Minggu, Mei 24, 2009
di
16.05.00
|
Here you will learn about ip address network introduction and general overview of routing, subnet mask, subnetting, data communication. IP address is an identifier for a computer or device on a TCP/IP network and Internet. Networks that use the TCP/IP protocols route traffic based on the IP address of the destination computer or network device. The format of the IP address is 32 bits 4 octets 4 bytes such as 100.100.10.1, 210.100.22.30, 1.10.1.2 these are the examples of the IP address. The format is a 32-bit numeric value written as four numbers and separated by periods.
Each number in the IP address can be between 0 and 255. In your private network, you can assign unique IP address randomly. However, when you want to connect your private network to the Public network such as Internet then you must need a registered IP address to communicate on the internet and to avoid duplicate address. The four numbers in an IP address are used in different ways to identify a particular network. The general internet registries such as APNIC, RIP, NCC and LACNIC assigns internet or IP addresses from the following 3 classes.
1. Class A- IP address from 0-126. It supports 16 million hosts and 126 networks. 2. Class B- IP address from 128-191. It supports 65,000 hosts and 16,000 networks. 3. Class C-IP address from 192-223. It supports 254 hosts and 2 million networks.
The number of unassigned IP address is running out and a new classless scheme called CIDR is replacing the classes based system of the IP address. In this system the A, B and C class is tied to adoption of IPV6. Every device connected to the Internet must need a unique identifier, which is called an IP address. An IP address is a numeric value separated by periods into four octets. These numbers are usually assigned to the ISPs (internet service providers) within region-based blocks. An IP address can be used to identify a region or a country. An internet user’s geographical location can be determined with the help of an IP address. The number system is generally difficult to remember so the IP address may also assign to a Host name.
The host names are usually easy to remember. In simple words, every website on the internet must bound or mapped with an IP address. At one time ISPs usually issue one IP address to each user. Within each ISP a DHCP (Dynamic host configuration protocol) server is configured, which dynamically assigns IP addresses from a given pool to each user who connects to the ISP. Dynamic IP addresses also limit the ability of a user to host websites, mail servers, ftp server, mail server and web portals.
Understanding IP Addresses Scheme
An IP address is an address that is used to uniquely identify a device or computer on an IP-based network. An IP address is an address used to uniquely identify a device on an IP network. An IP address can be divided into two parts network portion and a host portion. Each IP address is associated with a subnet mask. The 32 bit address is broken into 4 octets and 1 octet=8 bits. Each octet is converted to a decimal and is separated by periods.
For example 0000000000.11111111.00000000.11111111 this is a binary representation of an IP address. Each octet’s decimal value ranges between 0 and 255. The binary octets convert into decimal value. Here you can see that how a binary octet converts into decimal value. The right most bit or least significant bit of an octet will hold a value of 20. The bit left to that bit will hold a value of 21. This process continues until the left most bit or the most significant bit holds the value of 27. If all the binary bits are one the decimal representation will be like this.
1 1 1 1 1 1 1 1 128 64 32 16 8 4 2 1 (128+64+32+16+8+4+2+1=255)
Now here is a sample conversion of the octet if not all the bits are set of 1.
0 0 1 0 0 0 0 1 0 0 32 0 0 0 0 1 (0+64+0+0+0+0+0+1=33) In the following example you can see the IP address representation both in binary and decimal values.
64. 2. 135. 19 (decimal)64+2+135+19=220 01001010.00000010.1000111.00010011 (binary)
The octets are broken down to provide a large number of the addressing scheme that can accommodate small and very large networks. There are five different classes of the IP networks. Class A, B, C, D and E. The classes from A to C and mainly in use, D and E are experimental and reserved so they are not commonly in use. Due to the classless inter domain routing (CIDR) these addresses are not practically in use.
