Showing posts with label Information Technology. Show all posts
Showing posts with label Information Technology. Show all posts

Thursday, May 14, 2009

HTML Basic

What is an HTML File?

  • HTML stands for Hyper Text Markup Language
  • An HTML file is a text file containing small markup tags
  • The markup tags tell the Web browser how to display the page
  • An HTML file must have an htm or html file extension
  • An HTML file can be created using a simple text editor

Do You Want to Try It?

If you are running Windows, start Notepad.

If you are on a Mac start SimpleText.

In OSX start TextEdit and change the following preferences: Select (in the preferences window) "Plain text" instead of "Rich text" and then select "Ignore rich text commands in HTML files". This is very important because if you don't do this HTML codes probably won't work.

Type in the following text:

<>Title of page

This is my first homepage. This text is bold

Save the file as "mypage.htm".

Start your Internet browser. Select "Open" (or "Open Page") in the File menu of your browser. A dialog box will appear. Select "Browse" (or "Choose File") and locate the HTML file you just created - "mypage.htm" - select it and click "Open". Now you should see an address in the dialog box, for example "C:\MyDocuments\mypage.htm". Click OK, and the browser will display the page.


Example Explained

The first tag in your HTML document is . This tag tells your browser that this is the start of an HTML document. The last tag in your document is . This tag tells your browser that this is the end of the HTML document.

The text between the tag and the tag is header information. Header information is not displayed in the browser window.

<> tags is the title of your document. The title is displayed in your browser's caption.The text between the

The text between the tags is the text that will be displayed in your browser.

The text between the and tags will be displayed in a bold font.


HTM or HTML Extension?

When you save an HTML file, you can use either the .htm or the .html extension. We have used .htm in our examples. It might be a bad habit inherited from the past when some of the commonly used software only allowed three letter extensions.

With newer software we think it will be perfectly safe to use .html.


Note on HTML Editors:

You can easily edit HTML files using a WYSIWYG (what you see is what you get) editor like FrontPage, Claris Home Page, or Adobe PageMill instead of writing your markup tags in a plain text file.

But if you want to be a skillful Web developer, we strongly recommend that you use a plain text editor to learn your primer HTML.


Frequently Asked Questions

Q: After I have edited an HTML file, I cannot view the result in my browser. Why?
A:
Make sure that you have saved the file with a proper name and extension like "c:\mypage.htm". Also make sure that you use the same name when you open the file in your browser.

Q: I have tried to edit an HTML file but the changes don't show in the browser. Why?
A:
The browser caches your pages so it doesn't have to read the same page twice. When you have changed a page, the browser doesn't know that. Use the browser's refresh/reload button to force the browser to read the edited page.

Q: What browser should I use?
A:
You can do all the training with all of the common browsers, like Internet Explorer, Mozilla, Netscape, or Opera. However, some of the examples in our advanced classes require the latest versions of the browsers.

Q: Does my computer have to run Windows? What about a Mac?
A:
You can do all your training on a non-Windows computer like a Mac. However, some of the examples in our advanced classes require a newer version of Windows, like Windows 98 or Windows 2000.

HTML Basics

html-introduction

Java Script Tutorial

JavaScript is used in millions of Web pages to improve the design, validate forms, detect browsers, create cookies, and much more.

JavaScript is the most popular scripting language on the internet, and works in all major browsers, such as Internet Explorer, Mozilla, Firefox, Netscape, Opera.


What You Should Already Know

Before you continue you should have a basic understanding of the following:

  • HTML / XHTML

If you want to study these subjects first, find the tutorials on our .


What is JavaScript?

  • JavaScript was designed to add interactivity to HTML pages
  • JavaScript is a scripting language (a scripting language is a lightweight programming language)
  • A JavaScript consists of lines of executable computer code
  • A JavaScript is usually embedded directly into HTML pages
  • JavaScript is an interpreted language (means that scripts execute without preliminary compilation)
  • Everyone can use JavaScript without purchasing a license

Are Java and JavaScript the Same?

NO!

Java and JavaScript are two completely different languages in both concept and design!

Java (developed by Sun Microsystems) is a powerful and much more complex programming language - in the same category as C and C++.


What can a JavaScript Do?

  • JavaScript gives HTML designers a programming tool - HTML authors are normally not programmers, but JavaScript is a scripting language with a very simple syntax! Almost anyone can put small "snippets" of code into their HTML pages
  • JavaScript can put dynamic text into an HTML page - A JavaScript statement like this: document.write("

    " + name + "

    ") can write a variable text into an HTML page
  • JavaScript can react to events - A JavaScript can be set to execute when something happens, like when a page has finished loading or when a user clicks on an HTML element
  • JavaScript can read and write HTML elements - A JavaScript can read and change the content of an HTML element
  • JavaScript can be used to validate data - A JavaScript can be used to validate form data before it is submitted to a server, this will save the server from extra processing
  • JavaScript can be used to detect the visitor's browser - A JavaScript can be used to detect the visitor's browser, and - depending on the browser - load another page specifically designed for that browser
  • JavaScript can be used to create cookies - A JavaScript can be used to store and retrieve information on the visitor's computer

Keyboard Shortcuts...Very Helpful Information

Keyboard Shortcuts...Very Helpful Information


When speed counts, the keyboard is still king. Almost all the actions and commands you can perform with a mouse you can perform faster using combinations of keys on your keyboard. These simple keyboard shortcuts can get you where you want to go faster than several clicks of a mouse. You'll work faster on spreadsheets and similar documents, too, because you won't lose your place switching back and forth between mouse and keys.

Here are some of the most useful keyboard shortcuts:
Quote:
Copy. CTRL+C
Cut. CTRL+X
Paste. CTRL+V
Undo. CTRL+Z
Delete. DELETE

Quote:
Delete selected item permanently without placing the item in the Recycle Bin. SHIFT+DELETE
Copy selected item. CTRL while dragging an item
Create shortcut to selected item. CTRL+SHIFT while dragging an item
Rename selected item. F2
Move the insertion point to the beginning of the next word. CTRL+RIGHT ARROW
Move the insertion point to the beginning of the previous word. CTRL+LEFT ARROW
Move the insertion point to the beginning of the next paragraph. CTRL+DOWN ARROW
Move the insertion point to the beginning of the previous paragraph. CTRL+UP ARROW
Highlight a block of text. CTRL+SHIFT with any of the arrow keys
Select more than one item in a window or on the desktop, or select text within a document. SHIFT with any of the arrow keys
Select all. CTRL+A
Search for a file or folder. F3
View properties for the selected item. ALT+ENTER
Close the active item, or quit the active program. ALT+F4
Opens the shortcut menu for the active window. ALT+SPACEBAR
Close the active document in programs that allow you to have multiple documents open simultaneously. CTRL+F4
Switch between open items. ALT+TAB
Cycle through items in the order they were opened. ALT+ESC
Cycle through screen elements in a window or on the desktop. F6
Display the Address bar list in My Computer or Windows Explorer. F4
Display the shortcut menu for the selected item. SHIFT+F10
Display the System menu for the active window. ALT+SPACEBAR
Display the Start menu. CTRL+ESC
Display the corresponding menu. ALT+Underlined letter in a menu name
Carry out the corresponding command. Underlined letter in a command name on an open menu
Activate the menu bar in the active program. F10
Open the next menu to the right, or open a submenu. RIGHT ARROW
Open the next menu to the left, or close a submenu. LEFT ARROW
Refresh the active window. F5
View the folder one level up in My Computer or Windows Explorer. BACKSPACE
Cancel the current task. ESC
SHIFT when you insert a CD into the CD-ROM drive Prevent the CD from automatically playing.


Use these keyboard shortcuts for dialog boxes:
Quote:
Move forward through tabs. CTRL+TAB
Move backward through tabs. CTRL+SHIFT+TAB
Move forward through options. TAB
Move backward through options. SHIFT+TAB
Carry out the corresponding command or select the corresponding option. ALT+Underlined letter
Carry out the command for the active option or button. ENTER
Select or clear the check box if the active option is a check box. SPACEBAR
Select a button if the active option is a group of option buttons. Arrow keys
Display Help. F1
Display the items in the active list. F4
Open a folder one level up if a folder is selected in the Save As or Open dialog box. BACKSPACE

If you have a Microsoft Natural Keyboard, or any other compatible keyboard that includes the Windows logo key and the Application key , you can use these keyboard shortcuts:

Display or hide the Start menu.

Quote:
Display the System Properties dialog box. +BREAK
Show the desktop. +D
Minimize all windows. +M
Restores minimized windows. +Shift+M
Open My Computer. +E
Search for a file or folder. +F
Search for computers. CTRL+ +F
Display Windows Help. +F1
Lock your computer if you are connected to a network domain,
or switch users if you are not connected to a network domain. + L
Open the Run dialog box. +R
Display the shortcut menu for the selected item.
Open Utility Manager. +U


Helpful accessibility keyboard shortcuts:
Quote:
Switch FilterKeys on and off. Right SHIFT for eight seconds
Switch High Contrast on and off. Left ALT +left SHIFT +PRINT SCREEN
Switch MouseKeys on and off. Left ALT +left SHIFT +NUM LOCK
Switch StickyKeys on and off. SHIFT five times
Switch ToggleKeys on and off. NUM LOCK for five seconds
Open Utility Manager. +U


Keyboard shortcuts you can use with Windows Explorer:
Quote:
Display the bottom of the active window. END
Display the top of the active window. HOME
Display all subfolders under the selected folder. NUM LOCK+ASTERISK on numeric keypad (*)
Display the contents of the selected folder. NUM LOCK+PLUS SIGN on numeric keypad (+)
Collapse the selected folder. NUM LOCK+MINUS SIGN on numeric keypad (-)
Collapse current selection if it's expanded, or select parent folder. LEFT ARROW
Display current selection if it's collapsed, or select first subfolder. RIGHT ARROW



what is the virus?
1) Virus is a little program whos activity can destruct/destroy
some files and a computer system. If this program does not open, it's
inactive and could not or will not destroy anything.

WHAT IS A VIRUS-EMAIL?

2) The virus program is brought to you by an email as attachment. It
has a server itself (virus server). File virus attachments cannot go to
another email, such as an email was sent by user (netter), member,
moderator etc to be as their attachment. It must be brought to you by
email
itself,that we called EMAIL Of VIRUS.

WHAT'S THEIR ADDRES?

3) EMAIL OF VIRUS would be sent by any email address of any account,
that it found and cracked from some mailbox or address-book of other
person
anywhere. So that why the email of virus looks like it was sent by our
friend, our member,our moderator etc..... even it is able to email a
virus by our own email address.

HOW TO SEE IS THAT A VIRUS ATTACHMENT?

4) To identification of virus attachment:
a). it has a small size ( <150KB )
b). it has extension file name such as below:
*.scr
*.clp
*.pif
*.bat
*.exe
*.com
*.txt
*.doc
*.lhz
*.rhz
and some time it's compressed by *.zip file.
Also by the fake name HotMovie.MPEG__________scr.
Actualy the file is virus file with extension .scr

HOW TO SEE IS THAT AN EMAIL VIRUS?

5) You are would able to understand an email virus from their SUBJECT,
most of them contains an amazing statement or unsusal word, such as
below:
Weah ^_^ Smiley)
Hokki=)
Hi Smiley
ello!=))
Hello - )
Hey, dude, it's me ^_^
access Mpeg
Re:your text
Re:Text message
Re:Msg reply
Re:Is that your document?
Re:Hot Movie(MPEG)
Re:Information...
Re;Important info
Re:This is your photos!
and more, and more...
If you received emails with the subject matter as above, you
should delete even with out openin.

NOTE:

Don't have words in ur email subject which resembles a virus mail
Otherwise your email would be deleted by recipient.
B. Why we use a screensaver?

Screensavers were first created to protect a computer monitor from phosphor burn-in. Early monitors had problems with the same image being displayed over and over for long periods of time. The phosphors, used to make the pixels in the display, glow at a constant rate for such a long period of time that they could discolor the glass surface of the monitor. This discoloration could be visible as a faint image overlaying whatever else was shown on the screen. Advances in technology and the creation of energy-saver monitors have virtually eliminated the need for screensavers.

Having said that, most of us still use screensavers. The most common reason is for entertainment, they just look good, however, you can also use a screensaver for security. Some screensavers can be set up with a password so you can walk away from computer and know it is safe.

