How To Become a Computer Technician

So you want to be a Computer Technician, but you don't know how? Well guess what, I am going to tell you how.

First things first, I am blunt and to the point. I hate typing and thinking about grammar, that is why I went into the Technology field.

Computer

I have over 10 years experience in web design, computer networking, hardware, software, java programming, Apple & IBM (pc) format computers, telephone work, home theatres etc, etc, etc, & I make a lot of money doing. So basically I know what I am talking about & I am going to give you some advice that took me 10 long, hard years to learn.

1. MOST IMPORTANT: LEARN how to find the right answers. This can be true for ANY field, ANY person works in. You do not need to know everything, and guess what, if you spent the next 10 years reading, going to school & obtaining certifications, you still wouldn't know all there is to know in the field of Technology. But if you can figure out what resources will help you find a solution for you the fastest, then you are on your way.

2. Go to school and/or get certifications. Of course you need to learn about computers, software, hardware etc to become a computer technician. Find something that fits you, something that makes you excited to go. 4 year schools are not for every one, so make sure they are right for you if you choose to go. In my 4 years in college the only thing I learned to do is program at Level II in Java (a blind monkey could program at that level) and drink a lot of beer. 2 year schools are good because the get straight to the point about the actual jobs you will be doing out in the REAL world. (I was offered a teaching position at one of these 2 year schools at the ripe old age of 25, I laughed in their face & said no because of the salary they were offering). Certifications are important regardless if you get a 2 or 4 year degree. They tell other people that have NO CLUE about technology that you, indeed have a clue about technology

Did you follow that?

A couple of certifications that I highly recommend are the A+, Networking + and any Microsoft Support Certification.

3. Be patient, with yourself and the people you work with. You will always be learning if you become a computer technician. The average lifespan for a particular model of technology (ie computers) is about 2 years. Meaning as soon as you buy it, it is OLD. Things change everyday in Technology and you have to keep up with it!

4. Have a Positive Attitude! Remember, when people call you or you are dispatched out to work on someone's computer, TV etc, they usually are frustrated. Most people will try to fix the issue themselves before calling anyone because they are cheap. By the time you or I get there they are ready to cry. A positive and friendly attitude will go an EXTREMELY LONG WAY. You will be their savior and they will tell all their friends about you. This point might be the most difficult, especially in Technology because not very many people understand how it works and because our lives are so dependent on it.

That is it, 4 simple steps.

Can you handle it?

These are the 4 things I have tried to do over the last 10 years. Trust me, I am no genius, not by a long shot. But I figured out how to find the right answer for the problem, combined with an education, some certifications and the right attitude, I have people knocking down my door for my services.

Read this article a couple of times until this info really sinks in. This advice works so use it!

Stop sitting there and get busy!

For more information on How To Become a Computer Technician, check out a couple of this sites I have listed in my bio, those will help.

Good Luck!

OUT

How To Become a Computer Technician

Computer Golf Games

The first computer game was developed in the year 1962. Since then, computer games have evolved significantly. Today, online versions are available for every game played on earth.

A computer golf game is software that is executed on a computer. This software simulates the game of golf and enables players to experience real life golf on a computer screen. Basic requirements for these games include a fast computer system and the gaming software. The games have individual and multiplayer options for playing the game. Players have the option of playing a single game or participate in a virtual tournament with other game enthusiasts.

Computer

The software development process starts by making a digital video of real golf courses. The video is then converted into 3D animation and other related software and plug-ins are added to make a complete computer golf software. Players can customize the look of their virtual golfer and opponents or choose from real life golf professionals provided by the software. They can select their skill levels, shots, clubs and favorite course. The games can also be played in different modes that may include wind mode, ice mode or desert mode. Some computer games allow players to design their own courses and game modes.

Golf is an outdoor game and requires walking long distances on a golf course. Golf club memberships are expensive and unaffordable for many. Computer golf games are relatively cheaper. A good gaming software provides as good an experience as playing real time golf.

These games have helped in increasing the popularity of Golf. Professionals use advanced versions of these games to record their actual play and find flaws in strokes and club selection. In the coming years, the golf software is expected to encourage and aid professionals entering golfing tournaments and championships.

Computer Golf Games

Golf Games provides detailed information on Golf Games, Free Golf Games, Online Golf Games, Golf Betting Games and more. Golf Games is affiliated with Arizona Golf Resorts [http://www.e-GolfResorts.com].

Desktop CNC Milling Machine - An Overview

CNC (Computer Numerically Controlled) Machines are programmed and controlled by computer. They can offer very short set up times and flexibility to run batches from one offs to several thousand. Desktop CNC milling machine strives to deliver high value, low priced quality machinery and tooling products. This is the world of digital era that creates mandate use of advanced technology. If you want to run with time, fasten your seat belts and get set to go with desktop CNC milling machine.

Milling machine is a machine tool that machine solid materials like any type of metal. Desktop CNC milling machines are rigid enough to cut those precise measurements that you need. They work, the way they are programmed to do so. These machines come in variety of different sizes with different features. The vital part of this machine is its software with following features:

Desktop

• software that uses simple program with minimal supervision
• software should be compatible with standard computers

These machines are basically of two types: horizontal and vertical milling machines. This means that they can cut solid material both horizontally and vertically. These machines are very easy to build. Almost all parts are available in all local retail stores at cheap prices. They are small enough to set on the desk but scalable to any size. Most suppliers of milling machine do not include cutting tools so, you need to add these yourself.

With this machine you can do many things. Few of them are:

• Jewelry manufacturing
• Engraving
• Drilling/milling of plates
• 3D milling and modeling in foam, wood, plastic and other soft materials
• PC board etching

Some of the benefits of using desktop CNC machine are:

• more efficient
• works with precision
• they provide accurate results
• low cost of production
• generates greater output at low cost so, higher revenues obtained
• reduces overhead costs (less wastage)
• inexpensive
• easy to build
• easy to operate
• easily available
• widely used in both small scale and large scale industries.

Desktop CNC Milling Machine - An Overview

MDAprecision is the organization who is a master in providing desktop CNC milling machines of various models. They not only sell machines but continuously develop their product line. And provide superior customer services.

Teenagers, Computers and Internet

Lately parenting forums have been buzzing with parents looking for ideas how to keep their teenagers from spending a lot of time on the computer and Internet. It seems that teenagers these days are hooked on the computer just as they were hooked on watching television just a decade ago. Whether they are logging into MySpace, downloading songs from iTunes, blogging, chatting with each other over IM, or spacing out surfing the Web, mounting evidence shows that teen computer use can in some cases be classified as either a compulsion or even an addiction.

How do you know as a parent when your teen's computer use is going too far? There is no easy litmus test here. If your teen loves to play online games, he may not be alone. However, if your teen seems to be sacrificing social opportunities or spending more than 25 hours a week in the online gaming arena, maybe something is wrong.

Computers

One of the Internet's most popular games, the World of Warcraft, is a self-contained online world with millions of different players from dozens of countries around the world. This online realm sucks teenagers in easily, and some have been known to stay on the World of Warcraft site for more than 70 or 80 active hours per week.

Today's teenager also has access to a variety of services available on the computer and over the Internet. Instead of using the telephone, they use instant messaging. They don't get their pictures printed at the corner drugstore anymore but upload digital pictures to MySpace and sharing them with friends and anyone else instantly. Even the ever-present radio or stereo have fallen out of vogue because the computer has much better sound and its attached woofer makes the room vibrate even more. Watching a movie on television has been replaced with playing a DVD on the computer. Teens may even do their homework and school projects on the computer.

Considering that many people get addicted to the Internet, parents should be able to recognize when their teen is developing a bad habit. The isolating, repetitive nature of computer work in general can be stunting in terms of development. In addition, parents should be concerned if their teens are not getting enough exercise, nutrition and sleep. A friend of mine told me just a few days ago "I caught my 11 year old son playing games on the Internet at four o"clock in the morning!"

What Parents can do

I have spent most of my time on the computer writing this book for the last few months. Since our kids tend to do as they see more often than they do as they are told, I know this would not be a good time to bring this subject up with my daughter.

