Sie sind auf Seite 1von 25

Internet

Internet ISP: An Internet service provider (ISP, also called Internet access provider or IAP) is a company which primarily offers their customers access to the Internet using dial-up or other means of data telecommunication. ISPs may provide Internet e-mail accounts to users which allow them to communicate with one another by sending and receiving electronic messages through their ISPs' servers. ISPs may provide other services such as remotely storing data files on behalf of their customers, as well as other services unique to each particular ISP. End-User-to-ISP Connection: ISPs employ a range of technologies to enable consumers to connect to their network. For home users and small businesses, the most popular options include dial-up, DSL (typically Asymmetric Digital Subscriber Line, ADSL), broadband wireless, cable modem, fiber to the premises (FTTH), and Integrated Services Digital Network (ISDN) (typically basic rate interface (BRI). For customers with more demanding requirements, such as medium-to-large businesses, or other ISPs, DSL (often SHDSL or ADSL), Ethernet, Metro Ethernet, Gigabit Ethernet, Frame Relay, ISDN (BRI or PRI), ATM, satellite Internet access and synchronous optical networking (SONET) are more likely to be used. With the increasing popularity of downloading music and online video and the general demand for faster page loads, higher bandwidth connections are becoming more popular. [citation needed] Typical home user connection DSL Broadband wireless access Cable modem FTTH ISDN Typical business type connection DSL SHDSL Ethernet technologies When using a dial-up or ISDN connection method, the ISP cannot determine the caller's physical location to more detail than using the number transmitted using an appropriate form of Caller ID; it is entirely possible to e.g. connect to an ISP located in Mexico from the U.S. Other means of connection such as cable or DSL require a fixed registered connection node, usually associated at the ISP with a physical address. ____________________________________________________________________ _ Sahithi Systems Private Limited 2

Internet

ISP Interconnection: Just as their customers pay them for Internet access, ISPs themselves pay upstream ISPs for Internet access. In the simplest case, a single connection is established to an upstream ISP and is used to transmit data to or from areas of the Internet beyond the home network; this mode of interconnection is often cascaded multiple times until reaching a Tier 1 carrier. In reality, the situation is often more complex. ISPs with more than one point of presence (PoP) may have separate connections to an upstream ISP at multiple PoPs, or they may be customers of multiple upstream ISPs and may have connections to each one of them at one or more point of presence. ISPs may engage in peering, where multiple ISPs interconnect at peering points or Internet exchange points (IXs), allowing routing of data between each network, without charging one another for the data transmitted - data that would otherwise have passed through a third upstream ISP, incurring charges from the upstream ISP. ISPs requiring no upstream and having only customers (end customers and/or peer ISPs) are called Tier 1 ISPs. Network hardware, software and specifications, as well as the expertise of network management personnel are important in ensuring that data follows the most efficient route, and upstream connections work reliably. A tradeoff between cost and efficiency is possible. Virtual ISP: A Virtual ISP (vISP) is an operation which purchases services from another ISP (sometimes called a "wholesale ISP" in this context[1][2]) which allow the vISP's customers to access the Internet via one or more points of presence (PoPs) owned and operated by the wholesale ISP. There are various models for the delivery of this type of service. The vISP can provide network (internet) access to end users via access nodes owned by the wholesale ISP (e.g. dial-up modem PoPs or DSLAMs installed in telephone exchanges), routing network traffic itself to its destination.[citation needed] In another model, the vISP does not route any end user traffic, and needs only to provide AAA (Authentication, Authorization and Accounting) functions, and may additionally provide "value-add" services like email or web hosting using its own facilities.[citation needed]

____________________________________________________________________ _ Sahithi Systems Private Limited

Internet INTERNET: WHAT IS AN INTERNET? The Internet is a global system of interconnected computer networks that interchange data by packet switching using the standardized Internet Protocol Suite (TCP/IP). It is a "network of networks" that consists of millions of private and public, academic, business, and government networks of local to global scope that are linked by copper wires, fiberoptic cables, wireless connections, and other technologies. The Internet carries various information resources and services, such as electronic mail, online chat, file transfer and file sharing, online gaming, and the inter-linked hypertext documents and other resources of the World Wide Web (WWW Common uses: E-mail The World Wide Web Remote access File sharing Streaming media Voice telephony (VoIP)

