Articles by "networking"

Showing posts with label networking. Show all posts

Introducation to IP Multicasting

IP Multicasting is a technique of distributing the data across multiple servers over the WAN.  It is simply the delivery of the same data packets to the multiple destinations.  It allows the multiple recipients to receive the same data packets from a single source. Multicasting allows the distributed applications to work over the WAN with great performance.  It is an excellent alternative for the unicast and broadcast transmissions.

In Multicasting, the information is sent to only the destined recipients.   It is like the TV or radio transmission system in which only those terminals receive the information who have tuned themselves to receive it.

It is the bandwidth-conserving technology that reduces the traffic load over the network.  The ideal applications that uses the multicast technology includes video conferencing, stock quotes, distance learning, weather updates, video streaming, news and other distributed software applications in the LAN/WAN network.  IP multicasting mechanisms depends upon the two protocols i.e. group management protocol and the routing protocols. 

Group Management protocols establish the multicast groups and the routing protocols routes the traffic to the destination. Multicast routing protocols makes the distribution tree for the data forwarding in the network. It is an ideal solution for the distribution applications in the TCP/IP based LAN/WAN networks.

Though it has been successful in many businesses but it is not extensively deployed and used by the average users.  Special addressing scheme is assigned while implementing the IP multicasting.  These addresses are assigned from the Class D i.e. 224.0.0.0 to 239.255.255.255.  The typical multicast applications include the following.
  • Video conferencing
  • Audio conferencing
  • Stock Quotes
  • Distributed LAN/WAN Software Applications
  • Weather Updates
  • Data Conferencing
  • Network-based games
  • Online Training
  • Database replication
Multicasting applications minimize the demand of the network bandwidth while sending the information from one source to multiple destinations via same stream.
Multicasting can be implementing in the following situations.
  • For better bandwidth utilization.
  • Less Router/Hosts Processing.
  • When sending the same data to the multiple receivers is required.
  • When the recipient address is unknown.
  • When a one-to-many communication systems model is required.
It has many advantages over the unicast and broadcast communication system such as the following.
  • Enhanced performance.
  • Optimized performance.
  • One-to-many communication system.

W L A N  Technologies
Wireless LAN or WLAN is a very popular option for building a network in home, office, and for accessing the internet. The increased demand of the mobility, flexibility and the scalability are the key factors in the development of the WLAN. Wireless networking and the wireless LAN technologies provide the multiple benefits to the network users and the organizations such as reduced setup cost, cable free network infrastructure, easy deployment, mobility and the easy management.

The major use of the Wireless LAN technologies is to provide the secure and high speed voice, data and video communications by using various applications and devices.  In the WLAN communication is made through the high speed radio waves without the use of cluttered wires.  The wireless LAN communication is based on the following communication standards.

1. IEEE 802.11.
a. 802.11a
b. 802.11b
c. 802.11g
2. HiperLAN/2.
3. Bluetooth.
4. HomeRF
5. Infrared
 
Wide Industry support, the operating system support, easy installation and the flexibility has made the WLAN a popular choice of the business and home users.  There are different vendors that are manufacturing the various WLAN products.  The major vendors include Cisco, Lucent, Motorola, 3Com, Apple, D-Link and Nortel etc.
There are the many standards in the WLAN and the most popular standard are Wi-Fi and HomeRF.

Advantages of WLAN

WLAN provides numerous benefits to the home and corporate users. Some of the key benefits include the following.
  • WLAN technologies can be used to create temporary network for a specific period of time.
  • It provides the access to the internet at the public places.
  • WLAN can be a part of an existing network and it can connect two physically different networks (in two separate buildings) be establishing a wireless link.
  • WLAN technology is a perfect solution for the places where wired network is not possible.
  • It provides the mobility, scalability, flexibility and the ease of management.
  • WLAN can coexist with the wired Ethernet networks.
  • Wireless networking is supported by different wireless standards like 802.11, 802.11b, 802.11a, 802.11g, 802.11n and the 802.11g is the most popular WLAN standard.
  • WLAN provides the more productivity, expandability, convenience and the easy deployment at very low cost.

Digital Payments

The internet payment solution providers have evolved over the recent years.   They facilitate the online payment system for the buyers, sellers and merchants. The credit cards from the major issuing companies like Master, Visa and American Express has facilitate the payment process and make it very convenient for the online users and the merchants.  Now everyone from every part of the world can by almost everything on the internet through the credit cards.

The diversity in the payment systems enables the merchants to manage and promote their businesses by offering different currencies and the languages options to the online buyers.  You need to make an account with the payment processing companies like PayPal, World Pay and 2CO etc to send and receive the payments worldwide.  Some of the major payment processor includes the following.

PayPal

PayPal is the largest online payment network. PayPal provides the free and instant online payment service to the selected countries. It is the preferred payment system for the buyers and sellers throughout the world. After getting an account with the PayPal you can send and receive payment online to everyone on your email address.  It is headquartered in California, USA and was founded in 1998.  Through your PayPal account you can transfer your money to your bank account or your credit card.  The PayPal supports different currencies like USD, JPY, CAD, NOK, EUR, SEK, GBP and DKK etc.
 

2CO

2CO is an excellent payment processor system that enables you to sell your products online or buy products and services online.  It supports thousands of the products to be sold online.  After making account with 2CO, you get robust account management, multiple shipping options, support several currencies and automate the online shopping.  2CO is also known as 2Checkout and it supports more countries than the PayPal.

WorldPay

WorldPay is the leader in the online payment processing systems.   It facilitates the customers to accept the payments via internet, email, phone and fax.  It has variety of payment methods and support multiple currencies and countries.

