Sunday, February 27, 2011

5 Threats To Your Home Wireless Connection

Keeping your wireless connection safe should be a top priority, especially if you use your wireless laptop or cell phone to login to secure financial accounts or business email. We all use the internet to access personal information, do banking, and chat in private to friends. Image if someone was watching you, browsing through your files, or recording your every move on your computer? Well don’t just sit there and think that it will not happen to you! If you have a wireless connection then you should make sure it is safe and secure by adding at least one simple security measure. Wireless network security is very important when it comes to protecting your privacy and precious data.

The Risks of a Weak Wireless Connection

Last year, the Washington Post report on a series of Facebook scams. Hackers would break into people’s Facebook accounts, claim to have been robbed in a foreign country, and ask their Facebook friends for someone to wire them money. Could this fool your family and friends into handing over hundreds or thousands of dollars?

One thing that makes this possible is that hackers can access your Facebook account, no matter how strong your password, if they can snoop on your wireless connection. They don’t need special equipment to do this—any basic wireless card lets hackers snoop on wireless connections using free software.

Wireless Connection Threats

There are three ways to protect yourself from wireless connection hackers:

  1. Don’t use a wireless connection. Always plug your computer into a blue Ethernet cord.
  2. Only use a wireless connection at least 1/2 mile (about 1 kilometer) away from any hackers.
  3. Secure your wireless connection from the five types of threats described in this article.

Wireless Connection Threat #1: Unencrypted Connections

Unencrypted connections are great—they’re easy to set up on your wireless router and all of your devices connect automatically. But because they’re unencrypted, hackers can eavesdrop on all of your wireless traffic. Well, almost all of your wireless traffic—anything that uses Secure Socket Layer (SSL) encryption like websites starting with HTTPS will be encrypted.

Unfortunately, although Facebook and GMail and other sites use SSL for login screens, they don’t use it for their regular connections. In these cases, hackers can still break into your accounts by reading the cookie your Web browser sends to Facebook and Google every time you connect.

If you own the wireless connection, your best solution is to enable encryption on your router. Choose WPA encryption if possible, but on older routers you’ll need to settle for WEP. See the next section for information on the risks of WEP.

If you don’t own the wireless connection, for example you’re at a library or coffee shop, then you need to protect your connection by using a Virtual Private Network (VPN) or by using one of the plugins for your browser which force Facebook, GMail, and other services to use SSL.

Wireless Connection Threat #2: WEP

The Wired Equivilance Privacy (WEP) system was part of the original specification for wireless Internet, but within a few years of being released, hackers figured out how to break it. In 2007, three cryptoanalysts broke into a WEP connection using a 1.7 GHz laptop in less than 1 minute. They published their technique and now any hacker can use it to eavesdrop on any WEP-protected connection.

WEP has been officially replaced by Wifi Protected Access (WPA), but many old routers only support WEP. If you have an option to use WPA, please use it. If you don’t have support for WEP on your router and you’re concerned about security, you should see if the manufacturer of your router offers a firmware upgrade. Otherwise you should buy a newer router.

Wireless Connection Threat #3: Weak Passwords

WPA lets you secure your wireless connection using a password, but this password can be hacked like any other weak password. Because this password helps keep all of your other passwords secure, you should put some extra thought into making it very secure. Besides, you’ll only have to type it once on each computer, so it won’t be much of a hassle to make it extra hard to guess.

I suggest you add a few numbers and some punctuation to your password to help keep hackers from guessing it. Also make sure it’s at least 8 characters long—and preferably 12 characters or more.

Wireless Connection Threat #4: Snooping Users

No matter how secure you make your wireless network using WPA and strong passwords, you still must trust every user you let onto your network. Once users have access to your network, they can snoop on every packet sent on your wireless connection.

For example, if you’re at a hotel which uses WPA and you log into Facebook, any hacker who’s in a nearby room can also use his WPA-protected connection to snoop on your packets. At an office, employees can snoop on the boss’s WPA connection to get access to confidental information.

High-end routers can give each user their own secure connection, or you can just buy separate cheap routers for each class of user—for example, one router for managers and one router for employees.

Wireless Connection Threat #5: Traffic Analysis

One of the most advanced hacker techniques which is probably not used much in the real world is called traffic analysis. It lets hackers snoop on certain communication even when it’s encrypted.

For example, researchers from John Hopkins University in Maryland, US, were able to decode encrypted voice-over-IP (VoIP) phone calls by looking at the size of the encrypted packets. The sound “c” produced small packets, but the sound “ow” produced a big packet, so a small packet followed immediately by a large packet might mean someone said, “cow”.

Other researchers and possibly hackers can use traffic analysis to figure out all sorts of interesting things about your communication. There’s no easy solution to traffic analysis—you have to hope the people who make your software read the security journals. However, you can try to avoid sending highly-sensitive information on the same wireless communication network hackers use.

Having inadequate network security can cause problems with home networks.

Sunday, February 13, 2011

Advantages and Disadvantages of Broadband Internet

There are many advantages and disadvantages in using a broadband internet connection and in case you’re planning to start using a broadband internet connection it is highly important to compare the advantages with the disadvantages to see how it matches your needs. Below are the advantages and the disadvantages of using a broadband connection.

Advantages

1. The Speed it Provides is Next to None

One major advantage of using a broadband connection is its incredible speed. Compared to other forms of internet connection a broadband connection is very fast and in most cases it can be more than 100 times faster than a dial-up connection. This makes it more useful and effective for someone who plans to download and upload large files on a regular basis. It will also be a great option for you if you spend a large percentage of your time online.

2. It is Not Dependent on Weather

Another major advantage of a broadband internet connection is that it is more reliable than other forms of internet connection. If you take a look at a dial-up connection you will notice it is mainly influenced by the weather and there are some days you won’t even be able to access the internet as a result of bad weather, a major advantage of a broadband connection is that it is reliable. Come rain come sun, a broadband connection will always be as effective.

3. It has the Best Service Delivery

A broadband internet connection is also very consistent and it always delivers up to expectation. Since dial-up connection is mainly influenced by weather you should be expecting slow speed on days with bad weather, this is not the case with a broadband connection and the speed will always be as consistent irrespective of the weather condition.

4. It is Easy to Use

A broadband connection is also easy to use compared to a dial-up connection. In most cases, you will be automatically connected when you start your computer so you won’t have any problem trying to re-enter your username and password when trying to access the internet. A broadband connection also saves your time and you won’t be experiencing technical glitches like constant disconnection (as is the case with a dial-up connection).

5. You Won’t be Charged Based on Your Duration Online

Imagine using a very slow dial-up connection that takes ages to load and download files only to have to pay hectic bills at the end of the month because you spent a lot of time online. Most broadband ISP offer you unlimited bandwidth and very few place a quota on you – the result is that you get more from your money since you’re able to use it effectively.

Disadvantages

1. It Can be More Expensive Compared to a Dial-up

One major disadvantage of a broadband connection is its price because if you’re someone who doesn’t spend much time online you will be charged the same amount whether you use the internet or not. While a dial-up connection can be economical for those who spend little time online you will get the best from a broadband connection if you spend most of your time online.

2. High Security Risk

Due to its flexibility and availability it can be easy to hack a broadband network. If you use a wireless broadband connection it can be very dangerous if you leave the default settings. In most cases, in order to get the best form of security from your broadband connection it is highly important to work on making it more secure.

Conclusion

Based on the advantages and disadvantages above you will notice that investing a broadband internet connection can be a great investment for you.

