Pages

Subscribe:
http://Link-exchange.comxa.com

Flickr

TYPES OF HACKING:

Types of burglary - Presentation Transcript Hacking a technological threat Overview

What types of hacking hacking hacking?

 Ethical Implications Conclusion Hacking hobby
profession of working with computers.
Breaking into computers Access Types Hacking Website Hacking Email Hacking
Network Hacking
Password Hacking
Computer Hacking Online
 Banking Hacking
Website Hacking Main focus Vulnerable loopholes collapses the information Make changes to the information E-mail Hacking Can Email Be Hacked?
 Store business information, private information Serious precautions are not taken Computer Hacking Steals information from computer Remote Desktop Connection technique Accessing another person's files online banking Hacking Online Banking disadvantages Hackers create fake sites with proper website address Ethical Hacking computer or network expert search vulnerabilities victims -

Official & Private websites ethical hackers do? An ethical hacker's evaluation of a system security seek to answer this basic question:

What can an intruder see on the target systems? What are you trying to protect?
What can an intruder do with that information? Thousands of dollars in fines Imprisonment Claim your computer Consequences Conclusion Proper ethical hackers are employed to practice with exact URL empty your Internet while not in use Summary Hacking be exposing your passwords to trusted sites are of two types There are different types of hacking ethical hacking - a legitimate method Consequences of illegal hacking,..

WHAT IS HACKER : ?


In a sense it is stupid to argue about the word `` ware''betekenis. One word means people use it to mean. I'm not Française Sciences, I can not force the word `` hacker to my definition Newsweek gebruik''volgens official. However, understanding the etymological history of the word `` hacker''kan help in understanding the current social situation. 

The concept of computer hacking culture at the Massachusetts Institute of Technology in the 1960s. Online at MIT thought posited that there are two types of students, tools and hackers. A `` instrument''is anyone attending regular classes, always in the library when no class is meeting and getting straight As. A `` hacker''is the opposite: someone who never goes to class, which really sleep all day and spend the night following leisure activities rather than study. 

There was probably no middle ground. What has this to do with computers? Initially, nothing. But there are standards for success as a hacker, as grades are a standard for success as an instrument. The true hacker can not just sit around all night, he needs a hobby with commitment and flair to follow.

 It can be mobile, or railroads (model, real or both), or science fiction fandom, or radio broadcast or ham radio. It can be one of them. Whether it be computers. [In 1986, it is generally the word `` hacker''gebruik among MIT students to refer to a computer, but to building hackers hackers, people who have roofs and tunnels where they are supposed to be detected.] `` A computer hacker,''then, is someone who lives and breathes computers, who already have computers, a computer to do something to recognize. Equally important is the attitude of hackers. Programming a hobby, something done for fun, not by a sense of duty or for money. (It's okay to make money, but this may not be the reason for piracy.)

 A hacker is an Aesthete. There are specialties within computer hacking. An algorithm hacker knows all the best algorithm for each problem. A system hacker knows about designing and maintaining operating systems. And a `` hacker''weet password how to find someone else's password. That's what Newsweek should follow their call. Someone decides to crack a security system for financial gain is not a hacker at all. Is not that a hacker can be a thief, but a hacker can be a professional thief. 

A hacker must be essentially an amateur, even if hackers can pay for their expertise. A password hacker whose main interest is in learning how the system is not necessarily refrain from stealing information or services, but someone whose main interest is stolen is not a hacker. This is a matter of emphasis.

IPV 6

IPv6..

128 bit vs 32 bit addressing (340,282,366,920,938,463,463,374,607,431,768,211,456)
• Flexible and expandable global routing hierarchy
• Security (MD5 for authentication and integrity checking / encryption headers)
• Mobile Computing • machine (combine 48 or 64 bit MAC address prefix network)
• Streamlines the process of forwarding
 • Anycast address is delivered to only one of the nodes in the group, usually "related" nodes
 • quality of service (QoS)
 • Application
 • Changed IPv6 over IPv4 Tunneling
 • Enhancements to the functionality of IPv4 to IPv6 not repeat IPv6 is short for "Internet Protocol Version 6

. IPv6 is the" next generation "protocol designed by IETF version of the current Internet Protocol, to replace IP version 4 (IPv4). Most of today's Internet uses IPv4, which is now almost twenty years. IPv4 has been very resilient in spite of his age, but it's starting to have problems..

. IPv6 fixes a number of problems in IPv4, such as the limited number of available IPv4 addresses . It also adds many improvements to IPv4 in areas such as routing and network auto. IPv6 is expected to gradually replace IPv4, with the two coexisting for a number of years during the transition period...

DIS ADVANTAGE OF INTERNET :

Disadvantages of the Internet :::

1. Virus Threat Most of the viruses came from the internet so be very careful when visiting or downloading from one place. If you are using Firefox, you can install Web of Trust add-on, so you warnings about online scams, sites with adult content, and spam can get. With this, you can help keep your computer safe from online threats like, adware spyware and viruses.

 2. Theft of personal information If you have Internet, there is a risk of stealing your personal information like name, address, credit card., By the perpetrators.

 3. Spamming I guess I have to explain this more, you're already familiar with this.

4. Pornography is probably the worst obstacle to the internet, especially for parents with children. Find out how you protect children from entering bad sites.


5. Akkuraatheid van inligting 'n baie inligting oor' n spesifieke onderwerp is gestoor word op die webtuistes. Sommige inligting kan verkeerd wees of nie eg is nie. So, raak dit moeilik om die korrekte inligting te kies. Soms moet jy verwar kan word. 

6. Vermorsing van tyd 'n baie tyd gemors om die inligting op die internet in te samel. Sommige mense afval baie tyd in die klets of speletjies te speel. By die huis en kantore, die meeste van die mense gebruik Internet, sonder enige positiewe doel. 

7. Engelse taal probleme meeste van die inligting op die internet beskikbaar is in die Engelse taal. Dus, sommige mense kan nie gebruik maak van die fasiliteit van die Internet...

ADVANTAGE OF INTERNET :

1. Easy and free communication of communication with your friends and loved ones is easy through e-mail communication and social sites like Facebook and MySpace. You may not even be a few cents just to talk to them because these services are free to pay!

2. Send pictures small or large with others easily! If you have a file to send, for example, a video to your friend who lives in another country, it is not practical now to send him a package with video CD. Instead, you can send video from your e-mail or upload it to YouTube or other video-sharing.

3. Much of the information as I have mentioned before, the Internet has lots of information is very important for students so that they do not need to buy books, or go to the library. Search engines like Google and Yahoo are always available when you need it. 3. Music is one of the most popular reasons why many people prefer to surf the Internet. There are a lot of games to play, watch videos, and etc.

 4. Internet services for our lives easier by providing services such as online banking, online booking, hotel bookings, online shopping, and much more!

5. Besides winning entertainment, internet you can earn money while at the same time, enjoy what you do! Like me, I'm a blogger and I love what I do, and at the same time, I earn money.

 6. Promote your website product is one of the best ways and cheaper to get your business or product to promote. From $ 10, you can have your own website and start reaching your prospects. You can use Blogger or growth if you do not want to spend money on your website.

INTERNET PROXY:


A server that sits between a client application like a web browser and a real server. It captures all requirements in the real server to see if the application itself can be completed. If not, it sends the request to the real server ..

Most large businesses, organizations and universities these days use a proxy server. It's a server that all computers on the local network to go through before accessing information on the Internet. Using a proxy server, a network organization to improve performance and to filter it to connect to the network users can access.

