<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-9068491544299539372</id><updated>2024-10-24T21:12:12.527+08:00</updated><category term="Fundamental Computer Networks Concepts"/><category term="Types of Computer Networks"/><category term="Basic Computer Network Information"/><category term="Computer and Wireless Networking Basic"/><category term="Introduction to Client Server Networks"/><category term="Wireless Networks"/><category term="your way to success"/><title type='text'>Net Working</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Anoch</name><uri>http://www.blogger.com/profile/04476308430111490191</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://4.bp.blogspot.com/_PhBjyzX5WKU/SWbAZ-YUFVI/AAAAAAAAAAo/5HJ2SnEe2Yg/S220/SHARMY-27.01.08+021.JPG'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>25</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-9068491544299539372.post-1788867415839716141</id><published>2012-01-20T14:28:00.000+08:00</published><updated>2012-01-20T14:28:21.972+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Wireless Networks"/><title type='text'>Wireless Networks</title><content type='html'>&lt;span style=&quot;font-size: large;&quot;&gt;The term wireless networking refers to technology that enables two or more computers to communicate using standard network protocols, but without network cabling. The computers connect to the network using radio signals.&lt;br /&gt;
&lt;br /&gt;
The articles in this section give an overview on how wireless networking functions, the different types of wireless networks available, and the new technologies being developed in the field. &lt;br /&gt;
How do wireless networks work?&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Wireless data is predominately transferred over two kinds of networks: wide area networks (WANs) and local area networks (LANs). These networks are similar to their wired counterparts, but they just use radio waves instead of copper or fiber.&lt;br /&gt;
&lt;br /&gt;
WANs can cover areas as large as several countries. AT&amp;amp;T Wireless, Cingular Wireless, Sprint and Verizon and are among the carriers that use wireless WANs.&lt;br /&gt;
&lt;br /&gt;
Wireless LANs (WLANs), already popular in airports, coffee shops and hotels, are often used to replace or enhance wired LANs. WLANs can cover 1.25 miles indoors and up to 4.35 miles outdoors in extreme cases, but work best in the 500-foot range. They may service a smaller area than their WAN cousins, but LANs can transfer data much faster, with speeds of 54Mbps now possible. Many companies are switching to WLANs for voice over IP.&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/1788867415839716141/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://iworldtechnology.blogspot.com/2012/01/wireless-networks.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/1788867415839716141'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/1788867415839716141'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/2012/01/wireless-networks.html' title='Wireless Networks'/><author><name>lusia</name><uri>http://www.blogger.com/profile/03546856083433806008</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://3.bp.blogspot.com/_uvgzkzYuoa8/STlV7-UQBXI/AAAAAAAAHBw/49ukbz_7yDg/S220/f.Bql8251938-02%5B1%5D.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9068491544299539372.post-7957016278670687104</id><published>2009-11-17T16:55:00.000+08:00</published><updated>2009-11-17T17:02:38.926+08:00</updated><title type='text'>Wired vs Wireless Networking</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;Computer networks for the home and small business can be built using either wired or wireless technology. Wired Ethernet has been the traditional choice in homes, but Wi-Fi wireless technologies are gaining ground fast. Both wired and wireless can claim advantages over the other; both represent viable options for home and other local area networks (LANs).&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Below we compare wired and wireless networking in five key areas:&lt;br /&gt;&lt;br /&gt;    * ease of installation&lt;br /&gt;    * total cost&lt;br /&gt;    * reliability&lt;br /&gt;    * performance&lt;br /&gt;    * security&lt;br /&gt;&lt;span style=&quot;display: block;&quot; id=&quot;formatbar_Buttons&quot;&gt;&lt;span class=&quot;&quot; style=&quot;display: block;&quot; id=&quot;formatbar_JustifyFull&quot; title=&quot;Justify Full&quot; onmouseover=&quot;ButtonHoverOn(this);&quot; onmouseout=&quot;ButtonHoverOff(this);&quot; onmouseup=&quot;&quot; onmousedown=&quot;CheckFormatting(event);FormatbarButton(&#39;richeditorframe&#39;, this, 13);ButtonMouseDown(this);&quot;&gt;&lt;img src=&quot;img/blank.gif&quot; alt=&quot;Justify Full&quot; class=&quot;gl_align_full&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;About Wired LANs&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Wired LANs use Ethernet cables and network adapters. Although two computers can be directly wired to each other using an Ethernet crossover cable, wired LANs generally also require central devices like hubs, switches, or routers to accommodate more computers.&lt;br /&gt;&lt;br /&gt;For dial-up connections to the Internet, the computer hosting the modem must run Internet Connection Sharing or similar software to share the connection with all other computers on the LAN. Broadband routers allow easier sharing of cable modem or DSL Internet connections, plus they often include built-in firewall support.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Installation&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Ethernet cables must be run from each computer to another computer or to the central device. It can be time-consuming and difficult to run cables under the floor or through walls, especially when computers sit in different rooms. Some newer homes are pre-wired with CAT5 cable, greatly simplifying the cabling process and minimizing unsightly cable runs.&lt;br /&gt;&lt;br /&gt;The correct cabling configuration for a wired LAN varies depending on the mix of devices, the type of Internet connection, and whether internal or external modems are used. However, none of these options pose any more difficulty than, for example, wiring a home theater system.&lt;br /&gt;&lt;br /&gt;After hardware installation, the remaining steps in configuring either wired or wireless LANs do not differ much. Both rely on standard Internet Protocol and network operating system configuration options. Laptops and other portable devices often enjoy greater mobility in wireless home network installations (at least for as long as their batteries allow).&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Cost&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Ethernet cables, hubs and switches are very inexpensive. Some connection sharing software packages, like ICS, are free; some cost a nominal fee. Broadband routers cost more, but these are optional components of a wired LAN, and their higher cost is offset by the benefit of easier installation and built-in security features.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Reliability&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Ethernet cables, hubs and switches are extremely reliable, mainly because manufacturers have been continually improving Ethernet technology over several decades. Loose cables likely remain the single most common and annoying source of failure in a wired network. When installing a wired LAN or moving any of the components later, be sure to carefully check the cable connections.&lt;br /&gt;&lt;br /&gt;Broadband routers have also suffered from some reliability problems in the past. Unlike other Ethernet gear, these products are relatively new, multi-function devices. Broadband routers have matured over the past several years and their reliability has improved greatly.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Performance&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Wired LANs offer superior performance. Traditional Ethernet connections offer only 10 Mbps bandwidth, but 100 Mbps Fast Ethernet technology costs little more and is readily available. Although 100 Mbps represents a theoretical maximum performance never really achieved in practice, Fast Ethernet should be sufficient for home file sharing, gaming, and high-speed Internet access for many years into the future.&lt;br /&gt;&lt;br /&gt;Wired LANs utilizing hubs can suffer performance slowdown if computers heavily utilize the network simultaneously. Use Ethernet switches instead of hubs to avoid this problem; a switch costs little more than a hub.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Security&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;For any wired LAN connected to the Internet, firewalls are the primary security consideration. Wired Ethernet hubs and switches do not support firewalls. However, firewall software products like ZoneAlarm can be installed on the computers themselves. Broadband routers offer equivalent firewall capability built into the device, configurable through its own software.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/7957016278670687104/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://iworldtechnology.blogspot.com/2009/11/wired-vs-wireless-networking.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/7957016278670687104'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/7957016278670687104'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/2009/11/wired-vs-wireless-networking.html' title='Wired vs Wireless Networking'/><author><name>lusia</name><uri>http://www.blogger.com/profile/03546856083433806008</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://3.bp.blogspot.com/_uvgzkzYuoa8/STlV7-UQBXI/AAAAAAAAHBw/49ukbz_7yDg/S220/f.Bql8251938-02%5B1%5D.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9068491544299539372.post-5906721713171430010</id><published>2009-07-08T11:20:00.000+08:00</published><updated>2009-07-08T11:20:01.636+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Types of Computer Networks"/><title type='text'>protocol (network)</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Definition:&lt;/span&gt; A &lt;span style=&quot;font-weight: bold;&quot;&gt;network protocol &lt;/span&gt;defines rules and conventions for communication between network devices. Protocols for computer networking all generally use packet switching techniques to send and receive messages in the form of packets.&lt;br /&gt;&lt;br /&gt;Network protocols include mechanisms for devices to identify and make connections with each other, as well as formatting rules that specify how data is packaged into messages sent and received. Some protocols also support message acknowledgement and data compression designed for reliable and/or high-performance network communication. Hundreds of different computer network protocols have been developed each designed for specific purposes and environments.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Internet Protocols&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The Internet Protocol family contains a set of related (and among the most widely used network protocols. Besides Internet Protocol (IP) itself, higher-level protocols like TCP, UDP, HTTP, and FTP all integrate with IP to provide additional capabilities. Similarly, lower-level Internet Protocols like ARP and ICMP also co-exist with IP. These higher level protocols interact more closely with applications like Web browsers while lower-level protocols interact with network adapters and other computer hardware.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Routing Protocols&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Routing protocols are special-purpose protocols designed specifically for use by network routers on the Internet. Common routing protocols include EIGRP, OSPF and BGP.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;How Network Protocols Are Implemented&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Modern operating systems like Microsoft Windows contain built-in services or daemons that implement support for some network protocols. Applications like Web browsers contain software libraries that support the high level protocols necessary for that application to function. For some lower level TCP/IP and routing protocols, support is implemented in directly hardware (silicon chipsets) for improved performance.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/5906721713171430010/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://iworldtechnology.blogspot.com/2009/07/protocol-network.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/5906721713171430010'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/5906721713171430010'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/2009/07/protocol-network.html' title='protocol (network)'/><author><name>lusia</name><uri>http://www.blogger.com/profile/03546856083433806008</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://3.bp.blogspot.com/_uvgzkzYuoa8/STlV7-UQBXI/AAAAAAAAHBw/49ukbz_7yDg/S220/f.Bql8251938-02%5B1%5D.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9068491544299539372.post-5888546424025001249</id><published>2009-07-06T18:15:00.001+08:00</published><updated>2009-07-06T18:19:11.245+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Types of Computer Networks"/><title type='text'>What Is Packet Switching on Computer Networks?</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Question: What Is Packet Switching on Computer Networks?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Answer: Packet switching is the approach used by some computer network protocols to deliver data across a local or long distance connection. Examples of packet switching protocols are Frame Relay, IP and X.25.