Pages

Wednesday, September 28, 2011

What is an IP address/IP Address Classes/

What is an IP address

IP stands for Internet Protocol. An IP address is a logical identifier that is used to distinguish network devices. Much like a phone number identifies a telephone, an IP address identifies a network device. An IP address consists of four octets that are represented in decimal form and are separated by a period. For example, 10.1.20.145.

What Does an IP Address Do?

One of the most powerful features of modern computers is that they are able to communicate i] !E (0@  Uk Ucation between devices allows people to share information such as this web page. The IP address is used to identify which machine is to be accessed.

Despite rarely seeing an IP address, computer users utilize IP addresses every time that they access information or an applications that are not hosted on the local machine. IP addresses are masked by DNS (Domain Name Service) names which make the service legible. Without DNS users would have to type IP addresses into the Internet Explorer address bar. 
There are three types of IP addresses

Unicast – The most popular form of transmission. This type of address is used for 1 to 1 communication between two hosts. When an IP device sends its traffic directly to another IP device this type of traffic is known as unicast traffic. For example, a computer requests a web page from a web server (such as the web page you are currently reading!). The requests are sent directly from the computer to the web server and in return the web server replies directly to the requester.

Multicast – This type of address is used as an efficient way of sending the same data from one sender to many receivers.

Broadcast – 

This type of address is used as a discovery mechanism. IP broadcasts are used when there is one sender and all other devices on the network are the intended recipients.

Because IP is a logical address defined in Layer 3 of the OSI (Open Systems Interconnection) model, packets are encapsulated with Layer 2 headers. Not all Layer 2 technologies support broadcasts, frame relay is one such example. 

The most popular layer 2 technology in the world, Ethernet, does support broadcasts. When Ethernet encapsulates an IP broadcast it generally sets the destination to the special MAC address FF:FF:FF:FF:FF:FF.

Unicast addresses are either Private or Public

Private – 

Private addresses are not usable on any public networks such as the Internet. 
Private IP addresses are defined by RFC 1918.
Private address ranges include 10.0.0.0/8, 172.16.0.0/12 and 192.168.0.0/16

Public – 

Public addresses are used by public networks such as the internet. The Internet Assigned Numbers Authority is responsible for the global coordination of public address allocation.

IP Address Classes

Class A - 

Any network where the first octet is between 0 - 126. 
The classful boundary is N.H.H.H
For example 10.25.105.3

Class B - Any network where the first octet is between 128 - 191. 
The classful boundary is N.N.H.H
For example 172.16.200.109

Class C - 

Any network where the first octet is between 192 - 223. 
The classful boundary is N.N.N.H
For example 202.3.126.178

Class D -

Reserved for Multicast Traffic. The first octet is between 224 - 239.
For example 224.1.1.1

Class E -

 Experimental - used for research. The first octet is between 240 - 254.

Network Diagram Basics/network Key Icons and Shapes

Network Diagram Basics

Network diagrams can represent a number of different aspects about a network so it is important prior to starting to understand what the diagram will be used for. The best diagrams speak for themselves and require very little explanation. Some common uses include:

Document physical equipment and connections
Show routing path or switching path 
Show logical connections or logical relationships between systems
Document carrier or third party connections

Key Icons and Shapes

Using high quality icons is essential for developing professional looking network diagrams. If you need network icons here are some sites that provide good free resources:
Router Icon - Represented by a circle with four arrows engraved on top. This icon is used to represent Layer 3 routing devices only. 

Router Icon - Represented by a circle with four arrows engraved on top. This icon is used to represent Layer 3 routing devices only. 


Switch Icon - Represented by a rectange with four arrows engraved on top. This icon is used to represent Layer 2 switching devices.



Multilayer Switch Icon - Multilayer switches are a hybrid between routers and switches. In other words they are switches that have routing capabilities.



Dedicated Firewall - Used to represent devices that have the sole function of acting as a firewall.





Switch with Firewall Module - Some high end switches are able to run firewall modules allowing the device to double as a switch and a firewall. 

Key Connectors

Most connection points are represented using lines. You may vary the width of the line to represent greater or lesser bandwidth accross the link if required.
 
Link -  Network connections are represented by lines connecting to each device.


Etherchannel - A number of links grouped together into a single logical link. Negotiated ethercannels  use the LACP or PAGP protocols.

Cloud - Clouds represent any third party network not under your direct administrative control. The internet, for example, may be represented using a cloud.
 