To establish a good and argument-proof plan when approaching your teen to discuss this topic, it is vital that you know exactly what your teenager is doing while on the computer and how much time he is spending on each particular activity. Establish which activities you will allow, and what Web sites or activities are off limit.

Your plan also needs to include how much time you will allow for each activity and how many hours you are willing to allow per week. The Internet has become an unsafe place for teens in many respects, so you also might consider one of the software packages available that allow you to set parental controls similar to the parental controls which block certain TV programs. Be prepared for your teenager's question: "What do you want me to do instead?"

Set an example yourself. If you're an online junky or a solitaire addict, cut back on your computer use to provide a good example. Take time to connect with your teenager and to bring your family together for non-computer/TV related activities, and you'll likely see computer use decrease.

Christina Botto has been involved with helping parents and teenagers resolve complicated issues for more than 14 years, observing and developing parenting strategies. Her dedication to helping parents inspired her to write her book, Help Me With My Teenager! A Step-by-step Guide for Parents that Works.

Teenagers, Computers and Internet

Parenting your teenager doesn't have to be frustrating - visit Parenting A Teenager, where parents can find Christina's articles and her book, news for Education K-12 and College, LIVE Counseling, and a variety of other tools and resources for both communicating with their teen and helping parents deal with issues they are struggling with.

Hidden N's in Thomas Kinkade Paintings

Thomas Kinkade is very well know for his cabin and seashore paintings. He puts out calendars and many other artistic items such as key holders or postcards. However, what most people do not know is that he puts hidden "N"'s into his paintings. If you have ever looked at a Where is Waldo? book or Eye Puzzles then you know how hard it can be to find hidden images within a book or painting. Thomas Kinkade's art is very similar except his hidden letters can be even harder to find.

The reason that Kinkade hides N's in his paintings is because his wife's name is Nancy. When you look at a Thomas Kinkade painting there is a number at the bottom right of the painting that tells you how many of Nancy's initials are located within the painting. Generally there are going to be a lot more N's then you might expect.

Desktop

If you are looking to try and find these hidden N's you will need to be looking at the large version of the painting first of all. Try looking in the sky, on rocks, on the cabins or in trees. You might also find the N's on canoe's, tree stumps, or other random objects that might be within the painting. He also likes to put his famous N's on lighthouses so make sure to look there as well. A lot of times you can find them in the background in places that people normally would not look so that random N's are not distracting from the purpose of the painting.

If you own Thomas Kinkade paintings or if you are thinking about purchasing one, consider the challenge that comes along with his paintings. Find his hidden letters are you might just find that you are experiencing a whole new side of the Thomas Kinkade phenomenon.

Hidden N's in Thomas Kinkade Paintings

James also is interested in Whole House Dehumidifiers as well as a Dehumidifier Review.

How to Easily Set Up Your New Computer

Buying a new computer for the first time is exciting for most, and a bit scary for some. But there is nothing to fear. Setting up a computer for the first time is really easy, and this article will help you through the process.

I will deal in this article with a computer that will run the Windows operating system. If you're not sure which operating system you're using, read on to find out.

Computers

WHAT'S IN THE BOXES

When you open all your boxes from the computer store, you should have the following:

1. The computer itself - a box with slots in the front and lots of sockets and connections at the back.

2. A screen, also called a monitor, or a display.

3. A keyboard

4. A mouse - also called a pointing device.

5. A couple of cables with plugs on the ends.

6. One or more CD or DVD disks

7. Instruction manuals and maybe Quick start guides.

8. A set of small loudspeakers with some wires.

Depending on the store you bought the computer from, there may be less or more other items in the box.

WHERE TO PLUG IN WHAT

Put the computer on a desk so that you can easily work on the back or the front of the box. Unpack the screen and fix it's base to it. (There's always a picture in the screen's box showing you how to do it)

Find a cable in your screen box with a connector with 15pins and plug this into the 15 pin socket on the back of the computer, and if it's not already attached to the back of the screen, plug it into the screen too.

If your keyboard has a purple plug on it, plug it into the purple socket on the back of the computer. If it has a black, flat connector, which is a USB plug, plug it into any socket that it fits into, either at the back of the computer or in the front - it doesn't matter which one you use, as long as it fits nicely.

If your mouse has a green plug on the end of it's wire, plug it into the green socket next to the purple socket on the back of the computer. If it has a flat, black connector, use any other free USB socket, like you did for the keyboard.

The speakers will have a small plug like an earphone plug. Look at the back of the computer for 3 little sockets colored red, green and blue, and plug the speaker plug into the little green socket.

If your computer has a socket at the back for your phone line to go in, you can connect that up as well. This will enable you (once you've learnt how to do it) to connect up to the internet, send faxes and make phone calls from your PC.

GETTING POWERED UP

Right, you're almost set. Find the cables with the electrical mains plugs on them, and connect them to the back of the computer where the kettle plugs fit into their sockets. If there are two plugs there, then the one is to connect power to your screen. If there's only one, then you have to plug your screen mains cable directly into the wall socket. Once that is done you can plug the mains cords into the wall outlet and switch on. There may be a switch near the mains plug on the back of the computer that you must switch on too, and then also a Power button on the front of the computer that you must switch on. The screen also has an on switch - sometimes it's on the front, and sometimes it's on the side of the screen. Make sure a little light comes on somewhere near this switch to indicate that it's on.

Your computer should now start running, fans should start blowing air inside the case, and the screen should be showing signs of life after several seconds. Give the computer about 2 or 3 minutes to boot itself up. ie. to load it's start up programs.

OPERATING SYSTEM

If your computer screen, after starting up, has a button labelled START in the bottom, left hand corner, then the computer has all it's programs and Windows Operating system pre-loaded by the store - this is the normal practice. You can then start using your mouse to move the little arrow pointer around the screen and clicking (ie pushing down the left mouse button) on the start button and other pictures to begin the adventure that is "learning your computer." You can then disregard the next paragraph.

If you just have a black screen with some message like "insert installation CD" then you have to put the Operating system disk that came with the computer into the CD or DVD drive. The drive is marked "Disc" or "DVD" or maybe "Combo 52X" or some such thing and is opened by pushing the little button on the right hand side of the drive. You will see on your installation CD or DVD disk what operating system you are using : it will either say Windows XP (or Vista) or MAC or Linux or whatever. Once the disk is running you will be prompted by the computer on what to do next. If it's Linux you will need help! Otherwise it's fairly simple - just make a note of your Windows serial number, which may be on the disk you are putting in the computer, but is usually found on a sticker stuck to the case of the computer, on the side or on the top. It's a 25 digit number usually in the form : xxxxx-xxxxx-xxxxx-xxxxx-xxxxx. Enter it in when asked for your "product key."

AND YOU'RE DONE!

You may need to switch on the speakers if they have an ON switch. And that's it.

To actually operate the computer is another couple of articles just to get you started. Look out for them!

How to Easily Set Up Your New Computer

More great articles and other cool goodies on my web site.

Also humor and a free SQUEAKY CLEAN JOKES page at:

The WrinklyO Web Node at http://wrinklyo.googlepages.com

Lots more that you will be interested in.

(Check out the Promotions and Special Offers Page!)

Thank you for your support. I hope you enjoy the articles!

Duncan Kelly

Advantages of Forex Trading

Foreign exchange trading involves buying and selling different currencies. It works on the theory that is similar with share market. As we know that to make the profit, you have to buy at lower price and sell at higher price, or we can also sell at higher price first and buy at lower price. But its not as easy as it sounds. By studying certain market conditions, you can actually make profits in forex. All you have to do is to analyze the forex in a correct way and do the good trade.
Why to go for Foreign exchange trading? There is an option to invest in stock market also but here are a few important advantages of currency trading over stock market.