Network/Subnet Masks
A network mask helps you which portion of the address identifies the network portion and the host portion of an IP address. The three different classes of the IP addresses have their own default masks as shown below. Class Subnet Mask
Class A: 255.0.0.0 Class B: 255.255.0.0 Class C: 255.255.255.0
An IP address on a class A network that has not been subnetted would have an address and subnet mask pair such as 10.111.20.1 255.0.0.0. If you want to know in more detail that how a mask help you identify the network and host part of the address simply convert the IP address and subnet mask into the binary numbers.
4.16.15.1= 00000100. 00010000.00001111.00000001 255.0.0.0 = 11111111. 00000000.00000000.00000000 If you have the address and the subnet mask in the binary forms then identifying the network portion and the host portion is very easy. Any address value that has the corresponding subnet mask binary value set to 1 show the network ID. Any address bit that has corresponding subnet mask value to 0 represents the host ID.
4.16.15.1= 00000100.00010000.00001111.00000001 255.0.0.0 = 11111111.00000000.00000000.00000000
Network id | host id If you know your IP address of a computer, you can access the services such as online games, FTP, Web and Mail servers, and remote access utilities such as Remotely Anywhere, PCToGo, PCAnywhere, Remote control etc. How do I change my IP address? There are a number of methods by which you can change the IP address of your computer.
What is a Proxy Server?
A proxy server is a computer that offers network and internet access services to the client computers in a network. A client computer connects to the proxy server, requests a connection, services, files and other resources on the other servers. In some cases, the proxy may alter the client’s request and the server’s response for various reasons. By using the proxy server you can hide, conceal and make your network id anonymous by hiding your IP address. To get the anonymous status on the network or Internet, strong intermediate methods are employed like cryptography etc. Examples are remailers, P2P systems etc.
There is a large number of the software available that allows you to hide your IP address with the help of the proxy servers. The well known software for this purpose is Hide IP, Stealth surf, Netconceal, Anonymous surfing, Proxify and Ghost surf.
An IP address is a unique identification number for communication between computer networks, network devices such as computers, fax machines, printers and servers. It is like the number of an apartment or a phone number. IP addresses are of two types Static and Dynamic. Internet service providers’ use dynamic IP addresses and servers usually use static IP address. The class A of the IP address constitutes almost 50% of all the IP addresses. This class is meant for large networks like the big multinational companies. Class B networks are medium sized like used in the colleges, Universities and other educational and training institutes. Class C IP addresses are usually used for the small companies.
The Regional Internet Registry (RIP) provides the IP addresses based on the geographical distribution. RIP also offers protection against the hackers that try to access the confidential data. All the personal information recorded by the ISP is kept in confidentiality.
Article Resource : IP Addressing
Find computer network tutorials, wireless communication guide, LAN/WAN guide, local area network tools, wan introduction, osi layers model and many other advance topics of data communication. This is very informative site for the IT people specially in the field of computer networking. You will also find data communication overview, tech guides , data communication related information, topologies, tech study guide, Router Labs, IT certifications, Ethernet guide, free IT resources, ip addressing tools, telecommunication guide and many other informative resources. Data communication is a process of sharing data and shared resources between two or more connected computers. The shared resources can include printer, Fax modem, Hard disk, CD/DVD Rom, Database and the data files.
A computer network can be divided into a small segments called Local Area Network (LAN), networking between computers in a building of a office, medium sized networks (MAN), communication between two offices in a city and wide area networks (WAN) networking between the computers, one is locally placed and the other can be thousands of miles away in another city or another country in the world.
WAN connectivity is achieved by a device known as “Router”. The internet is the world’s largest WAN, where millions of computers from all over the globe and connected with each other.
Networking is the practice of linking two or more computers or devices with each other. The connectivity can be wired or wireless. A computer network can be categorized in different ways, depends on the geographical area as mentioned above.
There are two main types of the computer networking client-server and peer to peer. In the client server computing, a computer plays a major role known as server, where the files, data in the form of web pages, docs or spread sheet files, video, database & resources are placed.