Create Shortcut to Hibernate Windows XP instead of Shutdown


Hibernate is great because it saves the status of your Windows XP session (all the programs and documents you have open) to the hard drive, so it can automatically restore it the next time you power up. The first step to making a Hibernate shortcut is to make sure you have Hibernate turned on. Go to the Control panel then click Performance and maintenance. Next, choose Power options, and select the hibernate tab. Finally, make sure Enable hibernation is checked.

Now to actually make the shortcut right click your desktop and choose New | Shortcut. Next, type this case-sensitive command into the dialog box

Code:
rundll32.exe powrprof.dll,SetSuspendState Hibernate

click next. Give the shortcut a name like Hibernate and click finish. From now on all you need to do to enter hibernation is double click the shortcut.

Alos you can put this shortcut to Windows task scheduler so that system Hibernate can be achived at a particular time automatically.



XP Changing the User Type

Normally in XP Pro, through the Control Panel / User Accounts icon, you are only allowed to create administrators or limited users.
If you want to create

Right click on My Computer
Manage
Local Users and Groups
Users
Right click on the user you want to change
Properties
Member of tab
Add button
Advanced button
Find Now button
From here you see the full list of possibilities (e.g. Power User, Backup Operator etc.)

How to avoid fake Security Warnings or pop-up?
When you are browsing the internet and suddenly a window pop up with different messages for example" free update for your computer ","scan your computer with free antivirus". May be some pop-ups messages helpful for you but you should read first in detail before clicking it. Pop-ups basically an advertiser message or unwanted program and website that might be disturb your computer performance.

If you are working with Internet Explorer and want to block the pop-ups windows and unwanted messages. Open the Internet Explorer and click on Tools menu and go to Pop-up Blocker option, here you can Turn Off Pop-up Blocker to block pop-up from all websites. But you have option to allow some websites for pop-up. For this purpose open the Pop-up Blocker Setting. Here you can add some specific websites name to allow for pop-up and click Add. If you feel any problem to block any pop-up message due to some problem, simply click on the X at the right top of the pop-up windows.

Microsoft Excel Shortcut keys
Auto sum shortcut key : Quickly create a Microsoft Excel formula to get the sum of all cells by highlighting the cells you wish to know the value of and pressing ALT and = .

Create hyper links in Excel : Quickly create hyper links in your Microsoft Word, Excel, or Front Page document by highlighting text and pressing "CTRL + K".
Close all open files at once : Close all open Microsoft Word and/or Excel files by holding down the shift key and clicking "File" and then "Close All".

Quickly open recently opened files : Quickly open the recent files by first pressing "ALT + F" to open the file Menu and press 1, 2, 3, or 4.

Create underlines without any text : This tip works with the majority of Microsoft Office applications. Easily create an underlined space by pressing CTRL + U to start the underline, then press SHIFT + Space for each underlined space you wish to create. An example of how this could be used is for printable forms, for example: Name: .

Print only sections of a document : Save on your printer ink by selectively printing in Windows programs such as Microsoft Word, Internet Explorer, WordPad, Outlook, etc. To do this highlight portions of text you wish to print and click print. In the printer dialog window under Page Range choose the option Selection. It is important to realize that not all programs or printer drivers support this feature.

Repeat recent action : Using the F4 key in Microsoft Office 2000 and above allows the user to repeat the last used action. For example, if you have changed the font of a selected text and wish to change another portion of text to the same font, pressing F4 will do this for you automatically.

Quickly undo : Quickly undo mistakes in the majority of most PC Windows program by pressing CTRL + Z.

Quickly above cell contents : In Microsoft Excel press CTRL + SHIFT + " to copy the above cells contents.

Using the Microsoft Excel Auto filter : Organize cells quickly by using Microsoft Auto filter. Columns that contains long listing of data can be easily sorted by using the Auto filter option, to use this option select the top rows of the columns you want to be used and select Data / Filter and Auto Filter. Once successfully completed you can use drop down arrows to filter the data automatically.


Slow Shutdown in XP
Some people have noticed that they are experiencing a really slow shutdown after installing Windows XP Home or Professional. Although this can be caused a number of ways, the most clear cut one so far is happening on systems with an NVidia card installed with the latest set of drivers. A service called NVIDIA Driver Helper Service is loading up on start up and for whatever reason doesn't shut itself down properly. The service isn't needed and can also increase the amount of memory available to your system. Here is how to disable it.
Quote:
1: Go into your Control Panel
2: Select Administrative Tools and then click on Services
3: Right click on the file "NVIDIA Driver Helper Service" and then select STOP.
4: To stop this loading up every time you boot up your PC Right click it again and select properties - then where the option "Startup Type" is shown - make sure it is set at Manual like we have shown in the image below.
Some Nice information for Laptop Users
minimize all loaded programs and windows
Windows Button + M
Show Desktop
Windows Button + D
Load Windows Explorer
Windows Button + E
Load Run Command Window
Windows Button + R
Open Start menu
Windows Button or Ctrl + Escape
Load Utility manager
Windows Button + U
Lock Windows
Windows Button + L
Show Windows Task Manager
Ctrl + Shift + Escape
Close any sub window
Ctrl + F4
Minimize any active program or window
Alt + Space + N
Maximize any active program or window
Alt + Space + X
Restore any active program or window
Alt + Space + R
Move any active program or window (active window must not in maximizedposition)
Alt + Space + M
Re size any active program or window (active window must not in maximizedposition)
Alt + Space + S
Capture only active window (You can paste it in Paint Brush or any otherprogram like Photoshop or Microsot Word etc.)
Alt + Print Screen
Switching between loaded softwares
Alt + Tab
Get properties of selected file
Alt + Enter
Right click
Shift + F10
1.) Windows Hotkeys
* Shift + F10 right-clicks.
* Win + L (XP Only): Locks keyboard. Similar to Lock Workstation.
* Win + F or F3: Open Find dialog. (All Files) F3 may not work in someapplications which use F3 for their own find dialogs.
* Win + Control + F: Open Find dialog. (Computers)
* Win + U: Open Utility Manager.
* Win + F1: Open Windows help.
* Win + Pause: Open System Properties dialog.
* Win + Tab: Cycle through taskbar buttons. Enter clicks, AppsKey or Shift +F10 right-clicks.
* Win + Shift + Tab: Cycle through taskbar buttons in reverse.
* Alt + Tab: Display CoolSwitch. More commonly known as the AltTab dialog.
* Alt + Shift + Tab: Display CoolSwitch; go in reverse.
* Alt + Escape: Send active window to the bottom of the z-order.
* Alt + Shift + Escape: Activate the window at the bottom of the z-order.
* Alt + F4: Close active window; or, if all windows are closed, open shutdowndialog.
* Shift while a CD is loading: Bypass AutoPlay.
* Shift while login: Bypass startup folder. Only those applications will beignored which are in the startup folder, not those started from the registry(MicrosoftWindowsCurrentVersionRun)
* Ctrl + Alt + Delete or Ctrl + Alt + NumpadDel (Both NumLock states): Invokethe Task Manager or NT Security dialog.
* Ctrl + Shift + Escape (2000/XP ) or (Ctrl + Alt + NumpadDot) : Invoke thetask manager. On earlier OSes, acts like Ctrl + Escape.
* Printscreen: Copy screenshot of current screen to clipboard.
* Alt + Printscreen: Copy screenshot of current active window to clipboard.
* Ctrl + Alt + Down Arrow: Invert screen. Untested on OSes other than XP.
* Ctrl + Alt + Up Arrow: Undo inversion.
* Win + B : Move focus to systray icons.
2.) Generic
* Ctrl + C or Ctrl + Insert: Copy.
* Ctrl + X or Shift + Delete: Cut.
* Ctrl + V or Shift + Insert: Paste/Move.
* Ctrl + N: New... File, Tab, Entry, etc.
* Ctrl + S: Save.
* Ctrl + O: Open...
* Ctrl + P: Print.
* Ctrl + Z: Undo.
* Ctrl + A: Select all.
* Ctrl + F: Find...
* Ctrl+W : to close the current window
* Ctrl + F4: Close tab or child window.
* F1: Open help.
* F11: Toggle full screen mode.
* Alt or F10: Activate menu bar.
* Alt + Space: Display system menu. Same as clicking the icon on the titlebar.
* Escape: Remove focus from current control/menu, or close dialog box.
3.) Generic Navigation
* Tab: Forward one item.
* Shift + Tab: Backward one item.
* Ctrl + Tab: Cycle through tabs/child windows.
* Ctrl + Shift + Tab: Cycle backwards through tabs/child windows.
* Enter: If a button's selected, click it, otherwise, click default button.
* Space: Toggle items such as radio buttons or checkboxes.
* Alt + (Letter): Activate item corresponding to (Letter). (Letter) is theunderlined letter on the item's name.
* Ctrl + Left: Move cursor to the beginning of previous word.
* Ctrl + Right: Move cursor to the beginning of next word.
* Ctrl + Up: Move cursor to beginning of previous paragraph. This and allsubsequent Up/Down hotkeys in this section have only been known to work inRichEdit controls.
* Ctrl + Down: Move cursor to beginning of next paragraph.
* Shift + Left: Highlight one character to the left.
* Shift + Right: Highlight one character to the right.
* Shift + Up: Highlight from current cursor position, to one line up.
* Shift + Down: Highlight from current cursor position, to one line down.
* Ctrl + Shift + Left: Highlight to beginning of previous word.
* Ctrl + Shift + Right: Highlight to beginning of next word.
* Ctrl + Shift + Up: Highlight to beginning of previous paragraph.
* Ctrl + Shift + Down: Highlight to beginning of next paragraph.
* Home: Move cursor to top of a scrollable control.
* End: Move cursor to bottom of a scrollable control.
4.) Generic File Browser
* Arrow Keys: Navigate.
* Shift + Arrow Keys: Select multiple items.
* Ctrl + Arrow Keys: Change focus without changing selection. "Focus"is the object that will run on Enter. Space toggles selection of the focuseditem.
* (Letter): Select first found item that begins with (Letter).
* BackSpace: Go up one level to the parent directory.
* Alt + Left: Go back one folder.
* Alt + Right: Go forward one folder.
* Enter: Activate (Double-click) selected item(s).
* Alt + Enter: View properties for selected item.
* F2: Rename selected item(s).
* Ctrl + NumpadPlus: In a Details view, resizes all columns to fit the longestitem in each one.
* Delete: Delete selected item(s).
* Shift + Delete: Delete selected item(s); bypass Recycle Bin.
* Ctrl while dragging item(s): Copy.
* Ctrl + Shift while dragging item(s): Create shortcut(s).
* In tree pane, if any:
* Left: Collapse the current selection if expanded, or select the parentfolder.
* Right: Expand the current selection if collapsed, or select the firstsubfolder.
* NumpadAsterisk: Expand currently selected directory and all subdirectories.No undo.
* NumpadPlus: Expand currently selected directory.
* NumpadMinus: Collapse currently selected directory.
5.) Accessibility
* Right Shift for eight seconds: Toggle FilterKeys on and off. FilterKeys mustbe enabled.
* Left Alt + Left Shift + PrintScreen: Toggle High Contrast on and off. HighContrast must be enabled.
* Left Alt + Left Shift + NumLock: Toggle MouseKeys on and off. MouseKeys mustbe enabled.
* NumLock for five seconds: Toggle ToggleKeys on and off. ToggleKeys must beenabled.
* Shift five times: Toggle StickyKeys on and off. StickyKeys must be enabled.

Converting NTFS to FAT on C: with DOS Command


If you want to convert your drive from NTFS to FAT file system,then use this command in command prompt.
Quote:
C:/convert C:/NTFS:FS


In this command NTFS will become FAT and if you want to convert FAT to NTFS then just replace FS with NTFS.
Quote:
C:/convert C:/FS:NTFS.

If You Want : Speed Up Browsing

When you connect to a web site your computer sends information back and forth. Some of this information deals with resolving the site name to an IP address, the stuff that TCP/IP really deals with, not words. This is DNS information and is used so that you will not need to ask for the site location each and every time you visit the site. Although Windows XP and Windows XP have a pretty efficient DNS cache, you can increase its overall performance by increasing its size. You can do this with the registry entries below:
Quote:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters]
"CacheHashTableBucketSize"=dword:00000001
"CacheHashTableSize"=dword:00000180
"MaxCacheEntryTtlLimit"=dword:0000fa00
"MaxSOACacheEntryTtlLimit"=dword:0000012d


Make a new text file and rename it to dnscache.reg. Then copy and paste the above into it and save it. Merge it into the registry.