MoneyBookers

MoneyBookers is another excellent payment method and everyone from the supported countries can join it for free.  After getting account with the Money Booker, you can fund your account, send money online at the receiver’s email address, shop online and receive money.  With MoneyBookers you can send and receive the payment in seconds. It supports local currencies in approximately 30 countries.  There is no setup cost and it accepts almost every major credit card.

E-Gold

E-Gold is a digital gold currency and it allows you the trade or transfer the ownership of the gold between the users.  It is an account based payment system that enables the people to trade or uses the gold as money. E-Gold is used for the payrolls, bill payments, e-commerce, business-to-business payments, person to person payments and donations.

Security Risks and Safety Tips

While these payment processors have made the payment systems easier for everyone but there are some security concerns that can’t be compromised.  There are many security risks are involved in the online payments if your system, email address, merchant account are the e-commerce site is unprotected.  First you need to protect your system against the hackers, spyware, adware, malware and the intruders.
 Install an up-to-dated antivirus, anti spyware and firewall to your system.
Update your operating system with the latest patches and hot fixes.  Never do a purchase from the untrustworthy e-commerce websites.  Check the authenticity, user’s feedback about that particular shopping website.  Never send your sensitive information such as credit card numbers, bank accounts details and other sensitive information to anyone via emails. Use secure browser’s with https requests and make sure that the e-commerce website supports SSL (secure socket layers). In case of any misuse, immediately contact your credit card issuing company or bank.

What is RIP

RIP is also known as Routing Information Protocol and it is a dynamic and distance vector protocol that uses the hop counts. It is stable, widely supported and easy to configure protocol. It uses the UDP port number 520 for the route updates. RIP is used to route the traffic on the WAN and on the Internet.  It uses the traffic metrics to measure the IP traffic routes.  It has been classified as the Interior Gateway Protocol by the IETF (Internet Engineering Task Force). 

By using the RIP as gateway host computer sends its entire routing table (that contains the information about all the hosts) to the nearest host.  The nearest host sends this information to its nearest host and so on.  In this way all the connected hosts get updated with the latest information.  RIP is useful for the small networks and it has considered as obsolete as it has been replaced by other protocols such as OSPF (Open Shortest Path First) and IS-IS. 

RIP sends the routing update messages to the adjacent hosts at the regular intervals.  When a router receives some information that includes some changes it updates it’s routing table to reflect new changes. 

After a router updates itself with the latest changes or information it frequently sends this updated information to the adjacent routers till all the routers gets updated.   It supports maximum 15 routers/hopes in a network and it is considered as the best solution for the small homogeneous networks.

It uses the hop counts to measure the distance in the networks.  Every RIP router sends updates to the next hops after every 30 seconds.
It runs at the network layer of the OSI layers model.  A standard RIP packet includes the version, route tag, IP address, subnet mask, next hop and the command.  Configuring a Cisco Router for RIP requires few configuration steps.
You need to enable the RIP routing protocol on the Cisco router and identify the network. The basic RIP configurations on the Cisco router include the following commands.

router> enable
  Password:
  router# conf t
  router(config)#interface ethernet 0
  router(config-if)# ip address 192.168.42.1
  router(config-if)# interface ethernet 1
  router(config-if)# ip address 192.168.43.1
  router(config-if)# exit
  router(config)# router rip
  router(config-router)# network 192.168.42.0
  router(config-router)# network 192.168.43.0
  router(config-router)# exit
  router(config-router)# ^z
  router#

What is Network Scanner

Network scanning is a technique that is used to assess the security vulnerabilities in a computer network.  There are different scanning procedures such as ports scanning, pings sweeps can collecting the information about the computer system and network based on the IP network.  Hackers also use the scanning techniques to attack a network.

As a network administrator you need to deal with the security related issues in your network such as patch management, assessing security vulnerabilities, network auditing, services management and network monitoring. 
To detect the vulnerabilities in your network, you need an excellent scanning tool.  Following list provides the best network scanning tools.

GFI LAN Guard Network Security Scanner

GFILAN Guard Network Security Scanner allows you to detect, assess and troubleshoot and vulnerabilities in your network.  Being a network administrator, you often need to deal with multiple security related issues and GFI LAN Guard Network Security Scanner provides you the solution for multiple security vulnerabilities and threats.

GFI LAN Guard NSS scans the network based on the 15,000 known vulnerabilities.  It allows you to scan your networks across multiple platforms.  It provides the customized report of the scans across your whole computer network.
 

Advanced IP Scanner 1.5  
Advanced IP Scanner is a fast LAN scanner for the Windows based computers.  With this software you can have the detailed information about your network computers in a very short time.  It provides you the multiple functions such as remote shutdown, wakeup and others.  It can scan hundreds of computers in a very short time.

Soft Detect Network Scanner 1.0
Soft Detect Network Scanner is aimed to scan your computer and find the P2P programs and media files, illegal music, and ensures that no illegal files and programs will be downloading and saved to your computer.  It limits the access to the certain illegal sites from your computer and automatic scans your computer for the potentially dangerous music, media and video files.

Angry IP Scanner 2.21  
It is a very fast security scanner and provides you the multiple options such as scan dead machines, check open ports, scanning multiple ports and the ability to resolve the host names.

Data Compression Overview

Data compression in the technique of storing the data in such a way that it requires the less space than usual.   Compress is being performed by a special encoding scheme.  It is used to shrink the large files into smaller size in order to transfer them over the networks, intranet and the Internet. This technique is very useful in the data communications because it allows the network devices to transmit the same amount of data in the less bytes.