All the other computers in the client/server networks are called clients and they get the data from the server. In the peer to peer networks all the computers play the same role and no computer act as a centralized server. In the major businesses around the world client-server networks model is in major use.
A network topology defines the structure, design or layout of a network. There are different topologies like bus, ring, star, mesh, hybrid etc. The star topology is most commonly used topology. In the star topology, all the computers in the network are connected with a centralized device such as hub or switch. Thus forms a star like structure. If the hubs/switch fails to work for any reason then all the connectivity and communication between the computers will be halted.
A common communication language is used by the computers and the communication devices is known as protocols. The most commonly used and popular protocol on the internet and in the home and other networks is called TCP/IP. TCP/IP is not a single protocol but it is a suite of several protocols.A computer network can be a wired or wireless and TCP/IP protocol can work both in types of a network.Data flow or communication can be divided into seven logical layers called OSI layers model that was developed by Intel and Xerox Corporation and was standardized by ISO.
1. Application layer 2. Presentation layer 3. Session layer 4. Transport layer 5. Network layer 6. Data Link layer a. Media access control sub-layer b. Logical link control sub-layer 7. Physical layer
A network can be divided into different scales and ranges and it depends on the requirement of the organization and the geographical location. Computer Network can be divided into Local Area Network, Personal Area Network, Campus Area Network, Wireless Local Area Network, Metropolitan Area Network and Wide Area Network.
There are several communication connection methods like HomePNA, Power line communication, Ethernet and Wifi connection method. A network can also be categorized into several different types based on the services it provides like Server farms, Storage area networks, Value control networks, Value-Added networks, SOHO networks, Wireless and Jungle networks.
I have explained the basic and advance data communication technologies, Router commands, communication devices, certifications, IP addressing basics, subnetting, networking tips, networking interview questions, windows networking, mobile technology and wireless computing. I have tried to cover all the hot topics in the area of computer networking so that maximum users can get benefit from this website. I will warmly welcome any suggestions, tips and unique content from my visitors if they want to share with me.
Before working on this website, I personally visited many networking related websites to updated my knowledge to provide most up-to-date, unique information and best experience to my visitors.
I have tried to add all the good features, how tos and networking related utilities in my website. I am hopeful that my visitors will like this website and find it very useful for the basic and advance data communication topics.
Article Resource : NetworkTutorial
What is a Computer Network?
A computer network refers to an interconnected group of computers. The networks may be classified according to the network layer at which they function depending upon the basic reference models. The reference models may differ from industry to industry, just like the five-layer Internet Protocol Suite model. Computer Networks are classified on the basis of various factors like scale, connection method, network relationships and protocol.
Type of Computer Networking: The common types of computer networks are:
* Personal Area Network (PAN) * Local Area Network (LAN) * Campus Area Network (CAN) * Metropolitan Area Network (MAN) * Wide Area Network (WAN) * Global Area Network (GAN) * Internet work - intranet, extranet and internet
Importance of Computer Network Solutions in Organizations:
With the boom of technology and e-commerce, most of the small and large businesses today are driven by the use of internet. The Internet and the influence that it has on e-commerce and business has in more than one ways become the "great equalizer" of small business and the larger corporate giants.
Especially in the case of small business, it is very important to maintain their computer network solutions so as to keep working properly and efficiently. A whole package of computer networking solutions complete with routine maintenance, regular updates, upgrades and support can help an organization ensure that its investment is well protected and that it can survive and thrive online.
Here are some of the important computer network solutions and services that can help your organization runs smoothly and efficiently:
* Updating and upgrading software – This helps in ensuring the longevity and integrity of the online portion of your business. By installing regular software updates, you can ensure that you have the newest, safest and most efficient software for your organization’s needs.
* Maintenance of systems using computer network support - It is advisable to find a trusted technician in your area whom you can call in to save valuable time in the event of an unexpected technical problem.