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;How Packet Switching Works&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Packet switching entails packaging data in specially formatted units (called packets) that are typically routed from source to destination using network switches and routers. Each packet contains address information that identifies the sending computer and intended recipient. Using these addresses, network switches and routers determine how best to transfer the packet between hops on the path to its destination.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Pros and Cons of Packet Switching&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Packet switching is the alternative to circuit switching protocols used historically for telephone (voice) networks and sometimes with ISDN connections.&lt;br /&gt;&lt;br /&gt;Compared to circuit switching, packet switching offers the following:&lt;br /&gt;&lt;br /&gt;    * More efficient use of overall network bandwidth due to flexibility in routing the smaller packets over shared links. Packet switching networks are often cheaper to build as less equipment is needed given this ability to share.&lt;br /&gt;&lt;br /&gt;    * Longer delays in receiving messages due to the time required to package and route packets. For many applications, delays are not long enough to be significant, but for high-performance applications like real-time video, additional data compression and QoS technology is often required to achieve the required performance levels.&lt;br /&gt;&lt;br /&gt;    * Potential for network security risks due to the use of shared physical links. Protocols and other related elements on packet switching networks must designed with the appropriate security precautions.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/5888546424025001249/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://iworldtechnology.blogspot.com/2009/07/what-is-packet-switching-on-computer.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/5888546424025001249'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/5888546424025001249'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/2009/07/what-is-packet-switching-on-computer.html' title='What Is Packet Switching on Computer Networks?'/><author><name>lusia</name><uri>http://www.blogger.com/profile/03546856083433806008</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://3.bp.blogspot.com/_uvgzkzYuoa8/STlV7-UQBXI/AAAAAAAAHBw/49ukbz_7yDg/S220/f.Bql8251938-02%5B1%5D.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9068491544299539372.post-3295487153139949061</id><published>2009-07-01T01:51:00.001+08:00</published><updated>2009-07-01T01:57:54.105+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Types of Computer Networks"/><title type='text'>Network Topologies</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;In computer networking, topology refers to the layout of connected devices. This article introduces the standard topologies of networking.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Topology in Network Design&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Think of a topology as a network&#39;s virtual shape or structure. This shape does not necessarily correspond to the actual physical layout of the devices on the network. For example, the computers on a home LAN may be arranged in a circle in a family room, but it would be highly unlikely to find a ring topology there.&lt;br /&gt;&lt;br /&gt;Network topologies are categorized into the following basic types:&lt;br /&gt;&lt;br /&gt;    * bus&lt;br /&gt;    * ring&lt;br /&gt;    * star&lt;br /&gt;    * tree&lt;br /&gt;    * mesh&lt;br /&gt;&lt;br /&gt;More complex networks can be built as hybrids of two or more of the above basic topologies.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Bus Topology&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Bus networks (not to be confused with the system bus of a computer) use a common backbone to connect all devices. A single cable, the backbone functions as a shared communication medium that devices attach or tap into with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message.&lt;br /&gt;&lt;br /&gt;Ethernet bus topologies are relatively easy to install and don&#39;t require much cabling compared to the alternatives. 10Base-2 (&quot;ThinNet&quot;) and 10Base-5 (&quot;ThickNet&quot;) both were popular Ethernet cabling options many years ago for bus topologies. However, bus networks work best with a limited number of devices. If more than a few dozen computers are added to a network bus, performance problems will likely result. In addition, if the backbone cable fails, the entire network effectively becomes unusable.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Ring Topology&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;In a ring network, every device has exactly two neighbors for communication purposes. All messages travel through a ring in the same direction (either &quot;clockwise&quot; or &quot;counterclockwise&quot;). A failure in any cable or device breaks the loop and can take down the entire network.&lt;br /&gt;&lt;br /&gt;To implement a ring network, one typically uses FDDI, SONET, or Token Ring technology. Ring topologies are found in some office buildings or school campuses.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Star Topology&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Many home networks use the star topology. A star network features a central connection point called a &quot;hub&quot; that may be a hub, switch or router. Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet.&lt;br /&gt;&lt;br /&gt;Compared to the bus topology, a star network generally requires more cable, but a failure in any star network cable will only take down one computer&#39;s network access and not the entire LAN. (If the hub fails, however, the entire network also fails.)&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Tree Topology&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Tree topologies integrate multiple star topologies together onto a bus. In its simplest form, only hub devices connect directly to the tree bus, and each hub functions as the &quot;root&quot; of a tree of devices. This bus/star hybrid approach supports future expandability of the network much better than a bus (limited in the number of devices due to the broadcast traffic it generates) or a star (limited by the number of hub connection points) alone.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Mesh Topology&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Mesh topologies involve the concept of routes. Unlike each of the previous topologies, messages sent on a mesh network can take any of several possible paths from source to destination. (Recall that even in a ring, although two cable paths exist, messages can only travel in one direction.) Some WANs, most notably the Internet, employ mesh routing.&lt;br /&gt;&lt;br /&gt;A mesh network in which every device connects to every other is called a full mesh. As shown in the illustration below, partial mesh networks also exist in which some devices connect only indirectly to others.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Summary&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Topologies remain an important part of network design theory. You can probably build a home or small business computer network without understanding the difference between a bus design and a star design, but becoming familiar with the standard topologies gives you a better understanding of important networking concepts like hubs, broadcasts, and routes.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/3295487153139949061/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://iworldtechnology.blogspot.com/2009/07/network-topologies.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/3295487153139949061'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/3295487153139949061'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/2009/07/network-topologies.html' title='Network Topologies'/><author><name>Anoch</name><uri>http://www.blogger.com/profile/04476308430111490191</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://4.bp.blogspot.com/_PhBjyzX5WKU/SWbAZ-YUFVI/AAAAAAAAAAo/5HJ2SnEe2Yg/S220/SHARMY-27.01.08+021.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9068491544299539372.post-6009643800654190977</id><published>2009-06-28T01:33:00.002+08:00</published><updated>2009-06-28T01:40:43.773+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Types of Computer Networks"/><title type='text'>Introduction to Network Types</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;One way to categorize the different types of computer network designs is by their scope or scale. For historical reasons, the networking industry refers to nearly every type of design as some kind of area network. Common examples of area network types are:&lt;br /&gt;&lt;br /&gt;  * &lt;span style=&quot;font-weight: bold;&quot;&gt;LAN &lt;/span&gt;- Local Area Network&lt;br /&gt;  *&lt;span style=&quot;font-weight: bold;&quot;&gt; WLAN -&lt;/span&gt; Wireless Local Area Network&lt;br /&gt;  * &lt;span style=&quot;font-weight: bold;&quot;&gt;WAN &lt;/span&gt;- Wide Area Network&lt;br /&gt;  * &lt;span style=&quot;font-weight: bold;&quot;&gt;MAN&lt;/span&gt; - Metropolitan Area Network&lt;br /&gt;  * &lt;span style=&quot;font-weight: bold;&quot;&gt;SAN &lt;/span&gt;- Storage Area Network, System Area Network, Server Area Network, or sometimes Small Area Network&lt;br /&gt;  * &lt;span style=&quot;font-weight: bold;&quot;&gt;CAN&lt;/span&gt; - Campus Area Network, Controller Area Network, or sometimes Cluster Area Network&lt;br /&gt;  * &lt;span style=&quot;font-weight: bold;&quot;&gt;PAN&lt;/span&gt; - Personal Area Network&lt;br /&gt;  * &lt;span style=&quot;font-weight: bold;&quot;&gt;DAN&lt;/span&gt; - Desk Area Network&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;LAN&lt;/span&gt; and &lt;span style=&quot;font-weight: bold;&quot;&gt;WAN&lt;/span&gt; were the original categories of area networks, while the others have gradually emerged over many years of technology evolution.&lt;br /&gt;&lt;br /&gt;Note that these network types are a separate concept from network topologies such as bus, ring and star.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;LAN - Local Area Network&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings. In TCP/IP networking, a LAN is often but not always implemented as a single IP subnet.&lt;br /&gt;&lt;br /&gt;In addition to operating in a limited space, LANs are also typically owned, controlled, and managed by a single person or organization. They also tend to use certain connectivity technologies, primarily Ethernet and Token Ring.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;WAN - Wide Area Network&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;As the term implies, a WAN spans a large physical distance. The Internet is the largest WAN, spanning the Earth.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;A WAN&lt;/span&gt; is a geographically-dispersed collection of LANs. A network device called a router connects LANs to a WAN. In IP networking, the router maintains both a LAN address and a WAN address.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;A WAN&lt;/span&gt; differs from a LAN in several important ways. Most WANs (like the Internet) are not owned by any one organization but rather exist under collective or distributed ownership and management. WANs tend to use technology like ATM, Frame Relay and X.25 for connectivity over the longer distances.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;LAN, WAN and Home Networking&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Residences typically employ one LAN and connect to the Internet WAN via an Internet Service Provider (ISP) using a broadband modem. The ISP provides a WAN IP address to the modem, and all of the computers on the home network use LAN (so-called private) IP addresses. All computers on the home LAN can communicate directly with each other but must go through a central gateway, typically a broadband router, to reach the ISP.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Other Types of Area Networks&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;While LAN and WAN are by far the most popular network types mentioned, you may also commonly see references to these others:&lt;br /&gt;&lt;br /&gt;  * &lt;span style=&quot;font-weight: bold;&quot;&gt;Wireless Local Area Network&lt;/span&gt; - a LAN based on WiFi wireless network technology&lt;br /&gt;  &lt;span style=&quot;font-weight: bold;&quot;&gt;* Metropolitan Area Network&lt;/span&gt; - a network spanning a physical area larger than a LAN but smaller than a WAN, such as a city. A MAN is typically owned an operated by a single entity such as a government body or large corporation.&lt;br /&gt;&lt;br /&gt;  &lt;span style=&quot;font-weight: bold;&quot;&gt;* Campus Area Network -&lt;/span&gt; a network spanning multiple LANs but smaller than a MAN, such as on a university or local business campus.&lt;br /&gt;  &lt;span style=&quot;font-weight: bold;&quot;&gt;* Storage Area Network &lt;/span&gt;- connects servers to data storage devices through a technology like Fibre Channel.&lt;br /&gt;  &lt;span style=&quot;font-weight: bold;&quot;&gt;* System Area Network -&lt;/span&gt; links high-performance computers with high-speed connections in a cluster configuration. Also known as Cluster Area Network.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/6009643800654190977/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://iworldtechnology.blogspot.com/2009/06/types-of-computer-networks.