It involves the different algorithms that make the repetitive bits unnecessary and thus make the data compressed. It has been widely used in the database management, backup utilities and the spreadsheets.  Certain types of the data files such as bit-mapped graphics, .gif, .doc, .mpg, .txt, .wav, and .avi file extensions. 

Sender and the receivers should understand the encoding mechanisms in order to make the data compression work effectively.  Compressions let you save your expensive resources such as the hard disk space, communication bandwidth and the communication time.  Compressed data must be decompressed in order to use it.

Compression can also be performed on the audio and the video files but it requires additional hardware and software to decompress the audio and video data.  Following are the two major techniques of the data compression.

Lossless

In the lossless compression technique, the restored data is identical to the original.  This technique is must the data types such as word processing files, executable code, numerical values and the database entries.  In this technique a single misspelled word or numerical value is not affordable.

Lossy

In the Lossy technique, the compression allows some sort of degradation and noise. In this technique, the data files do not kept in the perfect condition for the storage.  The transmissions in the lossy technique contain the certain amount of noise. 
The higher compression rate adds more noise to the data.
By default Windows allow you to covert the files and folders if these are formatted with the NTFS file systems.  There are many third party software that let your files, folders, audio, video and images compress into smaller sizes. The most common compression software are WinZip and WinRar. 
Files that are compressed with these tools have extensions .zip and .rar.  These files can be decompressed by using the same tools at the other end.  The files that are very large even after compressing can be divided into smaller pieces and these pieces of the same files can be reunited at the other end. 
Most of the compression software can support multiple data types like .doc, .pdf, .wav, .mpeg, .jpg, .avi, .gif and others.

Introducation to Internet Protocol

Internet Protocols are the most popular protocols that are used to communicate over the interconnected networks.  The Internet protocols consist of the suite of protocols in which there are two major protocols i.e. TCP and IP and it is also known as TCP/IP protocols.  TCP/IP was first developed in 1970 by a community of the researchers.  TCP/IP provides a lot of services and the most common includes email, files transfer, HTTP, FTP, SMTP, DNS and remote login.

TCP stands for the transmission control protocol and it provides the reliable data transmission in the IP based networks such as LAN, WAN and internet.  It provides the connection-oriented and reliable end to end data packets delivery within an internetwork.  The reliability mechanism of the TCP enables the communication devices to deal with the lost, duplicated and misread data packets. TCP ensures the delivery of the data packets in the same sequence as they are received.

The other part of the TCP/IP is the IP, which stands for Internet Protocol. IP is responsible for the transmission of the data from one computer to another and each computer in the IP-based networks must has a unique identifier which is known as an IP address. IP is a connectionless protocol and it means that there is not continuous connection between the two communicating protocols.

IP works on the network layer of the OSI layers model.  The most widely used version of the IP is the IPv4 but now IPv6 now also began to be supported. IPv6 supports relatively longer IP addresses which show the possibility of many more web users.  The other protocols of the TCP/IP suite are described below.

TP
FTP stands for the files transfer protocol and it is used to send and receive the files over the IP based networks such as Internet.

SMTP
SMTP stands for Simple Mail Transfer Protocol and it is used to send the email messages to the recipient’s email address through the SMTP server.

DHCP
DHCP stands for Dynamic Host Configuration Protocol and it is used to assign the IP addresses and TCP/IP configurations to the network computers dynamically.

HTTP
HTTP stands for Hypertext Transfer Protocol and it is used to send the requests for a web page to the web server where the web page is hosted.

LDAP
LDAP stands for Lightweight Directory Access Protocol and it used to communicate with the Active Directory in the TCP/IP network.

POP3
POP3 stand for Post Office Protocol and it is used to receive the emails from the email servers.

Telnet
Telnet is a TCP/IP utility that is used to configure, troubleshoot and manage the remote computers and servers.

PPTP
PPTP stands for Point to Point Tunneling Protocol and it used for the secure communication in the Virtual Private Network.

RIP
RIP stands Routing Information Protocol.  It is a single vector routing protocol.  In the vector routing protocols the routers exchanges network information with each others.
                                                              
SNMP
SNMP stands for Simple Network Management Protocol and it is used for the network management.

TFTP
TFTP stands for Trivial Files Transfer Protocol and it is a very simple files transfer protocol.  It is very close to the FTP but it lacks the authentication mechanism.

OSPF
OSPF stands for Open Shortest Path First Protocol and it used to find the shortest possible path from one router to another in a network.

Router Security

Router is a network communication device that is used to connect a LAN with LAN, LAN with WAN and WAN with WAN. They are used to facilitate the communication between the IP based networks. Routers are used to connect small to enterprise networks with each other.  There are many security threats to a computer network and if a router is not properly configure to deal with those threats that your whole computer network’s security can compromised. 

Once a computer network comes under attack by the viruses, hackers, unauthorized users, intruders, malware and spyware then all the connected networks’ security can also be compromised.  Network administrators need to harden their network devices such as routes, switches and computers.

Most IT managers and the network administrators do not realize that their routers can be attacked. Router’s operating system (IOS) is as vulnerable to the security threats as network operating systems.  Following tips and techniques can be implemented to protect your router from being attacked.

