book or website.
This is the most useful and faster way to learn networking with hands-on experience.
Check out this site to start setting up your home network and learn networking:
http://www.home-network-help.com
Answer
Answer
Answer
I do not think that you can learn networking in a very short time unless you are the next
Einstein, but you local bookstore like Barns &Noble or Waldenbooks has a lot of easy to
follow refrences. I think the book Teach Yourself Visually Networking 2nd Edition by
Visual, is a very good starter book.
Answer
Comptia's Network+ certification is non-vendor specific, and covers most local area
networking theory and some wide area networking. Look for guides and documentation
for this certification to learn the right stuff quickly.
Answer
1) Networked computers are obviously going to allocate some system resources to the
task; however, for any normal network task I doubt you'd notice the difference when
using the computer. If you're planning on using multiple NICs, in, for example, bridging
two networks (see the other FAQs), this will be a more significant drain on resources, and
it's not usually the best way of setting up a network.
2) Networking bandwidth (the speed files can be transmitted) is really dependent on how
you have your network wired up. If you're using co-axial cable to daisy-chain computers
(in a series connection), then you're correct, each extra computer will halve the available
networking speed. This is pretty old fashioned though - it's much more likely you're using
CAT5 (twisted pair) cable (the ends kinda look like US phone plugs). In this case the
speed depends mainly on the speed of your network adaptor (the card in your pc: 10, 100
or 1000MB/s for wired connections). If you're connecting 2 pcs the simplest solution is
just a cross-over cable (see the other FAQ). If it's for 3 or more, it's best to use some sort
of central hub, which all the computers connect to - the more connected, the slower the
network will run, due to packet loss etc. It's better to use a switch, which routes packets
more intelligently, only sending data to the computers that request it.
What do you need to set up a network for five buildings three floors high with about
1850 users?
Answer
Contact an IT solutions company. This is way to big of a job for anyone without
extensive knowledge in the field. It will likely require multiple servers, operating
systems, lots of wiring, lots of computers, backup solutions, multiple internet connections
w/routers, probably some wireless access points, tight security, etc. Depending on the
configuration, the hardware alone will easily exceed a million dollars, and labor will
likely run $100+ per hour. With that much money being thrown around, contract the
initial installation and hire an internal IT department for day-to-day matters and to assist
in the set-up. This system will cost a few hundred thousand per year to keep up, too, with
the staff for the department.
Answer
Unfortunatley, I have to completely agree with the answer the previous user submitted, I
wish I had better news for you, buddy
Answer
I would suggest mini server rooms in each building, local network cabinets on each floor,
each buliding connected to each other by at least two links for redundancy. You would
need from the infrastructure point of view, switches, routers, cabling, ports.
From the computer point of view you would need servers and workstations. You would
need to consider Backups and replication, patch management and Anti virus, licencing
software and firewalls.
Hub is a Physical layer devices that are really just multiple port repeaters. When an
electronic digital
signal is received on a port, the signal is reamplified or regenerated and forwarded out all
segments except the segment from which the signal was received.
switch (1) In networking, a device responsible for multiple functions such as filtering,
flooding,
and sending frames. It works using the destination address of individual frames. Switches
operate
at the Data Link layer of the OSI model. (2) Broadly, any electronic/mechanical device
allowing
connections to be established as needed and terminated if no longer necessary.
BOOTP helps a diskless workstation boot. How does it get a message to the network
looking for its IP address and the location of its operating system boot files
BOOTP sends a UDP message with a subnetwork broadcast address and waits for a reply
from a server that gives it the IP address. The same message might contain the name of
the machine that has the boot files on it. If the boot image location is not specified, the
workstation sends another UDP message to query the server.
Here is a very short list of basic tasks for which a network administrator may be
responsible:
Can you use 2 Mac addresses from one cable at the same time with a splitter if both
Mac addresses are provisioned?
Answer
MAC address are hard coded on network cards and network devices. A HUB acts as a
splitter, so yes.
Answer
A distributed system shares the work to be done among several computers. There is
usually a control process that manages all of the various sub processes to ensure they are
performed in the proper sequence. Although these computers are networked together, the
network is usually unavailable to other systems and users; and it is usually extremely fast.
A computer network allows computers on the same network to communicate with each
other. There is no indication these computers will share any work simply beacuse they
have been networked together.
Why would the network LAN card shut the power on and off the computer?
Answer
It might have something to do with Wake On Lan, this is something that can be disabled
in the BIOS. try to disable Wake On Lan or WOL within bios and see if that fixes it, it so,
download a bios update
Can you hook more than one computer to one DSL modem?
Answer
Answer
No, but you can network more than one computer on the same DSL modem.
Answer
This is a layman's answer, but I think it's basically correct: If you open several web pages
at once, your computer (or maybe just your web browser) will eventually crash, for the
same reason that you cannot run numerous programs at once without eventually crashing.
You are limited by how much RAM your computer has. RAM is the memory that is
actively being used when a program is running, or window is displayed on your screen,
image is displayed, etc. Gradually this is used up until you run out, and then you crash.
So if you have a lot of RAM you can run more programs at once, or view more web
pages at once. But there's always a limit.
List six types of communication media and give examples of situation where and
why?
Answer
• Wire - Cheap, simple, compatable with old equipment, must be amplified for long
distances
• Optical - Fast, long distance, high bandwidth, can carry multiple data streams on
one cable, expensive, can break easily
• Wireless RF - Simple, no cables, expandable, no line-of-sight required, long
distance
• Wireless IR - Cheap, line-of-sight required
That's all folks! I honestly don't think there are any other network medias. Unless you
split wire into coax (thick copper), UTP (Unshielded Twisted Pair), STP (Shielded
Twisted Pair), etc. But I may be wrong.
Big bandwidth, slow response
Nobody ever said this question was about "data" communication between digital devices.
There are many other well-known media for information communication, including air
and other fluids, using numerous different signalling means:
Also, where does satellite fit in? It would be wireless RF (microwave), line of sight,
thousands of miles up and back.
• Let's not forget "audio" media for communication, sonic and ultra-sonic, as well
as
• "visible" using air or fluids (not fibers) as medium (blinking light, flags, etc),
• pressure signals are often used in hydraulic or pneumatic systems;
• mechanical signals are used for communication of status or RPM information;
• thermal signals can communicate information through various media (although
not always quickly);
• paper is a medium often used for communication, such as things we used to call
"books" or "newspapers".
Answer
Answer
The 5-4-3 rule is part of the 802.3 spec for Ethernet networks. Originally written to
define timing for end to end signal propagation in a 10Base-5 network. A station
transmitting at one end of the network must be able to detect a collision that occurred at
the far end of the network before it's timer allows it to transmit again. The spec says 5
segments of 500 meters separated by 4 repeaters (worst case). Under these conditions,
adding a 6th segment would put the network out of spec. If the 5 segments were 50
meters, theoretically the network would functional, but be out of compliance with 802.3's
5-4-3.
Although there are 6 segments, Station1 (connected to Hub2) and Station2 (connected to
Hub6) communication would be in 5-4-3 compliance because it only crosses 3 segments
and 3 repeaters. (Hub2--Hub1--Hub6)
Answer
Have each LAN run to a seperate switch. Then connect each switch to an interface on the
router.
Answer
How do you know the IP address of each computer and the corresponding name of
the computer within the LAN?
Answer
well....depending on whether you're using a router or not you have 2 options that I can
think of right off
1st option is to run ipconfig on each computer and it will tell you the ip address of the
computer you are on. To get the name of the computer you can go to the network
configuration settings which I will explain in a bit how to get to.
2nd option type in the IP address of the router in the web browser of the one of the
computers connected to it, log in to the router with the username and password you used
to set it up with, and depending on the router you have you're going to want to look at the
log or look around in the different settings to see if you can't find a list of currently
connected devices almost eveyr router I've seen to date has had a list somewhere of the
devices connected to it
anyways back to option 1....in order to run ipconfig on your computer go to Start menu ->
Run (or hold the windows key and press r) type in ipconfig in the box that pops up....if
that doesn't work then try typing cmd in the box....you should get an msdos looking
window that pops up....from there type in ipconfig....after that look for the IP Address it
will be clearly listed there
now as for getting to the name of the computers....I'm not sure about other operating
systems but I'm pretty sure it's quite similar across all windows operating systems but I
will give you the exact instructions from Windows 2000 Professional which is what OS I
happen to run:
How do you move a file from one client to another by an application running on a
server?
one of the ways: Install a simple task automation application (such as Robo Task,
Robo Copy) on a server (i'm assuming that both clients have access to the server) and use
that to move a file from one PC to another.
Number of channels
• In Serial devices: transmit data bit-after-bit, serially over time. When 8 bits are
received, after 8 bit-times (plus a little extra for signal synchronization), they are
assembled back into a byte and delivered to the software.
• In Parallel communication: a word of some data length, say like 8 bits, travels all
at once, along multiple parallel channels (one channel per bit position). At the
receiver, an 8-bit byte is received every "bit time". In effect, you have 8 serial
channels transmitting and receiving data simultaneously, making it (by definition)
at least 8 times faster than a single serial channel using the same transceiver
technology.
From a system perspective, you can also refer to "parallel" channels for redundancy of
critical serial streams, where multiple identical copies of data are sent simultaneously,
and the receiver decides which data is valid, often by "voting" after detecting errors in the
data on one or more channels. In this case, the parallel channels provide no increase in
data throughput (compared to a single error-free channel), other than by reducing the
need for time-consuming re-transmissions when errors are detected. It is a trade-off
between speed and reliability.
