A general purpose computer has four main sections: the arithmetic and logic unit (ALU), the control unit, the memory, and the input and output devices (collectively termed I/O). These parts are interconnected by buses, often made of groups of wires.
The control unit, ALU, registers, and basic I/O (and often other hardware closely linked with these) are collectively known as a central processing unit (CPU). Early CPUs were composed of many separate components but since the mid-1970s CPUs have typically been constructed on a single integrated circuit called a microprocessor.
Saturday, October 11, 2008
laptop computer
A laptop computer or simply laptop (also notebook computer, notebook and notepad) is a small mobile computer, typically weighing 3 to 12 pounds (1.4 to 5.4 kg), although older laptops may weigh more.
Laptops usually run on a single main battery or from an external AC/DC adapter that charges the battery while also supplying power to the computer itself even in the event of a power failure. This very powerful main battery should not be confused with the much smaller battery nearly all computers use to run the real-time clock and backup BIOS configuration into the CMOS memory when the computer is without power.
Laptops contain components that are similar to their desktop counterparts and perform the same functions, but are miniaturized and optimized for mobile use and efficient power consumption, although typically less powerful for the same price. Laptops usually have liquid crystal displays and most of them use different memory modules for their random access memory (RAM), for instance, SO-DIMM in lieu of the larger DIMMs. In addition to a built-in keyboard, they may utilize a touchpad (also known as a trackpad) or a pointing stick for input, though an external keyboard or mouse can usually be attached
Laptops usually run on a single main battery or from an external AC/DC adapter that charges the battery while also supplying power to the computer itself even in the event of a power failure. This very powerful main battery should not be confused with the much smaller battery nearly all computers use to run the real-time clock and backup BIOS configuration into the CMOS memory when the computer is without power.
Laptops contain components that are similar to their desktop counterparts and perform the same functions, but are miniaturized and optimized for mobile use and efficient power consumption, although typically less powerful for the same price. Laptops usually have liquid crystal displays and most of them use different memory modules for their random access memory (RAM), for instance, SO-DIMM in lieu of the larger DIMMs. In addition to a built-in keyboard, they may utilize a touchpad (also known as a trackpad) or a pointing stick for input, though an external keyboard or mouse can usually be attached
Computer hardware
Computer hardware is the physical part of a computer, including its digital circuitry, as distinguished from the computer software that executes within the hardware. The hardware of a computer is infrequently changed, in comparison with software and hardware data, which are "soft" in the sense that they are readily created, modified or erased on the computer. Firmware is a special type of software that rarely, if ever, needs to be changed and so is stored on hardware devices such as read-only memory (ROM) where it is not readily changed (and is, therefore, "firm" rather than just "soft").
Most computer hardware is not seen by normal users. It is in embedded systems in automobiles, microwave ovens, electrocardiograph machines, compact disc players, and other devices. Personal computers, the computer hardware familiar to most people, form only a small minority of computers (about 0.2% of all new computers produced in 2003). See Market statistics.
* Motherboard
* Power supply
* Storage controllers
* Video display controller
* Removable media devices
* Internal storage
* Sound card
* Networking
* Other peripherals
* Input
* Output
Most computer hardware is not seen by normal users. It is in embedded systems in automobiles, microwave ovens, electrocardiograph machines, compact disc players, and other devices. Personal computers, the computer hardware familiar to most people, form only a small minority of computers (about 0.2% of all new computers produced in 2003). See Market statistics.
* Motherboard
* Power supply
* Storage controllers
* Video display controller
* Removable media devices
* Internal storage
* Sound card
* Networking
* Other peripherals
* Input
* Output
Types of networks
Personal Area Network (PAN)
A personal area network (PAN) is a computer network used for communication among computer devices close to one person. Some examples of devices that are used in a PAN are printers, fax machines, telephones, PDAs or scanners. The reach of a PAN is typically within about 20-30 feet (approximately 6-9 metres).
Personal area networks may be wired with computer buses such as USB and FireWire. A wireless personal area network (WPAN) can also be made possible with network technologies such as IrDA and Bluetooth..
Local Area Network (LAN)
A network covering a small geographic area, like a home, office, or building. Current LANs are most likely to be based on Ethernet technology. For example, a library may have a wired or wireless LAN for users to interconnect local devices (e.g., printers and servers) and to connect to the internet. On a wired LAN, PCs in the library are typically connected by category 5 (Cat5) cable, running the IEEE 802.3 protocol through a system of interconnection devices and eventually connect to the internet. The cables to the servers are typically on Cat 5e enhanced cable, which will support IEEE 802.3 at 1 Gbit/s. A wireless LAN may exist using a different IEEE protocol, 802.11b or 802.11g. The staff computers (bright green in the figure) can get to the color printer, checkout records, and the academic network and the Internet. All user computers can get to the Internet and the card catalog. Each workgroup can get to its local printer. Note that the printers are not accessible from outside their workgroup.
Typical library network, in a branching tree topology and controlled access to resources
All interconnected devices must understand the network layer (layer 3), because they are handling multiple subnets (the different colors). Those inside the library, which have only 10/100 Mbit/s Ethernet connections to the user device and a Gigabit Ethernet connection to the central router, could be called "layer 3 switches" because they only have Ethernet interfaces and must understand IP. It would be more correct to call them access routers, where the router at the top is a distribution router that connects to the Internet and academic networks' customer access routers.
The defining characteristics of LANs, in contrast to WANs (wide area networks), include their higher data transfer rates, smaller geographic range, and lack of a need for leased telecommunication lines. Current Ethernet or other IEEE 802.3 LAN technologies operate at speeds up to 10 Gbit/s. This is the data transfer rate. IEEE has projects investigating the standardization of 100 Gbit/s, and possibly 40 Gbit/s.
A personal area network (PAN) is a computer network used for communication among computer devices close to one person. Some examples of devices that are used in a PAN are printers, fax machines, telephones, PDAs or scanners. The reach of a PAN is typically within about 20-30 feet (approximately 6-9 metres).
Personal area networks may be wired with computer buses such as USB and FireWire. A wireless personal area network (WPAN) can also be made possible with network technologies such as IrDA and Bluetooth..
Local Area Network (LAN)
A network covering a small geographic area, like a home, office, or building. Current LANs are most likely to be based on Ethernet technology. For example, a library may have a wired or wireless LAN for users to interconnect local devices (e.g., printers and servers) and to connect to the internet. On a wired LAN, PCs in the library are typically connected by category 5 (Cat5) cable, running the IEEE 802.3 protocol through a system of interconnection devices and eventually connect to the internet. The cables to the servers are typically on Cat 5e enhanced cable, which will support IEEE 802.3 at 1 Gbit/s. A wireless LAN may exist using a different IEEE protocol, 802.11b or 802.11g. The staff computers (bright green in the figure) can get to the color printer, checkout records, and the academic network and the Internet. All user computers can get to the Internet and the card catalog. Each workgroup can get to its local printer. Note that the printers are not accessible from outside their workgroup.
Typical library network, in a branching tree topology and controlled access to resources
All interconnected devices must understand the network layer (layer 3), because they are handling multiple subnets (the different colors). Those inside the library, which have only 10/100 Mbit/s Ethernet connections to the user device and a Gigabit Ethernet connection to the central router, could be called "layer 3 switches" because they only have Ethernet interfaces and must understand IP. It would be more correct to call them access routers, where the router at the top is a distribution router that connects to the Internet and academic networks' customer access routers.
The defining characteristics of LANs, in contrast to WANs (wide area networks), include their higher data transfer rates, smaller geographic range, and lack of a need for leased telecommunication lines. Current Ethernet or other IEEE 802.3 LAN technologies operate at speeds up to 10 Gbit/s. This is the data transfer rate. IEEE has projects investigating the standardization of 100 Gbit/s, and possibly 40 Gbit/s.
Types of networks
Campus Area Network (CAN)
A network that connects two or more LANs but that is limited to a specific and contiguous geographical area such as a college campus, industrial complex, or a military base. A CAN may be considered a type of MAN (metropolitan area network), but is generally limited to an area that is smaller than a typical MAN. This term is most often used to discuss the implementation of networks for a contiguous area. This should not be confused with a Controller Area Network. A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings. In TCP/IP networking, a LAN is often but not always implemented as a single IP subnet.
Metropolitan Area Network (MAN)
A Metropolitan Area Network is a network that connects two or more Local Area Networks or Campus Area Networks together but does not extend beyond the boundaries of the immediate town/city. Routers, switches and hubs are connected to create a Metropolitan Area Network.
Wide Area Network (WAN)
A WAN is a data communications network that covers a relatively broad geographic area (i.e. one city to another and one country to another country) and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer.
Global Area Network (GAN)
Global area networks (GAN) specifications are in development by several groups, and there is no common definition. In general, however, a GAN is a model for supporting mobile communications across an arbitrary number of wireless LANs, satellite coverage areas, etc. The key challenge in mobile communications is "handing off" the user communications from one local coverage area to the next. In IEEE Project 802, this involves a succession of terrestrial Wireless local area networks (WLAN).
A network that connects two or more LANs but that is limited to a specific and contiguous geographical area such as a college campus, industrial complex, or a military base. A CAN may be considered a type of MAN (metropolitan area network), but is generally limited to an area that is smaller than a typical MAN. This term is most often used to discuss the implementation of networks for a contiguous area. This should not be confused with a Controller Area Network. A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings. In TCP/IP networking, a LAN is often but not always implemented as a single IP subnet.
Metropolitan Area Network (MAN)
A Metropolitan Area Network is a network that connects two or more Local Area Networks or Campus Area Networks together but does not extend beyond the boundaries of the immediate town/city. Routers, switches and hubs are connected to create a Metropolitan Area Network.
Wide Area Network (WAN)
A WAN is a data communications network that covers a relatively broad geographic area (i.e. one city to another and one country to another country) and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer.
Global Area Network (GAN)
Global area networks (GAN) specifications are in development by several groups, and there is no common definition. In general, however, a GAN is a model for supporting mobile communications across an arbitrary number of wireless LANs, satellite coverage areas, etc. The key challenge in mobile communications is "handing off" the user communications from one local coverage area to the next. In IEEE Project 802, this involves a succession of terrestrial Wireless local area networks (WLAN).
Network Classification
Network Classification
The following list presents major categories used for classifying networks.
Scale
Based on the scale networks can be classified as Local Area Network (LAN), Wide Area Network (WAN) , Metropolitan Area Network (MAN) etc.,
Connection method
Computer networks can also be classified according to the hardware technology that is used to connect the individual devices in the network such as Optical fibre, Ethernet, Wireless LAN, HomePNA, or Power line communication.
Ethernet uses physical wiring to connect devices. Often deployed devices are hubs, switches, bridges, and/or routers.
Wireless LAN technology is designed to connect devices without wiring. These devices use radio waves as transmission medium.
Functional relationship (Network Architectures)
Computer networks may be classified according to the functional relationships which exist among the elements of the network, e.g., Active Networking, Client-server and Peer-to-peer (workgroup) architecture.
Network topology
Computer networks may be classified according to the network topology upon which the network is based, such as Bus network, Star network, Ring network, Mesh network, Star-bus network, Tree or Hierarchical topology network, etc.
Network Topology signifies the way in which devices in the network see their logical relations to one another. The use of the term "logical" here is significant. That is, network topology is independent of the "physical" layout of the network. Even if networked computers are physically placed in a linear arrangement, if they are connected via a hub, the network has a Star topology, rather than a Bus Topology. In this regard the visual and operational characteristics of a network are distinct; the logical network topology is not necessarily the same as the physical layout.
The following list presents major categories used for classifying networks.
Scale
Based on the scale networks can be classified as Local Area Network (LAN), Wide Area Network (WAN) , Metropolitan Area Network (MAN) etc.,
Connection method
Computer networks can also be classified according to the hardware technology that is used to connect the individual devices in the network such as Optical fibre, Ethernet, Wireless LAN, HomePNA, or Power line communication.
Ethernet uses physical wiring to connect devices. Often deployed devices are hubs, switches, bridges, and/or routers.
Wireless LAN technology is designed to connect devices without wiring. These devices use radio waves as transmission medium.
Functional relationship (Network Architectures)
Computer networks may be classified according to the functional relationships which exist among the elements of the network, e.g., Active Networking, Client-server and Peer-to-peer (workgroup) architecture.
Network topology
Computer networks may be classified according to the network topology upon which the network is based, such as Bus network, Star network, Ring network, Mesh network, Star-bus network, Tree or Hierarchical topology network, etc.
Network Topology signifies the way in which devices in the network see their logical relations to one another. The use of the term "logical" here is significant. That is, network topology is independent of the "physical" layout of the network. Even if networked computers are physically placed in a linear arrangement, if they are connected via a hub, the network has a Star topology, rather than a Bus Topology. In this regard the visual and operational characteristics of a network are distinct; the logical network topology is not necessarily the same as the physical layout.
Computer networking
Computer networking is the engineering discipline concerned with communication between computer systems or devices. Networking, routers, routing protocols, and networking over the public Internet have their specifications defined in documents called RFCs.Computer networking is sometimes considered a sub-discipline of telecommunications, computer science, information technology and/or computer engineering. Computer networks rely heavily upon the theoretical and practical application of these scientific and engineering disciplines. A computer network is any set of computers or devices connected to each other with the ability to exchange data. Examples of networks are:
local area network (LAN), which is usually a small network constrained to a small geographic area.
wide area network (WAN) that is usually a larger network that covers a large geographic area.
wireless LANs and WANs (WLAN & WWAN) is the wireless equivalent of the LAN and WAN All networks are interconnected to allow communication with a variety of different kinds of media, including twisted-pair copper wire cable, coaxial cable, optical fiber, and various wireless technologies. The devices can be separated by a few meters (e.g. via Bluetooth) or nearly unlimited distances (e.g. via the interconnections of the
local area network (LAN), which is usually a small network constrained to a small geographic area.
wide area network (WAN) that is usually a larger network that covers a large geographic area.
wireless LANs and WANs (WLAN & WWAN) is the wireless equivalent of the LAN and WAN All networks are interconnected to allow communication with a variety of different kinds of media, including twisted-pair copper wire cable, coaxial cable, optical fiber, and various wireless technologies. The devices can be separated by a few meters (e.g. via Bluetooth) or nearly unlimited distances (e.g. via the interconnections of the
Clients
Clients
Remember, all computers on the Internet (a wide area network, or WAN) can be lumped into two groups: servers and clients, which communicate with one another.
Independent computers connected to a server are called clients. Most likely, your home or office computer does not provide services to other computers. Therefore, it is a client.
Clients run multiple client software applications that perform specific functions.
For example,
An email application such as Microsoft Outlook is client software.
Your web browser (such as Internet Explorer or Netscape) is client software.
Remember, all computers on the Internet (a wide area network, or WAN) can be lumped into two groups: servers and clients, which communicate with one another.
Independent computers connected to a server are called clients. Most likely, your home or office computer does not provide services to other computers. Therefore, it is a client.
Clients run multiple client software applications that perform specific functions.
For example,
An email application such as Microsoft Outlook is client software.
Your web browser (such as Internet Explorer or Netscape) is client software.
server
server
All computers on the Internet (a wide area network, or WAN) can be lumped into two groups: servers and clients. In a network, clients and servers communicate with one another.
A server is the common source that :
Provides shared services (for example, network security measures) with other machines
AND
Manages resources (for example, one printer many people use) in a network.
The term server is often used to describe the hardware (computer), but the term also refers to the software (application) running on the computer. Many servers are dedicated, meaning they only perform specific tasks.
For example,
An email server is a computer that has software running on it allowing it to "serve" email-related services.
A web server has software running on it that allows it to "serve" web-related services.
All computers on the Internet (a wide area network, or WAN) can be lumped into two groups: servers and clients. In a network, clients and servers communicate with one another.
A server is the common source that :
Provides shared services (for example, network security measures) with other machines
AND
Manages resources (for example, one printer many people use) in a network.
The term server is often used to describe the hardware (computer), but the term also refers to the software (application) running on the computer. Many servers are dedicated, meaning they only perform specific tasks.
For example,
An email server is a computer that has software running on it allowing it to "serve" email-related services.
A web server has software running on it that allows it to "serve" web-related services.
Servers and clients communicate
Servers and clients communicate
Your computer (client hardware) is running a web browser such as Internet Explorer (client software).
When you want to surf the web, your browser connects to a remote server and requests a web page.
The remote server (server hardware) runs web server software (server software).
The web server sends the web page to your computer's web browser.
Your web browser displays the page.
Your computer (client hardware) is running a web browser such as Internet Explorer (client software).
When you want to surf the web, your browser connects to a remote server and requests a web page.
The remote server (server hardware) runs web server software (server software).
The web server sends the web page to your computer's web browser.
Your web browser displays the page.
microprocessor
A microprocessor incorporates most or all of the functions of a central processing unit (CPU) on a single integrated circuit (IC). The first microprocessors emerged in the early 1970s and were used for electronic calculators, using BCD arithmetic on 4-bit words. Other embedded uses of 4 and 8-bit microprocessors, such as terminals, printers, various kinds of automation etc, followed rather quickly. Affordable 8-bit microprocessors with 16-bit addressing also led to the first general purpose microcomputers in the mid-1970s.