Review of Basic Internet Concepts: Purpose: To provide information on basic Internet terms and concepts Lesson: The Internet is a network of computer networks. It makes it possible for any computer connected to it to send and receive data from any other computer connected to it. America Online, Comcast, Earthlink, etc. are examples of Internet service providers. They make it physically possible for you to send and access data from the Internet. They allow you to send and receive data to and from their computers or routers which are connected to the Internet. World Wide Web is an example of an information protocol/service that can be used to send and receive information over the Internet. It supports: ____________________________________________________________________ _ Sahithi Systems Private Limited 4

Internet

Multimedia Information (text, movies, pictures, sound, programs . . . ). HyperText Information (information that contains links to other information resources). Graphic User Interface (so users can point and click to request information instead of typing in text commands). The World Wide Web is an example of an information protocol/service that works using a Client/Server software design. (Client/Server is an ADJECTIVE that describes the software, not a noun!) A service that uses Client/Server design requires two pieces of software to work: Client software which you use to request information, and Server software which an Information Provider (like Fermilab or a museum) uses to answer requests and provide their information. Most Internet information protocol/services are designed this way. The Client/Server relationship is similar to the relationship between the TV in your house and the TV stations you can select. Your TV acts as a client by tuning in (requesting information) from a TV station which acts as a server by broadcasting (serving) the information. This means that if you encounter an error while using your Web browser, this may be due to a problem with the Web server you are contacting for information. It does not necessarily mean that your browser isn't working, or that you installed something improperly. Just like in the case of the TV and the TV station, sometimes problems are due to a bad TV, and other times they are caused by a problem at the TV station. The server software for the World Wide Web is called an HTTP server (or informally a Web server). Examples are Apache and IIS. The client software for World Wide Web is called a Web browser. Examples are: Netscape, Internet Explorer, Safari, Firefox, and Mozilla. These examples are particular "brands" of software that have a similar function, just like Lotus 123 and Excel are both spreadsheet software packages. There are many different information protocols/services besides HTTP (HyperText Transfer Protocol). Some of these are: E-mail (SMTP) - for sending electronic mail messages. Usenet News (NNTP) - for having electronic group discussions. File Transfer Protocol (FTP) - for transferring files between computers. Telnet - for running programs on remote computers. Various Others . . . Each of these works in a client/server manner by having a "language" defined that allows the client and server to communicate with each other in order to give users the information they request. These different languages have different purposes, capabilities, and advantages. ____________________________________________________________________ _ Sahithi Systems Private Limited 5

Internet One of the nicest things about the World Wide Web is that it provides "one-stop shopping" for getting information over the Internet. In the past, you would have needed to learn how to use many different software applications in order to use all these services. Now you can use E-mail, News, FTP, Telnet, WAIS, Gopher, and HTTP services all through your favorite Web browser. INTRANET: An intranet is a private computer network that uses Internet protocols and network connectivity to securely share part of an organization's information or operations with its employees. Sometimes the term refers only to the organization's internal website. The same concepts and technologies of the Internet such as clients and servers running on the Internet protocol suite are used to build an intranet. HTTP and other Internet protocols are commonly used as well, such as FTP. There is often an attempt to use Internet technologies to provide new interfaces with corporate "legacy" data and information systems. Briefly, an intranet can be understood as "a private version of the Internet," or as a version of the Internet confined to an organization.

DIFFERENCE BETWEEN INTERNET AND INTRANET There's one major distinction between an intranet and the Internet: The Internet is an open, public space, while an intranet is designed to be a private space. An intranet may be accessible from the Internet, but as a rule it's protected by a password and accessible only to employees or other authorized users. From within a company, an intranet server may respond much more quickly than a typical Web site. The internet is worldwide, and can be accessed from any computer with an internet connection. Intranet is like local internet, i.e. can only be accessed on a web of computers, like a business, or a school. things on the intranet can sometims be accessed via the internet though. Don't know what the extranet is EXTRANET: The Extranet is a portion of an organizations Intranet that is made accessible to authorized outside users without full access to entire organizations' intranet