Answer
A parallel link transmits several streams of data (perhaps representing particular bits of a
stream of bytes) along multiple channels (wires, printed circuit tracks, optical fibres.
Can you see the IP address when you are using a dial up connection?
Answer
Copy and paste this link. http://www.ipchicken.com/ When you connect you will see
your address.
What is the difference between a Wireless Access Point and a Wireless Router?
Answer
A wireless Access Point (AP) connects a group of wireless stations to an adjacent wired
(Typically, Ethernet) LAN. An AP is like an Ethernet hub - except that a hub relays LAN
frames only to other 802.3 stations, whereas an AP relays 802.11 frames to all other
802.11 or 802.3 stations in the same subnet. (In English: "it allows communication
between wired and wireless..")
Answer
It depends on what SSL is being used for (HTTP, as in secure web pages; FTP; Telnet;
etc.). Below is a non-exhaustive list of various port numbers used for protocols with SSL
implemented:
Answer
Answer
Windows 2000, for example, can have at least hundreds of addresses assigned, but only
51 reliably work (51 total, spread out over all your nics, weather you have one or
several). After the 52nd is added, Active Directory takes a dump and bad things happen.
In Linux, it will vary by kernel version. Older kernels may be limited to 30 or so, whereas
newer ones will be much higher.
For the *BSD's, they'll generally handle more than Linux (and more efficiently), but I'm
not sure what the actual limit is.
I've heard of people running thousands and thousands of IP addresses in certain network
simulation applications.
What MAU?
Short for Multistation Access Unit (also abbreviated as MSAU), a token-ring network
device that physically connects network computers in a star topology while retaining the
logical ring structure. One of the problems with the token-ring topology is that a single
non-operating node can break the ring. The MAU solves this problem because it has the
ability to short out non-operating nodes and maintain the ring structure. A MAU is a
special type of hub.
Collision domain is the group of hosts in which collision can occur, but broadcast domain
consists of all the groups of hosts that can proceed the broadcast frame. Broadcast
domain may be collision domain but Collision domain may not be broadcast domain.
Broadcast Domain: A set of all devices that receive broadcast frames originating from
any device within the set. Broadcast domains are typically bounded by routers (or, in a
switched network, by VLANs) because routers do not forward broadcast frames.
Collision Domain: In Ethernet, the network area within which frames that have collided
are propagated. Repeaters and Hubs propagate collisions, LAN switches and bridges do
not.
IMAP4 stores a copy of message on the server whereas POP3 does not.
What is a Bridge? When is it used? How is a bridge configured? What are the
software and hardware components of a bridge?
A bridge is an layer 2 device - it works based on mac address. bridge is s/w based.
Bridge is configured by having the the mac address of the switches connected directly to
it.
Bridge is just like an connecting device in the inter network systems. It is work on the
mac layer and software based. It is used at the time of interupting the device from one
topology to another topology. Software components are making the connection between
the device and routing the device.
Bridge which is used to segment the network. So it reduces the network traffic between
the two segments.
Bridge are data link layer devices! Store and forward devices.Many organisation have
multiple LANs.LANs can b connected by devices called Bridges.
In the BGP,the criterion is the policy,which can be set by the Administrator .the policy
defines what paths should be chosen.
TCP is connection oriented Protocol and UDP is not. in other words v say that in TCP we
recf. acknoledgment of any msg. but not in UDP.
In transport layer two protocols are working TCP , transmission control protocol and
UDP , user datagram protocol , TCP is also know as reliable protocol , means it is using
handshake process , where client requtest to server then establish the connection and then
transfer the packet then terminates it. In UDP , no relaibilty but packets are safe. when
long RTO is there that time packtes use to UDP.
TCP:
1.Connection oriented - 3 way handshake
2.all packets transferred between a client and server takes the same path
UDP
1.Connectionless
2.Each packet between a client and server may take various paths
3.Unreliable delivery
5.Faster
Advantages
1. All the IP configuration information gets automatically configured for your client
machine by the DHCP server.
2. If you move your client machine to a different subnet, the client will send out its
discover message at boot time and work as usual. However, when you first boot
up there you will not be able to get back the IP address you had at your previous
location regardless of how little time has passed.
Disadvantage
Your machine name does not change when you get a new IP address. The DNS (Domain
Name System) name is associated with your IP address and therefore does change. This
only presents a problem if other clients try to access your machine by its DNS name.
DHCP Dynamic Host Configuration ProtocolAdvantageIf their are more than 100
Computers and if you want to assign ip address it is difficult so we use to simply
administrator work to assign IP Address automatcically.DisadvantageIf their is a DNS
AND WINS Server every time IP address changes had it will work according to Lease If
a client request a IP Address Automatically and if the DHCP Server is unable to contact it
will assign a APIPA Address.
Disadvntage :- When client make query to DHCP server (DHCP Discover) it is UDP
query it consume more bandwidth. When DHCP server is unavaliable client unable to
access entrprises network.
Baseband Signalling:
3 Bi-directional transmission
)
4)Signal travels over short distances
Broadband Signalling:
2)Unidirectional transmission
base will carry single signal in a medium but broadband can carry multisignals through
single medium with shared bandwidth
The need for a data link layer protocol to let IP operate over serial links was identified
very early on in the development of TCP/IP. Engineers working on the Internet Protocol
needed a way to send IP datagrams over serial connections linking computers together.
To solve the problem they created a very simple protocol that would frame IP datagrams
for transmission across the serial line. This protocol is called the Serial Line Internet
Protocol, or SLIP for short.
SLIP performs only one function: framing of data for transmission. It does nothing else
Subnetting is a way to divide ur n/w in the best possible way so the ip add do not get
wasted.
eg- a Class C n/w has 254 hosts but if ur n/w only needs 154 ip add ie 100 are wasted so
u can divide that as per ur need.
Allows the flow of ntw traffic b/w hoststo be segregate based on ntw config.. By
organizing hosts into logical groups, subnetting can improve ntw security & performance.
Name three network tools used to determine where a network connectivity is lost
between two sites A&B?
PING
TRACERT
PATHPING
what is an email client? what is differnce between email client and web mail.
Email Client
Email clients download your emails onto your computer. Using a specialized email
program such as Outlook Express or Apple Mail has the advantage of giving you
complete control over your email; every email you receive is placed on your computer
and you can keep as many large file attachments as you want.
Webmail
If you host with Needmore Designs, you have a limited amount of space available for
your web mailbox. For daily use, you will want to use an email client. Nevertheless, you
might find that you want to check your email while traveling.
Checking your email through our webmail is similar to using Hotmail or YAHOO! Mail.
You never actually copy your messages to your computer; in fact, you are looking at
them through your web browser on somebody else's computer. When you are not online,
you are not able to see your email.
What is a Network cable?
A Network cable is a 8-pin high speed cable used to transmit data through computer
networks, LAN, ISDN, & T1 connections. These cables are also called Ethernet cables,
Cat5 cables, Cat5e cables, Cat6 cables, & RJ45 cables
A Cat5 cable provides minimum performance of 100 MHz. Most commonly used for
networks with data transfer rates up to 100 Mbps. Used with 10BASE-T and 100BASE-T
networks.
A Cat5e cable provides minimum performance of 125 MHz and maximum performance
up to 350 Mhz. Enhanced version of CAT 5 (specifications added for far-end crosstalk).
Used with 10BASE-T, 100 BASE-T and 1000BASE-T networks (gigabit Ethernet).
A Cat6 cable provides minimum performance of 250 MHz and maximum performance
up to 550 Mhz. Used with 10BASE-T, 100 BASE-T, 1000BASE-T (Gigabit), &
10000BASE-T (10 Gigabit) networks.
Cat 5e cables are suitable for 10Mbps networks, 100Mbps networks, and 1Gbps
networks. Although Cat5e cables will work with 1Gbps networks, you may need Cat6
cables if you plan on expanding your network in the future because Cat5e cables will not
support 10Gbps networks.
Cat6 cables can provide your network with higher bandwidth. We recommend Cat6
cables for 1G networks and above. If you are installing a 10G network you must use
Cat6 cables.
Mbps and Gbps are units used to measure data transfer rates.
Yes. Cat6 cables are backwards compatible and will work with Cat5 & Cat5e
applications. This is called backwards compatible because Cat6 is compatible with all
previous standards.
Unshielded twisted pair (UTP) cables are made up of 8 internal wires and are the correct
solution for most applications.
Shielded cables are used for increased protection from interference and crosstalk and are
typically used in electrically noisy environments. There are two main types of shielded
network cables:
FTP (Foiled Twisted Pair) - The UTP cable is surrounded by an outer foil shield.
S-FTP (Shielded and Foiled Twisted Pair) - The FTP cable is surrounded by an
outer conductor of braided shielding.
Shielded network cables are usually used when running cables near any equipment or
other cable that might cause interference with your signal. Common sources of
interference are radio towers, high-powered electrical conduit, or any other device
emitting electro-magnetic or radio frequency signals.
Are your cables terminated with the 568A or 568B wiring scheme?
Our network cables are terminated with the 568B wiring scheme.
Yes. The 568-A Standard is a set of specifications for network cables. It has nothing to do
with the 568A wiring scheme. Network cables from dCables are compliant with the 568-
A Standard set of specifications.