Computer processors were for a long period constructed out of small and medium-scale ICs containing the equivalent of a few to a few hundred transistors. The integration of the whole CPU onto a single VLSI chip therefore greatly reduced the cost of processing capacity. From their humble beginnings, continued increases in microprocessor capacity have rendered other forms of computers almost completely obsolete (see history of computing hardware), with one or more microprocessor as processing element in everything from the smallest embedded systems and handheld devices to the largest mainframes and supercomputers.
Since the early 1970s, the increase in capacity of microprocessors has been known to generally follow Moore's Law, which suggests that the complexity of an integrated circuit, with respect to minimum component cost, doubles every 18 months. In the late 1990s, heat generation (TDP), due to current leakage and other factors, emerged as a leading developmental constraint.
Computer processors were for a long period constructed out of small and medium-scale ICs containing the equivalent of a few to a few hundred transistors. The integration of the whole CPU onto a single VLSI chip therefore greatly reduced the cost of processing capacity. From their humble beginnings, continued increases in microprocessor capacity have rendered other forms of computers almost completely obsolete (see history of computing hardware), with one or more microprocessor as processing element in everything from the smallest embedded systems and handheld devices to the largest mainframes and supercomputers.
Since the early 1970s, the increase in capacity of microprocessors has been known to generally follow Moore's Law, which suggests that the complexity of an integrated circuit, with respect to minimum component cost, doubles every 18 months. In the late 1990s, heat generation (TDP), due to current leakage and other factors, emerged as a leading developmental constraint.
motherboard
A motherboard is the central or primary printed circuit board (PCB) making up a complex electronic system, such as a modern computer or laptop. It is also known as a mainboard, baseboard, system board, planar board, or, on Apple computers, a logic board, and is sometimes abbreviated casually as mobo.
Most motherboards produced today are designed for so-called IBM-compatible computers, which held over 96% of the global personal computer market in 2005.Motherboards for IBM-compatible computers are specifically covered in the PC motherboard article.
A motherboard, like a backplane, provides the electrical connections by which the other components of the system communicate, but unlike a backplane also contains the central processing unit and other subsystems such as real time clock, and some peripheral interfaces.
A typical desktop computer is built with the microprocessor, main memory, and other essential components on the motherboard. Other components such as external storage, controllers for video display and sound, and peripheral devices are typically attached to the motherboard via edge connectors and cables, although in modern computers it is increasingly common to integrate these "peripherals" into the motherboard.
All of the basic circuitry and components required for a computer to function are onboard the motherboard or are connected with a cable. The most important component on a motherboard is the chipset. It often consists of two components or chips known as the Northbridge and Southbridge, though they may also be integrated into a single component. These chips determine, to an extent, the features and capabilities of the motherboard.
Most motherboards produced today are designed for so-called IBM-compatible computers, which held over 96% of the global personal computer market in 2005.Motherboards for IBM-compatible computers are specifically covered in the PC motherboard article.
A motherboard, like a backplane, provides the electrical connections by which the other components of the system communicate, but unlike a backplane also contains the central processing unit and other subsystems such as real time clock, and some peripheral interfaces.
A typical desktop computer is built with the microprocessor, main memory, and other essential components on the motherboard. Other components such as external storage, controllers for video display and sound, and peripheral devices are typically attached to the motherboard via edge connectors and cables, although in modern computers it is increasingly common to integrate these "peripherals" into the motherboard.
All of the basic circuitry and components required for a computer to function are onboard the motherboard or are connected with a cable. The most important component on a motherboard is the chipset. It often consists of two components or chips known as the Northbridge and Southbridge, though they may also be integrated into a single component. These chips determine, to an extent, the features and capabilities of the motherboard.
BIOS
BIOS in part refers to the firmware code run by a PC when first powered on, which is a type of boot loader. The primary function of the BIOS is to identify and initialize system component hardware (such as the video display card, hard disk, and floppy disk) and some other hardware devices. This is to prepare the machine into a known low capability state, so other software programs stored on various media can be loaded, executed, and given control of the PC. This process is known as booting, or booting up, which is short for bootstrapping. Among other classes of computers, the generic terms boot monitor, boot loader or boot ROM were commonly used. Some Sun and Macintosh PowerPC computers used Open Firmware for this purpose. There are a few alternatives for Legacy BIOS in the x86 world: Extensible Firmware Interface, Open Firmware (used on the OLPC XO-1) and coreboot.
The BIOSes of IBM PC class machines can also be said to be a coded program embedded on a chip that recognizes and controls various devices that make up x86 personal computers, and provides a small library of basic Input/Output functions that can be called to operate and control the peripherals such as the keyboard, primitive (800 x 600) display functions and so forth. Computers designed to run Windows ME or Windows 2000, or later, supersede this basic monitor functionality by taking over direct control of the interrupt table and replacing the monitor routines with faster and more robust low-level modules that, unlike the BIOS function set, are re-entrant. Various BIOS functions in ROM were left in control in earlier Windows versions, and the BIOS only comes into play today in the alternate shell CMD.exe, or if the machine is booted into a legacy DOS version.
The term first appeared in the CP/M operating system, describing the part of CP/M loaded during boot time that interfaced directly with the hardware (CP/M machines usually had a simple boot loader in ROM, and nothing else). Most versions of DOS have a file called "IBMBIO.COM" or "IO.SYS" that is analogous to the CP/M disk BIOS.
The BIOSes of IBM PC class machines can also be said to be a coded program embedded on a chip that recognizes and controls various devices that make up x86 personal computers, and provides a small library of basic Input/Output functions that can be called to operate and control the peripherals such as the keyboard, primitive (800 x 600) display functions and so forth. Computers designed to run Windows ME or Windows 2000, or later, supersede this basic monitor functionality by taking over direct control of the interrupt table and replacing the monitor routines with faster and more robust low-level modules that, unlike the BIOS function set, are re-entrant. Various BIOS functions in ROM were left in control in earlier Windows versions, and the BIOS only comes into play today in the alternate shell CMD.exe, or if the machine is booted into a legacy DOS version.
The term first appeared in the CP/M operating system, describing the part of CP/M loaded during boot time that interfaced directly with the hardware (CP/M machines usually had a simple boot loader in ROM, and nothing else). Most versions of DOS have a file called "IBMBIO.COM" or "IO.SYS" that is analogous to the CP/M disk BIOS.
chipset
A chipset is a group of integrated circuits, or chips, that are designed to work together, and are usually marketed as a single product.
Introduction to PC Components
Here you will learn computer hardware tutorials introduction, basic pc components, networking devices, ram, vga, monitor and printer etc. Computer hardware is the physical part of the computer including the digital circuits inside the computer as opposed to the software that carry out the computing instructions. The hardware of a computer is unlikely to change frequently unless due to the crash or for upgrading them. The devices that is capable of storing, executing system instructions and controlling other logical outputs.
Hardware comprises all of the physical part of the computer such as Monitor, CPU, motherboard, ram, CD-Rom, printer, scanner, hard disk, flash drive (AKA pen drive), processor, pci buses, floppy disk, power supply, VGA card, sound card, network interface card, peripherals, joystick, mouse, keyboard, foot pedal, computer fan, camera, headset and others.
On the other hard software is a logical part of a computer and is used to carry out the instructions, storing, executing and developing other software programs. A typical PC consists of a case or chassis in the desktop or tower case and these components.
Motherboard
• CPU
• Computer Fan
• RAM
• BIOS
• Digital Circuitry
• Computer Fan
• PCI Slots
PC Buses
• PCI
• USB
• Hyper-transport
• AGP
• ISA
• EISA
• VLB
Media
• CD-Rom
• DVD-Rom
• Combo box
• Joystick
• BD-Rom drive
Internal storage
• Hard disk (ATA & SATA)
• Data array controller
• Floppy disk
Other Peripheral Devices
• Mouse
• Modems
• Digital Camera
• Sound, Video Cards
• Printer
Output Devices
• Printer
• Scanner
• Monitor
• Speakers
• Headset
• Video output devices
CPU (Central Processing Unit): CPU or central processing unit relates to a specific or processor. The performance of the computer is determined by the CPU chip (processor speed) and the other computer circuitry. Currently, the Pentium chip (processor) is the most popular even though there are other chips available in the market today such as AMD, Motorola and others. The clocks speed becomes most important factor in determining the performance of a computer. The motherboard contains the hardware circuitry and connections that allow the different hardware components of the PC to interact and communicate with each other. Most computer software is being developed for the latest processors so it would be difficult to use the older systems.
Hard Disk Drives – Disk drive is the mechanism to run the disks. All disks need a drive to get the information, read it and put it back to the disks. Hard disk is used to store the data permanently. Often the terms disk and drive used to describe the same thing but it should be clear that a disk is a storage device.
Modem – A modem is used for the modulation and demodulation of the data that is transferred through the modem and the telephone lines. Modem translates the data from digital to analog from analog to digital. Because on the telephone lines data can travel in the form of the analog signals and in the computer data transmits in the form of digital signals. Modems are measured by the speed which is called baud rate. The typical baud rate is 56Kb.
Keyboard – The keyboard is used to type something or input information to the computer. There are different designs and models of the keyboards in the market. The most common layout of the keyboard is QWERTY layout. A standard keyboard has 101 keys and embedded keys.
Video cards-Video cards allow computer to display video, graphics and animation. Some video cards allow computers to display television. A video card with a digital video camera allows users to produce live video. A high speed broadband internet connection is required to watch the videos on net.
Network cards: Network interface cards allow PCs to connect with each other and communicate. Every network computer is required to have a NIC card. NIC cards are required both in wired and wireless networking.
Cables: There are two broad types of cables internal cables, which are embedded on the mother board circuit that performs the communication between the devices and CPU. The other types of the cables are the network cables like coaxial cable, CAT 5, Ethernet cables. These cables are used for the communication purposes between the devices or computers.
Memory – Memory is the one of the important piece of the hardware. Sometimes memory chip memory is confused with the hard disk memory. Sometimes unallocated space of the hard disk is used as virtual memory also known as page file. This type of memory is a temporary memory and is used actual memory is less and requires some additional memory to perform a specific task.
RAM (Random Access Memory) RAM is a memory that is being used by the computer to store the information temporarily. For example when some work is performed on some applications that work is temporarily stored in the RAM. More RAM in the computer more faster computer works. Today at least requirement of a modern PC is 64 RAM. RAM is in the form of a chip and different vendors have developed the RAM of different capacities.
Mouse – Every modern computer requires a mouse for faster operations. Generally a mouse has two buttons left and right to perform different functions. One type of the mouse has a round ball under the bottom. Another type of the mouse use optical system to track the movement of the mouse.
Monitors – The monitor is used to display the information on the screen. All the activities of a computer, functions and tasks are seen on the computer screen and this is called outputting information. Monitors come in many sizes and shapes, monochrome or full colors. Today most computers use LCD screens. It is light weight and consumes less power as compared to the monitors.
Printers – The printer takes the information from the PC and transfers it to the paper of different sizes, which are placed in the printer device. There are three basic types of a printer such as dot matrix, inkjet and laser.
Scanners- Scanners allow you to transfer pictures and photographs to your computer. A scanner is used to scan the images and pictures. You can then send the image to someone, modify it or take a print out of it. With optical character recognition software you can convert printed documents into the text that you can use in the word processor.
Digital camera- You can take the digital photographs with the digital cameras. The images are stored on the memory chip of the digital cameras and you can transfer them to your computer with the USB drive.
Case – Case or casing covers the whole computer’s circuitry. There are two types of casings desktop and tower casing. There is room inside the casing to add or remove components. Cases come in many sizes like desktop, mini, midi and tower. There are some additional empty slots inside the cases such as IDE, USB, ASI, PCI and firewire slots.
Cards – Cards are the hardware components that are added to the computer to increase their functionalities and capabilities.
Sound cards produce the sound like music and voice. The older cars were 8, 16 and then 32 bits.
Color cards allow computers to produce colors. Initially there were 2, 4 and then 16 bits. The main types of the graphic cards are EGA, VGA and SGA. The 32 cards are the standard to display almost billions of the colors on the monitor.
Hardware comprises all of the physical part of the computer such as Monitor, CPU, motherboard, ram, CD-Rom, printer, scanner, hard disk, flash drive (AKA pen drive), processor, pci buses, floppy disk, power supply, VGA card, sound card, network interface card, peripherals, joystick, mouse, keyboard, foot pedal, computer fan, camera, headset and others.
On the other hard software is a logical part of a computer and is used to carry out the instructions, storing, executing and developing other software programs. A typical PC consists of a case or chassis in the desktop or tower case and these components.
Motherboard
• CPU
• Computer Fan
• RAM
• BIOS
• Digital Circuitry
• Computer Fan
• PCI Slots
PC Buses
• PCI
• USB
• Hyper-transport
• AGP
• ISA
• EISA
• VLB
Media
• CD-Rom
• DVD-Rom
• Combo box
• Joystick
• BD-Rom drive
Internal storage
• Hard disk (ATA & SATA)
• Data array controller
• Floppy disk
Other Peripheral Devices
• Mouse
• Modems
• Digital Camera
• Sound, Video Cards
• Printer
Output Devices
• Printer
• Scanner
• Monitor
• Speakers
• Headset
• Video output devices
CPU (Central Processing Unit): CPU or central processing unit relates to a specific or processor. The performance of the computer is determined by the CPU chip (processor speed) and the other computer circuitry. Currently, the Pentium chip (processor) is the most popular even though there are other chips available in the market today such as AMD, Motorola and others. The clocks speed becomes most important factor in determining the performance of a computer. The motherboard contains the hardware circuitry and connections that allow the different hardware components of the PC to interact and communicate with each other. Most computer software is being developed for the latest processors so it would be difficult to use the older systems.
Hard Disk Drives – Disk drive is the mechanism to run the disks. All disks need a drive to get the information, read it and put it back to the disks. Hard disk is used to store the data permanently. Often the terms disk and drive used to describe the same thing but it should be clear that a disk is a storage device.
Modem – A modem is used for the modulation and demodulation of the data that is transferred through the modem and the telephone lines. Modem translates the data from digital to analog from analog to digital. Because on the telephone lines data can travel in the form of the analog signals and in the computer data transmits in the form of digital signals. Modems are measured by the speed which is called baud rate. The typical baud rate is 56Kb.
Keyboard – The keyboard is used to type something or input information to the computer. There are different designs and models of the keyboards in the market. The most common layout of the keyboard is QWERTY layout. A standard keyboard has 101 keys and embedded keys.
Video cards-Video cards allow computer to display video, graphics and animation. Some video cards allow computers to display television. A video card with a digital video camera allows users to produce live video. A high speed broadband internet connection is required to watch the videos on net.
Network cards: Network interface cards allow PCs to connect with each other and communicate. Every network computer is required to have a NIC card. NIC cards are required both in wired and wireless networking.
Cables: There are two broad types of cables internal cables, which are embedded on the mother board circuit that performs the communication between the devices and CPU. The other types of the cables are the network cables like coaxial cable, CAT 5, Ethernet cables. These cables are used for the communication purposes between the devices or computers.
Memory – Memory is the one of the important piece of the hardware. Sometimes memory chip memory is confused with the hard disk memory. Sometimes unallocated space of the hard disk is used as virtual memory also known as page file. This type of memory is a temporary memory and is used actual memory is less and requires some additional memory to perform a specific task.
RAM (Random Access Memory) RAM is a memory that is being used by the computer to store the information temporarily. For example when some work is performed on some applications that work is temporarily stored in the RAM. More RAM in the computer more faster computer works. Today at least requirement of a modern PC is 64 RAM. RAM is in the form of a chip and different vendors have developed the RAM of different capacities.
Mouse – Every modern computer requires a mouse for faster operations. Generally a mouse has two buttons left and right to perform different functions. One type of the mouse has a round ball under the bottom. Another type of the mouse use optical system to track the movement of the mouse.
Monitors – The monitor is used to display the information on the screen. All the activities of a computer, functions and tasks are seen on the computer screen and this is called outputting information. Monitors come in many sizes and shapes, monochrome or full colors. Today most computers use LCD screens. It is light weight and consumes less power as compared to the monitors.
Printers – The printer takes the information from the PC and transfers it to the paper of different sizes, which are placed in the printer device. There are three basic types of a printer such as dot matrix, inkjet and laser.
Scanners- Scanners allow you to transfer pictures and photographs to your computer. A scanner is used to scan the images and pictures. You can then send the image to someone, modify it or take a print out of it. With optical character recognition software you can convert printed documents into the text that you can use in the word processor.
Digital camera- You can take the digital photographs with the digital cameras. The images are stored on the memory chip of the digital cameras and you can transfer them to your computer with the USB drive.
Case – Case or casing covers the whole computer’s circuitry. There are two types of casings desktop and tower casing. There is room inside the casing to add or remove components. Cases come in many sizes like desktop, mini, midi and tower. There are some additional empty slots inside the cases such as IDE, USB, ASI, PCI and firewire slots.
Cards – Cards are the hardware components that are added to the computer to increase their functionalities and capabilities.
Sound cards produce the sound like music and voice. The older cars were 8, 16 and then 32 bits.
