BCA 4th Sem : Assignment File Introduction To Internet Technologies
BCA 4th Sem : Assignment File Introduction To Internet Technologies
Assignment file
´Introduction to Internet Technologiesµ
O
O
O
c
INDEX
c
c
ÿDiscuss IP security (SEC) :
Ô
Ô
(Ô ) is a protocol suite for securing Internet
Protocol (IP) communications by authenticating and encrypting each IP packet of a
communication session. IPSec also includes protocols for establishing mutual authentication
between agents at the beginning of the session and negotiation of cryptographic keys to be used
during the session. IPSec is an end-to-end security scheme operating in the Internet Layer of the
Internet Protocol Suite. It can be used in protecting data flows between a pair of hosts, between a
pair of security gateways or between a security gateway and a host
Some other Internet security systems in widespread use, such as Secure Sockets Layer (SSL),
Transport Layer Security (TLS) and Secure Shell (SSH), operate in the upper layers of the TCP/IP
model. Hence, IPSec protects any application traffic across an IP network. Applications do not
need to be specifically designed to use IPSec. The use of TLS/SSL, on the other hand, must be
designed into an application to protect the application protocols.
IPSec is a successor of the ISO standard Network Layer Security Protocol (NLSP). NLSP was
based on the SP3 protocol that was published by NIST, but designed by the Secure Data Network
System project of the National Security Agency (NSA).IPSec is officially specified by the Internet
Engineering Task Force (IETF) in a series of Request for Comment documents addressing various
components and extensions. It specifies the spelling of the protocol name to be IPSec.
The IPSec suite is an open standard. IPSec uses the following
protocols to perform various functions:
ë Internet Key Exchange (IKE and IKEv2) or Kerberized Internet Negotiation of Keys (KINK) sets
up a security association (SA) by handling the negotiation of protocols and algorithms and by
generating the encryption and authentication keys to be used by IPSec.
ë Authentication Header (AH) to provide connectionless integrity and data origin authentication for
IP datagram¶s and to provide protection against replay attacks.
c
t i l i ti lit
?
Aut ti ti Header (AH) i a member of t e IPSec protocol suite.
AH guarantees connectionless integrit and data origin aut entication of IP packets. Furt er, it can
optionall protect against replay attacks by using t e sliding window techni ue and discarding old
packets (see below).
ë In IPv4, the AH protects the IP payload and all header fields of an IP datagram except for mutable
fields (i.e. those that might be altered in transit). Mutable (and therefore unauthenticated) IP header
fields are DSCP/ S, EC , Flags, Fragment Offset, TTL and Header Checksum.
ë In IPv6, the AH protects the AH itself, the Destination Options extension header after the AH, and
the IP payload. It also protects the fixed IPv6 header and all extension headers before the AH,
except for the mutable fields: DSCP, EC , Flow Label, and Hop Limit.
The following AH packet diagram shows how an AH packet is constructed and interpreted:
Type of the next header, indicating what upper-layer protocol was protected. The value is taken
from the list of IP protocol numbers.
The length of this Authentication Header in 4-octet units, minus 2 (a value of 0 means 8 octets, 1
means 12 octets, etcetera). Although the si e is measured in 4-octet units, the length of this header
needs to be a multiple of 8 octets if carried in an IPv6 packet. This restriction does not apply to an
Authentication Header carried in an IPv4 packet.
Reserved for future use (all zeroes until then).
Arbitrary value which is used (together with the source IP address) to identify the security
association of the sending party.
A monotonically increasing sequence number (incremented by 1 for every packet sent) to prevent
replay attacks. When replay detection is enabled, sequence numbers are never reused because a
new security association must be renegotiated before an attempt to increment the sequence number
beyond its maximum value.
! "#$ %&
Variable length check value. It may contain padding to align the field to an 8-octet boundary for
IPv6, or a 4-octet boundary for IPv4.
c
protection of packets. ESP also supports encryption-only and authentication-only configurations,
but using encryption without authentication is strongly discouraged because it is insecure. Unlike
Authentication Header (AH), ESP does not protect the IP packet header. However, in Tunnel
Mode, where the entire original IP packet is encapsulated with a new packet header added, ESP
protection is afforded to the whole inner IP packet (including the inner header) while the outer
header remains unprotected. ESP operates directly on top of IP, using IP protocol number 50.
The following ESP packet diagram shows how an ESP packet is constructed and interpreted:
O
@
@
@
In order to decide what protection is to be provided for an outgoing packet, IPsec uses theSecurity
Parameter Index (SPI), an index to the security association database (SADB), along with the
destination address in a packet header, which together uniquely identify a security association for
that packet. A similar procedure is performed for an incoming packet, where IPsec gathers
c
decryption and verification keys from the security association database.
For multicast, a security association is provided for the group, and is duplicated across all
authorized receivers of the group. There may be more than one security association for a group,
using different SPIs, thereby allowing multiple levels and sets of security within a group. Indeed,
each sender can have multiple security associations, allowing authentication, since a receiver can
only know that someone knowing the keys sent the data. Note that the relevant standard does not
describe how the association is chosen and duplicated across the group; it is assumed that a
responsible party will have made the choice.
î
!
!
!
"
A means to encapsulate IPSec messages for NAT traversal has been defined by RFC documents
describing the NAT-T mechanism.
#
!
$
!
$
!
Ô %
!
"
An IP reader has two features that distinguish it from other access control readers:
1. Unlike basic readers, IP readers do not require control panels and operate independently. A basic
reader simply sends card numbers to a panel and does not control an electric lock, door contact or
exit button. If the control panel fails, the basic reader stops working. An IP reader has inputs for
monitoring a door contact, exit button and a relay for controlling an electric lock. It also has
internal memory for storing the database of users, configuration parameters and recording events.
Such readers are sometimes referred to as "intelligent readers" or "readers with built-in
controllers".
2. IP readers have an on-board network interface (10/100BaseT Ethernet or Wi-Fi).
The first IP reader was introduced in 1999 by Isonas Security Systems Inc.