Friday, April 24, 2009

Information Technology (I.T)

What is Networking?
In the world of computers, networking is the practice of linking two or more computing devices together for the purpose of sharing data. Networks are built with a mix of computer hardware and computer software.
A network lets you effortlessly transfer files, pictures, music and information - without using a disk or burning a CD. It also enables everyone in your home or office to share one broadband Internet connection, one printer, one scanner... the list goes on and on.

Network Design
Computer networks also differ in their design.
The two types of high-level network design are called client-server and peer-to-peer. Client-server networks feature centralized server computers that store email, Web pages, files and or applications. On a peer-to-peer network, conversely, all computers tend to support the same functions. Client-server networks are much more common in business and peer-to-peer networks much more common in homes.
A network topology represents its layout or structure from the point of view of data flow. In so-called "bus" networks, for example, all of the computers share and communicate across one common conduit, whereas in a "star" network, all data flows through one centralized device. Common types of network topologies include bus, ring and mesh.

Network Type

LAN
• A local area network (LAN) is a computer network covering a local area, like a home, office or small group of buildings such as a college.
• Current LANs are most likely to be based on switched IEEE 802.3 Ethernet technology, running at 10, 100 or 1,000 Mbit/s, or on Wi-Fi technology.
• Each node or computer in the LAN has its own computing power but it can also access other devices on the LAN subject to the permissions it has been allowed. These could include data, the more expensive devices / less used resources that it would be impractical to have multiple copies of, and the ability to communicate or chat with other users in the network.

WAN
• A wide area network (WAN) is a computer network that covers a broad geographical area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries.
• A network that uses public communications links.
• WANs are used to connect (LANs) and other types of networks together, so that users and computers in one location can communicate with users and computers in other locations.
• Many WANs are built for one particular organization and are private. Others, built by Internet service providers, provide connections from an organization's LAN to the Internet. WANs are most often built using leased lines. At each end of the leased line, a router connects to the LAN on one side and a hub within the WAN on the other. Leased lines can be very expensive. Instead of using leased lines, WANs can also be built using less costly circuit switching or packet switching methods. Network protocols including TCP/IP deliver transport and addressing functions. Protocols including Packet over SONET/SDH, MPLS, ATM and Frame relay are often used by service providers to deliver the links that are used in WANs. X.25 was an important early WAN protocol, and is often considered to be the "grandfather" of Frame Relay as many of the underlying protocols and functions of X.25 are still in use today (with upgrades) by Frame Relay.
There are two basic types of WANs:
Centralized WAN:
A WAN that consists of a server or group of servers in a central location to which client computers and / or dumb terminals connect, the server providing most or all of the functionality of the network (e.g., transaction processing) - many banks use centralized WANs as do large stores (for their Point of Sale (POS) software) and large school districts. A centralized WAN may have hundreds of servers at a central location (the 'hub' of the WAN) to provide the functionality that is required in a large organization.
Distributed WAN:
A WAN that consists of client and server computers that are distributed throughout the WAN, the functionality of the network being distributed throughout the WAN - the Internet is an example of a distributed WAN.
MAN
Metropolitan Area Networks or MANs are large computer networks usually spanning a city. They typically use wireless infrastructure or optical fiber connections to link their sites.
Some technologies used for this purpose are ATM, FDDI and SMDS. These older technologies are in the process of being displaced by Ethernet-based MANs (e.g. Metro Ethernet) in most areas. MAN links between LANs have been built without cables using either microwave, radio, or infra-red laser links.
Topologies
• The geometric physical or electrical configuration describing a local communication network; the shape or arrangement of a system.
• The physical or logical layout of the nodes in a network.
• Common topologies are star (centralized), bus (decentralized), and ring (decentralized).
Star
• A local area network designed in the shape of a star, where all end points are connected to one central switching device, or hub.
• The star topology reduces the chance of network failure by connecting all of the systems to a central node. All peripheral nodes may thus communicate with all others by transmitting to, and receiving from, the central node only. The failure of a transmission line linking any peripheral node to the central node will result in the isolation of that peripheral node from all others, but the rest of the systems will be unaffected.



Advantages
• Good performance
• Easy to set up and to expand. Any non-centralized failure will have very little effect on the network, whereas on a ring network it would all fail with one fault
Disadvantages
• Expensive to install
• Extra hardware required
Bus
• A type of network setup where each of the computers and network devices are connected to a single cable or backbone.
• A node is any device connected to the network, such as a computer, printer, or scanner.
• Backbone is the term used to describe the main cables to which the network segments are connected.
• Resistors are placed at each end of the network to ensure that the signal is terminated when it reaches the end.

• When one node sends information to another node through the network, the information travels along the backbone until it reaches the desired receiving node.1
Advantages
• Easy to implement and extend
• Well suited for temporary networks (quick setup)
• Initially less expensive than other topologies
• Cheap
Disadvantages
• Difficult to administer/troubleshoot.
• Limited cable length and number of stations.
• If there is a problem with the cable, the entire network goes down.
• Maintenance costs may be higher in the long run.
• Performance degrades as additional computers are added or on heavy traffic.
• Low security (all computers on the bus can see all data transmissions).
• One virus in the network will affect all of them (but not as badly as a star or ring network).
• Proper termination is required.(loop must be in closed path).
• If one node fails, the whole network will shut down.
• If many computers are attached, the amount of data flowing causes the network to slow down.
Ring
• The ring topology is a type of computer network configuration where each network computer and device are connected to each other forming a large circle (or similar shape). Each packet is sent around the ring until it reaches its final destination.
• Today, the ring topology is seldom used.
• More common in IBM Token Ring networks, no longer in wide use.
Advantages
• Data is quickly transferred without a \u2018bottle neck\u2019. (very fast, all data traffic is in the same direction)
• The transmission of data is relatively simple as packets travel in one direction only.
• Adding additional nodes has very little impact on bandwidth
• It prevents network collisions because of the media access method or architecture required.
Disadvantages
• Data packets must pass through every computer between the sender and recipient therefore this makes it slower.
• If any of the nodes fail then the ring is broken and data cannot be transmitted successfully.
• It is difficult to troubleshoot the ring.
• Because all stations are wired together, to add a station you must shut down the network temporarily.
• In order for all computers to communicate with each other, all computers must be turned on.
• Total dependence upon the one cable.
OSI model
The Open Systems Interconnection Basic Reference Model (OSI Reference Model or OSI Model for short) is a layered, abstract description for communications and computer network protocol design, developed as part of the Open Systems Interconnection initiative. It is also called the OSI seven layer model.
OSI Model
7 Application layer
6 Presentation layer
5 Session layer
4 Transport layer
3 Network layer
2 Data link layer
* LLC sublayer
* MAC sublayer
1 Physical layer

Devices
Different combination of following device is used for Networking according to the requirements.
• Routers
• Gateways
• Switches
• Bridges
• Hubs
• Repeaters
• Network Interface Cards
• Analog Modems
• Cable Modems
• xDSL Modems
• CSUs & DSUs
• ISDN Devices
• Multiplexers
• Network Security & Firewall
• Powerline Network Products
• Print Servers
• Remote Access Servers
• Transceivers/Media Converters
• Terminal & Device Servers
• Wireless Access Points/Bridges
• Wireless Converters
• Wireless Modules
• Wireless NICs & Adapters




• Wireless Print Servers
• Wireless Routers
• Modules
Devices Definition
Routers & Gateway:
• A hardware device that routes data from a local area network (LAN) to another network connection. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network.
• A router is a device or, in some cases, software in a computer, that determines the next network point to which a network is to be forwarded toward its destination.
• A router operates at the network layer of the OSI reference model.
• Routers always consider excellent devices for path determination, as they have different alternatives path for the destination. Routers use headers and forwarding tables to determine the best path for forwarding the packets, and they use protocols such as ICMP to communicate with each other and configure the best route between any two hosts.
• Routing is the process of finding a path to a destination host. Routing is very complex in large networks because of the many potential intermediate destinations a packet might traverse before reaching its destination host.
• Routing involves two basic activities: determining optimal routing paths and transporting information groups (typically called packets) through an internetwork. In the context of the routing process, the latter of these is referred to as switching. Although switching is relatively straight forward, path determination can be very complex.
• Both the computers of Internet users and the computers that serve pages to users are host nodes.
• A gateway is a network point that acts as an entrance to another network. On the Internet, a nodes or stopping point can be either a gateway node or a host (end-point) node.
• A gateway is node that translates between two otherwise incompatible networks or network segments. Gateways perform code and protocol conversion to facilitate traffic between data highways of differing architecture, for example Ethernet and Token Ring.
Switches & Bridges:
• In networks, a device that filters and forwards packets between LAN segments.
• Switches are data link layer (layer 2) devices that, like bridges, enable multiple physical LAN segments to be interconnected into a single larger network.
• Similar to bridges, switches forward and flood traffic based on MAC addresses. Because switching is performed in hardware instead of in software, however, it is significantly faster.
• Switches use either store-and-forward switching or cut-through switching when forwarding traffic.
• Many types of switches exist, including ATM switches, LAN switches, and various types of WAN switches.
Hubs & Repeaters:
• A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is forwarded to the other ports so that all segments of the LAN can see all packets.
• A passive hub serves simply as a conduit for the data, enabling it to go from one device (or segment) to another.
• So-called intelligent hubs include additional features that enable an administrator to monitor the traffic passing through the hub and to configure each port in the hub. Intelligent hubs are also called manageable hubs.
• A repeater is a physical layer device that receives weak incoming signals, boosts the signal and then retransmits the signal. Its purpose is to extend the signals distance while keeping adequate signal strength.
• Repeaters are incapable of performing complex filtering and other traffic processing. In addition, all electrical signals, including electrical disturbances and other errors, are repeated and amplified.
Network Interface Cards:
• A network interface card (NIC) is a computer circuit board or card that is installed in a computer so that it can be connected to a network.
• Personal computers and workstations on a local area network (LAN) typically contain a network interface card specifically designed for the LAN transmission technology, such as Ethernet or Token Ring.
• Network interface cards provide a dedicated, full-time connection to a network.
Analog Modems:
• The word modem is actually short for Modulator/Demodulator.
• Equipment that converts digital signals into analog signals for purpose of transmission over a telephone line. Signal is then converted back to digital form so that it can be processed by a receiving computer.
• An analog modem is a device that enables a computer to transmit data over telephone lines (e.g. 28.8Kbps [kilobits per second] and 56Kbps).
• Computer information is stored digitally, whereas information transmitted over telephone lines is transmitted in the form of analog waves.
• Analog modems translate data from digital to analog and back. The fastest analog modems run at 57,600 bps.
• A modem can be either internal or external to your computer.
xDSL Modem:
• The term xDSL refers collectively to the various types of digital subscriber technologies, such as ADSL, SDSL and HDSL.
• DSLs use sophisticated modulation schemes to pack data onto copper wires. It is similar to ISDN in that they both operate over existing copper telephone lines (POTS) and require the short runs to a central telephone office. However, xDSL offers much higher speeds - up to 32 Mbps for downstream traffic, and from 32 Kbps to over 1 Mbps for upstream traffic. But it is limited to short runs from the central office (usually around 20,000 feet.)
• DSL enable simultaneous two-way transmission of voice and high-speed data over ordinary copper phone lines. It shares the same phone line as the telephone service, but it uses a different part of the phone line's bandwidth. It does not interfere with normal phone service because there is a significant amount of unused capacity in current phone wires.
• xDSL Modem: The subscriber end of the connection consists of DSL Modem. This converts data form the digital pulses used by the computer into a digital audio stream of a suitable frequency range for the particular DSL variant in use.
Cable Modem:
• A special type of modem that connects to a local cable TV line to provide a continuous connection to the Internet.
• Like an analog modem, a cable modem is used to send and receive data, but the difference is that transfer speeds are much faster. A 56 Kbps modem can receive data at about 53 Kbps, while a cable modem can achieve about 1.5 Mbps (about 30 times faster).
• Cable modem attached to a 10Base-T Ethernet card inside your computer.
• Type of broadband Internet connection.
Network Security & Firewall
• A firewall is an information technology (IT) security device which is configured to permit, deny or proxy data connections set and configured by the organization's security policy. Firewalls can either be hardware and/or software based.
• A firewall's basic task is to control traffic between computer networks with different zones of trust. Typical examples are the Internet which is a zone with no trust and an internal network which is (and should be) a zone with high trust. The ultimate goal is to provide controlled interfaces between zones of differing trust levels through the enforcement of a security policy and connectivity model based on the least privilege principle and separation of duties.