 A proxy server improves Internet access speed of a network primarily by using a cache system. Caching saves recently viewed Web sites, images, and files on a local hard disk so that they should not be downloaded from the back. While your browser may have recently seen articles stored on your computer, a cache proxy server received all of the network. 

This means if Bob views a story on cnn.com at 1:00 and Jill views the same page at 01:03, she will probably get on the straight from the proxy server's cache. Although this means faster access to Web sites, it also means users can not see the latest version of each page. 

The other main purpose of a proxy server to filter what is allowed in the ring. While HTTP, FTP, and Secure protocols can all be filtered through a proxy server, HTTP is the most common. Proxy server can limit what 

Web sites users can access the network. Many organizations choose to enter in countries with offensive material, such as hacking information and to block pornography, but other countries as well as filtered. If an employer notices workers are spending more time on sites like eBay or Quicken.com, those sites may be blocked by the proxy server as well.

FILE INFECTING VIRUS :

A type of computer virus that hide their code with malicious executable files on a system. When the infected file is opened or used the virus can overwrite the file and permanent damage to the contents of the file overwritten. This type of virus targets a variety of operating systems, including Macintosh, UNIX, DOS and Windows...

MOBILE VIRUS :

A mobile phone (also called a cell) virus was equivalent to a computer virus, it infects the consumer mobile phones and distributed via MMS attachments, Internet downloads and Bluetooth transfers.

The most common form of mobile phone virus is traveling from computers to cell phones via infected files from Internet downloads. But phone calls about viruses, while less common, existed. The first known mobile virus Cabir was called and was discovered in June 2004 from Kaspersky Labs.

Cabir worm was coded to infect Symbian OS phones. Cabir is designed to search for all accessible phones using Bluetooth technology and a copy of itself to send the first one found. Setting up your phone in a non-discoverable (hidden) Bluetooth will protect your phone from Cabir worm. But once the phone is infected it will try to infect other systems even if you try to disable bluetooth from system settings. In 2005, the Cabir source code publicly available on the Internet.

OWERWRITING VIRUS :

A kind of computer virus that will have its own code in the data in host computer's files, which destroys the original program copies. After your computer cleaned by an antivirus program, users reinstall the original program..

COMPANION VIRUS :

A type of computer virus that compromises a feature of DOS that allows software with the same name but different extensions to work with different priorities.

 For example you might have Program.exe on your computer, and the virus can be a file called program.com. When the computer run Program.exe, the virus runs program.com for Program.exe were performed.

In many cases, the true program run as users feel the system is working normally and was not aware that a virus is running on the system.

MULTIPARTITE VIRUS :

MULTIPARTITE VIRUS   is also called a virus in many parts, a virus that tries to boot sector and exports, or program files to attack at the same time.

When the virus attaches to the boot sector, it will affect the system? S files? When the virus attaches to files, it will return to infect the boot sector.

 This type of virus can re-infect a system without a break, like all parts of the virus is not gone,...

MACRO VIRUS :

A kind of computer virus that is embedded as a macro embedded in a document. Many applications, like Microsoft Word and Excel, support powerful macro languages.

These applications can create a macro in a document to include, and the macro to run every time the document is opened. According to some estimates, 75% of all viruses today are macro viruses.

Once a macro virus gets onto your computer, it can embed itself in all future documents you create with the application. Antivirus programs can protect your system from macro viruses, even new ones are always created to slip by antivirus filters.

ARMORED VIRUS :

A type of virus that is designed efforts by analysts to stop processing code, using multiple methods of detection do, disassembling and reverse engineering more difficult.

An armored virus can protect themselves from anti-virus programs, making it more difficult to detect. To do this, efforts Virus armored anti-virus program to mislead to believe that its location is somewhere other than where it actually is in the system...

APPENDING VIRUS :

A virus that inserts a copy of its code with malicious end of file.

 The purpose of a virus is making the application to wait for harm, but to change the virus code to follow and then be able to run itself.

CLUSTER VIRUS :


A type of computer virus that itself associated with the implementation of programs by modifying directory table entries the virus itself will begin when a program on the computer system is started from seed. ..

When infected with a virus group that will appear every program on the computer system is infected, but a group of virus is only one place on the system...

COMPUTER VIRUS::

A computer virus is an executable program. Depending on the nature of a virus, it can damage the contents of your hard disk cause and / or interfere with the normal functioning of your computer.

By definition, a virus program is able to self-replicate. This means that the virus multiplied in a computer by making copies of itself. Repetition is intentional, this is part of the virus. In most cases, if a virus file is executed or copied to another computer, this computer will be "infected" by this virus.

 A virus can be inserted into a computer system with a software program. For Internet users, the threat comes from downloading files via FTP (File Transfer Protocol), or references e-mail attachments. (Please refer to our website over the handling of e-mail File Attachments for more information.)

When a virus is introduced into a computer system, it can be self-attached, or sometimes even to replace an existing program . So when the user runs the program in question, is the virus running. This usually happens without the user being aware of it. A virus program contains commands a kind of "event" that affects the infected computer to start. Each virus has a unique opportunity to connect with.

 These events and their consequences can range from harmless to devastating. For example, an annoying message on the computer screen. Reduced memory or disk space. Changing data. Overwrite or damaged. Hard drive erased.

WHAT IS COMPUTER VIRUS:: ?

In 1983, Fred Cohen coined the term "computer virus", postulating a virus was "a program that can" infect "other programs by modifying them to develop a potential copy of the very tight." Z.

Cohen expanded his definition a year later in 1984 his paper, "a computer virus, noting that" a virus can spread throughout a computer system or network with the authorization of each user who use the programs infected them.

Any program that gets infected may also act as a viral infection and thus economic growth. "

UDP: (USER DATAGRAM PROTOCOL) ::

User Datagram Protocol (UDP) User Datagram Protocol (UDP) is a connection less transport layer protocol (Layer 4) that are on the internet protocol family.

 UDP is basically an interface between IP and upper layer processes. UDP protocol ports distinguish multiple applications running on a device from each other. Unlike TCP, UDP adds no reliability, flow control, or error-recovery functions to IP. Because UDP's simplicity, UDP headers contain fewer bytes and consume less network overhead than TCP.

 UDP is useful in situations where the reliability mechanisms of TCP are not necessary, as when a higher layer protocol can error and flow control condition. UDP is the transport protocol for several well-known-application protocol layers, including Network File System (NFS), Simple Network Management Protocol (SNMP), Domain Name System (DNS) and Trivial File Transfer Protocol (TFTP).

UDP packet format contains four fields, This includes areas of source and destination ports, length and checksum.

TCP (TRANSMISSION CONTROL PROTOCOL) ::

TCP provides reliable transmission of data in an IP environment. Corresponding TCP transport layer (layer 4) of the OSI reference model. Among the services TCP provides are stream data transfer, reliability, efficient flow control, dual full cooperation and multiplexing. With stream data transfer, TCP delivers an unstructured stream of bytes identified by serial numbers.

This service benefits applications because they have no data to cover the blocks before handing it to TCP. Instead, TCP groups bytes into segments and passes them to IP for delivery. TCP offers reliability by providing connection-oriented, providing end-to-end reliable packet through an Internetwork.

 It does this by sequencing bytes sent acquaintance with a number indicating the next byte source destination expects to receive. Bytes not acknowledged within a certain period is retransmitted. Reliability mechanism of TCP allows devices to deal with lost, delayed, duplicate or incorrect packages.