* Routine maintenance - This helps in protecting your computers and networks from viruses and spy ware. Installing an effective virus protection software program in your system can ensure the longevity of your computer network by helping to keep it free from dangerous viruses that can threaten your information and software. Moreover the spy ware prevention software can also help keep unwanted hackers out of your systems to ensure that your sensitive information is kept secure.
E -Computer Network Solutions Providers:
There are many organizations that provide online computer network solutions for small, medium and large organizations. They provide cost effective and high performance computer networking solutions to build Local Area Network, Wide Area Network and Wireless LAN to access internet and share data between the computers. Some of the companies providing computer Networking Solutions online are:
* CSS Infotech Ltd. * JMPro Networking Solutions * VIP PowerNet * The Computer Company
Article Source: Computer Network Solution
Computer networking or data communication is a most important part of the information technology. Today every business in the world needs a computer network for smooth operations, flexibly, instant communication and data access. Just imagine if there is no network communication in the university campuses, hospitals, multinational organizations and educational institutes then how difficult are to communicate with each other. In this article you will learn the basic overview of a computer network. The targeted audience of this article is the people who want to know about the network communication system, network standards and types.
A computer network is comprised of connectivity devices and components. To share data and resources between two or more computers is known as networking. There are different types of a computer network such as LAN, MAN, WAN and wireless network. The key devices involved that make the infrastructure of a computer network are Hub, Switch, Router, Modem, Access point, LAN card and network cables.
LAN stands for local area network and a network in a room, in a building or a network over small distance is known as a LAN. MAN stands for Metropolitan area network and it covers the networking between two offices within the city. WAN stands for wide area network and it cover the networking between two or more computers between two cities, two countries or two continents.
There are different topologies of a computer network. A topology defines the physical layout or a design of a network. These topologies are star topology, bus topology, mesh topology, star bus topology etc. In a star topology each computer in a network is directly connected with a centralized device known as hub or switch. If any computer gets problematic in star topology then it does not affect the other computers in a network.
There are different standards and devices in computer network. The most commonly used standard for a local area network is Ethernet. Key devices in a computer network are hub, switch, router, modem and access point etc. A router is used to connect two logically and physical different networks. All the communication on the internet is based on the router. Hub/Switch is used to connect the computers in local area network.
Hopefully, in this article you may have learnt that what a computer network is, how important it is in our lives, what are different network devices, standards, topologies and communication types.
Computer networking or data communication is a most important part of the information technology. Today every business in the world needs a computer network for smooth operations, flexibly, instant communication and data access. Just imagine if there is no network communication in the university campuses, hospitals, multinational organizations and educational institutes then how difficult are to communicate with each other. In this article you will learn the basic overview of a computer network. The targeted audience of this article is the people who want to know about the network communication system, network standards and types.
A computer network is comprised of connectivity devices and components. To share data and resources between two or more computers is known as networking. There are different types of a computer network such as LAN, MAN, WAN and wireless network. The key devices involved that make the infrastructure of a computer network are Hub, Switch, Router, Modem, Access point, LAN card and network cables.
LAN stands for local area network and a network in a room, in a building or a network over small distance is known as a LAN. MAN stands for Metropolitan area network and it covers the networking between two offices within the city. WAN stands for wide area network and it cover the networking between two or more computers between two cities, two countries or two continents.
There are different topologies of a computer network. A topology defines the physical layout or a design of a network. These topologies are star topology, bus topology, mesh topology, star bus topology etc. In a star topology each computer in a network is directly connected with a centralized device known as hub or switch. If any computer gets problematic in star topology then it does not affect the other computers in a network.
There are different standards and devices in computer network. The most commonly used standard for a local area network is Ethernet. Key devices in a computer network are hub, switch, router, modem and access point etc. A router is used to connect two logically and physical different networks. All the communication on the internet is based on the router. Hub/Switch is used to connect the computers in local area network.
Hopefully, in this article you may have learnt that what a computer network is, how important it is in our lives, what are different network devices, standards, topologies and communication types.