Solid and stranded cables both carry the same signal strength (up to 350Mhz for Cat5e
and up to 550Mhz for Cat6). Stranded cables are known for their flexibility and are used
for patch cables that are constantly being plugged, unplugged, bent or installed. All of
our patch cables are stranded cables. All of our bulk cable is solid because solid cable is
more suitable for long cable runs.
Plenum rated means that the cables meet the correct specifications for being run behind a
wall, in an air duct, plenum, or ceiling without a being in a conduit.
Yes. If you need to run a non-plenum rated cable behind a wall, we recommend using a
PVC or steel conduit. This keeps unwanted persons or objects away from the cable itself.
A crossover cable is a network cable that is terminated differently on one end (green and
orange pairs switched). This cable is used to connect two computers together without a
switch. It is also used to directly access some network hardware.
The maximum recommended length for Cat5e and Cat6 cables without a repeater is 295
feet or 90 meters.
What is RJ45?
RJ45 (registered jack 45) is the name of the connector used on computer networking
cables. Another industry name for the RJ45 connector is
8P8C
: short for "eight positions, eight conductors." This is a picture of a male RJ45 connector:
Wide-mouth frog is the simplest known key distribution center (KDC) authentication
protocol.
it fixes up a time to reach,if it s not reached within that stipulated time,it is being killed
by the auto timer...
Every network has a different MTU, which is set by the network administrator. On
Windows 95, you can also set the MTU of your machine. This defines the maximum size
of the packets sent from your computer onto the network. Ideally, you want the MTU to
be the same as the smallest MTU of all the networks between your machine and a
message's final destination. Otherwise, if your messages are larger than one of the
intervening MTUs, they will get broken up (fragmented), which slows down transmission
speeds.
Trial and error is the only sure way of finding the optimal MTU, but there are some
guidelines that can help. For example, the MTU of many PPP connections is 576, so if
you connect to the Internet via PPP, you might want to set your machine's MTU to 576
too. Most Ethernet networks, on the other hand, have an MTU of 1500, which is the
default MTU setting for Windows 95.
What is the difference between TFTP and FTP application layer protocols?
The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a
remote host but does not provide reliability or security. It uses the fundamental packet
delivery services offered by UDP.
The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for
copying a file from one host to another. It uses the services offered by TCP and so is
reliable and secure. It establishes two connections (virtual circuits) between the hosts, one
for data transfer and another for control information.
The communication b/w two tcp host are established by using 3-way handshaking.these
are request , acknowldgement ,and data transfer.
transmitting host sent request to receiving host,receiving host sent ACK to senting host
and then data is transfer from source to destination.
At this point, both the client and server have received an acknowledgement of the
connection.
What is PING utility?PING stands Packet Internet Gopher. This is a utility for ensuring
connectivity between computers . ICMP protocol works behind this utility. Under it ,
sending node sends packets to destination node and reply is received if there is proper
communication between two.
W can use static and Dynamic Routing in one network. However Dyanmic Routing is
used to have the best path no matter what the status of the physical links.All routing
protocols have some sort of shortest-path or lowest-cost or best-choice algorithm to help
you weigh all the options available.
Static routing can be used in a small network to reduce the work of the network
administrator or to use a particular route only to forward the packet; we need static
routing.
What is redirector?
Redirector is software that intercepts file or prints I/O requests and translates them into
network requests. This comes under presentation layer.
What are the data units at different layers of the TCP / IP protocol suite?
The data unit created at the application layer is called a message, at the transport layer the
data unit created is called either a segment or an user datagram, at the network layer the
data unit created is called the datagram, at the data link layer the datagram is
encapsulated in to a frame and finally transmitted as signals along the transmission
media.
What is Beaconing?
The process that allows a network to self-repair networks problems. The stations on the
network notify the other stations on the ring when they are not receiving the
transmissions. Beaconing is used in Token ring and FDDI networks.
What is cladding?
A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.
What is attenuation?
The degeneration of a signal over distance on a network cable is called attenuation.
Difference between bit rate and baud rate.Bit rate is the number of bits transmitted
during one sec
Difference between bit rate and baud rate.Bit rate is the number of bits transmitted during
one second whereas baud rate refers to the number of signal units per second that are
required to represent those bits.baud rate = bit rate / N where N is no-of-bits represented
by each signal shift.
What is ICMP?
ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite
used by hosts and gateways to send notification of datagram problems back to the sender.
It uses the echo test / reply to test whether a destination is reachable and responding. It
also handles both control and error messages.
What is the minimum and maximum length of the header in the TCP segment and
IP datagram?
The header should have a minimum length of 20 bytes and can have a maximum length
of 60 bytes.
Explain 5-4-3 rule?Subscribe In a Ethernet network, between any two points on the
network, there can be no more than five network segments or four repeaters, and of those
five segments only three of segments can be populated.
What is virtual path?Subscribe Along any transmission path from a given source to a
given destination, a group of virtual circuits can be grouped together into what is called
path.
What is region?
When hierarchical routing is used, the routers are divided into what we call regions, with
each router knowing all the details about how to route packets to destinations within its
own region, but knowing nothing about the internal structure of other regions.
What are the advantages and disadvantages of the three types of routing tables?
The three types of routing tables are fixed, dynamic, and fixed central. The fixed table
must be manually modified every time there is a change. A dynamic table changes its
information based on network traffic, reducing the amount of manual maintenance. A
fixed central table lets a manager modify only one table, which is then read by other
devices. The fixed central table reduces the need to update each machine's table, as with
the fixed table. Usually a dynamic table causes the fewest problems for a network
administrator, although the table's contents can change without the administrator being
aware of the change.
Answer
That's like asking "How many ways can you get from the library to the post office?".
There is no limit. There may be only a few efficient ways for getting directly from the
library to the post office, but if you want to go by the bank on the way, you will invent
your own path. Anyone can create their own protocols. New ones are created every day
and most of them are hardly ever used, or may only be used by one person. There are
common ones that you hear about like FTP, SMTP, etc. For a list of those, look in the
RFCs ( http://www.rfc-editor.org/rfc-index.html ). I know one of them has a list of all the
protocols. Not sure what it is, but I'll look that up and then post it here.
A cross over cable is a specialized cable. It basically has three roles: 1) It is used if you
wish to connect two computers together without using a hub. 2) It can be used to uplink
one hub to another in situations where an uplink port isn't available. 3) It is can be used to
daisy chain on a network device like a Cable modem in some situation.
When constructing a network it is a good idea to use a different color of network cable
for Cross-over cables. This helps prevent potential confusion. Go to Top
What is a NIC?
NIC is short for Network Interface Card. A NIC allows you to connect to connect to a
network, or network device. They come in a variety of shapes, sizes, and network support
lists. The most common network cards are PCI 10/100 ethernet network cards in desktop
systems, and PCMCIA 10/100 ethernet cards in laptops. NICs can be integrated into a
motherboard, or other device. This may be referred to as Onboard LAN. Go to Top
I have a few systems, and just got DSL. Do I just need a hub to share the connection
or will I end up needing a router/switch/another hub?
A hub won't do what you're looking for. You really have two options:
1. Have one computer w/ two NICs and use Windows Internet Connection Sharing to
route traffic to the network. (You can also use software like Wingate if ICS doesn't work
right for you).
(1 NIC connects to DSL modem, 1 NIC connects to hub, and the rest of the computers
connect to the hub. If you have two computers you can have two nics on one, and connect
the other computer via a cross over instead of using a hub)
2. Purchase a Cable/DSL router. These come in two forms. Some like the Netgear RT314
act as both a router to share the connection, and as a hub/switch. Others may require you
to use a hub in addition to the router.
Basically: With a Cable/DSL router w/integrated hub/switch the DSL modem connects to
the router, and the router connects to each computer.
One good thing about using a router is that it isn't dependent on a single computer to be
on in order to connect.
It's fine to use a cable type greater then what you need. You could for instance use Cat 5
cable for a phone system. It's actually good to use cable better then what you think you
What is NAT?
NAT is short for Network Address Translation. In a nutshell, NAT allows a group of
computers to use a single IP address to communicate with the outside world or another
network. Additionally it separates External IP addresses from Internal network IP
addresses.
A device or program using NAT sits between the Internet and the network. It rewrites IP
addresses and port numbers on the fly so every packets appears to be coming from (or
going to) the single IP address of the NAT device instead of the actual source or
destination. This allows more then one system to access the Internet at the same time, and
it allows a measure of safety as the outside site never sees the internal IP address for the
system it's sending to. In this way, NAT also acts as a simple firewall. Go to Top
I'm trying to setup a small network in my home. Is there anyway I can get out of
stringing all this ethernet cable from room to room?
Sure. You may want to consider building either a wireless network or a phoneline
network. Phone-line network adapters let you use the phoneline network that already
exists in your home to network computers in different rooms with access to wall phone
jackets. (They typically do not effect modem or phone usage). Wireless networks have
obvious benefits in that they have no cords and are ideally suited to mixed networks that
contain laptop/notebook systems. The draw back is that they are typically more expensive
than phoneline or ethernet applications.
1. What are the two types of transmission technology available?
2. What is subnet?
A generic term for section of a large networks usually separated by a bridge or router.
Transmission is a physical movement of information and concern issues like bit polarity,
synchronisation, clock etc.
5. What is SAP?
Series of interface points that allow other computers to communicate with the other
layers of network protocol stack.
Frame relay is a packet switching technology. It will operate in the data link layer.