____________________________________________________________________ _ Sahithi Systems Private Limited

Internet INTERNET EXPLORER: Windows Internet Explorer (formerly Microsoft Internet Explorer abbreviated MSIE), commonly abbreviated to IE, is a series of graphical web browsers developed by Microsoft and included as part of the Microsoft Windows line of operating systems starting in 1995. It has been the most widely used web browser since 1999, attaining a peak of about 95% usage share during 2002 and 2003 with IE5 and 6 but steadily declining since, despite the introduction of IE7. Microsoft spent over 100 million dollars (USD) a year [1] in the late 1990s, with over 1000 people working on IE by 1999 MICROSOFT INTERNET EXPLORER: The Internet Explorer project was started in the summer of 1994 by Thomas Reardon and subsequently led by Benjamin Slivka, leveraging source code from Spyglass, Inc. Mosaic, an early commercial web browser with formal ties to the pioneering NCSA Mosaic browser. In late 1994, Microsoft licensed Spyglass Mosaic for a quarterly fee plus a percentage of Microsoft's non-Windows revenues for the software. Although bearing a name similar to NCSA Mosaic, which was the first widely used web browser, Spyglass Mosaic was relatively unknown in its day and used the NCSA Mosaic source code only sparingly.[3] Internet Explorer for Mac and Internet Explorer for UNIX (the latter for use through the X Window System on Solaris and HP-UX), and versions for many older versions of Windows have been discontinued, and are no longer available from Microsoft. Only supported Windows, and Windows Mobile versions remain in active development.

MOSTLY USED VERSIONS: Version 5: Internet Explorer 5: Internet Explorer 5.0, launched on March 18, 1999, and subsequently included with Windows 98 Second Edition and bundled with Office 2000, was another significant release that supported bi-directional text, ruby characters, XML, XSLT and the ability to save web pages in MHTML format. IE5 was bundled with Outlook Express 5. Also, with the release of Internet Explorer 5.0, Microsoft released the first version of XML Http Request, giving birth to Ajax (even though the term "Ajax" wasn't coined until years later.) It was the last with a 16-bit version. Internet Explorer 5.01, a bug fix version, was released in December 1999. Windows 2000 includes this version. ____________________________________________________________________ _ Sahithi Systems Private Limited 7

Internet Internet Explorer 5.5 followed in July 2000, improving its print preview capabilities, CSS and HTML standards support, and developer APIs; this version was bundled with Windows Me. Version 5.5 also included support for 128-bit encryption. However, Version 5 was the last version for Mac and UNIX. Version 5.5 was the last to have Compatibility Mode, which allowed Internet Explorer 4[14] to be run side by side with the 5.x.[9][15] The IE team consisted of over 1000 people by 1999, with funding on the order of 100 million USD per year.[1][16] Version 6 Internet Explorer 6 Internet Explorer 6.0 was released on August 27, 2001, a few months before Windows XP. This version included DHTML enhancements, content restricted inline frames, and partial support of CSS level 1, DOM level 1 and SMIL 2.0.[17] The MSXML engine was also updated to version 3.0. Other new features included a new version of the Internet Explorer Administration Kit (IEAK), Media bar, Windows Messenger integration, fault collection, automatic image resizing, P3P, and a new look-and-feel that was in line with the "Luna" visual style of Windows XP, when used in Windows XP. Internet Explorer 6.0 SP1 offered several security enhancements and coincided with XP SP1 patch release. In 2002, the Gopher protocol was disabled and support for it was dropped in Internet Explorer 7.[18] Internet Explorer 6.0 SV1 ('6 SP2')[19] came out August 6, 2004 for Windows XP SP2 and offered various security enhancements and new color buttons on the user interface. IE6 updated the original 'blue e' logo to a lighter blue and more 3-d look.[9] Version 7 Internet Explorer 7 Internet Explorer 7 was released on October 18, 2006. It includes bug fixes, enhancements to its support for web standards, tabbed browsing with tab preview and management, a multiple-engine search box, a web feeds reader, Internationalized Domain Name support (IDN), and antiphishing filter. With IE7, Internet Explorer has been decoupled from the Windows Shell - unlike previous versions, the Internet Explorer ActiveX control is not hosted in the Windows Explorer process, but rather runs in a separate Internet Explorer process. It is included with Windows Vista and Windows Server 2008, and is available for Windows XP Service Pack 2 and later, and Windows Server 2003 Service Pack 1 and later. The original release of Internet Explorer 7 required the computer to pass a Windows Genuine Advantage validation check prior to installing, but on October 5, 2007, ____________________________________________________________________ _ Sahithi Systems Private Limited 8