24-hour Trading

Desktop

Forex trading is done on 24-hours basis. This market is open throughout day and night as somewhere in the world, there must be this buy and sell trading is going on. Traders involved in forex trading strategy can always get that first hand information and can act accordingly. The currency rate is actually run through telecommunication all over the network of banks 24 hours a day from 00:00 GMT on Monday to 10:00 pm GMT on Friday. There are ECNs (Electronic Communication Networks) which bring together buyers and sellers.
Greater Liquidity

There is a superior liquidity in the market as there are always buyers and sellers to purchase and sell foreign currencies. Forex trading market size is 50 times bigger than the New York Stock Exchange and liquidity of such large market ensures price stability. Forex trading stop orders could be carried out more simply. This makes Forex trading signal more liquid and permits Forex traders to take benefit of trading opportunities as they happen rather than waiting for the market to open the next day.

100:1 High Leverage in forex trading

100 to 1 leverage is commonly available from online forex dealers, which substantially exceeds the common 2:1 margin offered by equity brokers. This gives them a huge leverage in their trading and presents the potential for extraordinary profits with relative small investments. Leverage can also go the opposite way and may lead to huge losses if you are not careful.

Forex trading transactions have no commissions. Forex Brokers can earn money by fixing their own speculation between what a currency could be bought at and what it could be sold at. In difference, Forex traders have to pay a commission fee or brokerage fee for every futures transaction they come in to the view. The forex market is so large that no one individual, bank, fund or government body can influence it for a long period of time. In forex trading strategy, you can trade between seven currencies but not everyone trade in all.

There are certain trading signals that give indications to the trade. These forex signals are delivered by email, instant messenger or direct to your desktop. Some services even offer auto-trading, allowing you to auto-execute their trading signals direct into your broker account.

Advantages of Forex Trading

For more about these forex,forex trading strategy,forex signal, visit: http://www.connection2forex.com

IGBT Test Procedures

The term IGBT is an acronym for Insulated Gate Bipolar Transistor. It can be thought of as a Transistor with a MOSFET front end. It has three terminals (or leads) labeled Gate, Collector and Emitter. Some IGBT's have a built in protection diode. This diode is connected across the Collector and Emitter terminals. It is added for transient voltage protection when the IGBT is switching Inductive loads.

When these devices are considered 'suspect' it is necessary to validate their operation through a functional test procedure. One of two methods can be used:

Desktop

The first test method will validate the condition of the protection diode, and the resistance of the Collector and Emitter terminals. It is not a definitive test, but will find 80% of all faulty devices. This is due to the fact that most faulty IGBT's show a low resistance or short across the Collector and Emitter terminals when the device is stressed.

To perform this test will require a DVM (Digital-Volt-Meter). Set the DVM to the Diode Test position, and confirm that the device tests as follows:

Attach the Red Lead of the DVM to the Collector Terminal and Black Lead to the Emitter Terminal. Confirm an open circuit condition.

Attach the Red Lead of the DVM to the Emitter Terminal and Black Lead to the Collector Terminal. Confirm an open circuit condition (IGBT without a protection diode). If the DVM displays a forward voltage drop of 0.2 to 0.8 VDC it means that the IGBT has a built in protection diode. Both of these results are normal test conditions and are used to confirm whether the IGBT has a protection diode, and if it does, whether it is functional or not.

The second test method will check the IGBT's functionality, by gating the device. To perform this test will require an IGBT Tester. Confirm that the device tests as follows:

Attach the IGBT Tester leads to the Gate, Collector and Emitter Terminals. Confirm that the device Conduction LED is not lit.

Press the Test Button, and confirm that the Conduction LED lights.

Reverse the Collector and Emitter leads. Do not press the Test Button. If the Conduction LED lights the IGBT has a built in protection diode. This is a normal test condition for this type of device. If the Conduction LED does not light then the IGBT does not have a built in protection diode. This is also a normal test condition for this type of device.

It is important to note that Functional test of the IGBT should always be performed when the device is out-of-circuit. In other words, it should be removed from the product and have no other electrical connections in place, other than those outlined in the Test procedure.

IGBT Test Procedures

David Willcocks is an Electronics professional, and Technical writer. For more information on Automated Test Equipment please visit http://www.imagineATE.com

What is the Difference Between Laptop and Netbook?

So what is the difference between laptop and netbook? A laptop (also called a notebook) is computer which has been designed to be made portable, featuring a screen hinged to a keyboard. A laptop includes a battery for portable power and a touchpad instead of a mouse for input.

Mini laptops (also called a netbook, subnotebook or ultraportables) take these ideas further still, creating a new market above handheld computers, smartphones and personal digital assistants. The primary characteristic of these are smaller size and weight, which are pretty similar to the average diary, as well as costing less than a standard laptop with prices starting at around £150, an excellent solution during the credit crunch!

Desktop

Mini laptops aren't as powerful as bigger notebook computers, and lack the power for big, demanding programs as well as an optical disc drive - so no CDs or DVDs. None the less, connectivity is a central focus for netbooks. Internet downloads are quickly catching up on hard media products, so perhaps it's not such a loss.

In short, the difference between laptop and netbook is a netbook is smaller, lighter, cheaper (on the whole) and simpler.

New mini laptops are expected to sell in the region of 5.2 million units by the end of 2008, 8 million during 2009 and up to 50 million by 2012 - a ten fold growth. Industry analysts are torn whether or not subnotebooks will cannibalize the laptop market, some suggesting that a mere 10% market share will be taken. However, in this economic downturn, people will always look for cheaper products and with mini laptops available from £150-200, perhaps there is a big market after all.

So is it game over for the standard laptop and pc? Unlikely; whilst mini laptops can perform dozens of tasks to identical or similar standard of larger computers, they will (for the time being) be limited by battery size, processing power and storage space, the difference between laptop and netbook is pronounced enough not to make the former obsolete.

Furthermore, when using a computer over a prolonged period of time, it would make sense to use a bigger screen and a faster processor of a desktop replacement laptop or a PC, particularly for demanding programs' such as games.

And finally, similarly priced but laptops, of varying quality, are available for around £200-300 leading some industry analysts to believe that the consumer focus will be on functionality and not merely size and weight.

At the opposite end of the spectrum, mobile phone manufacturers and providers are tapping into the netbook market with the Samsung NC10, LG X110 and Carphone Warehouse launching the Webbook - a branded laptop made by Elonex. Vodafone has linked arms with Dell with its Inspiron Mini 9, offering 3G mobile broadband contracts. Orange have followed suit with by cosying up with Asus and the Eee PC 901.

The difference between laptops and netbooks may seem very vague, but there is certainly space for both to function. If you've got a laptop, even reading this on one, lift it up. Feel the weight of it. Ask yourself, do I need all this extra space? Would I be better off with something smaller and lighter - if the answers yes, browse around the site.

What is the Difference Between Laptop and Netbook?

View the original article with pictures and video at: http://www.mini-laptops-and-notebooks.com/Difference-between-laptop-and-netbook.html

We recommend you view our Top Ten Mini Laptops too!

Homepage at http://www.mini-laptops-and-notebooks.com/index.html | The one stop resource for mini laptops and netbooks | Copyright Ed Fry 2008-2009 - All Rights Reserved

Why Does My Computer Freeze Up? - A Guide to Fix Computer Freezes

"Why does my computer freeze?" I was wondering this question myself not too long ago. I would be using my computer like any other time. When all of a sudden my computer freezes up. I cannot access any programs. My mouse is not moving anywhere. I cannot use control/alt/delete. The only thing you can do is turn off your computer manually which is unsafe for your computer and causes you to lose any information were using at the time.

Anyone who has experienced this knows how big of a pain a computer freeze is. And it is even worse for those who like me had this happening to them on a regular basis. It just seems to come out of nowhere and can be a huge nuisance.

Computer

What I learned was that the problems were coming from my Windows registry. The registry is the most important and fragile area of your computer. It contains the information that runs all of your software and hardware. As you install, update, and delete programs the registry becomes filled with unwanted information.

This unwanted information causes two problems. First off it slows down your computer considerably. Like a traffic jam, your computer becomes congested with information and needs to be cleaned out to run fast again. The other problem is windows error messages and your computer freezing up. This useless and corrupted information on the registry counteracts with other programs causing serious problems.