Power Line Networking
• Its purpose is to provide a network easily and inexpensively with no new wires. It is one of the cheapest technologies for networking and does not raise the electric bill.
• Power line networking is based on a technology called OFDM, or orthogonal frequency-division multiplexing. OFDM utilizes the electrical lines to transmit data on frequencies unused by normal appliances. It divides this unused "real estate" into 84 separate channels or carriers. Data is sent along in parallel, on many channels simultaneously to increase speed. When one channel becomes disrupted or signal decay is detected, the controlling chip transfers the data to another carrier line. This "rate-adaptive" error correction is responsible for the Ethernet-like quality of power line networking.
• As of mid-2005, the rate of speed is 14 megabits per second (mbps) with an anticipated increase to 100 mbps.
Transceivers/Media Converters
Transceivers:
• Short for transmitter-receiver, a device that both transmits and receives analog or digital signals.
• A transceiver converts one type of media topology to another type while maintaining the integrity of the network signal.
• In networks, it is generally used to allow for the connection between two different types of cable connectors, such as AUI and RJ-45.
• For many LANs, the transceiver is built into the network interface card (NIC).
• In Ethernet networks, a transceiver is also called a Medium Access Unit (MAU).
Media Converters:
• A device that connects segments for two different media (such as twisted-pair to fiber optic cabling) making the two segments behaves like one extended segment.



Mo
dules:
• A module is a self-contained component of a system, which has a well-defined interface to the other components; something is modular if it includes or uses modules which can be interchanged as units without disassembly of the module.
• Modules are add-on devices for Routers, Switches and other modular networking devices.
• Basic function of module is to implement multiple services on a single platform. In other words modules provide expansion to various networking devices.
• There are some transceivers which are considered modules because they can be inserted on various network devices (like Switches, Routers etc). Example of such transceivers which are treated as modules:
 GBIC
 SFP (MINI GBIC)
 XENPAK
 XFP
 SFP
 X2
• Those modules which are related to fiber channel technology and having a form factor other than SFP must be consider as Host Bus Adapter which is out of routing and switching domain.
Network Protocols
In networking, the communication language used by computer devices is called the protocol. Yet another way to classify computer networks is by the set of protocols they support. Networks often multiple protocols to support specific applications. Popular protocols include TCP/IP, the most common protocol found on the Internet and in home networks.
TCP/IP:
Short for Transmission Control Protocol/Internet Protocol, TCP/IP was developed by the U.S. Department of Defense and is a language governing communications among all computers on the Internet.
TCP/IP is two separate protocols, TCP and IP, that are used together. The Internet Protocol standard dictates how packets of information are sent out over networks. IP has a packet-addressing method that lets any computer on the Internet forward a packet to another computer that is a step (or more) closer to the packet's recipient. The Transmission Control Protocol ensures the reliability of data transmission across Internet connected networks. TCP checks packets for errors and submits requests for re-transmissions if errors are found; it also will return the multiple packets of a message into a proper, original sequence when the message reaches its destination. IP corresponds to the Network layer (Layer 3) in the OSI model, whereas TCP corresponds to the Transport layer (Layer 4) in OSI. In other words, the term TCP/IP refers to network communications where the TCP transport is used to deliver data across IP networks.

IPX/SPX
Short for Internet Packet eXchange/Sequential Packet eXchange, IPX/SPX is a local-area network communications protocol developed by Novell that exchanges information between network clients, applications, and network peripherals. This Protocol cannot be used over the Internet.
NetBEUI
Short for NETBios Enhanced User Interface, NetBEUI was originally developed by IBM in 1985 and is an enhanced version of the NetBIOS protocol used by network operating systems, allowing the computer to communicate with other computers utilizing the same protocol.
AppleTalk
Network protocol used with Apple Macintosh computers and networking devices to communicate with each other.
Networking Terminologies
SOHO Network
• "SOHO network" is occasionally used to refer to a local area network as used in a Small office/home office business.
• The term is mainly useful to define a market segment which has no internal IT staff, and possibly no dedicated server, structured cabling or server room, and where very high levels of performance and robustness are not warranted.
Leased Line
• A dedicated telephone line that is rented for exclusive 24-hours-a-day, 7-days-a-week use from one location to another.
• Connection could either point-to-point or multi-point configuration.
• Typically, leased lines can handle between 56,000 and 64,000 bits per second of data. Larger host systems require T1 lines (1.544 Mbps) or T3 lines (45 Mbps).
• Unlike traditional PSTN lines they do not have a telephone number, each side of the line being permanently connected to the other. They can be used for telephone, data or Internet services.
Dial-up line
• A communication connection from your computer to a host computer over standard phone lines. Connection is established by dialing the host computer.
• In the past, the maximum data rate with dial-up access was 56 Kbps (56,000 bits per second), but new technologies such as ISDN are providing faster rates (up to 128 Kbps).
Circuit Switching:
• Circuit switching is a WAN switching method in which a dedicated physical circuit is established, maintained, and terminated through a carrier network for each communication session.
• Circuit switching accommodates two types of transmissions: datagram transmissions and data-stream transmissions. Used extensively in telephone company networks, circuit switching operates much like a normal telephone call.
• Integrated Services Digital Network (ISDN) is an example of a circuit-switched WAN technology.
Packet Switching:
• Packet switching is a WAN switching method in which network devices share a single point-to-point link to transport packets from a source to a destination across a carrier network.
• Statistical multiplexing is used to enable devices to share these circuits.
• Asynchronous Transfer Mode (ATM), Frame Relay, Switched Multi-megabit Data Service (SMDS), and X.25 are examples of packet-switched WAN technologies.

CSMA/CD:
• Carrier Sense Multiple Access Collision Detection is a network access method in which devices that are ready to transmit data first check the channel for a carrier. If no carrier is sensed, a device can transmit. If two devices transmit at once, a collision occurs and each computer backs off and waits a random amount of time before attempting to retransmit. This is the access method used by Ethernet.
CSMA/CA
• Carrier Sense Multiple Access Collision Avoidance is a network access method in which each device signals its intent to transmit before it actually does so. This prevents other devices from sending information, thus preventing collisions from occurring between signals from two or more devices. This is the access method used by LocalTalk.
• A data station that intends to transmit sends a jam signal after waiting a sufficient time for all stations to receive the jam signal, the data station transmits a frame while transmitting, if the data station detects a jam signal from another station, it stops transmitting for a random time and then tries again.
• CSMA/CA is the principle medium access method employed by IEEE 802.11 WLANs.
Ethernet:
• One of the most common local area network (LAN) wiring schemes, Ethernet has a transmission rate of 10 megabits per second.
• Ethernet will handle about 10,000,000 bits-per-second and can be used with almost any kind of computer.
• Ethernet was marketed (and trademarked) by Xerox and developed jointly by Digital Equipment Corporation, Intel and Xerox.
• The IEEE Standard for Ethernet is 802.3.
• The implementation for Ethernet are 10Base-T, 10Base-2, 10Base-5, 10Base-F
Fast Ethernet:
• A LAN used to connect devices within a single building or campus at speeds up to 100 Mbps.
• Within the OSI model, Fast Ethernet is defined at layer one (physical) and layer two (data link).
• Like Ethernet, Fast Ethernet uses CSMA/CD.
• The IEEE Standard for Fast Ethernet is 802.3u.
• The implementations for Fast Ethernet are 100Base-T, 100Base-TX, 100Base-T4, 100Base-FX
Gigabit Ethernet:
• Gigabit Ethernet, a transmission technology based on the Ethernet frame format and protocol used in local area networks (LANs), provides a data rate of 1 billion bits per second (one gigabit).
• Gigabit Ethernet is carried primarily on optical fiber (with very short distances possible on copper media).
• The implementation for Gigabit Ethernet 1000Base-T, 1000Base-SX, 1000Base-LX
• The IEEE 802.3z defines the Gigabit Ethernet over fiber and cable, which has a physical media standard 1000Base-X (1000BaseSX - short wave covers up to 500m, and 1000BaseLX - long wave covers up to 5km).
• The IEEE 802.3ab defines the Gigabit Ethernet over the unshielded twisted pair wire (1000Base-T covers up to 75m).
10 Gigabit Ethernet
• 10-Gigabit Ethernet, being standardized in IEEE 802.3ae (Fiber), is a developing telecommunication technology that offers data speeds up to 10 billion bits per second.
• The 10 Gigabit Ethernet version of Ethernet operates in full-duplex mode only and supports data transfer rates of 10 gigabits per second for distances up to 300 meters on multimode fiber optic cables and up to 40 kilometers on single mode fiber optic cables.
• The implementations for 10-Gigabit Ethernet are 10GBASE-SR, 10GBASE-LX4, 10GBASE-LR, 10GBASE-ER, 10GBASE-SW, 10GBASE-LW, and 10GBASE-EW.
• 10GBASE-T, or IEEE 802.3an-2006, is a newly released standard to provide 10 gigabit/second connections over conventional unshielded or shielded twisted pair cables.
• 10GBASE-CX4 also known by its working group name 802.3ak transmits over 4-lanes in each direction over copper cabling similar to the variety used in InfiniBand technology. It is designed to work up to a distance of 15 m (49 feet). This technology has the lowest cost per port of all 10Gb interconnects, at the expense of range.
• 10 Gigabit Ethernet is often abbreviated 10GbE.
Full-Duplex Transmission:
• Sending data in both directions at the same time. Usually higher quality but requires more bandwidth.
• For example, a telephone is a full-duplex device because both parties can talk at once. In contrast, a walkie-talkie is a half-duplex device because only one party can transmit at a time.
• Full-duplex has allowed bandwidth on Ethernet and Fast Ethernet networks to be easily and cost-effectively doubled from 10 Mbps to 20 Mbps and 100 Mbps to 200 Mbps, respectively.
Half-Duplex Transmission:
• Data communications mode which permits transmission in both directions, but only in one direction at a time.
• Old-fashioned radio, where the operators had to say "Over" whenever they stopped sending and wished to receive, is an example.
• For half-duplex transmission, CSMA/CD will be utilized to ensure that stations can communicate over a single wire and that collision recovery can take place.
Simplex Transmission:
• Operating a channel in one direction only with no ability to operate in the other direction.
• The FM radio in your car, or your TV set, could be viewed as simplex devices.
Token Ring:
• Token Ring and IEEE 802.5 are two principal examples of token-passing networks (FDDI being the other).
• Token-passing networks move a small frame, called a token, around the network. Possession of the token grants the right to transmit. If a node receiving the token has no information to send, it passes the token to the next end station.
• Each station can hold the token for a maximum period of time.


Fiber Distributed Data Interface (FDDI):
• The Fiber Distributed Data Interface (FDDI) specifies a 100-Mbps token-passing, dual-ring LAN using fiber-optic cable.
• FDDI is frequently used as high-speed backbone technology because of its support for high bandwidth and greater distances than copper.
• It should be noted that relatively recently, a related copper specification, called Copper Distributed Data Interface (CDDI) has emerged to provide 100-Mbps service over copper.
• CDDI is the implementation of FDDI protocols over twisted-pair copper wire.
Frame Relay:
• Frame relay is a telecommunication service designed for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between end-points in a wide area network (WAN).
• Frame relay is based on the older X.25 packet-switching technology which was designed for transmitting analog data such as voice conversations.
• Frame Relay is an example of a packet-switched technology.
• Packet-switched networks enable end stations to dynamically share the network medium and the available bandwidth.




Integrated Services Digital Network (ISDN):
• Integrated Services Digital Network (ISDN) is a circuit-switched telephone network system, designed to allow digital transmission of voice and data over ordinary telephone copper wires, resulting in better quality and higher speeds than available with analog systems.
• In ISDN, there are two types of channels, B (for "Bearer") and D (for "Delta"). B channels are used for data (which may include voice), and D channels are intended for signaling and control (but can also be used for data).
• There are three ISDN implementations. Basic rate interface (BRI) consists of two B channels, each with bandwidth of 64 kbit/s, and one D channel with a bandwidth of 16 kbit/s. Together these three channels can be designated as 2B+D. Primary rate interface (PRI) contains a greater number of B channels and a D channel with a bandwidth of 64 kbit/s. The number of B channels for PRI varies according to the nation: in North America and Japan it is 23B+1D, with an aggregate bit rate of 1.544 Mbit/s (T1); in Europe and Australia it is 30B+1D, with an aggregate bit rate of 2.048 Mbit/s (E1). Broadband Integrated Services Digital Network (BISDN) is another ISDN implementation and it is able to manage different types of services at the same time. It is primarily used within network backbones and employs ATM.