HID Global, one of the major manufacturers in access control reader and card business, followed
the move into network-based security systems only 8 years later, by introduction of the Edge IP
reader family in 2007.
?
c
ë An existing network infrastructure is fully utilized; there is no need to install new communication
lines.
ë There are no limitations regarding the number of IP readers (the limit of 32 readers per line is
typical for systems using RS-485 communication interface).
ë Special knowledge of installation, termination, grounding and troubleshooting of RS-485
communication lines is not required.
ë Communication with IP readers may be done at the full network speed, which is important if
transferring a lot of data (databases with thousands of users, possibly including biometric records).
ë In case of an alarm IP readers may initiate connection to the host PC. This ability is important in
large systems as it allows reducing network traffic generated by frequent polling.
ë Simplifies installation of systems consisting of multiple locations separated by large distances.
Basic Internet link is sufficient to establish connections to remote locations.
ë Wide selection of standard network equipment is available to provide connectivity in different
situations (fiber, wireless, VPN, dual path, Poe)
ë Most IP readers are Poe capable. This feature makes it easy to provide battery backed power to the
entire system, including the locks.
ë There is no wasted capacity when using IP readers (i.e. a 4-door controller would have 25%
unused capacity if it was controlling only 3 doors).
ë IP reader systems scale easily: there is no need to install new main or sub-controllers.
ë Failure of one IP reader does not affect any other readers in the system.
ë No special hardware is required for building fail-over systems: in case the primary host PC fails,
the secondary host PC may start polling IP readers.
ë The system becomes susceptible to network related problems, such as delays in case of heavy
traffic and network equipment failures.
ë IP reader and workstations may become accessible to hackers if the network of an organization is
not well protected. This threat may be eliminated by physically separating the access control
network from the network of the organization. Also most IP readers utilize either Linux platform
or proprietary operating systems, which makes them more difficult to hack. Industry standard data
encryption is also used.
ë Maximum distance from a hub or a switch to the reader is 100 meters (330 feet). Some systems
based on simpler reader interfaces (such as iButton) can extend that maximum distance for an
additional 100 meters (between the reader contact and the system).
ë With the exception of fully stand-alone systems that require a connection with a PC only when
making changes to the configuration or retrieving the accumulated access log, operation of the
system is dependent on the host PC. In case the host PC fails, events from IP readers are not
retrieved and functions that required interaction between readers (i.e. anti-pass back) stop working.
Some readers, however, have peer-to-peer communication option in order to reduce dependency
on the host PC.
ë In order to be used in high-security areas IP readers require special input/output modules to
eliminate the possibility of intrusion by accessing lock and/or exit button wiring. Not all IP reader
manufacturers have such modules available.
ë Being more sophisticated than basic readers IP readers are also more expensive and sensitive,
therefore they should not be installed outdoors in areas with harsh weather conditions or high
possibility of vandalism.
ë The variety of IP readers in terms of identification technologies and read range is much lower than
that of the basic readers.
c
ÿÕ
Õ
Õ
A search engine is a service that index, organize and often reads and review the website. These are
online utilizing that quickly search web documents for and entered word phrase. This search
engine string runs against the database by search engine and returns a list of resources that match
the word phrase and displays the result for the users. Search engine is sometime also called
spiders, warm or know bots.Most searches can be successfully completed with the use of good
search engine and the correct search words. Search engines for the general web do not really
search the word wide web directly. Each one searches a database of the full text of webpage
selected from the billions of WebPages out of their reasoning on servers. When we search the web
using a search engine, we are always searching a somewhat stale copy of the real webpage. When
we click son links provided in a search engine¶s search result. Then we retrieve from the server the
current version the page.
So, if a webpage is never linked to in any other page, search engine spiders cannot find it. The
way to publish a new page into a search engine, its URL is send by some human to the search
engine company as a request that new page be included. All search companies offer ways to do
so.When spiders find pages, they pass them on to another computer programs for µindexing¶ .this
program identifies the text, links and other contain in the page and stores in it the search engine
database files show that the database can be searched by keyword and whatever more advanced
approaches are offered and the page will be found if the search matches its content.
'
The search engines working in the follows ways:-
ë Each search engines use its on set of rules for finding the gathered document on the web. It
employees a program called a search agent or spider, that retrieves information from the web.
Some search engine follow every link on every homepage, some ignored links that lead to
graphics files, sound files and animation files.
ë As soon as search engines discovered URL¶s and the document software instructed to get those
URL¶s and document and send information about them to indexing software.
ë The indexing software , on receiving the documents form the agents abstract and index it into a
database. Each search engines abstract and indexes different kind of information. Therefore, every
search engines displays the index in different manner.
ë For searching the info on net, we type words or phrases on a webpage that describes the info we
are looking for. Choosing the keyword or phrase is very important in searching because the search
very much depends on choosing µright search words¶.
There are 3 types of search engines which are as follows:-
ë Search engine (crawler)
ë Subject directories
ë Search database contents or µinvisible web¶.
A search engine is a database application that retrieves info based on word or
phrase, entered. The web search engine employees a programmed called search agent or a spider
that goes out and looks for the info on web pages. This info is indexing and stored in a database
and displays a list of the web pages which are most relevant to required.
ë It is build by computer robot program called µspider¶ and not by human selection.
ë They are not organized by subject categories, all pages here are ranked by a computer selection.
ë It contains full text of the web pages they link to and their information can be found by matching
words in the required pages.
c
A sub-directory is a website that categories WebPages so we can browse
link to WebPages by topic. The advantages of a subject directives over a search engine is human
being have categories the WebPages, so all links in a categories usually belong their but on the
other hand, search engine are quicker than subject directories.
A sub-directory has the following features:
ë They are built by human selection and not by computers or robot program.
ë They are organized in to subject categories, classification of pages by subjects. but subject are not
standardized and very according to the scope of each directory .
ë A directory never contains full text of the WebPages.
ë It is small and specialize to large but smaller then the most search engines.
ë It Is often but not always carefully evaluated and annotated.