The only way to fix this problem and prevent these kinds of computer freezes is to repair the Windows registry. Because it is such a fragile area it was recommended to use a program to clean up registry errors for me. I did so and my computer stopped freezing almost immediately. Even better it began to run like it was brand new!

If you are interested I have recommended the program I used below to solve this problem for me. With this program you will never have to wonder why does my computer freeze up ever again. Give it a try!

Why Does My Computer Freeze Up? - A Guide to Fix Computer Freezes

Want to turbocharge your computer speed? Looking to fix those pesky windows error messages? Get an easy fix and scan your computer for free with the best registry clean up software on the internet today.

Jim Marshall is a computer technician expert with over 15 years in the industry. He has an intimate knowledge of the windows registry and various register repair software. After testing some of the top registry cleaners on the marker he has created a comprehensive review site that details his findings.

http://www.registry-clean-up.net

CAT5 vs CAT5E vs CAT6

Here is our opinion on choosing the right category of network cable:

  • Cat5 = If you plan on running at most 100 Mbps
  • Cat5e = If you plan on running at 1000 Mbps (1 Gbps)
  • Cat6 = If you plan on running at 1000 Mbps (1 Gbps) or more. Cat6 is better if you are in areas that have lots of interference like near power lines, lights, manufacturing equipment, or a long distance 1000 Mbps (Gigabit) run.
  • We advise that you run at least Cat5e or Cat6 cable in the walls
  • Cat5e are great for patch cables from the patch panel to the switch or from the computer to the wall jack
  • We very rarely use Cat5 cable anymore.
  • For most applications the CAT5E 350MHz network cables are best. They will run up to 1 Gig and are not as expensive as CAT 6 cables.
  • CAT 6 cables are great for "future proofing" your installation. They are rated to carry network speeds above 1000 Mbps (Gigabit).
  • CAT5E 100MHz are rated to only run up to 100Mbps networks but are inexpensive.

The above statements are the opinion of the Networkcablesonline.com and do not represent the solution for every situation. There are exceptions to these statements and a professional should be consulted prior to making a major network cabling decision. Please visit http://www.networkcablesonline.com for more information about CAT5, CAT5E, and CAT6 cables. [http://www.networkcablesonline.com/network-cables-c-59.html]

Desktop

CAT5 vs CAT5E vs CAT6

Chris Frank President of Sphere Technologies, Inc, which is one of the owners of Network Cables Online, LLC. Network Cables Online, LLC sells network cables, ethernet products, computer cables, Power over Ethernet clock, and PoE LED Displays.

Intranet

Introduction to Intranets

What exactly is an intranet? It's one of those terms that's more thrown around than understood, and has become more of a buzzword than a commonly understood idea. Simply put, an intranet is a private network with Internet technology used as the underlying architecture. An intranet is built using the Internet's TCP/IP protocols for communications. TCP/IP protocols can be run on many hardware platforms and cabling schemes. The underlying hardware is not what makes an intranet-it's the software protocols that matter.

Hardware

Intranets can co-exist with other local area networking technology. In many companies, existing "legacy systems" including mainframes, Novell networks, minicomputers, and various databases, are being integrated into an intranet. A wide variety of tools allow this to happen. Common Gateway Interface (CGI) scripting is often used to access legacy databases from an intranet. The Java programming language can be used to access legacy databases as well.

With the enormous growth of the Internet, an increasing number of people in corporations use the Internet for communicating with the outside world, for gathering information, and for doing business. It didn't take long for people to recognize that the components that worked so well on the Internet could be equally valuable internally and that is why intranets are becoming so popular. Some corporations do not have TCP/IP networks, the protocol required to access the resources of the Internet. Creating an intranet in which all the information and resources can be used seamlessly has many benefits. TCP/IP-based networks make it easy for people to access the network remotely, such as from home or while traveling. Dialing into an intranet in this way is much like connecting to the Internet, except that you're connecting to a private network instead of to a public Internet provider. Interoperability between networks is another substantial bonus.

Security systems separate an intranet from the Internet. A company's intranet is protected by firewalls-hardware and software combinations that allow only certain people to access the intranet for specific purposes.

Intranets can be used for anything that existing networks are used for-and more. The ease of publishing information on the World Wide Web has made them popular places for posting corporate information such as company news or company procedures. Corporate databases with easy-to-build front-ends use the Web and programming languages such as Java.

Intranets allow people to work together more easily and more effectively. Software known as groupware is another important part of intranets. It allows people to collaborate on projects; to share information; to do videoconferencing; and to establish secure procedures for production work. Free server and client software and the multitude of services, like newsgroups, stimulated the Internet's growth. The consequence of that growth stimulated and fueled the growth of intranets. The ease with which information can be shared, and with which people can communicate with one another will continue to drive the building of intranets.

A Global View of an Intranet

An intranet is a private corporate or educational network that uses the Internet's TCP/IP protocols for its underlying transport. The protocols can run on a variety of network hardware, and can also co-exist with other network protocols, such as IPX. People from inside an intranet can get at the larger Internet resources, but those on the Internet cannot get into the intranet, which allows only restricted access from the Internet.

  • Videoconferencing is an important application that requires sending massive quantities of data. Intranets can be built using components that allow the extremely high bandwidths required for transferring such information.
  • Often an intranet is composed of a number of different networks inside a corporation that all communicate with one another via TCP/IP. These separate networks are often referred to as subnets.
  • Software that allows people to communicate with each other via e-mail and public message boards and to collaborate on work using workgroup software is among the most powerful intranet programs. Applications that allow different corporate departments to post information, and for people to fill out corporate forms, such as time sheets, and for tapping into corporate financial information are very popular.
  • Much of the software used on intranets is standard, off-the-shelf Internet software such as the Netscape Navigator and the Microsoft Explorer Web browsers. And customized programs are often built, using the Java programming language and CGI scripting.
  • Intranets can also be used to allow companies to do business-to-business transactions, such as ordering parts, sending invoices, and making payments. For extra security, these intranet-to-intranet transactions need never go out over the public Internet, but can travel over private leased lines instead.
  • Intranets are a powerful system for allowing a company to do business online, for example, to allow anyone on the Internet to order products. When someone orders a product on the Internet, information is sent in a secure manner from the public Internet to the company's intranet, where the order is processed and completed.
  • In order to protect sensitive corporate information, and to ensure that hackers don't damage computer systems and data, security barriers called firewalls protect an intranet from the Internet. Firewall technology uses a combination of routers, servers and other hardware and software to allow people on an intranet to use Internet resources, but blocks outsiders from getting into the intranet.
  • Many intranets have to connect to "legacy systems"-hardware and databases that were built before an intranet was constructed. Legacy systems often use older technology not based on the intranet's TPC/IP protocols. There are a variety of ways in which intranets can tie to legacy systems. A common way is to use CGI scripts to access the database information and pour that data into HTML formatted text, making it available to a Web browser.
  • Information sent across an intranet is sent to the proper destination by routers, which examine each TCP/IP packet for the IP address and determine the packet's destination. It then sends the packet to the next router closest to the destination. If the packet is to be delivered to an address on the same subnetwork of the intranet it was sent from, the packet may be able to be delivered directly without having to go through any other routers. If it is to be sent to another subnetwork on the intranet, it will be sent to another internal router address. If the packet is to be sent to a destination outside the intranet-in other words, to an Internet destination-the packet is sent to a router that connects to the Internet

How TCP/IP and IPX Work on Intranets

What distinguishes an intranet from any other kind of private network is that it is based on TCP/IP-the same protocols that apply to the Internet. TCP/IP refers to two protocols that work together to deliver data: the Transmission Control Protocol (TCP) and the Internet Protocol (IP). When you send information across an intranet, the data is broken into small packets. The packets are sent independently through a series of switches called routers. Once all the packets arrive at their destination, they are recombined into their original form. The Transmission Control Protocol breaks the data into packets and recombines them on the receiving end. The Internet Protocol handles the routing of the data and makes sure it gets sent to the proper destination.