Sunday, February 6, 2011

Limiting Internet Access Based on User Profile Using ASA and RADIUS

Introduction

Traditionally, IP Access lists (ACLs) have been used to restrict access to internal resources or to the Internet. With the growing complexity of networks, ACLs fail to provide the kind of dynamic access restrictions that are required. In this Chalk Talk, I am going to summarize Chapter 10 “Cut-through Proxy AAA on PIX/ASA” of the book AAA Identity Management Security, which discusses how ASA and RADIUS can be used to restrict access to Internet (and other network resources) based on user profile.


Cut-through Proxy Authentication

In normal scenarios, traffic from users is checked against interface ACLs and, based on Layer 3 and Layer 4 information, the packet is allowed or dropped. These interface ACLs are the same for all users.

Using the cut-through proxy authentication feature on ASA, it is possible to enforce authentication on all or certain types of traffic. After authentication, certain types of traffic can be denied or permitted based on user profile

To further elaborate the point, consider a situation where all traffic to the Internet goes through an ASA. You want to permit HTTP traffic for everyone but you also want to allow Telnet, FTP and RDP for a group of specific users only. In this situation, the following 2 things will be applied:

  • An interface ACL permitting HTTP traffic outbound to the Internet
  • A cut-through proxy authentication for Telnet, FTP and RDP traffic

Now when ASA receives an outbound Telnet, FTP or RDP traffic on the inside interface, it will enforce authentication and then, based on user profile received from the authentication server, the traffic will be permitted or denied.

The following figure summarizes the steps involved in a typical cut-through proxy authentication.




Configuring Cut-through Proxy Authentication

You should remember the following rules before configuring Cut-Through proxy authentication:

  • You can configure ASA to enforce authentication on multiple types of sessions; however, the user needs to authenticate only once. This means that after the first authentication, the user profile is cached by the ASA for a duration specified by the User Authentication (uauth) timer.
  • When the user authenticates, and ASA activates the uauth timer, those authenticated users will not be required to authenticate again and their traffic will be matched against the profile received from the authentication server.
  • ASA supports direct authentication with FTP (TCP port 21), Telnet (TCP port 23), HTTP (TCP port 80), and HTTPS (TCP port 443). A user must first authenticate with one of these services before the security appliance allows other traffic that requires authentication.
  • For Telnet and FTP, the security appliance generates an authentication prompt. For HTTP, the security appliance uses basic HTTP authentication and provides an authentication prompt. For HTTPS, the security appliance generates a custom login screen.
  • ASA provides means to authenticate users using Virtual Telnet and HTTP sessions in case you do not want to enforce authentication on the supported protocols. This means that if you want to authenticate any other type of traffic, say RDP (TCP port 3389), users will need to initiate a Virtual Telnet or HTTP session to the ASA and authenticate first. When authenticated, they can initiate the other type of sessions. Virtual HTTP and Virtual Telnet sessions are discussed in detailed later in this Chalk Talk.

Before enabling cut-through proxy authentication, configure an extended ACL that defines the traffic on which authentication needs to be enforced. Permit statements in the access list define which traffic needs to be authenticated. Deny statements define which traffic needs to be excluded from authentication.

Assuming you already added a RADIUS server on ASA, the following command will enable cut-through proxy authentication:

aaa authentication match acl_name interface_name server_tag

Note that the interface_name specifies the interface where the traffic is received.

Going back to our example, to enforce authentication on Telnet, FTP and RDP traffic outbound to the Internet, the following configuration can be used:

aaa-server radiusserver protocol radius

aaa-server radiusserver host 10.1.2.10

key test

access-list myauth permit tcp 10.0.0.0 255.0.0.0 any eq 23

access-list myauth permit tcp 10.0.0.0 255.0.0.0 any eq 21

access-list myauth permit tcp 10.0.0.0 255.0.0.0 any eq 3389

aaa authentication match myauth inside radiusserver


Virtual Telnet, Virtual HTTP and HTTP Redirection

As mentioned earlier, ASA supports direct authentication with HTTP, HTTPS, FTP, and Telnet protocols only. If authentication is required for any other protocol, the user must authenticate using the supported protocols first. If you do not want to enforce authentication for any of the supported protocols, you can use the Virtual Telnet, Virtual HTTP, or HTTP Redirection features in ASA.

For this section consider an example where you have applied an interface ACL permitting all IP traffic except outbound RDP session to the Internet. Now there is a requirement to permit RDP sessions for a group of users. In this situation you can enforce authentication on RDP using the following commands:

access-list myauth permit tcp 10.0.0.0 255.0.0.0 any eq 3389

aaa authentication match myauth inside radiusserver

Because RDP traffic cannot be authenticated directly, ASA will drop all RDP traffic after applying the above configuration.. You will need to use one of the methods discussed in this section to first authenticate the user.

Each of the three methods of authenticating unsupported protocols—Virtual Telnet, Virtual HTTP and HTTP Redirection—have their own advantages and disadvantages. Your network, the technical level of the end users, security considerations, and other related considerations determine which method is best for you. Each of the three methods are discussed below:

  • Virtual Telnet - The Virtual Telnet feature enables you to configure an IP address to which users can Telnet to authenticate. When an unauthenticated user Telnets to this IP address, the user is challenged for a username and password, and then authenticated by the RAIUS server. When authenticated, the user sees the message “Authentication Successful” and is disconnected. The user can now access other services that require authentication. The IP Address used for Virtual telnet has to be in the same subnet as the interface on which ASA receives the traffic that needs to be authenticated. ASA will respond to the ARP queries received for the virtual IP address. To configure Virtual Telnet, use the following command:

    virtual telnet virtual_telnet_ip_address

    If you use Virtual Telnet, the example given above will change to the following:

    access-list myauth permit tcp 10.0.0.0 255.0.0.0 any eq 3389

    access-list myauth permit tcp 10.0.0.0 255.0.0.0 10.1.1.20 eq 23

    aaa authentication match myauth inside radiusserver

    virtual telnet 10.1.1.20

  • Virtual HTTP - Virtual HTTP is similar to Virtual Telnet. In this case, the end user uses HTTP to authenticate instead of Telnet. The IP Address and ACL considerations that apply to Virtual Telnet also apply to Virtual HTTP. ASA uses basic HTTP authentication for Virtual HTTP. It redirects all HTTP connections that require AAA authentication to the HTTP server on the security appliance, where the user is prompted for a username and password. To configure Virtual HTTP, use the following command:

    virtual http virtual_http_ip_address

    If you use Virtual HTTP, the example given above will change to the following:

    access-list myauth permit tcp 10.0.0.0 255.0.0.0 any eq 3389

    access-list myauth permit tcp 10.0.0.0 255.0.0.0 10.1.1.20 eq 80

    aaa authentication match myauth inside radiusserver

    virtual http 10.1.1.20

  • HTTP Redirection - Redirection is an improvement over the Virtual HTTP method in that it provides an improved user experience when authenticating. The users can connect to the ASA’s interface IP address directly using HTTP or HTTPS and will get an authentication page. The HTTP page used in this method provides information such as the user’s IP address, authentication status and logout button unlike the Virtual HTTP method where no information is displayed. Another benefit with this method is that a Virtual IP address is not required. You can configure HTTP Redirection using the following command:

    aaa authentication listener http[s] interface_name [port portnum]


uauth Timer

When a cut-through proxy authentication is successful, ASA stores the authentication information and the user profile in its cache. The entry is created on the first authentication and is valid for any subsequent traffic. This means that if more than one kind of traffic needs authentication, the first authentication will be sufficient for all of them as long as the cache entry exists.

The uauth timer determines how long ASA will maintain the cache entry. When the uauth timer expires, the entry is removed, and the user will need to authenticate again. The uauth timer can be absolute or inactivity based. This means that the uauth timer can be made to expire after a fixed period or if there is no activity for a defined period.

In effect, the uauth timer influences the user experience to a great extent. If the timer is too short, the users will need to authenticate many times. If the timer is too long, the risk of misuse is high. So it is advisable that you experiment with the absolute and inactivity uauth timeouts to find the best range suited for your network.