Õ
A database is collection of pieces of
related information that is organized to its various information items and can be locate and
retrieved when needed. Some database can be used by anyone at no charge. But some request that
user belongs to a particular organization or plays a fee. These are part of invisible web or hidden
web or deep web.
Invisible web is estimated to offer two or three times as many pages as the visible web .there are
many specialized searchable database that the world wide web allows to access through a search
box in a web page. The term used in search are send into that specialized database and are returned
in another webpage that is dynamically generate for the answer
The popular search engines are:
ë www.msn.com
ë www.lycos.com
ë www.altavista.digital.com
ë www.teoma.com
ë www.excite.com
ë www.mamma.com
ë www.news.google.com
ë www.news.yahoo.com
c
ÿ
?
?
Õ
(LAN) is a computer network that connects computers and devices in a
limited geographical area such as home, school, computer laboratory or office building. The
defining characteristics of LANs, in contrast to wide area networks (WANs), include their usually
higher data-transfer rates, smaller geographic area, and lack of a need for leased
telecommunication lines. Token Ring and other technologies have been used in the past, but
Ethernet over twisted pair cabling and Wi-Fi are the two most common technologies currently in
use. As larger universities and research labs obtained more computers during the late 1960s, there
was an increasing pressure to provide high-speed interconnections. A report in 1970 from the
Lawrence Radiation Laboratory detailing the growth of their "Octopus" network gives a good
indication of the situation.
Cambridge Ring was developed at Cambridge University in 1974 but was never developed into a
successful commercial product. Ethernet was developed at Xerox PARC in 1973±1975, and filed
as U.S. Patent 4,063,220. In 1976, after the system was deployed at PARC, Metcalfe and Boggs
published their seminal paper, "Ethernet: Distributed Packet-Switching For Local Computer
Networks."ARCNET was developed by Data point Corporation in 1976 and announced in 1977. It
had the first commercial installation in December 1977 at Chase Manhattan Bank in New York.
The development and proliferation of CP/M-based personal computers from the late 1970s and
then DOS-based personal computers from 1981 meant that a single site began to have dozens or
even hundreds of computers. The initial attraction of networking these was generally to share disk
space and laser printers, which were both very expensive at the time. There was much enthusiasm
for the concept and for several years, from about 1983 onward, computer industry pundits would
regularly declare the coming year to be ³the year of the LAN´.
In practice, the concept was marred by proliferation of incompatible physical Layer and network
protocol implementations, and a plethora of methods of sharing resources. Typically, each vendor
would have its own type of network card, cabling, protocol, and network operating system. A
solution appeared with the advent of Novell NetWare which provided even-handed support for
dozens of competing card/cable types, and a much more sophisticated operating system than most
of its competitors. Netware dominated the personal computer LAN business from early after its
introduction in 1983 until the mid 1990s when Microsoft introduced Windows NT Advanced
Server and Windows for Workgroups.
Of the competitors to NetWare, only Banyan Vines had comparable technical strengths, but
Banyan never gained a secure base. Microsoft and 3Com worked together to create a simple
network operating system which formed the base of 3Com's 3+Share, Microsoft's LAN Manager
and IBM's LAN Server - but none of these were particularly successful.
During the same period, Unix computer workstations from vendors such as Sun Microsystems,
Hewlett-Packard, Silicon Graphics, Intergraph, NeXT and Apollo were using TCP/IP based
networking. Although this market segment is now much reduced, the technologies developed in
this area continue to be influential on the Internet and in both Linux and Apple Mac OS X
networking²and the TCP/IP protocol has now almost completely replaced IPX, AppleTalk, NBF,
and other protocols used by the early PC LANs.
Early LAN cabling had always been based on various grades of coaxial cable.
However shielded twisted pair was used in IBM's Token Ring implementation, and in 1984 Jakub
Kamas to małyczopek showed the potential of simple unshielded twisted pair by using Cat3²the
same simple cable System Of A Down. Lineage ii Freya ROX to the development of 10Base-T
and structured cabling which is still the basis of most commercial LANs today. In addition, fiber-
optic cabling is increasingly used in commercial applications. As cabling is not always possible,
wireless Wi-Fi is now the most common technology in residential premises as the cabling required
is minimal, and it is well suited to mobile laptops and smart phones.
c
?
'
ARCNET is a local area network (LAN) protocol, similar in purpose to Ethernet or
Token Ring. Arc net was the first widely available networking system for microcomputers and
became popular in the 1980s for office automation tasks. It has since gained a following in the
embedded systems market, where certain features of the protocol are especially useful. ARCNET
was developed by principal development engineer John Murphy at Data point Corporation in 1976
and announced in 1977. It was the first loosely-coupled LAN-based clustering solution, making
no assumptions about the type of computers that would be connected. This was in contrast to
contemporary larger and more expensive computer systems such as Decent or SNA, where a
homogeneous group of similar or proprietary computers were connected as a cluster. The token-
passing bus protocol of that I/O device-sharing network was subsequently applied to allowing
processing nodes to communicate with each other for file-serving and computing scalability
purposes. An application could be developed in DATABUS, Data point¶s proprietary COBOL-
like language and deployed on a single computer with dumb terminals. When the number of users
outgrew the capacity of the original computer, additional 'compute' resource computers could be
attached via ARCNET, running the same applications and accessing the same data. If more
storage was needed, additional disk resource computers could also be attached. This incremental
approach broke new ground and by the end of the 1970s (before the first cassette-based IBM PC
was announced in 1981) over ten thousand ARC net LAN installations were in commercial use
around the world, and Data point had become a Fortune 500 company. As microcomputers took
over the industry, well-proven and reliable ARCNET was also offered as an inexpensive LAN for
this machines.ARCNET remained proprietary until the early-to-mid 1980s. This did not cause
concern at the time, as most network architectures were proprietary. The move to non-proprietary,
open systems began as a response to the dominance of International Business Machines (IBM) and
its Systems Network Architecture (SNA). In 1979, the Open Systems Interconnection Reference
Model (OSI Model) was published. Then, in 1980, Digital. When Ethernet moved from co-axial
cable to twisted pair and an "interconnected stars" cabling topology based on active hubs, it
became much more attractive. Easier cabling, combined with the greater raw speed of Ethernet (10
Mbit/s, as compared with 2.5 Mbit/s for ARC net) helped to increase Ethernet demand, and as
more companies entered the market the price of Ethernet started to fall²and ARCNET (and
Token Ring) volumes taper off.