  1. In some companies, there may be a mix of TCP/IP-based intranets and networks based on other networking technology, such as NetWare. In that instance, the TCP/IP technology of an intranet can be used to send data between NetWare or other networks, using a technique called IP tunneling. In this instance, we'll look at data being sent from one NetWare network to another, via an intranet. NetWare networks use the IPX (Internet Packet Exchange) protocol as a way to deliver data-and TCP/IP networks can't recognize that protocol. To get around this, when an IPX packet is to be sent across an intranet, it is first encapsulated inside an IP packet by a NetWare server specifically for and dedicated to providing the IP transport mechanism for IPX packets.
  2. Data sent within an intranet must be broken up into packets of less than 1,500 characters each. TCP breaks the data into packets. As it creates each packet, it calculates and adds a checksum to the packet. The checksum is based on the byte values, that is, the precise amount of data in the packet.
  3. Each packet, along with the checksum, is put into separate IP wrappers or "envelopes." These wrappers contain information that details exactly where on the intranet-or the Internet-the data is to be sent. All of the wrappers for a given piece of data have the same addressing information so that they can all be sent to the same location for reassembly.
  4. The packets travel between networks by intranet routers. Routers examine all IP wrappers and look at their addresses. These routers determine the most efficient path for sending each packet to its final destination. Since the traffic load on an intranet often changes, the packets may be sent along different routes, and the packets may arrive out of order. If the router sees the address is one located inside the intranet, the packet may be sent directly to its destination, or it may instead be sent to another router. If the address is located out on the Internet, it will be sent to another router so it can be sent across the Internet.
  5. As the packets arrive at their destination, TCP calculates a checksum for each packet. It then compares this checksum with the checksum that has been sent in the packet. If the checksums don't match, TCP knows that the data in the packet has been corrupted during transmission. It then discards the packet and asks that the original packet be retransmitted.
  6. TCP includes the ability to check packets and to determine that all the packets have been received. When all the non-corrupt packets are received, TCP assembles them into their original, unified form. The header information of the packets relays the sequence of how to reassemble the packets.
  7. An intranet treats the IP packet as it would any other, and routes the packet to the receiving NetWare network. On the receiving NetWare network, a NetWare TCP/IP server decapsulates the IP packet-it discards the IP packet, and reads the original IPX packet. It can now use the IPX protocol to deliver the data to the proper destination.

How the OSI Model Works

A group called the International Standards Organization (ISO) has put together the Open Systems Interconnect (OSI) Reference Model, which is a model that describes seven layers of protocols for computer communications. These layers don't know or care what is on adjacent layers. Each layer, essentially, only sees the reciprocal layer on the other side. The sending application layer sees and talks to the application layer on the destination side. That conversation takes place irrespective of, for example, what structure exists at the physical layer, such as Ethernet or Token Ring. TCP combines the OSI model's application, presentation, and session layers into one which is also called the application layer.

  • The application layer refers to application interfaces, not programs like word processing. MHS (Message Handling Service) is such an interface and it operates at this level of the OSI model. Again, this segmentation and interface approach means that a variety of email programs can be used on an intranet so long as they conform to the MHS standard at this application interface level.
  • The presentation layer typically simply provides a standard interface between the application layer and the network layers. This type of segmentation allows for the great flexibility of the OSI model since applications can vary endlessly, but, as long as the results conform to this standard interface, the applications need not be concerned with any of the other layers.
  • The session layer allows for the communication between sender and destination. These conversations avoid confusion by speaking in turn. A token is passed to control and to indicate which side is allowed to speak. This layer executes transactions, like saving a file. If something prevents it from completing the save, the session layer, which has a record of the original state, returns to the original state rather than allowing a corrupt or incomplete transaction to occur.
  • The transport layer segments the data into acceptable packet sizes and is responsible for data integrity of packet segments. There are several levels of service that can be implemented at this layer, including segmenting and reassembly, error recovery, flow control, and others.
  • The IP wrapper is put around the packet at the network or Internet layer. The header includes the source and destination addresses, the sequence order, and other data necessary for correct routing and rebuilding at the destination.
  • The data-link layer frames the packets-for example, for use with the PPP (Point to Point). It also includes the logical link portion of the MAC sublayer of the IEEE 802.2, 802.3 and other standards.
  • Ethernet and Token Ring are the two most common physical layer protocols. They function at the MAC (Media Access Control) level and move the data over the cables based on the physical address on each NIC (Network Interface Card). The physical layer includes the physical components of the IEEE 802.3 and other specifications.

How TCP/IP Packets Are Processed

Protocols such as TCP/IP determine how computers communicate with each other over networks such as the Internet. These protocols work in concert with each other, and are layered on top of one another in what is commonly referred to as a protocol stack. Each layer of the protocol is designed to accomplish a specific purpose on both the sending and receiving computers. The TCP stack combines the application, presentation, and the session layers into a single layer also called the application layer. Other than that change, it follows the OSI model. The illustration below shows the wrapping process that occurs to transmit data.

  • The TCP application layer formats the data being sent so that the layer below it, the transport layer, can send the data. The TCP application layer performs the equivalent actions that the top three layers of OSI perform: the application, presentation, and session layers.
  • The next layer down is the transport layer, which is responsible for transferring the data, and ensures that the data sent and the data received are in fact the same data-in other words, that there have been no errors introduced during the sending of the data. TCP divides the data it gets from the application layer into segments. It attaches a header to each segment. The header contains information that will be used on the receiving end to ensure that the data hasn't been altered en route, and that the segments can be properly recombined into their original form.
  • The third layer prepares the data for delivery by putting them into IP datagrams, and determining the proper Internet address for those datagrams. The IP protocol works in the Internet layer, also called the network layer. It puts an IP wrapper with a header onto each segment. The IP header includes information such as the IP address of the sending and receiving computers, and the length of the datagram, and the sequence order of the datagram. The sequence order is added because the datagram could conceivably exceed the size allowed for network packets, and so would need to be broken into smaller packets. Including the sequence order will allow them to be recombined properly.
  • The Internet layer checks the IP header and checks to see whether the packet is a fragment. If it is, it puts together fragments back into the original datagram. It strips off the IP header, and then sends the datagram to the transport layer.
  • The transport layer looks at the remaining header to decide which application layer protocol-TCP or UDP-should get the data. Then the proper protocol strips off the header and sends the data to the receiving application.
  • The application layer gets the data and performs, in this case, an HTTP request.
  • The next layer down, the data link layer, uses protocols such as the Point-to-Point Protocol (PPP) to put the IP datagram into a frame. This is done by putting a header-the third header, after the TCP header and the IP header-and a footer around the IP datagram to fra-me it. Included in the frame header is a CRC check that checks for errors in the data as the data travels over the network.
  • The data-link layer ensures that the CRC for the frame is right, and that the data hasn't been altered while it was sent. It strips off the frame header and the CRC, and sends the frame to the Internet layer.
  • On the receiving computer, the packet travels through the stack, but in the opposite order from which the packet was created. In other words, it starts at the bottom layer, and moves its way up through the protocol stack. As it moves up, each layer strips off the header information that was added by the TCP/IP stack of the sending computer.
  • The final layer is the physical network layer, which specifies the physical characteristics of the network being used to send data. It describes the actual hardware standards, such as the Ethernet specification. The layer receives the frames from the data link layer, and translates the IP addresses there into the hardware addresses required for the specific network being used. Finally, the layer sends the frame over the network.
  • The physical network layer receives the packet. It translates the hardware address of the sender and receiver into IP addresses. Then it sends the frame up to the data link layer.

How Bridges Work

Bridges are hardware and software combinations that connect different parts of a single network, such as different sections of an intranet. They connect local area networks (LANs) to each other. They are generally not used, however, for connecting entire networks to each other, for example, for connecting an intranet to the Internet, or an intranet to an intranet, or to connect an entire subnetwork to an entire subnetwork. To do that, more sophisticated pieces of technology called routers are used.