ISDN Devices:
• TE1 - Terminal Equipment type 1 ISDN terminals
• TE2 - Terminal Equipment type 2 pre-ISDN type terminals
• NT1 - Network Termination type 1 equipment that connects the subscription 4 wires to the 2 wire local loop
• NT2 - Network Termination type 2 equipment that performs protocol functions of the data link and network layers.
• TA - Terminal Adapter used with a pre-ISDN terminal (TE2) to adapt it to an ISDN connection.

Switched Multimegabit Data Service (SMDS):

• A Switched Multi-megabit Digital Service is a fast packet switching service offered by telephone companies that enable organizations to connect geographically separate local-area networks (LANs) into a single wide-area network (WAN).
• SMDS provides packet switched bandwidth, on demand.
• SMDS was based on the IEEE 802.6 DQDB standard.
• SMDS transmission rates start at 1.54 Mbps and run up to 45 Mbps.
• SMDS provides committed access speeds at the rate purchased. For example, 34 Mbps SMDS access guarantees 34 Mbps of connectivity; there is no concept of a CIR.
• SMDS can use fiber- or copper-based media and supports speeds of 1.544 Mbps over Digital Signal level 1 (DS-1) transmission facilities, or 44.736 Mbps over Digital Signal level 3 (DS-3) transmission facilities.
SONET:
• Synchronous Optical Network.
• The networking service that is replacing copper-based circuits in the phone companies' networks. Sonet is delivered over fiber optic cables. T-1 and T-3 circuits delivered on copper wires have been the standard wide-area networking medium for many years. T-1 circuits or DS-1 (Digital Signaling 1) operate at 1.544 Mbps. T-3 or DS-3 circuits operate at 45 Mbps. Sonet circuits are called OC-3 or OC-12. The OC-3 circuit is roughly equivalent to 3 T-3s, and the OC-12 is roughly 12 T-3s.
• There are multiple, very closely related standards that describe synchronous optical networking:
o SDH or synchronous digital hierarchy standard developed by the International Telecommunication Union (ITU), documented in standard G.707 and its extension G.708
o SONET or synchronous optical networking standard as defined by GR-253-CORE from Telcordia
• Both SDH and SONET are widely used today; SONET in the U.S. and Canada, SDH in the rest of the world. Although the SONET standards were developed before SDH, their relative global prevalence means that SONET is now considered as the variation.


SONET Optical Carrier Level SONET Frame Format SDH level and Frame Format Payload bandwidth (kbit/s) Line Rate (kbit/s)
OC-1 STS-1 STM-0 48,960 51,840
OC-3 STS-3 STM-1 150,336 155,520
OC-12 STS-12 STM-4 601,344 622,080
OC-24 STS-24 STM-8 1,202,688 1,244,160
OC-48 STS-48 STM-16 2,405,376 2,488,320
OC-96 STS-96 STM-32 4,810,752 4,976,640
OC-192 STS-192 STM-64 9,621,504 9,953,280
OC-768 STS-768 STM-256 38,486,016 39,813,120
OC-1536 STS-1536 STM-512 76,972,032 79,626,120
OC-3072 STS-3072 STM-1024 153,944,064 159,252,240

Digital Subscriber Line:
• Digital Subscriber Line (DSL) technology is a modem technology that uses existing twisted-pair telephone lines to transport high-bandwidth data, such as multimedia and video, to service subscribers.
• DSLs use sophisticated modulation schemes to pack data onto copper wires. It is similar to ISDN in that they both operate over existing copper telephone lines (POTS) and require the short runs to a central telephone office.
• A DSL line can carry both data and voice signals and the data part of the line is continuously connected.
• The different variant of xDSL Technology are
o IDSL (ISDN Digital Subscriber Line, a data-only ISDN variant)
o ADSL (Asymmetric Digital Subscriber Line)
o HDSL (High Bit Rate Digital Subscriber Line)
o RADSL (Rate Adaptive Digital Subscriber Line)
o SDSL (Symmetric Digital Subscriber Line, a standardized version of HDSL)
o VDSL (Very high speed Digital Subscriber Line)
o G.SHDSL (ITU-T Standardized replacement for early proprietary SDSL)
ADSL
• The variation called ADSL (Asymmetric Digital Subscriber Line) is the form of DSL that will become most familiar to home and small business users.
• ADSL is called "asymmetric" because most of its two-way or duplex bandwidth is devoted to the downstream direction, sending data to the user. Only a small portion of bandwidth is available for upstream or user-interaction messages.
• Normally two modulation standard are found in ADSL
o G.DMT
o G.Lite
• G.lite (also known as DSL Lite, splitterless ADSL, and Universal ADSL) is essentially a slower ADSL that doesn't require splitting of the line at the user end but manages to split it for the user remotely at the telephone company. This saves the cost of what the phone companies call "the truck roll." G.Lite, officially ITU-T standard G-992.2, provides a data rate from 1.544 Mbps to 6 Mpbs downstream and from 128 Kbps to 384 Kbps upstream. G.Lite is expected to become the most widely installed form of DSL.


Splitter-based vs. Splitterless DSL
• Most DSL technologies require that a signal splitter be installed at a home or business, requiring the expense of a phone company visit and installation. However, it is possible to manage the splitting remotely from the central office. This is known as splitterless DSL, "DSL Lite," G.Lite, or Universal ADSL and has recently been made a standard.

DSL Type Description Data Rate Downstream; Upstream Distance Limit Application
IDSL ISDN Digital Subscriber Line 128 Kbps 18,000 feet on 24 gauge wire Similar to the ISDN BRI service but data only (no voice on the same line)
CDSL Consumer DSL from Rockwell 1 Mbps downstream; less upstream 18,000 feet on 24 gauge wire Splitterless home and small business service; similar to DSL Lite
DSL Lite
(same as G.Lite) Splitterless DSL without the "truck roll" From 1.544 Mbps to 6 Mbps downstream, depending on the subscribed service 18,000 feet on 24 gauge wire The standard ADSL; sacrifices speed for not having to install a splitter at the user's home or business
G.Lite
(same as DSL Lite) Splitterless DSL without the "truck roll" From 1.544 Mbps to 6 Mbps , depending on the subscribed service 18,000 feet on 24 gauge wire The standard ADSL; sacrifices speed for not having to install a splitter at the user's home or business
HDSL High bit-rate Digital Subscriber Line 1.544 Mbps duplex on two twisted-pair lines; 2.048 Mbps duplex on three twisted-pair lines 12,000 feet on 24 gauge wire T1/E1 service between server and phone company or within a company; WAN, LAN, server access
SDSL Symmetric DSL 1.544 Mbps duplex (U.S. and Canada); 2.048 Mbps (Europe) on a single duplex line downstream and upstream 12,000 feet on 24 gauge wire Same as for HDSL but requiring only one line of twisted-pair
ADSL Asymmetric Digital Subscriber Line 1.544 to 6.1 Mbps downstream; 16 to 640 Kbps upstream 1.544 Mbps at 18,000 feet; 2.048 Mbps at 16,000 feet; 6.312 Mpbs at 12,000 feet; 8.448 Mbps at 9,000 feet Used for Internet and Web access, motion video, video on demand, remote LAN access
RADSL Rate-Adaptive DSL from Westell Adapted to the line, 640 Kbps to 2.2 Mbps downstream; 272 Kbps to 1.088 Mbps upstream Not provided Similar to ADSL
UDSL Unidirectional DSL proposed by a company in Europe Not known Not known Similar to HDSL
VDSL Very high Digital Subscriber Line 12.9 to 52.8 Mbps downstream; 1.5 to 2.3 Mbps upstream; 1.6 Mbps to 2.3 Mbps downstream 4,500 feet at 12.96 Mbps; 3,000 feet at 25.82 Mbps; 1,000 feet at 51.84 Mbps ATM networks; Fiber to the Neighborhood

