Tuesday, December 28, 2010

About Network for Good


Imagine what the world would be like if every time you were inspired to help someone or something, you could -- with just a few clicks of a mouse, anywhere online. That’s the mission of Network for Good.  We make it as easy to donate and volunteer online as it is to shop online, and we make it simple and affordable for all nonprofits, of any size, to recruit donors and volunteers via the Internet.
What we’ve accomplished:
  • Have created a secure, convenient donation system that makes it possible to give to any charity, anywhere, anytime online     
  • Returned $23.50 to the sector for every $1 invested in Network for Good
  • Raised over $472 million in online donations to more than 60,000 different nonprofit organizations
  • Built a Volunteer Network that connects users across the country with more than 200,000 local, international and virtual volunteer opportunities
  • Taken fundraising viral and raised well over $3.4 million via fundraising widgets

Sunday, December 19, 2010

Network Topology

Network topologies

A network consists of multiple computers connected using some type of interface, each having one or more interface devices such as a Network Interface Card (NIC) and/or a serial device for PPP networking. Each computer is supported by network software that provides the server or client functionality. The hardware used to transmit data across the network is called the media. It may include copper cable, fiber optic, or wireless transmission. The standard cabling used for the purposes of this document is 10Base-T category 5 ethernet cable. This is twisted copper cabling which appears at the surface to look similar to TV coaxial cable. It is terminated on each end by a connector that looks much like a phone connector. Its maximum segment length is 100 meters.

Network Categories

There are two main types of network categories which are:
  • Server based
  • Peer-to-peer
In a server based network, there are computers set up to be primary providers of services such as file service or mail service. The computers providing the service are are called servers and the computers that request and use the service are called client computers.
In a peer-to-peer network, various computers on the network can act both as clients and servers. For instance, many Microsoft Windows based computers will allow file and print sharing. These computers can act both as a client and a server and are also referred to as peers. Many networks are combination peer-to-peer and server based networks. The network operating system uses a network data protocol to communicate on the network to other computers. The network operating system supports the applications on that computer. A Network Operating System (NOS) includes Windows NT, Novell Netware, Linux, Unix and others.

Three Network Topologies

The network topology describes the method used to do the physical wiring of the network. The main ones are bus, star, and ring.
  1. Bus - Both ends of the network must be terminated with a terminator. A barrel connector can be used to extend it.
  2. Star - All devices revolve around a central hub, which is what controls the network communications, and can communicate with other hubs. Range limits are about 100 meters from the hub.
  3. Ring - Devices are connected from one to another, as in a ring. A data token is used to grant permission for each computer to communicate.
There are also hybrid networks including a star-bus hybrid, star-ring network, and mesh networks with connections between various computers on the network. Mesh networks ideally allow each computer to have a direct connection to each of the other computers. The topology this documentation deals with most is star topology since that is what ethernet networks use.

Thursday, December 16, 2010

What Is a Wireless Network Key


What Is a Wireless Network Key
A wireless network key is a security feature that prevents unauthorized users from accessing a wireless network. It can be a simple password or a self-generated combination of digits and letters. A good number of wireless networks are still left unprotected, leaving them vulnerable to hackers and data thieves. Most home and SOHO routers allow users to configure a high degree of wireless security easily.
Wireless networks are now ubiquitous, and a large number of homes incorporate a wireless network into their infrastructure. Because an unprotected network is an unlocked virtual door, anybody within range can piggyback on the network undetected. Their activity can span from the benign (using it for Web surfing and email) to virtual mischief (downloading large, files which is often copyrighted material, to avoid a bottleneck on their own connection) to downright criminal activity
There are many types of wireless security scenarios to consider when configuring a wireless network. The most common types for home and office use are WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access). Each of these types has multiple options and different bits (which heighten security of the wireless network). There is also an entire spectrum of more complex, enterprise-wide wireless security standards, but most of these are well beyond the scope of the average
The wireless router (or access point) is where the security of the wireless network is configured. Here, the administrator sets the security parameters, including user access, firewall configurations and access limits. Then the key is entered in to each computer that accesses the wireless network. For a more secure network, the network key should be entered into the user's computer by the administrator, and not given to the end user.
A lost or forgotten wireless network key can be a problem, particularly on a network with many users and many wireless access points and repeaters. Resetting a single router in a home or small office situation is a slightly annoying, yet simple enough process, but when you're dealing with more than four or five end users, this can become a time consuming issue. A good network administrator should have the router's configuration backed up, and ready to transfer to a new router in the event of a lost password or router hardware failure.