Internet Microsoft removed this requirement. As some statistics show, by mid-2008, Internet Explorer 7 exceeded Internet Explorer 6 in number of users.[20] Version 8 This article or section contains information about computer software currently in development. The content may change as the software development progresses. Internet Explorer 8 The Wikipedia Main Page on Internet Explorer 8, Beta 1 running on Windows Vista. Internet Explorer 8.0 is the latest version of Internet Explorer and has been in development since August 2007 at the latest.[21] On March 5, 2008, the first public beta (Beta 1) was released to the general public.[22] It supports Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista and Windows Server 2008 on both 32-bit as well as 64-bit architectures.[23] Security, ease of use, and improvements in RSS, CSS, and Ajax support are Microsoft's priorities for IE8.[24][25] It includes much stricter compliance with web standards, including a planned full Cascading Style Sheets 2.1 compliance for the release version. [26] All these changes allow Internet Explorer 8 to pass the Acid2 test.[27] However, to prevent compatibility issues, IE8 also includes the IE7 rendering behavior. Sites that expect IE7 quirks can disable the IE8's breaking changes by including a meta element. IE8 also includes numerous improvements to JavaScript support as well as performance improvements.[26] It includes support for Activities - which allow supported web applications to be invoked without explicitly navigating to them - and WebSlices - which allows portions of page to be subscribed to and monitored from a redesigned Favorites Bar.[26] An enhanced phishing filter (now called Safety filter) blocks access to sites known to contain malware. Features: Internet Explorer has been designed to view a broad range of web pages and to provide certain features within the operating system, including Microsoft Update. During the heyday of the historic browser wars, Internet Explorer superseded Netscape only when it caught up technologically to support the progressive features of the time.[28]

____________________________________________________________________ _ Sahithi Systems Private Limited

Internet Usability and accessibility: Organizing Favorites in Internet Explorer 6Internet Explorer makes use of the accessibility framework provided in Windows. Internet Explorer is also a user interface for FTP, with operations similar to that of Windows Explorer (although this feature requires a shell window to be opened in recent versions of the browser, rather than natively within the browser). Visual Basic for Applications (VBA) is not supported, but available via extension (iMacros). Recent versions feature pop-up blocking and tabbed browsing. Tabbed browsing can also be added to older versions by installing Microsoft's MSN Search Toolbar or Yahoo's Yahoo Toolbar. INTERNET CONNECTION: DIFFERENT CONNECTION TYPES: --> Introduction to Narrowband & Broadband Internet Connections The Internet is an incredible tool that is becoming more prevalent throughout the world everyday. From the early days of dial-up Internet connections to the cutting edge Wi-Fi Internet connections and satellite broadband, the Internet keeps on growing, becoming more and more layered and useful. The following guide has been set up so as to provide an introduction to the various types of Internet connections ranging from dial-up to OC24. Narrowband Internet Connections Dial-Up Internet: A dial-up Internet connection is the most basic and therefore the slowest type of Internet connection that you can get. Connection rates for dial-up modems tend to fall between 2,400 bps & 56,000 bps, which is incredibly slow for todays high speed Internet and applications. Dial-up modems are attached internally or externally to a given computer, and then connected using a standard telephone cable. All in all, dial-up Internet connections are outdated and representative of an older and more basic Internet. ISDN: ISDN (Integrated Services Digital Network) Internet connections are a type of digital telephone connection. ISDN connections straddle the line between basic narrowband Internet connections and more advanced broadband Internet connections due to the fact that Basic Rate Interface (BRI) ISDN connections transmit data right around the broadband cutoff at 100 Kbps. Although a better Internet connection option than dialup, ISDN connections are still more or less outdated. Broadband Internet Connections ____________________________________________________________________ 10 _ Sahithi Systems Private Limited