Asynchronous Transfer Mode (ATM) Switching:
• Short for Asynchronous Transfer Mode, a network technology based on transferring data in cells or packets of a fixed size.
• ATM is a cell-switching and multiplexing technology that combines the benefits of circuit switching (guaranteed capacity and constant transmission delay) with those of packet switching (flexibility and efficiency for intermittent traffic).
• The pre-specified bit rates are either 155.520 Mbps or 622.080 Mbps and speeds on ATM networks can reach 10 Gbps.
Rack Unit:
The 1U, 2U, 3U, 4U, 5U, 6U and 7U are all different sized rackmount servers; the U following the number is short for unit. The number indicates the size of the rackmount, 1U being the smallest rackmount and 7U being the biggest rackmount. Below is a listing of each of the different units and their dimensions, although the Width and Height of a rackmount may be standard, the depth of a rackmount may change, as can be seen below. If your rackmount server is going to be placed in a constrained area, it's best to verify with the manufacturer of the rackmount what the exact dimensions are.
Unit Dimension
(W x H x D)
1U 19" x 1.75" x 17.7"
19" x 1.75" x 19.7"
19" x 1.75" x 21.5"
2U 19" x 3.5" x 17.7"
19" x 3.5" x 20.9"
19" x 3.5" x 24"
3U 17.1" x 5.1" x 25.5"
4U 19" x 7" x 17.8"
19" x 7" x 26.4"
5U 19" x 8.34" x 19.67"
19.1" x 8.75" x 26.4"
6U 19" x 10.5" x 19.5"
7U 17" x 12.2" x 19.8"
Ethernet Technology Standards:
Nomenclature Speed Media Maximum Distance Acronym
10Base-5 10Mbps Coaxial 500m 5=500m
10Base-2 10Mbps Coaxial 185m 2=200m
10Base-T 10Mbps Twisted Pair 100m T=Twisted Pair
10Base-FL 10Mbps Fiber Optic 2000m (2Km) FL=Fiber Link
10Base-FB 10Mbps Fiber Optic 2000m (2 Km) FB=Fiber Backbone
10Base-FP 10Mbps Fiber Optic 500m FP=Fiber Passive
100Base-X 100Mbps Not Specific Depend on Cable X=Replace with Cable Type
100Base-T 100Mbps Twisted Pair 100m T=Twisted Pair
100Base-TX 100Mbps Twisted Pair 100m TX=Over Two pairs of Twisted Pair Cable
100Base-T4 100Mbps Twisted Pair 100m T4=Uses all four pair of Category 3 Twisted Pair
100Base-T2 100Mbps Twisted Pair 100m T2=Uses Two pairs of Category 3 Twisted Pair
100Base-FX 100Mbps Fiber Optic 2Km (Multi-mode)
10Km (Single-mode) FX=Fiber, X of the
1000Base-X 1000Mbps Not specific Depends on Cables X=Replace with Cable Type
1000Base-LX 1000Mbps Fiber Optic 550m (Multi-mode)
5Km (Single-mode) LX=Long Wavelength
1000Base-LH 1000Mbps Fiber Optic 70Km (Single-mode) LH=Long Haul
1000Base-SX 1000Mbps Fiber Optic 550m (Multi-mode) SX=Short Wavelength
1000Base-ZX 1000Mbps Fiber Optic 100Km (Single-mode) ZX=Extended Wavelength
1000Base-CX 1000Mbps Copper (Twinax) 25m C=Copper
1000Base-T 1000Mbps Twisted Pair 100m T=Twisted Pair
10GBase-SR 10Gbps Fiber Optic 300m (Multi-mode) S=Short Wavelength
R= 66B Encoding
10GBase-SW 10Gbps Fiber Optic 300m (Multi-mode) S=Short Wavelength
W=WIS Interface
10GBase-LR 10Gbps Fiber Optic 10Km (Single-mode) L=Long Wavelength
R= 66B Encoding
10GBase-LW 10Gbps Fiber Optic 10Km (Singlemode) L=Long Wavelength
W=WIS Interface
10GBase-LX4 10Gbps Fiber Optic 300m (Multimode)
10Km (Singlemode) L=Long Wavelength
X=8B/10B Encoding
4= Four Wavelength
10GBase-ER 10Gbps Fiber Optic 40Km (Single-mode) E=Extra Long Wavelength
R= 66B Encoding
10GBase-EW 10Gbps Fiber Optic 40 Km (Single-mode) E=Extra Long Wavelength
W= WIS Interface
Ethernet Technology Specification
Ethernet
10Base-5
• The "10" refers to the speed of the system, which is 10 megabits per second.
• "BASE" refers to the signaling method known as baseband.
• The "5" refers to the maximum segment length allowed when multiplied by 100. In the case of thick Ethernet, each segment may be up to 500 meters in length.
10Base-2
• The "10" refers to the speed of the system, which is 10 megabits per second.
• "BASE" refers to the signaling method known as baseband.
• Segments may be a maximum of 185 meters in length, and not 200 meters as the rounded-up "2" in the shorthand identifier might lead you to believe.
10Base-T
• The "10" refers to the speed of the system, which is 10 megabits per second.
• "BASE" refers to the signaling method known as baseband.
• “T” for Twisted Pair.
• The twisted-pair Ethernet system was designed to allow segments of up to 100 meters in length when using modern " voice grade" twisted-pair telephone wiring that meets the EIA/TIA Category Three wire specifications and follows the correct wiring scheme.
FOIRL
• Fiber Optic Inter-Repeater Link. As its name suggests, a fiber-optic link between two Ethernet repeaters (hubs). A link requires two optical fibers. An FOIRL link is not suitable for direct connection to a computer - compare with 10BaseFL.
• Allows up to 1,000 meters (3,280 ft.) of multi-mode duplex fiber optic cable in a point-to-point link.
• FOIRL is today a less commonly used type of 802.3
10Base-FL
• FL = Fiber Link
• The "10" refers to the speed of the system, which is 10 megabits per second.
• "BASE" refers to the signaling method known as baseband.
• 10BASE-FL provides for a full duplex fiber optic link segment that may be up to 2000 meters (2KM) long providing that only 10BASE-FL equipment is used in the segment.
10Base-FB
• FB = Fiber Backbone
• The Fiber Backbone link segment system.
• 10BASE-FB links do not attach to computers or end nodes, and are only used to link special 10BASE-FB repeater hubs together in a large repeated backbone system.
• 10BASE-FB links may be up to 2000 meters in length.
10Base-FP
• FP = Fiber Passive
• 10BASE-FP segments may be up to 500 meters long
FAST ETHERNET
100Base-X
• The "100" refers to the speed of the system, which is 100 megabits per second.
• "BASE" refers to the signaling method known as baseband.
• The TX and FX types together are sometimes referred to as "100BASE-X."
100Base-T
• 100Base-T is a fast ethernet specification that uses Twisted Pairs cable
100Base-TX
• Supports data transfer rates up to 100Mbps
• Supports distance upto 100 meters
• The 100BASE-TX system operates over two pairs of wires, one pair for receive data signals and the other pair for transmit data signals.
100Base-T4
• Supports data transfer rates up to 100Mbps
• Supports distance upto 100 meters
• 100Base-T4 is a compatibility version for older cabling as it allows 100Mbps to operate over cat 3 cabling by utilising all 4 twisted pairs.
100Base-T2
• Supports data transfer rates up to 100Mbps
• Supports distance upto 100 meters
• Uses two pairs of Category 3 Cabling
100Base-FX
• 100base-FX is a fast ethernet specification that uses fiber optic cable instead of UTP
• 100base-FL is almost always implemented as a full duplex technology
• 100 megabit/second over distances up to 2000 meters (6560 ft.) on multi-mode fiber and 10Km on single mode.
GIGABIT ETHERNET
1000Base-X
• The "1000" refers to the speed of the system, which is 1000 Megabits per second (gigabit per second).
• "BASE" refers to the signaling method known as baseband.
• 1000Base-X is the name given to the family of gigabit ethernet
1000Base-LX
• The "L" in 1000Base-LX stands for "long" as it uses long wavelength lasers to transmit data over fiber optic cable.
• Long Wave laser over single and multi mode fiber.
• 10 KM single-mode fiber or 550m multi-mode fiber.
1000Base-LH
• The "LH" in 1000Base-LX stands for "long haul" as it support longer distance
• 70Km over single-mode fiber only
1000Base-SX
• The "S" in 1000Base-SX stands for "short" as it uses short wavelength lasers to transmit data over fiber optic cable.
• 1000base-SX is a specifications for gigabit ethernet over fiber cabling
• Only multi-mode optical fiber is supported.
• 220m to 550m depending on type of multimode fiber
1000Base-ZX
• The "Z" in 1000Base-ZX stands for "Extended" as it uses extended wavelength lasers to transmit data over fiber optic cable.
• 1000base-ZX is a specifications for gigabit ethernet over fiber cabling
• Supports upto 100KM.
• 1000-Mbps gigabit Ethernet specification using two strands of single mode fiber-optic cable per link.
1000Base-CX
• The "C" in 1000Base-CX stands for "copper" as it uses specially shielded balanced copper jumper cables also called "twinax" or "short haul copper".
• Segment lengths are limited to only 25 meters which restricts 1000Base-CX to connecting equipment in small areas like wiring closets.
1000Base-T
• Gigabit Ethernet over Twisted Pair Cable
• Operates over all four Pairs of Category 5 Unshielded Twisted Pair Cable.
• Support up to 100 meters
10 GIGABIT EHTERNET
10GBase-SR
• 10 Gigabit over fiber
• "S" stands for the short wavelength (850 nanometer nm) of fiber optic
• "R" denotes 66B encoding
• Works on Multimode Fiber
• Operating range is from 2 meters to 300 meters depending on Fiber Type.
10GBase-SW
• 10 Gigabit over fiber.
• "S" stands for the short wavelength (850 nanometer) of fiber optic
• "W" denotes the WIS interface that encapsulates Ethernet frames for transmission over a SONET STS-192c channel.
• Works on Multi-mode Fiber
• Operating range is from 2 meters to 300 meters depending on Fiber Type.
10GBase-LR
• 10 Gigabit over fiber.
• "L" stands for the long wavelength (1310 nanometer nm) of fiber optic
• "R" denotes 66B encoding
• Works on Single-mode Fiber
• Operating range is from 2 meters to 10Km (32,808 feet) depending on Fiber Type.
10GBase-LW
• 10 Gigabit over fiber.
• "L" stands for the long wavelength (1310 nanometer nm)
• "W" denotes the WIS interface that encapsulates Ethernet frames for transmission over a SONET STS-192c channel.
• Works on Singlemode Fiber
• Operating range is from 2 meters to 10Km (32,808 feet) depending on Fiber Type.
10GBase-LX4
• 10 Gigabit over fiber.
• "L" stands for the long wavelength (1310 nanometer nm)
• The letter "X" denotes 8B/10B signal encoding
• '4' denotes that it uses wave division multiplexing technology to send signals over four wavelengths of light carried over a single pair of fiber optic cables.
• The 10GBASE-LX4 system is designed to operate at 1310 nm over multi-mode or single-mode fiber.
• Operating range is from 2 meters up to 300 meters over multi mode fiber or from 2 meters up to 10 kilometers over single-mode fiber
10GBase-ER
• 10 Gigabit over fiber.
• "E" stands for the extra long wavelength (1550 nm) of fiber optic
• "R" denotes 66B encoding
• Works on Single-mode Fiber
• Operating range is from 2 meters up to 40 kilometers (131,233 feet), depending on cable type
10GBase-EW
• 10 Gigabit over fiber.
• "E" stands for the extra long wavelength (1550 nm) of fiber optic
• "W" denotes the WIS interface that encapsulates Ethernet frames for transmission over a SONET STS-192c channel.
• Works on Single-mode Fiber
• Operating range is from 2 meters up to 40 kilometers (131,233 feet), depending on cable type
Channels Concepts
T1/E1:
• Digital WAN carrier facility. T1 transmits DS-1 formatted data at 1.544 Mbps through the telephone-switching network, using AMI or B8ZS coding.
• E1 carries signals at 2 Mbps (32 channels at 64Kbps, with 2 channels reserved for signaling and controlling)

Speed DS0's North
America Europe Japan
64 Kbps 1 - - -
1.544 Mbit/s 24 T-1 - J-1
2.048 Mbit/s 32 - E-1 -
6.312 Mbit/s 96 T-2 - J-2
7.786 Mbit/s 120 - - J-2 (alt)
8.448 Mbit/s 128 - E-2 -
32.064 Mbit/s 480 - - J-3
34.368 Mbit/s 512 - E-3 -
44.736 Mbit/s 672 T-3 - -
97.728 Mbit/s 1440 - - J-4
139.264 Mbit/s 2016 DS4 - -
139.264 Mbit/s 2048 - E4 -
274.176 Mbit/s 4032 T-4 - -
400.352 Mbit/s 5760 T-5 - -
565.148 Mbit/s 8192 - E-5 J-5
IEEE Standards
IEEE 802.1x
• IEEE 802.1 is a working group of the IEEE. It is concerned with
o 802 LAN/MAN architecture
o inter networking among 802 LANs, MANs and other wide area networks,
o 802 Link Security,
o 802 overall network management, and
o protocol layers above the MAC & LLC layers.

IEEE 802.1p:
• 802.1p is a specification for giving Layer 2 switches the ability to prioritize traffic (and perform dynamic multi-cast filtering).
IEEE 802.1Q:
• IEEE 802.1Q was a project in the IEEE 802 standards process to develop a mechanism to allow multiple bridged networks to transparently share the same physical network link without leakage of information between networks (i.e. trunking).
IEEE 802.3x
• IEEE 802.3 is a collection of IEEE standards defining the physical layer and the media access control (MAC) sublayer of the data link layer of wired Ethernet. This is generally a LAN technology with some WAN applications. Physical connections are made between nodes and/or infrastructure devices (hubs, switches, routers) by various types of copper or fiber cable.
• 802.3 is a technology that can support the IEEE 802.1 network architecture.
IEEE 802.3
• 10BASE5 10 Mbit/s (1.25MB/s) over thick coax - same as DIX except Type field is replaced by Length, and an 802.2 LLC header follows the 802.3 header
IEEE 802.3a
• 10BASE2 10 Mbit/s (1.25 MB/s) over thin Coax (thinnet or cheaper net)
IEEE 802.3i
• 10BASE-T 10 Mbit/s (1.25 MB/s) over twisted pair
IEEE 802.3u
• 100BASE-TX, 100BASE-T4, 100BASE-FX Fast Ethernet at 100 Mbit/s (12.5 MB/s) w/autonegotiation
IEEE 802.3z
• 1000BASE-X Gbit/s Ethernet over Fiber-Optic at 1 Gbit/s (125 MB/s)
IEEE 802.3ab
• 1000BASE-T Gbit/s Ethernet over twisted pair at 1 Gbit/s (125 MB/s)
IEEE 802.3ae
• 10 Gbit/s (1,250 MB/s) Ethernet over fiber; 10GBASE-SR, 10GBASE-LR, 10GBASE-ER, 10GBASE-SW, 10GBASE-LW, 10GBASE-EW
IEEE 802.3af
• Power over Ethernet
Security
TACACS +:
• Terminal Access Controller Access-Control System (TACACS) is a remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks.
RADIUS:
• Remote Authentication Dial In User Service (RADIUS) is an AAA protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.
DES:
• The Data Encryption Standard (DES) specifies a FIPS approved cryptographic algorithm This publication provides a complete description of a mathematical algorithm for encrypting (enciphering) and decrypting (deciphering) binary coded information.
• Encrypting data converts it to an unintelligible form called cipher. Decrypting cipher converts the data back to its original form called plain-text.
Access Control List:
• It is basically a list of protocols that are allowed for transmission from source to destination.
Ports/Interfaces
RJ-45
• The RJ-45 is a single-line jack for digital transmission over ordinary phone wire, either untwisted or twisted.
• A very common application is its use in Ethernet
• RJ-45 has eight copper conductors

BNC
• A BNC (Bayonet Neil-Concelman, or sometimes British Naval Connector) connector is used to connect a computer to a coaxial cable in a 10BASE-2 Ethernet network.
• BNC Terminators are used to terminate each end of BNC thin-net network.
• BNC T-connectors (used with the 10Base-2 system) are female devices for connecting two cables to a network interface card (NIC).
• A BNC barrel connector allows connecting two cables together.
AUI
• The AUI (attachment unit interface) is the 15-pin physical connector interface between a computer's network interface card (NIC) and an Ethernet cable such as 10Base-5 ("thicknet") coaxial cable.
• On 10Base-5 Ethernet, a short cable is used to connect the AUI on the computer with a transceiver on the main cable.
• AUI interface is also called a DB-15 interface or a DIX interface (DIX refers to the three major companies who helped standardize Ethernet: Digital Equipment Corporation, Intel, and Xerox).
MT-RJ
• A type of dual fiber optic connector
• The MT-RJ system supports both Single Mode and Multi-Mode applications
• A small form factor, dual fiber connector.
SC
• A small form factor, dual fiber connector.
• A small form factor, dual fiber connector.
• The SC connector uses a push-pull mechanism formating.
ST
• ST or Straight Tip connector is Popular fiber optic connector originally developed by AT&T.
• ST-style connectors use a quick release bayonet coupling, which requires only a quarter turn to engage or disengage.
• Cylindrical with twist lock coupling, 2.5mm keyed ferrule.
• Cylindrical with twist lock coupling, 2.5mm keyed ferrule.