Wednesday, December 15, 2010

The Network Layer


The OSI Reference Model is founded on a suggestion developed by the International Organization for Standardization (ISO). The model is known as ISO OSI (Open Systems Interconnection) Reference Model because it relates with connecting open systems – that is, systems that are open for communication with other systems.
OSI Model is a set of protocols that try to identify and homogenize the data communication practices. The OSI Model has the support of most computer and network vendors, many big customers, and most governments, including the United States.
The OSI Model is a model that illustrates how data communications should take place. It segregates the process into seven groups, called layers. Into these layers are integrated the protocol standards developed by the ISO and other standards organization, including the Institute of Electrical and Electronic Engineers (IEEE), American National Standards Institute (ANSI), and the International Telecommunications Union (ITU), formerly known as the CCITT (Comite Consultatif Internationale de Telegraphique et Telephone). The OSI Model affirms what protocols and standards should be used at each layer. It is modular, each layer of the OSI Model functions with the one above and below it.
The short form used to memorize the layer names of the OSI Model is “All People Seem To Need Data Processing”. The lower two layers are normally put into practice with hardware and software. The remaining five layers are only implemented with software.
The layered approach to network communications gives the subsequent advantages: Reduced intricacy, enhanced teaching/learning, modular engineering, accelerated advancement, interoperable technology, and standard interfaces.
The functions of the seven layers of the OSI model are:
Layer Seven of the OSI Model
The Application Layer of the OSI model is responsible for providing end-user services, such as file transfers, electronic messaging, e-mail, virtual terminal access, and network management. This is the layer with which the user interacts.
Layer Six of the OSI Model
The Presentation Layer of the OSI model is responsible for defining the syntax which two network hosts use to communicate. Encryption and compression should be Presentation Layer functions.
Layer Five of the OSI Model
The Session Layer of the OSI model is responsible for establishing process-to-process commnunications between networked hosts.
Layer Four of the OSI Model
The Transport Layer of the OSI model is responsible for delivering messages between networked hosts. The Transport Layer should be responsible for fragmentation and reassembly.
Layer Three of the OSI Model
The Network Layer of the OSI model is responsible for establishing paths for data transfer through the network. Routers operate at the Network Layer.
Layer Two of the OSI Model
The Data Link Layer of the OSI model is responsible for communications between adjacent network nodes. Hubs and switches operate at the Data Link Layer.
Layer One of the OSI Model
The Physical Layer of the OSI model is responsible for bit-level transmission between network nodes. The Physical Layer defines items such as: connector types, cable types, voltages, and pin-outs.

The OSI Model vs. The Real World

The most major difficulty with the OSI model is that is does not map well to the real world!
The OSI was created after many of todays protocols were already in production use. These existing protocols, such as TCP/IP, were designed and built around the needs of real users with real problems to solve. The OSI model was created by academicians for academic purposes.
The OSI model is a very poor standard, but it's the only well-recognized standard we have which describes networked applications.
The easiest way to deal with the OSI model is to map the real-world protocols to the model, as well as they can be mapped.