In response to greater bandwidth needs, and the challenge of Ethernet, a new standard called ARC
net Plus was developed by Data point, and introduced in 1992. ARC net Plus ran at 20 MBits per
second, and was backward compatible with original ARC net equipment. However, by the time
ARC net Plus products were ready for the market, Ethernet had captured the majority of the
network market, and there was little incentive for users to move back to ARC net. As a result, very
few ARC net Plus products were ever produced. Those that were built, mainly by Data point, were
expensive, and hard to find.
ARCNET was eventually standardized as ANSI ARCNET 878.1. It appears this was when the
name changed from ARC net to ARCNET. Other companies entered the market, notably Standard
c
Microsystems who produced systems based on a single VLSI chip, originally developed as custom
LSI for Data point, but later made available by Standard Microsystems to other customers. Data
point eventually found itself in financial trouble and eventually moved into video conferencing
and (later) custom programming in the embedded market. Even though ARCNET is not used
anymore, there are still a few references left in common. The American movie Hackers (1995) for
example still uses some old computer protocols, including ARCNET. When you fast forward to
00:48:20 you can see that ARCNET is being used.DescriptionOriginal ARCNET used RG-62/U
coax cable of 93ȍ impedance and either passive or active hubs in a star-wired bus topology, a
layout eventually copied by modern twisted pair Ethernet LANs. At the time of its greatest
popularity ARCNET enjoyed two major advantages over Ethernet. One was the star-wired bus;
this was much easier to build and expand (and was more readily maintainable) than the clumsy
linear bus Ethernet of the time. Another was cable distance ± ARCNET coax cable runs could
extend 2000 feet (610 m) between active hubs or between an active hub and an end node, while
the RG-58 (50ȍ) µthin¶ Ethernet most widely used at that time was limited to a maximum run of
600 feet (183 m) from end to end. Of course, ARCNET required either an active or passive hub
between nodes if there were more than two nodes in the network, while thin Ethernet allowed
nodes to be spaced anywhere along the linear coax cable, but the ARCNET passive hubs were
very inexpensive. Passive hubs limited the distance between node and active hub to 100 feet (30
m). More importantly, the "interconnected stars" cabling topology made it easy to add and remove
nodes without taking the whole network down, and much easier to diagnose and isolate failures
within a complex LAN.
To mediate access to the bus, ARCNET, like Token Ring, uses a token passing scheme, rather
than the carrier sense multiple access approach of Ethernet. When peers are inactive, a single
"token" message is passed around the network from machine to machine, and no peer is allowed to
use the bus unless it has the token. If a particular peer wishes to send a message, it waits to receive
the token, sends its message, and then passes the token on to the next station. Because ARCNET is
implemented as a distributed star, the token cannot be passed machine to machine around a ring.
Instead, each node is assigned an 8 bit address (usually via DIP switches), and when a new node
joins the network a "recon fig" occurs, wherein each node learns the address of the node
immediately above it. The token is then passed directly from one node to the next.
Historically, each approach had its advantages: ARCNET added a small delay on an inactive
network as a sending station waited to receive the token, but Ethernet's performance degraded
drastically if too many peers attempted to broadcast at the same time, due to the time required for
the slower processors of the day to process and recover from collisions. ARCNET had slightly
lower best-case performance (viewed by a single stream), but was much more predictable.
ARCNET also has the advantage that it achieved its best aggregate performance under the highest
loading, approaching asymptotically its maximum throughput. While the best case performance
was less than Ethernet, the general case was equivalent and the worst case was dramatically better.
An Ethernet network could collapse when too busy due to excessive collisions. An ARCNET
would keep on going at normal (or even better) throughput. Throughput on a multi-node collision-
based Ethernet was limited to between 40% and 60% of bandwidth usage (depending on source).
Although 2.5 Mbit/s ARCNET could at one time outperform a 10 Mbit/s Ethernet in a busy office
on slow processors, ARCNET ultimately gave way to Ethernet as improved processor speeds
reduced the impact of collisions on overall throughput, and Ethernet costs dropped. In the early
1980s ARCNET was much cheaper than Ethernet, in particular for PCs. For example in 1985
SMC sold ARCNET cards for around $300 whilst an Engelmann-Bass Ethernet card plus
transceiver could cost $500.
Another significant difference is that ARCNET provides the sender with a concrete
acknowledgment (or not) of successful delivery at the receiving end before the token passes on to
the next node, permitting much faster fault recovery within the higher level protocols (rather than
having to wait for a timeout on the expected replies). ARC net also doesn't waste network time
transmitting to a node not ready to receive the message, since an initial inquiry (done at hardware
level) establishes that the recipient is able and ready to receive the larger message before it is sent
c
across the bus.
One further advantage that ARCNET enjoyed over collision-based Ethernet is that it guarantees
equitable access to the bus by everyone on the network. Although it might take a short time to get
the token depending on the number of nodes and ht e size of the messages currently being sent
about, you will always receive it within a predictable maximum time; thus it is deterministic. This
made ARCNET an ideal real-time networking system, which explains its use in the embedded
systems and process control markets. Token Ring has similar qualities, but is much more
expensive to implement than ARCNET.