By default, the uauth timer expires in 5 minutes, irrespective of activity status. You can change the uauth timer default using the following command:

timeout uauth hh:mm:ss [absolute | inactivity]

To configure absolute and inactivity timers together, use the command twice. You must ensure that the uauth duration is shorter than the xlate duration. The xlate duration defines the idle time after which an address translation slot is freed. ASA will not accept a timer that is longer than the xlate timer.

You can disable caching by using a uauth timer of 0. The timer can be set to a maximum of 1193:0:0.


Configuring User Profile on RADIUS server for Cut-through Proxy

We know the cut-through Proxy Authentication allows ASA to fetch user profiles from the RADIUS server and permit or deny traffic based on it. What really happens is that the RADIUS server sends an ACL, called downloadable ACL, to the ASA with the Access-Accept packet. ASA replaces the source IP address on the ACL entries with the IP address of the authenticating user and applies it over the Interface ACL. Now, the user’s traffic is checked against this combined ACL before being permitted out. When the uauth timer expires, the downloadable ACL is removed from the ASA.

If you are using CiscoSecure ACS, you can create downloadable ACLs and apply them to the user profile or the user’s group profile. In CiscoSecure ACS 4.x, downloadable ACLs can be configured at Shared Profile Components > Downloadable IP ACLs and applied to the profile from User Setup or Group Setup page.

If you are using CiscoSecure 5.x then downlodable ACLs can be configured at Policy Elements > Authorization and Permissions > Named Permission Objects > Downloadable ACLs. After creating the ACLs, you will need to bind them to anAuthorization Profile, which in turn can be applied to an authorization policy that is being used for Cut-through proxy authentication.

Note that the syntax of the downloadable ACL should match the ACL syntax used by ASA.

If you are not using CiscoSecure ACS then the Cisco vendor-specific attribute cisco-av-pair (Vendor ID 009 and attribute number 001) can be used to define downloadable ACLs in a user profile. An example of the ACL defined as the value for cisco-av-pairattribute is given below:

ip:inacl#1=permit tcp any any eq 3389

ip:inacl#2=permit tcp any any eq 23

Summary

Cut-through proxy AAA is an often neglected part of identity management solutions. Effective use of this feature can strengthen your network security by providing dynamic access policies on a user-by-user basis. It will also ensure that the interface ACLs on ASA stay small and manageable.

Before configuring Cut-through proxy authentication, it is important to identify what traffic needs to be authenticated and remember where you will need to use Virtual Telnet, Virtual HTTP, or HTTP Redirection.

Tuesday, February 1, 2011

Data Backup Site-Smartest Way To Protect Your Data

We all have a myth that the data recovery and back up processes are time consuming and tiresome processes. However it has been made easy by the data back up sites available in these days. There are lots of methods available in the market to provide the back up service based on your requirements. To make use of the online back up service all that you need is a system with an internet connection. It’s more important to choose the right back up service as choosing a good backup policy has become complicated in the modern days.

Most of the net users have a doubt whether our data would be safe when we use the online service or can someone may steal our data? Secure web based data back up storage facility has been introduced due to the technology enhancement of the latest modern trend. This made possible by storing the data in the encrypted form. Even large IT majors have their data back ups in the reliable data back up sites. There are back up sites which offer this service for home users, small enterprises and big companies as well. When you use the service of any data back up site, you need not worry even if your data is lost due to malicious viruses or your system gets crashed due to any unknown reasons.

You can choose the back up files on your own choice. The data backups are done regularly under the fixed intervals to ensure maximum possible security. Start using the data back up site immediately to defend your valuable resources and information.

Monday, January 31, 2011

Basic Networking Concepts & A-Z Networking Terms

Networking Terms - A


access point (AP)
ad hoc (networking)
adapter (network adapter)
address (network address)
ADSL - Asymmetric Digital Subscriber Line
AIM - AOL Instant Messenger
aircard
anonymous proxy
Apache
API - Application Programming Interface
APIPA - Automatic Private IP Addressing
Ares (Galaxy, Lite)
ARP - Address Resolution Protocol
ASP - Application Service Provider
ATM - Asynchronous Transfer Mode
AUP - Acceptable Use Policy
autosense
Azureus

Access point, wireless


Definition: Wireless access points (APs or WAPs) are specially configured nodes on wireless local area networks (WLANs). Access points act as a central transmitter and receiver of WLAN radio signals.

Access points used in home or small business networks are generally small, dedicated hardware devices featuring a built-in network adapter, antenna, and radio transmitter. Access points support Wi-Fi wireless communication standards.

Although very small WLANs can function without access points in so-called "ad hoc" or peer-to-peer mode, access points support "infrastructure" mode. This mode bridges WLANs with a wired Ethernet LAN and also scales the network to support more clients. Older and base model access points allowed a maximum of only 10 or 20 clients; many newer access points support up to 255 clients.

Also Known As: base station


What is Ad-Hoc Mode in Wireless Networking?


Answer: On wireless computer networks, ad-hoc mode is a method for wireless devices to directly communicate with each other. Operating in ad-hoc mode allows all wireless devices within range of each other to discover and communicate in peer-to-peer fashion without involving central access points (including those built in to broadband wireless routers).

To set up an ad-hoc wireless network, each wireless adapter must be configured for ad-hoc mode versus the alternative infrastructure mode. In addition, all wireless adapters on the ad-hoc network must use the same SSID and the same channel number.

An ad-hoc network tends to feature a small group of devices all in very close proximity to each other. Performance suffers as the number of devices grows, and a large ad-hoc network quickly becomes difficult to manage. Ad-hoc networks cannot bridge to wired LANs or to the Internet without installing a special-purpose gateway.

Ad hoc networks make sense when needing to build a small, all-wireless LAN quickly and spend the minimum amount of money on equipment. Ad hoc networks also work well as a temporary fallback mechanism if normally-available infrastructure mode gear (access points or routers) stop functioning.

Ad Hoc Wireless Network Diagram


Wireless Home Network Diagram Featuring Ad Hoc Wi-Fi Connections

Wireless Home Network Diagram Featuring Ad Hoc Wi-Fi Connections

Key Considerations - Using ad hoc Wi-Fi mode eliminates the need for a network router or access point in a wireless home network. With ad hoc wireless, you can network computers together as needed without needing to be in reach of one central location. Most people use ad hoc Wi-Fi only in temporary situations to avoid potential security issues.

Optional Components - Networking an ad hoc layout for Internet access, printers, or game consoles and other entertainment devices is not required for the rest of the home network to function. Simply omit any of these components shown that do not exist in your layout.

Limitations - All devices connecting via ad hoc wireless must possess a working Wi-Fi network adapter. These adapters must be configured for "ad hoc" mode instead of the more typical "infrastructure" mode.

Because of their more flexible design, ad hoc Wi-Fi networks are also more difficult to keep secure than those using central wireless routers / access points.

Ad hoc Wi-Fi networks support a maximum of 11 Mbpsbandwidth, while other Wi-Fi networks may support 54 Mbps or higher.


Adapter


Definition: A network adapter interfaces a computer to a network. The term "adapter" was popularized originally by Ethernet add-in cards for PCs.

Modern network adapter hardware exists in several forms. Besides traditional PCI Ethernet cards, some network adapters are PCMCIA devices (also know as "credit card" or "PC Card" adapters) or USB devices. Some wireless network adapter gear for laptop computers are integrated circuit chips pre-installed inside the computer.

Windows and other operating systems support both wired and wireless network adapters through a piece of software called a "device driver." Network drivers allow application software to communicate with the adapter hardware. Network device drivers are often installed automatically when adapter hardware is first powered on.