Article Source: Computer Network
Selasa, Mei 12, 2009
di
00.01.00
|
TCP/IP is not a single protocol, nor is it, as its name might suggest, a pair of protocols. TCP/IP is actually a suite of protocols. In other words, it's a large group of protocols that work together. The TCP/IP designers' original intent was to create a protocol that could traverse various heterogeneous network environments while having the ability to take multiple routes to a final destination. This flexibility was crucial. TCP/IP, originally called NCP (Network Control Protocol), was a product of an experimental project commissioned by the Department of Defense of ARPANet (Advanced Research Project Agency Network) as an experimental protocol that traveled over packet-switched networks. The goal was to ensure that if a single part of the network became damaged or unreachable, transmission of critical data would continue to reach its destination on the network through alternate routes.
Despite its roots in the defense community, the development and evolution of TCP/IP cannot be attributed to any one group of individuals. TCP/IP is nonproprietary, and it's the accepted communications protocol on the Internet. Like other matters related to the Internet, TCP/IP standards are publicly available and published as RFCs (Requests For Comments) that are maintained by the Internet Architecture Board (IAB).
The IAB allows any individual or company to submit or evaluate an RFC. RFCs can contain a variety of information; one use of RFCs is to publish proposals or new ideas for standards that might add to or change the functionality of the TCP/IP protocol suite in some way. RFCs are posted to the Internet for public review and are reviewed by IETF (Internet Engineering Task Force), a division of the IAB. After an appropriate amount of discussion and scrutiny, a newly proposed draft can be made into a standard that will then be adopted by the entire Internet development community. Because TCP/IP is based on open, nonproprietary standards, it has been scrutinized and revised by numerous people from all over the world, and has thus been continuously developed and improved since its inception.
TCP/IP is based on the idea of an open system (nonproprietary) model. With regard to system architecture, TCP/IP's functionality maps loosely to the OSI (Open Systems Interconnection) Reference Model, a basic system architectural reference designed for programmers to provide a common framework and design for network protocols. By using the OSI Model, protocol designers can ensure that the protocols they design meet at least the basic levels of functionality and that there is some degree of standardization between their implementation of a protocol and someone else's. Microsoft's TCP/IP is compliant with RFC-published TCP/IP standards. However, the Microsoft implementation includes support for a number of features not found in other versions of TCP/IP.
Requests For Comments (RFCs)
As mentioned earlier, one way that RFCs are used is to document Internet standards. Keep in mind that the RFCs that actually document standards are merely a subset of all the RFCs that exist. In other words, all Internet standards are documented by at least on RFC, but not all RFCs become Internet standards.
A number of different types of RFCs exist, including FYIs, Drafts, and STDs (Standards). Anyone can submit an RFC or make comments in support of, or against, a current RFC. The IETF then makes this documentation available to the public. If the RFC is a proposal for a new Internet protocol or service, it is reviewed by the IETF and recommendations for revisions are made. To allow ample time for review and revision of an RFC, there is a minimum six-month waiting period before a Proposed Standard can become a Draft Standard; there's then an additional four-month time period before a Draft Standard can become a Standard.
RFC's are referenced by a specific number, such as RFC 1880 "Internet Official Protocol Standards." These numbers are issued sequentially and are never reused. If a current Standard is revised, a new number is issued to the revised Standard, and the older version becomes obsolete. Always make sure you have the most recent RFC on any topic you are researching. RFC 1880, for example, contains an index of the most current RFCs for Internet Standards. To locate a specific RFC, or to learn more about RFCs in general, you can visit the InterNIC at www.internic.net or one of the many search engines available on the Web, such as Search.Com at www.search.com, and search for "RFC."
Article Source: TCP / IP
Senin, Mei 11, 2009
di
23.57.00
|
How to set up a Dual-Screen workstation with an additional computer. What we try to achieve: connect a laptop or another computer to an existing computer and have the ability to control both computers with a single mouse and keyboard. (Without any hardware, but over the network)
If you have another laptop or a pc computer sitting around and is wondering how you can connect the two computers and use each computers' own processing power individually to multi task and speedup your working environment, there is a very easier way to accomplish this dream of yours. In today's blog post I will cover all the possible ways to achieve this.