Internet

Digital Cable Broadband: Cable broadband Internet connections are the most common type of broadband service. Connecting to the Internet via your cable television signal, cable broadband Internet connections offer data transfer rates of approximately 1.5 Mbps, far exceeding those offered by either dial-up or ISDN connection types. DSL: Digital Subscriber Line Internet connections are the second most common type of broadband service offering data transfer speeds similar to those of cable broadband (_1.5 Mbps). DSL services connect to the Internet via copper telephone wires. The difference between DSL and dial-up / ISDN is that a DSL Internet connection uses a high speed dedicated circuit filtering out standard phone calls and Internet signals. WI-FI: Wireless Fidelity Internet Connections are currently the hot commodity in high speed connectivity. They boast similar transfer speeds as digital cable and DSL broadband, but they dont require any type of physical connection in order to transmit/receive a signal. T-Carrier Broadband: T-Carrier Internet connections are some of the fastest available in the world and are generally reserved for use by large businesses and universities. T1 and T3 Internet connections are the most common T-Carrier types, and can cost as much as $800 and $15,000 per month respectively. T-1 lines boast speeds of 1.54 Mbps whilst T3 lines boast astounding speeds of around 45 Mbps. OC24: An OC24 (Optical Carrier level 24) Internet connection is a fiber optic connection capable of transferring data at a mind-boggling rate of 1.244 Gbps. This is pretty much the fastest Internet connection that you can get and generally serves as the backbone of various NAPS (Network Access Points).

VPN: VIRTUAL PRIVATE NETWORK: A virtual private network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. The link-layer protocols of the virtual network are said to be tunneled through the larger network when this is the case. One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. ____________________________________________________________________ 11 _ Sahithi Systems Private Limited

Internet VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features. A VPN may have best-effort performance, or may have a defined service level agreement (SLA) between the VPN customer and the VPN service provider. Generally, a VPN has a topology more complex than point-to-point. The distinguishing characteristics of VPNs are not security or performance, but that they overlay other network(s) to provide a certain functionality that is meaningful to a user community The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need: A way to maintain fast, secure and reliable communications wherever their offices are. Diagram: Virtual Private Network Image Gallery

A typical VPN might have a main LAN at the corporate headquarters of a company, other LANs at remote offices or facilities and individual users connecting from out in the field. See more pictures of virtual private networks. Until fairly recently, this has meant the use of leased lines to maintain a wide area network (WAN). Leased lines, ranging from ISDN (integrated services digital network, 128 Kbps) to OC3 (Optical Carrier-3, 155 Mbps) fiber, provided a company with a way ____________________________________________________________________ 12 _ Sahithi Systems Private Limited

Internet to expand its private network beyond its immediate geographic area. A WAN had obvious advantages over a public network like the Internet when it came to reliability, performance and security. But maintaining a WAN, particularly when using leased lines, can become quite expensive and often rises in cost as the distance between the offices increases. As the popularity of the Internet grew, businesses turned to it as a means of extending their own networks. First came intranets, which are password-protected sites designed for use only by company employees. Now, many companies are creating their own VPN (virtual private network) to accommodate the needs of remote employees and distant offices. Basically, a VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together. Instead of using a dedicated, real-world connection such as leased line, a VPN uses "virtual" connections routed through the Internet from the company's private network to the remote site or employee. In this article, you will gain a fundamental understanding of VPNs, and learn about basic VPN components, technologies, tunneling and security. Virtual private networks help distant colleagues work together, much like desktop sharing What Makes a VPN? A well-designed VPN can greatly benefit a company. For example, it can: Extend geographic connectivity Improve security Reduce operational costs versus traditional WAN Reduce transit time and transportation costs for remote users Improve productivity Simplify network topology Provide global networking opportunities Provide telecommuter support Provide broadband networking compatibility Provide faster ROI (return on investment) than traditional WAN What features are needed in a well-designed VPN? It should incorporate:

____________________________________________________________________ 13 _ Sahithi Systems Private Limited

Internet

Authentication before VPN Connection A known trusted user, sometimes only when using trusted devices, can be provided with appropriate security privileges to access resources not available to general users. Servers may also need to authenticate themselves to join the VPN. There are a wide variety of authentication mechanisms, which may be implemented in devices including firewalls, access gateways, and other devices. They may use passwords, biometrics, or cryptographic methods. Strong authentication involves combining cryptography with another authentication mechanism. The authentication mechanism may require explicit user action, or may be embedded in the VPN client or the workstation.