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/6009643800654190977'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/6009643800654190977'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/2009/06/types-of-computer-networks.html' title='Introduction to Network Types'/><author><name>lusia</name><uri>http://www.blogger.com/profile/03546856083433806008</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://3.bp.blogspot.com/_uvgzkzYuoa8/STlV7-UQBXI/AAAAAAAAHBw/49ukbz_7yDg/S220/f.Bql8251938-02%5B1%5D.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9068491544299539372.post-6500234033959083891</id><published>2009-06-25T10:59:00.000+08:00</published><updated>2009-06-25T10:59:01.968+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Fundamental Computer Networks Concepts"/><title type='text'>Free Computer Networking Books</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;Numerous published books are available for free download on the Internet. However, relatively few quality free books exist that cover general computer networking topics. Follow the links below to browse the best free computer networking books online.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;1. TCP/IP Tutorial and Technical Overview (2004)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;At over 900 pages, this book is truly a comprehensive reference to the TCP/IP network protocol. It covers in detail the basics of IP addressing and subnets, ARP, DCHP and routing protocols. IBM has also refreshed this book in 2006 to keep current on the more recent developments in TCP/IP technology including IPv6, QoS and mobile IP. IBM provides this book for free in both HTML and PDF formats.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;2. Introduction to Data Communications (1999-2000)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Author Eugene Blanchard completed this book based on his experience with the Linux operating system. The topics covered in this book are generally applicable across environments: OSI model, area networks, modems, and wired and wireless connections. This 500 page book (PDF, HTML) should satisfy the basic needs of anyone looking to get familiar with a wide range of network technologies.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;3. Internetworking Technologies - An Engineering Perspective (2002)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;This 165-page PDF book written by Dr. Rahul Banerjee is available online as a read-only (non-printable) document. It is designed for networking students, covering video, data compression, TCP/IP, routing, network management and security, and some Internet network programming topics.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/6500234033959083891/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://iworldtechnology.blogspot.com/2009/06/free-computer-networking-books.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/6500234033959083891'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/6500234033959083891'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/2009/06/free-computer-networking-books.html' title='Free Computer Networking Books'/><author><name>lusia</name><uri>http://www.blogger.com/profile/03546856083433806008</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://3.bp.blogspot.com/_uvgzkzYuoa8/STlV7-UQBXI/AAAAAAAAHBw/49ukbz_7yDg/S220/f.Bql8251938-02%5B1%5D.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9068491544299539372.post-7489593094202405147</id><published>2009-06-24T17:57:00.001+08:00</published><updated>2009-06-24T17:59:55.955+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Fundamental Computer Networks Concepts"/><title type='text'>Introduction to Peer to Peer Networks</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Peer to peer&lt;/span&gt; is an approach to computer networking where all computers share equivalent responsibility for processing data. Peer-to-peer networking (also known simply as peer networking) differs from client-server networking, where certain devices have responsibility for providing or &quot;serving&quot; data and other devices consume or otherwise act as &quot;clients&quot; of those servers.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Characteristics of a Peer Network&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Peer to peer networking is common on small local area networks (LANs), particularly home networks. Both wired and wireless home networks can be configured as peer to peer environments.&lt;br /&gt;&lt;br /&gt;Computers in a peer to peer network run the same networking protocols and software. Peer networks are also often situated physically near to each other, typically in homes, small businesses or schools. Some peer networks, however, utilize the Internet and are geographically dispersed worldwide.&lt;br /&gt;&lt;br /&gt;Home networks that utilize broadband routers are hybrid peer to peer and client-server environments. The router provides centralized Internet connection sharing, but file, printer and other resource sharing is managed directly between the local computers involved.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Peer to Peer and P2P Networks&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Internet-based peer to peer networks emerged in the 1990s due to the development of P2P file sharing networks like Napster. Technically, many P2P networks (including the original Napster) are not pure peer networks but rather hybrid designs as they utilize central servers for some functions such as search.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Peer to Peer and Ad Hoc Wi-Fi Networks&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Wi-Fi&lt;/span&gt; wireless networks support so-called ad hoc connections between devices. Ad hoc Wi-Fi networks are pure peer to peer compared to those utilizing wireless routers as an intermediate device.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Benefits of a Peer to Peer Network&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;You can configure computers in peer to peer workgroups to allow sharing of files, printers and other resources across all of the devices. Peer networks allow data to be shared easily in both directions, whether for downloads to your computer or uploads from your computer.&lt;br /&gt;&lt;br /&gt;On the Internet, peer to peer networks handle a very high volume of file sharing traffic by distributing the load across many computers. Because they do not rely exclusively on central servers, P2P networks both scale better and are more resilient than client-server networks in case of failures or traffic bottlenecks.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/7489593094202405147/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://iworldtechnology.blogspot.com/2009/06/introduction-to-peer-to-peer-networks.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/7489593094202405147'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/7489593094202405147'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/2009/06/introduction-to-peer-to-peer-networks.html' title='Introduction to Peer to Peer Networks'/><author><name>lusia</name><uri>http://www.blogger.com/profile/03546856083433806008</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='http://3.bp.blogspot.com/_uvgzkzYuoa8/STlV7-UQBXI/AAAAAAAAHBw/49ukbz_7yDg/S220/f.Bql8251938-02%5B1%5D.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9068491544299539372.post-6265816037254189174</id><published>2009-06-22T14:26:00.008+08:00</published><updated>2009-06-22T14:41:08.618+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basic Computer Network Information"/><title type='text'>Basic Computer Network Information</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Introduction&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;A network is a group of things that are connected together. In a computer network, the things that are connected are computers, of course. A computer network can be as small as two computers but there is no maximum size, and many networks have hundreds or thousands of computers.&lt;br /&gt;&lt;br /&gt;There are three main reasons for connecting computers in a network:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;1. Share information.&lt;/span&gt; This can be messages such as e-mail, or it can be files that are stored on one computer and used by someone at a different computer.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;2. Share resources.&lt;/span&gt; A printer that can be accessed from different computer systems is a shared resource. So is an Internet connection used by more than one computer.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;3. Centralized control.&lt;/span&gt; In most offices, the management determines what the computers may be used for and what kind of resources and support they need. This is much easier to deal with if the computers are connected.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Types of Networks&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Just as there is no limit to the number of systems in a network, there is also no limit to the geographical size of a network. As a practical matter though, there are some structural differences between a network of computers all in the same room, and a network connecting computers in Los Angeles to ones in Sydney Australia.&lt;br /&gt;&lt;br /&gt;The most common network includes computers that are close together, usually in the same building or office. This is called a Local Area Network, abbreviated LAN.&lt;br /&gt;&lt;br /&gt;The computers in a LAN are usually connected with cable made up of pairs of wires, but faster (and more expensive) cables are made from glass fibers, called fiber optic cable. A network may even use radio waves, in which case it is a wireless LAN.&lt;br /&gt;&lt;br /&gt;When the computers being connected are far apart, typically in different cities, it is called a WAN or Wide Area Network. The connection is usually done with special high-speed lines leased from the phone company, but it is also possible to connect over an ordinary phone line using a device called a modem. It’s slow, but possible. Accessing a network through a phone line and modem is called a dial-up connection.&lt;br /&gt;&lt;br /&gt;The biggest of all networks is the Internet. The backbone of the Internet consists of powerful computers all over the world with high-speed connections between them. Individual computers such as yours then connect to this backbone through an Internet Service Provider or ISP.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Ethernet&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Most LANs in existence today use a technology called Ethernet. In an Ethernet network, every piece of information put on the network is seen by every other computer on the network, and each computer must determine if that information is meant for itself.&lt;br /&gt;&lt;br /&gt;To make this work, before the information goes out on the network it is first broken up into small pieces called packets, and each packet has added to it the address of the computer that should receive it. The part of the packet containing the address is called the header.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Header&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj454xysXVnI_-N5qEN5tdcHA2kGIGKdEywPJXVlr1gnt01vupWProUvgHAwz1SPUxNOaivmJ6saRVe_isuxRC4gJW4VW8on0VCrIi1KcP676-Eofj-sCd5waZ0eqn2EZJ3S1wguUxV27E/s1600-h/nw_image3.gif&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 65px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj454xysXVnI_-N5qEN5tdcHA2kGIGKdEywPJXVlr1gnt01vupWProUvgHAwz1SPUxNOaivmJ6saRVe_isuxRC4gJW4VW8on0VCrIi1KcP676-Eofj-sCd5waZ0eqn2EZJ3S1wguUxV27E/s400/nw_image3.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5350034982863062690&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Packet diagram&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Then, each computer looks at the address on each packet that comes by on the network cable, and copies the ones that have the right address. The computer that sent the packet is called the source, and the one that is supposed to receive it is called the destination.&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Network Connections&lt;/span&gt;&lt;br /&gt;When a packet comes out of the computer that originated it, that packet must have a complete electrical path to every other computer. The simplest way to do this is to have a cable that goes from one computer to the next until it has connected to each one. This is called a bus network.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEA097c7Jb0RLWmNP5B5kqvGqWWwt2dX2kRD1KvXuztvsHCvXHpOvypMuyOWniv8hEi3HWFdYyJGaM7KShq0IjmBLf3Dw7GG6Pt9ZUIQB0KIbtQGGwV-V67PRjAQMPXbzKOF64ofzQNHg/s1600-h/nw_image4.gif&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 367px; height: 183px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEA097c7Jb0RLWmNP5B5kqvGqWWwt2dX2kRD1KvXuztvsHCvXHpOvypMuyOWniv8hEi3HWFdYyJGaM7KShq0IjmBLf3Dw7GG6Pt9ZUIQB0KIbtQGGwV-V67PRjAQMPXbzKOF64ofzQNHg/s400/nw_image4.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5350035519175226002&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Bus Network&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;A bus network is the simplest to explain and draw, but it’s not often the simplest one to use, especially if computers are distributed around various offices in a building, and then get added, taken away, moved around and so forth.&lt;br /&gt;&lt;br /&gt;A much more practical way to connect more than a couple of systems is to connect each one to a device called a hub. Each system has a cable that goes from it to the hub, and inside the hub an electrical connection is made between all of the cables. Each place where a cable plugs into the hub is called a port.