Color cards allow computers to produce colors. Initially there were 2, 4 and then 16 bits. The main types of the graphic cards are EGA, VGA and SGA. The 32 cards are the standard to display almost billions of the colors on the monitor.
How to Configure a Network
In this section you will learn how to configure a network, peer to peer, client server, workstation, server, basic data communication.
Peer to Peer network model
Before configuring a computer network, you have to decide that, which networking model you require. There are two main types of network models. Peer to peer and client-server network model. In the peer to peer network model you simply use the same Workgroup for all the computers and a unique name for each computer.
Additionally, you will have to give a unique IP address of the same class A, B, or C for all the computers in your network and its related subnet mask e.g if you decide to use class A IP address for your three computers in your Peer to Peer network then your IP address/Subnet mask settings can be as follows.
Computer Name IP Address Subnet Mask Workgroup
PC1 100.100.100.1 255.0.0.0 Officenetwork
PC2 100.100.100.2 255.0.0.0 Officenetwork
PC3 100.100.100.3 255.0.0.0 Officenetwor
Please note that the above example is for only illustration purpose so you can choose any IP address, computer name and workgroup name of your interest.
For doing this right click on My Computer and then click Properties then go to the Network Identification section and set these.
In a peer to peer network all computers acts as a client because there is not centralized server. Peer to peer network is used where not security is required in the network.
If a computer fails to work then all other computers work normally in peer to peer network.
Peer to Peer network model
Before configuring a computer network, you have to decide that, which networking model you require. There are two main types of network models. Peer to peer and client-server network model. In the peer to peer network model you simply use the same Workgroup for all the computers and a unique name for each computer.
Additionally, you will have to give a unique IP address of the same class A, B, or C for all the computers in your network and its related subnet mask e.g if you decide to use class A IP address for your three computers in your Peer to Peer network then your IP address/Subnet mask settings can be as follows.
Computer Name IP Address Subnet Mask Workgroup
PC1 100.100.100.1 255.0.0.0 Officenetwork
PC2 100.100.100.2 255.0.0.0 Officenetwork
PC3 100.100.100.3 255.0.0.0 Officenetwor
Please note that the above example is for only illustration purpose so you can choose any IP address, computer name and workgroup name of your interest.
For doing this right click on My Computer and then click Properties then go to the Network Identification section and set these.
In a peer to peer network all computers acts as a client because there is not centralized server. Peer to peer network is used where not security is required in the network.
If a computer fails to work then all other computers work normally in peer to peer network.
Client/Server Network Model
Client/Server Network Model
In the client/server network model a computer plays a centralized role and is known as a server all other computers in the network are known as clients. All client computers access the server simultaneously for files, database, docs, spreadsheets, web pages and resources like hard diver, printer, fax modem, CD/DVD ROM and others. In other words, all the client computes depends on the server and if server fails to respond or crash then networking/communication between the server and the client computes stops.
If you want to configure a client-server network model then first prepare the server. Install Windows 2000 or Windows 2003 Server from the CD on the server computer and make a domain. You can create a domain by this command on the Run “DCPROMO”. You can give this command once you install the server successfully. After you give the DCPROMO command you will be asked for a unique domain name. All the client computers will use the same unique domain name for becoming the part of this domain. This command will install the active directory on the server, DNS and other required things. A step by step wizard will run and will guide you for the rest of the steps. Make sure that a network cable is plugged in the LAN card of the server when you run the DCPROMO.exe command.
When the Active directory is properly installed on the server, restart the server. You can create network users on the server computer and also name/label the network resources like computers/printers etc.
Once you install the server successfully now come to the client computers. Install Windows 2000 professional on your all client computers. Once you install the Windows 2000 professional on the clients the next step is to make this computer (client computer) a part of the network.
Configuration Steps
1. Choose a unique name for each client computer
2. Choose unique IP address for each computer and relevant.
3. Use the same domain name for all client PCs.
Network/System administrators are required to do these administrative tasks on the server and client computers. Any shared resources on the network either on the server or the clients can be access through the My Network Places in the Windows 2000 platform. There is another way to connect to the shared resources by giving this command in the run \\ComputerName\SharedDriveLetter.
Network configurations steps can be implemented by right clicking the My Computer>Properties>
For giving the IP address you will have to right click on the My Network places>properties>Local Area Connection>Properties>Internet Protocols (TCP/IP)>Properties and then give the IP address and subnet mask of the same range and class for all the computers in the network.
In the client/server network model a computer plays a centralized role and is known as a server all other computers in the network are known as clients. All client computers access the server simultaneously for files, database, docs, spreadsheets, web pages and resources like hard diver, printer, fax modem, CD/DVD ROM and others. In other words, all the client computes depends on the server and if server fails to respond or crash then networking/communication between the server and the client computes stops.
If you want to configure a client-server network model then first prepare the server. Install Windows 2000 or Windows 2003 Server from the CD on the server computer and make a domain. You can create a domain by this command on the Run “DCPROMO”. You can give this command once you install the server successfully. After you give the DCPROMO command you will be asked for a unique domain name. All the client computers will use the same unique domain name for becoming the part of this domain. This command will install the active directory on the server, DNS and other required things. A step by step wizard will run and will guide you for the rest of the steps. Make sure that a network cable is plugged in the LAN card of the server when you run the DCPROMO.exe command.
When the Active directory is properly installed on the server, restart the server. You can create network users on the server computer and also name/label the network resources like computers/printers etc.
Once you install the server successfully now come to the client computers. Install Windows 2000 professional on your all client computers. Once you install the Windows 2000 professional on the clients the next step is to make this computer (client computer) a part of the network.
Configuration Steps
1. Choose a unique name for each client computer
2. Choose unique IP address for each computer and relevant.
3. Use the same domain name for all client PCs.
Network/System administrators are required to do these administrative tasks on the server and client computers. Any shared resources on the network either on the server or the clients can be access through the My Network Places in the Windows 2000 platform. There is another way to connect to the shared resources by giving this command in the run \\ComputerName\SharedDriveLetter.
Network configurations steps can be implemented by right clicking the My Computer>Properties>
For giving the IP address you will have to right click on the My Network places>properties>Local Area Connection>Properties>Internet Protocols (TCP/IP)>Properties and then give the IP address and subnet mask of the same range and class for all the computers in the network.
Network Communication Devices
In this tutorial you will learn get the basic introduction to network devices such as nic adapters, routers, hubs, switches, modems, communication cables, lan/wan routers, gateway and other devices. A network is consists of a larger number of the communication devices. The simplest device that is used in the communication is the NIC adapter which is attached with the every computer in a network. If you want to build a LAN, you will need to have computers, hubs, switches, network adapters, UTP/STP cables, routers, internal/external modems, connectors, cable testers and clipping tool.
On the other hand if you need to build WAN, you will need to have routers, switches, dedicated or leased telephone lines such as ISDN lines, frame relay connection and other types of wan communication connections.
There are different communication mediums such as Ethernet cables, copper wire, coaxial cable, fiber optic cables, leased telephone lines and ever air is also a communication medium for the satellite communication. The most common networking medium is the LAN is the Ethernet cable (UTP/STP), which is used in the star topology. Hub is a central device of a network and every computer in a network is directly connected with the hub.
If the hub fails to work, the communication between the computers stops till the hub again starts working. Hub broadcasts the data to its every port, and then finding the destined computer, the data sent toward it. The switch is an advance form of the hub similar in functions but the advanced switches has a switching table in them. A advanced switch stores the MAC address of every attached computer and the data is only sent to the destined computer, unlike the hubs where data is sent to all ports. A router is a key device in the internet communication and wan communication system. A router has software called routing table and the source and destination addresses are stored in the routing table.
A router connects two logically and physically different networks. Router finds the IP address of the next hop (next router) and the data is sent toward it and so on. The well known routers developing companies are Cisco systems, Nortel, DLink and others. Every ISP, banks, corporate offices and multinational companies use routers for LAN and WAN communications and communication in their private networks. A gateway can be device or software in a network.
A gateway device connects the LAN with the internet. A gateway is directly exposed to the internet so it should be securely configured and in and out traffic should be monitored. If you are using DSL connection, you must need a DSL modem in your network. The telephone line is connected with the DSL modem and UTP/STP cable attaches your computer with the DSL modem. Modems are the devices that are used to modulate and demodulate the data. They convert analogue signals to digital and digital signals to analogue so that signals can travel on the telephone lines.
There are certain types of the cables that are used to connect two or more computers in a network. Fiber optic cable acts as a backbone between the ISPs and corporate offices. Data travels at the speed of light on the fiber optic cables. The cost and the installation cost of the fiber optic cable is very high but it is becoming very popular in the home networking and LANs also. In the local area networking, 10baseT/CAT5 cable is most commonly in use.
A server is a computer in network that provides services to the client computers such as logon requests processing, files access and storage, internet access, printing access and many other types of services. Servers are mostly equipped with extra hardware such as plenty of external memory (RAM), more data store capacity (hard disks), high processing speed and other features.
On the other hand if you need to build WAN, you will need to have routers, switches, dedicated or leased telephone lines such as ISDN lines, frame relay connection and other types of wan communication connections.
There are different communication mediums such as Ethernet cables, copper wire, coaxial cable, fiber optic cables, leased telephone lines and ever air is also a communication medium for the satellite communication. The most common networking medium is the LAN is the Ethernet cable (UTP/STP), which is used in the star topology. Hub is a central device of a network and every computer in a network is directly connected with the hub.
If the hub fails to work, the communication between the computers stops till the hub again starts working. Hub broadcasts the data to its every port, and then finding the destined computer, the data sent toward it. The switch is an advance form of the hub similar in functions but the advanced switches has a switching table in them. A advanced switch stores the MAC address of every attached computer and the data is only sent to the destined computer, unlike the hubs where data is sent to all ports. A router is a key device in the internet communication and wan communication system. A router has software called routing table and the source and destination addresses are stored in the routing table.
A router connects two logically and physically different networks. Router finds the IP address of the next hop (next router) and the data is sent toward it and so on. The well known routers developing companies are Cisco systems, Nortel, DLink and others. Every ISP, banks, corporate offices and multinational companies use routers for LAN and WAN communications and communication in their private networks. A gateway can be device or software in a network.
A gateway device connects the LAN with the internet. A gateway is directly exposed to the internet so it should be securely configured and in and out traffic should be monitored. If you are using DSL connection, you must need a DSL modem in your network. The telephone line is connected with the DSL modem and UTP/STP cable attaches your computer with the DSL modem. Modems are the devices that are used to modulate and demodulate the data. They convert analogue signals to digital and digital signals to analogue so that signals can travel on the telephone lines.
There are certain types of the cables that are used to connect two or more computers in a network. Fiber optic cable acts as a backbone between the ISPs and corporate offices. Data travels at the speed of light on the fiber optic cables. The cost and the installation cost of the fiber optic cable is very high but it is becoming very popular in the home networking and LANs also. In the local area networking, 10baseT/CAT5 cable is most commonly in use.
A server is a computer in network that provides services to the client computers such as logon requests processing, files access and storage, internet access, printing access and many other types of services. Servers are mostly equipped with extra hardware such as plenty of external memory (RAM), more data store capacity (hard disks), high processing speed and other features.
Computer Network Topology
Here you will learn network topology introduction, how computers get connected, bus, star, hub, hybrid, mesh, tree topologies and network physical design. In Computer Networking “topology” refers to the layout or design of the connected devices. Network Topologies can be physical or logical. In this section I will illustrate on the different types of the topologies.
1.Computer network topologies can be categorized in the following categories.
• bus
• star
• ring
• mesh
• Tree.
Hybrid networks are the complex networks, which can be built of two or more above mentioned topologies.
Bus Topology:
Bus topology uses a common backbone to connect all the network devices in a network in a linear shape. A single cable functions as the shared communication medium for all the devices attached with this cable with an interface connector. The device, which wants to communicate send the broadcast message to all the devices attached with the shared cable but only the intended recipient actually accepts and process that message.
Ethernet bus topologies are easy to install and don’t require much cabling and only a main shared cable is used for network communication. 10Base-2 and 10BaseT are two popular types of the Ethernet cables used in the Bus topology. Also, Bus network works with very limited devices. Performance issues are likely to occur in the Bus topology if more than 12-15 computers are added in a Bus Network. Additionally, if the Backbone cable fails then all network becomes useless and no communication fails among all the computers. Unlike in the Star topology in which if one computer is detached from a network then there is not effect on the other computers in a network.
Ring Topology:
In ring Network, every computer or devices has two adjacent neighbors for communication. In a ring network, all the communication messages travel in the same directory whether clockwise or anti clockwise. Any damage of the cable of any cable or device can result in the breakdown of the whole network. Ring topology now has become almost obsolete.
FDDI, SONET or Token Ring Technology can be used to implement Ring Technology. Ring topologies can be found in office, school or small buildings.
Star Topology:
In the computer networking world the most commonly used topology in LAN is the star topology. Star topologies can be implemented in home, offices or even in a building. All the computers in the star topologies are connected to central devices like hub, switch or router. The functionality of all these devices is different. I have covered the detail of each networking devices in the separate portion of my website. Computers in a network are usually connected with the hub, switch or router with the Unshielded Twisted Pair (UTP) or Shielded Twisted Pair Cables.
As compared to the bus topology, a star network requires more devices & cables to complete anetwork. The failure of each node or cable in a star network, won’t take down the entire network
as compared to the Bus topology.
However if the central connecting devices such as hub, switch or router fails due to any reason,then ultimately all the network can come down or collapse.
Tree Topology:
Tree topologies are comprised of the multiple star topologies on a bus. Tree topologies integrate multiple star topologies together onto a bus. Only the hub devices can connect directly with the tree bus and each Hub functions as a root of a tree of the network devices. This bus/star/hybrid combination supports future expandability of the computer networks, much better than a bus or star.
Mesh Topology:
Mesh topology work on the concept of routes. In Mesh topology, message sent to the destination can take any possible shortest, easiest route to reach its destination. In the previous topologies star and bus, messages are usually broadcasted to every computer, especially in bus topology. Similarly in the Ring topology message can travel in only one direction i.e clockwise or anticlockwise. Internet employs the Mesh topology and the message finds its route for its destination. Router works in find the routes for the messages and in reaching them to their destinations.The topology in which every devices connects to every other device is called a full Mesh topology unlike in the partial mesh in which every device is indirectly connected to the other devices.
Summary:
Topologies are the important part of the network design theory. A better network can be built if you have the knowledge of these topologies and if you know the difference between each topology. Similarly you should have the knowledge of each network device so that you can properly use them according to your network needs. A misconfigured network can result in a waste of time and energy as well as a lots of troubleshooting methods to resolve the issue. So thebasic understanding of the network topologies and network devices is a must to build a good network.
1.Computer network topologies can be categorized in the following categories.
• bus
• star
• ring
• mesh
• Tree.
Hybrid networks are the complex networks, which can be built of two or more above mentioned topologies.
Bus Topology:
Bus topology uses a common backbone to connect all the network devices in a network in a linear shape. A single cable functions as the shared communication medium for all the devices attached with this cable with an interface connector. The device, which wants to communicate send the broadcast message to all the devices attached with the shared cable but only the intended recipient actually accepts and process that message.
Ethernet bus topologies are easy to install and don’t require much cabling and only a main shared cable is used for network communication. 10Base-2 and 10BaseT are two popular types of the Ethernet cables used in the Bus topology. Also, Bus network works with very limited devices. Performance issues are likely to occur in the Bus topology if more than 12-15 computers are added in a Bus Network. Additionally, if the Backbone cable fails then all network becomes useless and no communication fails among all the computers. Unlike in the Star topology in which if one computer is detached from a network then there is not effect on the other computers in a network.
Ring Topology:
In ring Network, every computer or devices has two adjacent neighbors for communication. In a ring network, all the communication messages travel in the same directory whether clockwise or anti clockwise. Any damage of the cable of any cable or device can result in the breakdown of the whole network. Ring topology now has become almost obsolete.
FDDI, SONET or Token Ring Technology can be used to implement Ring Technology. Ring topologies can be found in office, school or small buildings.
Star Topology:
In the computer networking world the most commonly used topology in LAN is the star topology. Star topologies can be implemented in home, offices or even in a building. All the computers in the star topologies are connected to central devices like hub, switch or router. The functionality of all these devices is different. I have covered the detail of each networking devices in the separate portion of my website. Computers in a network are usually connected with the hub, switch or router with the Unshielded Twisted Pair (UTP) or Shielded Twisted Pair Cables.
As compared to the bus topology, a star network requires more devices & cables to complete anetwork. The failure of each node or cable in a star network, won’t take down the entire network
as compared to the Bus topology.
However if the central connecting devices such as hub, switch or router fails due to any reason,then ultimately all the network can come down or collapse.
Tree Topology:
Tree topologies are comprised of the multiple star topologies on a bus. Tree topologies integrate multiple star topologies together onto a bus. Only the hub devices can connect directly with the tree bus and each Hub functions as a root of a tree of the network devices. This bus/star/hybrid combination supports future expandability of the computer networks, much better than a bus or star.