9. What is Beaconing?
The process that allows a network to self-repair networks problems. The stations on the
network notify the other stations on the ring when they are not receiving the
transmissions. Beaconing is used in Token ring and FDDI networks.
A: There are a few reasons for the discrepancy. First, there are many different types of
network redirectors, some of which are part of the operating system, and others (such as
the Novell Client 32 software for connecting a Windows machine to a NetWare network)
made by third parties. Additionally, some books reference the OSI networking model,
which consists of seven layers, while others are basing their statements on the DoD
model, which only has four. A component that operates at the Presentation layer of the
OSI model would be operating at the Application (or Application/Process) layer of the
DoD model.
Q: It's called TCP/IP. What are all those other protocols, and what are they for?
A: TCP and IP are the "core" protocols (sometimes called the "protocol stack"), but an
entire suite of useful protocols has grown up around them. Some of these provide for
basic functionality in performing such common network tasks as transferring files
between two computers (FTP) or running applications on a remote computer (Telnet).
Others are used for information gathering (SNMP, NETSTAT, IPCONFIG), and many
are troubleshooting tools that also allow you to perform basic configuration tasks (ARP,
ROUTE).
Q: What is the difference between TCP and UDP if they both operate at the
Transport layer?
A: Although both TCP and UDP are Transport layer protocols and provide the same basic
function, TCP is a connection-oriented protocol, which means a session is established
before data is transmitted, and acknowledgments are sent back to the sending computer to
verify that the data did arrive and was accurate and complete. UDP is connectionless; no
session, or one-to-one connection, is established prior to data transmission. This makes
UDP the faster of the two, and TCP the more reliable.
Q: What is the purpose of a networking model? How will knowing this theoretical
stuff help me in administering my TCP/IP network?
A: The models give us a way to understand the process that takes place when computers
communicate with each other across the network, the order in which tasks are processed,
and which protocols are responsible for handling which duties. Understanding the models
will help you to narrow down the source of your TCP/IP connectivity problems. For
example, if you know that the data is being sent but is not arriving at the correct
destination, you will know to start troubleshooting by examining what is happening at the
Network layer, since that's where addressing and routing takes place.
Q: Why do we need three different networking models? Why can't everyone use the
same one?
A: Actually, that was the plan when the ISO developed the Open Systems
Interconnection model. It was to be the common standard used by all vendors and
software developers in describing the network communication process. The DoD model
actually predates the OSI, and the seven-layer OSI model builds on (and further breaks
down) the components of the DoD model. However, individual vendors such as
Microsoft still use their own models, which map more closely to their software (such as
the Windows NT/2000 model), although they also use the OSI model as a guideline.
A: The word gateway has many different meanings in the IT world. A protocol
translating gateway translates between different protocols. Think of it as the United
Nations interpreter of the networking world. If the president of the United States needs to
exchange information with the president of France, but neither speaks the other's
language, they can call in someone who is fluent in both to help them get their messages
across. Similarly, if a mainframe system and a Windows 2000 computer need to
communicate with one another-perhaps the mainframe has important files that need to be
accessed by the PC-but they don't know how to "talk" to each other, you can install a
gateway to clear up the confusion. The gateway is even more skilled than the interpreter
is; it actually fools the mainframe into believing it's communicating with another
mainframe, and makes the PC think it is having a "conversation" with a fellow PC.
Gateway is also the term used to refer to the address of a router that connects your
network to another, acting as the gateway to the "outside world.
Q:
A:
Every Ethernet Network card that has ever been made is supposed to have a unique
Hardware Address. The Hardware Address is customarily hard coded into the network
card and is not normally allowed to change. Network switches use the Hardware Address
to direct communications. Network routers track the relationship between IP Addresses
and Hardware Addresses to direct communications.
A typical hardware address will look something like this '00:00:0C:0F:35:04' - there are
six pairs of hexadecimal (0-9,A-F) numbers in a hardware address, in this example they
are separated by colons, but can also be separated by dashes or periods, or the hardware
address can be presented in a single long string. See the following examples:
00-00-0C-0F-35-04
0000.0C0F.3504
00000C0F3504
The first 3 pairs (or first six numbers and letters) are known as the 'Vendor Code', the last
three pairs are the host code. You can check
[ http://standards.ieee.org/regauth/oui/oui.txt ] this list if you're ever interested in learning
who made a network card; in the above example the card was made by Cisco.
Q:
What is an IP Address?
A:
As mentioned above every network card in the world should have a unique Hardware
Address that does not change. At any given time, on any given network, each computer
should be using a unique IP Address. Unlike the Hardware Address the IP Address is
subject to change and is controlled by the computer's operating system. Many computers
at UNC use DHCP to get a dynamically assigned IP Address each time they start up.
Most IP Addresses at UNC will start with 152.2, 152.19, or 152.23 and will look
something like 152.23.175.10.
There are both public and private IP Addresses. Public Addresses are assigned by the
authorities who control the Internet and are unique to each computer connected to the
Internet. Private addresses are assigned by the authorities who control the local network.
The 152.2, 152.19, and 152.23 addresses are public addresses. Some examples of private
addresses are those that start with 192.168., 172.29, 169.254., and 10.250. (See
http://www.faqs.org/rfcs/rfc1918.html for more details.)
Q:
What is NMap?
A:
NMap is a port scanning tool that the Security office uses to look at the ports a remote
system is using and to help determine which program is using each port. NMap output
will often be included in the Remedy worklog. Suspicious ports being open are often a
sign of infection or compromise of a computer. Programs like FPort and Vision can help
you to explore locally which program opened a port.
Q:
What is Snort?
A:
Snort is an Intrusion Detection System. UNC-Chapel Hill's Snort system watches a copy
of network traffic and looks for traffic that matches something from a set of Signatures.
These Signatures are designed to look for infected computers and attempts to
compromise computers. UNC has been using Snort for over 4 years and it continues to
help us daily in the detection of Security problems.
Q:
A:
Tipping Point is an Intrusion Prevention System. Unlike Snort which watches a copy of
the traffic, Tipping Point is a network device that has traffic passing through it. Tipping
Point also inspects network traffic for matches to its own set of Filters. If Tipping Point
sees traffic that is known to be bad, then the unit will stop that traffic and will not allow
the bad traffic over that part of the network. Any good traffic from the same computer is
still allowed to pass through. These Filters are very different from the Signatures that
Snort uses and because they are looking for different problems, the two systems
complement each other very well. UNC-Chapel Hill has been using Tipping Point since
the summer of 2003.
Q:
What is ASM?
A:
ASM is the Automated Security Manager from Enterasys, the company that makes many
of the network switches we use at UNC-Chapel Hill. ASM is one component of a larger
network management suite of programs. Networking and Security have implemented a
system where certain bad events, when seen by the Tipping Point, send a special message
to ASM. When ASM sees this message it will automatically find the user and either
remove them from the network or put them in the Self-Help VLAN. The Security office
is very careful about the events that Tipping Point uses to send messages to ASM; all are
events that have consistently indicated an infected machine.
Q:
A:
The Self-Help VLAN is a tool that has been developed by the Control Center, ITRC,
Networking, ResNet and Security. When we see a computer system having a problem,
one of the options we now have available to help them is to put the computer in the Self-
Help VLAN.
If a computer is in the Self-Help VLAN then its access to other computers and the
Internet is restricted. If the user opens a web browser they should see a special web page
with directions; any website that they try to visit will be redirected to this Self-Help page.
For example, if Google is their normal start page when they open their browser they will
see the Self-Help VLAN page instead of the Google page. The user should attempt to
follow the directions provided on this page. Any of the steps that they are able to perform
themselves will help their ticket to be resolved sooner. Another way to diagnose if a user
is in the Self-Help VLAN is by looking at their IP Address. If they have an IP Address
that starts with 10.250. they have been restricted to the Self-Help VLAN. To see a current
version of what a user in the Self-Help VLAN will see, you can visit:
[ http://help.unc.edu/?id=5665 ] http://help.unc.edu/?id=5665 .
Q:
What is StealthWatch?
A:
Q:
A:
Viruses and worms are malicious programs that infect and often damage computer
systems. To be infected with a virus, the user has to perform some action, like opening an
email attachment or clicking on a link. Unlike a virus, a Worm can spread itself without
the user doing anything.
Many companies and administrators use the terms Virus and Worm interchangeably;
most often referring to a Worm as a Virus or by saying that it is a Virus that displays
Worm behavior. Some of these malicious programs do have multiple infection vectors
that are both Virus type infections where the user has to do something, and Worm type
infections where the user simply has to have a vulnerable computer system. The
infections we have seen in the past year were normally these types that have multiple
ways of spreading.
Q:
What is a Trojan?
A:
A Trojan is a malicious program that often allows a remote user access or control of an
infected computer system. A Trojan program often is very good at hiding itself. Because
many Trojan programs are well hidden and difficult to remove the ITRC upgrade to a
fresh operating system is often the best way to remove the infection.
Trojan programs are of particular concern because at any given time the remote user
could decide to erase all the data on an infected computer, to steal data from an infected
computer, or to use the infected computer to attack other computers.
Q:
A:
A Spam Relay is another type of malicious program that is often very well hidden on the
computer and is often installed without the computer user's knowledge or permission.
Spam Relay programs turn infected computer systems into special mail servers that are
used to send unsolicited commercial email to huge lists of people. When a computer at
UNC-Chapel Hill becomes a Spam Relay it can result in other administrators blocking all
mail from all UNC computers. This could prevent your email from reaching other email
services. Like Trojan programs, Spam Relays are also often well hidden and difficult to
remove, so often the best way to clean them is an upgrade to a fresh operating system at
the ITRC.