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdG5bj-OpBMe_ulvtozVnZcu3yaAzB13aP7dfkyyTch-GE7rPcPnf6hp7JsJtbY_TC2qq4OWVczZDRWfslbsT-uvqly6dTAENYB7FXWvkFuZaLnXNx8IRYWrK7neK9crqXQMCmCqqj6zk/s1600-h/nw_image5.gif&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 259px; height: 170px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdG5bj-OpBMe_ulvtozVnZcu3yaAzB13aP7dfkyyTch-GE7rPcPnf6hp7JsJtbY_TC2qq4OWVczZDRWfslbsT-uvqly6dTAENYB7FXWvkFuZaLnXNx8IRYWrK7neK9crqXQMCmCqqj6zk/s400/nw_image5.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5350035754344584738&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;5-port hub ports&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;To create larger networks, hubs can use one or more of their connections to connect to other hubs. This is called a star network, but as far as the electrical signals are concerned, they go from one computer to every other computer, no different than the bus network.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifABJl6-bsX3kSIA5C1R8VfmQR_XbD0FGAxkfH2lUsKJr6YqoUrNNPMSn-5_dDxrDMqqGHA_QN-JStBTdasmJMsBmHjcX1i5sruH7UUUTR0NfXDJV5s40kbnMRfed8_Kt5X36CkWSOuSU/s1600-h/nw_image6.gif&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 227px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifABJl6-bsX3kSIA5C1R8VfmQR_XbD0FGAxkfH2lUsKJr6YqoUrNNPMSn-5_dDxrDMqqGHA_QN-JStBTdasmJMsBmHjcX1i5sruH7UUUTR0NfXDJV5s40kbnMRfed8_Kt5X36CkWSOuSU/s400/nw_image6.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5350036116027392354&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;3-hub star network&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;When networks get really big, with 100s of systems or more, it’s no longer such a good idea to have each computer look at every packet, because almost none of the packets will be for that computer. The large network can be broken up into smaller groups called subnets, and these are connected with a device called a data switch, or just a switch.&lt;br /&gt;&lt;br /&gt;Within each subnet, all of the computers still see every packet, and so does the switch. Normally the switch won’t pass those packets on to the other subnets, but if the packet has an address for a destination in another subnet, the switch will pass the packet to the port for that subnet. All of the systems in that subnet will then see the packet, including the system it is actually addressed to. In order to know where to send a packet, the switch must have a table of addresses for each subnet.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaU_BdPvoTheKSz7R-CTLi_7znzmQviCIhfNA1CPfXV1tkknntEDUp405qOtUbAtD1pGrlXIzyEjw78GyQbV81CmCX44Cd6zOXJ4AyxOWOJpALBUh36rOI6JOYESckY8e4oEhLzFb2r3I/s1600-h/nw_image7.gif&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 212px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaU_BdPvoTheKSz7R-CTLi_7znzmQviCIhfNA1CPfXV1tkknntEDUp405qOtUbAtD1pGrlXIzyEjw78GyQbV81CmCX44Cd6zOXJ4AyxOWOJpALBUh36rOI6JOYESckY8e4oEhLzFb2r3I/s400/nw_image7.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5350036477874199170&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Switch with 4 subnets&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The simplest form of a switch is called a bridge, and it connects just two subnets. A bridge only needs two ports then, one for each of the subnets.&lt;br /&gt;&lt;br /&gt;Sometimes a network will be so big and complex that one switch isn’t enough to connect all of the subnets. In that case the subnet receiving a packet might be connected to a different switch than the subnet where the packet started. This is a more complicated problem, because the switch would need to know not only the packet’s destination, but also where to send it next to make sure it got there.&lt;br /&gt;&lt;br /&gt;For this, a smarter device is needed, called a router. The router needs to know not only the subnet addresses, but also the best path, or route, to get from one to another.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiF1dW1pVMhF92QIqtbeyFCW8uEokWJ08AhQaObWL8T_M0DU51LpO5nwzGKp7VgMSGsbjgMllvyG3AJgTAllLdccVHzqOm3okPT52jeJ3NpmGlfufn8o_pE4NJjPM4XzW2hKMXKrIGciXA/s1600-h/nw_image8.gif&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 151px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiF1dW1pVMhF92QIqtbeyFCW8uEokWJ08AhQaObWL8T_M0DU51LpO5nwzGKp7VgMSGsbjgMllvyG3AJgTAllLdccVHzqOm3okPT52jeJ3NpmGlfufn8o_pE4NJjPM4XzW2hKMXKrIGciXA/s400/nw_image8.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5350036766032660482&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Route path diagram&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;One place where routers are used in a big way is the Internet. If you send a message on the Internet, it might go through many routers before it reaches its destination. And when you surf to a website, all of the graphics and text showing up on your screen had to go through routers to find their way from the web site to your computer.&lt;br /&gt;&lt;br /&gt;By the way, every LAN that connects to the Internet becomes a subnet of the Internet, even if it has its own internal subnets.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Clients and Servers&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;In addition to the various ways networked systems can be physically connected, there are two basic ways that network activities can be arranged. In one, all of the computers have equal status. This is called peer-to-peer, because a peer means someone (or something) that is the equal of another. Peer-to-peer is used mostly in very small networks of less than a dozen systems.&lt;br /&gt;&lt;br /&gt;The more common arrangement is called client-server. One system, called the server, is responsible for a particular activity or resource. The other systems are called clients, and they go through the server when they want to use the function or resource that the server is responsible for.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Some of the things servers are commonly used for include network administration, e-mail, printers, file storage, and Internet access. Often several of these functions will be combined into one machine. There is no rule that says a network server and a print server can’t be the same system.&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Clients Server&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOHXgvaUcSiz_1i6o-1PTlO23p575wlpACUs0gRa2ReiWKzCRwb5oix5oiuu3BN9bZzEY-fOr_FZKh0X7g6MNaah-lViJHWpdiRLvwzaibXDN2SpCQObpUr75OxszOyvf7rVcMw-DNxfE/s1600-h/nw_image9.gif&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 335px; height: 80px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOHXgvaUcSiz_1i6o-1PTlO23p575wlpACUs0gRa2ReiWKzCRwb5oix5oiuu3BN9bZzEY-fOr_FZKh0X7g6MNaah-lViJHWpdiRLvwzaibXDN2SpCQObpUr75OxszOyvf7rVcMw-DNxfE/s400/nw_image9.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5350037162682375282&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center; font-weight: bold;&quot;&gt;print server&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify; font-weight: normal;&quot;&gt;There is also no rule that says a server must serve the entire network. It is usually convenient to have a separate network server for each subnet. There are other divisions that can occur even within a subnet. Computers that need to share the same resources can be organized into workgroups. With the Windows NT operating system, the LAN can be divided into sections called domains, and each domain needs its own server called a domain controller.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Protocols&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;A protocol is an agreed-upon standard for how something will be done. When your mother taught you to chew with your mouth closed and keep your elbows off the table, that was a protocol for proper dining. Computer protocols are the rules for connecting with other computers and exchanging information with them.&lt;br /&gt;&lt;br /&gt;Ethernet is a protocol. Earlier we called it a technology, but it is also a set of rules for how that technology is used. If each piece of hardware and software complies with the rules, then information can be correctly transferred from one from one system to another in a LAN.&lt;br /&gt;&lt;br /&gt;There are many protocols used in networking. There are some protocols that are used together with other protocols, where each one takes care of different aspects of networking. Sometimes two protocols do the same thing in different ways, and it is necessary to choose one or the other. The important thing is that both systems trying to communicate with each other have matching protocols that they can use.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;TCP/IP&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;One very important set of protocols is called TCP/IP. It is important because it is what the creators of the Internet decided would be used for that particular network, which means that any computer that wants to connect to the Internet must also use TCP/IP. TCP/IP stands for Transmission Control Protocol / Internet Protocol.&lt;br /&gt;&lt;br /&gt;TCP/IP is actually in two parts. The TCP portion covers the agreements between systems about how they will carry on their ‘conversation’, and the IP portion deals with addressing the packets and routing them.&lt;br /&gt;&lt;br /&gt;The TCP part all happens in the background and we don’t really need to concern ourselves with it under normal circumstances. However, in a network that uses TCP/IP, every system must have a unique IP address, and that is something that requires human intervention in one way or another.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;IP Addresses&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;An IP address is made up of four sets of numbers separated by periods. An example is:&lt;br /&gt;&lt;br /&gt;192.168.42.122&lt;br /&gt;&lt;br /&gt;Each of these sets of numbers is called an octet, because they started out as 8-digit binary numbers. By changing them into 3-digit decimal numbers, the whole address is shorter and easier to remember. The highest value for any octet is 255, because the highest number you can make with eight binary digits is equal to 255 in decimal.&lt;br /&gt;&lt;br /&gt;In most networks, the first three octets are the same for all systems, and the last octet is different for every machine. If there are more than 255 computers in a network, it is usually divided into smaller subnets.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Static or Dynamic?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;There are two ways to associate a unique IP address to a specific computer. One way is for the administrator to assign a number, which stays the same unless somebody decides to change it some day. That number is then a static IP address.&lt;br /&gt;&lt;br /&gt;The other way is to assign a group of addresses to a server, and let the server hand them out as needed to any system that wants to communicate on the network. This produces a dynamic IP address. It is sometimes important to know which method is in use on a network, because with dynamic addressing, the IP address of a machine may be different each time you try to communicate with it.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Computer Names&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The example address 192.168.42.122 is only one digit longer than a phone number with area code, but that’s plenty long enough to give most of us a hard time. It’s much easier for people to remember a name instead of a number, and for this reason computers in a network are also given a unique name. It may be something mundane like Sales14, but at least it’s a name and not a number.&lt;br /&gt;&lt;br /&gt;This is not only easier to remember, but it solves the problem of a dynamic address that changes all the time, because the computer name doesn’t normally change. It does create another problem though, because the computers use only the addresses and not the names to keep track of each other. Fortunately there is a part of the TCP/IP protocol called address resolution, and it matches up the names and addresses so things keep rolling smoothly along.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Security&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The problem with connecting computers to the Internet is that they are then sharing a network with many other computers from all over the world, and the users of some of those other computers are not such nice folks. Protecting the network and the information on it is one of the most important parts of a network administrator’s job.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Encryption&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;One way to protect information is to scramble it so that it appears to be gibberish unless someone has the right ‘key’ to unscramble it. Scrambling it is called encryption, and unscrambling it is called decryption. There are many ways to encrypt information, and of course just as many keys to decrypt it.&lt;br /&gt;&lt;br /&gt;Encrypting and decrypting information slows things down a bit, so a decision must be made about when to use it. For packets going around the LAN, it depends on how likely it is that someone will gain unauthorized access to the LAN, called hacking. It also depends on how much damage would be done if that happened. If the threat is severe, encryption can be done not only on the transmitted packets but also to information stored on the disk drive.