Remote-Access VPN: There are two common types of VPN. Remote-access, also called a virtual private dial-up network (VPDN), is a user-to-LAN connection used by a company that has employees who need to connect to the private network from various remote locations. Typically, a corporation that wishes to set up a large remote-access VPN will outsource to an enterprise service provider (ESP). The ESP sets up a network access server (NAS) and provides the remote users with desktop client software for their computers. The telecommuters can then dial a toll-free number to reach the NAS and use their VPN client software to access the corporate network. A good example of a company that needs a remote-access VPN would be a large firm with hundreds of sales people in the field. Remote-access VPNs permit secure, encrypted connections between a company's private network and remote users through a third-party service provider. Diagram:

____________________________________________________________________ 14 _ Sahithi Systems Private Limited

Internet

Site-to-Site VPN: Through the use of dedicated equipment and large-scale encryption, a company can connect multiple fixed sites over a public network such as the Internet. Site-to-site VPNs can be one of two types: Intranet-based - If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect LAN to LAN. Extranet-based - When a company has a close relationship with another company (for example, a partner, supplier or customer), they can build an extranet VPN that connects LAN to LAN, and that allows all of the various companies to work in a shared environment.

Analogy: Each LAN is an Island Imagine that you live on an island in a huge ocean. There are thousands of other islands all around you, some very close and others farther away. The normal way to travel is to take a ferry from your island to whichever island you wish to visit. Of course, traveling on a ferry means that you have almost no privacy. Anything you do can be seen by someone else. Let's say that each island represents a private LAN and the ocean is the Internet. Traveling by ferry is like connecting to a Web server or other device through the Internet. ____________________________________________________________________ 15 _ Sahithi Systems Private Limited

Internet You have no control over the wires and routers that make up the Internet, just like you have no control over the other people on the ferry. This leaves you susceptible to security issues if you are trying to connect between two private networks using a public resource. Continuing with our analogy, your island decides to build a bridge to another island so that there is easier, more secure and direct way for people to travel between the two. It is expensive to build and maintain the bridge, even though the island you are connecting with is very close. But the need for a reliable, secure path is so great that you do it anyway. Your island would like to connect to a second island that is much farther away but decides that the cost are simply too much to bear. This is very much like having a leased line. The bridges (leased lines) are separate from the ocean (Internet), yet are able to connect the islands (LANs). Many companies have chosen this route because of the need for security and reliability in connecting their remote offices. However, if the offices are very far apart, the cost can be prohibitively high -- just like trying to build a bridge that spans a great distance. So how does VPN fit in? Using our analogy, we could give each inhabitant of our islands a small submarine. Let's assume that your submarine has some amazing properties: It's fast. It's easy to take with you wherever you go. It's able to completely hide you from any other boats or submarines. It's dependable. It costs little to add additional submarines to your fleet once the first is purchased. In our analogy, each person having a submarine is like a remote user having access to the company's private network.

____________________________________________________________________ 16 _ Sahithi Systems Private Limited

Internet

diagram :

Although they are traveling in the ocean along with other traffic, the inhabitants of our two islands could travel back and forth whenever they wanted to with privacy and security. That's essentially how a VPN works. Each remote member of your network can communicate in a secure and reliable manner using the Internet as the medium to connect to the private LAN. A VPN can grow to accommodate more users and different locations much easier than a leased line. In fact, scalability is a major advantage that VPNs have over typical leased lines. Unlike with leased lines, where the cost increases in proportion to the distances involved, the geographic locations of each office matter little in the creation of a VPN.

TECHNICAL QUESTIONS: What is a Modem? Ans: Modem converts analog to digital data and vice-versa. As name indicates its main function is modulation and demodulation. ____________________________________________________________________ 17 _ Sahithi Systems Private Limited

Internet

What is a Router? Ans Router acts as interface between two different networks. It is an intelligent device that can takes decisions well and has a capability to replace a server in a network. b) A modem can be used in a network. c) A modem can be connected in a network before router/switch/hub.