Router Security Tips        

  • Router should prohibit the access to the unauthorized users.
  • Telnet should never been used to manage the remote router unless there is secure communication path.
  • Update your router’s operating system.
  • Block ICMP ping requests.
  • The passwords on the router should be kept in the secure encrypted form.
  • Disallow IP directed broadcasts.
  • Make access rules for every user.
  • Create and maintain the route security policy.
  • Implement Access lists and allow only those protocols and services such as TCP/IP and IP addresses that are required by the network users.
  • Do not source IP packets with source routing header options enabled.
  • Limit the access of the users to the network resources and devices.
  • Change the default administrator’s password of the router.
  • Shut down un-needed services on the router.
  • Restrict the incoming packets with the loop back addresses because these packets can’t be real.
  • Block IP multicast if network don’t need it.
  • Turn on the logging on the router to log errors messages.
  • Disable IP re-directs and IP source routing.
  • Disable the HTTP configuration mode if your router has command line configuration options.
  • Manually configure ACL as it can provide anti-spoofing protection against attacks.
  • Physically secure your router by placing it at a safer place.
  • If you are using wireless router disable SSID broadcast, use WEP/WAP encryption techniques and assign static IP addresses to the devices.

IP Call Center Implementation

VOIP or IP telephony is quickly replacing the traditional telephone systems. It’s simply the transmission of the voice communication over the IP-based networks such as internet. It has even proved itself to be the best technology for the Call centers and many vendors adding VOIP technologies to their devices. It allows the contact or calls centers to operate effectively. The internet calls can be placed through the VOIP devices, PSTN phones or by using the computer with VOIP software.

There are number of voice over IP applications like Skype, Netmeeting and Cooltalk.  IP-based telephony allows the home and business users to route multiple channel interactions like email, web and the voice across to the worldwide remote locations.  VOIP systems are considered less expensive and more flexible than the TDB-based systems.

They are easy to administer and provide two way communications.  Moreover the VOIP technology provides the following benefits.
 
  • With this technology you will never miss your important calls.
  • You can make long distance calls at very cheap rates.
  • You can manage your VOIP account online.
  • It’s very easy to setup and make calls with your computer or VOIP device.
  • Three-way calling.
  • Call waiting.
  • Anonymous call block.
  • Voice mail.
  • Advanced Call forwarding.
  • Call Transfer.
  • Directory Assistance.
  • Conference Calling.
  • There are many other value added services.
Before implementing the call center you need to go through the following steps.

Business Planning
The first step that you need to do for implementing the IP call center is to formulate a business plan.  It’s the most important step in deploying the IP-based call centers.  Many companies start the IT projects without planning, which may results in the failure of the project.  Organizations need to make a detailed business case for the call center.  In your business case you need to clarify and identify the following things.
  • Whether your services are volume oriented or the value oriented?
  • Your contact center will be used for the internet or external customers?
  • You want to implement your contact center only for providing the customer support or you also plan to make revenue form it?
  • Through which medium you will provide your services Voice, Email or Web?
Implementation Planning
After completing the business plan the next step is to complete the implementation plan.   For meeting your objectives in terms of cost, quality and features you need to have the answers of the following questions.
  • How your contact or call center system will be managed?
  • Will the system be centralized in one location or will be located on many locations?
  • How will you manage additional users, features and the locations in the future?
  • How will your system interact with the other network components like customer relationship management system or voice mail?
Deployment
The deployment support should proceed smoothly in your contact center.   Before deploying the call center you need to know the following.
  • Do you have onsite staff that has the appropriate knowledge, skills and expertise?
  • Can your present staff complete the deployment process or you need to have additional technical staff?
  • How large will be the deployment?
Many organizations prefer to deploy the preconfigured contact center systems. Through the proper business planning the organizations benefit the most from planning, implementing, deployment and support.

Voice Recognition Technology

Voice recognition deals with the compute systems that can recognize the spoken words.  Computer can only understand the dictation (words) but it don’t understand it words.  There are number of voice recognition software are available in the market.  The software need to become accustomed to the particular voice and extend before it can be used.  Recently great developments have been made in the continuous speech systems, these systems let you speak naturally.

Due to the limitations, costs and other effects the voice software are only being used in the specialized situations like when a user is unable to use the keyboard to enter the data, in transcribing the medical data or legal data or when the hands are occupied with some other tasks.

The usage of the voice recognition software includes dictation, pronunciation, transcription, court reporting, hands free computing, automatic speech recognition and mobile telephony.

By default Windows XP and Windows Vista let you allow to interact with your computers via voice.  It has been designed for the users who want to minimize the use of the keyboard and the mouse.  It uses the Microsoft Speech Technologies and with this software, you can fill out the web forms, dictate emails and documents, control operating system and switch between the applications.  It provides the following key features.

Commanding
Commands allow you complete the tasks and naturally control the applications.

Dictation
It dictates the document and the emails.

Correction
It fixes incorrectly recognized words.

Disambiguation
It easily resolves the ambiguous situations.

How Do I Help?
You can say that How Do I followed by a specific tasks like how do I open a file etc.

Voice Recognition Software


Dragon NaturallySpeaking 9 Preferred
Dragon NaturallySpeaking 9 Preferred is able to directly dictate into the Microsoft Word.  It can support unlimited number of users, text to speech, hands free mouse pointer controller and MMX technology.

IBM ViaVoice 10 Standard
IBM ViaVoice is voice recognition software that includes the command and control features.  With IBM Via Voice software you can record, edit, correct and format the text with the IBM ViaVoice speech-enabled word processor.  It can be customized to add new words, acronyms and other personal phrases and expressions.

ArithmeticTalk
It allows you to add, subtract and multiply by voice.

Philips FreeSpeech 2000
Philips FreeSpeech 2000 is dictation software that is used to dictation in the Word, Corel Draw, Lotus Notes and Eudora.  It uses the voice macros for speedy work.  It can dictate in Spanish, German, Dutch, English, French and Italian.