If you do have a dual display supported video card, what you will be doing is using a single PC and spread out the processing power between activities and expanding the working area horizontally, with the use of an additional screen. But what we are trying to do is take advantage of two separate high speed computers and use their individual processing power separating while having the capability to control them with single input devices and eventually setting up a DUAL-Screen workstation.
Option 1: Maxivista.com The program available on the site is non freeware software and has all the capabilities we are interested in, dual screen, single control, and mirror screening, all the functions done over the network. So if you want to pay some extra bucks for few more extra features, this is your best bet.
Options 2: vnc programs You can use win2VNC and a VNC program such as ultraVNC, RealVNC, or TightVNC to accomplish the single input control feature. Links: http://fredrik.hubbe.net/Win2VNC.exe - win2VNC Instructions for usage: you will have to install win2vnc on the computer that you wish to have the control and a VNC program on the other computer which you are going to be controlling using the other computers' input devices. Both computers have to be connected to internet and relevant IP address will be shown after the program in run, which later will be needed in connecting each other.
Advantages: - Share input devices (Mouse, keyboard) to control both computers and clipboards. - Use each computers' own processing power to perform tasks, yet both are connected together to allow single control. - Dual monitor setup/workstation
Disadvantages: - Most of the VNC programs I tried excluding maxivista do not allow mouse scrolling function on the controlled computer, but only on the controlling (main/server) computer. - Even though both computers seemed connected, you are only controlling the computers, thus no applications or windows can be shared. This is what you have to really understand, each run on its own. - You can not transfer files between two computers using these VNC programs although you can use other file transfer programs such as teamviwer etc. to connect the computers and transfer files.
Option 3: using hard ware gadgets.
FYI: This feature is knows as FVM which stands for Keyboard, Video, Mouse control. Mostly used for controlling several servers with a single mouse, keyboard and a monitor.
To read more about computer connectivity over network and using hardware, visit http://ashpresent.blogspot.com
Article Source: Connect Two Computers
Internet Service Provider (ISP) is also known as Internet Access Provider (IAP). Usually, Internet Service Providers are corporations that offer Internet services to their customers or network.
ISPs work by making use of a technology called data transmission that is suitable for rendering data-grams of Internet Protocol such as DSL, high-speed interconnects, cable modems, and dial-up.
Internet service providers offers the client with username, access contact number, software package, and password details. Once a client is equipped with modem, he/she can then get access and surf the World Wide Web. A person can thus send and accept electronic messages via Internet service providers servers.
Apart from providing service to individual clients, Internet Service Providers serve large business houses and corporate offices proffering them with direct connectivity network to Internet. Internet service providers are also interconnected via (NAPs) Network Access Points. They employ wide range of applications thereby enabling users to stay connected to the network.
Internet Service Providers also offer various services including remote storage of data files on behalf of the users and other services that are unique to every specific Internet service providers.
For small businesses and home users, the most famous and recognized alternatives are ISDN (Integrated Services Digital Network), broadband wireless, FTTH (fiber to the premises), ADSL (Asymmetric Digital Subscriber Line), and cable modem.
Users that have high demanding requirements especially large business organizations may make use of Ethernet, Gigabit Ethernet , ISDN (PRI or BRI), Satellite Internet Access, Frame Relay, DSL (ADSL or SHDSL), Metro Ethernet, and SONET (Synchronous Optical Networking).
Article Source: Internet Service Provider
Diposting oleh
Herry
Label:
ISP
|
MARVEL and SPIDER-MAN: TM & 2007 Marvel Characters, Inc. Motion Picture © 2007 Columbia Pictures Industries, Inc. All Rights Reserved. 2007 Sony Pictures Digital Inc. All rights reserved. blogger templates
|