  1. When there is a great amount of traffic on an Ethernet local area network, packets can collide with one another, reducing the efficiency of the network, and slowing down network traffic. Packets can collide because so much of the traffic is routed among all the workstations on the network.
  2. In order to cut down on the collision rate, a single LAN can be subdivided into two or more LANs. For example, a single LAN can be subdivided into several departmental LANs. Most of the traffic in each departmental LAN stays within the department LAN, and so it needn't travel through all the workstations on all the LANs on the network. In this way, collisions are reduced. Bridges are used to link the LANs. The only traffic that needs to travel across bridges is traffic bound for another LAN. Any traffic within the LAN need not travel across a bridge.
  3. Each packet of data on an intranet has more information in it than just the IP information. It also includes addressing information required for other underlying network architecture, such as for an Ethernet network. Bridges look at this outer network addressing information and deliver the packet to the proper address on a LAN
  4. Bridges consult a learning table that has the addresses of all the network nodes in it. If a bridge finds that a packet belongs on its own LAN, it keeps the packet inside the LAN. If it finds that the workstation is on another LAN, it forwards the packet. The bridge constantly updates the learning table as it monitors and routes traffic.
  5. Bridges can connect LANs in a variety of different ways. They can connect LANs using serial connections over traditional phone lines and modems, over ISDN lines, and over direct cable connections. CSU/DSU units are used to connect bridges to telephone lines for remote connectivity.
  6. Bridges and routers are sometimes combined into a single product called a brouter. A brouter handles both bridging and routing tasks. If the data needs to be sent only to another LAN on the network or subnetwork, it will act only as a bridge delivering the data based on the Ethernet address. If the destination is another network entirely, it will act as a router, examining the IP packets and routing the data based on the IP address.

How Intranet Routers Work

Just as routers direct traffic on the Internet, sending information to its proper destination, and routers on an intranet perform the same function. Routers-equipment that is a combination of hardware and software-can send the data to a computer on the same sub network inside the intranet, to another network on the intranet, or outside to the Internet. They do this by examining header information in IP packets, and then sending the data on its way. Typically, a router will send the packet to the next router closest to the final destination, which in turn sends it to an even closer router, and so on, until the data reaches its intended recipient.

  1. A router has input ports for receiving IP packets, and output ports for sending those packets toward their destination. When a packet comes to the input port, the router examines the packet header, and checks the destination in it against a routing table-a database that tells the router how to send packets to various destinations.
  2. Based on the information in the routing table, the packet is sent to a particular output port, which sends the packet to the next closest router to the packet's destination.
  3. If packets come to the input port more quickly than the router can process them, they are sent to a holding area called an input queue. The router then processes packets from the queue in the order they were received. If the number of packets received exceeds the capacity of the queue (called the length of the queue), packets may be lost. When this happens, the TCP protocol on the sending and receiving computers will have the packets re-sent.
  4. In a simple intranet that is a single, completely self-contained network, and in which there are no connections to any other network or the intranet, only minimal routing need be done, and so the routing table in the router is exceedingly simple with very few entries, and is constructed automatically by a program called ifconfig.
  5. In a slightly more complicated intranet which is composed of a number of TCP/IP-based networks, and connects to a limited number of TCP/IP-based networks, static routing will be required. In static routing, the routing table has specific ways of routing data to other networks. Only those pathways can be used. Intranet administrators can add routes to the routing table. Static routing is more flexible than minimal routing, but it can't change routes as network traffic changes, and so isn't suitable for many intranets.
  6. In more complex intranets, dynamic routing will be required. Dynamic routing is used to permit multiple routes for a packet to reach its final destination. Dynamic routing also allows routers to change the way they route information based on the amount of network traffic on some paths and routers. In dynamic routing, the routing table is called a dynamic routing table and changes as network conditions change. The tables are built dynamically by routing protocols, and so constantly change according to network traffic and conditions.
  7. There are two broad types of routing protocols: interior and exterior. Interior routing protocols are typically used on internal routers inside an intranet that routes traffic bound only for inside the intranet. A common interior routing protocol is the Routing Information Protocol (RIP). Exterior protocols are typically used for external routers on the Internet. AÊcommon exterior protocol is the Exterior Gateway Protocol (EGP).

Intranets come in different sizes. In a small company, an intranet can be composed of only a handful of computers. In a medium-sized business, it may include dozens or hundreds of computers. And in a large corporation, there may be thousands of computers spread across the globe, all connected to a single intranet. When intranets get large, they need to be subdivided into individual subnets or subnetworks.

To understand how subnetting works, you first need to understand IP addresses. Every IP address is a 32-bit numeric address that uniquely identifies a network and then a specific host on that network. The IP address is divided into two sections: the network section, called the netid, and the host section, called the hostid.

Each 32-bit IP address is handled differently, according to what class of network the address refers to. There are three main classes of network addresses: Class A, Class B, and Class C. In some classes, more of the 32-bit address space is devoted to the netid, while in others, more of the address space is devoted to the hostid. In a Class A network, the netid is composed of 8 bits, while the hostid is composed of 24 bits. In a Class B network, both the netid and the hostid are composed of 16 bits. In a Class C network, the netid is composed of 24 bits, while the hostid is composed of 8 bits. There's a simple way of knowing what class a network is in. If the first number of the IP address is less than 128, the network is a Class A address. If the first number is from 128 to 191, it's a Class B network. If the first number is from 192 to 223, it's a Class C network. Numbers above 223 are reserved for other purposes. The smaller the netid, the fewer number of networks that can be subnetted, but the larger number of hosts on the network. A Class A rating is best for large networks while a Class C is best for small ones.

To create a subnet, the demarcation line on the IP address is moved between the netid and the hostid, to give the netid more bits to work with and to take away bits from the hostid. To do this, a special number called a subnet mask is used.

Subnetting is used when intranets grow over a certain size and they begin to have problems. One problem is management of host IP addresses-making sure that every computer on the network has a proper, up-to-date host address, and that old host addresses are put out of use until needed in the future. In a corporation spread out over several locations-or across the world-it's difficult, if not impossible, to have one person responsible for managing the host addresses at every location and department in the company.

Another problem has to do with a variety of hardware limitations of networks. Dissimilar networks may all be part of an intranet. An intranet may have some sections that are Ethernet, other sections that are Token Ring networks, and conceivably other sections that use different networking technologies altogether. There is no easy way for an intranet router to link these dissimilar networks together and route the information to the proper places.

Another set of problems has to do with the physical limitations of network technology. In some kinds of networks, there are some strict limitations on how far cables can extend in the network. In other words, you can't go over a certain distance of cabling without using repeaters or routers. A "thick" Ethernet cable, for example, can only be extended to 500 meters, while a "thin" Ethernet cable can only go to 300 meters. Routers can be used to link these cables together, so that an intranet can be extended well beyond those distances. But when that is done, each length of wire is essentially considered its own subnetwork.

Yet one more set of problems has to do with the volume of traffic that travels across an intranet. Often in a corporation, in a given department, most of the traffic is intradepartmental traffic-in other words, mail and other data that people within a department send to each another. The volume of traffic outside to other departments is considerably less. What's called for is a way to confine intradepartmental traffic inside the departments, to cut down on the amount of data that needs to be routed and managed across the entire intranet.

Subnetting solves all these problems and more. When an intranet is divided into subnets, one central administrator doesn't have to manage every aspect of the entire intranet. Instead, each subnet can take care of its own administration. That means smaller organizations within the larger organization can take care of problems such as address management and a variety of troubleshooting chores. If an intranet is subnetted by divisions or departments, it means that each division or department can guide the development of its own network, while adhering to general intranet architecture. Doing this allows departments or divisions more freedom to use technology to pursue their business goals.

Subnets also get around problems that arise when an intranet has within it different kinds of network architecture, such as Ethernet and Token Ring technologies. Normally-if there is no subnetting-a router can't link these different networks together because they don't have their own addresses. However, if each of the different networks is its own subnet-and so has its own network address-routers can then link them together and properly route intranet traffic.

Subnetting can also cut down on the traffic traveling across the intranet and its routers. Since much network traffic may be confined within departments, having each department be its own subnet means that all that traffic need never cross an intranet router and cross the intranet-it will stay within its own subnet.

Subnetting can also increase the security on an intranet. If the payroll department, for example, were on its own subnet, then much of its traffic would not have to travel across an intranet. Having its data traveling across the intranet could mean that someone could conceivably hack into the data to read it. Confining the data to its own subnet makes that much less likely to happen.