A few network adapters are purely software packages that simulate the functions of a network card. These so-called virtual adapters are especially common in virtual private networking (VPN).

Also Known As: NIC, LAN card

Address (Network Address)


Definition: A network address serves as a unique identifier for a computer on a network. When set up correctly, computers can determine the addresses of other computers on the network and use these addresses to send messages to each other.

One of the best known form of network addressing is the Internet Protocol (IP) address. IP addresses consist of four bytes (32 bits) that uniquely identify all computers on the public Internet.

Another popular form of address is the Media Access Control (MAC) address. MAC addresses are six bytes (48 bits) that manufacturers of network adapters burn into their products to uniquely identify them.


ADSL - Asymmetric Digital Subscriber Line


Definition: ADSL is a form of Digital Subscriber Line (DSL) Internet service. ADSL provides greater bandwidth for downloads at the expense of upload speeds. ADSL is the most common form of DSL used in home networking.

ADSL is designed to support the typical home user who frequently downloads large amounts of data from Web sites and P2P networks but upload relatively less often. ADSL works by allocating a majority of the available phone line frequencies for communication of downstream traffic.

In other respects, ADSL possesses all of the characteristics one associates with DSL, including "high-speed" service, an "always on" combination of voice and data support, and availability and performance that is limited by physical distance. ADSL is technically capable of up to 6 Mbps (roughly 6000 Kbps), but ADSL customers in practice obtain 2 Mbps or lower for downloads and up to 512 Kbps for uploads.

Also Known As: Asymmetric Digital Subscriber Line

AIM


Definition: AIM is a peer to peer instant messaging (IM) application and service supplied by America Online (AOL). The AOL AIM client application is a free download that runs on Windows, Linux, Macintosh, other computers, and cell phones. The AOL IM client download contains optional adware components.

AIM supports basic "chat" based instant messaging as well as file sharing. Local folders can be shared in AIM and a "Get File" option allows others to reach those folders. The TCP port number used for AIM file transfers can also be configured in the AIM client.

Several extensions to the basic AOL AIM client exist. AIM Remote allows the AOL IM service to be utilized through a Web browser. The Dead AIM application enhances the functionality of the basic AIM client.

Encrypted and other secured versions of the AIM system exist for use in business networks.

Also Known As: AOL Instant Messenger, AOL AIM, AOL IM

What is an Aircard?


Answer: An aircard is a type of wireless broadband modem used for connecting to cellular networks. Aircards provide roaming access to the Internet from mobile computers outside the range of Wi-Fi hotspots. They may also be used as an alternative to home dial upInternet service in rural areas.

Types of Aircards

Several manufacturers produce wireless network modems including Kyocera, Novatel, Option and Pantech. In recent years, however, the term "aircard" has become associated most closely with the Sierra Wireless AirCard brand of wireless modem products.

Cellular network service providers typically bundle (and sometimes rebrand) compatible wireless modems together with their service contracts. In the U.S., for example, both AT&T and Verizon utilize Sierra Wireless products even though these may be called "AT&T AirCard" and "Verizon AirCard."

The Sierra Wireless AirCard family includes wireless modems in three standard form factors:

  • ExpressCard
  • PCMCIA PC Card
  • USB

Wireless modems implement one or more of the common cellular network protocols. Sierra Wireless AirCard products specifically support either the EV-DO or HSDPA / HSPA protocols.

Aircard Speeds

Aircards support much higher data rates than do dialup connections. For example, the Sierra Wireless AirCard 595U USB modem that supports EV-DO offered up to 3.1 Mbps data rate for downloads (and up to 1.8 Mbps for uploads). Their newer Compass USB modems advertise max 7.2 Mbps down and 5.76 Mbps up. Even though typical aircard data rates achievable in practice are much lower than these theoretical maximums, they still far exceed the 0.05 Mbps throughput of dialup.

Unfortunately, aircards tend to suffer from high network latency, sometimes even higher than that of a dialup connection. Expect to experience sluggishness and slow response times when loading Web pages over an aircard connection. Network games are also generally unplayable on them for this reason. Overall, aircards cannot compete with the overall performance levels of DSL or cable broadband Internet connections.


Anonymous proxy :

Proxy Servers Tutorial - About Proxy Servers

Introduction to Proxy Servers


Some home networks, corporate intranets, and Internet Service Providers (ISPs) use proxy servers (also known as proxies). Proxy servers act as a "middleman" or broker between the two ends of a client/server network connection. Proxy servers work with Web browsers and servers, or other applications, by supporting underlying network protocols like HTTP.

Key Features of Proxy Servers

Proxy servers provide three main functions:
  1. firewalling and filtering
  2. connection sharing
  3. caching

The features of proxy servers are especially important on larger networks like corporate intranets and ISP networks. The more users on aLAN and the more critical the need for data privacy, the greater the need for proxy server functionality.

Proxy Servers, Firewalling and Filtering

Proxy servers work at the Application layer, layer 7 of the OSI model. They aren't as popular as ordinary firewalls that work at lower layers and support application-independent filtering. Proxy servers are also more difficult to install and maintain than firewalls, as proxy functionality for each application protocol like HTTP, SMTP, or SOCKS must be configured individually. However, a properly configured proxy server improves network security and performance. Proxies have capability that ordinary firewalls simply cannot provide.

Some network administrators deploy both firewalls and proxy servers to work in tandem. To do this, they install both firewall and proxy server software on a server gateway.

Because they function at the OSI Application layer, the filtering capability of proxy servers is relatively intelligent compared to that of ordinary routers. For example, proxy Web servers can check the URL of outgoing requests for Web pages by inspecting HTTP GET and POST messages. Using this feature, network administrators can bar access to illegal domains but allow access to other sites. Ordinary firewalls, in contrast, cannot see Web domain names inside those messages. Likewise for incoming data traffic, ordinary routers can filter by port number or network address, but proxy servers can also filter based on application content inside the messages.

Connection Sharing with Proxy Servers

Various software products for connection sharing on small home networks have appeared in recent years. In medium- and large-sized networks, however, actual proxy servers offer a more scalable and cost-effective alternative for shared Internet access. Rather than give each client computer a direct Internet connection, all internal connections can be funneled through one or more proxies that in turn connect to the outside.

Proxy Servers and Caching

The caching of Web pages by proxy servers can improve a network's "quality of service" in three ways. First, caching may conserve bandwidth on the network, increasing scalability. Next, caching can improve response time experienced by clients. With an HTTP proxy cache, for example, Web pages can load more quickly into the browser. Finally, proxy server caches increase availability. Web pages or other files in the cache remain accessible even if the original source or an intermediate network link goes offline.


Apache


Definition: Apache is generally recognized as the world's most popular Web server (HTTP server). Originally designed for Unix servers, the Apache Web server has been ported to Windows and other network operating systems (NOS). The name "Apache" derives from the word "patchy" that the Apache developers used to describe early versions of their software.

The Apache Web server provides a full range of Web server features, including CGI, SSL, and virtual domains. Apache also supports plug-in modules for extensibility. Apache is reliable, free, and relatively easy to configure.

Apache is free software distributed by the Apache Software Foundation. The Apache Software Foundation promotes various free and open source advanced Web technologies.


API - Application Programming Interface


Definition: An API allows computer programmers to access the functionality of pre-built software modules. An API defines data structures and subroutine calls. Networking APIs are entry points to libraries that implement network and data communication protocols.

Traditionally, the primary networking APIs have been implemented in socket libraries. Berkeley sockets and Windows Sockets (Winsock) APIs have seen widespread use for many years. More recently, Java network APIs such as servlets and Web APIs like XML-RPChave emerged as newer network programming standards.