In spite of ARCNET's deterministic operation and historic suitability for real-time environments
such as process control, the general availability of switched gigabit Ethernet and Quality of service
capabilities in Ethernet switches has all but eliminated ARCNET today. At first the system was
deployed using R -62/U coax cable (commonly used in IBM mainframe environments to connect
3270 terminals and controllers), but later added support for twisted-pair and fiber media. At
ARCNET's lower speeds (2.5 Mbit/s), Cat-3 cable is good enough to run ARCNET. Some
ARCNET twisted-pair products supported cable runs over 2000' on standard CAT-3 cable, far
beyond anything Ethernet could do on any kind of copper cable.In the early 90s, Thomas-Conrad
Corporation developed a 100 Mbit/s topology called TCNS based on the ARCNET protocol,
which also supported R -62, twisted-pair, and fiber optic media. TCNS enjoyed some success
until the availability of lower-cost 100 Mbit/s Ethernet put an end to the general deployment of
ARCNET.
An internet leased line is a premium internet connectivity product, delivered over fiber normally,
which is dedicated and provides uncontended, symmetrical speeds. It is also known as an ethernet
leased line, DIA line, data circuit or private circuit.
c
For example, a T-1 channel can be leased, and provides a maximum transmission speed of 1.544
Mbps. The user can divide the connection into different lines for multiplexing data and voice
communication, or use the channel for one high speed data circuit. Increasingly, leased lines are
being used by companies, and even individuals, for Internet access because they afford faster data
transfer rates and are cost-effective for heavy users of the Internet.
?
*+!%
In the U.K., leased lines are available at speeds from 64Kb/s increasing in 64Kb/s increments to
2.048Mb/s over a channelized E1 tail circuit and at speeds between 2.048Mb/s to 34.368Mb/s via
channelized E3 tail circuits. The NTE will terminate the circuit and provide the requested
presentation most frequently X.21 however higher speed interfaces are available such as G.703 or
10baseT. Some ISPs however use the term more loosely, defining a leased line as ³any dedicated
bandwidth service delivered over a leased fiber connection".
*
In the U.S., low-speed leased lines (56 Kbit/s and below) are usually provided using analog
modems. Higher-speed leased lines are usually presented using FT1 (Fractional T1): a T1 bearer
circuit with 1 to 24, 56k or 64k timeslots. Customers must manage their own network termination
equipment Channel Service Unit and Data Service Unit (CSU/DSU).
%!+%!
In Hong Kong, leased lines are usually available at speeds of 64k, 128k, 256k, 512k, T1
(channelized or not) or E1 (less common). Whatever the speed, Telco¶s usually provide the
CSU/DSU and present to the customer on V.35 interface.
In India, leased lines are available at speeds of 64k, 128k, 256k, and 512k, T1 or E1. Customers
are connected either through OFC, telephone lines ADSL, or through Wi-Fi. Customers would
have to manage their own network termination equipment, namely the Channel service unit and
Data service unit.
In Italy, leased lines are available at speeds of 64k (terminated by DCE2 or DCE2plus modem) or
multiple of 64k from 128k up to framed or unframed E1 (DCE3 modem) in digital form (PDH
service, known as CDN, Circuits Direct Numerical). Local TELCOs also may provide CDA
(Circuits Direct Analogical), that are plain copper dry pair between two buildings, without any
line termination: in the past (pre-2002) a full analog base band was provided, giving an option to
customer to deploy xDSL technology between sites: nowadays everything is limited at 4 kHz of
bearer channel, so the service is just a POTS connection without any setup channel.
c
ÿÔ
An Ô
, or
, is an online discussion site where people can hold
conversations in the form of posted messages. They differ from chat rooms in that messages are at
least temporarily archived. Also, depending on the access level of a user and/or the forum set-up, a
posted message might need to be approved by a moderator before it becomes visible.
Forums have their own language; e.g. A single conversation is called a 'thread'. A forum is
hierarchical or tree-like in structure: forum - sub forum - topic - thread - reply.
Depending on the forum set-up, users can be anonymous or have to register with the forum and
then subsequently log in order to post messages. Usually you do not have to log in to read existing
messages. The modern forums originated from bulletin boards, and are a technological evolution
of the dialup bulletin board system. From a technological standpoint, forums or boards are web
applications managing user-generated content. Early Internet forums could be described as a web
version of an electronic mailing list or newsgroup (such as exist on Usenet); allowing people to
post messages and comment on other messages. Later developments emulated the different
newsgroups or individual lists, providing more than one forum, dedicated to a particular topic.
Internet forums are prevalent in several developed countries. In terms of countable posts, Japan is
far in the lead with over two million posts per day on their largest forum, 2channel. China also has
many millions of posts on forums such as Tianya Club.
Forums perform a function similar to that of dial-up bulletin board systems and Usenet networks
that were first created starting in the late 1970s. Early web-based forums date back as far as 1995.
A sense of virtual community often develops around forums that have regular users. Technology,
computer games and/or video games, sports, music, fashion, religion, and politics are popular
areas for forum themes, but there are forums for a huge number of topics. Internet slang and image
macros popular across the Internet are abundant and widely used in Internet forums.
Forum software packages are widely available on the Internet and are written in a variety of
programming languages, such as PHP, Perl, Java and ASP. The configuration and records of posts
can be stored in text files or in a database. Each package offers different features, from the most
basic, providing text-only postings, to more advanced packages, offering multimedia support and
formatting code (usually known as BBCode). Many packages can be integrated easily into an
existing website to allow visitors to post comments on articles.
Several other web applications, such as weblog software, also incorporate forum features. Word
press comments at the bottom of a blog post allow for a single-threaded discussion of any given
blog post. Slash code, on the other hand, is far more complicated, allowing fully threaded
discussions and incorporating a robust moderation and meta-moderation system as well as many
of the profile features available to forum users.
Some stand alone threads on forums have reached fame and notability such as the "I am lonely
will anyone speak to me" thread on MovieCodec.com's forums which was described as the "web's
top hangout for lonely folk" by Wired Magazine.
ë ë
ë x
One common faux pas on Internet forums is to post the same message twice.