Dividing an intranet into subnets can also make the entire intranet more stable. If an intranet is divided in this way, then if one subnet goes down or is often unstable, it won't affect the rest of the intranet.

This all may sound rather confusing. To see how it's done, let's take a look at a network, and see how to use the IP address to create subnets. Let's say we have a Class B network. That network is assigned the address of 130.97.0.0. When a network is given an address, it is assigned the netid numbers-in this case, the 130.97-and it can assign the host numbers (in this case, 0.0) in any way that it chooses.

The 130.97.0.0 network is a single intranet. It's getting too large to manage, though, and we've decided to divide it into two subnets. What we do is fairly straightforward. We take a number from the hostid field and use it to identify each of the subnets. So one subnet gets the address 130.97.1.0, and the other gets the address 130.97.2.0. Individual machines on the first subnet get addresses of 130.97.1.1, 130.97.1.2, and so on. Individual machines on the second subnet get addresses of 130.97.2.1, 130.97.2.2 and so on.

Sounds simple. But we have a problem. The Internet doesn't recognize 130.97.1.0 and 130.97.2.0 as separate networks. It treats them both as 130.97.0.0 since the "1" and "2" that we're using as a netid is only known to the Internet as a hostid. So our intranet router will not be able to route incoming traffic to the proper network.

To solve the problem, a subnet mask is used. A subnet mask is a 32-bit number in IP form used by intranet routers and hosts that will help routers understand how to route information to the proper subnet. To the outside Internet, there is still only one network, but the subnet mask allows routers inside the intranet to send traffic to the proper host.

A subnet mask is a number such as 255.255.255.0 (the built-in default for Class C addresses; the Class B default is 255.255.0.0 and the default for Class A is 255.0.0.0). A router takes the subnet mask and applies that number against the IP number of incoming mail to the network by using it to perform a calculation. Based on the resulting IP number, it will route mail to the proper subnet, and then to a particular computer on the subnet. For consistency, everyone in a particular intranet will use the same subnet mask.

Subnetting an Intranet

When intranets are over a certain size, or are spread over several geographical locations, it becomes difficult to manage them as a single network. To solve the problem, the single intranet can be subdivided into several subnets, subsections of an intranet that make them easier to manage. To the outside world, the intranet still looks as if it's a single network.

  1. If you're building an intranet and want it to be connected to the Internet, you'll need a unique IP address for your intranet network, which the InterNIC Registration Services will handle. There are three classes of intranet you can have: Class A, Class B, or Class C. Generally, a Class A rating is best for the largest networks, while a Class C is best for the smallest. A Class A network can be composed of 127 networks, and a total of 16,777,214 nodes on the network. A Class B network can be composed of 16,383 networks, and a total of 65,534 nodes. A Class C network can be composed of 2,097,151 networks, and 254 nodes.
  2. When an intranet is assigned an address, it is assigned the first two IP numbers of the Internet numeric address (called the netid field) and the remaining two numbers (called the hostid field) are left blank, so that the intranet itself can assign them, such as 147.106.0.0. The hostid field consists of a number for a subnet and a host number.
  3. When an intranet is connected to the Internet, a router handles the job of sending packets into the intranet from the Internet. In our example, all incoming mail and data comes to a router for a network with the netid of 147.106.0.0.
  4. When intranets grow-for example, if there is a department located in another building, city, or country-there needs to be some way to manage network traffic. It may be impractical and physically impossible to route all the data necessary among many different computers spread across a building or the world. A second network-called a subnetwork or subnet-needs to be created.
  5. In order to have a router handle all incoming traffic for a subnetted intranet, the first byte of the hostid field is used. The bits that are used to distinguish among subnets are called subnet numbers. In our example, there are two subnets on the intranet. To the outside world, there appears to be only one network.
  6. Each computer on each subnet gets its own IP address, as in a normal intranet. The combination of the netid field, the subnet number, and then finally a host number, forms the IP address.
  7. The router must be informed that the hostid field in subnets must be treated differently than non-subnetted hostid fields, otherwise it won't be able to properly route data. In order to do this, a subnet mask is used. A subnet mask is a 32-bit number such as 255.255.0.0 that is used in concert with the numbers in the hostid field. When a calculation is performed using the subnet mask and the IP address, the router knows where to route the mail. The subnet mask is put in people's network configuration files.

Overview of an Intranet Security System

Any intranet is vulnerable to attack by people intent on destruction or on stealing corporate data. The open nature of the Internet and TCP/IP protocols expose a corporation to attack. Intranets require a variety of security measures, including hardware and software combinations that provide control of traffic; encryption and passwords to validate users; and software tools to prevent and cure viruses, block objectionable sites, and monitor traffic.

  • The generic term for a line of defense against intruders is a firewall. A firewall is a hardware/software combination that controls the type of services allowed to or from the intranet.
  • Proxy servers are another common tool used in building a firewall. A proxy server allows system administrators to track all traffic coming in and out of an intranet.
  • A bastion server firewall is configured to withstand and prevent unauthorized access or services. It is typically segmented from the rest of the intranet in its own subnet or perimeter network. In this way, if the server is broken into, the rest of the intranet won't be compromised.
  • Server-based virus-checking software can check every file coming into the intranet to make sure that it's virus-free.
  • Authentication systems are an important part of any intranet security scheme. Authentication systems are used to ensure that anyone trying to log into the intranet or any of its resources is the person they claim to be. Authentication systems typically use user names, passwords, and encryption systems.
  • Server-based site-blocking software can bar people on an intranet from getting objectionable material. Monitoring software tracks where people have gone and what services they have used, such as HTTP for Web access.
  • One way of ensuring that the wrong people or erroneous data can't get into the intranet is to use a filtering router. This is a special kind of router that examines the IP address and header information in every packet coming into the network, and allows in only those packets that have addresses or other data, like e-mail, that the system administrator has decided should be allowed into the intranet.

All intranets are vulnerable to attack. Their underlying TCP/IP architecture is identical to that of the Internet. Since the Internet was built for maximum openness and communication, there are countless techniques that can be used to attack intranets. Attacks can involve the theft of vital company information and even cash. Attacks can destroy or deny a company's computing resources and services. Attackers can break in or pose as a company employee to use the company's intranet resources.

Firewalls are hardware and software combinations that block intruders from access to an intranet while still allowing people on the intranet to access the resources of the Internet. Depending on how secure a site needs to be, and on how much time, money, and resources can be spent on a firewall, there are many kinds that can be built. Most of them, though, are built using only a few elements. Servers and routers are the primary components of firewalls.

Most firewalls use some kind of packet filtering. In packet filtering, a screening router or filtering router looks at every packet of data traveling between an intranet and the Internet.

Proxy servers on an intranet are used when someone from the intranet wants to access a server on the Internet. A request from the user's computer is sent to the proxy server instead of directly to the Internet. The proxy server contacts the server on the Internet, receives the information from the Internet, and then sends the information to the requester on the intranet. By acting as a go-between like this, proxy servers can filter traffic and maintain security as well as log all traffic between the Internet and the network.

Bastion hosts are heavily fortified servers that handle all incoming requests from the Internet, such as FTP requests. A single bastion host handling incoming requests makes it easier to maintain security and track attacks. In the event of a break in, only that single host has been compromised, instead of the entire network. In some firewalls, multiple bastion hosts can be used, one for each different kind of intranet service request.

How Firewalls Work

Firewalls protect intranets from any attacks launched against them from the Internet. They are designed to protect an intranet from unauthorized access to corporate information, and damaging or denying computer resources and services. They are also designed to stop people on the intranet from accessing Internet services that can be dangerous, such as FTP.