Mesh Topology:
Mesh topology work on the concept of routes. In Mesh topology, message sent to the destination can take any possible shortest, easiest route to reach its destination. In the previous topologies star and bus, messages are usually broadcasted to every computer, especially in bus topology. Similarly in the Ring topology message can travel in only one direction i.e clockwise or anticlockwise. Internet employs the Mesh topology and the message finds its route for its destination. Router works in find the routes for the messages and in reaching them to their destinations.The topology in which every devices connects to every other device is called a full Mesh topology unlike in the partial mesh in which every device is indirectly connected to the other devices.
Summary:
Topologies are the important part of the network design theory. A better network can be built if you have the knowledge of these topologies and if you know the difference between each topology. Similarly you should have the knowledge of each network device so that you can properly use them according to your network needs. A misconfigured network can result in a waste of time and energy as well as a lots of troubleshooting methods to resolve the issue. So thebasic understanding of the network topologies and network devices is a must to build a good network.
Ethernet
In this section you will learn about the lan terminology, basic ethernet networking overview, a general introduction to LAN, introduction to IEEE, lan topologies, wan standards. You can also find these categories in this site such as network tutorials, computer networking guide, what is networking, tech study guides, topologies, what is data recovery, wireless communication, computer interview questions and network certification. The IEEE standards have been developed by the International Standards Organization (ISO). The Institute of Electrical and Electronic Engineers (IEEE) in 1985 produced a series of standards for the Local Area Networks, which are called IEEE 802 standards.
These standards have been accepted widely throughout the IT world. One of the IEEE 802 standards, the IEEE 802.3 is known as “Ethernet”. Ethernet is the most widely used LAN technology. Ethernet was developed by Xerox corporations in 1972 and it was the first LAN.
According to the ISO standards allows manufactures to produce the devices and equipments, which are guaranteed to operate anywhere.
The Ethernet in its simplest form uses a passive bus that operates at 10 Mbps. The bus is formed from the co-axial cable, which connects all the PCs in the LAN.
A single LAN may have 1024 attached computers, although in the real practice most LANS have fewer computers than this number. One or more segments of the co-axial cable are attached to end to end to create the Ethernet Cable Segment. Each segment is terminated by 50 ohm resistors.
In today’s IT world the reliable and timely access to the information has become vital. Today coworkers thousands of miles apart from each other can share data, voice, video etc with the fractions of seconds. Similarly a larger number of the coworkers can review the research data simultaneously. The Internet allows businesses to share information and resources with their customers.
Ethernet is a communication protocol that is embedded in software and hardware devices that intended. Ethernet has become the standard computer networking protocol with the help of the Xerox, Intel and Digital
A basic LAN consists of the following components.
• Two or more computers.
• Network Interface card or LAN Card in each PC.
• Ethernet cable (Cat5, UTP/SPT) cable to connect the two computers.
• A hub, switch or router to route or direct the network traffic.
• Software for the communication/computer networking.
A network interface card (NIC) is attached and installed in each PC and is assigned a unique address. An Ethernet cable is used to connect two computers; Ethernet cable has RJ45connectors at both ends. There can be two scenarios 1. Two computers can directly connect with each other or 2. Each computer is directly connected with the hub/switch and hence communication occurs in the network. The hub or switch acts as relay.
Computer Network can be wireless. Despite of using Ethernet cable for the communication, Wireless Network Interface cards use radio waves to communicate with the wireless switch or hub. A small antenna is used in the wireless NICs, switches and hubs. Although the wireless networks are more easy to use as compared to the cabled networks, but more configurations and extra care is required to setup and run a wireless network.
The alternate technologies to Ethernet are “Token Ring”, which is used in the Ring Topologiesnetworks. Token Ring is designed by the IBM and ATM. In ATM networking, devices are connected with each other over a very large distance (thus forms the WAN), and behaves like LANs.
Ethernet is a well established and widely used network standard for small to medium sized Ethernet networks as well as for other networks. Ethernet has been used over the 3 decades and forms a very excellent networking/communication environment.
Ethernet Terms
Ethernet follows a simple set of rules. To understand these rules its important to understand the
following terminology.
• Node – The devices that are attached to the segments are nodes.
• Frame – The nodes (computers or network devices) communicates in the form of short messages that are known as frames. The frames are chunks of information with variable size.
• Segment – A single shared medium is known as a Ethernet segment.
• Medium – The Ethernet devices are attached to a common medium. The frames of the data travel along with that medium. This medium can be coaxial cable. Today most commonly used communication mediums are UTP/STP cable, fiber optic cables.
Frames are analogous in human language. We have some rules for constructed the sentences. The
Ethernet protocol specifies a set of rules for constructing the frames. The frames length varies. Each frame must contain source and destination address for the identification of the recipient and the send of the message. The nodes can be uniquely and easily identified. Each Ethernet devices must have a single unique address.
Compute networking standards has brought a revolution in the network computing and it made the communication very easy and standarized. Now every computer and networking devices has to to follow the same standard to communicate with each other.
These standards have been accepted widely throughout the IT world. One of the IEEE 802 standards, the IEEE 802.3 is known as “Ethernet”. Ethernet is the most widely used LAN technology. Ethernet was developed by Xerox corporations in 1972 and it was the first LAN.
According to the ISO standards allows manufactures to produce the devices and equipments, which are guaranteed to operate anywhere.
The Ethernet in its simplest form uses a passive bus that operates at 10 Mbps. The bus is formed from the co-axial cable, which connects all the PCs in the LAN.
A single LAN may have 1024 attached computers, although in the real practice most LANS have fewer computers than this number. One or more segments of the co-axial cable are attached to end to end to create the Ethernet Cable Segment. Each segment is terminated by 50 ohm resistors.
In today’s IT world the reliable and timely access to the information has become vital. Today coworkers thousands of miles apart from each other can share data, voice, video etc with the fractions of seconds. Similarly a larger number of the coworkers can review the research data simultaneously. The Internet allows businesses to share information and resources with their customers.
Ethernet is a communication protocol that is embedded in software and hardware devices that intended. Ethernet has become the standard computer networking protocol with the help of the Xerox, Intel and Digital
A basic LAN consists of the following components.
• Two or more computers.
• Network Interface card or LAN Card in each PC.
• Ethernet cable (Cat5, UTP/SPT) cable to connect the two computers.
• A hub, switch or router to route or direct the network traffic.
• Software for the communication/computer networking.
A network interface card (NIC) is attached and installed in each PC and is assigned a unique address. An Ethernet cable is used to connect two computers; Ethernet cable has RJ45connectors at both ends. There can be two scenarios 1. Two computers can directly connect with each other or 2. Each computer is directly connected with the hub/switch and hence communication occurs in the network. The hub or switch acts as relay.
Computer Network can be wireless. Despite of using Ethernet cable for the communication, Wireless Network Interface cards use radio waves to communicate with the wireless switch or hub. A small antenna is used in the wireless NICs, switches and hubs. Although the wireless networks are more easy to use as compared to the cabled networks, but more configurations and extra care is required to setup and run a wireless network.
The alternate technologies to Ethernet are “Token Ring”, which is used in the Ring Topologiesnetworks. Token Ring is designed by the IBM and ATM. In ATM networking, devices are connected with each other over a very large distance (thus forms the WAN), and behaves like LANs.
Ethernet is a well established and widely used network standard for small to medium sized Ethernet networks as well as for other networks. Ethernet has been used over the 3 decades and forms a very excellent networking/communication environment.
Ethernet Terms
Ethernet follows a simple set of rules. To understand these rules its important to understand the
following terminology.
• Node – The devices that are attached to the segments are nodes.
• Frame – The nodes (computers or network devices) communicates in the form of short messages that are known as frames. The frames are chunks of information with variable size.
• Segment – A single shared medium is known as a Ethernet segment.
• Medium – The Ethernet devices are attached to a common medium. The frames of the data travel along with that medium. This medium can be coaxial cable. Today most commonly used communication mediums are UTP/STP cable, fiber optic cables.
Frames are analogous in human language. We have some rules for constructed the sentences. The
Ethernet protocol specifies a set of rules for constructing the frames. The frames length varies. Each frame must contain source and destination address for the identification of the recipient and the send of the message. The nodes can be uniquely and easily identified. Each Ethernet devices must have a single unique address.
Compute networking standards has brought a revolution in the network computing and it made the communication very easy and standarized. Now every computer and networking devices has to to follow the same standard to communicate with each other.
Configuring the Router
Configuring the Router
You will be able to learn the basic commands for configuring a router.
sh running-config - details the running configuration file (RAM)
sh startup-config - displays the configuration stored in NVRAM
setup - Will start the the automatic setup; the same as when you first boot the router
config t - use to execute configuration commands from the terminal
config mem - executes configuration commands stored in NVRAM; copies startup-config to running-config
config net - used to retrieve configuration info from a TFTP server
copy running-config startup-config - copies saved config in running config (RAM) to NVRAM or "write memory" for IOS under ver.11
copy startup-config running-config - copies from non-volatile (NVRAM) to current running config (RAM)
boot system flash - tells router which IOS file in flash to boot from
boot system tftp - tells router which IOS file on the tftp server to boot from
boot system rom - tell router to boot from ROM at next boot
copy flash tftp - Copies flash to tftp server
copy tftp flash - Restores flash from tftp server
copy run tftp - Copies the current running-config to tftp server
copy tftp run - Restores the running-config from tftp server
General Commands
Here is a list of the general commands. These are the basic level commands and most commonly used
no shutdown - (enables the interface)
reload - restarts the router
sh ver - Cisco IOS version, uptime of router, how the router started, where system was loaded from, the interfaces the POST found, and the configuration register
sh clock - shows date and time on router
sh history - shows the history of your commands
sh debug - shows all debugging that is currently enabled
no debug all - turns off all debugging
sh users - shows users connected to router
sh protocols - shows which protocols are configured
banner motd # Your customized message here # - Set/change banner
hostname - use to configure the hostname of the router
clear counters - clear interface counters
Privileged Mode commands of a router
Learn how to work in the privileged mode of a router.
enable - get to privileged mode
disable - get to user mode
enable password - sets privileged mode password
enable secret - sets encrypted privileged mode password
Setting Passwords on router
Here you will be able to learn how to set the password on a router.
enable secret - set encrypted password for privileged access
enable password - set password for privileged access (used when there is no enable secret and when using older software)
Setting the password for console access:
(config)#line console 0
(config-line)#login
(config-line)#password
Set password for virtual terminal (telnet) access (password must be set to access router through telnet):
(config)#line vty 0 4
(config-line)#login
(config-line)#password
Set password for auxiliary (modem) access:
(config)#line aux 0
(config-line)#login
(config-line)#password
Router Processes & Statistics
By these command you can see the statistics and different processes of the router.
sh processes - shows active processes running on router
sh process cpu - shows cpu statistics
sh mem - shows memory statistics
sh flash - describes the flash memory and displays the size of files and the amount of free flash memory
sh buffers - displays statistics for router buffer pools; shows the size of the Small, Middle, Big, Very Big, Large and Huge Buffers
sh stacks - shows reason for last reboot, monitors the stack use of processes and interrupts routines
IP Commands
Here is a list of the IP Commands
Configure IP on an interface:
int serial 0
ip address 157.89.1.3 255.255.0.0
int eth 0
ip address 2008.1.1.4 255.255.255.0
Other IP Commands:
sh ip route - view ip routing table
ip route [administrative_distance] - configure a static IP route
ip route 0.0.0.0 0.0.0.0 - sets default gateway
ip classless - use with static routing to allow packets destined for unrecognized subnets to use the best possible route
sh arp - view arp cache; shows MAC address of connected routers
ip address 2.2.2.2 255.255.255.0 secondary - configure a 2nd ip address on an interface
sh ip protocol
CDP Commands (Cisco Discovery Protocol uses layer 2 multicast over a SNAP-capable link to send data):
sh cdp neighbor - shows directly connected neighbors
sh cdp int - shows which interfaces are running CDP
sh cdp int eth 0/0 - show CDP info for specific interface
sh cdp entry - shows CDP neighbor detail
cdp timer 120 - change how often CDP info is sent (default cdp timer is 60)
cp holdtime 240 - how long to wait before removing a CDP neighbor (default CDP holdtime is 180)
sh cdp run - shows if CDP turned on
no cdp run - turns off CDP for entire router (global config)
no cdp enable - turns off CDP on specific interface
IPX Commands
Enable IPX on router:
ipx routing
Configure IPX + IPX-RIP on an int:
int ser 0
ipx network 4A
Other Commands:
sh ipx route - shows IPX routing table
sh ipx int e0 - shows ipx address on int
sh ipx servers - shows SAP table
sh ipx traffic - view traffic statistics
debug ipx routing activity - debugs IPS RIP packets
debug ipx sap - debugs SAP packets
You will be able to learn the basic commands for configuring a router.
sh running-config - details the running configuration file (RAM)
sh startup-config - displays the configuration stored in NVRAM
setup - Will start the the automatic setup; the same as when you first boot the router
config t - use to execute configuration commands from the terminal
config mem - executes configuration commands stored in NVRAM; copies startup-config to running-config
config net - used to retrieve configuration info from a TFTP server
copy running-config startup-config - copies saved config in running config (RAM) to NVRAM or "write memory" for IOS under ver.11
copy startup-config running-config - copies from non-volatile (NVRAM) to current running config (RAM)
boot system flash - tells router which IOS file in flash to boot from
boot system tftp - tells router which IOS file on the tftp server to boot from
boot system rom - tell router to boot from ROM at next boot
copy flash tftp - Copies flash to tftp server
copy tftp flash - Restores flash from tftp server
copy run tftp - Copies the current running-config to tftp server
copy tftp run - Restores the running-config from tftp server
General Commands
Here is a list of the general commands. These are the basic level commands and most commonly used
no shutdown - (enables the interface)
reload - restarts the router
sh ver - Cisco IOS version, uptime of router, how the router started, where system was loaded from, the interfaces the POST found, and the configuration register
sh clock - shows date and time on router
sh history - shows the history of your commands
sh debug - shows all debugging that is currently enabled
no debug all - turns off all debugging
sh users - shows users connected to router
sh protocols - shows which protocols are configured
banner motd # Your customized message here # - Set/change banner
hostname - use to configure the hostname of the router
clear counters - clear interface counters
Privileged Mode commands of a router
Learn how to work in the privileged mode of a router.
enable - get to privileged mode
disable - get to user mode
enable password - sets privileged mode password
enable secret - sets encrypted privileged mode password
Setting Passwords on router
Here you will be able to learn how to set the password on a router.
enable secret - set encrypted password for privileged access
enable password - set password for privileged access (used when there is no enable secret and when using older software)
Setting the password for console access:
(config)#line console 0
(config-line)#login
(config-line)#password
Set password for virtual terminal (telnet) access (password must be set to access router through telnet):
(config)#line vty 0 4
(config-line)#login
(config-line)#password
Set password for auxiliary (modem) access:
(config)#line aux 0
(config-line)#login
(config-line)#password
Router Processes & Statistics
By these command you can see the statistics and different processes of the router.
sh processes - shows active processes running on router
sh process cpu - shows cpu statistics
sh mem - shows memory statistics
sh flash - describes the flash memory and displays the size of files and the amount of free flash memory
sh buffers - displays statistics for router buffer pools; shows the size of the Small, Middle, Big, Very Big, Large and Huge Buffers
sh stacks - shows reason for last reboot, monitors the stack use of processes and interrupts routines
IP Commands
Here is a list of the IP Commands
Configure IP on an interface:
int serial 0
ip address 157.89.1.3 255.255.0.0
int eth 0
ip address 2008.1.1.4 255.255.255.0
Other IP Commands:
sh ip route - view ip routing table
ip route [administrative_distance] - configure a static IP route
ip route 0.0.0.0 0.0.0.0 - sets default gateway
ip classless - use with static routing to allow packets destined for unrecognized subnets to use the best possible route
sh arp - view arp cache; shows MAC address of connected routers
ip address 2.2.2.2 255.255.255.0 secondary - configure a 2nd ip address on an interface
sh ip protocol
CDP Commands (Cisco Discovery Protocol uses layer 2 multicast over a SNAP-capable link to send data):
sh cdp neighbor - shows directly connected neighbors
sh cdp int - shows which interfaces are running CDP
sh cdp int eth 0/0 - show CDP info for specific interface
sh cdp entry - shows CDP neighbor detail
cdp timer 120 - change how often CDP info is sent (default cdp timer is 60)
cp holdtime 240 - how long to wait before removing a CDP neighbor (default CDP holdtime is 180)
sh cdp run - shows if CDP turned on
no cdp run - turns off CDP for entire router (global config)
no cdp enable - turns off CDP on specific interface
IPX Commands
Enable IPX on router:
ipx routing
Configure IPX + IPX-RIP on an int:
int ser 0
ipx network 4A
Other Commands:
sh ipx route - shows IPX routing table
sh ipx int e0 - shows ipx address on int
sh ipx servers - shows SAP table
sh ipx traffic - view traffic statistics
debug ipx routing activity - debugs IPS RIP packets
debug ipx sap - debugs SAP packets
Routing Protocols
RIP, IGPR and OSPF are the routing protocols and here is a list of the commands for the working on the routing protocols.