A timeout mechanism allows the equipment lost packets and retransmission request to discover. TCP offers efficient flow control, which means that when sending acknowledgments back to the source, receiving TCP process indicates the highest sequence number can receive without overflowing its internal buffers.

 full duplex operation means that TCP processes can both send and receive at the same time. Finally, TCP multiplexing means that the multiple simultaneous high-level talks may be multiplexed over a single connection.

ICMP PACKET::

ICMPs generate different kinds of useful messages, including destination unreachable, Echo Request and Response Redirect, Time exceeded, and Router Advertisement and Router Soloists. If an ICMP message can not be saved, there is a second is created. It is an endless stream of ICMP messages are avoided.

When a message ICMP destination-unreachable is sent by a router, this means that the router is not able to send packets to the final destination. Router then throw the original package. There are two reasons why an unreachable destination will be. More broadly, the host resource specified a nonexistent address. Less commonly, the router does not have a route to the destination.

 Destination-unreachable messages consists of four basic types: network unreachable, host unreachable, protocol unreachable, and port unreachable. Network-unreachable messages usually mean that a failure has occurred in the course or treatment of a package.

 Host-unreachable messages usually indicate liver failure, such as incorrect subnet mask. Protocol-unreachable messages generally mean that the destination does not support upper layer protocol packets.

Port-unreachable messages means that the TCP socket or port is not available. An ICMP echo request message, which was created ping command is sent from a host is required to achieve test on a job site. ICMP echo-reply message indicates that the node can be achieved successfully. ICMP Redirect message is sent from router to source host to stimulate more efficient routing.

 The router still forwards the original packet to the destination. ICMP redirects allow host routing tables remain small, it is necessary to address only a router to know, even if the router is not the best way. Even after an ICMP Redirect message, some devices can continue with the road less efficient...

ARP (ADDRESS RESOLUTION PROTOCOL) ::

Address Resolution Protocol (ARP)::

 Summary For two machines in a data network to communicate, they know another physical machine (orMAC) addresses. By broadcasting Address Resolution Protocols (ARP), a host can dynamically discover the MAC layer address corresponding to a network layer address IP.

 Upon receipt of AMAC-layer address, IP devices create an ARP amount of recently acquired IP-to-MAC address mapping store, and in this way Arps broadcast when they want a device to recontact. If the device within a specified time, the cache entry flushed.

 In addition to Reverse Address Resolution Protocol (RARP) is used for layers mapMAC addresses IP addresses. RARP, which is the logical inverse of ARP, can be used by diskless workstations that are not their IP addresses to know when their boat.

 RARP relies on the presence of a RARP server with an entry MAC address table mappings-layer-to-IP.

IP SUBNET:

IP Subnet address ::

IP networks can be divided into smaller networks called subnetworks (or subnets). Subnet provides the network administrator with several benefits, including extra flexibility, more efficient use of network addresses, and the ability to broadcast traffic (a broadcast will not cross a router) have.
 Subnets are under local administration.

As such, the outside world sees an organization as a single network and have no detailed knowledge of the organization's internal structure. A given network address can be broken up into many subnetworks.

For example, 172.16.1.0, 172.16.2.0, 172.16.3.0 and 172.16.4.0 are all subnets within network 171.16.0.0. (All 0s in host portion of an address specify the network.)

IP PACKET FORMAT::


The following discussion describes the IP packet.

• Version indicates the version of IP currently used.

• IP Header Length (IHL)-Indicates the datagram header length in 32-bit words.

 • Type-of-Service-Specifies how an upper layer protocol would be a current datagram to deal and knows datagrams various levels of interest.

• Total Length Specifies the length, in bytes, of the entire IP packet, including the dates and headline.

 • Identification-Contains a number that identifies the current datagram. This field is used to help piece together datagram fragments.

• Flags-Consists of a 3-bit field of the two low-order (at least-significant) bits control fragmentation. The low-order bit determines whether the packet can be fragmented. The middle bit determines whether the packet is the last fragment in a series of fragmented packets. The third or high-order bit is not used.

 • Fragment Offset indicates the position of the fragment's data in relation to the start of the data in the original datagram, which allows the destination IP process to properly reconstruct the original datagram.

• Time-to-Live-Maintains a counter that gradually decrements down to zero, at which point the datagram is discarded. This keeps packets from looping endlessly

. • Protocol-Indicates which upper-layer protocol receives incoming packets after IP processing is complete.

• Header Checksum help ensure IP header integrity.

 • Source Address-Specifies the sending node.

 • Destination Address-Specifies the receiving node.

WHY WOULD I NEED ROUTER:: ??


For most users, they will be setting up a LAN (local area network) or WLAN (wireless LAN) and all computers on the Internet without a full subscription service to pay their broadband ISP for each computer on the network. In many cases, an ISP you can use a router and several computers with a single Internet connection and a nominal fee for each additional computer sharing the connection. 

This is when home users will want to look at smaller routers, often called broadband routers that enable two or more computers sharing an Internet connection. Within a business or organization, you may have more computers accessing the internet, while even some private networks - and this is the kind of functions for a router design.

TYPES OF ROUTER::

Types of Routers There are different types of routers that you will want to understand. You should change to know that you can make your network or at least so you can understand the local computer guy told to do.

1>> BROADBAND  Routers::

  Broadband Routers can be used for different things.

 They can be used two different computers to connect two computers or to connect to the internet. They can also be used to make a phone connection to establish. If you have Voice over IP technology (VoIP), then you need a broadband router for your Internet connection to your phone. This is often a special type of modem that both Ethernet and phone jacks it.

 While this may seem a bit confusing, just follow the instructions that your VoIP provider sends your


2>> WIRELESS routers::

 - usually you need router to buy the company for the service you need. Wireless Routers Wireless Routers connect your modem and a wireless signal in your home or office. So any computer within range to make your wireless router and use your broadband internet for free.

 The only way to get someone to hold about your system, make sure your router. A word of warning for wireless routers: Make sure you secure them, or will be vulnerable to hackers and identity thieves. To secure your router, you just have to come in WhatIsMyIPAddress.com and your IP address gets. Then, you type in your web browser and log into your router (user ID and password will come with your router).

Remember router ID and password changes, and if someone else can lock you out of your system. Once there, go to wireless settings, enter a security key and you'll be about ready to go. Make sure you enter the key or storing it in a Word document.

 If you try to log into your Internet connection, you just need the key to enter. Your computer should be the key to remember, but write somewhere for safekeeping just in case.

WHAT IS ROUTER: ?

What is a router???

 Before we dive into the world of routers, you need to understand what a broadband connection is and how it works.

According to Dictionary.com, broadband is "a high speed, high capacity transmission medium that can carry signals from multiple network carriers independent This is done in a single coaxial or fiber optic cable through establishing different bandwidth channels..

Broadband technology can support a wide range of frequencies is used for data voice and video over long distances simultaneously broadcast .. "Routers takes the information received with the signal broadband via a modem to decode, and deliver it to your computer.

 Router will choose the best path for packet data so that you get information fast. Many different types of routers is designed to get information about your service can be delivered in a variety of different receivers, including your PC, your phone, and others.

INTRANET & EXTRANET &INTERNET ::

Is the difference between an intranet and the Internet: Internet an open, public space and interior is designed to provide a private space. Intranet can be accessed from the Internet, but as a rule, it is password protected and accessible only to employees or other authorized users .