Q:
A:
The Network Migration in the summer of 2004 resulted in some fundamental changes to
the way UNC-Chapel Hill's Networking group handles computers. Many of these
changes are a huge improvement to the network, but they also mean that the Penalty Box
and Source Blocking no longer exist. Those tools were special in the way the old network
saw computers; as outlined above, the new network views them differently.
Anti-virus Software
What is it?
Anti-virus software protects email, instant messages, and other files by removing viruses
and worms. It may also quarantine infected files to keep a virus from spreading on your
computer and can repair infected files so you can use them without fear of damaging your
computer or spreading a virus to others.
What is it?
Confidential data is any information you don't want others to obtain without your
permission, including (but not limited to) your social security number, home address,
phone numbers of friends/family/colleagues/students, your drivers license or bank
account numbers, a list of all your passwords, your home address or phone numbers, your
employee ID number, digital images, word documents containing personal text, etc. Most
people store confidential data of some kind on their computers within Word files, address
books, or application settings.
Data Backups
What is it?
To back up your files, simply create a second copy of your important documents
somewhere other than your computer's hard drive.
• Back up critical and essential files on a daily basis and non-critical files on a
weekly or monthly basis. You can back up your data to a CD, to an online back
up service (for a small monthly fee), flash drive, USB key, or to a server, if you
can get access to one from your Internet Service Provider or commercial vendor.
Some companies offer automatic backups when you purchase their programs.
• Keep all your critical files in one place so you can easily create a duplicate copy.
• Store your backup media (CDs, disks, backup server, etc.) in a safe and secure
place away from your computer, in case of fire or theft.
• Periodically test the capability to restore from the backup media. It's of little value
to have a backup that is unreadable. To ensure that your backup files are reliable,
simply upload the files to your computer.
• Faculty/Staff: Check with your department's Technical Support Coordinator
(TSC) to find out if he or she runs regular backups of departmental computers.
What is DNS?
DNS stands for Domain Name System. DNS servers are a critical part of the campus
network infrastructure and the Internet because they allow information on the Internet to
be available when you enter a URL in your Web browser. UC Davis disabled one
capability of the DNS servers --recursive DNS - to help improve security.
1. Cache poisoning: An attacker could redirect users attempting to reach one site,
say a bank site, to a malicious site without their knowledge. For more information
about this type of attack, see http://www.lurhq.com/dnscache.pdf.
2. Recursive DDoS attacks: An attacker can send streams of DNS queries to caching
servers. As all of these servers answer the queries, the victim host is targeted with
a massive distributed denial-of-service attack (DDoS). For more information, see
http://www.us-cert.gov/reading_room/DNS-recursion033006.pdf.
How will I know if attachments are removed from email messages I send/receive?
Recipients will receive a message clearly stating that an attachment was removed, the
name of the attachment, why the attachment was removed, and options for resending the
attachment as an unrestricted file type. However, senders of restricted file types will not
receive notification that the attachment was removed.
What can I do if a file type I want to send is on the restricted file type list?
If you need to share a file type that is on the restricted list, consider renaming the file to
an unrestricted file type or using Web-based file sharing (such as MySpace, the file
sharing section of MyUCDavis) or removable media (e.g. CD, Zip).
What kind of email virus protection does UC Davis offer email users?
The virus filtering software detects and deletes known viruses attached to all the
incoming and outgoing email messages that are processed through the central campus
email servers.
How does the virus filtering system work? What do I have to do?
As an email user, you don't have to do anything to benefit from this service. Here's how it
works: When you send an email, it always travels through an email server where it is
routed to the recipient (the person to whom you're sending it). The servers with this new
filtering software will act as "checkpoints," searching all incoming and outgoing email
messages for known viruses.
• Be aware that the message and any attachment in question will not have been sent
to the intended recipient.
• While the virus infection will be removed from the email, the infected computer
from which the email originated will continue to be infected until virus removal
efforts are complete. Check for virus conditions on your computer by running
anti-virus software.
• Since certain viruses are clever enough to forge sender names, you might not
actually have a virus on your computer. Contact IT Express (754-HELP) or your
department's TSC for advice.
How do I know if my email goes through the central campus servers where this
virus-scanning occurs?
If you have been receiving email at an "@ucdavis.edu" address, you will automatically
benefit from this filtering service. If you receive email at an address that contains the
name of a department (such as "@dept.ucdavis.edu"), your email processes through a
separate department server.
My email doesn't go through the central campus servers. How do I find out what
kind of protection my department email server provides me?
Contact your department's Technology Support Coordinator. If you don't know who your
TSC is, visit the TSC directory to find out.
• Configure your computer to seek virus definition updates from your anti-virus
software vendor on a daily basis. For more advice, contact IT Express at
(530)754-HELP.
• Not open any attachment to an email that has a suspicious subject line, file name,
or message. Remember: some viruses can forge themselves to appear as if they
are from someone you know; therefore, the "from" line alone cannot be trusted.
Encryption Basics
Can I get help on campus with Pointsec ME and/or Pointsec for Linux?
These items are available but not supported at this time.
Firewalls
What is a firewall?
A firewall acts as a protective barrier between your computer and the internet, monitoring
all incoming and/or outgoing traffic and allowing only the network traffic you permit.
Firewalls come in the form of software, which nestles itself between your operating
system and your network card. They also come in the form of hardware; for many home
and small office users, it is a simple router device that sits between your computer's
network jack and the wall connection. You can customize the level of protection the
firewall gives you, setting it to filter information flow from specific domain names,
addresses or types of network traffic.
Identity Theft
• Order a copy of your credit report from each of the three major credit bureaus -
Equifax, Experian, and TransUnion. Make sure it's accurate and includes only
those activities you've authorized. California residents can order one free copy of
their credit report from each bureau annually. For more information on how to
obtain your free credit report, visit the California Office of Privacy Protection.
• Place hard-to-guess passwords on your credit card, bank, and phone accounts.
Keep your passwords and PIN numbers secret. Don't share your Kerberos
password!
• Use a shredder when discarding documents containing personal identification.
• Don't send personal information via email.
• When shopping online, make sure the site is secure by looking for the padlock
icon in the corner of the page that asks you to input your personal information.
• Don't keep personal information stored on computers unless necessary and
encrypted.
• Ask about information security procedures in your workplace.
IRC Bots
Passwords
Phishing
What is it?
The term "phishing" (pronounced "fishing") refers to a form of fraud that uses email
messages that appear to be from a reputable business (often a financial institution) in an
attempt to gain personal or account information. The email message typically includes a
link to a fake Web site that appears identical to a legitimate page. The fake Web page is
used to collect the requested information. This information is then used for fraudulent
purposes.
What is it?
Patches are updates that "fix" flaws in your operating system, the basic program that runs
your computer (e.g.Windows 2000, Windows XP, Windows Vista or Macintosh OS X).
Patches are released on an as-needed basis from your operating system vendor (such as
Microsoft or Apple) and should be installed as they become available.
What is spam?
Spam is unsolicited commercial email, or that junk mail that you get in your email inbox.
Can I change the way the campus filters spam to my email account?
Yes, you can customize the way the campus filters spam to your email account by
visiting http://email.ucdavis.edu/secure/spamfilter.php. You can change the point at
which spam is filtered to your UCD-spam folder and when it is automatically rejected.
You can also create allow and deny lists.
I have my campus email redirected to a non-UC Davis email account. Will the
campus filter my email before it is redirected?
No, email is redirected before it is filtered.
How will these measures affect class mailing lists or other address lists that go to UC
recipients?
List owners who have configured their lists to filter spam should see less spam get
through. People posting from off-campus may have difficulty if they're routing mail
through blocked mail servers, but that would be just as true if they were trying to mail an
individual on campus--the fact that the addressee is a mailing list rather than an
individual is not a factor.
Does UC Davis provide specially tailored filtering rules that I can use with my email
program, as an alternative to using the central campus spam filtering utility?
UC Davis not provide specific spam filtering rules, but does provide instructions for
setting up spam filtering on campus-supported email programs. You may access these
instructions and learn more about spam filtering options by visiting the Campus Spam
Filtering page.
What can I do if spam filtering set-up instructions are not available for my email
program?
Most email programs allow you to set up filters. You should consult help resources for
your program to see what anti-spam measures they offer.
If all messages with a high score are sent to a spam folder that is only accessible
through MyUCDavis and Geckomail, how can I make sure that the spam filter is
not sending legitimate email to this folder if I never use MyUCDavis or Geckomail?
The folder will be visible to any IMAP client; Geckomail is merely one example of an
IET-supported IMAP client. If a user has an email program configured to connect to their
server via IMAP, then no change in behavior will be required. Those who have
configured their email program to POP can change that configuration to IMAP. For more
information about POP and IMAP configurations, see The IT Express Knowledge Base
article on POP and IMAP.
Cautious
Reject Spam** Aggressive** (Campus Defaults) Deliver A
Filter spam Yes Yes Yes No
To UCD-spam folder None 5 5 None
Summary No Yes Yes No
Delete Spam 5 10 15 15
What you can expect if All spam scoring 5 or Most spam will be Most spam will be You will
you choose these above will be rejected rejected automatically, either rejected or sent spam sco
settings. automatically. No email but some will be stored to your UCD-spam than15 th
will be sent to your in your UCD-spam folder. your ema
UCD-spam folder. folder.