&lt;br /&gt;&lt;br /&gt;For information going over the Internet, encryption is much more important unless it’s all right for the whole world to see the information. If you send your credit card number to a vendor, you must trust that vendor to encrypt and safeguard the information.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Virus Software&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;A computer virus is a little program that makes copies of itself to send to other computers. It’s very similar in some ways to contagious germs spreading a disease from one person to the next. And like diseases, some of these computer viruses have some really nasty side effects, like wiping out important files in the operating system or filling up the hard drive with garbage data.&lt;br /&gt;&lt;br /&gt;As we will discuss a little later, there are ways to keep these virus programs from getting to your computer, but they are not foolproof. A lot of viruses come in attached to e-mail, and then they will mail copies of themselves to everyone in your e-mail address folder. You can’t completely block them without blocking e-mail, and most of us like to get e-mail from our friends and coworkers.&lt;br /&gt;&lt;br /&gt;The most important prevention for viruses is to have a good anti-virus program installed on your computer. Norton, McCaffey and Panda are probably the most popular. The next most important thing is to keep the anti-virus software up-to-date, because the delinquents who write virus software are always coming up with new tricks, and the anti-virus companies are just as quickly coming up with new versions to stop them.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Access Control&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;If you have ever had a computer that was connected to a local area network, you almost certainly had to type in a user name and password to get network access. It’s two forms of ID, just like when you cash a check at department store.&lt;br /&gt;&lt;br /&gt;The network administrator used that identification information to determine what you could and couldn’t do on the network. And there may have been additional passwords to access the company’ customer database, employee payroll records, or files stored on someone else’s computer.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Here are a few tips about passwords:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;   1. First, if you share files on your computer, use password protection for them even if they are available to everyone in the network. That way they can’t be tampered with if a hacker breaks in.&lt;br /&gt;&lt;br /&gt;   2. In choosing a password, never use your name, your birthday or other obvious personal information. The best is a random combination of letters and numbers.&lt;br /&gt;&lt;br /&gt;   3. Commit the password to memory, and if you must write it down, hide it. A password written on a post-it note stuck to your monitor is probably worse than no password at all.&lt;br /&gt;&lt;br /&gt;   4. Don’t give your password to someone you don’t know personally just because they claim to be tech support, the phone company, the police or your long-lost Aunt Matilda. Refer them to the network administrator, or better yet, get their phone number and have the network administrator call them back.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Firewalls&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;In a building, a firewall is a wall to keep fire from spreading from one area to another. In a computer network, a firewall is a boundary that can block unwanted data packets. The firewall may be program running on the server or router, or it may be a separate piece of hardware or even a complete computer system just for that purpose. In any case, its purpose is to look at all of the packets coming through, and decide which ones can pass and which ones get blocked.&lt;br /&gt;&lt;br /&gt;Ports – Several pages ago, we defined a port as the place in a hub that a cable plugs into. There is another completely different kind of thing called a port, and that is a location in a computer’s memory that is used by a device or application to send and receive data. Each application will have one (or more) of these locations for its own use.&lt;br /&gt;&lt;br /&gt;For instance, there is a common e-mail program that has port # 110, which means that the program exchanges information with the rest of the system at memory location 110. The popular game called Doom uses port # 666.&lt;br /&gt;&lt;br /&gt;When a packet is sent over a network, it will contain not only the destination address, but also the port number of the application that will use it at that destination. One of the ways a firewall controls the packets is by looking at the port number, and only passing packets with ports that are appropriate for the destination. If nobody should be playing Doom on the network’s computers, then it would make sense to block port 666.&lt;br /&gt;&lt;br /&gt;Another way a firewall can control traffic is to look at the source of the packet. It can have a ‘prohibited’ list that keeps out packets from certain IP addresses, or it can have an ‘allowed’ list and block everyone who isn’t on it. Ports can be done the same way, with a ‘prohibited’ or ‘allowed’ list of ports.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Conclusion&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;There is much more to know about security, and about networks in general, if one is to be involved in managing them. The purpose of this paper is to present just enough information to enable you talk with network administrators and to understand their concerns when presenting network products to them. For additional training in this subject, we recommend the Micro2000 A+ and Network+ courses.&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/6265816037254189174/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://iworldtechnology.blogspot.com/2009/06/basic-computer-network-information.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/6265816037254189174'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/6265816037254189174'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/2009/06/basic-computer-network-information.html' title='Basic Computer Network Information'/><author><name>Anoch</name><uri>http://www.blogger.com/profile/04476308430111490191</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://4.bp.blogspot.com/_PhBjyzX5WKU/SWbAZ-YUFVI/AAAAAAAAAAo/5HJ2SnEe2Yg/S220/SHARMY-27.01.08+021.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj454xysXVnI_-N5qEN5tdcHA2kGIGKdEywPJXVlr1gnt01vupWProUvgHAwz1SPUxNOaivmJ6saRVe_isuxRC4gJW4VW8on0VCrIi1KcP676-Eofj-sCd5waZ0eqn2EZJ3S1wguUxV27E/s72-c/nw_image3.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9068491544299539372.post-710747149846493902</id><published>2009-06-22T14:24:00.000+08:00</published><updated>2009-06-22T14:26:26.464+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Fundamental Computer Networks Concepts"/><title type='text'>WWW - World Wide Web</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;Definition: The term WWW refers to the World Wide Web or simply the Web. The World Wide Web consists of all the public Web sites connected to the Internet worldwide, including the client devices (such as computers and cell phones) that access Web content. The WWW is just one of many applications of the Internet and computer networks.&lt;br /&gt;&lt;br /&gt;The World Web is based on these technologies:&lt;br /&gt;&lt;br /&gt;    * HTML - Hypertext Markup Language&lt;br /&gt;    * HTTP - Hypertext Transfer Protocol&lt;br /&gt;    * Web servers and Web browsers&lt;br /&gt;&lt;br /&gt;Researcher Tim Berners-Lee led the development of the original World Wide Web in the late 1980s and early 1990s. He helped build prototypes of the above Web technologies and coined the term WWW. Web sites and Web browsing exploded in popularity during the mid-1990s.&lt;br /&gt;Also Known As: World Wide Web, The Web&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/710747149846493902/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://iworldtechnology.blogspot.com/2009/06/www-world-wide-web.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/710747149846493902'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/710747149846493902'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/2009/06/www-world-wide-web.html' title='WWW - World Wide Web'/><author><name>Anoch</name><uri>http://www.blogger.com/profile/04476308430111490191</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://4.bp.blogspot.com/_PhBjyzX5WKU/SWbAZ-YUFVI/AAAAAAAAAAo/5HJ2SnEe2Yg/S220/SHARMY-27.01.08+021.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9068491544299539372.post-3476291495143570341</id><published>2009-06-22T14:23:00.000+08:00</published><updated>2009-06-22T14:24:37.889+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Fundamental Computer Networks Concepts"/><title type='text'>Fundamental Computer Networks Concepts</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;In the world of computers, networking is the practice of linking two or more computing devices together for the purpose of sharing data. Networks are built with a combination of computer hardware and computer software. Some explanations of networking found in books and tutorials are highly technical, designed for students and professionals, while others are geared more to home and business uses of computer networks.&lt;br /&gt;&lt;br /&gt;    * What Is Computer Networking?&lt;br /&gt;    * What Is Wireless Networking?&lt;br /&gt;    * World Wide Web (WWW)&lt;br /&gt;&lt;br /&gt;    * Client-Server Networks&lt;br /&gt;    * Peer-to-Peer Networks&lt;br /&gt;    * Free Computer Networking Books for Students&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/3476291495143570341/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://iworldtechnology.blogspot.com/2009/06/fundamental-computer-networks-concepts.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/3476291495143570341'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/3476291495143570341'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/2009/06/fundamental-computer-networks-concepts.html' title='Fundamental Computer Networks Concepts'/><author><name>Anoch</name><uri>http://www.blogger.com/profile/04476308430111490191</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://4.bp.blogspot.com/_PhBjyzX5WKU/SWbAZ-YUFVI/AAAAAAAAAAo/5HJ2SnEe2Yg/S220/SHARMY-27.01.08+021.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9068491544299539372.post-5159978941116336642</id><published>2009-06-22T14:19:00.001+08:00</published><updated>2009-06-22T14:23:47.871+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer and Wireless Networking Basic"/><title type='text'>Computer and Wireless Networking Basics</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;These pages review the types of designs, equipment, protocols and other technologies essential to building computer networks. You will learn how home and other private networks, public hotspots and the Internet function.&lt;br /&gt;&lt;br /&gt;   1. Fundamental Computer Networks Concepts&lt;br /&gt;   2. Types of Computer Networks&lt;br /&gt;   3. Types of Network Equipment&lt;br /&gt;   4. Ethernet&lt;br /&gt;&lt;br /&gt;   5. Wireless Local Area Networks&lt;br /&gt;   6. Internet Service&lt;br /&gt;   7. TCP/IP and Other Internet Protocols&lt;br /&gt;   8. Network Routing, Switching and Bridging&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/5159978941116336642/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://iworldtechnology.blogspot.com/2009/06/computer-and-wireless-networking-basics.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/5159978941116336642'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/5159978941116336642'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/2009/06/computer-and-wireless-networking-basics.html' title='Computer and Wireless Networking Basics'/><author><name>Anoch</name><uri>http://www.blogger.com/profile/04476308430111490191</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://4.bp.blogspot.com/_PhBjyzX5WKU/SWbAZ-YUFVI/AAAAAAAAAAo/5HJ2SnEe2Yg/S220/SHARMY-27.01.08+021.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9068491544299539372.post-402563874177869</id><published>2009-01-15T02:02:00.000+08:00</published><updated>2009-01-15T02:02:00.915+08:00</updated><title type='text'>Protocol (Network)</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;A network protocol defines rules and conventions for communication between network devices. Protocols for computer networking all generally use packet switching techniques to send and receive messages in the form of packets.&lt;br /&gt;&lt;br /&gt;Network protocols include mechanisms for devices to identify and make connections with each other, as well as formatting rules that specify how data is packaged into messages sent and received. Some protocols also support message acknowledgement and data compression designed for reliable and/or high-performance network communication. Hundreds of different computer network protocols have been developed each designed for specific purposes and environments.&lt;br /&gt;Internet Protocols&lt;br /&gt;The Internet Protocol family contains a set of related (and among the most widely used network protocols. Besides Internet Protocol (IP) itself, higher-level protocols like TCP, UDP, HTTP, and FTP all integrate with IP to provide additional capabilities. Similarly, lower-level Internet Protocols like ARP and ICMP also co-exist with IP. These higher level protocols interact more closely with applications like Web browsers while lower-level protocols interact with network adapters and other computer hardware.