From inside the company's intranet server responds much faster than conventional site. This is because the public Internet traffic is not radiation, the server crashes and other problems that slow the network's grace. Within the company, but users have more bandwidth and network equipment may be more reliable. This facilitates high-bandwidth content such as audio and video, to work inside ..

The term "intranet" is somewhat misleading conceptually, because it is contrary to the term "Internet". The real contrast is with the World Wide Web - an important distinction because the "Internet" focuses on the physical and technical networks, and online content focusing on a set of physical and technical infrastructure.

When I coined the term "intranet" at Amdahl Corp. in 1994 summer, it was not the tone of the internal web, rather than a single web. Indeed, the term we use internally that he was too clumsy for Enterprise-Wide Web. Thus, although the "Intranet" ambiguity, it was clear even in the absence of a better alternative, it is caught. ...

In the early days, I will define as infrastructure based on Internet standards and technologies that support sharing of a limited number of well-defined group, and intranet. "Infrastructure" refers to the organizational and management infrastructure in place, manage and share content. The only restriction is that the physical network based on the interaction protocol (IP). .

You may notice that this definition includes what we call the additional beautiful today as the decisive factor is the limited and well-defined group ", instead of what the official views of the organization. Web, by contrast, is a free group.

I think today, intranet, networks, and thus the contents of the collection online. Intranet content to determine the overall well-defined group within a single organization. extranet content of the general well-defined group, but one that crosses enterprise boundaries.

This is an important difference between the connection, a Web content by using the same technical infrastructure, regardless of the decision-making. This means that it is much easier to access the file contents are changing, as was his old world, something is often more accessible to a very successful effort involved.

technical infrastructure is fewer barriers to access specific content, it is important to note how, or if we want to limit access. the term 'intranet and extranet, as imperfect as they are, we provide a conceptual and pragmatic measures to discuss what we want select content available ...

These terms may be further changes to make sense. For now, the content of the collection, which is available to members of one body, intranet, even if the information travels over the public Internet infrastructure. ... 

PUBLIC AND PRIVATE IP ADDRESS::

Public and private IP addresses in order to maintain uniqueness within global space is the public IP addresses in Network Information Center (NIC) management of conflict avoidance.
Equipment in public should be identified as Web or e-mail, a globally unique IP addresses, and they are assigned a public IP address. Devices that are not public access node can be assigned a private IP address, and make it uniquely identifiable within an organization.

For example, a network printer assigned a private IP address for the world to stop its printing. Allow organizations to freely show private IP addresses, certain blocks NIC address reserved for private use. A private network is a network that uses RFC 1918 IP address space.

The following blocks are reserved for private IP addresses IP.


      Class                   starts IP                                     Ending IP address
               
                 
        A
 10.0.0.0
10.255.255.255

        B
172.16.0.0172.31.255.255
        C
192.168.0.0

192.168.255.255

DYNEMIC AND STATIC IP ADDRESS::

Dynamic IP addresses are temporary and are given every time a computer to access the Internet. They are, in fact, borrowed from a group of IP addresses between different computers in common.

Since a limited number of static IP addresses available, many ISPs reserve a portion of their addresses assigned to the division between their subscribers in this way.

This reduces costs and allows them more subscribers in the service that they otherwise would. Static IP addresses are generally better for uses such as VOIP (Voice over Internet Protocol), online gaming, or any other purpose, users need to make it easy for other computers to locate and connect with them. Easy access can be facilitated when a dynamic IP address using a dynamic DNS service that allows other computers to find you even though you can use a temporary, single IP address.

 This often involves an additional cost, but so will your ISP.

WHAT IS LOOPBACK IP ADDRESS :: ?

 IP Address cycle is the use of self-earned.

 Name IPv4 loopback address 127.0.0.1 with a 255.0.0.0 subnet mask. A loop interface is also known as a virtual IP, which is not related to the hardware interface.

On Linux systems, loopback interface is commonly known lo0 check. Respective hostname for this interface is called localhost. Loopback address is used to test network software without physically installing a network card (NIC), and without physically connecting the drive with a / TCP IP network.

 A good example is the Web server running on ourselves to enter or http://127.0.0.1 using http://localhost.

WHAT IS MY IP ?

IF U WANT TO KNOW WHAT IS MY IP ADDRESS THEN PLEASE CLICK BELOW LINK::

http://whatismyipaddress.com/

IP ADDRESS ::

Home address & IP Address IP is an indication of a computer or device on a / TCP IP network. Networks using the TCP / IP protocol route messages based on destination IP address.

Format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be zero to 255. For example, 1.160.10.240 could be an IP address.

Within an isolated network, you may want IP addresses at random as long as each is unique. However, connecting a private network on the Internet requires using registered IP addresses (called Internet addresses) to avoid duplicates.

 The four numbers in an IP address is used in different ways a particular network and a host on the network to identify. Four regional Internet registries - ARIN, RIPE NCC, LACNIC and APNIC - Internet addresses indicated by the following three classes.

Class A - supports 16000000 hosts in each of 126 networks

Class B - supports 65,000 hosts on each of 16,000 networks

 Class C - supports 254 hosts on each of 2 million networks

The number of Internet addresses assigned is running out, so a scheme CIDR Classless new branding is gradually replacing the system based on classes A, B and C and is associated with the adoption of IPv6...

WHAT IS DIFFERENCE BETWEEN LAN AND WAN AND MAN ?

A LAN (local area network) is a group of computers and network devices connected together, usually in the same building.

A WAN (wide area network) is not restricted to a geographical place, even though it may be confined within the borders of a state or country.

A WAN connects several LANs, and may be limited to an enterprise (a corporation or an organization) or open to the public. Technology is a high speed and relatively expensive.

 The Internet is an example of a worldwide public WAN.

A LAN (local area network) is ' A group of computers and network devices are connected, usually in the same building. By definition, connections with high speed and relatively inexpensive (eg, draw ring or Ethernet), to be. Most of Indiana University in Bloomington department LAN.

For more information on the LAN, see What is a LAN (local area network)?

 A MAN (metropolitan area network) is a large network, usually over several buildings in the same town or village. IUB Network is an example of a MAN ....

A WAN (wide area network), compared with a man, is not restricted to a geographical place, even though it may be confined within the borders of a state or country.

A WAN connects several LANs, and may be limited to an enterprise (a corporation or an organization) or open to the public.

 Technology is a high speed and relatively expensive. The Internet is an example of a WAN public worldwide ..

A LAN is a high speed connection in a LAN. In IUB campus, compounds are either Ethernet (10Mbps) or Fast Ethernet (100Mbps), and some countries have Gigabit Ethernet (1000Mbps) connections ....

 LAN (Local Area Network) is a network which has a small geographic area, like a home, office, or group of buildings of the Network in an organization can have a LAN typically owned, controlled and managed by a single person or organization is typically owned, controlled and managed by a single person or organization have LAN high speed data transfer Got a small geographic range and have no need for a telecommunication lines LAN employee may be used for other LAN is connected over a distance via telephone lines and radio waves WAN

WAN (Wide Area Network) is a computer network covering a wide area (eg, a link communication network among the metropolitan boundaries, regional, or national Internet is the best example of a WAN WAN (eg Internet) is not owned by any organization, but rather exist under a collective or distributed ownership management and technologies tend to wane as ATM, Frame Relay and X.25 use to access over longer distances eating has a lower data transfer compared to LAN Have a great geographic diversity across borders general and rental of telecommunications lines must

WHAT IS WAN ( WIDE AREA NETWORK )::


Definition:

 A WAN covers a large geographical area, as a province, state or country. WAN networks often several smaller, such as local area networks (LAN) or metro area networks (MANS). Most popular WAN is the Internet worldwide. Some segments of the Internet, such as VPN-based networks, WAN is also in themselves. Finally, many WAN is corporate networks, or research using leased lines. WAN typically use different and more expensive than LAN Network. Key technologies often include WAN SONET, Frame Relay, and ATM.