Individuals who have Individuals who have Most of the campus Individua
previously used the previously used the community will find receive a
Who might want to campus spam filtering campus spam filtering that these settings directed
choose these settings? service and found that service and found that provide the greatest account,
moderate-scoring spam moderate-scoring spam level of accuracy with whether
could be rejected rather could be rejected rather the least amount of
than stored in their than stored in their spam delivered.
UCD-spam folder. UCD-spam folder
Set up allow lists to Set up allow/deny lists Set up allow/deny lists Set up sp
exempt certain email to further customize to further customize using yo
Other considerations addresses or domains. your email filter. your email filter. program’
Set up deny lists if you spam con
repeatedly receive spam
scoring less than 5 from
a particular address or
domain.
*You may want to make incremental changes to these settings until you find your desired
combination. Messages receiving a score of 4 or lower may be legitimate email
messages, so please use caution when filtering or deleting messages with very low scores.
** Please be aware that the more aggressively you filter spam, the more likely you are to
receive false positives.
Spyware
What is it?
Spyware is software that gathers information about your Web-surfing habits for
marketing purposes. Spyware "piggybacks" on programs you choose to download.
Tucked away in the fine print of user agreements for many "free" downloads and services
is a stipulation that the company will use spyware to monitor your web habits for
business research purposes.
• Closely read user agreements for free programs before clicking, "I accept." Watch
for allusions to spyware and adware in user agreements.
• Regularly scan your computer with an anti-spyware program.
Viruses
• Install anti-virus software on your computer and run daily updates. Sophos Anti-
virus is available to all UC Davis students, faculty and staff for free on the
Software Web site.
• Install "patches" at your operating system's Web site to keep your computer
fortified against possible attack.
o Mac users: http://www.apple.com/support.
o Windows users: http://v4.windowsupdate.microsoft.com/en/default.asp.
• Visit the Vulnerability Self-Test page to scan your computer for the virus
infections and other critical security risks for which the campus scans.
• Do not open email attachments with suspicious subject lines, file names, or
messages. Some viruses can forge themselves to appear as if they are from
someone you know, therefore, the "from" line alone cannot be trusted.
• Be aware that viruses may come to you in links sent via Instant Messaging, email
attachments, infected disks, freeware, shareware, or file-sharing.
Wireless
What is it?
The freedom to browse the Internet while sitting at your favorite cafe or relaxing on the
UC Davis quad. Wireless networks are sprouting up everywhere, including UC Davis.
Movies like "War Games" and "The Matrix" have hacking as a major theme and although
great entertainment these movies are just that, ENTERTAINMENT!!!! Hacking in the
old school techno geek sense, is playing with all kinds of hardware and software to see
what makes it work. For example in the process of learning how a computer works, often
it is possible to screw up a computer configuration (so that it is unstable and prone to
crash, by default Micro$oft Windoze is unstable and prone to crash so in this case ya
have to hack a system to make it stable and useable), or access data by using a few simple
tricks (i.e. in UNIX the default settings allow users to access everything, so to secure a
network with UNIX you have to change the defaults in order to limit a users access).
A hacker is someone who enjoys the challenge of making a computer do something cool,
which is contrary to popular stereotypes in the media which depict a hacker as some sort
of social misfit who breaks into computers to steal credit card information or deface web
sites. If a hacker does explore a network the rules to live by is one "do no harm" and two
"don't get caught."
What is a cracker?
A cracker (sometimes called a black hat) is a hacker who turned to the dark side. Often
times crackers are immature individual who seek the excitement and notoriety of
cracking a system for tagging (i.e. deface a web site) or a cracker is someone motivated
by financial gain, (i.e. someone who gets into a computer network to steal credit card
information).
There is no magic to hacking, but like anything else that is worthwhile it takes dedication,
a willingness to learn, and most of all patients.
If you have old hardware, or software, try taking it apart and putting it back together (in
the process you will learn how the two interface). I use to play around with old 8088
machines I'd pick up at thrift stores for just such a purpose. Once you have a basic idea of
how hardware and software interface, the skill set is transferable to any system such as:
CPM, DOS, Windoze, UNIX, a MAC, etc......
The next skill you will need to pick up is basic programming (I suggest C, although you
can begin with other languages such as fortran, pascal, basic, etc.). Again you are not
interested in the specifics of a language, you are interested in the skill set of learning
about, loops, testing for conditions, setting up arrays in memory, etc.
When you have a basic idea of how a computer works and basic programming skills, it
becomes easier to understand TCP/IP and PERL, two important skill sets needed if you
want to be a "web hacker."
The next step up from web hacking is IT security, and here ya really have to know all
sorts of skills cause real money is on the line (i.e. someone is working for a bank, credit
card company, etc.). For an IT professional, the crucial things to know are ATM
technology, fiber optics, and a firm understanding of layers.
FYI ATM technology has replaced SONET (synchronous optical network) as the banking
machine technology that prevents people from breaking into the system and rerouting
your financial information, it's the technology used in North America's major backbones.
To get information from one location to another, fiber optics is used because it is more
difficult to intercept than consumer technology like WiFi. Having a math or physics
background is helpful understanding concepts like DWDM (dense wave division
multiplexing). DWDM is an optical technology used to increase bandwidth over existing
fiber-optic backbones, and sometimes to make the backbone more secure. It is basically
the division of a fiber-optic line into 32, 64 or 128 different channels or wavelengths.
Detectors are used for each wavelength within the fiber and therefore are totally separate
(and secure) from other wavelengths. This processes of using discrete wavelengths and
detectors in effect multiplies the information capacity of a fiber.
Understanding the layers of technology and how they interact is the third critical thing to
know for an IT professional. Basically the lower the number the more formal the
training...
Layer 1 - Link
(This layer defines the network hardware and device drivers)
Layer 2 - Network
(This layer is used for basic communication, addressing and routing. TCP/IP uses IP and
ICMP protocols at the network layer)
Layer 3 - Transport
(Handles communication among programs on a network. TCP and UDP falls within this
layer)
Layer 4 - Application
(End-user applications reside at this layer. Commonly used applications include NFS,
DNS, arp, rlogin, talk, ftp, ntp and traceroute)
Knowing how to find information and use information is often an overlooked hacker skill
(there is lots of information on the web, the problem is finding and making use of the
information out there).
If you master these skills and have a sense of maturity, then hacking a computer becomes
nothing more than using tricks you pick up over the years.
You can use any kind of computer to hack (when ya think about it a computer is just a
tool, actually the most important tool ya have in hacking is your mind) but if you are
asking what I use, then the answer is a Mac. I use a Mac because the OS is better thought
out than the Windoze OS and the Mac has less bloat than Windows. I don't use Linux
cause I don't want to fool around with configuring every little item (out of the box the
Mac simply works).
With a Mac I have the best of all worlds, if I need to check out a program only available
in windows, then I would use "Virtual PC" a windows software emulator. If I need to
play around with UNIX, I would just switch to the terminal mode in OS X (the MAC OS
is now based on UNIX). One other nice feature about staying Micro$oft free is I do not
have to worry about a web based virus like "I love you" that takes advantage of the fact
that most users of windoze and office keep the factory default configuration.
The Mac may cost more than a typical Windoze or Linux box, but the difference is
something akin driving a Land Cruiser and a Ford F150 in the bush (both vehicles will
take you from point A to point B, but the Land Cruiser is a whole lot nicer to drive than a
Ford F150).
These days it has never been easier to learn how to hack and at the same time never more
dangerous.
The good news is, as time goes on computer hardware/software keeps on getting less
expensive and the processing power keeps on going up. At the same time there are
published books on the subject of hacking, lots of information on the web as well as
organized hacker conventions like defcon or toorcon (ya never know what kind of
interesting info you could pick up that might be useful at some future date). These are
just a few reasons why it easier to learn how to hack now as compared to the past.
Now for the bad news. Hacking networks for the simple pleasure of increasing ones
knowledge is frowned upon by politicians and corporate types who don't understand the
technology enuf to secure sensitive info. And after 9/11 there is a pretty paranoid mindset
with the powers that be, that the whole world is out to get them.
If the world was an ideal place hackers might be looked upon as magicians performing
"tricks" with computers, I kind of like this analogy of hackers and magicians cause both
groups break into or out of things and fool the masses.
Learn as much as you can about your own computer, network, etc. When you configure
something, keep things as simple as possible and resist feature creep.
You may discover that program interaction can cause a system to crash, for example a
compiler may work fine with a certain OS, a memory manager may work fine with a
certain OS, but if you combine the compiler and memory manager with a certain OS then
you may discover the system may be more unstable.
If you are tasked with securing a system, you may think that crackers are the biggest
threat. In reality the biggest threat to a system comes from within (for example if a
system is not idiot proofed you may get one user over writing their own files, over
writing another users files or maliciously altering data which may be scientific or
financial in nature). Other potential problems with authorized users are weak passwords
and some kind of computer virus.
To poke around a computer ya might also want to look into forensic software which is
used by various law enforcement agencies to get evidence of bad guys (like anything else
this topic is a double edge sword, ya want to keep your data secure from the bad guys but
if bad guys know how to secure data and cover their trail then it will be more difficult for
law enforcement agencies to catch bad guys).