Users sometimes post versions of a message that are only slightly different, especially in forums
where they are not allowed to edit their earlier posts. Multiple posting instead of editing prior posts
can artificially inflate a user's post count. Multiple posting can be unintentional; a user's browser
might display an error message even though the post has been transmitted or a user of a slow
forum might become impatient and repeatedly hit the submit button. Multiple posting can also be
used as a method of trolling or spreading forum spam. A user may also send the same post to
several forums, which is termed cross posting. The term derives from Usenet, where cross posting
was an accepted practice but causes problems in web forums, which lack the ability to link such
c
posts so replies in one forum are not visible to people reading the post in other forums.
!
A forum consists of a tree like directory structure containing at the lowest
end topics (commonly called threads) and inside them posts. Logically forums are organized into a
finite set of generic topics (usually with one main topic) driven and updated by a group known as
members, and governed by a group known as moderators All message boards will use one of three
possible display formats. Each of the three basic message board display formats: Non-
Threaded/Semi-Threaded/Fully Threaded, has its own advantages and disadvantages. If messages
are not related to one another at all a Non-Threaded format is best. If you have a message topic and
multiple replies to that message topic a semi-threaded format is best. If you have a message topic
and replies to that message topic, and replies to replies, then a fully threaded format is best.
×
Internally, Western-style forums organize visitors and logged in members into
user groups. Privileges and rights are given based on these groups. A user of the forum can
automatically be promoted to a more privileged user group based on criteria set by the
administrator. A person viewing a closed thread as a membe will see a box saying he does not
have the right to submit messages there, but a moderato will likely see the same box granting him
access to more than just posting messages. An unregistered user of the site is commonly known as
a or . Guests are typically granted access to all functions that do not require database
alterations or breach privacy. A guest can usually view the contents of the forum or use such
features as
, but occasionally an administrator will disallow visitors to read their
forum as an incentive to become a registered member. A person who is a very frequent visitor of
the forum, a section or even a thread is referred to as a lurker and the habit is referred to as
.
Registered members often will refer to themselves as
in a particular location, which is to
say they have no intention of participating in that section but enjoy reading the contributions to it.
By default to be an Internet forum, the web application needs an ability to
submit threads and replies. Forum software may sometimes allow categories or sub forums. The
chronological older-to-newer view is generally associated with forums (the newer to older being
associated more akin to blogs).
A private message, or PM for short, is a message sent in private from a
member to one or more other members. The ability to send so-called carbon copies is sometimes
available. When sending a carbon copy (cc), the users to whom the message is sent directly will
not be aware of the recipients of the carbon copy or even if one was sent in the first place. Private
messages are generally used for personal conversations. They can also be used with trip codes²a
message is addressed to a public trip and can be picked up by typing in the trip code.
?
An attachment can be almost any file. When someone attaches a file to a post
they are uploading the file to the forums' server. Forums usually have very strict limit on what can
be attached and what cannot (among which the size of the files in question). Attachments can be
part of a thread, social group, etc.
""
x#
Hypertext Markup Language (HTML) is sometimes allowed but
usually its use is discouraged or when allowed it is extensively filtered. Modern bulletin board
systems will have it disabled altogether or allow only Administrators use it, as allowing it on any
Normal User level is considered a security risk due to a high rate of XSS vulnerabilities. When
HTML is disabled Bulletin Board Code (BBCode) is the most common preferred alternative.
BBCode usually consists of a tag, similar to HTML only instead of and the tag name is
enclosed within square brackets (meaning: and ). Commonly is used for italic type, is
used for bold, for underline,
for color and for lists, as well as
for images and for links.
c
The following example BBCode:
when the post is viewed the code is rendered to HTML and will appear as: is clever$.
Many forum packages offer a way to create Custom BBCodes, or BBcodes that are not built into
the package, where the Administrator of the Board can create complex BBCodes to allow the use
of JavaScript or iframe functions in posts, for example embedding a YouTube or Google Video
complete with viewer directly into a post.
Õ
One significant difference between forums
and electronic mailing lists is that mailing lists automatically deliver new messages to the
subscriber, while forums require the member to visit the website and check for new posts. Because
members may miss replies in threads they are interested in, many modern forums offer an "e-mail
notification" feature, whereby members can choose to be notified of new posts in a thread, and
web feeds that allow members to see a summary of the new posts using aggregator software. The
main difference between newsgroups and forums is that additional software, a newsreader, is
required to participate in newsgroups. Visiting and participating in forums normally requires no
additional software beyond the web browser. Wikis, unlike conventional forums, typically allow
all users to edit all content, including each other's messages. This level of content manipulation is
reserved for moderators or administrators on most forums. Wikis also allow the creation of other
content outside the talk pages. On the other hand, weblogs and generic content management
systems tend to be locked down to the point where only a few select users can post blog entries,
although many allow other users to comment upon them. Forums differ from chat rooms and
instant messaging in that forum participants do not have to be online simultaneously to receive or
send messages. Messages posted to a forum or Usenet are publicly available for some time, which
is uncommon in chat rooms that maintain frequent activity. One rarity among forums is the ability
to create your own picture album. Forum participants can upload personal pictures onto the site,
add descriptions to the pictures, and choose album covers. Pictures are in the same format as
posting threads, and contain the same options such as "Report Post" and "Reply to Post".
c
ÿ
'
' is a family of frame-based computer networking technologies for local area networks
(LANs). The name came from the physical concept of the ether. It defines a number of wiring and
signaling standards for the Physical Layer of the OSI networking model as well as a common
addressing format and Media Access Control at the Data Link Layer.Ethernet is standardized as
IEEE 802.3. The combination of the twisted pair versions of Ethernet for connecting end systems
to the network, along with the fiber optic versions for site backbones, is the most widespread wired
LAN technology. It has been used from around 1980to the present, largely replacing competing
LAN standards such as token ring, FDDI, and ARCNET.