DEFINATION OF LAN:

Definition:

A local area network (LAN) supplies networking capability to a group of computers in close proximity to each other as in an office building, a school or a home. A LAN is useful for sharing resources such as files, printers, games or other applications. A LAN in turn often connects to other LANs and the Internet or other WAN.

LOCAL AREA NETWORK:: < LAN >

A computer network that includes a relatively small area. Most LANs are confined to a single building or group of buildings. However, it can have a LAN connected to other LANs over any distance via telephone lines and radio waves.

A system of LANs connected in this way a wide-area network (WAN). Most LANs connect workstations and personal computers. Each node (individual computer) in a LAN has its own CPU with which it executed programs, but it is also capable of data and devices anywhere access to the network. This means that many users of expensive devices like laser printers, and data exchange.

Users can use the LAN to communicate with each other, sending e-mail or engaging in chat sessions. There are many different types of LANs Ethernets being the most common for PCs. Most Apple Macintosh networks are based in the Apple Talk network of Macintosh computers built.

The following features distinguish a LAN from another: topology: geometric arrangement of devices on the network. For example, equipment can be arranged in a ring or a straight line. protocols: The rules and encoding specifications for sending data. Protocols also determine whether the network uses a peer-to-peer or client / server architecture. media devices can be connected by twisted-pair wire, coaxial cables, fiber optic cables either. Some networks do without connecting media altogether, communicating instead via radio waves.

 LANs are capable of transmitting data at very fast, much faster than data can be transmitted to a telephone line, but the distances are limited, and there is a limit to the number of computers which can be for a LAN single attached.

WHAT IS 3G ??

A radio communications technology which is a "bit pipe" to provide mobile access to the creation of Internet-based service. It will improve and enhance mobility in many areas of our lives. In the near future, mobility is not an add-on, it will be a fundamental aspect of many services for it.

 We would expect a high-speed access to the Internet, entertainment, information and electronic commerce (e-commerce) services are where we are - not just our desktop computers, home PCs or television sets.'

 3G services will be an invaluable mobile dimension to services already an integral part of modern business life affects: Internet and Intranet access, video conferencing and interactive application sharing.

DIFFERENCE BETWEEN 2G AND 2.5G AND 3G ::

2G wireless technology Features the latest digital mobile phones include: - phone calls - Voice mail - simply email Receive Speed: Time for a download 10kb/sec 3min MP3 song: 31-41 minutes

2.5g Wireless technology now widely best features available include: - Telephone calls / fax - Voice mail -Send/receive large e-mail - browsings Web - Navigation / maps - New updates Speed: Time 64-144kb/sec for a 3min MP3 song download below: 6-9min

3G Wireless combines a computer, laptop and mobile TV functions include: - Telephone calls / fax - Global roaming - Send / receive large email messages - High-speed Web Navigation / maps Videoconferencing - TV Streaming - Electronic agenda meeting reminder. Speed: Time 144kb/sec-2mb/sec download a 3min MP3 song: 11sec-1.5min

WHAT IS 3G INTERNET SERVICES ?

Internet 3G refers to a type of Internet access offered by mobile phone companies that subscribers can use to access faster speeds than previous versions, such as 2G and 2.5G Internet.

This is typical of mobile devices like cell phones already have a 3G capable device, access network. 3G stands for third generation and third-generation network technology.

 This is a set of standards or rules that allow mobile devices to connect wirelessly to the Internet to surf the web and phone calls. Technical name for the 3G network is the International Mobile Telecommunications-2000 or MT-2000 for short. For 3G Internet access, the user must have a compatible 3G phone as a 3G phone or a laptop.

it also has a list of 3G network. Traditional WiFi allows users to access the Internet from a laptop or other device that supports wireless Internet. While users have to pay for an internet connection in her home, many businesses and restaurants support local hotspots, where customers can access free WiFi. 3G networks are not free and those with 3G-compatible devices still have to pay before they can use an access 3G internet connection, regardless of where they are.

HOW TO TEST OF YOUR INTERNET SPEED::

YOU CAN EASILY TEST SPEED OF YOUR INTERNET::

CHECK IT OUT BELOW LINKS...

1>>  http://www.speedtest.net

2>> http://pcnineoneone.com

3>> http://www.speedtest.php

4>> http://www.broadbandspeedchecker.co.uk

5>> http://www.pingtest.net

6>> http://testinternetspeed.org

7>> http://www.bandwidthplace.com

WHAT IS WI-FI TV:

WiFi TV Every generation is searching for new improvements and new inventions in the field of technology. Wi-Fi TV technology is a union such as a gift to the current generation..

But this is not a surprise present generation ago had been looking for something something dynamic compliance with all technology equipment. Present age is the age of communication and we can not sacrifice one for another. All media of communication are somewhat interdependent...

 Before Wi-Fi was the support of computers and phones and laptops with wireless internet facility. Only a medium of transmission was not in charge of the general public. Of course, there will be some moments when you want TV, too. Here it is! Wi-Fi TV is the merging of two technologies..

LIMITATION OF WI-FI SYSTEM

Limitations of WiFi WiFi technology has many advantages, but also limitaitons well. Wi-Fi is a wireless technology that many people with other computers on the network or the Internet without wires, and physically.

It has enormous power that the revolution in the LAN world. Through these people could not WiFi internet access, do not worry now. Why WiFi offers direct access to the Internet by means of it....

WI-FI limit is depends on its range also..

Wi-Fi SECURITY:

Wi-Wi-Fi Security Security gear has advanced security features provided by WPA2, which the latest version of Wi-Fi security is used in all kinds of Wi-Fi equipment to fit. WPA2 supports Advanced Encryption Standard (AES), which is used for network attacks to protect their safety accept and maintain and the most common privacy.

The wired equivalent security can be easily relinquished, even when configured correctly. WiFi access in the WPA and WPA2 encryption, which solves the problem. WiFi security enables encryption-free mode. Consumer WiFi will be able to choose from a wide range of brands..

. This product types easy method to make them add to their network. Connects different types of equipment for Wi-Fi networks can monitor and record any kind of personal data...

FEATURES OF WI-FI TECHNOLOGY::

 Features of WiFi technology (802.11) Features WiFi WiFi has many features that make it to network with simple and easy wire. WiFi technology is, in spirit, a wireless version of Ethernet in the form of a wireless local area network.

WiFi technology can be used for two or more than two devices for various purposes such as data sharing. There is no need of wires connected to the Internet or a network build. WiFi based on the IEEE 802.11 million people now days. Using technology built-in wireless feature amazing

WI-FI PRODUCTS

1>> WiFi Internet radio

 WiFi Internet Radio is such a wonderful device that is also called wireless music player. Internet radio can receive signals automatically and then play them at home WiFi network. Now nontraditional areas of the world and has almost 1300 stations.

2>> SDIO WiFi

 From SDIO action in a market WiFi PC PDA market. It is used for alternative PDA capabilities in mobile devices, SDIO. Due to move SDIO wifi in the new era.