If ya need to build a simple bullet proof web site that won't be hacked, the best choice
IMHO is a Mac using a basic OS9 install (the last non UNIX based Mac OS) and
WebSTAR. The reason this configuration is hack proof is because there is no there is no
command line interface hence no way to pipe data.
The best way to protect your computer is to separating data and software, which is what
the people in the know like the NSA do. Essentially the NSA maintains "air gaps"
between "red" machines which are dangerous (like those connected to the web), and
"green" ones which are safe. No software may go between the color-coded networks.
In any case it is important to always backup everything, and keep a backup of backup
(just in case you need to restore data on a system).
What good is the fastest processor in the world if ya don't have an operating system. All
operating system like Linux, Windoze, Mac, Unix, etc., when ya think about it pretty
much have the same basic operations, like copy files, save files, etc. The frills come in
when ya try to multi-task, when ya try an handle lots of data, etc.
So you're asking what's the big deal with Linux when Bill and his big old marketing firm
for the most part succeed in getting the public to use IMHO a piece of shit OS. Well the
reason most people stick to windoze is because micro$oft writes applications people use
every day (like explorer for browsing, word for doing word processing, excel for spread
sheets, power point for presentations, etc.). Furthermore windoze gives people the
impression of being a bargain (by that I mean micro$oft throws in all sorts of junk like a
media player, games like solitaire, etc.). For the most part Windoze is OK if all ya want
to do is run off the shelf software, and it tries to make installing said warez easy to install
and use.
The problem with windoze is that you can't scale things up, by that I mean could you
imagine keeping California's sale tax records on a PC running windoze, or something
even bigger like the IRS dbase and windoze is not stable "Blue Screen of Death," nuf
said! Unix and its variant OS's were designed from the ground up to run on main frames,
where resources could be scaled up and shared and it is a lot more stable than windoze
(when configured properly).
Basically windoze has its roots in the desk top computer, where typical users want ease of
use, and Unix has its roots in mainframes where serving information to larges numbers of
users with reliable was the basic design goal.
The basic reason a hacker must know Unix, Linux, etc. is because it is the key to
understanding how to do interesting tricks like breaking into a web site (among other
things). The problem with Unix, Linux, etc. is it is not all that easy to grasp its power, let
alone install (because there are literally millions of ways you can configure a system).
If you are running Windoze and want to learn about Linux, try getting partition software
so you an duel boot your machine, and install "red hat," "Lindow" (a company started by
the dude who also started MP3.com and is trying to make using linux as easy to use as
windoze), or ya might even want to check out the NSA which has a version of linux
which is optimized for security.
A port scanner is a legitimate tool when used by web masters or IT administrators to see
if a computer is locked down, it other words it can be used like a guard at a building to
see if non public areas are secure. Taking the analogy of building security a bit further,
lets compare a site or network to a storefront or museum. Port 80 is the basis of the web,
it basically is the http:// protocol, sort of like the public area of a storefront or museum.
In a store front or museum there are areas that store owners or museum curators don't
want to give the public general access to for obvious reasons, like storage areas, office
space, loading docks, etc. Now if ya get what I'm trying to say, then a port scanner can be
used to see if it is possible to access non public areas like the loading dock (ports 21, 20
which is FTP or a file transfer service), administrative offices (port 23 which is TELNET
and allows remote login), etc.
FYI there are 65536 ports available for use in TCP (Transmission Control Protocol) or
UDP (User Datagram Protocol) which are divided into three ranges. The Internet
Assigned Numbers Authority (IANA) manages the first range of 1024 ports (0 through
1023). The second range is the Registered Port Numbers which contain ports 1024
through 49151. The Registered Port Numbers can be used by ordinary programs and
users (basically these ports are generally used transiently when needed). The third range
is the Dynamic or Private Port Numbers which range from 49152 through 65535. These
last range can be used by applications and processes initiated by the user (but this is
uncommon).
There is lots of stuff you can do once you have access to a non public area of a building
or computer, for example if you are in building ya might be able to crawl through an air
duct to reach really secure parts of a building (but for the most part the only experience
most people have of checking out an air duct to reach a "secretive and secure location" is
done vicariously in a Hollywood movie).
When ya have access to a non public part of a computer system that is not yours, ya can
do all sort of stuff if you're cleaver enuf, like pipe various parameters into a program to
access even more parts of a system, find your way down to the ROOT, so you can
monitor everything just like the owner of the system and even erase or alter logs to cover
any evidence that you were in the system.
To illustrate an example what exploits are possible, ports 137, 139, and 445 run a piece of
software called "windows Management Port" which is ON all the time, but it is only need
when Windows sends data to the printer or looks for a machine in or office or home to
share files. If you hook up a broadband modem directly to the net, you expose these three
ports on your PC to be exploited. To prevent this exploit you can hook up your
broadband modem to a router, which then limits worms to only those ports you are going
out on (i.e. port 80 which is http:// or normal browser traffic).
What is a war dialer?
War dialers were first popularized when the movie "War Games" came out. To make a
long story short, most of them were written in some sort of "basic" language, when 2400
baud was considered high end.
Back in the day ToneLoc short for Tone Locator was the tool of choice to look for
carriers (like an ordinary wardialer) and to check out PBXs. Another golden oldie DOS
program of the era is BlueBeep an all-purpose phreaking/hacking tool.
802.11 or WiFi is a neat way to network computers, this is because no wires are needed
to connect computers. Apple computer was the first major maker of computers to push
this concept, and soon after makers of other personal computers followed Apple's lead.
Coffee houses (like starbucks), have installed wireless networks because it is another way
for them to sucker in customers.
One way to achieve reasonable anonymity surfing the web is to find a free WiFi access
point (called a hotspot) that does not require a password or a subscription. Because
anyone can access the wireless network without identifying herself or himself first, free
hot spots in theory are perfect for terrorists, porn perverts and for individuals who
download music (because lawyers from the RIAA would have difficulty tracking down
individual users).
One file-distribution system that is trying to conceal even its users IP addresses is the
venerable Freenet, which breaks from the traditional mold of peer-to-peer networks by
cloaking the identities of both the people distributing copies of a file and those
downloading it. Because Freenet is intended to provide a near-uncensorable and
encrypted way to communicate, its designers specified that individuals may not even
know what files are stored on their hard drives. The downside: Freenet remains more
difficult to search and offers less content than do the most popular file-swapping
networks.
The major down side of wirless networks is that it is pretty easy to find out what other
users are up to since pretty much everthing is sent in the clear.... besides that WEP (first
generation WiFi security) can be cracked in 10 minutes.
Most accounts on a computer system usually have some method of restricting access to
that account, usually in the form of a password. When accessing the system, the user has
to present a valid ID to use the system, followed by a password to use the account. Most
systems either do not echo the password back on the screen as it is typed, or they print an
asterisk in place of the real character.
Cryptographically speaking, some algorithms are better than others at generating a one-
way hash. The main operating systems we are covering here -- NT, Netware, and Unix --
all use an algorithm that has been made publically available and has been scrutinized to
some degree.
To crack a password requires getting a copy of the one-way hash stored on the server,
and then using the algorithm generate your own hash until you get a match. When you
get a match, whatever word you used to generate your hash will allow you to log into that
system. Since this can be rather time-consuming, automation is typically used. There are
freeware password crackers available for NT, Netware, and Unix.
If the one-way hashes are not the password itself but a mathematical derivative, why
should they be protected? Well, since the algorithm is already known, a password cracker
could be used to simply encrypt the possible passwords and compare the one-way hashes
until you get a match. There are two types of approaches to this -- dictionary and brute
force.
Usually the hashes are stored in a part of the system that has extra security to limit access
from potential crackers.
A dictionary password cracker simply takes a list of dictionary words, and one at a time
encrypts them to see if they encrypt to the one way hash from the system. If the hashes
are equal, the password is considered cracked, and the word tried from the dictionary list
is the password.
Some of these dictionary crackers can "manipulate" each word in the wordlist by using
filters. These rules/filters allow you to change "idiot" to "1d10t" and other advanced
variations to get the most from a word list. The best known of these mutation filters are
the rules that come with Crack (for Unix). These filtering rules are so popular they have
been ported over to cracking software for NT.
If your dictionary cracker does not have manipulation rules, you can "pre-treat" the
wordlist. There are plenty of wordlist manipulation tools that allow all kinds of ways to
filter, expand, and alter wordlists. With a little careful planning, you can turn a small
collection of wordlists into a very large and thorough list for dictionary crackers without
those fancy word manipulations built in.
A brute force cracker simply tries all possible passwords until it gets the password. From
a cracker perspective, this is usually very time consuming. However, given enough time
and CPU power, the password eventually gets cracked.
Most modern brute force crackers allow a number of options to be specified, such as
maximum password length or characters to brute force with.
It really depends on your goal, the cracking software you have, and the operating system
you are trying to crack. Let's go through several scenarios.
If you remotely retrieved the password file through some system bug, your goal may be
to simply get logged into that system. With the password file, you now have the user
accounts and the hashes. A dictionary attack seems like the quickest method, as you may
simply want access to the box. This is typical if you have a method of leveraging basic
access to gain god status.
If you already have basic access and used this access to get the password file, maybe you
have a particular account you wish to crack. While a couple of swipes with a dictionary
cracker might help, brute force may be the way to go.
If your cracking software does both dictionary and brute force, and both are quite slow,
you may just wish to kick off a brute force attack and then go about your day. By all
means, we recommend a dictionary attack with a pre-treated wordlist first, followed up
by brute force only on the accounts you really want the password to.