Tuesday, December 14, 2010

Computer System and Network Security


Information Technology (IT) has become an integral part of modern life. Among its most important functions are the efficient transmission of information and the storage and analysis of information. The workers described below all help individuals and organizations share and store information through computer networks and systems, the Internet, and computer databases.
Network architects or network engineers are the designers of computer networks. They set up, test, and evaluate systems such as local area networks (LANs), wide area networks (WANs), the Internet, intranets, and other data communications systems. Systems are configured in many ways and can range from a connection between two offices in the same building to globally distributed networks, voice mail, and e-mail systems of a multinational organization. Network architects and engineers perform network modeling, analysis, and planning, which often require both hardware and software solutions. For example, setting up a network may involve the installation of several pieces of hardware, such as routers and hubs, wireless adaptors, and cables, as well as the installation and configuration of software, such as network drivers. These workers may also research related products and make necessary hardware and software recommendations, as well as address information security issues.
Network and computer systems administrators design, install, and support an organization’s computer systems. They are responsible for LANs, WANs, network segments, and Internet and intranet systems. They work in a variety of environments, including large corporations, small businesses, and government organizations. They install and maintain network hardware and software, analyze problems, and monitor networks to ensure their availability to users. These workers gather data to evaluate a system’s performance, identify user needs, and determine system and network requirements.
Systems administrators are responsible for maintaining system efficiency. They ensure that the design of an organization’s computer system allows all of the components, including computers, the network, and software, to work properly together. Administrators also troubleshoot problems reported by users and by automated network monitoring systems and make recommendations for future system upgrades. Many of these workers are also responsible for maintaining network and system security.
Database administrators work with database management software and determine ways to store, organize, analyze, use, and present data. They identify user needs and set up new computer databases. In many cases, database administrators must integrate data from old systems into a new system. They also test and coordinate modifications to the system when needed, and troubleshoot problems when they occur. An organization’s database administrator ensures the performance of the system, understands the platform on which the database runs, and adds new users to the system. Because many databases are connected to the Internet, database administrators also must plan and coordinate security measures with network administrators. Some database administrators may also be responsible for database design, but this task is usually performed by database designers or database analysts. (Database designers are covered in the Handbook section on computer software engineers and computer programmers.)
Computer security specialists plan, coordinate, and maintain an organization’s information security. These workers educate users about computer security, install security software, monitor networks for security breaches, respond to cyber attacks, and, in some cases, gather data and evidence to be used in prosecuting cyber crime. The responsibilities of computer security specialists have increased in recent years as cyber attacks have become more sophisticated.
Telecommunications specialists focus on the interaction between computer and communications equipment. These workers design voice, video, and data-communication systems, supervise the installation of the systems, and provide maintenance and other services to clients after the systems are installed. They also test lines, oversee equipment repair, and may compile and maintain system records.
Web developers are responsible for the technical aspects of Web site creation. Using software languages and tools, they create applications for the Web. They identify a site’s users and oversee its production and implementation. They determine the information that the site will contain and how it will be organized, and may use Web development software to integrate databases and other information systems. Some of these workers may be responsible for the visual appearance of Web sites. Using design software, they create pages that appeal to the tastes of the site’s users.
Webmasters or Web administrators are responsible for maintaining Web sites. They oversee issues such as availability to users and speed of access, and are responsible for approving the content of the site. Webmasters also collect and analyze data on Web activity, traffic patterns, and other metrics, as well as monitor and respond to user feedback.
Work environment. Network and computer systems administrators, network architects, database administrators, computer security specialists, Web administrators, and Web developers normally work in well-lighted, comfortable offices or computer laboratories. Most work about 40 hours a week. However, about 15 percent of network and systems administrators; 14 percent of database administrators; and about 16 percent of network systems and data communications analysts (which includes network architects, telecommunications specialists, Web administrators, and Web developers) worked more than 50 hours per week in 2008. In addition, some of these workers may be required to be “on call” outside of normal business hours in order to resolve system failures or other problems.
As computer networks expand, more of these workers may be able to perform their duties from remote locations, reducing or eliminating the need to travel to the customer’s workplace.
Injuries in these occupations are uncommon, but like other workers who spend long periods in front of a computer terminal typing on a keyboard, these workers are susceptible to eyestrain, back discomfort, and hand and wrist problems such as carpal tunnel syndrome