3>>  WiFi Antenna

Antenna is used to optimize your connection. Many businesses, industries are getting benefits of Internet access with WiFi hotspot, offices and homes. Antenna signal strength, security and quick access through routers, access points etc.

4>> WiFi access point

Access  adjacent points using wireless network. It is like a hub for the transfer of data between connected devices and make them a unit. discussion approach possible by other means allowed to point wired wireless devices connected.

5>>  WiFi Analyzer

Analyzer is a de facto tool used for troubleshooting and auditing of wireless networks. This helps users by detecting threats and other network errors and resolve them quickly. This is the one and only one network diagnostic tool that allows for testing and wireless performance issues such as throughput, connectivity, device conflicts and some multi-diagnosis. WiFi analyst a complete performance reporting engine. It collects data required by the user with the policies and regulations.

 WiFi Analyzer Analyzer Express Express your base system to provide and the ability to view and equipment to detect problems automatically. Express WiFi Analyzer identifies problems in general physical and special equipment. Audit issues and made possible by WiFi Analyzer Express. It may take a variety of functions such as detecting out, stop attacks to keep safe. It also decoding and filtering capabilities. Swift WiFi Clear ........... Clear WiFi Swift always view the content of messages and other Web is security. Clear WiFi Swift different set of conventional program depends on the solutions to each. This is an interesting product and newest product which is used for email and small web transport two things together and they are aimed at entry-level application.

6>>  AirMagnet WiFi

  airmagnet WiFi wireless industry to develop design solutions. It is used to provide the best performance. air magnet wifi also deals with security and compliance. To get the most accurate most organizations use the WiFi signal recording airmagnet real worlds to gather, the most anticipated performance, and get specific data series when you have a recording of a page. WiFi airmagnet used to help performance and radio coverage in most scientific way to measure.

7>>  WiFi AUTOdoc

AUTOdoc is ......... Software especially a full report of firewall configuration files to generate. The report by AUTOdoc easy printable by the printer, when displayed on the screen. Autodoc perform various functions such as table of content links, controlling multiple boxes, export HTML, etc.

WI-FI

<< Wi-Fi >>

 Wi-Fi wireless Internet service, typically via cable connection, but dial-up T1 and wireless is also possible. Wireless Internet takes an input and emits waves. Wi-Fi signal strength and speed depends on the wireless router is used to attempt to plant, but internal cards and external wireless signal to get to have an impact on transfer speed.

Wi-Fi is usually part of a broader package of the Internet. But with Wi-Fi routers can be found at major retailers, it is possible for consumers to set up their wireless networks, independent of their usual providers of Internet service. Wi-Fi is also increasingly being offered for free in many public places like restaurants, bookstores and cafes.

SOME WAY HOW TO CONNECT THE INTERNET?

A Guide to the ways people can connect to the internet as the technology grows, so we have the largest Internet, better and faster. Over the years, so the content is presented through the Web has changed drastically. Ten years ago, is able to focus the bold, colored text was something to admire, and now flash animation, online gaming, video streaming, websites database driven, e-commerce and virtual offices - with name but a few - is setting standards. Need for speed has changed the options available to consumers and businesses both in terms of how and how quickly can connect to the internet. As technology changes at a rapid pace, so even the Internet. Speed ​​link below provides an overview of the average maximum speed at the time of publication. This undoubtedly will change over time and Internet connection speed also varies between Internet Service Providers (ISP

 1>> Analog (up to 56k)

Also called dial-up, it is both economical and slow. Using a modem connected to your PC, users access the Internet when the computer dials a phone number (which is provided by your ISP) and connects to the network. Dial-up is an analog connection, because the data is sent to an analog public telephone network. Analog modem connection takes digital data and vice versa. Because dial-up access uses normal telephone lines to the quality of connectivity is not always good and data rates are limited. Typical dial-up connection speeds ranging from 2400 bps to 56 Kbps

2>>  ISDN

 Integrated services digital network (ISDN) is an international communications standard for sending voice, video and data over digital telephone lines or normal telephone wires. Typical ISDN speeds ranging from 64 Kbps to 128 Kbps.

3>>  B-ISDN Broadband

ISDN is similar in function to ISDN, but the data transfer over fiber optic lines do not, normal telephone wires. SONET is the physical backbone of B-ISDN transport. Broadband ISDN is not widely applied.

4>> DSL

DSL is also called an always on connection because it uses existing 2-wire copper telephone line connected to the starting point and will not take your phone as a dial-up is not. No need to dial into your ISP as DSL is always on. Two main categories of DSL for home subscribers are called ADSL and SDSL.

5>> ADSL

 ADSL is the most established types of DSL in North America. Short for Asymmetric Digital Subscriber Line ADSL supports data rates of 1.5 to 9 Mbps when receiving data (known as the rate of downstream) and 16-640 Kbps when sending data (known as rate upstream). ADSL is a special ADSL modem.

6>> ADSL 2

 ADSL 2 A is an extension of ADSL broadband technology that provides subscribers with a speed significantly faster download compared to traditional ADSL connections. ADSL 2 works the same way as a filter to separate ADSL is installed on the customer hotline telephone existing copper lines (POTS) between normal phone (voice) and ADSL 2 disruption. ADSL2 + service is the most commonly offered in more populated metropolitan areas and subscribers must be in close geographical locations of the providers Central Office ADSL2 + service to you.

7>> SDSL

 SDSL is still very common in Europe. Short for symmetric digital subscriber line, a technology that allows information to be sent over existing copper telephone lines (POTS). SDSL supports data rates up to 3 Mbps. SDSL works by sending digital pulses in the field of high-frequency telephone wires and can not simultaneously with voice connections that operate over the same wires. 

DEFINATION OF INTERNET

THERE ARE SOME DEFINATION'S OF INTERNET,.

The Internet is .........

1>>   A group of computer networks are all over the world. It is the largest communications network ever conceived. Connected networks are made up of educational sites, commercial and government. Their networks can be done in any number of computers from two to infinity. Collection of sites on the Internet is a great source of information on the history of a network of electronic communications that connects computer networks and organizational computer facilities around the world .

2>> The Internet is an independent body that relies on voluntary contributions from supporters. Nobody in particular the establishment of the Website or contributions. One of the main features of the website, no central computer or control person directing traffic or information. Conventions and protocols used to allow system operations and functions of all the millions of users to control the Internet is a giant network .....

3>> It's  a composed of millions of computers. These computers are all connected by telephone lines, coaxial cable, satellites, fiber optic lines and wireless internet connection connection .......

4>> it's global network of computers. Every computer connected to the Internet, regardless of its location, is considered part of the network. This means that every time you access the Internet, you immediately have access to a virtually unlimited number of computers connected simultaneously with the world ....

5>>  internet is a networks of networks..


WHO IS THE FATHER OF INTERNET ??

INTERNET father or Founder is...
.

>>  "" Sir Timothy John "Tim" Berners-Lee ""..

HOW WORK INTERNET

The purpose of the Internet to inform, educate and entertain its users. By 1996, there were more than 25 million computers in over 180 countries online.

This number continues to grow exponentially each year degree. No more information available online, as can be found in the library the largest in the world. Functioning of the Internet to make use of the gate to enter. Once online, the data sent to and received by users on their Web addresses. The address is unique for each connection or port.

 There are two main types of addresses to use, what Internet Protocol address (IP) and the address above. An IP address is a decimal number that determines the routing information to the user, but difficult to remember and to interpret the IP addresses are translated into alphanumeric names domain naming.