Also Known As: Application Programming Interface

APIPA - Automatic Private IP Addressing


Definition: A feature of Microsoft Windows, APIPA is a DHCP failover mechanism. With APIPA, DHCP clients can obtain IP addresses when DHCP servers are nonfunctional. APIPA exists in all popular versions of Windows except Windows NT.

When a DHCP server fails, APIPA allocates addresses in the private range 169.254.0.1 to 169.254.255.254. Clients verify their address is unique on the LAN using ARP. When the DHCP server is again able to service requests, clients update their addresses automatically.

In APIPA, all devices use the default network mask 255.255.0.0 and all reside on the samesubnet.

APIPA is enabled on all DHCP clients in Windows unless the computer's Registry is modified to disable it. APIPA can be enabled on individual network adapters.

Also Known As: Automatic Private IP Addressing; AutoNet
Examples: Because APIPA uses IP addresses in the private Class B space, APIPA is a feature generally only useful on home or other small intranet LANs.

Ares Lite


Definition: Ares Lite is a software application for Windows computers that enables sharing of files on the Ares P2P network.

The creators of the genuine Ares Lite Edition started from the Ares Regular application and adjusted it to run more efficiently on Windows 98 and other old versions of Windows. Specifically, Ares Lite was designed to consume less computer processor and memory resources than Ares Regular. Ares Lite also removed all embedded advertising logic that consume both computer resources and network bandwidth.

From the networking point of view, Ares Lite Edition offers the same file searching, downloading and chat features as Regular.

Ares Lite downloads can be difficult to find on the Internet, as its creators now prefer all users run Ares Regular. See the sidebar for a current Ares Lite download location.


ARP - Address Resolution Protocol


Definition: ARP converts an Internet Protocol (IP) address to its corresponding physical network address. ARP is a low-level network protocol, operating at Layer 2 of the OSI model.

ARP usually is implemented in the device drivers of network operating systems. It is most commonly seen on Ethernet networks, but ARP has also been implemented for ATM, Token Ring, and other physical networks. RFC 826 documented the initial design and implementation of ARP.

ARP works on Ethernet networks as follows. Ethernet network adapters are produced with a physical address embedded in the hardware called the Media Access Control (MAC)address. Manufacturers take care to ensure these 6-byte (48-bit) addresses are unique, and Ethernet relies on these unique identifiers for message delivery. When any device wishes to send data to another target device over Ethernet, it must first determine the MAC address of that target given its IP address These IP-to-MAC address mappings are derived from an ARP cachemaintained on each device. If the given IP address does not appear in a device's cache, that device cannot direct messages to that target until it obtains a new mapping. To do this, the initiating device first sends an ARP request broadcast message on the local subnet. The host with the given IP address sends an ARP reply in response to the broadcat, allowing the initiating device to update its cache and proceed to deliver messages directly to the target.

Also Known As: Address Resolution Protocol

ASP - Application Service Provider


Definition: An Application Service Provider (ASP) is a business that offers software services to customers, using computer networks and the Internet as the mechanism to deliver and manage the service. Among the most well-known Application Service Providers are Clickability, Salesforce.com and WebEx.

The goal of an ASP business is to reduce the cost of software distribution and maintenance. Using a client/server model (often Web-based), network software can be installed in a centrally-controlled place and hosted - accessed by the customers over remote links. This method to providing software solutions is sometimes called the software as a service (SaaS) approach.

Common ASP Applications

These classes of network applications are often hosted by ASPs:
  • human resources (accounting and payroll)
  • sales (sales force automation)
  • enterprise resource planning (ERP)
  • office and workgroup productivity tools
ASPs have had success selling these types of applications on a subscription-based model. Smaller businesses cannot afford to pay large sums of money to acquire a full-featured ERP tool, for example, but they can very possibly afford to rent these applications on a monthly or yearly basis. In this way, Application Service Providers function much like automobile leasing services: ASPs allow businesses to use application software for a known up-front cost using a periodic payment schedule.

Networking Issues for Application Service Providers

A successful ASP must have robust technology for:
  • network security - protecting the business data flowing through the network

  • network monitoring and troubleshooting - ensuring the hosted applications remaining running. Often, ASPs will be under contract to meet network uptime and performance goals.

ATM - Asynchronous Transfer Mode


Definition: ATM is a high-speed networking standard designed to support both voice and data communications. ATM is normally utilized by Internet service providers on their private long-distance networks. ATM operates at the data link layer (Layer 2 in the OSI model) over either fiber or twisted-pair cable.

ATM differs from more common data link technologies like Ethernet in several ways. For example, ATM utilizes no routing. Hardware devices known as ATM switches establish point-to-point connections between endpoints and data flows directly from source to destination. Additionally, instead of using variable-length packets as Ethernet does, ATM utilizes fixed-sized cells. ATM cells are 53 bytes in length, that includes 48 bytes of data and five (5) bytes of header information.

The performance of ATM is often expressed in the form of OC (Optical Carrier) levels, written as "OC-xxx." Performance levels as high as 10 Gbps (OC-192) are technically feasible with ATM. More common performance levels for ATM are 155 Mbps (OC-3) and 622 Mbps (OC-12).

ATM technology is designed to improve utilization and quality of service (QoS) on high-traffic networks. Without routing and with fixed-size cells, networks can much more easily managebandwidth under ATM than under Ethernet, for example. The high cost of ATM relative to Ethernet is one factor that has limited its adoption to "backbone" and other high-performance, specialized networks.


Acceptable Use Policy - AUP


An Acceptable Use Policy (AUP) is a written agreement all parties on a community computer network promise to adhere to for the common good. An AUP defines the intended uses of the network including unacceptable uses and the consequences for non-compliance. You will most commonly see AUP when registering on community Web sites or when working on a corporate intranet.

Why Acceptable Use Policies Are Important

A good Acceptable Use Policy will cover provisions for network etiquette, mention limits on the use of network resources, and clearly indicate of the level of privacy a member on the network should expect. The best AUPs incorporate "what if" scenarios that illustrate the usefulness of the policy in real-world terms.

The importance of AUPs is fairly well-known to organizations like schools or libraries that offer Internet as well as internal (intranet) access. These policies are primarily geared towards protecting the safety of young people against inappropriate language, pornography, and other questionable influences. Within corporations, the scope expands to include other factors such as guarding business interests.

What Should an Acceptable Use Policy Contain?

Many policy details you should expect to find in an AUP relate to computer security. These include managing passwords, software licenses, and online intellectual property. Others relate to basic interpersonal etiquette, particularly in email and bulletin board conversations. A third category deals with overuse or misuse of resources, such as generating excessive network traffic by playing computer games, for example.

If you are in the process of developing an Acceptable Use Policy, or if you already have such a policy in your organization, here are some factors to consider in evaluating its effectiveness:

  • Does it clearly specify the policy owner or owners?
  • Have scenarios been documented unambiguously for the key policy issues? Descriptions of so-called "use cases" or "situational analyses" help everyone to relate the policy to real life situations especially those based on actual past experience.
  • Are the consequences for non-compliance clear and intended to be enforced?
An increasing number of organizations monitor their computer networks for unacceptable uses, and good Acceptable Use Policies cover network monitoring strategies such as these:
  • Scanning proxy server logs to find hits to inappropriate Web sites including non work-related access occurring during business hours.
  • Installing filtering software that blocks access to certain public Web sites
  • Scanning of incoming and outgoing emails
  • Establishing disk space quotas on shared network drives

Use Cases for an AUP

Consider what you would do in these situations:
  • a co-worker asks to log into the network using your user name and password because their account is "unavailable"
  • you receive a politically sensitive joke in email that you think is very funny and are considering forwarding it to your office mates
  • the person sitting next to you spends all of their time at work downloading financial quotes and trading stocks online
  • your word processor claims it has detected a virus on your computer
If you aren't certain of the action to take in cases like these, an Acceptable Use Policy should be the place you turn for answers.