How to delete temp files? Ans: Not to be confused with temporary Internet files, temporary program files are files used to store data currently being worked on, or information to be swapped with the operating system or other programs. These files can cause several issues and it has been found that searching for these files or manually deleting these files can help prevent issues or resolve issues with the computer. If you are running Windows 2000, Windows 95, Windows 98, Windows NT, Windows ME, Windows XP follow the below instructions to remove any temporary files currently residing on the computer. Click Start / Find and click Find Files or folders In the named box type *.tmp to search for any files ending with tmp. Verify that Look in section of the search box is pointing to the C: drive and not Document Folders. Click Find Now Delete all files that are found Once the above section has been done it is also recommend that you ensure that the temporary folder on the hard disk is empty by following the below instructions. Double-click My Computer Double-click the C: drive Double-click the Temp folder (if present) verify that all files within this folder are deleted. Close the window and re-open My Computer Double-click the C: drive Double-click the Windows folder Double-click the Temp folder (if present) verify that all files within this folder are deleted.

____________________________________________________________________ 18 _ Sahithi Systems Private Limited

Internet

What are Cookies? Ans : Temporary storage files. They can store our user ID and password. When system effected with spy ware.We must have anti spy ware in order to protect from spy ware. Difference between Dial-up and DSL? Ans : Using dial up we get point to point connection .But using DSL we cannot. Speed of dial up is only 54 kbps. But broadband or DSL speed is up to 512 kbps. What should we do to keep the performance good? Ans : To keep the performance good: 1)Delete cookies and temporary files. 2)Delete popups. 3) Load good anti-virus.

How to delete unwanted software on the computer? Ans: go to start-settings-control panel-add/remove programs-delete particular software. procedure to delete cookies Ans: open IE-tools-internet options-general-delete cookies ok.

what are the basic differences between DSL and dial up mode. Ans : DSL transfer both data as well as voice signals but in dial-up either of it exit at a given instant. What are the basic requirements to set up an internet connection. *ISP Moderm Cables ROUTER ____________________________________________________________________ 19 _ Sahithi Systems Private Limited

Internet HUB/SWITCH...

What are LAN cards? Ans :A network card or NIC (Network Interface Card) is a piece of computer hardware designed to allow computers to communicate over a computer network It provides a low-level addressing system through the use of MAC addresses. It allows users to connect to each other either by using cables or wirelessly. IP is responsible for moving packets of data from node to node.IP forwards each packet based on a four byte destination address(IP address) What is a Proxy Server? Ans : A server which services the requests of its clients by forwarding requests to other servers. The Proxy server provides the resources by connecting to the specified server and requesting the service on behalf of the client. What is MAC address. Where do you find them. What are the commands for finding MAC address? Ans :Media Access Control address, a hardware address that uniquely identifies each node of a network. Mac is attached to network adapters. IP config/ALL or start-->run-->get MAC. What is are Cookies? Ans : A cookie is a small piece of information sent by a web server to store on a web browser ,so it can later be read back from that browser. This is useful for having the browser to remember the specific information. What is DNS? Ans :Domain naming service An internet device that translates domain names into ip addresses and viceversa. What is a TRACE Route? Ans : This command displays the series of IP routes that are used in delivering packets from your computer to the destination and how long it took on each hop. ____________________________________________________________________ 20 _ Sahithi Systems Private Limited

Internet

What is a Browser .What are different type of Browsers? Ans: It is a software that access and display pages and file on the web .Browser requires a connection to the internet Popular web browsers include: Mozilla fireFox ,Internet Explorer ,Sfari and Netscape. What is a Throttling? Ans :It is a method of assigning different bandwidths in different ways . What is Ethernet? Ans :It is a contention media, access methods which is used to handle multiple users request with CSMA/CD as its basic protocol (Carrier Session Multiple Access Collision Detection) What is the basic function of Modem? Ans :It converts digital signals to analog and vice-versa, when data is converted from digital to analog its frequency becomes less. So it is internally modulated. Again while displaying on to the screen it is demodulated from analog to digital. What is Subnetting and Supernetting? Ans: Subnetting :Dividing larger network to smaller groups. Supernetting : Making small networks into major groups by joining them. What is a power cycle? Ans :Refreshing of computer and modem a) Turn off the computers(shut down) b) Turn off the Modem c) Unplug the cables from modem now replug the cables into modem Turn on the power of modem and wait for few seconds until the lights get stable. turn on the computer. What is Registry? ____________________________________________________________________ 21 _ Sahithi Systems Private Limited