Micro IntroVoice and Micro IntroVoice II
It is complete voice recognition software and a complete input/output system that provides the accuracy or more than 98%.  It is an ideal word press for the many environments and situations.  It provides the DOS for use with IBM AT and 80XXX.

MacSpeech Dictate
MacSpeech Dictate is a premier speech recognition solution for the MAC operating systems.  It supports the Microsoft Word, Photoshop, QuarkXpress. It also works with the other MAC applications like ichat, mail, iphoto and keynote etc.  MacSpeech Dictate provides the ultimate and powerful experience for the MAC users.

Gigabyte Ethernet Networking

Ethernet is the most commonly used technology and a standard for the Local Area Network.  Ethernet enables the computers in the local area network to communicate with each other via network cables such as UTP/STP and fiber optic cables. Gigabyte networking involves the fiber optic cables, connectors and gigabyte Ethernet supported LAN cards.

Gigabyte networking is used to provide the very high data communications speed over the fiber optic cables in the Local Area Network. The reference model of the Gigabyte technology is defined by the IEEE. It is a physical and data link technology. There are three types of the Ethernet.

10-Mbps

It is most commonly used for the LAN.  Cable specifications include the following.
10Base-2
10base-T
10base-F
10base-FL
10base-FB
10base-FP

100-Mbps

It is also known as 100base T. It uses the RJ 45 connectors in the star topology and it uses the CSMA/CD media access. It supports the maximum number of the connected segments up to 1024. It provides the speed up to 100Mbps.  It is also known as the Fast Ethernet.  Fast Ethernet supports all Ethernet frame types and software and provides better speed than the traditional Ethernet.   It provides better bandwidth and supports more users in the LAN.  It provides 10 times more performance and efficiency than the traditional Ethernet. It is the best for the companies that require fast data transfers and communications. 100base T has the following sub categories.
100base TX
100base FX
100base T4

Gigabyte Ethernet

It provides the speed up to 100Mbps. Gigabyte Ethernet enable the data to travel over the optical and network cables.  Gigabyte networking involves the communications over the fiber optic cables. It provides many times better performance than the traditional Ethernet and Fast Ethernet. It uses the specialized connectors for the fiber optic cables.  Gigabyte Ethernet cables specifications include the following.

Cable Type                                        Maximum Distance
  • 1000base-T                                         100 M
  • 1000base-CX                                      25
  • 1000base-LX                                      5000
  • 1000base-SX                                      500
Gigabyte Hardware

There are number of manufactures like 3Com, Acer, Asus, Belkin, Cisco, EXTREME networking, D-Link, Intel, Lenovo and Xerox etc. that are developing the gigabyte hardware products. Gigabyte Ethernet hardware includes the following.
  • Gigabit Ethernet Switch
  • Gigabyte LAN card
  • Fiber optic cables
  • Fiber optic connectors
  • UTP/STP Cables
  • RJ-45 Connectors.

Cables Tester 

Network cables are used to connect the computers with each other.  The cables come in a variety of shapes, standards and functions. Sometimes the cables get messed up and fail to transmit the data signals along them. It is very frustrating to find the fault and point of failure without a testing device and here comes the cable tester. Cable tester is a handheld electronic device that is used to check electrical and the physical properties, integrity and the connectivity issues of the network cables such as UTP and STP.

It lets you identify the defective cable in your computer network. Common types of the network cables that are tested by the cable testers include CAT 3, CAT 5, coaxial, trioxial, twisted pair and fiber optic cables.  A cable tester consists of the following. 
  • Voltmeter
  • A source of the current.
  • A switching matrix that is used to connect the volt meter and the electrical source to all the points in the cables.
It is the perfect tool to check the connectivity of the network cables.  It checks the cable connections integrity and identifies the continuity problems such as open wires, reversed pairs, shorts cross pairs and the mis wiring of the 10BASE-T, 100BASE-T, EIA/TIA 568A/568B, SCSI and other Ethernet cables.

 
There are following two methods to check the connections of the network cables.

Continuity Test:

In this test, you try to pass the current downward to the connection. If the current flows then the connection seems to be accurate.

Resistance Test:

Pass the current down the connection and measure the voltage.  Next you calculate the resistance of the connection from the voltage and current.

The advanced cable testers have the following properties.

  • Tests the continuity of the electrical signals and determine the cable types such as UTP/STP, SCSI and fiber optic cables.
  • LED display.
  • Easy to carry.
  • The average dimensions are Dimensions: 2.5 X 1.5 X 0.75 (inches).
  • Storage pouch.
  • Included remote identifier tests the installed cables.
  • Includes Test points.
  • Test Resistance.
The measurement capabilities of the cable tester device vary from device to device.  The more advanced cable testing equipments supports features including printing reports, database storage, scripting and graphic wiring display.
Before making a purchase decision you need to consider the following things.
  • Decide that which cable properties you need to measure.
  • Cables variety like UTP/STP, Coaxial and fiber optic etc.
  • Your budget.
  • Device Warranty.

Video Surveillance Camera
Surveillance is the monitoring of the behavior and activities of the people mainly at the public places, airports, offices, homes and other sensitive areas.  There are immediate needs for the security and surveillance systems in the public and commercial places.  Implementing a video surveillance system is cheap as compared to hiring the security experts to observe the human activities.  Surveillance is a great way of monitoring home, offices and public places.