Create an AUP - Acceptable Use Policy


An AUP (Acceptable Use Policy) for private networks defines proper usage behaviors as well as unacceptable behaviors and their consequences. Learn how to create (or improve upon) your network AUP.
Difficulty: Average
Time Required: n/a

Here's How:

  1. Establish clear owners for the policy (one individual or one group). Owners maintain responsibility for content but do not necessarily enforce the policy.

  2. Give notice to the entire network community that policy creation (or revision) is underway. Establish a contact point for collecting feedback.

  3. Collect one or more model AUP documents to use as examples.

  4. Collect and categorize past incidents of controversial intranet network use within organizational memory.

  5. Create a rough outline of your AUP document based on community feedback, past network incidents, and sample documents from other organizations.

  6. Make sure the outline includes the key intranet network policy issues: use of email, bulletin board postings, abuse of network resources, and netiquette.

  7. If your network is connected to the Internet, be sure to include coverage of personal Internet use in the outline.

  8. If your network has an open Web publishing model, include intranet content ownership, roles, and responsibilities in the outline.

  9. Draft the complete network AUP document from the outline. Spell out the consequences of non-compliance clearly. Be honest about any monitoring (active and passive) that may be occurring.

  10. Publish the draft for the entire organization to read and comment upon.

  11. Conduct training sessions to help raise awareness of key policies: for example, password management and handling of confidential information or viruses.

  12. Revise the draft document based on feedback and publish again to the organization.

  13. Establish a periodic update process for future revisions of the document.

Tips:

  1. Encourage honesty as the best policy.

  2. Over time, identify and reward role models within the organization, but make the award criteria objective to avoid the appearance of favoritism.

Autosensing


Definition: Network adapters that support both traditional and Fast Ethernet choose the speed at which they run through a procedure called autosensing. Autosensing is a feature of so-called "10/100" Ethernet hubs, switches, and NICs. Autosensing involves probing the capability of the network using low-level signalling techniques to select compatible Ethernet speeds. Autosensing was developed to make the migration from traditional Ethernet to Fast Ethernet products easier.

When first connected, 10/100 devices automatically exchange information with each other to agree on a common speed setting. The devices run at 100 Mbps if the network supports it, otherwise they drop down to 10 Mbps to ensure a "lowest common denominator" of performance. Many hubs and switches are capable of autosensing on a port-by-port basis; in this case, some computers on the network may be communicating at 10 Mbps and others at 100 Mbps. 10/100 products often incorporate two LEDs of different colors to indicate the speed setting that is currently active.


Azureus Free P2P File Sharing Client


Azureus System Requirements:
  • Java Runtime Environment (JRE) on Windows, Linux, MacOS or other computer with sufficient CPU and RAM. JRE version 1.5 recommended.
P2P Networks Supported by Azureus:
  • BitTorrent
Default Azureus Network Ports:
  • TCP port 6881 for all Azureus downloads
  • TCP port 6969 for incoming connections to the embedded tracker
Azureus Network Protocols:
  • BitTorrent distribution protocol
  • I2P
  • Tor
Azureus Networking Capabilities:
  • built-in download speed limiter (version 2.1.0.0 and newer)
  • limits on number of simultaneous downloads and active torrents
  • limit on bandwidth allocation for uploads
  • limit on number of peer connections per torrent
  • peer IP address filtering
  • embedded tracker with external IP address
  • IRC (chat) client
  • plugin suppport for email notifications, automatic downloads, automatic speed adjustments, and remote control
Azureus Download Location:


Networking Terms - B


backbone
bandwidth
baud
bit
BitTorrent
Bluetooth
BPL - Broadband over Power Line
bps (bits per second), Bps (bytes per second)
bridge (network bridge)
broadband
broadband modem
broadband router
byte (byte order, byte-oriented protocols)


What is TCP/IP?

TCP/IP is a universal standard suite of protocols used to provide connectivity between networked devices. It is part of the larger OSI model upon which most data communications is based.

One component of TCP/IP is the Internet Protocol (IP) which is responsible for ensuring that data is transferred between two addresses without being corrupted.

For manageability, the data is usually split into multiple pieces or "packets" each with its own error detection bytes in the control section or "header" of the packet. The remote computer then receives the packets and reassembles the data and checks for errors. It then passes the data to the program that expects to receive it.

How does the computer know what program needs the data? Each IP packet also contains a piece of information in its header called the "type" field. This informs the computer receiving the data about the type of transportation mechanism being used.

The two most popular transportation mechanisms used on the Internet are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).

What is TCP?

TCP opens up a connection between client and server programs running on separate computers so that multiple and/or sporadic streams of data can be sent over an indefinite period of time. TCP keeps track of the packets sent by giving each one a sequence number with the remote server sending back "acknowledgement" packets confirming correct delivery. Programs that use TCP therefore have a means of detecting connection failures and requesting the retransmission of missing packets. TCP is a good example of a "connection oriented" protocol.

What is UDP?

UDP is a connectionless protocol. Data is sent on a "best effort" basis with the machine that sends the data having no means of verifying whether the data was correctly received by the remote machine. UDP is usually used for applications in which the data sent is not mission critical. It is also used when data needs to be broadcast to all available servers on a locally attached network where the creation of dozens of TCP connections for a short burst of data is considered resource hungry.

What are TCP / UDP Ports?

So the data portion of the IP packet contains a TCP or UDP segment sandwiched inside. Only the TCP segment header contains sequence information, but both the UDP and the TCP segment headers track the "port" being used. The source/destination port and the source/destination IP addresses of the client & server computers are then combined to uniquely identify each data flow.

Certain programs are assigned specific ports that are internationally recognized. For example, port 80, is reserved for HTTP web traffic and port 25 is reserved for SMTP email. Ports below 1024 are reserved for privileged system functions, those above 1024 are generally reserved for non system third party applications.

Usually when a connection is made from a client computer requesting data to the server machine that contains the data:

o the client selects a random unused "source" port greater than 1024 and queries the server on the "destination" port specific to the application. If it is an HTTP request, the client will use a source port of say, 1095 and query the server on port 80 (HTTP)

o The server recognizes the port 80 request as an HTTP request and passes on the data to be handled by the web server software. When the web server software replies to the client, it tells the TCP application to respond back to port 1095 of the client using a source port of port 80.

The client keeps track of all its requests to the server's IP address and will recognize that the reply on port 1095 isn't a request initiation for "Nicelink" (See theBibliography for a link to a TCP/IP port listing), but a response to the initial port 80 HTTP query.

What is a TTL?

Each IP packet has a Time to Live (TTL) section that keeps track of the number of network devices the packet has passed through to reach its destination. The server sending the packet sets the TTL value and each network device that the packet passes through then reduces this value by "1". If the TTL value reaches "0", then the network device will discard the packet.

This mechanism helps to ensure that bad routing on the Internet won't cause packets to aimlessly loop around the network. TTLs help to reduce the clogging of data circuits with unnecessary traffic.

What is ICMP?

There is another commonly used protocol called the Internet Control Message Protocol (ICMP). It is not strictly a TCP/IP protocol, but TCP/IP based applications use it frequently.

ICMP provides a suite of error, control, and informational messages for use by the operating system. For example, IP packets will occasionally arrive at a server with corrupted data due to any number of reasons including; a bad connection; electrical interference or even misconfiguration. The server will usually detect this by examining the packet and correlating the contents to what it finds in the IP header's error control section. It will then issue an ICMP reject message to the original sending machine that the data should be resent as the original transmission was corrupted.

ICMP also includes echo and echo reply messages used by the Linux "ping" command to confirm network connectivity. More information on ICMP messages can be found in both the Appendix and the chapter on network troubleshooting.