  1. Intranet computers are allowed access to the Internet only after passing through a firewall. Requests have to pass through an internal screening router, also called an internal filtering routeror choke router. This router prevents packet traffic from being sniffed remotely. A choke router examines all pack-ets for information such as the source and destination of the packet.
  2. The router compares the information it finds to rules in a filtering table, and passes or drops the packets based on those rules. For example, some services, such as rlogin, may not be allowed to run. The router also might not allow any packets to be sent to specific suspicious Internet locations. A router can also block every packet traveling between the Internet and the internal network, except for e-mail. System administrators set the rules for determining which packets to allow in and which to block.
  3. When an intranet is protected by a firewall, the usual internal intranet services are available-such as e-mail, access to corporate databases and Web services, and the use of groupware.
  4. Screened subnet firewalls have one more way to protect the intranet-an exterior screening router, also called an exterior filtering router or an access router. This router screens packets between the Internet and the perimeter network using the same kind of technology that the interior screening router uses. It can screen packets based on the same rules that apply to the internal screening router and can protect the network even if the internal router fails. It also, however, may have additional rules for screening packets specifically designed to protect the bastion host.
  5. As a way to further protect an intranet from attack, the bastion host is placed in a perimeter network-a subnet-inside the firewall. If the bastion host was on the intranet instead of a perimeter network and was broken into, the intruder could gain access to the intranet.
  6. A bastion host is the main point of contact for connections coming in from the Internet for all services such as e-mail, FTP access, and any other data and requests. The bastion host services all those requests-people on the intranet contact only this one server, and they don't directly contact any other intranet servers. In this way, intranet servers are protected from attack.

Intranet

Pawan Bangar, technical Director, Birbals, India.

www.birbals.com

www.seobirbals.com

www.hbirbals.com

www.ebirbals.com

pawan@ebirbals.com

Shower Door Hardware - A Checklist

Shower door hardware greatly influences the look as well as the performance of your shower door. Some of the basic hardware are sweeps, drip rails, hinges, pulls, handles, knobs, caddies and bumpers.

Many shower doors come in kits complete with appropriate hardware. But if you want to explore more options, you can go online (glassdistributorsinc.com, organizeit.com, etc) for a wide array of hardware choices. Take a look at some of them.

Hardware

Brass Clips:

American Shower Door offers these brass clips with flat or beveled edges. You can opt to have these clips customized for your preferred angles, designs and shapes. They are available as 2 inches by 2 inches and full 3 inches by 4 inches hinge profiles.

Vienna Series Frameless Shower Door Handles and Hinges:

This shower kits consist pull handle with 6-inch hole spacing and two bottom or top mount hinges. The Tubular Back-to-Back Economy Pull Handle features 1.5mm thick brass tubing, 1 and ¼-inch diameter metal washers and nylon spacer washers for glass contact protection. The hinges are designed for 3/8 inch to ½ inch glass and available in either glass-to-glass or wall mounting. The solid brass hinges have stainless steel moving parts. Finish options are chrome, brass and brushed nickel.

Stainless Tension Pole Shower Caddy:

This space-saving corner caddy is a perfect replacement designed to fit best in vertical spaces with height of five to nine feet. It is constructed of stainless steel in elegant polished finish. The complete set comes with four baskets where you can store your toiletries, towel bars and hooks. The available sizes are 8 and ½ inches wide by 5 feet to 9 feet high by 8 and ½ inches deep.

Contemporary Style Back-to-Back Shower Door Knob:

These solid brass knobs from Glass Distributors Inc. come in almost 17 attractive finishes. Prices vary according to the finish option--.30 for chrome, brass, brushed nickel, polished nickel, .40 for white and .50 for oil rubbed bronze and antique brass. Knob measurements are 1 and 3/16 inches in diameter and 1 and 3/16 inches in height.

7/8" Clear Shower Door Bumper - Package:

These clear bumpers are best for sliding doors. They have adhesive backing, medium hardness and a center screw home. They come in diameter of 7/8 inch.

U-Channels and Thresholds:

This header kit provides additional support and safety for your door. It secures the glass panels that have not reached the ceiling. The items are sold in 66 inches, 98 inches and 144 inches lengths, 1 and ¼ inches double profile extrusion and choices of facing edges. Part numbers and their finishes are SDH660BA in bright anodized, SDH660GA in bright gold, SDH660BL in black, SDH660GM in gun metal and SDH660W in white.

When buying shower door hardware, take time to examine the myriad of choices available on the market and choose the items that will work best in your shower room.

Shower Door Hardware - A Checklist

For more information about the various types of SHOWER DOOR HARDWARE, visit http://www.bathroomshowerdoorsonline.com.

Troubleshooting Computer Freeze (Lockup) Problems

How familiar does the following sound? Your computer was working fine, but then suddenly started locking up (aka hanging or freezing), rebooting itself (crashing) or shutting down spontaneously? If you know only too well what I am talking about, then read on! Performing the simple steps below can fix the majority of lockup cases.

1. Check for recently installed software or hardware.

Computer

If the lockups started to happen after you installed a new peace of hardware, new software program, or new drivers, uninstall it and see if the problem goes away.

2. Run your antivirus program.

One of the first things to do in the case of sudden lockups is to run your antivirus program. Check your antivirus manufacturer's website for updates and latest virus definition files. (This is absolutely necessary, outdated antivirus is not going to be of any use!) If you don't have antivirus software installed - or if updates are unavailable - run one of the web-based antivirus scans that some major antivirus vendors like Trend Micro are offering for free. You can find a comprehensive list of available web-based scans and free antivirus programs on http://www.free-antivirus.info.

3. Run some good spyware removal tool.

If your machine is not infected with any viruses, it is still possible that it has some harmful adware or spyware is present. Download and run some good spyware removal tool such as AdAware or Microsoft AntiSpyware. Check http://www.free-antivirus.info for a list of free spyware removal applications.

4. Check for free hard drive space.

When no viruses are found, check out free hard drive space on drive C:. Make sure there is more than 20% of free space available; low disk space can lead to random lockups.

5. Check for overheating.

Overheating is another known cause of lockups. It can be caused by problems with fans inside the case, dust buildup, or other cooling problems. Make sure the power supply fan and CPU fan are running and free of dust buildup. You can check the temperatures inside the case by running Motherboard monitor
http://mbm.livewiredev.com
- make sure the temperatures are within the preset limits. Be very careful while cleaning inside the computer case (use plastic vacuum crevice tool) and NEVER OPEN THE POWER SUPPLY CASE as it contains high voltage.

6. Check the hard disk.

Check the hard disk - it is possible that its logical structure is corrupted. To check the disk for errors, right-click on the disk C: icon in "My Computer", select the "Tools" tab, check all check boxes in the "Check disk options" field, and press the "Check now" button. It should ask whether you want to schedule the check next time you restart your computer - answer "Yes" and restart your PC. The check will be performed automatically after startup; it can take a while, so be patient. The program will attempt to fix some problems automatically - however, if the hard disk is failing physically, it will need to be replaced. It is also a good idea to run Disk Defragmenter (located in Start Menu > Programs > Accessories > System Tools) to optimize data placement on the hard disk for increased performance and reliability.

7. Check the memory.

Sometimes random lockups can be attributed to the computer memory (RAM) starting to fail. You can test the memory by running Windows Memory Diagnostic that can be downloaded from http://oca.microsoft.com/en/windiag.asp. If memory problems are found, try re-seating the RAM (pull it out and plug it back in). If it doesn't work, replace the defective RAM.

8. Check for other hardware problems (advanced users).

More hardware-related problems can be diagnosed by running hardware tests from the Ultimate Boot CD that can be downloaded from http://www.ultimatebootcd.com. However, you should only use it if you know what are you doing - some programs on that CD can be dangerous when used inappropriately (for example, some of them can wipe the contents of your hard disk).

9. Update Windows and drivers.

Some lockups can be caused by outdated software components - update your windows and drives by running a windows update: http://windowsupdate.microsoft.com (it's good idea to run it regularly).

The above steps will help diagnose and eliminate the most common causes of lockups. Hundreds more of other possible scenarios need to be dealt with on a case-by-case basis, as it all goes down to your particular computer configuration. Asking on PC
troubleshooting forums/newsgroups
should help you figure out solutions to not-so-obvious lockup cases.

Troubleshooting Computer Freeze (Lockup) Problems

Michael Woodford is a computer expert from a team that runs HowToFixcomputers.com and CertFAQ.com.