Configure RIP:
router rip
network 157.89.0.0
network 208.1.1.0
Other RIP Commands:
debug ip rip - view RIP debugging info
Configure IGRP:
router IGRP 200
network 157.89.0.0
network 208.1.1.0
Other IGRP Commands:
debug ip igrp events - view IGRP debugging info
debug ip igrp transactions - view IGRP debugging info
Access Lists
Here is a list of the Access list command of a router.
sh ip int ser 0 - use to view which IP access lists are applies to which int
sh ipx int ser 0 - use to view which IPX access lists are applies to which int
sh appletalk int ser 0 - use to view which AppleTalk access lists are applies to which int
View access lists:
sh access-lists
sh ip access-lists
sh ipx access-lists
sh appletalk access-lists
Apply standard IP access list to int eth 0:
access-list 1 deny 200.1.1.0 0.0.0.255
access-list 1 permit any
int eth 0
ip access-group 1 in
Apply Extended IP access list to int eth 0:
access-list 100 deny tcp host 1.1.1.1 host 2.2.2.2 eq 23
access-list 100 deny tcp 3.3.3.0 0.0.0.255 any eq 80
int eth 0
ip access-group 100 out
Apply Standard IPX access list to int eth 0:
access-list 800 deny 7a 8000
access-list 800 permit -1
int eth 0
ipx access-group 800 out
Apply Standard IPX access list to int eth 0:
access-list 900 deny sap any 3378 -1
access-list 900 permit sap any all -1
int eth 0
ipx access-group 900 out
Configure RIP:
router rip
network 157.89.0.0
network 208.1.1.0
Other RIP Commands:
debug ip rip - view RIP debugging info
Configure IGRP:
router IGRP 200
network 157.89.0.0
network 208.1.1.0
Other IGRP Commands:
debug ip igrp events - view IGRP debugging info
debug ip igrp transactions - view IGRP debugging info
Access Lists
Here is a list of the Access list command of a router.
sh ip int ser 0 - use to view which IP access lists are applies to which int
sh ipx int ser 0 - use to view which IPX access lists are applies to which int
sh appletalk int ser 0 - use to view which AppleTalk access lists are applies to which int
View access lists:
sh access-lists
sh ip access-lists
sh ipx access-lists
sh appletalk access-lists
Apply standard IP access list to int eth 0:
access-list 1 deny 200.1.1.0 0.0.0.255
access-list 1 permit any
int eth 0
ip access-group 1 in
Apply Extended IP access list to int eth 0:
access-list 100 deny tcp host 1.1.1.1 host 2.2.2.2 eq 23
access-list 100 deny tcp 3.3.3.0 0.0.0.255 any eq 80
int eth 0
ip access-group 100 out
Apply Standard IPX access list to int eth 0:
access-list 800 deny 7a 8000
access-list 800 permit -1
int eth 0
ipx access-group 800 out
Apply Standard IPX access list to int eth 0:
access-list 900 deny sap any 3378 -1
access-list 900 permit sap any all -1
int eth 0
ipx access-group 900 out
WAN Configurations Commands
Networking over WAN is the main functionality of a router. The most common use of a router is for the WAN connectivity. Here is a list of the commands for the different methods of the WAN connectivity.
PPP Configuration
Point to point protocol is a method for the WAN connectivity and you will find here some commands of PPP.
encapsulation pppppp authentication
ppp chap hostname
ppp pap sent-username
sh int ser 0 - use to view encapsulation on the interface
Frame-Relay Configuration
One of the methods for the WAN connectivity is the Frame Relay. Find here some basic commands for the WAN connectivity through Frame Relay.
encapsulation frame-relay ietf - use IETF when setting up a frame-relay network between a Ciscorouter and a non-Cisco router
frame-relay lmi-type ansi - LMI types are Cisco, ANSI, Q933A; Cisco is the default; LMI type is auto-sensed in IOS v11.2 and up
frame-relay map ip 3.3.3.3 100 broadcast - if inverse ARP won't work, map Other IP to Your DLCI # (local)
keep alive 10 - use to set keep alive
sh int ser 0 - use to show DLCI, LMI, and encapsulation info
sh frame-relay pvc - shows the configured DLCI's; shows PVC traffic stats
sh frame-relay map - shows route mapssh frame-relay lmi - shows LMI info
Miscellaneous Commands
In the last but not least here is a list of the some miscellaneous and useful commands
sh controller t1 - shows status of T1 lines
sh controller serial 1 - use to determine if DCE or DTE device
(config-if)#clock rate 6400 - set clock on DCE (bits per second)
(config-if)#bandwidth 64 - set bandwidth (kilobits)
PPP Configuration
Point to point protocol is a method for the WAN connectivity and you will find here some commands of PPP.
encapsulation pppppp authentication
ppp chap hostname
ppp pap sent-username
sh int ser 0 - use to view encapsulation on the interface
Frame-Relay Configuration
One of the methods for the WAN connectivity is the Frame Relay. Find here some basic commands for the WAN connectivity through Frame Relay.
encapsulation frame-relay ietf - use IETF when setting up a frame-relay network between a Ciscorouter and a non-Cisco router
frame-relay lmi-type ansi - LMI types are Cisco, ANSI, Q933A; Cisco is the default; LMI type is auto-sensed in IOS v11.2 and up
frame-relay map ip 3.3.3.3 100 broadcast - if inverse ARP won't work, map Other IP to Your DLCI # (local)
keep alive 10 - use to set keep alive
sh int ser 0 - use to show DLCI, LMI, and encapsulation info
sh frame-relay pvc - shows the configured DLCI's; shows PVC traffic stats
sh frame-relay map - shows route mapssh frame-relay lmi - shows LMI info
Miscellaneous Commands
In the last but not least here is a list of the some miscellaneous and useful commands
sh controller t1 - shows status of T1 lines
sh controller serial 1 - use to determine if DCE or DTE device
(config-if)#clock rate 6400 - set clock on DCE (bits per second)
(config-if)#bandwidth 64 - set bandwidth (kilobits)
Network Security
You will find here network security overview, networking solutions, anti virus, anti spamming tips, trojan horses, malware, adware. Security is an essential element in maintaining any network. The main focus of the IT managers and computer network administrators is to secure the computer networks.
Users are happy to get the data on time and without any problem. The use of the authentication and biometrics can improve the security to some extend. Computer Security in the data communication cannot be compromised. Hackers’ can exploit the sensitive and financial and corporate data. There can be many threats to a computer network and it’s the responsibility of a computer network administrator to keep the computer network secure from these threats.
IT Administrator should know about all the possible security attacks and also know their solutions. IT Administrator should look for the viruses from the Internet, Malware, Adware, Trojan horses, E-mail attachments, Floppy disk, CD or any infected computer that is attached to the network. Spyware and network intrusions are specifically designed to get the secret information from their target companies, which can do harm for the company. Everyday security threats are refined as hackers designed new security threats.
The main cause of a security threat in the small companies is the misuse of the internet without proper anti virus, anti spyware installed on the every PC of the company’s network. For example if a company’s employees browse an inappropriate website, sends or receives the infected data, leaks company’s secret information, then there are greater chances for a possible virus/malware attack.
In my opinion, the end user’s education on the security threats, preventions and precautionary measures are must. They should be trained about the possible and easy virus attacks from the internet if they browse the inappropriate sites.
Another important thing is the insider’s attack e.g if the company’s employee leave the company for any reason, then its very important that all the computer and other company’s sensitive assets access should be revoked by him immediately. I have personally seen a situation, when a company’s network administrator was dismissed and he access the company’s server by VPN and send harmful viruses to the server and the entire computer network, and it was impossible for the IT manager to control all the security attacks in one time.
It’s the responsibility to keep a closer eye on the new employee’s activities, their access to the sensitive data, and computers servers. IT managers should bring it in the knowledge of the employees that any change in their computer will be logged. So that nobody can even try to do anything that is not permitted.
There are six basic security steps for the Windows platforms. If a network administrator can follow these steps then he/she can save the computerss from all the possible security threats and virus or malware attacks.
First the IT managers should divide the computer network into the segments. They should filter the access to the internet with the help of a firewall by blocking TCP port 1433 and TCP port 1434. Internet access from the outside should be allowed to the SQL systems. All the unwanted ports should be blocked and only the required ports should be open for access.
Second, moderate the affect of the spoofed ports. The port 80 is the most commonly used port.
Third, as network administrator you should install the current patches to you’re your server computer and client’s up to date. Patches can prevent the systems from the known vulnerabilities. Latest patches can be downloaded from the Windows website. You can also configure to automatically update. Also third party patches products are also available that can be tested and installed. Additionally, by strengthening the user authentication process can be very helpful for security purposes.. You can use password security and other technological methods for the authenticate purpose.
Fourth, you can limit the number of the network administrators it can also be helpful for security a computer network. Admin rights should not be given to the local PC, until and unless it is the requirements for the applications that are installed on the local PCs.
Fifth, protect computers against the known attacks. Don’t disable any Windows known service such as clipbook, Telnet etc. Set the powerful permission the shared network resources.
Last, you can configure the security policies. Implement the security policies on your network.
Security measures and methods have expenses with their purchases. Deployment, maintenance and the implementations of these methods can increase the security cost. Some other things which a IT administrator or a IT manager should keep in mind are the education of the employees about the security, use of the encryption and digital right management software, block the unwanted emails and audit security on the regular basis. Network security methods should be used and implemented in order to prevent your computer network from the unauthorized access.
In this article You have discovered the Computer Network Security Overview More topics to come are Cisco Labs, Routing, IP addressing & Free IT resources.
Users are happy to get the data on time and without any problem. The use of the authentication and biometrics can improve the security to some extend. Computer Security in the data communication cannot be compromised. Hackers’ can exploit the sensitive and financial and corporate data. There can be many threats to a computer network and it’s the responsibility of a computer network administrator to keep the computer network secure from these threats.
IT Administrator should know about all the possible security attacks and also know their solutions. IT Administrator should look for the viruses from the Internet, Malware, Adware, Trojan horses, E-mail attachments, Floppy disk, CD or any infected computer that is attached to the network. Spyware and network intrusions are specifically designed to get the secret information from their target companies, which can do harm for the company. Everyday security threats are refined as hackers designed new security threats.
The main cause of a security threat in the small companies is the misuse of the internet without proper anti virus, anti spyware installed on the every PC of the company’s network. For example if a company’s employees browse an inappropriate website, sends or receives the infected data, leaks company’s secret information, then there are greater chances for a possible virus/malware attack.
In my opinion, the end user’s education on the security threats, preventions and precautionary measures are must. They should be trained about the possible and easy virus attacks from the internet if they browse the inappropriate sites.
Another important thing is the insider’s attack e.g if the company’s employee leave the company for any reason, then its very important that all the computer and other company’s sensitive assets access should be revoked by him immediately. I have personally seen a situation, when a company’s network administrator was dismissed and he access the company’s server by VPN and send harmful viruses to the server and the entire computer network, and it was impossible for the IT manager to control all the security attacks in one time.
It’s the responsibility to keep a closer eye on the new employee’s activities, their access to the sensitive data, and computers servers. IT managers should bring it in the knowledge of the employees that any change in their computer will be logged. So that nobody can even try to do anything that is not permitted.
There are six basic security steps for the Windows platforms. If a network administrator can follow these steps then he/she can save the computerss from all the possible security threats and virus or malware attacks.
First the IT managers should divide the computer network into the segments. They should filter the access to the internet with the help of a firewall by blocking TCP port 1433 and TCP port 1434. Internet access from the outside should be allowed to the SQL systems. All the unwanted ports should be blocked and only the required ports should be open for access.
Second, moderate the affect of the spoofed ports. The port 80 is the most commonly used port.
Third, as network administrator you should install the current patches to you’re your server computer and client’s up to date. Patches can prevent the systems from the known vulnerabilities. Latest patches can be downloaded from the Windows website. You can also configure to automatically update. Also third party patches products are also available that can be tested and installed. Additionally, by strengthening the user authentication process can be very helpful for security purposes.. You can use password security and other technological methods for the authenticate purpose.
Fourth, you can limit the number of the network administrators it can also be helpful for security a computer network. Admin rights should not be given to the local PC, until and unless it is the requirements for the applications that are installed on the local PCs.
Fifth, protect computers against the known attacks. Don’t disable any Windows known service such as clipbook, Telnet etc. Set the powerful permission the shared network resources.
Last, you can configure the security policies. Implement the security policies on your network.
Security measures and methods have expenses with their purchases. Deployment, maintenance and the implementations of these methods can increase the security cost. Some other things which a IT administrator or a IT manager should keep in mind are the education of the employees about the security, use of the encryption and digital right management software, block the unwanted emails and audit security on the regular basis. Network security methods should be used and implemented in order to prevent your computer network from the unauthorized access.
In this article You have discovered the Computer Network Security Overview More topics to come are Cisco Labs, Routing, IP addressing & Free IT resources.
Home Computer Networking-Basic Setup
Here you will get the basic Introduction Home Computer Networking-Basic Setup, wireless access point, lan troubleshooting, lan connectivity, dsl modem, gateway device, vpn and wi-fi. Computer Networks exists for more than 30 years and only recently they have become more popular at home both in forms of wired and wireless networking. Now many computer literate people from all over the world wish to have a computer network at home. There are many advantages and usage of a network, which we have described in the other sections of this website.
Millions of people have adopted the home network and now they are looking for the more advanced technology in the home networking and that is “wireless home networking”.
We will discuss the various basic and advance aspects of the home networking considering that no prior knowledge of the network technology. We will briefly explain the setup, troubleshooting, installation, network devices used and other aspects of the home networking.
Today in the age of Information technology, it’s not difficult for someone to have more than one PCat home.
If I apply this situation to you (that you have more than one computer at your home) then most probably you would wish to have access on the data and resources like, hard disk, printer, modem of the other PC and you can even access the broadband Internet like DSL or cable modem and you can also play a multi-player network game. All this is possible by just connecting and configuring the two computers at your home. There are several ways to do the home networking but all it depends on budget, security needs and nature of your work
Your cable/DSL modem plugs straight into the computer. The computer is exposed to the public Internet (indicated by the color red). There is no connection for more than one computer. You only have one IP address from your ISP.
If you have a broadband Internet connection at your home like DSL or cable net then you can share your internet connection with more than one PC at your home by installing the network card in each PC and configuring the hub/switch or a router.
If you have two PCs at your home and you want to share your internet connection with the other computer then you can simply share the internet connection by following these steps.
1. Connect two PCs with CAT5 cable and make it a cross over cable.
2. After connecting both the PCs, assign a different IP addresses by going in the properties of the LAN card like 100.100.100.1 and 100.100.100.2 or you can assign any other IP address. (Please note that these IP addresses that you use for your home networking are the private IP addresses and they have nothing to do with the IP address that are used on the internet (public IP addresses).
3. After assigning the IP addresses install software on the computer one, which will be used for sharing the Internet connection and this will be called proxy software (and your computer one will act as a Proxy Server). The more common proxy software is Wingate, Win Proxy and Internet connection sharing (ICS). ICS is by default installed in Windows operating systems and can be configured separately.
Internet access by using a hardware router/gateway/firewall device
In this situation, you have to install a hardware router, which will be act as a gateway. Your router will be connected with the public IP address, which will be assigned to your by your ISP and hub/switch will be attached to the router. All the other PCs in your home or small network will be directly attached to that hub or switch.
Millions of people have adopted the home network and now they are looking for the more advanced technology in the home networking and that is “wireless home networking”.
We will discuss the various basic and advance aspects of the home networking considering that no prior knowledge of the network technology. We will briefly explain the setup, troubleshooting, installation, network devices used and other aspects of the home networking.
Today in the age of Information technology, it’s not difficult for someone to have more than one PCat home.
If I apply this situation to you (that you have more than one computer at your home) then most probably you would wish to have access on the data and resources like, hard disk, printer, modem of the other PC and you can even access the broadband Internet like DSL or cable modem and you can also play a multi-player network game. All this is possible by just connecting and configuring the two computers at your home. There are several ways to do the home networking but all it depends on budget, security needs and nature of your work
Your cable/DSL modem plugs straight into the computer. The computer is exposed to the public Internet (indicated by the color red). There is no connection for more than one computer. You only have one IP address from your ISP.
If you have a broadband Internet connection at your home like DSL or cable net then you can share your internet connection with more than one PC at your home by installing the network card in each PC and configuring the hub/switch or a router.
If you have two PCs at your home and you want to share your internet connection with the other computer then you can simply share the internet connection by following these steps.
1. Connect two PCs with CAT5 cable and make it a cross over cable.
2. After connecting both the PCs, assign a different IP addresses by going in the properties of the LAN card like 100.100.100.1 and 100.100.100.2 or you can assign any other IP address. (Please note that these IP addresses that you use for your home networking are the private IP addresses and they have nothing to do with the IP address that are used on the internet (public IP addresses).
3. After assigning the IP addresses install software on the computer one, which will be used for sharing the Internet connection and this will be called proxy software (and your computer one will act as a Proxy Server). The more common proxy software is Wingate, Win Proxy and Internet connection sharing (ICS). ICS is by default installed in Windows operating systems and can be configured separately.