Monday, December 13, 2010

Network Management System




In a big computer networks the centralized management of a network is required to monitoring, planning, allocating, security, deploying, coordinating and configuring the computer network. Network management means managing the administration and security, risk, reliability and performance of a network over a very large scale. There are different software and hardware components are available to manage the computer network locally or remotely. 
Being a network administrator or IT manager, you have to ensure the security of your
computer network i.e. your network is protected from the unauthorized users and from hackers.
 For this purpose you have to restrict the user rights, implement the securities policies,
use firewalls and monitor the network traffic and performance with the different tools.
Some high end software produces real time graphical views to monitor the network activities.
As the network expand the maintenance policies and strategic growth planning is required to manage
the network.Network management architecture depends on the client-server relationship i.e. some software applications are installed at all the workstations and all the activities of the workstations are monitored at the server. When a system alert is received at the server, certain actions such as event logging, system generated messages to users and system shutdown is performed.
The protocols that are involved in the management of a network are simple network management protocol SNMP and common management information protocol CMIP. ISO has contributed to a large extent in making the standards of managing and administering a network. The management of a computer network involves certain things such as security, risk, performance, fault, system, accounting, configuration load balancing, and traffic routing and traffic management. The purpose of the performance management is to measure the performance such as the user’s response time and application performance.
When a certain performance threshold is reached, a system alert is generated and sent to the server and it is monitored and certain actions are performed in response of it. Security management is to secure the network from the unauthorized users and also secure the resources and sensitive data. Certain security policies and security systems are enabled to ensure the security of the network. The purpose of the fault management system is to track records of the faults, isolate faulty software or hardware and fix them. There are certain network management systems and software being used for optimizing the maximum resources allocation, reporting capabilities, real-time fault detection and reduces the network downtime.
This software provides the comprehensive management features such as for monitoring, analyzing, managing, fault detection and security. Using a good network management system reduces the workload of the IT support staff, measure the network performance and provide the real time statistics of all the computers in a network. Certain software is used to keep track of the bandwidth usage of network and the tracked information is stored in the centralized database for analysis and monitoring. Through this data you can analyze the bandwidth requirements of your network and can plan for the increase in bandwidth.
A good network management system ensures that a network is being used efficiently and it provides organization’s productivity, security, scalability and flexibility. For the flexible working, businesses should deploy a good centralized network management system so that employees can provide timely reports, coordinate with colleagues and perform their duties effectively. Make sure your network is secured by installing

Sunday, December 12, 2010

What Is Social Networking

 

 

Social Networking. . . It's the way the 21st century communicates today.  Want to know what it really means?

Social networking is the grouping of individuals into specific groups, like small rural communities or a neighborhood subdivision, if you will. Although social networking is possible in person, especially in the workplace, universities, and high schools, it is most popular online. This is because unlike most high schools, colleges, or workplaces, the internet is filled with millions of individuals who are looking to meet other people, to gather and share first-hand information and experiences about cooking, golfing, gardening,  developing friendships or professional alliances, finding employment, business-to-business marketing and even groups sharing information about the end of the Mayan calendar and the Great Shift to arrive December 21-2012. The topics and interests are as varied and rich as the story of our world.

When it comes to online social networking, websites are commonly used. These websites are known as social sites. Social networking websites function like an online community of internet users. Depending on the website in question, many of these online community members share common interests in hobbies, religion, or politics. Once you are granted access to a social networking website you can begin to socialize. This socialization may include reading the profile pages of other members and possibly even contacting them. 

The friends that you can make are just one of the many benefits to social networking online. Another one of those benefits includes diversity because the internet gives individuals from all around the world access to social networking sites. This means that although you are in the United States, you could develop an online friendship with someone in Denmark or India. Not only will you make new friends, but you just might learn a thing or two about new cultures or new languages and learning is always a good thing.

As mentioned, social networking often involves grouping specific individuals or organizations together. While there are a number of social networking websites that focus on particular interests, there are others that do not. The websites without a main focus are often referred to as "traditional" social networking websites and usually have open memberships. This means that anyone can become a member, no matter what their hobbies, beliefs, or views are. However, once you are inside this online community, you can begin to create your own network of friends and eliminate members that do not share common interests or goals.

As I'm sure you're aware, there are dangers associated with social networking including data theft and viruses, which are on the rise. The most prevalent danger though often involves online predators or individuals who claim to be someone that they are not. Although danger does exist with networking online, it also exists in the real world, too. Just like you're advised when meeting strangers at clubs and bars, school, or work -- you are also advised to proceed with caution online.

By being aware of your cyber-surroundings and who you are talking to, you should be able to safely enjoy social networking online. It will take many phone conversations to get to know someone, but you really won't be able to make a clear judgment until you can meet each other in person.  Just use common sense and listen to your inner voice; it will tell you when something doesn't feel right about the online conversations taking place.

Once you are well informed and comfortable with your findings, you can begin your search from hundreds of networking communities to join. This can easily be done by performing a standard internet search. Your search will likely return a number of results, including MySpace, FriendWise, FriendFinder, Yahoo! 360, Facebook, Orkut, and Classmates. 


from -whatissocialnetworking.com

What Is Network Security?