&lt;br /&gt;Routing Protocols&lt;br /&gt;Routing protocols are special-purpose protocols designed specifically for use by network routers on the Internet. Common routing protocols include EIGRP, OSPF and BGP.&lt;br /&gt;How Network Protocols Are Implemented&lt;br /&gt;Modern operating systems like Microsoft Windows contain built-in services or daemons that implement support for some network protocols. Applications like Web browsers contain software libraries that support the high level protocols necessary for that application to function. For some lower level TCP/IP and routing protocols, support is implemented in directly hardware (silicon chipsets) for improved performance.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/402563874177869/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://iworldtechnology.blogspot.com/2009/01/protocol-network.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/402563874177869'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/402563874177869'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/2009/01/protocol-network.html' title='Protocol (Network)'/><author><name>Anoch</name><uri>http://www.blogger.com/profile/04476308430111490191</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://4.bp.blogspot.com/_PhBjyzX5WKU/SWbAZ-YUFVI/AAAAAAAAAAo/5HJ2SnEe2Yg/S220/SHARMY-27.01.08+021.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9068491544299539372.post-4227805627842669761</id><published>2009-01-13T02:00:00.000+08:00</published><updated>2009-01-13T02:02:33.212+08:00</updated><title type='text'>Bluetooth</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Bluetooth&lt;/span&gt; is a specification for the use of low-power radio communications to wirelessly link phones, computers and other network devices over short distances. The name Bluetooth is borrowed from Harald &lt;span style=&quot;font-weight: bold;&quot;&gt;Bluetooth&lt;/span&gt;, a king in Denmark more than 1,000 years ago.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Bluetooth&lt;/span&gt; technology was designed primarily to support simple wireless networking of personal consumer devices and peripherals, including cell phones, PDAs, and wireless headsets. Wireless signals transmitted with &lt;span style=&quot;font-weight: bold;&quot;&gt;Bluetooth&lt;/span&gt; cover short distances, typically up to 30 feet (10 meters). Bluetooth devices generally communicate at less than 1 Mbps.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Bluetooth&lt;/span&gt; networks feature a dynamic topology called a piconet or PAN. Piconets contain a minimum of two and a maximum of eight Bluetooth peer devices. Devices communicate using protocols that are part of the Bluetooth Specification. Definitions for multiple versions of the Bluetooth specification exist including versions 1.1, 1.2 and 2.0.&lt;br /&gt;&lt;br /&gt;Although the Bluetooth standard utilizes the same 2.4 Ghz range as 802.11b and 802.11g, Bluetooth technology is not a suitable Wi-Fi replacement. Compared to Wi-Fi, Bluetooth networking is much slower, a bit more limited in range, and supports many fewer devices.&lt;br /&gt;&lt;br /&gt;As is true for Wi-Fi and other wireless technologies today, concerns with Bluetooth technology include security and interoperability with other networking standards. Bluetooth was ratified as IEEE 802.15.1.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Also Known As: Blue Tooth&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/4227805627842669761/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://iworldtechnology.blogspot.com/2009/01/bluetooth.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/4227805627842669761'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/4227805627842669761'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/2009/01/bluetooth.html' title='Bluetooth'/><author><name>Anoch</name><uri>http://www.blogger.com/profile/04476308430111490191</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://4.bp.blogspot.com/_PhBjyzX5WKU/SWbAZ-YUFVI/AAAAAAAAAAo/5HJ2SnEe2Yg/S220/SHARMY-27.01.08+021.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9068491544299539372.post-8263510253424101514</id><published>2009-01-13T01:59:00.000+08:00</published><updated>2009-01-13T02:00:21.544+08:00</updated><title type='text'>What is Wireless Computer Networking?</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;Wireless networks utilize radio waves and/or microwaves to maintain communication channels between computers. Wireless networking is a more modern alternative to wired networking that relies on copper and/or fiber optic cabling between network devices.&lt;br /&gt;&lt;br /&gt;A wireless network offers advantages and disadvantages compared to a wired network. Advantages of wireless include mobility and elimination of unsightly cables. Disadvantages of wireless include the potential for radio interference due to weather, other wireless devices, or obstructions like walls.&lt;br /&gt;&lt;br /&gt;Wireless is rapidly gaining in popularity for both home and business networking. Wireless technology continues to improve, and the cost of wireless products continues to decrease. Popular wireless local area networking (WLAN) products conform to the 802.11 &quot;Wi-Fi&quot; standards. The gear a person needs to build wireless networks includes network adapters (NICs), access points (APs), and routers.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/8263510253424101514/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://iworldtechnology.blogspot.com/2009/01/what-is-wireless-computer-networking.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/8263510253424101514'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/8263510253424101514'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/2009/01/what-is-wireless-computer-networking.html' title='What is Wireless Computer Networking?'/><author><name>Anoch</name><uri>http://www.blogger.com/profile/04476308430111490191</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://4.bp.blogspot.com/_PhBjyzX5WKU/SWbAZ-YUFVI/AAAAAAAAAAo/5HJ2SnEe2Yg/S220/SHARMY-27.01.08+021.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9068491544299539372.post-6617574598528509109</id><published>2009-01-06T22:46:00.001+08:00</published><updated>2009-01-06T22:55:14.951+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="your way to success"/><title type='text'>Networking is your way to success</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;Any expert will tell you that networking is one of the best ways to advance your career, and it&#39;s also a good source of support for everyday job concerns. Employers, especially those with good diversity programs, also recognize the value of networking, and there are official -- as well as unofficial -- networks for virtually every group.&lt;br /&gt;&lt;br /&gt;&quot;A lot of people of color find these networks especially important,&quot; says Cornelia Gamlem, president of the GEMS Group, a human resources consulting firm in Herndon, Virginia. &quot;They can be a kind of balance in understanding whether a situation is unique or if it&#39;s something other people have gone through as well. [Networks] can help people avoid that feeling of being isolated and overcome problems all on their own.&quot;&lt;br /&gt;&lt;br /&gt;But remember that how you network is just as important as whether you network. Here are some rules to network by:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Get an Early Start&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The sooner you start creating a network, the faster you&#39;ll progress in your career. Many professional societies have student chapters in colleges and universities. Making connections early will give you a head start on your job search. Keep your eyes open for networking opportunities as soon as you&#39;ve landed a job.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Look Before You Leap&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&quot;Be careful of whom you ally yourself with,&quot; warns Mary Jane Sinclair, president of MJS Associates in Morristown, New Jersey. &quot;They may be using you to advance an issue.&quot; Sinclair uses an example of a young college grad who joined an in-company women&#39;s network. However, rather than advancing the members&#39; cause, this network was more interested in taking on management. &quot;This woman was viewed by management as a troublemaker,&quot; Sinclair says. Once you&#39;ve taken a job, carefully find the networks that will be most beneficial to you and your career.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;If at First You Don&#39;t Succeed, Try Again&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Unfortunately, there isn&#39;t always an obvious network to join. For instance, if you&#39;re an African American woman in a sea of white colleagues, it may not be easy to align yourself with others in the company. See if there&#39;s a local professional organization with African American members. Or seek out people in your community. Don&#39;t just limit yourself to racial or gender categories.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Cast a Wide Net&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&quot;Look for support wherever you find it,&quot; Sinclair says. &quot;Networking really works best when the group&#39;s common interest isn&#39;t just race or gender, but the success of each member in the group.&quot; Establishing a broad network enables you to turn to different groups, depending on your professional challenges. &quot;Without a broad-based network, there&#39;s no one to turn to in a time of crisis,&quot; Sinclair says. &quot;The broader you cast your net, the broader your catch will be.&quot;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;display: block;&quot; id=&quot;formatbar_Buttons&quot;&gt;&lt;span class=&quot;&quot; style=&quot;display: block;&quot; id=&quot;formatbar_JustifyFull&quot; title=&quot;Justify Full&quot; onmouseover=&quot;ButtonHoverOn(this);&quot; onmouseout=&quot;ButtonHoverOff(this);&quot; onmouseup=&quot;&quot; onmousedown=&quot;CheckFormatting(event);FormatbarButton(&#39;richeditorframe&#39;, this, 13);ButtonMouseDown(this);&quot;&gt;&lt;img src=&quot;img/blank.gif&quot; alt=&quot;Justify Full&quot; class=&quot;gl_align_full&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/6617574598528509109/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://iworldtechnology.blogspot.com/2009/01/networking-is-your-way-to-success.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/6617574598528509109'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/6617574598528509109'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/2009/01/networking-is-your-way-to-success.html' title='Networking is your way to success'/><author><name>Anoch</name><uri>http://www.blogger.com/profile/04476308430111490191</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://4.bp.blogspot.com/_PhBjyzX5WKU/SWbAZ-YUFVI/AAAAAAAAAAo/5HJ2SnEe2Yg/S220/SHARMY-27.01.08+021.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9068491544299539372.post-8663347970762218372</id><published>2008-12-31T02:23:00.001+08:00</published><updated>2008-12-31T02:28:11.690+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Introduction to Client Server Networks"/><title type='text'>Client Server Networks</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Introduction to Client Server Networks&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The term client-server refers to a popular model for computer networking that utilizes client and server devices each designed for specific purposes. The client-server model can be used on the Internet as well as local area networks (LANs). Examples of client-server systems on the Internet include Web browsers and Web servers, FTP clients and servers, and DNS.&lt;br /&gt;Client and Server Devices&lt;br /&gt;Client/server networking grew in popularity many years ago as personal computers (PCs) became the common alternative to older mainframe computers. Client devices are typically PCs with network software applications installed that request and receive information over the network. Mobile devices as well as desktop computers can both function as clients.&lt;br /&gt;&lt;br /&gt;A server device typically stores files and databases including more complex applications like Web sites. Server devices often feature higher-powered central processors, more memory, and larger disk drives than clients.&lt;br /&gt;Client-Server Applications&lt;br /&gt;The client-server model distinguishes between applications as well as devices. Network clients make requests to a server by sending messages, and servers respond to their clients by acting on each request and returning results. One server generally supports numerous clients, and multiple servers can be networked together in a pool to handle the increased processing load as the number of clients grows.&lt;br /&gt;&lt;br /&gt;A client computer and a server computer are usually two separate devices, each customized for their designed purpose. For example, a Web client works best with a large screen display, while a Web server does not need any display at all and can be located anywhere in the world. However, in some cases a given device can function both as a client and a server for the same application. Likewise, a device that is a server for one application can simultaneously act as a client to other servers, for different applications.&lt;br /&gt;&lt;br /&gt;[Some of the most popular applications on the Internet follow the client-server model including email, FTP and Web services. Each of these clients features a user interface (either graphic- or text-based) and a client application that allows the user to connect to servers. In the case of email and FTP, users enter a computer name (or sometimes an IP address) into the interface to set up connections to the server.