Internet access by using a hardware router/gateway/firewall device
In this situation, you have to install a hardware router, which will be act as a gateway. Your router will be connected with the public IP address, which will be assigned to your by your ISP and hub/switch will be attached to the router. All the other PCs in your home or small network will be directly attached to that hub or switch.
setup the Gateway Device
Gateway device – There are different gateway devices available from different companies like
dlink.com, linksys.com, netgear.com and Cisco systems. Each device has difference setup configurations but the basic purpose of all these devices is the same.
The Gateways have a number of common features and functions such as NAT (Network Address Translation) that translate your public IP address into the private IP address on your network, DHCP server, PPP. Before buying any gateway device, make sure gateway device must have all these features.
Some advance gateways have the following features.
• wireless access point
• VPN
• print server
• DMZ (make one PC available to the Internet but still protect it through the firewall
• multi-port
• Content filtering
Most advance gateways comes with integrated hubs or switches and if your gateway don’t have the functionality of a hub/switch then you will have to buy a hub/switch for your home network. Before buying a hub/switch you should consider the two main things 1. it should support dual
speed i.e 10mbps and 100mbps and 2. it should have maximum available ports.
Cat5 cable – For setting up a home network, you will need a several pieces of the CAT5 Ethernet cables. These cables can be used in the different scenarios like for connecting the two PCs (if you have a two computer network) and if you have more than two computers then each computer will be directly connected with the hub/switch or gateway device. The most commonly used cable for computer networking is Cat5 cable.
Once you have all the required things like cables, hub/switch, LAN cards etc. then install a network card in each PC. You must make sure that each card is properly installed and is not showing any signs of conflict with the other network devices.
How to connect two computers wirelessly
In some recent years, wireless networking solutions have became very popular. There are several wireless technologies exists to support the wireless networking.
These technologies include Wi-Fi, Bluetooth and infrared.
Wi-Fi connections can reach at a greater distance than the other wireless solutions that are mentioned above. Many new PCs and Laptops now have the built-in capability of the Wi-Fi. Wi-Fi can be used with or without network fixture. In the two computers Wi-Fi networking minus a fixture also called ad-hoc Wi-Fi.
Bluetooth technology supports high speed wireless connectivity and communication between the two computers without the need of a network fixture. Bluetooth is commonly used when networking a computer with the consumer’s cell phone or handheld device. Bluetooth works well if both the devices are in the same room or location. While networking among the handheld devices consider the Bluetooth technology solution.
Infrared networking exists before the Wi-Fi or Bluetooth technologies on the Laptops. Infrared wireless connections only work between two computers and do not require a fixture. Infrared networking is relatively fast so consider using it if your computer supports it and you don’t have
the Wi-Fi and Bluetooth features in your computer.
dlink.com, linksys.com, netgear.com and Cisco systems. Each device has difference setup configurations but the basic purpose of all these devices is the same.
The Gateways have a number of common features and functions such as NAT (Network Address Translation) that translate your public IP address into the private IP address on your network, DHCP server, PPP. Before buying any gateway device, make sure gateway device must have all these features.
Some advance gateways have the following features.
• wireless access point
• VPN
• print server
• DMZ (make one PC available to the Internet but still protect it through the firewall
• multi-port
• Content filtering
Most advance gateways comes with integrated hubs or switches and if your gateway don’t have the functionality of a hub/switch then you will have to buy a hub/switch for your home network. Before buying a hub/switch you should consider the two main things 1. it should support dual
speed i.e 10mbps and 100mbps and 2. it should have maximum available ports.
Cat5 cable – For setting up a home network, you will need a several pieces of the CAT5 Ethernet cables. These cables can be used in the different scenarios like for connecting the two PCs (if you have a two computer network) and if you have more than two computers then each computer will be directly connected with the hub/switch or gateway device. The most commonly used cable for computer networking is Cat5 cable.
Once you have all the required things like cables, hub/switch, LAN cards etc. then install a network card in each PC. You must make sure that each card is properly installed and is not showing any signs of conflict with the other network devices.
How to connect two computers wirelessly
In some recent years, wireless networking solutions have became very popular. There are several wireless technologies exists to support the wireless networking.
These technologies include Wi-Fi, Bluetooth and infrared.
Wi-Fi connections can reach at a greater distance than the other wireless solutions that are mentioned above. Many new PCs and Laptops now have the built-in capability of the Wi-Fi. Wi-Fi can be used with or without network fixture. In the two computers Wi-Fi networking minus a fixture also called ad-hoc Wi-Fi.
Bluetooth technology supports high speed wireless connectivity and communication between the two computers without the need of a network fixture. Bluetooth is commonly used when networking a computer with the consumer’s cell phone or handheld device. Bluetooth works well if both the devices are in the same room or location. While networking among the handheld devices consider the Bluetooth technology solution.
Infrared networking exists before the Wi-Fi or Bluetooth technologies on the Laptops. Infrared wireless connections only work between two computers and do not require a fixture. Infrared networking is relatively fast so consider using it if your computer supports it and you don’t have
the Wi-Fi and Bluetooth features in your computer.
ISDN Line
Find here ISDN Network, introduction to ISDN line, bri, t1 lines, d1 lines, primary rate interface, connection time and setup instructions. The regular phone line, which is used at home and offices is an analogue phone line. Your voice is picked up by telephone mouthpiece and then sent down the phone line as an analogue wave. Regular modem converts the digital signals of the computer into the analogue waves, which then travels on the regular phone lines. At the other end, modem receives that analogue signals and then convert back into the digital signals that are understandable by a computer
ISDN network is a digital communication system that is capable of producing the maximum transmission speed of 1.4Mbps. 128Kbps speed is however more common in the digital technology. It's a international standard for sending data, voice, video over regular digital telephone lines. ISDN uses UTP (unshielded twisted pair cable) for transmission.
Types of ISDN Network
There are two basic types
• Basic Rate Interface (BRI) – It consists of two 64 B-channels and one D-channel for transmitting control information.
• Primary Rate Interface (PRI) -- It consists of 23 B-channels and one D-channel (for U.S.) or 30 B-channels and one D-channel (for Europe).
The actual version of ISDN employs base band transmission. Another version, called B-ISDN, uses broadband transmission, which is able to support transmission rate of 1.5 Mbps. B-ISDN mainly requires fiber optic cables.
To access the B channel, it is necessary to subscribe the ISDN phone line. Customers are also required to have some special ISDN devices, which are known as terminal adapters, which are used to communication with the telephone company switch or other ISDN devices.
How ISDN Works
In an analog network, a regular telephone line that is provided by the telephone company supports a single transmission channel, which normally can carry only one service, voice, data or video at a single time. With ISDN, this same pair telephone line is logically divided into the multiple channels. A typical line has two channels.
The first type of channel is called B channel. This channel can carry about 64Kbps of data. Typical ISDN line has 2 B channels. One channel is used for voice and other channel is used for data communication. This data/voice transmission process occurs on the regular one pair copper wire.
The second type of channel is used for link and call setup. This channel is known as D channel or Delta Channel.
The third channel has only 16Kbps of bandwidth.
Advantages
Speed
There is an upper limit of the speed in the commonly used dial up modems, which is 56kbps. But due to the quality and other factor, the maximum attainable speed is 45kbps.
ISDN allows multiple digital channels to operate simultaneously through the same regular one pair copper wire. If the telephone company supports the digital connections then a change can occur. The digital signals instead of the analogue signals, transmitted across the telephone line. In the digital scheme, there is much more data transfer rate than the analog lines.
Multiple Devices
A separate telephone line is required for using the fax, telephone, computer, router and live video conferencing systems. A separate line is required for each device. ISDN network lines can handle the multiple devices on the single line. Up to eight devices such as, computer, faxes, cash registers, credit card readers or other devices can directly be connected to a single ISDN line, all these devices can work simultaneously.
Connection Time
V.34 modems typical take 30-60 seconds to establish a connection and on the other end an ISDN call usually takes less than 2 seconds to establish a connection.
Disadvantages
There are some disadvantages of the ISDN lines, which I have discussed below.
1. ISDN is more expensive than the Plain old telephone system.
2. The telephone company and the ISDN user both are required to have the specialized digital devices.
ADSL VS ISDN
There is a noticeable difference between the two services.
• ISDN provides two voice channels or one 128Kbps data channel while ADSL is basically a data pipe.
• The power for ADSL is sent by carrier over copper wire; as with the local phone service. The line works even when local power fails. This is an advantage over the ISDN lines, which requires the local power supply.
ISDN network is a digital communication system that is capable of producing the maximum transmission speed of 1.4Mbps. 128Kbps speed is however more common in the digital technology. It's a international standard for sending data, voice, video over regular digital telephone lines. ISDN uses UTP (unshielded twisted pair cable) for transmission.
Types of ISDN Network
There are two basic types
• Basic Rate Interface (BRI) – It consists of two 64 B-channels and one D-channel for transmitting control information.
• Primary Rate Interface (PRI) -- It consists of 23 B-channels and one D-channel (for U.S.) or 30 B-channels and one D-channel (for Europe).
The actual version of ISDN employs base band transmission. Another version, called B-ISDN, uses broadband transmission, which is able to support transmission rate of 1.5 Mbps. B-ISDN mainly requires fiber optic cables.
To access the B channel, it is necessary to subscribe the ISDN phone line. Customers are also required to have some special ISDN devices, which are known as terminal adapters, which are used to communication with the telephone company switch or other ISDN devices.
How ISDN Works
In an analog network, a regular telephone line that is provided by the telephone company supports a single transmission channel, which normally can carry only one service, voice, data or video at a single time. With ISDN, this same pair telephone line is logically divided into the multiple channels. A typical line has two channels.
The first type of channel is called B channel. This channel can carry about 64Kbps of data. Typical ISDN line has 2 B channels. One channel is used for voice and other channel is used for data communication. This data/voice transmission process occurs on the regular one pair copper wire.
The second type of channel is used for link and call setup. This channel is known as D channel or Delta Channel.
The third channel has only 16Kbps of bandwidth.
Advantages
Speed
There is an upper limit of the speed in the commonly used dial up modems, which is 56kbps. But due to the quality and other factor, the maximum attainable speed is 45kbps.
ISDN allows multiple digital channels to operate simultaneously through the same regular one pair copper wire. If the telephone company supports the digital connections then a change can occur. The digital signals instead of the analogue signals, transmitted across the telephone line. In the digital scheme, there is much more data transfer rate than the analog lines.
Multiple Devices
A separate telephone line is required for using the fax, telephone, computer, router and live video conferencing systems. A separate line is required for each device. ISDN network lines can handle the multiple devices on the single line. Up to eight devices such as, computer, faxes, cash registers, credit card readers or other devices can directly be connected to a single ISDN line, all these devices can work simultaneously.
Connection Time
V.34 modems typical take 30-60 seconds to establish a connection and on the other end an ISDN call usually takes less than 2 seconds to establish a connection.
Disadvantages
There are some disadvantages of the ISDN lines, which I have discussed below.
1. ISDN is more expensive than the Plain old telephone system.
2. The telephone company and the ISDN user both are required to have the specialized digital devices.
ADSL VS ISDN
There is a noticeable difference between the two services.
• ISDN provides two voice channels or one 128Kbps data channel while ADSL is basically a data pipe.
• The power for ADSL is sent by carrier over copper wire; as with the local phone service. The line works even when local power fails. This is an advantage over the ISDN lines, which requires the local power supply.
VOIP Network
Introduction to voip network, how internet telephony works, how to make internet phone calls, and what actually is voice over internet protocol. VOIP is simply a transmission of the voice traffic over IP networks. VOIP is a family of technologies, in which IP networks are used for the voice applications and traffic e.g IP telephony, voice chat and teleconferencing.
VOIP gives solution at almost every layer of the IP network. The Internet Protocol was developed and designed for data communication. The success of the IP network has led to its adaptation to voice networking.
Voice over internet protocol is the fast emerging and replacement technology for the voice communication. Many people still want to know that how it works. Voice over internet protocol costs less than your regular phone service and for this reason it’s more attractive to the consumers. VOIP also costs less than a mobile phone’s monthly cost.
In the fast communication age, the number of the VOIP providers is increasing. As the number of the VOIP providers grows it gives the more options and calling plans. The VOIP service is available for both residential and commercial use that ranges from PC-to-PC service and PC-to-Phone and Phone-to-Phone. The following are the most common and basic features of the VoIP.
VOICE OVER INTERNET PROTOCOL FEATURES
The major feature of the VoIP is that the customers can make call to everywhere in the world. Only the broadband internet connection is required. The customers can take their IP phones with them on the national trips as well as on the International trips. Among the other features of the VoIP are the soft phones, which is a software application that loads onto the computer and is used to make the phone calls. The interface of these softphones is similar to the telephone. By these software phones, anyone call make phone calls to everywhere in the world if broadband internet connection access is available.
The most VOIP services also gives the access and options of call waiting, caller id, call transfer, repeat dialing and three way dialing features. There are some additional features like call filtering, forwarding a call or sending a call to the voice mail, but the service providers may charge additionally for these services. Most VoIP service providers allow the customers to check their voicemail or attached messages to an e-mail by connecting to the web.
The facilities and the components of a VoIP phone system that are supplied by the VoIp providers and phone operators are generally vary with each other. The users should be aware of the pros and cons of the VoIP services before subscribing. Also, the customer should also check the availability of the 24/7 cutomer support that may be required fro the VoIP hardware as well as software configurations and for other technical issues.
How IP Telephony Fits In
Among the other names in the VoIP industry, the Skype and Vonage are the biggest names and all the credit for the growth of VoIP goes to Skype and Vonage. There are a large number of other vendors for the telecommunication industry that have promoted the “IP telephony”. As well as the Cisco Systems and Avaya were two of the earlier names in the VoIP phone system technology. The have paved the way for the growth of VoIP technology. More and more residential customers are using the VoIP service likewise the corporate customers are integrated the IP based-voice technology and upgrading their IP networks to support the VoIP technology. This transition is similar to the move from mainframe computers to the personal computers a couple of years ago
HOW DOES VOIP OVER INTERNET PROTOCOL WORKS
Voice Over Internet Protocol also called Internet Telephony and internet telphony is the technology fo future. With this technology you can make free of cost and very cheap long distance calls all over the world. VoIP uses a broadband Internet connection for routing telephone calls as opposed to the switching and fiber optics. By this process the customer can get the higher efficiency and quality of service as well as low cost. One major and interesting aspect of the VoIP technology is that there is no major infrastructure is required.
The VoIP infrastructure includes the broadband Internet connection, regular telephone line and VoIP software and hardware. Some of renowned companies of the voice over internet protocol business are Vonage and Skype. These both companies prove services to their US people as well as people of the other countries. Cisco systems has also a big name in providing the VoIP hardware
VOIP gives solution at almost every layer of the IP network. The Internet Protocol was developed and designed for data communication. The success of the IP network has led to its adaptation to voice networking.
Voice over internet protocol is the fast emerging and replacement technology for the voice communication. Many people still want to know that how it works. Voice over internet protocol costs less than your regular phone service and for this reason it’s more attractive to the consumers. VOIP also costs less than a mobile phone’s monthly cost.
In the fast communication age, the number of the VOIP providers is increasing. As the number of the VOIP providers grows it gives the more options and calling plans. The VOIP service is available for both residential and commercial use that ranges from PC-to-PC service and PC-to-Phone and Phone-to-Phone. The following are the most common and basic features of the VoIP.
VOICE OVER INTERNET PROTOCOL FEATURES
The major feature of the VoIP is that the customers can make call to everywhere in the world. Only the broadband internet connection is required. The customers can take their IP phones with them on the national trips as well as on the International trips. Among the other features of the VoIP are the soft phones, which is a software application that loads onto the computer and is used to make the phone calls. The interface of these softphones is similar to the telephone. By these software phones, anyone call make phone calls to everywhere in the world if broadband internet connection access is available.
The most VOIP services also gives the access and options of call waiting, caller id, call transfer, repeat dialing and three way dialing features. There are some additional features like call filtering, forwarding a call or sending a call to the voice mail, but the service providers may charge additionally for these services. Most VoIP service providers allow the customers to check their voicemail or attached messages to an e-mail by connecting to the web.
The facilities and the components of a VoIP phone system that are supplied by the VoIp providers and phone operators are generally vary with each other. The users should be aware of the pros and cons of the VoIP services before subscribing. Also, the customer should also check the availability of the 24/7 cutomer support that may be required fro the VoIP hardware as well as software configurations and for other technical issues.
How IP Telephony Fits In
Among the other names in the VoIP industry, the Skype and Vonage are the biggest names and all the credit for the growth of VoIP goes to Skype and Vonage. There are a large number of other vendors for the telecommunication industry that have promoted the “IP telephony”. As well as the Cisco Systems and Avaya were two of the earlier names in the VoIP phone system technology. The have paved the way for the growth of VoIP technology. More and more residential customers are using the VoIP service likewise the corporate customers are integrated the IP based-voice technology and upgrading their IP networks to support the VoIP technology. This transition is similar to the move from mainframe computers to the personal computers a couple of years ago
HOW DOES VOIP OVER INTERNET PROTOCOL WORKS
Voice Over Internet Protocol also called Internet Telephony and internet telphony is the technology fo future. With this technology you can make free of cost and very cheap long distance calls all over the world. VoIP uses a broadband Internet connection for routing telephone calls as opposed to the switching and fiber optics. By this process the customer can get the higher efficiency and quality of service as well as low cost. One major and interesting aspect of the VoIP technology is that there is no major infrastructure is required.