&
Notwithstanding its technical merits, timely standardization was
instrumental to the success of Ethernet. It required well-coordinated and partly competitive
activities in several standardization bodies such as the IEEE, ECMA, IEC, and finally ISO.In
February 1980, IEEE started a project, IEEE 802, for the standardization of local area networks
(LAN). The "DIX-group" with Gary Robinson (DEC), Phil Arts (Intel), and Bob Prints (Xerox)
submitted the so-called "Blue Book" CSMA/CD specification as a candidate for the LAN
specification. Since IEEE membership is open to all professionals, including students, the group
received countless comments on this brand-new technology.In addition to CSMA/CD, Token Ring
(supported by IBM) and Token Bus (selected and henceforward supported by General Motors)
were also considered as candidates for a LAN standard. Due to the goal of IEEE 802 to forward
only one standard and due to the strong company support for all three designs, the necessary
agreement on a LAN standard was significantly delayed.In the Ethernet camp, it put at risk the
market introduction of the Xerox Star
and 3Com's Ethernet LAN products. With such
business implications in mind, David Ladle (General Manager, Xerox Office Systems) and
Metcalfe (3Com) strongly supported a proposal of Fritz Röscheisen (Siemens Private Networks)
for an alliance in the emerging office communication market, including Siemens' support for the
international standardization of Ethernet (April 10, 1981). Ingrid Fromm, Siemens representative
to IEEE 802 quickly achieved broader support for Ethernet beyond IEEE by the establishment of a
competing Task Group "Local Networks" within the European standards body ECMA TC24. As
early as March 1982 ECMA TC24 with its corporate members reached agreement on a standard
for CSMA/CD based on the IEEE 802 draft. The speedy action taken by ECMA decisively
contributed to the conciliation of opinions within IEEE and approval of IEEE 802.3 CSMA/CD by
the end of 1982.Approval of Ethernet on the international level was achieved by a similar, cross-
partisan action with Fromm as liaison officer working to integrate IEC TC83 and ISO TC97SC6,
and the ISO/IEEE 802/3 standard was approved in 1984.
A 1990s network interface card supporting both coaxial cable-based 10BASE2 (BNC connector,
left) and twisted pair-based 10BASE-T (8P8C connector, right).Ethernet was originally based on
c
the idea of computers communicating over a shared coaxial cable acting as a broadcast
transmission medium. The methods used were similar to those used in radio systems, with the
common cable providing the communication channel likened to the ether, and it was from this
reference that the name "Ethernet" was derived .Original Ethernet's shared coaxial cable (the
shared medium) traversed a building or campus to every attached machine. A scheme known as
carrier sense multiple accesses with collision detection (CSMA/CD) governed the way the
computers shared the channel. This scheme was simpler than the competing token ring or token
bus technologies. Computers were connected to an Attachment Unit Interface (AUI) transceiver,
which was in turn connected to the cable (later with thin Ethernet the transceiver was integrated
into the network adapter). While a simple passive wire was highly reliable for small networks, it
was not reliable for large extended networks, where damage to the wire in a single place, or a
single bad connector, could make the whole Ethernet segment unusable. Since all communications
happen on the same wire, any information sent by one computer is received by all, even if that
information is intended for just one destination. The network interface card interrupts the CPU
only when applicable packets are received: The card ignores information not addressed to it. Use
of a single cable also means that the bandwidth is shared, so that network traffic can be very slow
when many stations are simultaneously active.
Collisions reduce throughput by their very nature. In the worst case, when there are lots of hosts
with long cables that attempt to transmit many short frames, excessive collisions can reduce
throughput dramatically. However, a Xerox report in 1980 summarized the results of having 20
fast nodes attempting to transmit packets of various sizes as quickly as possible on the same
Ethernet segment. The results showed that, even for the smallest Ethernet frames (64 Bytes), 90%
throughput on the LAN was the norm. This is in comparison with token passing LANs (token ring,
token bus), all of which suffer throughput degradation as each new node comes into the LAN, due
to token waits. This report was controversial, as modeling showed that collision-based networks
became unstable under loads as low as 40% of nominal capacity. Many early researchers failed to
understand the subtleties of the CSMA/CD protocol and how important it was to get the details
right, and were really modeling somewhat different networks (usually not as good as real
Ethernet).
For signal degradation and timing reasons, coaxial Ethernet segments
had a restricted size. Somewhat larger networks could be built by using an Ethernet repeater. Initial
repeaters had only 2 ports, but they gave way to 4, 6, 8, and more ports. People recognized the
advantages of cabling in a star topology, primarily that a fault in one of the legs affects operation
of only the stations attached to that leg.
Ethernet on unshielded twisted-pair cables (UTP), beginning with StarLAN and continuing with
10BASE-T, was designed for point-to-point links only, and all termination was built into the
device. This changed repeaters from a specialist device used at the center of large networks to a
device that every twisted pair-based network with more than two machines had to use. The tree
structure that resulted from this made Ethernet networks more reliable by preventing faults with
c
one peer or its associated cable from affecting other devices on the network. Despite the physical
star topology, repeater based Ethernet networks still use half-duplex and CSMA/CD, with only
minimal activity by the repeater, primarily the Collision Enforcement signal, in dealing with
packet collisions. Every packet is sent to every port on the repeater, so bandwidth and security
problems are not addressed. The total throughput of the repeater is limited to that of a single link,
and all links must operate at the same speed.
" Õ
While repeaters could isolate some aspects of Ethernet segments,
such as cable breakages, they still forwarded all traffic to all Ethernet devices. This created
practical limits on how many machines could communicate on an Ethernet network. The entire
network was one collision domain, and all hosts had to be able to detect collisions anywhere on the
network. This limited the number of repeaters between the farthest nodes. Segments joined by
repeaters had to all operate at the same speed, making phased-in upgrades impossible.To alleviate
these problems, bridging was created to communicate at the data link layer while isolating the
physical layer. With bridging, only well-formed Ethernet packets are forwarded from one Ethernet
segment to another; collisions and packet errors are isolated. Prior to discovery of network devices
on the different segments, Ethernet bridges (and switches) work somewhat like Ethernet repeaters,
passing all traffic between segments. However, as the bridge discovers the addresses associated
with each port, it forwards network traffic only to the necessary segments, improving overall
performance. Broadcast traffic is still forwarded to all network segments. Bridges also overcame
the limits on total segments between two hosts and allowed the mixing of speeds, both of which
became very important with the introduction of Fast Ethernet.Early bridges examined each packet
one by one using software on a CPU, and some of them were significantly slower than repeaters at
forwarding traffic, especially when handling many ports at the same time. This was in part because
the entire Ethernet packet would be read into a buffer, the destination address, compared with an
internal table of known MAC addresses and a decision made as to whether to drop the packet or
forward it to another or all segments.