Surveillance cameras are already being used at the airports, bands, commercial plazas, hotels, embassies and stores as the security tool.   Video surveillance technology is also a great way of patrolling the traffic flow, monitor pedestrian congestions and detects the accidents on the highways. Digital video security system consists of the software and hardware components.

These components collect the video camera information and transmit via fiber optic cable, wireless technologies or over the IP-based networks.  Power and data can be carried over the same cable by using a technique known as PoE i.e. Power Over Ethernet.

The transmitted data can be stored onto DVR (Digital Video Recorder) for further use. Choosing security surveillance systems requires a lot of considerations and the information about the CCTV cameras.

Surveillance System Buying Tips

There are three different types of the surveillance technologies i.e. time lapse systems, PC based systems and hardware based systems. Before buying a surveillance system you should ask the following questions to yourself.
  • What’s the priority of your surveillance system?
  • Do you want to observe the general comings and goings?
  • Will the video camera be subject to physical damage?
  • How your surveillance system be monitored.
  • What do you consider that are your biggest security threats.
  • Have you ever had problems of theft?
You need to consider the following things before buying the surveillance camera.
  • Avoid dummy camera.
  • Do no record audio.
  • Know what you want to see.
  • Check warranty of your camera.
  • After buying, mount the video camera at the door so that you can monitor everyone is coming and going in/out of your home and office.
Classifications of the Video Surveillance Cameras
  • Out door cameras
  • Infrared cameras
  • Day/night security cameras
  • Dome cameras
  • Mini security cameras
  • Bullet Cameras
Video Surveillance cameras provide the following features.
  • Remote monitoring
  • Prevent Theft
  • Lower power usage.
  • Surveillance data is transmitted to the destinations through the Ethernet, fiber optic or wireless mediums.
  • No computer skills are required to operate them.
  • High resolution recordings.
  • Easy to use and flexible
  • Little or no maintenance is required.
  • No technical expertise is required to operate the camera.

Security Risks On Internets 

Some users exploit the internet through the criminal behaviors and other harmful practices.  These users are known as hackers and intruders. Hackers and online attackers use the stealth tactics and to attack on the online computer users.   There are number of potential threats on the internet such as hackers, viruses, spyware, adware, Trojan horses, web worms and malware.  The following list will help you to better understand the internet security risks and the solutions to avoid it.

Hackers

A hacker is a person who breaks into the computer and network security of the online computer users. Hacking is an act of exploiting the vulnerabilities of the operating system without the user’s notice.

Viruses
A computer virus is a piece of code or a self-replicating, malicious software program that exploit the computer by attacking on it.  Computer viruses are specifically designed to perform a number of harmful effects from annoying to destroying. There are different types of the computer viruses and the most dangerous viruses can crash your computer’s hard disk and motherboard.  A most common way of spreading the viruses is through emails.  A computer once attacked by the viruses can quickly spread the viruses to all other connected computers.

Spyware
A spyware is a privacy invading program that is designed to steal the personal and confidential from the computer users.  Spyware can be delivered in a variety of ways including being attached with the legitimate software.

Adware
Adware is an advertising-supporting program that automatically downloads, displays and performs at the user’s computer who downloads the adware-supported software.

Malware
Malware is malicious software or a program such as viruses and spyware that is designed to damage or disrupt the computer system. The other types of the malware are Trojan horses, logic bombs, popups and spam.

Trojans

Trojan is a destructive program that is contained in the harmless program and gets control of all programs. Like the viruses the Trojan do not replicate itself. Trojan can redistribute itself as the part of the computer viruses.  There are different types of the Trojans like remote access Trojans, destructive Trojans, proxy Trojans, FTP Trojans and denial-of-service (DOS) Trojans.

Phishing
Phishing is an act of tricking someone by emails to steal the confidential and personal information.

Keylogger
A keylogger is a malicious program that is secretly installed on your computer to record the keys that you type on your keyboard.  Keyloggers are used to collect the secret and personal information such as user name, password, credit card information and others.  Once the data is collected it can be transferred to the destination by the variety of ways.

Security Vulnerabilities and Threats
  • File sharing applications.
  • Instant messaging
  • Windows Remote Access services
  • Web servers and services
  • SQL Injections.
  • Weak Passwords
  • Outdate antivirus and anti spyware programs.
The above mentioned security risks are the biggest threats for every online user. Following solutions can help you to protect your data, privacy and identity on the internet.

Security Solutions
  • Install an up-to-dated antivirus program on your computer.
  • Install anti spyware program.
  • Install and configure software or hardware firewall on your gateway computer.
  • Update your operating system regularly by installing latest security patches and hot fixes.
  • Encryption your data while transmitting over the internet.
  • Never open an email attachment from the unauthorized source.
  • Never download a software program from the websites who has no integrity.
  • Do not open any website links that you receive through the messenger programs from known users.

Introducation to Broadband Technologies
The market of the broadband technologies is expanding day by day and some of its most common applications include voice, video and data communication, multimedia streaming, interactive gaming, real time video conferencing and the broadcast TV.  Over the recent years the internet and intranet applications have evolved, which resulted into the increasing demands for the higher bandwidth.

Optical fiber has surpassed all the other technologies and mediums in providing the higher bandwidth and fastest data communication speed.  It is the communication medium, which provides almost infinite bandwidth.

Copper and the wireless technologies are being developed at a rapid pace to meet the challenges of the higher bandwidth.  In the broader scenario, the broadband technologies can be classified into the fixed line technologies and the wireless technologies.