Ports/Interfaces Terminologies:
Console port:
• Console ports are meant to allow root access to the networking device via a dumb terminal interface regardless of the state of the device.
• Usually we get DB-9 connector against this port which is used for serial (Asynchronous) Transmission, having speed of 115 Kbps.
• RJ-45 is also one the connector associated with this port.
• Various types of cables are used for console port for example Cisco null modem cable, twisted pair cable etc.
Auxiliary Port:
• It is quite similar to console port but it is used in remote configuration of the device by connecting to the external modems.
• Routers can have a console/Auxiliary port which can function both as a console and also used for remote configuration.
• Speed is virtually same as far as asynchronous transmission is concerned.
Uplink Port:
• Most hubs and switches, one of the ports can usually be configured as an Uplink port.
• An Uplink port has the TX and RX pairs reversed internally to the device which eliminates the need for a crossover cable.
• Some devices will have an electrical switch near the port that will change the port to a standard port or an UPLINK port.
Auto MDI/MDI-X and Auto Uplink:
• The Uplink feature can be implemented by a dedicated port, shared port, Normal/Uplink switch, or a feature known as auto MDI / MDI-X.
• Automatically figures out how connect with whatever is plugged into it.
Auto-Sensing:
• Auto-sensing is supported by a device ports if they can automatically sense the speed to which they are connected.
Auto-Negotiating:
• It is derived from handshaking phase used in connection oriented transmission.
• Speed, Flow control, compression protocols are all discussed or negotiated by devices prior to the transmission of packets.
Shared Ports:
• These ports are shared with any of the expansion slot installed in the device.
• Sharing means that either shared ports or expansion slots to whom they are shared will be active at a time.
Expansion Slots
• Area in a device that accepts additional input/output boards to increase the capability of the device.
• A socket on the main board of a device where expansion cards are inserted.
• There are many types of Expansion Slots, some of the important types are mentioned below.
Network Module Slot
• A network interface card that is installed in the router chassis to add functionality to the router. Examples are Ethernet network modules, and IDS network modules.
• This is special type slot for inserting network module. Cisco devices like routers and gateways have this kind of slot installed in many router series.
Compact Flash Card Slot:
• CompactFlash (CF) was originally a type of data storage device, used in portable electronic devices. As a storage device, it typically uses flash memory in a standardized enclosure.
• Slot that can accommodate such cards are called Compact Flash Card Slots.
• In most routers these cards are used to upgrade the system memory.
WAN Interface Card Slot
• A WAN interface card, or WIC, is a specialized network interface card (NIC) that allows devices to connect to a wide area network. (A NIC provides the interface between a device and a local area network.) A WIC has a built-in Channel Service Unit/Data Service Unit (CSU/DSU) interface that allows the card to communicate with a router that is connected to a WAN.
• The term is especially used in conjunction with hardware manufactured by Cisco Systems.
• The slots that can occupy these cards are known as WIC Slots.
Transceiver Module Slot
• There are several kinds of transceiver module slot in which GBIC; mini-GBIC slots are most famous because of their form factor and speed.
Media Type
Twisted Pair Cable
• A type of cable that consists of two independently insulated wires twisted around one another.
• The use of two wires twisted together helps to reduce crosstalk and electromagnetic induction
• The number of twists per meter makes up part of the specification for a given type of cable. The greater the number of twists, the more crosstalk is reduced.
• Twisted pair comes with each pair uniquely color coded when it is packaged in multiple pairs.
• A summary of the twisted pair categories is given below

o Category 1 - used for traditional telephone voice communication (but not data) - most telephone cable used before 1983 was category 1
o Category 2 - four twisted pairs - suitable for data rates of up to 4 Mbps
o Category 3 - four twisted pairs with three twists per foot - suitable for data rates of up to 10 Mbps
o Category 4 - supports data transmission of up to 20 Mbps
o Category 5 - four twisted pairs with a higher number of twists per foot than previous categories and a teflon based outer coating. Category 5 is generally accepted as the cable to install because of its higher transmission rate and better noise immunity. Testing of these cable assumes that only two pairs will be used - one to transmit (TX) and one to receive (RX). Falling costs in recent years have made category 5 twisted pair a more cost-effective option.
o Category 5e - enhanced category 5 - more comprehensive testing is carried out on all four pairs to measure the effect of transmitting data, particularly with regard to crosstalk. This category is primarily intended for use in Gigabit Ethernet networks.
o Category 6 - a proposed standard for cable having a transmission frequency of 200 MHz, with all components coming from one manufacturer (i.e. no "mixing").
o Category 7 - a proposed standard for cable having a transmission frequency of 600 MHz using fully shielded cables, i.e. shielding is to be provided for both individual pairs and for the grouped pairs. A new connection type is also proposed.





Coaxial Cables:
 Two types of Coaxial cables
 Thinnet: Thinnet (10Base2) is so called because of the thin, inexpensive coaxial cabling it uses, and is fairly flexible, being 0.25 inches in diameter.
 Thicknet: The IEEE specification refers to this type of cable as 10Base5, referring to its main specifications of 10 Mbps data rate, baseband transmission type, and 500 meter maximum segment length.




Twin-axial cable:
 Twin-axial cable is coaxial cable that contains two inner conducting wires rather than one. IBM's AS/400 and System/3x midrange computer systems use twin-axial cable.
 The maximum distance for Twinax cable on each port of the Work Station Controller is 1800m, this limit is reduced to 1458m when running in Express mode.

Fiber Optics Cable:
 A fiber optic cable consists of a bundle of glass threads, each of which is capable of transmitting messages modulated onto light waves.
 It is typically between 8µm and 50µm in diameter, depending on the type of fiber. The cladding is made of a slightly different type of class, and is typically 125µm in diameter.

 Two Modes of fiber optics cables
 In optical fiber technology, single mode fiber is optical fiber that is designed for the transmission of a single ray or mode of light as a carrier and is used for long-distance signal transmission.
 Single mode fiber has a much smaller core than multi-mode fiber.
 Core: 8 ,9 ,10 micron
 Cladding: 125 micron
 Multi-mode fiber has a larger core
 Core: 62.5 , 50 micron
 Cladding: 125 micron

http://www.computerhope.com/jargon/network.htm

http://en.wikipedia.org/wiki/List_of_network_protocols
http://lc.netcomm.com.au/LMS_Intro.htm

Appendix
IEEE Standards
Ethernet Standard Date Description
Experimental
Ethernet 1972 2.94 Mbit/s (367 kB/s) over coaxial cable (coax) cable bus
Ethernet II
(DIX v2.0) 1982 10 Mbit/s (1.25 MB/s) over thin coax (thinnet) - Frames have a Type field. This frame format is used on all forms of Ethernet by protocols in the Internet protocol suite.
IEEE 802.3 1983 10BASE5 10 Mbit/s (1.25MB/s) over thick coax - same as DIX except Type field is replaced by Length, and an 802.2 LLC header follows the 802.3 header
802.3a 1985 10BASE2 10 Mbit/s (1.25 MB/s) over thin Coax (thinnet or cheapernet)
802.3b 1985 10BROAD36
802.3c 1985 10 Mbit/s (1.25 MB/s) repeater specs
802.3d 1987 FOIRL (Fiber-Optic Inter-Repeater Link)
802.3e 1987 1BASE5 or Star LAN
802.3i 1990 10BASE-T 10 Mbit/s (1.25 MB/s) over twisted pair
802.3j 1993 10BASE-F 10 Mbit/s (1.25 MB/s) over Fiber-Optic
802.3u 1995 100BASE-TX, 100BASE-T4, 100BASE-FX Fast Ethernet at 100 Mbit/s (12.5 MB/s) w/autonegotiation
802.3x 1997 Full Duplex and flow control; also incorporates DIX framing, so there's no longer a DIX/802.3 split
802.3y 1998 100BASE-T2 100 Mbit/s (12.5 MB/s) over low quality twisted pair
802.3z 1998 1000BASE-X Gbit/s Ethernet over Fiber-Optic at 1 Gbit/s (125 MB/s)
802.3-1998 1998 A revision of base standard incorporating the above amendments and errata
802.3ab 1999 1000BASE-T Gbit/s Ethernet over twisted pair at 1 Gbit/s (125 MB/s)
802.3ac 1998 Max frame size extended to 1522 bytes (to allow "Q-tag") The Q-tag includes 802.1Q VLAN information and 802.1p priority information.
802.3ad 2000 Link aggregation for parallel links
802.3-2002 2002 A revision of base standard incorporating the three prior amendments and errata
802.3ae 2003 10 Gbit/s (1,250 MB/s) Ethernet over fiber; 10GBASE-SR, 10GBASE-LR, 10GBASE-ER, 10GBASE-SW, 10GBASE-LW, 10GBASE-EW
802.3af 2003 Power over Ethernet
802.3ah 2004 Ethernet in the First Mile
802.3ak 2004 10GBASE-CX4 10 Gbit/s (1,250 MB/s) Ethernet over twin-axial cable
802.3-2005 2005 A revision of base standard incorporating the four prior amendments and errata.
802.3an 2006 10GBASE-T 10 Gbit/s (1,250 MB/s) Ethernet over unshielded twisted pair(UTP)
802.3ap exp. 2007 Backplane Ethernet (1 and 10 Gbit/s (125 and 1,250 MB/s) over printed circuit boards)
802.3aq 2006 10GBASE-LRM 10 Gbit/s (1,250 MB/s) Ethernet over multimode fiber
802.3ar exp. 2007 Congestion management
802.3as exp. 2006 Frame expansion
802.3at in work group Power over Ethernet enhancements
802.3au 2006 Isolation requirements for Power Over Ethernet (802.3-2005/Cor 1)
802.3av in study 10 Gbit/s EPON
802.3 HSSG 2009 Higher Speed Study Group. 100 Gb/s up to 100 m or 10 km using MMF or SMF optical fiber respectively

1000Base-BX
Where B stands for Bidirectional.
1000BASE-BX10-D AND 1000BASE-BX10-U SFP FOR SINGLE-FIBER BIDIRECTIONAL APPLICATIONS
The 1000BASE-BX-D and 1000BASE-BX-U SFPs, compatible with the IEEE 802.3ah 1000BASE-BX10-D and 1000BASE-BX10-U standards, operate on a single strand of standard single-mode fiber.
A 1000BASE-BX10-D device is always connected to a 1000BASE-BX10-U device with a single strand of standard single-mode fiber with an operating transmission range up to 10 km.
The communication over a single strand of fiber is achieved by separating the transmission wavelength of the two devices as depicted in Figure 2: 1000BASE-BX10-D transmits a 1490 nm channel and receives a 1310 nm signal, whereas 1000BASE-BX10-U transmits at a 1310 nm wavelength and receives a 1490 nm signal. Note in Figure 2 the presence of a wavelength-division multiplexing (WDM) splitter integrated into the SFP to split the 1310 nm 1490 nm light paths.
Figure 2. Bidirectional Transmission of a Single Strand of Single Mode Fiber
The GLC-BX-D and GLC-BX-U SFPs also support digital optical monitoring (DOM) functions according to the industry-standard SFF-8724 Multi Source Agreement (MSA). This feature gives the end user the ability to monitor real-time parameters of the SFP, such as optical output power, optical input power, temperature, laser bias current, and transceiver supply voltage.
Web Hosting

What is Web Hosting?
A service that provides a physical location for a Web site. Customers’ sites reside on computers stored in secure and climate-controlled environments and permanently linked to the Internet through high-speed data lines. These computers store the Web pages that make up Web sites. As soon as your pages are installed on the server they become available to visitors and customers on the Internet - providing they have the correct address. (www.yourcompanywebsite.com)

One service often closely associated with domain names is web site hosting. The World Wide Web is a massive collection of web sites, all hosted on computers (called web servers) all over the world. Because of the web's uniquely global nature, a web site should be accessible 24 hours a day, seven days a week. Rather than pay to have a 24/7 dedicated Internet connection to an in-house webserver, many people opt to host their sites with a web hosting provider. Web hosting clients simply upload their web sites to a shared (or dedicated) webserver, which the ISP maintains to ensure a constant, fast connection to the Internet.