You should pre-treat your wordlists if the machine you are going to be cracking from
bottlenecks more at the CPU than at the disk controller. For example, some slower
computers with extremely fast drives make good candidates for large pre-treated
wordlists, but if you have the CPU cycles to spare you might want to let the cracking
program's manipulation filters do their thing.
A lot of serious hackers have a large wordlist in both regular and pre-treated form to
accommodate either need.
To increase the overhead in cracking passwords, some algorithms employ salts to add
further complexity and difficulty to the cracking of passwords. These salts are typically 2
to 8 bytes in length, and algorithmically introduced to further obfuscate the one-way
hash. Of the major operating systems covered here, only NT does not use a salt. The
specifics for salts for both Unix and Netware systems are covered in their individual
password sections.
Historically, the way cracking has been done is to take a potential password, encrypt it
and produce the hash, and then compare the result to each account in the password file.
By adding a salt, you force the cracker to have to read the salt in and encrypt the potential
password with each salt present in the password file. This increases the amount of time to
break all of the passwords, although it is certainly no guarantee that the passwords can't
be cracked. Because of this most modern password crackers when dealing with salts do
give the option of checking a specific account.
The dangers are quite simple, and quite real. If you are caught with a password file you
do not have legitimate access to, you are technically in possession of stolen property in
the eyes of the law. For this reason, some hackers like to run the cracking on someone
else's systems, thereby limiting their liability. I would only recommend doing this on a
system you have a legitimate or well-established account on if you wish to keep a good
eye on things, but perhaps have a way of running the cracking software under a different
account than your own. This way, if the cracking is discovered (as it often is -- cracking
is fairly CPU-intensive), it looks to belong to someone else. Obviously, you would want
to run this under system adminstrator priviledges as you may have a bit more control,
such as assigning lower priority to the cracking software, and hiding the results (making
it less obvious to the real administrator).
Being on a system you have legit access to also allows you better access to check on the
progress. Of course, if it is known you are a hacker, you'll still be the first to be blamed
whether the cracking software is yours or not!
Running the cracking software in the privacy of your own home has the advantage of
allowing you to throw any and all computing power you have at your disposal at a
password, but if caught (say you get raided) then there is little doubt whose cracking job
is running. However, there are a couple of things you can do to protect yourself: encrypt
your files. Only decrypt them when you are viewing them, and wipe and/or encrypt them
back after you are done viewing them.
No password scheme is "safe". In both NT and Netware, you have no choices. Any
problems found with recovering the password hashes or problems in the protocols used
during logon are usually left unsolved and simply "worked around". A good example
with NT is the fact that the LanMan hash is much easier to crack. To eliminate the
LanMan hash requires a lot of work, but it still doesn't erase the fact that you can still
crack the NT hashes.
With Unix, you may have a few more choices. See the section on SRP for details.
4.10 Is there any way I can open a password-protected Microsoft Office document?
Certainly! There are plenty of commercial programs that will do this, but we give props
to Elcomsoft for fighting the DMCA.
How do I hack? - There is no easy way how to hack. Google is your best friend..
REMEMBER THAT! Read any information you can find on hacking. Read hacking
forums and check out hacking websites. Learn a programming language like C++. Get a
book like Hacking for Dummies which will teach you alot.
What do I need to be able to hack? - Firstly you need to understand how your
computers operating system works, networks and protocols works, security settings and
general PC knowledge. After you understand how it works you need hacking tools which
helps you to hack.
What is command prompt (cmd- the little dos Windows)? - Go START, RUN and type
in: "cmd"
What can I do in cmd? - You can can do various things with it like run exploits or do a
ping request.
Why does some of the hacking tools I download just close itself when I open them? -
Lot's of hacking tools are DOS based and has to be run through CMD. If you double click
on the program it will open a DOS box and automaticly close the box. From CMD you
can navigate to the directory which your hacking tool is stored in and run it from there.
Other hacking tools are GUI ( graphical user interface ) based and it will open like a
normal Windows based program.
What is a IP address?
- Every computer connected to the Internet or some network has a IP
address. Goto START, RUN and type in "cmd" then type in "ipconfig" it
will show you your IP adress or adresses. It will look something like this :
81.35.99.84. IP = internet protocol.
How do I find someone's IP adress? - Look further down in this tutorial
and use IPSTEALER
What can I do with a IP? - Well you need someone's IP before you can
hack, portscan or DOS them.
What is IP ping ? –
- It's a command you can use to check if someone's IP address is online, to check it they
connected to the Internet or a network. In command prompt type in "ping 192.168.0.21" -
this will show you something like this :
Pinging 192.168.0.21 with 32 bytes of data:
Reply from 192.168.0.21: bytes=32 time<1ms TTL=128Reply from 192.168.0.21:
bytes=32 time<1ms TTL=128Reply from 192.168.0.21: bytes=32 time<1ms
TTL=128Reply from 192.168.0.21: bytes=32 time<1ms TTL=128
Ping statistics for 192.168.0.21:Packets: Sent = 4, Received = 4, Lost = 0 (0%
loss),Approximate round trip times in milli-seconds:Minimum = 0ms, Maximum = 0ms,
Average = 0ms
That means you can succesfully PING IP 192.168.0.21 which means the IP is online. If
you get a message "request timed out" it means the IP is not online.
Bytes=32 is the ammount of data which was sent to the host.
Time<1ms is the time the host took to reply.
Now remember that even though you cannot ping a IP, it does not mean the host is not
online, ping requests might just be blocked.
Why can't I ping a certain IP? - Either the IP is not online/ in use or the person your
trying to ping is running a firewall which blocks ping requests or maybe your firewall is
blocking outgoing ping requests
Why do I have two IP addresses when I do a ipconfig? - Well if your on a local LAN
(Local area network) you will have a IP like 192.168.0.1. If your also connected to the
internet you will have another IP address like 80.87.34.56. 192.168.0.1 is your local IP
which you use to comunicate with your local internet network (lan) and 80.87.34.56 is
your internet IP.
What is a static and dynamic IP address? - Static means permanent set IP address -
like a website will have a static IP address, it never changes. Dynamic means temporary
IP address - dailing up to the Internet with a modem or most ADSL connections has
dynamic IP's. Everytime you logon to the Internet your ISP ( Internet Service Provider )
will issue you a new IP address.
I have sent someone a trojan but I cannot connect to their PC? - Either they are running a
firewall which blocks you from connecting to their PC, or they are connected to the
internet through a router.
What do I do when someone is behind a router and I want to control their PC with a
trojan? - You will need to use a trojan which uses reverse connections - meaning you
don't connect to the host, the host connects to you. Bifrost is a trojan which has the
mentioned function. Remember when someone is behind a router and your using
IPstealer to get hold of their IP address, you are actually getting their routers IP, not their
actual PC's IP. The router will have the persons internet IP (WAN IP) and their PC will
have a difirent IP - their LAN IP.
How do I check if my own PC is infected with a trojan? - Do a port scan on your PC and
check which ports are open. If you find any open ports in this trojan port list you might
be infected with a trojan. Download the trojan you think you might be infected with and
connect to that specified port.
What is a router?
- - A device which is used to route data on a network. a Router decides where certain
traffic should be sent to.
What is a firewall?
- - Its a software or hardware device which can block or permit certain ports or IP's or
certain kinds of data.
What is a exploit?
- - It's a poorly coded piece in software which you can use to gain access to the system.
There is many exploits available for the various MS Windows's out there.
How do I use a exploit? - You first need to compile the exploit with a program like
Bloodshed C++ compiler. Then you can start the exploit through command prompt and
see if the system your trying to exploit is vulnerable to that specific exploit. Scroll down
for more information about exploits.
How do I see what connections is currently made to my PC? - In cmd type in "netstat" - it
will show you IP addresses of connections to your PC and what port it is using. Also you
can use Currports which has a GUI to show current connections and it has option to close
the connection on a certain port.
What is IIS?
- - It is Microsoft's web server. IIS - Internet information server. Most webservers run on
port 80.
How do I check if a website is running on IIS? - Telnet to the website URL through CMD
- "telnet www.siteyouwanttocheck.com 80"
What is telnet?
- - Program which can be used to connect to remote computers or routers and to run
commands by simply typing them in its window.
How do I get the administrator account password while logged in to the PC? -
Locally run a program like Adminhack for local administrator account cracking. If you
need to do it remotely run a program like Venom or Starbrute.
What is a SAM file? - SAM file is the file which stores all the user accounts and their
password hashes like the Administrator account. SAM file is stored in
"C:\WINDOWS\system32\config" but it is locked and inaccessable while you are busy
using Windows - meaning you can't copy it while your in Windows. You need to boot up
with another operating system like NTFSDOS or Linux with NTFS support. When you
copied the SAM file you can crack the passwords stored in the SAM file with a program
like LC5. With Pwdump6 it is possible to get access to the SAM file while logged into
windows. It can also connect to a remote PC and grab the password hashes from the
SAM file. Administrator account is needed. Ophcrack live CD uses rainbow tables to
crack user account password, and it boots from a CD.
How do I find out what operating system does my target run? Result:
C:\>detect.exe 127.0.0.1[*]------------------------------[*][*] XP/2K OS Detector [*][*] by:
illwill & phr0stic [*][*]------------------------------[*]
[+] Finding Host 127.0.0.1[+] Connected to 127.0.0.1[+] Bytes Sent: 222[?] The box
seems to be Windows XP