 
Fixed Line Technologies

Fixed line technologies depend on the direct physical connection of the subscriber’s like in the DSL and in the cable internet connection.
  • XDSL
XDSL uses the existing telephone line infrastructure to provide the high speed data communications.  There are different DSL technologies like ADSL, SDSL and VDSL.  The bandwidth and the speed of the XDSL connection depends on the distance of the subscriber’s premises from the local exchange, the quality of the telephone line, the number of connected users simultaneously.
  • Hybrid Fiber Coax: Cable Modem and Cable TV.
  • Broadband Power Line.
  • Public switched telephone network (PSTN)
  • Fiber to Home.
  • Narrowband
  • Baseband
Wireless Technologies

Wireless broadband technologies refer to the technologies that use point-to-point and point-to-multipoint microwave by using different frequencies in the range of 2.5 to 43 GHz to transmit the signals.
  • Microwave Links
Microwave Links uses the fixed broadband systems to provide the high speed data communication. It is a point-to-point wireless communication method which provides the data transmission at the rate of 155Mbps within the range of 5KM.  Microwave links are the best solutions for the computer networking with the lower capacity.
  • Wi-Fi (Wireless Fidelity).
  • Wi-MAX (Worldwide Interoperability for Microwave Access).
  • Satellite
  • 3G (3G mobile network).
  • MMDS (Multi channel Multi point distributed service).
  • FSO (Free Space Optics)
Due to the emerging broadband technologies a lot of internet applications and services such as audio and video streaming, Voice over IP, video conferencing, multimedia applications and the mobile applications are able to provide the high speed data transmission, which is not possible with the dial-up connections.  The ultimate bandwidth capacity, higher data transmission speed, security and the reliability of the broadband network technologies has made them the defacto data communication standards for the home and businesses users.

What is Cryptography

Cryptography is the technique of transforming (encrypting) the information into the unintelligible and unreadable form by using a key.  The unreadable form is known as cipher text.  The cipher or encrypted message can only be decrypted by the secret key. Cryptography is important while transmitting the information from one point to another so that no unauthorized user can access and read it. Cryptography uses different methods of encrypting the data and to ensure the secrecy and the privacy of the data communications.

With the rapid growth of the internet and the online shopping the demand of the electronic security has been increased.  Cryptography is used to protect the online communications, email messages, online transactions, computer passwords, ATM cards transactions, computer data and other secret information.  Cryptography can be classified into the following two types.
  • Symmetric-Key Systems
It uses the single key that both the sender and receiver have.
  • Public-Key Systems
It uses the two keys a public key that can be used by anyone and a private key that is only used by the recipient of the message.

Cryptography includes the mechanisms such as microdots i.e. merging the words with images and some other ways to hide the secret information.  In today’s computer’s world cryptography is associated with scrambling the plain text into the cipher text and this process is known as the encryption and then converting back the encrypted text into the plain text known as decryption.
 
There are four objectives of the cryptography.
  • Authentication. The sender and the receiver can confirm each other’s identity and the source and the destination of the data.
  • Integrity. The information cannot be altered without using the secret keys.
  • Confidentiality. The information cannot be read or intercepted except the intended recipients.
  • Non-Repudiation. The sender and the creator of the information cannot deny his intentions of creating or sending the information.
Cryptographic Algorithms

Cryptography uses the wide range of the algorithms and some of most common algorithms are described below.

RSA:  It is a pubic key system.

MD5: It is a 128 bit message digest system.HASH:  Has algorithm is used to represent the condensed representation of the fixed length messages.
DES: It is a data encryption standard and a private key system.  It operates on the 64-bit block of data by using a 56-bit key.
AES:  It’s an advanced encryption standard.
HMAC:  It is a hashing method that uses a key in combination with an algorithm such as MD5 or SHA-1.

Intrusion Prevention System

Network firewalls and the Intrusion prevention systems are the integral part of the network security. Intrusion prevention system is a network security device that detects the security vulnerability, malicious activities and security holes in the computer network and it reacts to block those activities.  Most of the computer systems and networks use the firewall to block and monitor the unwanted traffic.

IPS provides the extra security to the network by protecting it from the viruses and hackers. IPS can make the access control decision based on the application content rather than the IP address or the port number as in the firewall.

When an attack is detected on the network IPS stops the malicious packets and it allows the rest of the traffic to pass. IPS is designed to operate invisibly on the network.  IPS sits inline with the traffic flow system and it detects and blocks the attacks.

Types of the IPS

There are following four types of the intrusion prevention system.

Network Based IPS:  It is usually a hardware device that sits in the network.

Content Based IPS:  It inspects the content of the network packets to detect and prevent the known network attacks.

Rate Based IPS:  It is primarily used for preventing the denial of service and distributed denial of service attacks.

Host Based IPS:  These are the software based applications that are used to detect the unwanted entry in the network after decryption has occurred.

IPS Products
Following are some of the best IPS products.
  • Cisco IPS 4270 Appliance by Cisco Systems.
  • DefensePro 3020 by Radware.
  • FortiGate-1000A by Fortinet.
  • IDP 1100 by Juniper Networks.
  • APS (Active Protection System) by CounterSnipe Technologies LLC.
IPS is the more provides more security and are more powerful than the firewall solutions.  It not only detects but also protects the network.

Features         
The key features of the IPS include the following.
  • IPS provides the easy to use and in-line protection against the known security threats.
  • IPS provides the protection and performance against the viruses, web worms, Trojan horses, DDos attacks and the hackers.
  • It provides the protection to your confidential data.
  • IPS can handle encrypted and unencrypted traffic.
  • IPS can serve at the host level to prevent the malicious activities.
  • IPS provides security connectivity between the branch offices.
  • IPS provides the efficient inspection, powerful protection and the easy of network management.