The VoIP infrastructure includes the broadband Internet connection, regular telephone line and VoIP software and hardware. Some of renowned companies of the voice over internet protocol business are Vonage and Skype. These both companies prove services to their US people as well as people of the other countries. Cisco systems has also a big name in providing the VoIP hardware
Windows Networking
What is Windows Networking?
The term networking covers a broad range of the topics and technologies. A computer network is segmented into different parts to share the data and resourced between the different computers of a network. Microsoft has released the operating systems that have the networking capabilities so Microsoft Windows 98, Microsoft Windows 2000, Windows 2003, Windows XP Professional and Windows Vista all are the network operating systems.
All these operating systems have built inn capabilities of files and printer sharing, security, network administrative control, protocols support such as TCP/IP, NetBIOS, IPX/SPX and network hardware support.
Naming Computers
All computers in a Windows based network requires a unique name for their identification i.e. the name of the computer A cannot be assigned to the computer B and so on. Assign a meaningful computer name to all the computers and the name should be easy to remember.
All the names should be configured properly and ensure that the name is not longer than the 15 characters and they contain no spaces in them. Also try to avoid the special names while naming the computers such as / \ *,:,. To assign a computer name in Windows XP and Windows 2000 do the following things.
1.Right click on the My Computer.
2. Click Properties
3. Click on Computer name.
4. Assign a unique and meaningful computer name.
Naming Workgroup and Domains
A Windows based computer network can be a workgroup (Peer to Peer) or domain (client/server). You can make your computer a part of the workgroup or a domain. If you have centralized server then your computer will be part of the domain and if you have no server then all computers will be having peer to peer networking. In both cases, while joining your computer to a domain or a workgroup always assign unique, sequenced, memorable and meaningful names to the computers. Do not use duplicate names and the special characters such as / \ *,:,,. In order to join a computer to a domain or workgroup in Windows 2000 and Windows XP Professional do the following.
1. Right Click on My Computer
2. Click Properties
3. Click on Computer Name
4. In Workgroup or domain, enter the name of the workgroup or domain.
If everything is correct such as unique computer name, unique IP address, correct workgroup or domain name then you computer will be the part of the workgroup or domain in the few seconds and you will be see a welcome to domain or workgroup message and will be prompted to restart the computer name.
Files Sharing
Being on network computer files and printer sharing is a must. To enable the files and folder sharing in Windows XP Professional 2000 and Windows 2000 do the following.
1. Right Click on the folder name you want to share.
2. Click on the properties.
3. Click Sharing.
4. Click on Share this computer on the network.
5. Assign a shared computer name.
You can set the sharing rights for the users and also control the shared folder access by allowing and denying permissions to specific users or groups. If you want to share the individual files, you can put the files in the same shared folder. All the files and folders in the parent shared folder will be automatically shared.
Network Cable Errors in Windows
If your computer network cable is not working properly, you will see a repeated message or pop up “network cable is unplugged” on your desktop and the blinking status lights of the network will also stop blinking. There can be many causes of this problem and you can fix this error with these simple tips. If you have another Ethernet adapter installed but not using it, then disable it by right clicking on the monitor icons on the right side of the desktop and select the disable option. Check both ends of the cables and ensure that the RJ 45 connectors are properly inserted in the LAN card and in the Hub/Switch. Update the drive of the LAN card from the vendor’s website and if the problem still exist then replace the cable with new one. If the problem is still not resolved then replace the LAN card with a new one and try to use a new hub or switch and put cable’s one end into it. By these simple steps, you will be able to trace out and troubleshoot the problem.
The term networking covers a broad range of the topics and technologies. A computer network is segmented into different parts to share the data and resourced between the different computers of a network. Microsoft has released the operating systems that have the networking capabilities so Microsoft Windows 98, Microsoft Windows 2000, Windows 2003, Windows XP Professional and Windows Vista all are the network operating systems.
All these operating systems have built inn capabilities of files and printer sharing, security, network administrative control, protocols support such as TCP/IP, NetBIOS, IPX/SPX and network hardware support.
Naming Computers
All computers in a Windows based network requires a unique name for their identification i.e. the name of the computer A cannot be assigned to the computer B and so on. Assign a meaningful computer name to all the computers and the name should be easy to remember.
All the names should be configured properly and ensure that the name is not longer than the 15 characters and they contain no spaces in them. Also try to avoid the special names while naming the computers such as / \ *,:,. To assign a computer name in Windows XP and Windows 2000 do the following things.
1.Right click on the My Computer.
2. Click Properties
3. Click on Computer name.
4. Assign a unique and meaningful computer name.
Naming Workgroup and Domains
A Windows based computer network can be a workgroup (Peer to Peer) or domain (client/server). You can make your computer a part of the workgroup or a domain. If you have centralized server then your computer will be part of the domain and if you have no server then all computers will be having peer to peer networking. In both cases, while joining your computer to a domain or a workgroup always assign unique, sequenced, memorable and meaningful names to the computers. Do not use duplicate names and the special characters such as / \ *,:,,. In order to join a computer to a domain or workgroup in Windows 2000 and Windows XP Professional do the following.
1. Right Click on My Computer
2. Click Properties
3. Click on Computer Name
4. In Workgroup or domain, enter the name of the workgroup or domain.
If everything is correct such as unique computer name, unique IP address, correct workgroup or domain name then you computer will be the part of the workgroup or domain in the few seconds and you will be see a welcome to domain or workgroup message and will be prompted to restart the computer name.
Files Sharing
Being on network computer files and printer sharing is a must. To enable the files and folder sharing in Windows XP Professional 2000 and Windows 2000 do the following.
1. Right Click on the folder name you want to share.
2. Click on the properties.
3. Click Sharing.
4. Click on Share this computer on the network.
5. Assign a shared computer name.
You can set the sharing rights for the users and also control the shared folder access by allowing and denying permissions to specific users or groups. If you want to share the individual files, you can put the files in the same shared folder. All the files and folders in the parent shared folder will be automatically shared.
Network Cable Errors in Windows
If your computer network cable is not working properly, you will see a repeated message or pop up “network cable is unplugged” on your desktop and the blinking status lights of the network will also stop blinking. There can be many causes of this problem and you can fix this error with these simple tips. If you have another Ethernet adapter installed but not using it, then disable it by right clicking on the monitor icons on the right side of the desktop and select the disable option. Check both ends of the cables and ensure that the RJ 45 connectors are properly inserted in the LAN card and in the Hub/Switch. Update the drive of the LAN card from the vendor’s website and if the problem still exist then replace the cable with new one. If the problem is still not resolved then replace the LAN card with a new one and try to use a new hub or switch and put cable’s one end into it. By these simple steps, you will be able to trace out and troubleshoot the problem.
Windows Firewall
Windows firewall is a protective layer or boundary that monitors the in and out traffic from your network and internet. The firewall is a protective and defensive boundary against the intruders and unauthorized persons. You can enable the firewall in XP Professional with these simple steps.
1. Click Start > Settings > Control Panel
2. Windows Firewall > Double click.
Network Troubleshooting Tips
If you find a communication failure error in the TCP/IP network then try to find and troubleshoot the errors with the following methods.
1. Make sure you can ping the other computer by name.
2. Make sure you can pint the other computer by IP address.
3. Make sure you have assigned unique IP address and computer name to all the computers in the network.
4. Make sure you have assigned the correct gateway, subnet mask, DNS and DHCP addresses.
5. For troubleshooting purpose try to uninstall any firewall software and see if the problem is resolved.
Windows Network Security
Security a computer network should be the top priority of the network administrators, system managers and security specialists. You can secure your computer network by doing these things such as installing the updated operating system, up-to-date antivirus program, event log monitoring, encryption, group policy management, patch management, security scanners, auditing, firewall security, web application security, web content filtering and controlling the access to only the authorized users.
What is a Web Server?
Learn Web server software overview, how to configure, how it works, apache, tomcat. Web server is a computer including a software package that provides the specific services to the client computers. Web server delivers the web pages. Every web server has an IP address and a domain name. If you sends a request through your browser for this website http://www.networktutorials.info, the request goes to the server whose domain name is networktutorials.info.
The server fetches the index or main page of the website and sends it to your browser. Web-based servers are used for hosting the websites. One web server can hosts thousands for one sites. But in the hosting companies there are number of the web servers for load balancing and sharing the other services.
A computer can be act as a web server by installing and configuring the server software and connecting the computer to the Internet. Normally, web server computers have to be turn on (online) for almost all the day.
There are many software applications that are used as the web server like IIS, Apache web server, Tom Cat web server. A web server typically accepts thousands of the concurrent incoming requests for the specific domain, that it hosts.
In case if the server is down for any reason, the websites that are hosted on this server cannot be accessed. So the downtime is a biggest negative thing for the web hosting companies. Many hosting companies have to mention the uptime of their servers for the client’s satisfactions like 99.9 % uptime. You may have seen this percentage on many hosting companies’ websites.
The web servers serves the objects in the form of html documents, plain text, images, sounds, video and some other form of the data. Many of the data types may not be placed in the static form but they are shown on the run time by the software programs, that are installed on the web server and the CGI scripts are the most common form of these programs.
Web servers and the browsers such as internet explorer, Firefox, Netscape, Opera etc communicate with the web server by using the HTTP protocols (Hypertext Transfer Protocol). This is very effective method of requesting the data over the Internet. Web servers are in various shapes and sized and run under different operating systems like Windows, Linux, and Unix etc. They are also range differently in prices and working.
Apache Web Server
The Apache web server is the most popular and most commonly used web server today. Apache web server has many features and good functionality that appeals to the users and that’s major cause of its popularity. On the other end, Microsoft’s IIS still is struggling to complete fully with apache web server. IIS is a very good server on the NT platforms and Apache is compatible with the Linux/Unix platforms.
Another big reason for the worldwide acceptance of the Apache web server is its stability. Many big websites on the Internet has chosen Apache web server for their hosting needs.
Additionally, Apache web server is a relatively fast. If your website contents are static then Apache’s working is very efficient and fast and on the other end, if you are using scripts like CGI scripts or others, it usually slows down the speed of the Apache web server.
A Web server is simply a little piece of the software, it takes the file name sent in the GET command, retrieves that files and send it back to the browser.
Most servers implement some level of security on the serving process. For example login/password accessible page requires the proper login and password from the users to accept that page. Web servers have the database and login information of the entire subscriber and only a subscriber of that typical service will be able to see that page. Additionally, while doing secure transactions the web pages allows encrypted transactions between the browsers and the servers such as on the E-commerce websites and other websites where a transaction through a credit card is required.
Basic Overview How Web Server Works
A web server performs various tasks on the request from the clients. To understand the working of the web server, it is necessary to first understand that what is client and server and what is their relationship with each other. A client is a program that sends request to a server and server responds to the requests of the clients.
This generic definition covers many types of relationships between client and servers like database server & web server etc. Web server have to be connected to the internet because client computers need to access them for various needs like data, files, graphics, video and html documents access.
The client program such as browsers and typically designed for the purpose of communicating with the web servers. A browser itself has different levels of features and security. To start the communication between the client (browser) and the server, a set of rules or agreed upon way is required and that is called a protocol. To access the web pages from the server HTTP protocol is required and for the file sharing access FTP protocol is required. There are a large number of the web protocols.
A web server is configured and designed in such a way that it responds to the thousands of the concurrent incoming requests from the clients for different things like html documents, graphics, images or video etc.
1. Click Start > Settings > Control Panel
2. Windows Firewall > Double click.
Network Troubleshooting Tips
If you find a communication failure error in the TCP/IP network then try to find and troubleshoot the errors with the following methods.
1. Make sure you can ping the other computer by name.
2. Make sure you can pint the other computer by IP address.
3. Make sure you have assigned unique IP address and computer name to all the computers in the network.
4. Make sure you have assigned the correct gateway, subnet mask, DNS and DHCP addresses.
5. For troubleshooting purpose try to uninstall any firewall software and see if the problem is resolved.
Windows Network Security
Security a computer network should be the top priority of the network administrators, system managers and security specialists. You can secure your computer network by doing these things such as installing the updated operating system, up-to-date antivirus program, event log monitoring, encryption, group policy management, patch management, security scanners, auditing, firewall security, web application security, web content filtering and controlling the access to only the authorized users.
What is a Web Server?
Learn Web server software overview, how to configure, how it works, apache, tomcat. Web server is a computer including a software package that provides the specific services to the client computers. Web server delivers the web pages. Every web server has an IP address and a domain name. If you sends a request through your browser for this website http://www.networktutorials.info, the request goes to the server whose domain name is networktutorials.info.
The server fetches the index or main page of the website and sends it to your browser. Web-based servers are used for hosting the websites. One web server can hosts thousands for one sites. But in the hosting companies there are number of the web servers for load balancing and sharing the other services.
A computer can be act as a web server by installing and configuring the server software and connecting the computer to the Internet. Normally, web server computers have to be turn on (online) for almost all the day.
There are many software applications that are used as the web server like IIS, Apache web server, Tom Cat web server. A web server typically accepts thousands of the concurrent incoming requests for the specific domain, that it hosts.
In case if the server is down for any reason, the websites that are hosted on this server cannot be accessed. So the downtime is a biggest negative thing for the web hosting companies. Many hosting companies have to mention the uptime of their servers for the client’s satisfactions like 99.9 % uptime. You may have seen this percentage on many hosting companies’ websites.
The web servers serves the objects in the form of html documents, plain text, images, sounds, video and some other form of the data. Many of the data types may not be placed in the static form but they are shown on the run time by the software programs, that are installed on the web server and the CGI scripts are the most common form of these programs.
Web servers and the browsers such as internet explorer, Firefox, Netscape, Opera etc communicate with the web server by using the HTTP protocols (Hypertext Transfer Protocol). This is very effective method of requesting the data over the Internet. Web servers are in various shapes and sized and run under different operating systems like Windows, Linux, and Unix etc. They are also range differently in prices and working.
Apache Web Server
The Apache web server is the most popular and most commonly used web server today. Apache web server has many features and good functionality that appeals to the users and that’s major cause of its popularity. On the other end, Microsoft’s IIS still is struggling to complete fully with apache web server. IIS is a very good server on the NT platforms and Apache is compatible with the Linux/Unix platforms.
Another big reason for the worldwide acceptance of the Apache web server is its stability. Many big websites on the Internet has chosen Apache web server for their hosting needs.
Additionally, Apache web server is a relatively fast. If your website contents are static then Apache’s working is very efficient and fast and on the other end, if you are using scripts like CGI scripts or others, it usually slows down the speed of the Apache web server.
A Web server is simply a little piece of the software, it takes the file name sent in the GET command, retrieves that files and send it back to the browser.
Most servers implement some level of security on the serving process. For example login/password accessible page requires the proper login and password from the users to accept that page. Web servers have the database and login information of the entire subscriber and only a subscriber of that typical service will be able to see that page. Additionally, while doing secure transactions the web pages allows encrypted transactions between the browsers and the servers such as on the E-commerce websites and other websites where a transaction through a credit card is required.
Basic Overview How Web Server Works
A web server performs various tasks on the request from the clients. To understand the working of the web server, it is necessary to first understand that what is client and server and what is their relationship with each other. A client is a program that sends request to a server and server responds to the requests of the clients.
This generic definition covers many types of relationships between client and servers like database server & web server etc. Web server have to be connected to the internet because client computers need to access them for various needs like data, files, graphics, video and html documents access.
The client program such as browsers and typically designed for the purpose of communicating with the web servers. A browser itself has different levels of features and security. To start the communication between the client (browser) and the server, a set of rules or agreed upon way is required and that is called a protocol. To access the web pages from the server HTTP protocol is required and for the file sharing access FTP protocol is required. There are a large number of the web protocols.
A web server is configured and designed in such a way that it responds to the thousands of the concurrent incoming requests from the clients for different things like html documents, graphics, images or video etc.
Internet Fax Services
Here you will learn internet fax server overview and general introduction to the online faxing methods, how to send a fax and online services. A fax server consists of these things a PC, which is connected to the LAN, Fax server software installed on the PC and a Fax modem or a Fax board. Fax messages can be stored as printable documents, spread sheet, database or graphics. When someone wants to fax the documents, they can print the document to the fax printer then put the recipient information such as name and fax number, select the cover letter, type your message and then send the fax through the faxing software installed on your PC.
Alternatively, you can send the fax to the email messages and can take the fax number from the outlook express contact’s list. Sending fax through PC typically takes less than 30 seconds.
Alternatively, fax server can also be setup to receive the faxes and after receiving the faxes, these can be sent to the printer machine or can be sent to the specific recipient’s email address to notify them that he/she has received a fax.
There are certain advantages of the PC fax server, which I have discussed as follows.
1. The main feature of the Fax server is that it saves your time and cost and you can send the fax in the same way as you send emails and attached the fax to send to the recipients.
2. Invoicing, purchase orders and requested information can be scheduled to be faxed to the intended recipients.
3.Fax server will also retry if the recipient number is busy or if there is any error in the number.