In 1989, the networking company Kalpana introduced their Ether Switch, the first Ethernet switch.
This worked somewhat differently from an Ethernet bridge, in that only the header of the incoming
packet would be examined before it was either dropped or forwarded to another segment. This
greatly reduced the forwarding latency and the processing load on the network device. One
drawback of this cut-through switching method was that packets that had been corrupted would
still be propagated through the network, so a jabbering station could continue to disrupt the entire
network. The eventual remedy for this was a return to the original store and forward approach of
bridging, where the packet would be read into a buffer on the switch in its entirety, verified against
its checksum and then forwarded, but using more powerful application-specific integrated circuits.
Hence, the bridging is then done in hardware, allowing packets to be forwarded at full wire
speed.When a twisted pair or fiber link segment is used and neither end is connected to a repeater,
full-duplex Ethernet becomes possible over that segment. In full-duplex mode, both devices can
transmit and receive to and from each other at the same time, and there is no collision domain.
This doubles the aggregate bandwidth of the link and is sometimes advertised as double the link
speed (e.g., 200 Mbit/s). The elimination of the collision domain for these connections also means
that all the link's bandwidth can be used by the two devices on that segment and that segment
length is not limited by the need for correct collision detection.Since packets are typically
delivered only to the port they are intended for, traffic on a switched Ethernet is less public than on
shared-medium Ethernet. Despite this, switched Ethernet should still be regarded as an insecure
network technology, because it is easy to subvert switched Ethernet systems by means such as
ARP spoofing and MAC flooding.The bandwidth advantages, the slightly better isolation of
devices from each other, the ability to easily mix different speeds of devices and the elimination of
the chaining limits inherent in non-switched Ethernet have made switched Ethernet the dominant
network technology.
c
?Õ
Simple switched Ethernet networks, while a great improvement over
repeater-based Ethernet, suffer from single points of failure, attacks that trick switches or hosts
into sending data to a machine even if it is not intended for it, scalability and security issues with
regard to broadcast radiation and multicast traffic, and bandwidth choke points where a lot of
traffic is forced down a single link. Advanced networking features in switches and routers combat
these issues through a number of means including spanning-tree protocol to maintain the active
links of the network as a tree while allowing physical loops for redundancy, port security and
protection features such as MAC lock down and broadcast radiation filtering, virtual LANs to keep
different classes of users separate while using the same physical infrastructure, multilayer
switching to route between different classes and link aggregation to add bandwidth to overloaded
links and to provide some measure of redundancy.
£
'
The Ethernet physical layer evolved over a considerable time span
and encompasses quite a few physical media interfaces and several magnitudes of speed. The most
common forms used are 10BASE-T, 100BASE-TX, and 1000BASE-T. All three utilize Category 5
cables and 8P8C modular connectors. They run at 10 Mbit/s, 100 Mbit/s, and 1 Gbit/s,
respectively. Fiber optic variants of Ethernet offer high performance, electrical isolation and
distance (up to tens of kilometers with some versions). In general, network protocol stack software
will work similarly on all varieties.
c
ÿ
''$ ££%Ô (£
£
%Ô )
VoIP and VVoIP (Voice & Video over IP) solutions provider Adiance Technologies launches
Alpha Version of 1Videoconference. One of the World¶s First open source web based video
conferencing solution for Asterisk. Developers at Adiance have again succeeded in becoming
some of the world's first innovators to stream asterisk audio/ video channels to web browsers,
clearing the way for the most advanced video solutions such as, IP TV, video conferencing, video
contact center, remote surveillance, video kiosk and video pbx etc.
1VideoConference is an open source solution uploaded on Source forge. Released recently, this
product allows web, audio/ video phone, Skype, msn and yahoo users to participate in multipoint
video conference. It empowers businesses to offer innovative online video services like TV shows,
photography shows, marketing events, network games, social community sites, video wiki, blogs
and forums, video tutorials, video library and more.1VideoConference has turned out to be a great
boon in Disguise. A farmer can now show his destroyed crops to Scientist sitting in another corner
of world & know the exact reason of harvest failure within few minutes. World best learning
Institutes Oxfords & Harvard¶s can now impart education at a time to many students at a time
spread across the world. Companies spread across the World can have board meetings together at
a time thus saving cost as well deciding new strategies. 1VideoConference has truly turned as a
cost & time saving boon for community at large. Blending the advanced technologies of .NET3.0
& Asterisk it has brought the World all the more closer.1videoConference is tailor-made
according to the present and future need of the customers. One of the extensive features of it is
that if the internet connection of any of the meeting attendees goes down then with the help of
coordinator they can switch over to the mobile and can continue at least with voice conferencing.
1Videoconference is a rich web communication system that gives professionals from all spheres of
the world full control of enterprise-class web conferencing, online training, Audience poll,
Destop-Sharing,co-browsing,Whiteboard, web link, remote monitoring, co-authoring & many
more features for collaborative communications of entire organization. All one needs is a desktop,
a headphone, moderate internet connection of 256kbps. Combination of open source Asterisk
software and state of the art Adiance platform enables customers to implement VoIP video
solutions at more than 40% cost savings as compared to available solutions in the market.
1Videoconference is available on both a hosted basis and as software that can be deployed on-
premise.
In the words of Mr. HardikSanghvi President and CEO of Adiance, "1videoConference is true
enabler of video/ voice and data interactions among the web and phone users." Songhai went on to
say, "Being open source, web based and foot print free, video enabled and cost effective,
1videoConference, as I envision, will change the way people and businesses collaborate on day to
day basis ."
c
c