Sample Physical Connections Diagram

This diagram shows the physical connection points in a small network. The diagram shows interface assignments, speed, router hostnames and management addresses.
 
Sample Routing Diagram

This diagram shows routing parameters in this small network. OSPF Area 0 is configured on the Fa0/2 interfaces of Router 1 and Router 2. OSPF Area 1, configured as a stub area is applied to Fa0/1 of Router 1 and Router 3. Router 3 redistributes its directly connected networks into OSPF. The OSPF router roles are also shown as well as non-OSPF routing functions such as directly connected routes and the trunk port to the switch.

If a network engineer was given the task of configuring routing on this network this diagram would give him/her the necessary information to apply a complete routing configuration on every device.
 
Third Party Connections 

Third party managed networks such as an Internet connection can be shown as a cloud. In this instance a layer 3 switch with a Firewall module connects this small office to the Internet. 
 

How to Keep Your Kids Safe Online

How to Keep Your Kids Safe Online

Even a five year old kid today knows what Google is and what social networking means. However, there are a lot of rogues out there - people as well as websites. How to protect your kids from the world wide web? Learn as you read on...
Internet is no longer a privilege - it is a necessity. It is something we have heavily come to depend on. Sometimes it is hard to believe that till just about a few decades ago, completing a project meant take the time out to go to a library, armed with a notebook and all kinds of drawing and writing materials, and going through piles of books to compile decent amount of information, which would then go into a project. Gone are the days when an assignment meant creating working models. Everybody has become tech-savvy, so that now we would rather prefer animation to working models, power-point presentations to actual flow-charts. As with everything in the world, this has several pros and cons (personally, more cons, I think). However, one inevitable outcome of all this is - everybody is on the internet. However, the immediate concern that arises in the mind is, everything on the internet is accessible to everyone! How then, can you protect your child and ensure his/her safety online?

5 Point Plan to Ensure Your Child's Online Safety

Here are five very basic and easy to implement ways in which you can protect your child from bad influences on the internet.

Internet Hours
Fix up a time in the day when you child can access the internet. Do not let your child access the internet during any other times of the day. However, be fair when you are doing this. The child should not feel like you are bossing on him/her or are being unreasonable or rude. It should be a fair game. The main reason behind this is - if you child develops a rebellious attitude, he/she is going to want to break the rules! This may in turn, fuel a situation to arise where things go out of control. Also, decide on a time when you will be in the house. You need not pull up a chair and sit behind your child and monitor each and every page he/she visits. But the fact that you are around will prevent your child from being naughty. Also insist on leaving the door to your child's room ajar, if not completely open. Do not let him/her bolt the doors from inside the room.

 Passwords
Make sure you computer is well protected. Put passwords on programs that you think are harmful for your child. You can even store games within password protected folders. Make sure you create a secure password. Passwords are a good way to keep your children out of stuff that you think is inappropriate for them. However, if you do create a password, make sure you know how to recover your data from an event of password hacking. Kids nowadays, know more than we can imagine! So keep yourself updated on the various hacking software, and make sure your child does not lay hands on any of them.

 Parental Control
Block access to all those websites that may contain content - including the actual content on the website as well as advertisements of products and services - that you think is inappropriate for your child. Also, never edit the settings when you want to use the computer. You can access all the websites you want in other ways. Create different user profiles for the computer with different internet settings. Again, remember to protect the user profiles with suitable password.

 Limit Purchases
Online shopping makes life a lot easy - with books, clothes and all sorts of things available online. You may want to purchase a few goods for your kids; a limited edition book, or a special edition CD or DVD of a movie, etc. Make all these purchases yourself. Do not reveal your PayPal details and credit card details to your kids. You will hence be able to keep a tab on what your kids buy online. Allowing you child to make individual purchases online could be twice as dangerous. Firstly, you do not know what they are purchasing and whether it is alright for them to purchase it or not. Second, you will not have any control over how much money your child spends online! This will include membership fees to websites, actual purchases, and a lot of other things.

Inculcate Responsibility
The best way to restrict your kids online is to make them responsible and to make them understand WHY they should not do certain things online. Gain their confidence. Do not simply lay down rules - make them understand why you are doing what you are doing. Kids nowadays, belong to the Y Generation - they always want to know why. This is not a part of being audacious or rebellious. This is just the way kids are coming to be now. But most of the times, parents do not know how to deal with this constant questioning, and this is when they bring in the whole authority issue. Understand this, and act accordingly.