What is logo design?

From the time you get up in the morning and walk into your bathroom till you switch off the TV and go to bed you are constantly being exposed to and bombarded by hundreds of brands and logos. Increasingly the identity of a product or company is the only factor that distinguishes one from another in a sea of similar products or companies.

For example if you walk into a super market and wanted to buy a bottled drink or mineral water. In the fluids section you are likely to find at least 20 different brands of mineral water. I am talking about a medium to large sized super market. All of these brands of mineral water contain the almost the same contents and mineral composition. The why are they priced differently and why do buy one particular brand and not another? Your decision to buy one particular brand among the 20 or so is largely based on which of the brands you perceive to be the better one. Now, 'perceive' is the key word. 9 times out of 10 the taste or the bottle shape is secondary.

So companies, in saturated market have to rely on their marketing campaigns to make people buy their products. And these marketing campaigns depend hugely on the image of their brand. The brand image starts with the company logo. The company colors and the effective marketing of these coupled with an eye catching logo determine the success of any marketing campaign. Of course the budget and the product play a part too.

Why should you get a good logo for your company?
If you are small company trying to establish yourself online or offline then the first thing that you introduce to potential customers is your company logo. The effect your logo has on your potential customers or your website visitors will influence their buying decisions. For example look at the following two logos. Which one would you feel like buying?

When meeting a prospective client, your business card would speaks a lot about the type of company you are associated with and the quality of your service. A cheap looking card with a poorly done logo would instantly create a feeling distrust in the client. From then on it is an up-hill ride for you trying to sell them anything. For service oriented businesses, it is more so important. They do not have any tangible products that they could promote to convince the customers. Their image is the only thing they could use to sway the buyers mood. These type of companies have to extra careful in the logo design they opt for.

A few years ago, it was sufficient to have your company name in text and you could go about your business. However now with an increasing number of players competing for the same market it is getting more difficult for companies to distinguish themselves. This is even more important for internet based companies. Even brick and mortar companies have to pay attention when it comes to their logo. A home made logo is not enough to compete against the bigger companies with potentially unlimited marketing budget.

What should you look for in a logo design?
The first and foremost feature you should look for in a logo design company is weather it represents your company's image. This could mean several things. Does it show your vision for the company? Is your message visible in the logo? Would any one looking at your logo be able to recall it again and associate it with the service your provide or the product you sell? Is it clear, simple and effective. Most people imagine a good logo to be flashy and colorful. That may be true. For certain companies. But is such a logo good for your company? A flashy and cartoonish looking logo for a company that sells up-class ties might not be such a good idea. An too elegant and too simple logo might not be right for a sports wear company targeting the younger generation.

Domain Registration

What is Domain?

(1) A group of computers and devices on a network that are administered as a unit with common rules and procedures. Within the Internet, domains are defined by the IP address. All devices sharing a common part of the IP address are said to be in the same domain.

(2) In database technology, domain refers to the description of an attribute's allowed values. The physical description is a set of values the attribute can have, and the semantic, or logical, description is the meaning of the attribute.

A domain name is made up of two or more sections, separated by the period character - "." - referred to as "dots". The sections indicate a hierarchy in the Internet domains, with the highest level on the right. For example, in "www.yourdomain.com": When choosing a domain registrar, consider price and ease of use.

Proxy Server

What is a Proxy Server?

Here's the technical definition for "Proxy": The technique in which one host, usually a router, answers Address Resolution Protocol (ARP) requests intended for another machine. By "faking" its identity, the router accepts responsibility for routing packets to the "real" destination. Proxy ARP allows a site to use a single IP address with two physical networks.

Now that's a mouthful. Here's what that means (in English): A proxy is a server that will act as the "middle-man" between you and whatever else you connect to. It is most commonly used as a "safety net" for your connection. Using a proxy usually hides the true identity of the person using it.

Why would you want to use a proxy? As I mentioned before, for security. If you are using a good proxy, the web sites you visit will not be able to tell who you actually are, or where you actually came from. For example, if you use a proxy and visit the "Snoop Page", the page most likely will not be able to gather accurate information on your connection.

If you would like to learn more, drop us a line. Proxy servers are commonly there one day, then gone the next. If you commonly use a proxy server (besides the one provided by your ISP), we highly advise you check it out every now and then to be sure they haven't changed their format. Fore information on how to configure your browser so you can use a proxy sever, drop us an email with your browser make and model. (Example: Netscape Comunicator 4.73 or Internet Explorer 5.01)

Interested in other possible security/privacy issues? Check out our brief section on "Internet Cookies."
General information
Proxy server is the software installed on some network server. The main purpose of this software is to relay traffic between two network hosts (client and server), sometimes this software does some data caching (usually this is performed by HTTP proxies). If your browser is configured to work through the proxy server then all your network traffic will go through that proxy server.
This is what follows the "www." part of an internet address. Typically a domain name is the same as the company name. Domain names are unique, and managed by the ICANN. When selecting a domain name for your business, you will want to follow these simple guidelines:

Keep the name as short a possible.
Choose words that are easy to spell.
Don't use dashes or other symbols. Spaces are not allowed in domain names.
Choose a name that won't be ambiguous when spoken - "mysite.com" and "mysight.com" sound alike.
And of course, it must not be in use by anyone else. You can check for domain name availability at the InterNIC site.
Domain Registration - The process of "buying" an available domain name. Rates vary by registrar.

Adware & Spyware

What is Adware or Spyware?

Adware infection rates continue to climb. McAfee detected over 14 million computers infected with Adware in the first three months of 2004. Adware refers to a type of program that is designed to serve advertisements to you while connected to the Internet. These ads are often considered a nuisance, and the adware program itself is usually installed by users accidentally, packaged in with other software that has actual benefit. Adware is often also referred to as spyware or malware. The worst examples of malware will even alter your browser settings, add unwanted Favorites links, alter system files, and create new default web pages. Finding Adware that has infected your computer can be challenging as new Adware programs are being developed constantly. In many ways, Adware programs are like a computer virus, with the goal of serving you pop-up and other types of ads, rather than causing other damage to your computer. Thankfully, there are a variety of Adware removal products available that can help you remove these unwanted programs. Matter of fact, it is recommended that you try out several Adware removal programs to make sure you have overlapping coverage, and that all detected Adware programs are removed.

Fire Wall

What is firewall?

An Internet firewall is a set of hardware and software components that restricts access between a protected network and the Internet. It can be used to block unwanted or dangerous traffic and provide a single control point for all access between the Internet and the protected network.

The Campus Firewall

The University maintains a firewall which protects the whole of the University's network. This firewall blocks incoming connection attempts by default, except to those services which we can offer safely. Outgoing connections are permitted by default.


All network traffic from Ovid to the your site should be in response to requests which users have generated. Thus, if your site is using a stateful protocol inspection (SPI) firewall, you should not have to open any ports on your firewall. Email is the exception, and you should allow TCP/25 from the address ranges listed below.

Should you use a non-SPI firewall, you will need to allow ephemeral (high numbered) TCP port access from the following IP address ranges. In order to allow Ovid the ability to expand/upgrade service without impacting connectivity, the entire range should be allowed, and not just the gateway addresses.

There are several types of firewall techniques:
• Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing.
• Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation.
• Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.
• Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.
If you have been using the Internet for any length of time, and especially if you work at a larger company and browse the Web while you are at work, you have probably heard the term firewall used. For example, you often hear people in companies say things like, "I can't use that site because they won't let it through the firewall."
If you have a fast Internet connection into your home (either a DSL connection or a cable modem), you may have found yourself hearing about firewalls for your home network as well. It turns out that a small home network has many of the same security issues that a large corporate network does. You can use a firewall to protect your home network and family from offensive Web sites and potential hackers.

Web Designing (Build Your Own Website)

Web Site Development Information

Try these Web authoring resources and tips and our three-pronged Pitchfork Approach to Web authoring:

choose a design standard for your pages like 'world wide accessibility' versus something less universal.
test, test, test.. to make sure your design features degrade gracefully in diverse web browsing environments and screen configurations.
use commonly accepted good site design practices Topics include HyperText Markup Language (HTML), Design & Style, Cascading Style Sheets (CSS), Accessibility, Usability, and Web Standardization.

(If you write articles on Web authoring and need a stable storage location for your articles, GoodPractices will publish/archive qualifying articles here at no charge. Please contact the editor.)

Top Ten Resources

Designing For Multiple Browsers Without Being Bland
A concise, sober, and BRIEF description of a good Web authoring strategy. Other fine articles by the author include What You See is Not What Others Get and Widen Your Web Site's Audience. Stephen Traub.
Getting Started with HTML
A primer to Learning HTML 3.2 by Examples, this is a comprehensive and succinct guide to writing standard HTML. Jukka Korpela.

Web Site Design Tips

Web site design tips for the beginner to the expert. A great collection of classic web site design tips that will build a strong foundation for any new web designer.

The Web Design Group Reference Section

Excellent background information and technical details on HTML authoring. Web Design Group.

Designing for The Web

A series of informative articles on Web site design, including A Web Site is a Harsh Mistress & Rules of Thumb. The special focus is on complementing Web design skills with competence in interface design. Don't miss Web Site Design. Diane Wilson.
Usable Information Technology
An expansive resource on usability and user interface issues -- featuring several extremely challenging and well-researched essays on Web design and style. Jakob Nielsen.
Understanding HTML
An outstanding presentation of HTML basics by an Australian with a fine writing style. Dianne Gorman.

Hints for Web Authors

A short yet insightful historical analysis of conventional vs. Web publishing, Hints for Web Authors is replete with solid recommendations on how to succeed with the latter, including a few pragmatic suggestions mixed in there for good measure, "...in hopes that others may find 'em useful." Warren Steel.

Dan's Web Tips

This huge resource contains a balanced summary review of most of today's important Web authoring topics. Daniel Tobias.
HyperText Markup Language
World Wide Web Consortium (W3C) home page for HTML. Here you will find pointers to specifications for HTML, guidelines for how to use HTML to the best effect and pointers to related work at W3C. W3C.

Graphic Designing

Graphic designers use images and type to create a wide array of products, from corporate brochures to CD covers to book jackets and logos. While publishing and advertising are two of the most prevalent industries when it comes to employing graphic designers, almost every industry relies on the services of graphic designers when it comes time to produce printed materials. In many cases, graphic designers also significantly contribute to online materials and designs. Graphic designers work with images and text in a variety of formats, from print to electronic. Most graphic design today, however, relies on computer software, and the combination of the designer's creativity and skilled eye and his or her technical savvy is a crucial one.

The median wage for graphic designers in 2000 was $34,570, with most designers earning between $20,000 and $60,000.* While full-time salaried graphic design positions are available, many graphic designers work on a contract, freelance basis. For graphic designers who set out on their own, business savvy plays an important role in their ability to succeed.


Outlook

Graphic design, like many creative fields, is intensely competitive. While the outlook for the field is bright considering the increasing demand for graphics, particularly those destined for online uses, it is a field that continues to attract many talented individuals. When considering a career in graphic design it is important to remember how competitive the field is.

VOIP (Voice Over Internet Protocol)

What is VoIP?

VoIP is a quickly growing technology that has many traditional telecommunications companies worried about the future of traditional calling services. VoIP, or Voice over Internet Protocol, allows you to make telephone calls using a data network like the Internet. VoIP converts the voice signal from your telephone into a digital signal that travels over the Internet then converts it back at the other end so you can speak to anyone with a regular phone number. When placing a VoIP call using a phone with an adapter, you'll hear a dial tone and dial just as you always have. VoIP may also allow you to make a call directly from a computer using a conventional telephone or a microphone.

How To Perform Hajj

1. Hajj Preparations Hajj begins on the 8th day of Dhu al-Hijjah, when pilgrims make their intentions to undertake the pilgrimage by do...