4. You can also save the fax numbers of the frequent users.
5. Fax books also make it easy to send the faxes to the groups of people and at the scheduled times.
6. The faxes that are sent directly through the PC are looks better in terms of the resolution.
7. You can also manage the fax server to redirect the receiving faxes to the appropriate recipient so ensuring the security and timely receiving of the faxes.
8. The administrators can automate many functions of the fax server. A fax server can be configured to automatically send the invoices, purchase orders and the promotional newsletters. Additionally, a fax server can work without papers and reduces the overhead of putting and checking the papers again and again. Fax messages can be stored in your PC.
What is a Internet Fax
Internet fax is a device that uses IP networks to transmit the faxes instead of the PSTN. Internet fax uses e-mails as the medium for sending the faxes. Internet fax services include email to fax, fax to email and PC to fax (sending faxes from your computer). Internet fax is type of service, which enables you to send and receive the faxes in a timely manner without a fax machine. Only an email accounts is required to setup your Internet fax account.
Subscribers have to monthly fees to the internet fax service providers. Internet fax service providers usually works in a way that when a fax is sent to the subscriber’s number, the fax service receives the fax and send it to the recipient’s email address as an attachment.
All you need is to have the registered email address with the internet fax service providers. You have to write the fax content in the body of the email and type the fax number in the “To” field with a @ sign and a internet fax service name e.g 14545668999@efax.com. In the subject field sender can write the name of the recipient.
There is a small tool bar in the system tray for sending and receiving the faxes and it comes after installing the fax software. Upon receiving the email to the Internet fax service providers the automated programs convert the email messages to the fax format and send the fax to the recipient fax number. On the other, hand the recipient receives the fax on their fax machine normally.
The Internet fax services provide very ease and you assigned a fax number, which has to be active 24 hours so that you account can accept the faxes. On the other hand, the working of the regular fax machine is typically depends on your telephone line, which should be free while sending and receiving the fax. Internet fax service also saves your papers and the need of the fax machine.
Internet fax service is very familiar to the sending and receiving the email messages and it also saves the cost and time so many people are likely to use this service.
Another big advantage is given by the Internet service providers is that it offers the toll free numbers to its subscribers in USA and Canada. So the people from USA and Canada can send faxes for free. Most internet fax services costs $10-20 per month. The communication charges are greatly reduced as opposed to the conventional fax machines, which costs a user per page.
Alternatively, you can send the fax to the email messages and can take the fax number from the outlook express contact’s list. Sending fax through PC typically takes less than 30 seconds.
Alternatively, fax server can also be setup to receive the faxes and after receiving the faxes, these can be sent to the printer machine or can be sent to the specific recipient’s email address to notify them that he/she has received a fax.
There are certain advantages of the PC fax server, which I have discussed as follows.
1. The main feature of the Fax server is that it saves your time and cost and you can send the fax in the same way as you send emails and attached the fax to send to the recipients.
2. Invoicing, purchase orders and requested information can be scheduled to be faxed to the intended recipients.
3.Fax server will also retry if the recipient number is busy or if there is any error in the number.
4. You can also save the fax numbers of the frequent users.
5. Fax books also make it easy to send the faxes to the groups of people and at the scheduled times.
6. The faxes that are sent directly through the PC are looks better in terms of the resolution.
7. You can also manage the fax server to redirect the receiving faxes to the appropriate recipient so ensuring the security and timely receiving of the faxes.
8. The administrators can automate many functions of the fax server. A fax server can be configured to automatically send the invoices, purchase orders and the promotional newsletters. Additionally, a fax server can work without papers and reduces the overhead of putting and checking the papers again and again. Fax messages can be stored in your PC.
What is a Internet Fax
Internet fax is a device that uses IP networks to transmit the faxes instead of the PSTN. Internet fax uses e-mails as the medium for sending the faxes. Internet fax services include email to fax, fax to email and PC to fax (sending faxes from your computer). Internet fax is type of service, which enables you to send and receive the faxes in a timely manner without a fax machine. Only an email accounts is required to setup your Internet fax account.
Subscribers have to monthly fees to the internet fax service providers. Internet fax service providers usually works in a way that when a fax is sent to the subscriber’s number, the fax service receives the fax and send it to the recipient’s email address as an attachment.
All you need is to have the registered email address with the internet fax service providers. You have to write the fax content in the body of the email and type the fax number in the “To” field with a @ sign and a internet fax service name e.g 14545668999@efax.com. In the subject field sender can write the name of the recipient.
There is a small tool bar in the system tray for sending and receiving the faxes and it comes after installing the fax software. Upon receiving the email to the Internet fax service providers the automated programs convert the email messages to the fax format and send the fax to the recipient fax number. On the other, hand the recipient receives the fax on their fax machine normally.
The Internet fax services provide very ease and you assigned a fax number, which has to be active 24 hours so that you account can accept the faxes. On the other hand, the working of the regular fax machine is typically depends on your telephone line, which should be free while sending and receiving the fax. Internet fax service also saves your papers and the need of the fax machine.
Internet fax service is very familiar to the sending and receiving the email messages and it also saves the cost and time so many people are likely to use this service.
Another big advantage is given by the Internet service providers is that it offers the toll free numbers to its subscribers in USA and Canada. So the people from USA and Canada can send faxes for free. Most internet fax services costs $10-20 per month. The communication charges are greatly reduced as opposed to the conventional fax machines, which costs a user per page.
Network Routing
You will be able to find the basic network routing overview, router configuration, router working, simulations static routes and routing table. Routing is the process of defining routes for the packets to its destination through an internetwork and this is performed by the router.
Routing is consist of two separate tasks.
1. Defining paths for the packets through and internetwork.
2. Forwarding data packets based on their predefined paths.
Generally, there are two types of routing.
STATIC AND DYNAMIC ROUTING
Routing can be performed by manually defining the routes or paths for packets to reach its destination. This is called static routing.
Stating routing works well for the small networks and when using the static routing, the routing table of the each router should be updated each time there is any change in the network configuration or topology. A router, whose routing table is not regularly updated, cannot communicate with the other routers.
While on the other end in most of the networks, routing is accomplished through the use of the dynamic routing. In the dynamic routing, routing protocols, such as RIP, OSPF etc create and maintain the routing tables of each router. Practically, dynamic routing functions very well than the static routing
ROUTING TABLE
A routing table is a set or rules, viewed in a tabular format and this used to define the routes of the data packets. All the network devices, which have IP, enabled functionality such as routers and switches use the routing tables. Routing table stores the information and configurations of every router in the IP enabled network. A routing table contains the information necessary to transmit the packets toward its destination.
When a packet is received, the network devices matches the information contained in the packets and the information in the routing tables and then it defines the shortest possible route for the transmission of the packets towards its destination.
Each packet contains the information of its origin and destination and the routing table contains the following information.
• Destination: The IP address of the packet’s final destination (next hop). Next hop: The IP address to which the packet is forwarded
• Metric: It assigns the cost to each route so that most-effective paths can be picked up.
• Routes: It includes directly attached direct subnets, indirect subnets, that are not directly connected to the device but it can be accesses through one ore more hops
• Interface: The outgoing network interface the device should use when forwarding the packet to its final destination.
Routing tables can be maintained manually by the network administrator or by dynamically (automatically). The static network tables do not change unless the network administrator changes them. Routing tables can be maintained manually or dynamically. Tables for static network devices do not change unless a network administrator manually changes them. In the dynamic routing, the network devices such as routers and switches maintain the routing tables dynamically by using the routing protocols, such as RIP, OSPF etc. In the dynamic routing, the network devices listen and detect any network or devices failure and packet congestions.
Routing in the Internet
Routing is the method in which data finds its destination from one computer to the next. In the Internet there are 3 major aspects of routing.
1. Physical Address Finding
2. Determination of inter-network gateways
3. Numeric and symbolic Addresses
Physical address finding is the method of the Internet Routing and is used when datagram is transmitted from a computer. It is necessary to encapsulate the IP datagram. This encapsulation requires the local network or physical address.
If a computer wishes to transmit IP datagram it needs to encapsulate the physical address of the destination network device in the frame. This address can be achieved by using the table that will map the IP address with the physical address. Such table can be configured into a file that can be read into the memory at the boot up time. Computer normally uses the Address Resolution Protocol (ARP), which operates dynamically to maintain the translation table.
The second method is necessary because the Internet consists of a large number of local networks, which are interconnected with each other by gateways. Such gateways are known as routers, which has physical as well as logical connectivity with many networks.
The determination of the best suitable gateway and port for a particular IP address is called routing.
The third method generally involves the translation of the human friendly form (names) to the number address (IP Address). IP address can’t be remembered due to its numeric form but the simplest names (domain names) are easy to remember e.g www.yahoo.com, www.google.com, www.msn.com are easiest to remember as compared to the IP addresses 122.11.22.34, 223.45.66.76, 155.44.55.120. DNS translates the domain names into the IP address and IP address into the domain name. This domain to IP translation is a must for communicating on the Internet because communication on the Internet is performed by the IP addresses.
Communication between routers
The Internet is a network of networks. The Internet consists of large number of autonomous systems, each of which further consists of routing domains. Such autonomous systems are usually run by the larger companies or universities. Within the Autonomous system, a router communicates with the other router using the best intra domain routing protocols, which are known as interior gateway protocols. Autonomous system are connected via gateways, these exchange information using inter domain routing protocol, which are also called exterior gateway protocols.
The RIP or (Routing Information Protocol) is the commonest interior gateway protocol and the recent protocol such as open shortest path first (OSPF). The purpose of these protocols is to enable routers to exchange locally so that all the routers in the autonomous system must a have coherent and up to date information.
When a host receives the new routing information, it is likely to update not only to it but also sends this new updated information to all the connected hosts so that they can updated themselves. Hence these changes propagate across the entire network.
Routing is consist of two separate tasks.
1. Defining paths for the packets through and internetwork.
2. Forwarding data packets based on their predefined paths.
Generally, there are two types of routing.
STATIC AND DYNAMIC ROUTING
Routing can be performed by manually defining the routes or paths for packets to reach its destination. This is called static routing.
Stating routing works well for the small networks and when using the static routing, the routing table of the each router should be updated each time there is any change in the network configuration or topology. A router, whose routing table is not regularly updated, cannot communicate with the other routers.
While on the other end in most of the networks, routing is accomplished through the use of the dynamic routing. In the dynamic routing, routing protocols, such as RIP, OSPF etc create and maintain the routing tables of each router. Practically, dynamic routing functions very well than the static routing
ROUTING TABLE
A routing table is a set or rules, viewed in a tabular format and this used to define the routes of the data packets. All the network devices, which have IP, enabled functionality such as routers and switches use the routing tables. Routing table stores the information and configurations of every router in the IP enabled network. A routing table contains the information necessary to transmit the packets toward its destination.
When a packet is received, the network devices matches the information contained in the packets and the information in the routing tables and then it defines the shortest possible route for the transmission of the packets towards its destination.
Each packet contains the information of its origin and destination and the routing table contains the following information.
• Destination: The IP address of the packet’s final destination (next hop). Next hop: The IP address to which the packet is forwarded
• Metric: It assigns the cost to each route so that most-effective paths can be picked up.
• Routes: It includes directly attached direct subnets, indirect subnets, that are not directly connected to the device but it can be accesses through one ore more hops
• Interface: The outgoing network interface the device should use when forwarding the packet to its final destination.
Routing tables can be maintained manually by the network administrator or by dynamically (automatically). The static network tables do not change unless the network administrator changes them. Routing tables can be maintained manually or dynamically. Tables for static network devices do not change unless a network administrator manually changes them. In the dynamic routing, the network devices such as routers and switches maintain the routing tables dynamically by using the routing protocols, such as RIP, OSPF etc. In the dynamic routing, the network devices listen and detect any network or devices failure and packet congestions.
Routing in the Internet
Routing is the method in which data finds its destination from one computer to the next. In the Internet there are 3 major aspects of routing.
1. Physical Address Finding
2. Determination of inter-network gateways
3. Numeric and symbolic Addresses
Physical address finding is the method of the Internet Routing and is used when datagram is transmitted from a computer. It is necessary to encapsulate the IP datagram. This encapsulation requires the local network or physical address.
If a computer wishes to transmit IP datagram it needs to encapsulate the physical address of the destination network device in the frame. This address can be achieved by using the table that will map the IP address with the physical address. Such table can be configured into a file that can be read into the memory at the boot up time. Computer normally uses the Address Resolution Protocol (ARP), which operates dynamically to maintain the translation table.
The second method is necessary because the Internet consists of a large number of local networks, which are interconnected with each other by gateways. Such gateways are known as routers, which has physical as well as logical connectivity with many networks.
The determination of the best suitable gateway and port for a particular IP address is called routing.
The third method generally involves the translation of the human friendly form (names) to the number address (IP Address). IP address can’t be remembered due to its numeric form but the simplest names (domain names) are easy to remember e.g www.yahoo.com, www.google.com, www.msn.com are easiest to remember as compared to the IP addresses 122.11.22.34, 223.45.66.76, 155.44.55.120. DNS translates the domain names into the IP address and IP address into the domain name. This domain to IP translation is a must for communicating on the Internet because communication on the Internet is performed by the IP addresses.
Communication between routers
The Internet is a network of networks. The Internet consists of large number of autonomous systems, each of which further consists of routing domains. Such autonomous systems are usually run by the larger companies or universities. Within the Autonomous system, a router communicates with the other router using the best intra domain routing protocols, which are known as interior gateway protocols. Autonomous system are connected via gateways, these exchange information using inter domain routing protocol, which are also called exterior gateway protocols.
The RIP or (Routing Information Protocol) is the commonest interior gateway protocol and the recent protocol such as open shortest path first (OSPF). The purpose of these protocols is to enable routers to exchange locally so that all the routers in the autonomous system must a have coherent and up to date information.
When a host receives the new routing information, it is likely to update not only to it but also sends this new updated information to all the connected hosts so that they can updated themselves. Hence these changes propagate across the entire network.
GATEWAY
Here you will get the software and hardware network gateway overview and general introduction, basic configurations, software configuration, bandwidth, firewall overview and routing methods. Gateway is a network point that acts as the entrance point to another network. A gateway can be a hardware or software. On the Internet, a node or a stopping point can be a gateway or a host. A router also acts as a gateway. The computers that control and manage traffic and bandwidth within your company’s network or at the ISP are the gateway nodes. In the enterprise network the gateway node acts as a proxy server and a firewall. The gateway is also associated with a router and a switch.
A network gateway is an internetworking system that joins two networks together and it can be configured in software, hardware or both. Network gateway can operate at any level of OSI layers model.
CONFIGURING THE GATEWAY
The gateway has two sides: The WAN side connects to your cable DSL modem and LAN side connects to your private network via a hub or switch. The main function of it is to route the traffic from computer to the Internet and back to the computer. A computer with the two NIC cards can act as a gateway. It routes the network traffic between two logically and physically different networks.
In its configurations, you first configure the public side of the gateway and the IP address, which is assigned to you by your ISP. The public side configurations generally includes, assigning the IP address, DNS server, subnet mask, ISP gateway IP address and host name. Additionally, if your ISP uses PPPoE, you simply have to enable PPPoE in your gateway.
On the other hand to configure the private side , you have to enable DHCP. By enabling this feature each computer in your network, will automatically pick the settings from the DHCP server that are required for a computer to be a part of the network and communicate.
SOFTWARE CONFIGURATION
The last step in the configurations, is to configure each PC in such a way that it automatically gets the all the settings from the DHCP server. Make sure that TCP/IP protocol is properly installed in each computer of your network. After configuring each PC in your network perform a reboot.
After rebooting the each PC in your network, you will see a blinking underneath network icon on the right side of the task bar. If everything is done then you can access the internet, share the printer and data in your network.
The firewall can also be configured with it to put a check on the unauthorized network traffic from the internet to your computer or network.
A network gateway is an internetworking system that joins two networks together and it can be configured in software, hardware or both. Network gateway can operate at any level of OSI layers model.
CONFIGURING THE GATEWAY
The gateway has two sides: The WAN side connects to your cable DSL modem and LAN side connects to your private network via a hub or switch. The main function of it is to route the traffic from computer to the Internet and back to the computer. A computer with the two NIC cards can act as a gateway. It routes the network traffic between two logically and physically different networks.
In its configurations, you first configure the public side of the gateway and the IP address, which is assigned to you by your ISP. The public side configurations generally includes, assigning the IP address, DNS server, subnet mask, ISP gateway IP address and host name. Additionally, if your ISP uses PPPoE, you simply have to enable PPPoE in your gateway.
On the other hand to configure the private side , you have to enable DHCP. By enabling this feature each computer in your network, will automatically pick the settings from the DHCP server that are required for a computer to be a part of the network and communicate.
SOFTWARE CONFIGURATION
The last step in the configurations, is to configure each PC in such a way that it automatically gets the all the settings from the DHCP server. Make sure that TCP/IP protocol is properly installed in each computer of your network. After configuring each PC in your network perform a reboot.
After rebooting the each PC in your network, you will see a blinking underneath network icon on the right side of the task bar. If everything is done then you can access the internet, share the printer and data in your network.
The firewall can also be configured with it to put a check on the unauthorized network traffic from the internet to your computer or network.
Subscribe to:
Posts (Atom)