&lt;br /&gt;Local Client-Server Networks&lt;br /&gt;Many home networks utilize client-server systems without even realizing it. Broadband routers, for example, contain DHCP servers that provide IP addresses to the home computers (DHCP clients). Other types of network servers found in home include print servers and backup servers.&lt;br /&gt;Client-Server vs Peer-to-Peer and Other Models&lt;br /&gt;The client-server model was originally developed to allow more users to share access to database applications. Compared to the mainframe approach, client-server offers improved scalability because connections can be made as needed rather than being fixed. The client-server model also supports modular applications that can make the job of creating software easier. In so-called &quot;two-tier&quot; and &quot;three-tier&quot; types of client-server systems, software applications are separated into modular pieces, and each piece is installed on clients or servers specialized for that subsystem.&lt;br /&gt;&lt;br /&gt;Client-server is just one approach to managing network applications The primary alternative, peer-to-peer networking, models all devices as having equivalent capability rather than specialized client or server roles. Compared to client-server, peer to peer networks offer some advantages such as more flexibility in growing the system to handle large number of clients. Client-server networks generally offer advantages in keeping data secure.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/8663347970762218372/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://iworldtechnology.blogspot.com/2008/12/client-server-networks.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/8663347970762218372'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/8663347970762218372'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/2008/12/client-server-networks.html' title='Client Server Networks'/><author><name>Anoch</name><uri>http://www.blogger.com/profile/04476308430111490191</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://4.bp.blogspot.com/_PhBjyzX5WKU/SWbAZ-YUFVI/AAAAAAAAAAo/5HJ2SnEe2Yg/S220/SHARMY-27.01.08+021.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9068491544299539372.post-5097419859671533839</id><published>2008-12-21T00:21:00.000+08:00</published><updated>2008-12-21T00:22:21.333+08:00</updated><title type='text'>What Is the IP Address of a Router?</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;A typical home network router possesses two IP addresses, one for the internal home (LAN) and one for the external Internet (WAN) connection. How can you find the router IP addresses?&lt;br /&gt;&lt;br /&gt;he internal, LAN-IP address is normally set to a default, private number. Linksys routers, for example, use 192.168.1.1 for their internal IP address. D-Link and Netgear routers typically use 192.168.0.1. Some US Robotics routers use 192.168.123.254, and some SMC routers use 192.168.2.1. No matter the brand of router, its default internal IP address should be provided in documentation. Administrators often have the option to change this IP address during router setup. In any case, however, the private LAN-IP address remains fixed once set. It can be viewed from the router&#39;s administrative console.&lt;br /&gt;&lt;br /&gt;The external, WAN-IP address of the router is set when the router connects to the Internet service provider. This address can also be viewed on the router&#39;s administrative console. Alternatively, the WAN-IP address can be found by visiting a Web-based IP address lookup service like www.checkip.dyndns.org/ from any computer on the home LAN.&lt;br /&gt;&lt;br /&gt;Another way to identify the public IP addresses of routers, involves executing a ping or &quot;traceroute&quot; command. From inside a home network, the (DOS) command &quot;ping -r 1&quot; will send a message through the home router that will cause its IP address to be displayed. For example, &quot;ping -r 1 www.yahoo.com&quot; should result in a message like the following displayed on the command prompt:&lt;br /&gt;&lt;br /&gt;      Reply from 66.94.230.43: bytes=32 time=294ms TTL=56&lt;br /&gt;      Route: 209.179.21.76&lt;br /&gt;      ...&lt;br /&gt;&lt;br /&gt;In this example, the IP address after &quot;Route:&quot; (209.179.21.76) corresponds to the router WAN address.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;On corporate networks, network discovery services based on SNMP can automatically determine the IP addresses of routers and many other network devices.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/5097419859671533839/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://iworldtechnology.blogspot.com/2008/12/what-is-ip-address-of-router.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/5097419859671533839'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/5097419859671533839'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/2008/12/what-is-ip-address-of-router.html' title='What Is the IP Address of a Router?'/><author><name>Anoch</name><uri>http://www.blogger.com/profile/04476308430111490191</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://4.bp.blogspot.com/_PhBjyzX5WKU/SWbAZ-YUFVI/AAAAAAAAAAo/5HJ2SnEe2Yg/S220/SHARMY-27.01.08+021.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9068491544299539372.post-2112093706824537397</id><published>2008-12-21T00:18:00.002+08:00</published><updated>2008-12-21T00:20:27.459+08:00</updated><title type='text'>The ISO/OSI Reference Model</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;The International Standards Organization (ISO) Open Systems Interconnect (OSI) Reference Model defines seven layers of communications types, and the interfaces among them. (See Figure 1.) Each layer depends on the services provided by the layer below it, all the way down to the physical network hardware, such as the computer&#39;s network interface card, and the wires that connect the cards together.&lt;br /&gt;&lt;br /&gt;An easy way to look at this is to compare this model with something we use daily: the telephone. In order for you and I to talk when we&#39;re out of earshot, we need a device like a telephone. (In the ISO/OSI model, this is at the application layer.) The telephones, of course, are useless unless they have the ability to translate the sound into electronic pulses that can be transferred over wire and back again. (These functions are provided in layers below the application layer.) Finally, we get down to the physical connection: both must be plugged into an outlet that is connected to a switch that&#39;s part of the telephone system&#39;s network of switches.&lt;br /&gt;&lt;br /&gt;If I place a call to you, I pick up the receiver, and dial your number. This number specifies which central office to which to send my request, and then which phone from that central office to ring. Once you answer the phone, we begin talking, and our session has begun. Conceptually, computer networks function exactly the same way.&lt;br /&gt;&lt;br /&gt;It isn&#39;t important for you to memorize the ISO/OSI Reference Model&#39;s layers; but it&#39;s useful to know that they exist, and that each layer cannot work without the services provided by the layer below it.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;font-weight: bold; text-align: justify;&quot;&gt;Figure 1: The ISO/OSI Reference Model&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOCHUmKBVniI9WeRhRiCzTYrWHZe-tMgzKNBy5RK8sM7k-VhRJLVytOrJy-g-zMNgvcYJq5-F7nfgr4Xuqbj-zjDlZfZEMxtk6xZiV9zCgv19I38342x6LW8b765KqfnQeK_eMCDEnSBA/s1600-h/img1.gif&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 142px; height: 208px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOCHUmKBVniI9WeRhRiCzTYrWHZe-tMgzKNBy5RK8sM7k-VhRJLVytOrJy-g-zMNgvcYJq5-F7nfgr4Xuqbj-zjDlZfZEMxtk6xZiV9zCgv19I38342x6LW8b765KqfnQeK_eMCDEnSBA/s400/img1.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5281907753411681138&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/2112093706824537397/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://iworldtechnology.blogspot.com/2008/12/isoosi-reference-model.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/2112093706824537397'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/2112093706824537397'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/2008/12/isoosi-reference-model.html' title='The ISO/OSI Reference Model'/><author><name>Anoch</name><uri>http://www.blogger.com/profile/04476308430111490191</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://4.bp.blogspot.com/_PhBjyzX5WKU/SWbAZ-YUFVI/AAAAAAAAAAo/5HJ2SnEe2Yg/S220/SHARMY-27.01.08+021.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOCHUmKBVniI9WeRhRiCzTYrWHZe-tMgzKNBy5RK8sM7k-VhRJLVytOrJy-g-zMNgvcYJq5-F7nfgr4Xuqbj-zjDlZfZEMxtk6xZiV9zCgv19I38342x6LW8b765KqfnQeK_eMCDEnSBA/s72-c/img1.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9068491544299539372.post-6698664888655224378</id><published>2008-12-21T00:18:00.001+08:00</published><updated>2008-12-21T00:18:46.599+08:00</updated><title type='text'>What is a Network?</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;A ``network&#39;&#39; has been defined[1] as ``any set of interlinking lines resembling a net, a network of roads || an interconnected system, a network of alliances.&#39;&#39; This definition suits our purpose well: a computer network is simply a system of interconnected computers. How they&#39;re connected is irrelevant, and as we&#39;ll soon see, there are a number of ways to do this.&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/6698664888655224378/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://iworldtechnology.blogspot.com/2008/12/what-is-network.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/6698664888655224378'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/6698664888655224378'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/2008/12/what-is-network.html' title='What is a Network?'/><author><name>Anoch</name><uri>http://www.blogger.com/profile/04476308430111490191</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://4.bp.blogspot.com/_PhBjyzX5WKU/SWbAZ-YUFVI/AAAAAAAAAAo/5HJ2SnEe2Yg/S220/SHARMY-27.01.08+021.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9068491544299539372.post-2808798021994425159</id><published>2008-12-21T00:14:00.000+08:00</published><updated>2008-12-21T00:18:14.866+08:00</updated><title type='text'>Introduction to Networking</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;A basic understanding of computer networks is requisite in order to understand the principles of network security. In this section, we&#39;ll cover some of the foundations of computer networking, then move on to an overview of some popular networks. Following that, we&#39;ll take a more in-depth look at TCP/IP, the network protocol suite that is used to run the Internet and many intranets.&lt;br /&gt;&lt;br /&gt;Once we&#39;ve covered this, we&#39;ll go back and discuss some of the threats that managers and administrators of computer networks need to confront, and then some tools that can be used to reduce the exposure to the risks of network computing.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/2808798021994425159/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://iworldtechnology.blogspot.com/2008/12/introduction-to-networking.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/2808798021994425159'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/2808798021994425159'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/2008/12/introduction-to-networking.html' title='Introduction to Networking'/><author><name>Anoch</name><uri>http://www.blogger.com/profile/04476308430111490191</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://4.bp.blogspot.com/_PhBjyzX5WKU/SWbAZ-YUFVI/AAAAAAAAAAo/5HJ2SnEe2Yg/S220/SHARMY-27.01.08+021.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9068491544299539372.post-8550148529321550843</id><published>2008-12-17T22:33:00.001+08:00</published><updated>2008-12-17T22:33:56.145+08:00</updated><title type='text'>Wireless Access Point</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;A Wireless Access Point (WAP) is a network device which is configured on WLANs (Wireless Local Area Networks) using an IP address to enable wireless communication usually between any communication devices (wired or wireless) and particularly between wireless devices and wired networks. In a corporate network environment, a WAP can be attached to a wired network and configured to enable wireless access to another LAN in a different location. A WAP typically acts as a gateway for clients to access a wired network by enabling reception and transmission of WLAN signals.&lt;br /&gt;&lt;br /&gt;In a way, a WAP makes possible wireless communication with mobility within its technically-specified range. The WAPs can also be used effectively to wirelessly connect different wired LANs within a specified range and particularly where the wired connectivity is not normally feasible. Standard WAPs can support up to 255 clients.&lt;br /&gt;&lt;br /&gt;A Wireless Access Point (WAP) is a device that receives signals from wireless devices which are within reach and from there, allows them to gain access to the Internet or a network. A WAP can be viewed as a hub, but it can also act as a bridge to increase the range of wireless networks.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/8550148529321550843/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://iworldtechnology.blogspot.com/2008/12/wireless-access-point.