What is network security? How does it protect you? How does network security work? What are the business benefits of network security?
You may think you know the answers to basic questions like, What is network security? Still, it's a good idea to ask them of your trusted IT partner. Why? Because small and medium-sized businesses (SMBs) often lack the IT resources of large companies. That means your network security may not be sufficient to protect your business from today's sophisticated Internet threats.

What Is Network Security?

In answering the question What is network security?, your IT partner should explain that network security refers to any activities designed to protect your network. Specifically, these activities protect the usability, reliability, integrity, and safety of your network and data. Effective network security targets a variety of threats and stops them from entering or spreading on your network.

What Is Network Security and How Does It Protect You?

After asking What is network security?, you should ask, What are the threats to my network?
Many network security threats today are spread over the Internet. The most common include:
  • Viruses, worms, and Trojan horses
  • Spyware and adware
  • Zero-day attacks, also called zero-hour attacks
  • Hacker attacks
  • Denial of service attacks
  • Data interception and theft
  • Identity theft

How Does Network Security Work?

To understand What is network security?, it helps to understand that no single solution protects you from a variety of threats. You need multiple layers of security. If one fails, others still stand.
Network security is accomplished through hardware and software. The software must be constantly updated and managed to protect you from emerging threats.
A network security system usually consists of many components. Ideally, all components work together, which minimizes maintenance and improves security.
Network security components often include:
  • Anti-virus and anti-spyware
  • Firewall, to block unauthorized access to your network
  • Intrusion prevention systems (IPS), to identify fast-spreading threats, such as zero-day or zero-hour attacks
  • Virtual Private Networks (VPNs), to provide secure remote access

What are the Business Benefits of Network Security?

With network security in place, your company will experience many business benefits. Your company is protected against business disruption, which helps keep employees productive. Network security helps your company meet mandatory regulatory compliance. Because network security helps protect your customers' data, it reduces the risk of legal action from data theft.
Ultimately, network security helps protect a business's reputation, which is one of its most important assets.

from -  cisco.com/cisco/web/solutions

Wednesday, December 8, 2010

Five ways to help people remember you


Have you ever attended a networking event, collected a bunch of business cards, and when you go through them the next day, you can't remember who many of them are? Or try to think of someone you met and had a conversation with, but you can't remember their name or their business to look them up?
Well, you certainly don't want to be one of those that other people can't remember, do you? It's all well and good to pass out business cards, but if people don't remember you well, they probably won't be calling you to follow up, and they certainly won't keep you in mind for their future needs or possible referrals.
Here are five tips on how to make yourself memorable (in a good way) when meeting other people face-to-face:
1. Be distinctive.
A brightly-colored, hand-painted tie, an unusual necklace or other jewelry, a good (but not overpowering) cologne, even just impeccable grooming can all help you stand out in a good way. It's not that you want to be remembered and identified for that, but anything that helps people separate you from the crowd helps them remember the rest of you. You don't have to be outlandish -- although some people work that quite well -- just don't blend in completely with the crowd.
2. Be fully present.
Be fully engaged and fully aware of the people you interact with. You can break this down into smaller, somewhat mechanical pieces -- listen well, respond promptly, maintain eye contact, etc. -- but if you are truly present in the moment, those things will happen naturally. Many people only seem to be "half there", so being fully engaged helps you stand out.
3. Ask thought-provoking questions.
Networking expert Bob Burg has some good suggested questions in his book Endless Referrals: Network Your Everyday Contacts into Sales, such as "How did you get started?" or "What do you enjoy most about what you do?" But the very best questions can't be communicated in a book because they're specific to the person you're interacting with and will arise in response to your initial conversation. Do #2 and this will flow naturally. As Dale Carnegie suggested, you must "take a genuine interest in other people".
4. Reinforce your keywords.
People aren't going to remember long descriptions of what you do, or likely even that 15-second intro that many experts teach you to make. People will at best remember a few key things about you:
  • Your name
  • Your company name
  • Your business/industry (in three words or less)
  • Your product
  • Your location
What you want to do is find ways to unobtrusively increase the occurrence of these things in your conversation. For example, is there some kind of story behind your name? Have it ready to use if there's an opportunity. Does your business have an unusual name? What's the story behind it - what does it mean? Refer to your place of business when telling an incident that occurred ("I was driving down 17th Street leaving my store, when...").
Anything you say that reinforces one of the five items above helps make you more memorable. And if they can remember just three of them -- "Joe the barber from Soho" or "Maria the translator who wrote 'Spanish in Six Weeks'" -- you're doing great.
5. Contribute to the group conversation.
Don't hog it, and don't say just anything in order to say something publicly, but saying one really smart thing at your table or in front of the whole group will make you much more memorable than half an hour of semi-conscious small talk. Create value for others and you create value for yourself.
When we look at brand strategy in marketing, one of the most important concepts is that a brand is not just a memorable name or logo -- it's an experience. A great brand communicates values and emotions that get called to mind whenever someone thinks of the name or logo.