I believe this has given you some hope about your child's safety online. Educating yourself and your kids about internet safety should be the top most thing on your list when you are introducing the world wide web to your child. Making your child grow up to be a responsible individual of the society will take care of most problems regarding safety in all sense - even on the internet. Do not use force - it will only drive your child further in the direction of misbehaving and overthrowing your authority. Instead, stress more on using logic and convince your kids about your points of view. All the best!

Internet and its Uses in Our Daily Life

Internet and its Uses in Our Daily Life


The impact of the Internet on our life is obvious and cannot be sidelined. It has use in almost each and every domain of business. The popular uses of the Internet have been discussed in detail in the following article.
How difficult our life would have been if there was no Internet. Think about it. To find some information, we all have acquired the habit of 'Googling' it on the web; within a few seconds the screen displays the desired information. You want to book tickets for a movie night with friends, you can book them at the click of a button, again through the Internet media. Many of us cannot imagine life without the social networking sites. The Internet has indeed made the world a small place and living life easier. And the rapid progress of technology has made it possible to access the Internet from anywhere through plenty of means. It has such a plethora of uses in our daily life that we use it for one purpose or the other almost daily. The routine uses and some positive effects of the Internet in various sectors have been discussed in detail below.

The Uses of the Internet in Daily Life

For Information:
For a layman, Internet is nothing but a collection of websites. And there are innumerable websites that serve a variety of purposes. There are news websites, social networking websites, websites that provide information and websites of various businesses and organizations. These websites are updated frequently to provide information to the user. You can find everything of anything on the web just by browsing through a few websites. You can also use emails, blogs, IM chat, social networking websites and communication software for sharing your information with the world. The Internet has made access to information cheaper and easier and this is its most common use in daily life.

Business & Advertising:
Almost all the businesses these days have websites, through which they promote and advertise themselves. This medium these days has been used extensively for promotional campaigns. Not only promoting your business but you can also effectively advertise your event or any cause on this medium. There are many businesses that depend on the Internet for their survival like stocks and call centers, to name a few. It has promoted faster access to necessary information which strengthens the business processes.

Education:
Internet also is a popular medium used by students. Many students use it for educational purposes, like for finding study material or for applying to some college or university. It is now a virtual world and all the applications are done online through the website of the concerned educational body. Students use websites for these and many other purposes like checking exam results, exam schedule, application procedure to any course, etc. Students also take the help of the Internet for project help and for obtaining the required images. Everything on the Internet is a click away from us.

Communication & Networking:
The use of the Internet for networking is very popular among all age groups. There are many good social networking websites that are used by people for communication. These websites provide an effective and easy platform that facilitates interaction. In daily life, it is widely used as a means of communication through means like networking websites, chat websites, blogs, etc. Through these websites you can also share your photographs with your near and dear ones. The Internet is widely used by job seekers for job applications and job searching. Facilities like video conferencing has made it possible to conduct interviews online.

Entertainment:
Another popular use of the Internet in daily life is for entertainment. Facilities like listening to online music, downloading music and movies provides a platform for entertainment. There are plenty of other ways through which you can entertain yourselves on the Internet. You can play online games, view sports matches, or watch videos of your choice. It is a trusted means of entertainment for these kinds of purposes and is extensively used for the same.

Other Popular Uses:
It is popularly used for banking. Almost all the banking transactions are possible through this medium. Apart from these common uses, it can also be used for shopping. Online shopping is very popular among masses and on the Internet you can buy any thing and get it delivered at home. There are also many people who use it to work from home.

These were some of the chief common uses of the Internet in our daily life. It is a boon for us and has made our life easy by facilitating so many uses. But it is also prone to attacks of many kinds that threaten safety over the Internet. To protect the Internet from these attacks we should all use it carefully and also protect ourselves from various privacy intrusions. The Internet as a tool for communication will always remain its most powerful use. The array of uses of the Internet is vast and with the progress of technology new uses will get added to the list of uses continuously.


latest vacancy/jobs click here

www.orbittutorials.com provide jobs from all newspapers in pakistan like: All Paper Jobs, Paper PK Jobs, Jang newspaper jobs, Dawan newspaper jobs, express newspaper jobs and nawaiwaqt newspaper jobs. The basic reason of this site is to provide daily published jobs from all newspaper at one place to all job seekers.