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/8550148529321550843'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/8550148529321550843'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/2008/12/wireless-access-point.html' title='Wireless Access Point'/><author><name>Anoch</name><uri>http://www.blogger.com/profile/04476308430111490191</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://4.bp.blogspot.com/_PhBjyzX5WKU/SWbAZ-YUFVI/AAAAAAAAAAo/5HJ2SnEe2Yg/S220/SHARMY-27.01.08+021.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9068491544299539372.post-2072443650112554507</id><published>2008-12-17T22:27:00.000+08:00</published><updated>2008-12-17T22:33:24.358+08:00</updated><title type='text'>Introduction to Network Types</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;LAN, WAN and Other Area Networks&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;One way to categorize the different types of computer network designs is by their scope or scale. For historical reasons, the networking industry refers to nearly every type of design as some kind of area network. Common examples of area network types are:&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;LAN - Local Area Network&lt;/li&gt;&lt;li&gt;WLAN - Wireless Local Area Network&lt;/li&gt;&lt;li&gt;WAN - Wide Area Network&lt;/li&gt;&lt;li&gt;MAN - Metropolitan Area Network&lt;/li&gt;&lt;li&gt;SAN - Storage Area Network, System Area Network, Server Area Network, or sometimes Small Area Network&lt;/li&gt;&lt;li&gt;CAN - Campus Area Network, Controller Area Network, or sometimes Cluster Area &lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;    Network&lt;/li&gt;&lt;li&gt;    PAN - Personal Area Network&lt;/li&gt;&lt;li&gt;    DAN - Desk Area Network &lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;LAN and WAN were the original categories of area networks, while the others have gradually emerged over many years of technology evolution.&lt;br /&gt;&lt;br /&gt;Note that these network types are a separate concept from network topologies such as bus, ring and star.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(255, 102, 0);&quot;&gt;LAN - Local Area Network&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings. In TCP/IP networking, a LAN is often but not always implemented as a single IP subnet.&lt;br /&gt;&lt;br /&gt;In addition to operating in a limited space, LANs are also typically owned, controlled, and managed by a single person or organization. They also tend to use certain connectivity technologies, primarily Ethernet and Token Ring.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(255, 102, 0);&quot;&gt;WAN - Wide Area Network&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;As the term implies, a WAN spans a large physical distance. The Internet is the largest WAN, spanning the Earth.&lt;br /&gt;&lt;br /&gt;A WAN is a geographically-dispersed collection of LANs. A network device called a router connects LANs to a WAN. In IP networking, the router maintains both a LAN address and a WAN address.&lt;br /&gt;&lt;br /&gt;A WAN differs from a LAN in several important ways. Most WANs (like the Internet) are not owned by any one organization but rather exist under collective or distributed ownership and management. WANs tend to use technology like ATM, Frame Relay and X.25 for connectivity over the longer distances.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(255, 102, 0);&quot;&gt;LAN, WAN and Home Networking&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Residences typically employ one LAN and connect to the Internet WAN via an Internet Service Provider (ISP) using a broadband modem. The ISP provides a WAN IP address to the modem, and all of the computers on the home network use LAN (so-called private) IP addresses. All computers on the home LAN can communicate directly with each other but must go through a central gateway, typically a broadband router, to reach the ISP.&lt;br /&gt;Other Types of Area Networks&lt;br /&gt;While LAN and WAN are by far the most popular network types mentioned, you may also commonly see references to these others:&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;Wireless Local Area Network - a LAN based on WiFi wireless network technology&lt;/li&gt;&lt;li&gt;Metropolitan Area Network - a network spanning a physical area larger than a LAN but smaller than a WAN, such as a city. A MAN is typically owned an operated by a single entity such as a government body or large corporation.&lt;/li&gt;&lt;li&gt;Campus Area Network - a network spanning multiple LANs but smaller than a MAN, such as on a university or local business campus.&lt;/li&gt;&lt;li&gt;Storage Area Network - connects servers to data storage devices through a technology like Fibre Channel.&lt;/li&gt;&lt;li&gt;System Area Network - links high-performance computers with high-speed connections in a cluster configuration. Also known as Cluster Area Network. &lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/2072443650112554507/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://iworldtechnology.blogspot.com/2008/12/introduction-to-network-types.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/2072443650112554507'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/2072443650112554507'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/2008/12/introduction-to-network-types.html' title='Introduction to Network Types'/><author><name>Anoch</name><uri>http://www.blogger.com/profile/04476308430111490191</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://4.bp.blogspot.com/_PhBjyzX5WKU/SWbAZ-YUFVI/AAAAAAAAAAo/5HJ2SnEe2Yg/S220/SHARMY-27.01.08+021.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9068491544299539372.post-4806641371365308877</id><published>2008-12-17T22:13:00.001+08:00</published><updated>2008-12-17T22:13:36.939+08:00</updated><title type='text'>SSID - (Service Set Identifier)</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;Definition: An SSID is the name of a wireless local area network (WLAN). All wireless devices on a WLAN must employ the same SSID in order to communicate with each other.&lt;br /&gt;&lt;br /&gt;The SSID on wireless clients can be set either manually, by entering the SSID into the client network settings, or automatically, by leaving the SSID unspecified or blank. A network administrator often uses a public SSID, that is set on the access point and broadcast to all wireless devices in range. Some newer wireless access points disable the automatic SSID broadcast feature in an attempt to improve network security.&lt;br /&gt;&lt;br /&gt;SSIDs are case sensitive text strings. The SSID is a sequence of alphanumeric characters (letters or numbers). SSIDs have a maximum length of 32 characters.&lt;br /&gt;Also Known As: Service Set Identifier, Network Name&lt;br /&gt;Examples: Wardrivers sometimes scan for the SSIDs being broadcast by wireless LANs, then set that SSID on their client to attempt to join that WLAN. Knowing the SSID name does not necessarily mean that rogue clients will be able to join the network. It depends on how the network administrator has configured their WLAN, particularly WEP security.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/4806641371365308877/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://iworldtechnology.blogspot.com/2008/12/ssid-service-set-identifier.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/4806641371365308877'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/4806641371365308877'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/2008/12/ssid-service-set-identifier.html' title='SSID - (Service Set Identifier)'/><author><name>Anoch</name><uri>http://www.blogger.com/profile/04476308430111490191</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://4.bp.blogspot.com/_PhBjyzX5WKU/SWbAZ-YUFVI/AAAAAAAAAAo/5HJ2SnEe2Yg/S220/SHARMY-27.01.08+021.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9068491544299539372.post-3060166051198725496</id><published>2008-12-17T21:55:00.000+08:00</published><updated>2008-12-17T22:10:12.731+08:00</updated><title type='text'>What is (Wireless / Computer) Networking?</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;In the world of computers, Networking is the practice of linking two or more computing devices together for the purpose of sharing data. Networks are built with a mix of computer hardware and computer software.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;What Is a Network Name?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Did you know a network name is a text string that devices use to reference a particular computer network? These strings are, strictly speaking, separate from the names of individual network devices and the addresses they use to identify each other. However, several different forms of network naming exist and it&#39;s fairly common (even in the IT world) for people to blur the distinction between computer and network names in casual conversation.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(255, 102, 0);&quot;&gt;SSID&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(255, 102, 0);&quot;&gt;Wi-Fi&lt;/span&gt;&lt;span style=&quot;color: rgb(255, 102, 0);&quot;&gt; &lt;/span&gt;networks support a type of network name called &lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;color: rgb(255, 102, 0);&quot;&gt;SSID&lt;/span&gt;.&lt;/span&gt; Wi-Fi access points and clients are each always assigned an SSID to help identify each other. When a person speaks of wireless network names, they typically are referring to SSIDs.&lt;br /&gt;&lt;br /&gt;Definition: An &lt;span style=&quot;font-weight: bold; color: rgb(255, 102, 0);&quot;&gt;SSID&lt;/span&gt; is the name of a wireless local area network (&lt;span style=&quot;font-weight: bold;&quot;&gt;WLAN)&lt;/span&gt;. All wireless devices on a WLAN must employ the same &lt;span style=&quot;font-weight: bold; color: rgb(255, 102, 0);&quot;&gt;SSID&lt;/span&gt; in order to communicate with each other.&lt;br /&gt;&lt;br /&gt;The&lt;span style=&quot;font-weight: bold;&quot;&gt; SSID&lt;/span&gt; on wireless clients can be set either manually, by entering the &lt;span style=&quot;font-weight: bold;&quot;&gt;SSID&lt;/span&gt; into the client network settings, or automatically, by leaving the &lt;span style=&quot;font-weight: bold;&quot;&gt;SSID&lt;/span&gt; unspecified or blank. A network administrator often uses a public &lt;span style=&quot;font-weight: bold;&quot;&gt;SSID&lt;/span&gt;, that is set on the access point and broadcast to all wireless devices in range. Some newer wireless access points disable the automatic &lt;span style=&quot;font-weight: bold;&quot;&gt;SSID &lt;/span&gt;broadcast feature in an attempt to improve network security.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;SSID&lt;/span&gt;s are case sensitive text strings. The &lt;span style=&quot;font-weight: bold;&quot;&gt;SSID&lt;/span&gt; is a sequence of alphanumeric characters (letters or numbers). &lt;span style=&quot;font-weight: bold;&quot;&gt;SSID&lt;/span&gt;s have a maximum length of 32 characters.&lt;br /&gt;Also Known As: Service Set Identifier, Network Name&lt;br /&gt;Examples: Wardrivers sometimes scan for the SSIDs being broadcast by wireless LANs, then set that SSID on their client to attempt to join that WLAN. Knowing the SSID name does not necessarily mean that rogue clients will be able to join the network. It depends on how the network administrator has configured their WLAN, particularly WEP security.&lt;br /&gt;&lt;br /&gt;Change the Default SSID on Wireless Access Points and Routers&lt;br /&gt;&lt;br /&gt;Wi-Fi access points and routers ship with a pre-defined network name (SSID) set by the manufacturer.&lt;br /&gt;&lt;br /&gt;The SSID can be accessed from within these products&#39; Web-based or Windows-based configuration utilities. Common examples of pre-defined SSIDs are simple names like &quot;wireless,&quot; &quot;netgear,&quot; &quot;linksys,&quot; or &quot;default.&quot; An SSID can be changed at any time, as long as the change is also made on all wireless clients.&lt;br /&gt;&lt;br /&gt;To improve the security of your home wireless network, change the SSID to a different name than the default. Here are some recommended do&#39;s and dont&#39;s, based on best network security practices:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt; Don&#39;t use your name, address, birthdate, or other personal information as part of the SSID.&lt;/li&gt;&lt;li&gt; Likewise, don&#39;t use any of your Windows or Internet Web site passwords.&lt;/li&gt;&lt;li&gt; Don&#39;t tempt would-be intruders by using tantalizing network names like &quot;SEXY-BOX&quot; or &quot;TOP-SECRET&quot;.&lt;/li&gt;&lt;li&gt; Do pick an SSID that contains both letters and numbers&lt;/li&gt;&lt;li&gt; Do choose a name as long or nearly as long as the maximum length allowed.&lt;/li&gt;&lt;li&gt;  Do consider changing your SSID every few months. &lt;/li&gt;&lt;/ul&gt;</content><link rel='replies' type='application/atom+xml' href='http://iworldtechnology.blogspot.com/feeds/3060166051198725496/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://iworldtechnology.blogspot.com/2008/12/what-is-wireless-computer-networking.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/3060166051198725496'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9068491544299539372/posts/default/3060166051198725496'/><link rel='alternate' type='text/html' href='http://iworldtechnology.blogspot.com/2008/12/what-is-wireless-computer-networking.html' title='What is (Wireless / Computer) Networking?'/><author><name>Anoch</name><uri>http://www.blogger.com/profile/04476308430111490191</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://4.bp.blogspot.com/_PhBjyzX5WKU/SWbAZ-YUFVI/AAAAAAAAAAo/5HJ2SnEe2Yg/S220/SHARMY-27.01.08+021.JPG'/></author><thr:total>0</thr:total></entry></feed>