At the address above include the type of organization, name of supplier and sources often special items being taken from (eg www.microsoft.com or www.uwashington.edu). The above address may indicate the country of origin, such as ca for Canada. Or. Uk for United Kingdom..

WHO WAS THE FIRST USER OF INTERNET

 Charley Kline at UCLA sent the first packet in the ARPANET as he tried to Stanford Research Institute on October 29, 1969. Fell when the failed system G in LOGIN...

A BRIEF HISTORY OF THE INTERNET


The Internet is the result of some visionary thinking by people in early 1960, with the greatest possible value to the computer later to exchange information on research and development in scientific and military fields. JCR Licklider of MIT, with the first proposal for a global network of computers in 1962, and moved on the Defense Advanced Research Projects Agency (DARPA) in late 1962, work to develop it on the head. Leonard Little Rock MIT and later UCLA developed the theory of packet switch, which was the basis of Internet connections to form. Lawrence Roberts of MIT connected a Massachusetts computer with a California computer in 1965 over dial-up telephone lines. It has the possibility of wide area network, but also showed that the telephone line circuit switching was inadequate. The theory of packet switching Little Rock confirmed. Roberts was transferred to DARPA in 1966 and developed his plan for ARPANET. These visionaries and many more left unnamed here are the true founders of the Internet..

On the Internet, then known as ARPANET, was brought online in 1969 under a contract let by the renamed Advanced Research Projects Agency (ARPA) which initially four major computers at universities in the southwestern U.S. (UCLA, Stanford Research Institute , UCSB, and University of Utah). The contract was carried out by BBN of Cambridge, MA under Bob Kahn and went online in December 1969. By June 1970,, MIT Harvard, BBN, and Systems Development Corp (SDC) in Santa Monica, Cal. added. By Jan 1971, Stanford, MIT Lincoln Labs was, Carnegie Mellon and Case Western Reserve U added. In coming months, NASA / Ames, Mitre, Burroughs, RAND, and Illinois were closed in. Then there was more to keep listing here..

The Internet was designed in part a communication network that will work even if some of the countries devastated by nuclear attacks too. As the most direct route is not available, routers would direct traffic around the network via alternate routes. Internet originally used by computer experts, engineers, scientists and librarians. 

There was nothing friendly about it. There was no home or office personal computers in those days, and someone using it, or a computer or a professional engineer or scientist or librarian, had to learn a very complex system to use ....... . ... E ............ mail was adapted for ARPANET by Ray Tomlinson of BBN in 1972. He picked up the @ symbol of the available characters in his name and address of the telex link. Telnet Protocol, so logging on to a remote computer, was known as a Request for Comments (RFC) in 1972. RFC are a means of sharing the work of community development. FTP protocol so that file transfers between sites, was published as an RFC in 1973, and from then on RFC were available electronically to anyone who uses the FTP protocol. Libraries began automating and networking their catalogs in the late 1960s independent from ARPA. Visionary Frederick G. Kilgour Center Ohio College Library (now OCLC, Inc.) led networking of libraries of Ohio, during the 60's and 70's.

 In the mid-1970s more regional consortia of New England, Southwest states and Middle Atlantic states, etc., along with Ohio, a national, later international network to form. Automated catalogs, not very friendly at first, became available in the world, first through telnet or hard IBM variant TN3270 and only many years later through the Internet. See History, Internet OCLC.. frost at 70 because of TCP / IP architecture first proposed by Bob Kahn at BBN and further developed by Kahn and Vint Cerf at Stanford and others in the 70's.

 It is through the Defense Department in 1980 replacing the earlier Network Control Protocol (NCP) and the universe

WHO CALLED INTERNET

A MEANS for a computer to any computer anywhere in the world using dedicated routers and servers. When two computers connect to the Internet, they can send and receive all sorts of information such as text, graphics, sound, video, and computer software. Nobody owns the Internet, although many organizations in the world to cooperate in the functioning and development.

With high-speed optical fiber cables (called columns) that the majority of internet travel information by telephone companies in their respective countries invaded. Wide Internet grew from Advanced Research Projects Agency Network Area (then called the ARPANET), established by the U.S. Department of Defense in 1960 for cooperation in military research between business and government labs. Later, universities and other institutions linked to the U.S..

 This led to ARPANET beyond everyone's expectations and took the name "internet". Developing hypertext-based technology (called the World Wide Web, WWW, or simply the Web) provided through text, graphics, and animations, and easily search and navigation tools as well as leading Internet explosive growth worldwide.

WHO MANAGE THE INTERNET

Internet Management Perhaps the least understood aspect of the Internet is its management. In recent years, this topic is the topic of intense interest and international trade, with several government and commercial organizations, and congressional hearing recently. The issue is how the Internet will be managed in the future, and in the process, monitoring mechanisms will ensure that public interest is served adequately. In the 1970s, managing the website was easy. Since few people knew about the Internet, almost all decisions about real policy concern in the office of DARPA. It became clear in late 1970, but that more community involvement in decision making is imperative. In 1979, DARPA established the Internet Configuration Control Board (ICCB) to ensure that community members technical knowledge to discuss critical issues, people educated outside of DARPA on the issues, and helped other TCP / IP protocols and gateway functions to perform . At that time, there was no company that offers turnkey solutions to get online.

It would be another five or so years before companies like Cisco Systems was formed, and while there were no computers, only stations available are specially constructed and their software was not configured for use in general with external networks, they certainly consider duration time. In 1983, the small group of about twelve members ICCB reconstituted (with some substitutions) as the Internet Activities Board (IAB), and about ten "Task Force" among their issues in specific technical areas to address. Participants in workshops Internet Group are invited many members of task forces as they wanted. Domain Name System Management provides a kind of microcosm of the issues are often associated with the overall management and operation of Internet evolution. Someone must take responsibility for overseeing the overall operation of the system.

 In particular, high-level domain names were chosen, together with persons or organizations, each of them to manage. Rules for assigning Internet addresses to be. DARPA had asked earlier in the late Jon Postel USC Information Sciences Institute to participate in various functions relating to the administration of names, addresses and protocol-related issues. Over time, Postel take further responsibilities in the area of ​​its total, and DARPA, which was sustained efforts, his silent approval. This activity is commonly referred to as the Internet Assigned Numbers Authority (IANA) [xix]. At this time, Postel, the arbiter of all disputed issues of names and addresses of his untimely death in October 1998.

 It is useful to separately consider the problem of space management domain name and website address space. These two key elements of Internet architecture quite different characteristics of color management problems they produce. Domain names semantics that numbers should not mean, and therefore a means of determining who may use that particular need. As a result, speculators in Internet names often require a large number of them without the intent to use them, but it later sold. alternative resolution mechanisms [xx], if widely adopted, could significantly change the landscape here.

The rapid growth of the Internet has led to the drafting of a new address space and larger (known as IP version 6 address space), the Internet today uses IP version 4 [xxi]. However, there is little momentum to develop IPv6 widely deployed. Despite concerns to the contrary, the IPv4 address space is exhausted for a long time. Moreover, the use of Dynamic Host Configuration Protocol (DHCP) is a dynamic IP address set to

THE INTERNET STANDERD PROCESS

Standards Internet Internet standards process execution time research activities sponsored by DARPA. Investigators increasingly leading online research effort largely determines the properties of TCP / IP protocols will be shared. Initial work in this area began with the joint effort of both authors continued Cerf's group at Stanford, and soon after joined his engineers and scientists at BBN and University College London.