Here we're talking about your personal brand. Remember that you are your business. The impression that you make on people is the impression they will have of your business, so make it good and make it memorable.

from entrepreneurs.about.com

Tuesday, December 7, 2010

What is a Network

 

What is a Network

The word network can be used to describe a very large and complicated set of equipment. In its most accurate and simplest definition a network refers to the cables and electronic components that amplify the signals going through the cables. The amplifying equipment is necessary to ensure accurate communication and make the signal stronger if it needs to go long distances.

Broader Definition

When many people talk about a network, they are talking about a network using a very broad concept. For instance if someone cannot get to their email, they may say "the network is down". Likewise they may say this if they cannot surf the internet or get to their files. They may not stop to think that in each specific instance there is a single piece of equipment that may provide the capability which they are trying to use.
Most people who work on a corporate or organizational network think about the network in component parts. The three main parts are:
  • The cabling and amplifiers mentioned in the first paragraph.
  • The workstations which most members of the organization use to access resources.
  • Higher powered computers called servers - These are the machines that provide what network administrators call services. Services include the functions that most people try to use such as email, reading and writing files, printing, and getting to the internet. Whenever a user is trying to do something on the network, there is a service or machine providing the capability to do so. This even includes times when someone is trying to get to network resources from their home

Services

Services include:
  • Email service
  • File service - Allows users to use and share file space on a computer with a lot of file space.
  • Print service - Allows printing to printers connected on the network.
  • Web surfing - Allowing someone to open web pages and see web sites on the internet.
  • Filtering out undesired sites on the internet.
  • Allowing someone to access the network from the outside (from home).
  • Updating virus definitions on workstations.
  • Allowing someone to log onto the network.
  • Even giving a workstation an address on the network is a service. If your computer does not have an address, it cannot access the internet or any other resource on the network.

A Typical Network

A typical corporate or organizational network is shown below:
Of course there are variations on this network layout and some details have been left out for the sake of simplicity but this drawing should give you some idea about what goes on behind the scene on the network at your organization. Some servers and server functions have not been shown here.
The firewall is the device that protects all computers in the network from many attacks. It allows some types of network traffic into the network from the outside, but usually only for mail or web services. Usually the internet traffic that that is allowed to come into the network is routed to the part of the network labeled "DMZ" on the right side of the diagram. DMZ stands for demilitarized zone and is also called a semi-private network. In this DMZ is a web server which is used to allow people surfing on the internet to see web pages posted by the organization. A mail server is also shown in the DMZ but this could be replaced by a mail relay server while the mail server is placed inside the private network. The mail relay server would forward mail traffic from the outside to the mail server. This would increase the security of the network since a direct connection from the internet to the mail server would not be allowed.
The private network is of course the most secure part of the network. There are several servers on this network including:
  • A login server (called a domain controller) which controls everyones permissions and access to the network resources such as files. Without this server, they cannot login to the network.
  • An address server (called a DHCP server) which provides addresses to computers on the network so they can communicate as discussed earlier.
  • A file server which provides common files and a private folder for users.
  • A remote access server which allows users to connect to the network by telephone from the outside.
Also the workstations are part of this network.

Conclusion

Knowing the above information, if someone cannot get their mail, they may think the network is down. This is not likely to be the case. The mail server may be down but the network is not likely to be down. The same goes for when someone can't surf the web. There may be a problem with the firewall or the line connecting to the internet, but it is unlikely that the whold netwlrk is down. When problems are noticed it is best for the user to describe what they were trying to do and what happened.