What Do IP Addresses Look Like?

> All devices connected to the Internet have an Internet Protocol (IP) address. Just like a telephone number, it helps to uniquely identify a user of the system.

> IP addresses are in reality a string of binary digits or "bits". Each bit is either a 1 or a 0. IP addresses have 32 bits in total.

> For ease of use, IP addresses are written in what is called a "dotted decimal" format, four numbers with dots in between. None of the numbers between the dots may be greater than 255. An example of an IP address would be 97.65.25.12.

> The numbers between the dots are frequently referred to as "octets"

> Some groups of IP addresses are reserved for use only in private networks and are not routed over the Internet. These are:

Private IP Addresses

10.0.0.0 - 10.255.255.255
?172.16.0.0 - 172.31.255.255

192.168.0.0 - 192.168.255.255

> Home networking equipment / devices usually are configured in the factory with an IP address in the range 192.168.1.1 to 192.168.1.255.

> You can check the Linux networking topics page on how to configure the IP address of your Linux box.

What Is Localhost?

Whether or not your computer has a network interface card it will have a "built in" IP address with which network aware applications can communicate with one another. This IP address is defined as 127.0.0.1 and is frequently referred to as "localhost"

What Is A Subnet Mask?

> Subnet masks are used to tell which part of the IP address represents:

o The network on which the computer is connected (Network portion)

o The computer's unique identifier on that network (Host portion)

> A simple analogy would be a phone number, such as (808) 225-2468. The (808) represents the area code, the 225-2468 represents the telephone within that area code.

> Subnet masks allow you to specify how long you want the area code to be (network portion) at the expense of the number of telephones in that are in the area code (Host portion)

> Most home networks use a subnet mask of 255.255.255.0. Each "255" means this octet is for the area code (network portion). So if your server has an IP address of 192.168.1.25 and a subnet mask of 255.255.255.0, then the network portion would be 192.168.1 and the server or host would be device #25 on that network.

> In this example, host #0 (192.168.1.0) is reserved to represent the network itself, and host #255 (192.168.1.255) is reserved for broadcast traffic intended to reach all hosts on the network at the same time. You can then use IP addresses from #1 to #254 on your "private" network.

> If you purchased a DSL service from your Internet service provider (ISP) that gives you fixed IP addresses, then they will most likely provide you with a subnet mask of 255.255.255.248 that defines 8 IP addresses. For example if the ISP provides you with a "public" network address of 97.158.253.24, a subnet mask of 255.255.255.248 and agateway of 97.158.253.25, then your IP addresses will be:

> 97.158.253.24 - Network base address

> 97.158.253.25 - Gateway

> 97.158.253.26 - Available

> 97.158.253.27 - Available

> 97.158.253.28 - Available

> 97.158.253.29 - Available

> 97.158.253.30 - Available

> 97.158.253.31 - Broadcast

How Many Addresses Do I Get With My Mask?

The method described in this section only works for subnet masks that start with "255.255.255" which should be sufficient for your home network.

> There are only 7 possible values for the last octet of a subnet mask. These are 0, 192, 128, 224, 240, 248, 252

> You can calculate the number of IP addresses for each of the above values by subtracting the value from 256

> So for example, if you have a subnet mask of 255.255.255.192 then you have 64 IP addresses in your subnet (256 - 192)

What's The Range Of Addresses On My Network?

If someone gives you an IP address of 97.158.253.28 and a subnet mask of 255.255.255.248, how do you determine the network address and the broadcast address, in other words the boundaries of my network? Here are the steps:

Manual Calculation

o Subtract the last octet of the subnet mask from 256 to give the number of IP addresses in the subnet. (256 - 248) = 8

o Divide the last octet of the IP address by the result of step 1, don't bother with the remainder (28/8 = 3). This will give you the theoretical number of subnets of the same size that are below this IP address.

o Multiply this result by the result of step 1 to get the network address (8 x 3 = 24). Think of it as "This is the third subnet with 8 addresses in it". The Network address is therefore 97.158.253.24

o The broadcast address is the result of step 3 plus the result of step 1 minus 1. (24 + 8 -1 = 31). Think of it as "The broadcast address is always the network address plus the number of IP addresses in the subnet minus 1". The broadcast address is 97.158.253.31

Let's do this for 192.168.3.56 with a mask of 255.255.255.224

1. 256 - 224 = 32

2. 56 / 32 = 1

3. 32 x 1 = 32. Therefore the network base address is 192.168.3.32

4. 32 + 32 - 1 = 63. Therefore the broadcast address is 192.168.3.63

Let's do this for 10.0.0.75 with a mask of 255.255.255.240

1. 256 - 240 = 16

2. 75 / 16 = 4

3. 16 x 4 = 64. Therefore the network base address is 10.0.0.64

4. 64 + 16 -1 = 79. Therefore the broadcast address is 10.0.0.79

Note: As a rule of thumb, the last octet of your network base address must be divisible by the "256 minus the last octet of your subnet mask" and leave no remainder. If you are sub-netting a large chunk of IP addresses it's always a good idea to lay it out on a spreadsheet to make sure there are no overlapping subnets. Once again, this calculation exercise only works with subnet masks that start with "255.255.255".

Calculation Using A Script

There is a BASH script in the Appendix which will do this for you. Here is a sample of how to use it, just provide the IP address followed by the subnet mask as arguments. It will accept subnet masks in dotted decimal format or "/value" format

[root@bigboy tmp]# ./subnet-calc.sh 216.151.193.92 /28

IP Address : 216.151.193.92
Network Base Address : 216.151.193.80
Broadcast Address : 216.151.193.95

Subnet Mask : 255.255.255.240
Subnet Size : 16 IP Addresses

[root@bigboy tmp]#

What Is Duplex?

> Duplex refers to the ability of a device to transmit and receive data at the same time.

> Full duplex uses separate pairs of wires for transmitting and receiving data so that incoming data flows don't interfere with outgoing data flows.

> Half duplex uses the same pairs of wires for transmitting and receiving data. Devices that want to transmit information have to wait their turn until the "coast is clear" at which point they send the data. Error detection and retransmission mechanisms ensure that data reaches the destination correctly even if it were originally garbled by multiple devices starting to transmit at the same time.

> Data transfer speeds will be low and error levels will be high if you have a device at one end of a cable set to full duplex, and another device at the other end of the cable set to half duplex.

> Most modern network cards can auto-negotiate duplex with the device on the other end of the wire. It is for this reason that duplex settings aren't usually a problem for Linux servers.

What Is A Hub?

> A hub is a device into which you can connect all devices on a home network so that they can talk together. Hubs physically cross-connect all their ports with one another which causes all traffic sent from a server to the hub to be blurted out to all other servers connected to that hub whether they are the intended recipient or not.

> Hubs have none or very little electronics inside and therefore do not regulate traffic. It is possible for multiple servers to speak at once with all of them receiving garbled messages. When this happens the servers try again, after a random time interval, until the message gets through correctly.

> It is for these reasons that devices that plug into hubs should be set to half duplex.

> Note: Hubs can add a lot of delays to your network due to the message garbling "collisions" and retransmissions. A switch is a much more reliable and predictable alternative, and ones made for the home will often cost only a few dollars more.

What Is A Switch?

> A switch is also a device into which you can connect all devices on a home network so that they can talk together. Unlike a hub, traffic sent from Server A to Server B will only be received by Server B. The only exception is broadcast traffic which is blurted out to all the servers simultaneously.

> Switches regulate traffic, thereby eliminating the possibility of message garbling. Switches therefore provide more efficient traffic flow.

> Devices that plug into switches should be set to full duplex to take full advantage of the dedicated bandwidth coming from each switch port.

What Is A LAN?

> A Local Area Network (LAN) is a grouping of ports on a hub, switch or tied to a wireless access point (WAP) that can only communicate with each other.