Internet Ans :It is the place where you find all the information regarding your computer ,ex:files, softwares installed etc.. What is Spoofing? Ans :It is creation of TCP/IP packets using somebody else IP addresses. What is TELNET? Ans It is a network protocol used on the internet or LAN connections .It also refers to software which implements the client part of the protocol. Can you run a PC without an hard disk? Ans :Yes, We can run a PC without hard disk using a BOOT server which sends the operating system to the target machine and in addition to that it acts as a DHCP server to provide IP address. You need a DOS in floppy or CD. What is a Cluster? Ans :Group of servers which acts as a single server in client or in application point of view. What is a Search Engine? Ans :It is a software program that reaches for sites based on the words that designate as search terms. They look through own data bases information in order to find what is it, you are looking for. What is the difference between URL and Link? Ans : An URL(UNIFORM RESOURCE LOCATOR) is an address Link. A link is time of text that when clicked takes a person to the URL. What is proxy server? Ans : It is a server which forwards the request of its client to other servers. ex: Win proxy. What is MAC? Ans: Media Access Control ____________________________________________________________________ 22 _ Sahithi Systems Private Limited

Internet it is the permanent address of NIC card .It is assigned by manufacturer. How do You find default gate way in my computer window when connected to router? Ans: go to DOS prompt and type IPCONFIG/ALL.

What could be the possible errors if found page cannot be displayed? Ans : Physical connection, lights on the modem, virus, firewall settings , no access of net. why do you run a scan disk? Ans: To detect the corrupted and unwanted files. Define internet protocol. Ans: Internet protocol is responsible for moving packets or data from one node to other. IP forwards each packet based on a 4 byte destination address. What are types of inter networking? Ans: An interconnection among or between public, private, commercial industrial or govt networks may also be defined as an Internet work There are three types: Intranet Extranet Internet Intranet: set of interconnected networks using the internet protocol and uses ip based tools as web branches and ftp tools, that is under the control of a single administrative entity. That administrative entity classes the intranet to the rest of the world and allows only specific users. Extranet: Is limited in scope to a single organized or entity but which also has limited connections to the network of one or more other usually, but not necessarily trusted organized or entities. An extranet cannot consist of a single LAN, it must have at least one connection with an external network. ____________________________________________________________________ 23 _ Sahithi Systems Private Limited

Internet

Internet: A specific internet work consisting of a world wide interconnection of governmental, academic public and private network. What are the devices used for wireless network connection? Ans: Access points(Bluetooth, Infrared) How do you block the pop-ups? Ans: Internet explorertoolspop-up blockerpop-up blocker settings. How do you delete software from your computer? Ans: startcontrol paneladd or remove programsselect the software which you want to delete click change/remove. Expand OSRI? Ans: Operating System Re Installation. How to delete temporary files in a computer? Ans: startruntype %temp% now you can delete files you want to delete. Internet Explorertoolsinternet optionswindows with 7 tabs is openedgeneral tabdelete filesapply okclose. What are the protocols used for sending mails? Ans: SMTP and FTP .And for receiving mails we use POP and IMAP. Where is virtual memory located in your computer? Ans: right click on my computerpropertiesadvancedperformancesettingsadvancedvirtual memory. How do you block the pop-ups? Ans: internet explorertoolspop-up blockerpop-up blocker settings. What is a server? ____________________________________________________________________ 24 _ Sahithi Systems Private Limited

Internet Ans: A server is primarily a program that runs on a machine, providing a particular and specific service to other machines connected to the machine on which it is found What is a client? Ans: The client-server software architecture model distinguishes client systems from server systems, which communicate over a computer network. A client-server application is a distributed system comprising both client and server software. A client software process may initiate a communication session, while the server waits for requests from any client. Client/server model Client/server describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request. Although the client/server idea can be used by programs within a single computer, it is a more important idea in a network. In a network, the client/server model provides a convenient way to efficiently interconnect programs that are distributed across different locations. Computer transactions using the client/server model are very common. Most Internet applications, such as email, web access and database access, are based on the client/server model. For example, a web browser is a client program at the user computer that may access information at any web server in the world. To check your bank account from your computer, a web browser client program in your computer forwards your request to a web server program at the bank. That program may in turn forward the request to its own database client program that sends a request to a database server at another bank computer to retrieve your account balance. The balance is returned back to the bank database client, which in turn serves it back to the web browser client in your personal computer, which displays the information for you.

____________________________________________________________________ 25 _ Sahithi Systems Private Limited

Das könnte Ihnen auch gefallen