Introduction to Optical Router

Fiber optical cables and technologies carry data at the speed of light over the internet. In the recent years, optical technology will be used more and more in the routers for serial links, switch fabrics, backplanes and chip-to-chip communications. Optical routers are based on the optical switching techniques and they include the optical wavelength switching, optical packet switching and optical burst switching.   

Cisco has introduced the 7600 optical services router that provides the IP services at the optical speed i.e. the speed of light. An optical router uses the NxN frequency router and N tunable transmitters. Data packets are routed according to their required destinations.

Optical switching and optical signal processing technologies create a very intelligent and versatile optical router. Routing is performed by determining the indented destination of the packets to be routed. An OR is comprised of the followings.
  • Frequency router having plurality of input ports and plurality of output ports.
  • Plurality of transmitters.
  • Plurality of tunable lasers that is coupled with the plurality of the modulators.
  • Transmitter
  • Polarization controller that is coupled between the plurality of the transmitters and the plurality of the input ports.
  • Clock, that provides the signals to the transmitters and receivers.
  • Scheduler that is coupled with the transmitter.
The Cisco 7600 OSR allows the services providers to create the high speed and value added services to meet the customers’ requirements and for the high speed networks. The services are voice and video convergence, internet based applications and the network-based security.  It consists of 256Gbps switching fabrics and forwarding engine that forwards 30 million packets per second.  

It can provide different IP services at a very higher speed. Optical wavelengths are the true building blocks of the next generation high speed networking. OR are still in research and many vendors are experimenting it.  In the near future, OR will revolutionized the IP communications.
Common Advantages of the OS includes the following.
  • Very high throughout.
  • Multicast capability.
  • Low latency.
  • Rapid routing.
  • Interoperability with the today’s circuit switching network.
  • High speed data transmission (at the speed of light).

Network Address Traslation
NAT or Network Address Translation is a technique of transceiving the IP traffic through the router and it involves the rewriting of the source and the destination IP addresses and the UDP/TCP port numbers of IP packets.  It is a method of connecting multiple computers with the internet through a single IP addresses. With the huge growth of the internet there is a big demand of the IP addresses and here the NAT comes into play.  

NAT was developed by the Cisco and it is being used for the internet connection sharing, load balancing and filtering the incoming and outgoing traffic.  It enables the single communication device to act as intermediary between the internet and the local computer network and due to this a single IP addresses can be used with and whole group of computers.

NAT enabled device such as a router or computer sits between the internet and the local network.  The key advantages of the Network Address Translation have been described below.
  • It is used for reusing the IP addresses.
  • It provides the internet access to the remote clients.
  • It provides the firewall functionalities to the NAT enabled routers and also hides the internal IP addresses.
  • It allows the organizations to combine multiple ISDN connections into a single connection.
  • It enables the organization to use more internal IP addresses.
  • It provides the PPPoE broadband internet access.
It bundles the NAT, DHCP and DNS for smaller computer networks.
 
There are the four types of NAT.
  • Full Cone.
  • Restricted Cone.
  • Port Restricted Cone.
  • Symmetric
The most common reasons to implement the NAT in your computer network is the security and the administration.  As the amount of information and resources is increasing at a exponential rate, it has now become the requirement of every home and business user to connect to the internet.

NAT multiplex your whole computer network traffic on the internet as it is coming from a single computer and a single IP address.  Network Address Translation works in the following different forms.

Static NAT:   It maps the unregistered IP address to the registered IP address on the one to one basis and it is useful when a device needs to be accessible from the outer network.

Dynamic NAT:  It maps the unregistered IP address to the registered IP address through the group of the registered IP address.

Overloading:  It is a form of the dynamic NAT that maps multiple unregistered IP addresses to the
single registered IP address by using the different ports.

Computer Network Services

Computer networking and the data communication is an important requirement of every business.  Networking is used for sharing data and resources, transferring files, sharing multimedia, monitoring other computers, tracking orders, employees’ communication with each other, video conferencing and making long distance phone calls.  Networking is important in the schools, universities, banks, small offices, multinational organizations, ISPs and even in the homes. 

Based on your unique business requirements there can different network services can be used.  Common network services include the following and these services are used in different types of the networks like LAN, MAN and WAN.

DNS

DNS stands for the Domain Name System and it is used for translating or converting the domain names into the IP address and IP addresses into the domain names.  DNS servers are used on the enterprise TCP/IP networks and on the internet.

DHCP
               
DHCP stands for the Dynamic Host Configuration Protocol and it is a networking service that dynamically assigns the IP addresses and other TCP/IP settings like default gateway, print server, DNS and proxy server’s settings to all the computers in your network.

FTP

FTP stands for the File transfer protocol and it is used to transfer the files over the internet through the FTP client.

Email

Email is the process of sending the text messages, images and video clips in an electronic form.

Printing

Printing is the process of sending the print requests to the print server.  A print server is a dedicated computer in a computer network and the client computers can be attached with it so that they can send the printing request.

File Server

File Server is a computer server that is used to authenticate the users on the network.

Web Hosting

Web Hosting is the process of storing the websites on a central (massive) computer that is known as a web server.

Video Conferencing

Video conferencing technology is the communication type in who two or more individuals at the different locations of the world can communicate with each other via video.

VOIP          

VOIP stands for the Voice Over Internet Protocol is the network service or technology that is used to implement voice communication between two ore more individuals at the remote locations.  It can also be used to make the long distance phone calls.

author profile

Contact Form

Name

Email *

Message *

Powered by Blogger.