> It is possible to have LANs that span multiple switches. Simple home switches can be connected in a chain formation to create a LAN with more ports. This is often called "daisy chaining".

> Pure switches provide no access control between servers connected to the same LAN. This is why network administrators group trusted servers having similar roles on the same LAN. They will also ensure that they don't mix servers on different IP networks on the same LAN segment. A good rule of thumb is to have only one network per LAN.

> Communication to devices on another LAN requires a router directly connected to both LANs. The router is also capable of filtering traffic passing between the two LANs therefore providing additional security.

> Larger, more expensive switches can be configured to assign only certain ports to pre-specified Virtual LANs or (VLANs) chosen by the network administrator. In this case, the switch houses ports on multiple LANs. A router is still needs to be connected to each VLAN for inter-network communication.

What Is A Router?

> As stated before, switches and hubs usually only have servers connected to them that have been configured as being part of the same network.

> Routers will connect into multiple switches to allow these networks to communicate with one another.

> Routers can also be configured to deny communication between specific servers on different networks. They can also filter traffic based on the TCP port section of each packet. For example, it is possible to deny communication between two servers on different networks that intend to communicate on TCP port 80, and allow all other traffic between them. Routers therefore direct and regulate traffic between separate networks, much like a traffic policeman.

> If you intend to route between networks, then for each network, you must reserve an IP address for a router and make sure that the router is directly connected to the LAN associated with that network.

> In home networks, routers most frequently provide connectivity to the Internet using network address translation or NAT.

What Is A Gateway?

> Another name for a router.

What Is A Route?

> In the broader networking sense, a route refers to the path data takes to traverse from its source to its destination. Each router along the way may also be referred to as a hop.

> Usually when we speak about a route on a Linux box, we are referring to the IP address of the first hop needed to reach the desired destination network. It is assumed that this first hop will know how to automatically relay the packet.

> Routers are designed to exchange routing information dynamically, and can therefore intelligently redirect traffic to bypass failed network links. Home Linux boxes frequently don't run a dynamic routing protocol and therefore rely on "static" routes issued by the system administrator at the command line or in configuration files to determine the next hop to all desired networks.

> The Linux network topics page shows how to add static routes to your Linux box and also how you can convert it into a simple router.

What Is A Default Gateway?

> A default gateway is really a gateway of last resort. Say for example:

o You have two routers R1 and R2

o R1 is connected to both your SOHO home network (192.168.1.0) and the internet

o R2 is connected to both your SOHO home network (192.168.1.0) and your credit card transaction payment the network (10.46.123.0) which is also connected to other corporate networks with addresses starting with 10.X.X.X

> You could put a route on your SOHO servers that states:

o Go to network 10.0.0.0 255.0.0.0 via router R2

o Go to everything else via router R1. R1 therefore would be considered your default gateway

> For most home networks, your default gateway would be the router / firewall connected to the Internet.

> You can check the Linux networking topics page on how to configure the default gateway on your Linux box.

What Is A NIC?

Your network interface card is frequently called a NIC. Currently, the most common types of NIC used in the home are Ethernet and wireless Ethernet cards.

What Does The "Link" Light On My NIC Indicate?

The link light signifies that the NIC card has successfully detected a device on the other end of the cable. This would indicate that you are using the correct type of cable and that the duplex has been negotiated correctly between the devices at both ends.

What Is A MAC Address?

The media access control address (MAC) can be equated to the serial number of the NIC. Every IP packet is sent out of your NIC wrapped inside an Ethernet frame which uses MAC addresses to direct traffic on your locally attached network.

MAC addresses therefore only have significance on the locally attached network. As the packet hops across the Internet, its source/destination IP address stays the same, but the MAC addresses are reassigned by each router on the way using a process called ARP.

What Is ARP?

The Address Resolution Protocol (ARP) is used to map MAC addresses to network IP addresses. When a server needs to communicate with another server it does the following steps:

> The server first checks its routing table to see which router provides the next hop to the destination network.

> If there is a valid router, let's say with an IP address of 192.168.1.1, the server checks it's ARP table to see whether it has the MAC address of the router's NIC. You could very loosely view this as the server trying to find the Ethernet serial number of the next hop router on the local network, thereby ensuring that the packet is sent to the correct device.

> If there is an ARP entry, the server sends the IP packet to its NIC and tells the NIC to encapsulate the packet in a frame destined for the MAC address of the router.

> If there is no ARP entry, the server will issue an ARP request asking that router 192.168.1.1 respond with its MAC address so that the delivery can be made. Once a reply is received, the packet is sent and the ARP table is subsequently updated with the new MAC address.

> As each router in the path receives the packet, it will pluck the IP packet out of the Ethernet frame, leaving the MAC information behind. It will then inspect the destination IP address in the packet and use its routing table to determine the IP address of the next router on the path to this destination.

> The router will then use the ARP-ing process to get the MAC address of this next hop router. It will then re-encapsulate the packet in an Ethernet frame with the new MAC address and will then send the frame to the next hop router. This relaying process continues until the packet reaches the target computer.

> If the target server is on the same network as the source server, a similar process occurs. The ARP table is queried. If no entry is available, an ARP request is made asking the target server for its MAC address. Once a reply is received, the packet is sent and the ARP table is subsequently updated with the new MAC address.

> The server will not send the data to its intended destination unless it has an entry in its ARP table for the next hop. If it doesn't, the application needing to communicate will issue a timeout or "time exceeded" error.

> As can be expected, the ARP table only contains the MAC addresses of devices on the locally connected network. ARP entries are not permanent and will be erased after a fixed period of time depending on the operating system used.

> The Linux network topics page shows how to see your ARP table and the MAC addresses of your server's NICs.

What Is A DTE?

DTE stands for Digital Terminal Equipment, a terminology originally intended for computer terminals located at remote offices or departments that were directly connected modems. The terminals would have no computing power and only functioned as a screen / keyboard combination for data processing.

Nowadays most PCs have their COM and Ethernet ports configured as if they were going to be connected to a modem or other type of purely networking oriented equipment.

What Is A DCE?

DCE is the acronym for Data Circuit-Terminating Equipment. Modems and other purely networking oriented equipment.

What Is A Straight Through / Crossover Cable?

> When a DCE is connected to a DTE, you will need a "straight-through" type cable. DCEs connected to DCEs or DTEs connected to DTEs will always require "crossover" cables. These are the terminologies generally used with Ethernet cables.

> The terminologies can be different for cables used to connect serial ports together. When connecting a PC's COM port (DTE) to a modem (DCE) the "straight-through" cable is frequently called a "modem" cable. When connecting two PCs (DTE) together via their COM ports the "crossover" cable is often referred to as a "null modem" cable.

> Unfortunately, some manufacturers configure the Ethernet ports of their networking equipment to be either of the DTE or the DCE type, so confusion can arise when selecting a cable. If you fail to get a "link" light when connecting your Ethernet devices together, try using the other type of cable.

> A "straight-through" Ethernet cable is easy to identify. Hold the connectors side by side, pointing in the same direction with the clips facing away from you. The color of the wire in position #1 on connector #1 should be the same as that of position #1 on connector #2. The same would go for positions #2 to #8, ie. the same color for corresponding wires on each end. A cross over cable would have them mixed up.

> Here is a good rule of thumb: PC to PC = crossover cable; PC to switch = straight through cable

What Is A Firewall?

Firewalls can be viewed as routers with more enhanced abilities to restrict traffic, not just by port and IP address like routers. Specifically, firewalls can detect malicious attempts to subvert the TCP/IP protocol. A short list of capabilities includes:

> Throttling traffic to a server when too many unfulfilled connections are made to it

> Restricting traffic being sent to obviously bogus IP addresses