This informal arrangement has changed over time and data can be found elsewhere [xviii]. Currently, Internet standards efforts directed mainly under the auspices of the Internet Society (ISOC). Internet Engineering Task Force (IETF) working under the leadership of the Internet Engineering Steering Group (IESG), the appointments are approved by the Internet Architecture Board (IAB), which is itself now part of the Internet Society populated. IETF consists of more than one hundred working groups, and managed by directors of the Area that specialize in specific categories.

There are other organizations with an interest in web standards or international standards on the Internet. Examples include the International Telecommunication Union Telecommunication Standards group (ITU-T), International Institute of Electrical and Electronic Engineers (IEEE) local area network standards group (IEEE 801), International Organization for Standardization (ISO), American National Standards Institute ( ANSI), World Wide Web Consortium (W3C) and many others. As Internet access and services provided by existing media such as telephone cables and electronic interactions with standards bodies and legal structures are formed to deal with the media, one issue became increasingly complex.

 Combination of interests is also interesting and complex, and a growing need for careful collaboration between various interested parties.

Who runs the INTERNET


 Domain Name System, Internet developed as an experimental system during 1970 and 1980. It is flourishing in TCP / IP protocols are necessary for ARPANET and other networks in January 1983, standard protocols so many other networks. Indeed, the Internet has so rapidly that the existing mechanisms for associating the names of host computers (eg, UCLA, USC ISI) for Internet addresses (known as IP addresses), were about to be extended beyond acceptable engineering limits.

 Most of the applications on the Internet refers to target computers by name. These names must be translated into Internet addresses to lower-level protocols can be enabled to apply for assistance. For a time, a group at SRI International in Menlo Park, CA, called Network Information Center (NIC), has kept a list of simple, machine-readable names and Internet addresses that link was made available on the net. Internet hosts just want a copy of this list, usually daily, such as a local copy of the table to maintain. This list is known as file "host.txt" (because it was just a text file).

 List was in place on the internet that directory services (eg 411 or 703-555-1212) has the U.S. phone system - translating a name to an address. As the Internet grew, it became difficult for the NIC to keep the current list. Before this problem will only get worse, as the network expanded, researchers at USC Information Sciences Institute began with an attempt to create a broader way to ensure that information the same design. The end result was the Domain Name System (DNS) [xvi], which allowed hundreds of thousands of "name servers" small part of a global database of information to associate IP addresses with the names of computers on the Internet to maintain.

 Hierarchical structure name is in nature. For example, host computers connected to the educational institutions have names like "stanford.edu" or "ucla.edu. Hosts special must have names like" cs.ucla.edu "to refer to a computer in the computer science department of UCLA, for example. A set of computers called "root servers" to store information about the names and addresses of other servers containing more detailed name / address associations.

 designers of DNS also has developed seven generic " high-level "domains, as follows: 

   -Education
 - EDU Government
 - Military Government
 - International MIL 
- INT Network
 - NET (non-profit) Organization
 - Commercial ORG 
 - COM

INTERNET ARCHITECTURE


Its authors created architecture for connecting independent networks into seamless whole to federal, without any of the major networks. This was the advent of the Internet as we know it today. To work properly, the architecture of the global mechanism for responding (or Internet address) of computers in the network can invoke and communicate with computers on another network in the Federation. Internet addresses fill essentially the same role as telephone numbers in telephone networks. The design of the Internet is supposed first that the networks can not be changed, new architectural requirements for accommodation, but this is largely a pragmatic acceptance to facilitate progress. Networks have varying degrees of reliability and speed. Host computers will need to be able to upset packages to sit back in the right order and discard duplicate packets generated on the road. It was a big change from the virtual circuit similar services provided by the ARPANET and then this commercial network data services Tymnet and Telenet. In these networks, core network responsible for keeping all information is accurate and retransmission of information that could be lost. Computers Internet design, which are responsible for this trend to network problems. Basic architectural construction, introduction of portals (now called routers) between the networks of other treatments such as different bandwidth, packet sizes, error conditions and your requirements. The port will verify addresses Internet destination of each packet the door to what must be sent to fix. These functions will be combined with certain characteristics, end-end reliable communications production from source to destination. Draft paper the authors describe this approach was given at a meeting of the International Network Working Group in 1973 in Sussex, England and the final report was subsequently published by the Institute of Electrical and Electronic Engineers, the leading professional association for electrical engineering profession in its transactions Communications May, 1974 [VII]. The document describes the TCP / IP protocol. DARPA contracted with Cerf is a group at Stanford for a first working draft of the software TCP and soon after, with BBN and University College London independent implementation of the TCP-building (as they were called - was later split into TCP and IP) for different machines. BBN has a contract with a prototype version of the port to build. These three places in the development and testing of the initial reports on different machines. Cerf, then a professor at Stanford, provided the day to day leadership in the initial TCP software design and testing. BBN deployment of gateways between the ARPANET and PRNET and Satnet. During this period, including the overall management Cannes is DARPA, the initial feasibility of the architecture of the Internet proved.

Evolution of the INTERNET.

 the foundation of the Internet is composed of global communications to hundreds of thousands of otherwise independent computers, the subjects of communication and information systems.

What this correlation is possible using a set of communication standards, procedures and formats in common between the networks and different devices and computer facilities related thereto. Procedures that computers communicate with each other are called "protocols." While this infrastructure is continuously developing new capabilities to include, initially, used by Internet protocols called "TCP / IP protocols, named after the two main protocols that formed the basis for the functioning of the Internet. On top of this infrastructure is a group developing architectural concepts and data structures for heterogeneous information systems that deliver the Internet a truly global system of information. In essence, the Internet is an architecture, although many people confuse it with its implementation.

When Internet is seen as an architecture, it manifests two different abstractions. Another attraction is about communications connectivity, packet delivery and a variety of end-end communication services. Other agreements of abstraction with the Internet as an information system, regardless account of its basic infrastructure of communication that can create, store and access a wide range of information sources, including digital objects and related services at different levels of abstraction. interconnecting computer is a digital problem itself. The process Computers and digital information exchange, which means they use a discrete mathematics "binary" or "double value" language of 1s and 0s. For communication purposes, such information is completely continuous electrical or optical waveforms. Use digital signal regeneration recovery accurate and reliable basic pieces. We use "computer" terms, "computer resources" and "account" not only traditional computing means, but digital devices in a network management, a information such as mobile applications and other computer skills. phone network operators began with hand phones linked together through "patch panels" adopted patch cords for each phone line and electrical connect them together by the panel of acting, in fact, like a switch.

The result was called circuit switching, because its conclusion, an electrical circuit is made between the phone and calling the phone call. Conventional circuit switching, which is designed to handle phone calls are inappropriate for connecting computers, because it makes limited use of telecommunications facilities and time to set up links. Although highly reliable voice communication, network, circuit-switched voice is rich problems delivering digital information without errors. For digital communications, packet switching is a better choice because it is much better suited to the typical "burst" style communications computers. computers communicate usually send short but intense bursts of data, then stay silent for a while before sending the next burst. These bars are communicated as packets, as well as electronic postcards. postcards, in fact, packets are passed from computer to computer until they reach their destination .

Computers particular broadcast are not working include the name "packet switching" or "routers" and is the equivalent of many bucket brigades voltage continents and oceans, while buckets of electronic postcards from one computer to another. Together these routers and communication links between them form the foundation of the Internet. Without packet switching, the Internet would not exist as we know it today. Return to the postcard analogy..