Thursday, September 9, 2010

Computer Keyboard Shortcuts

Windows system key combinations

  • F1: Help
  • CTRL+ESC: Open Start menu
  • ALT+TAB: Switch between open programs
  • ALT+F4: Quit program
  • SHIFT+DELETE: Delete item permanently
  • Windows Logo+L: Lock the computer (without using CTRL+ALT+DELETE)

Windows program key combinations

  • CTRL+C: Copy
  • CTRL+X: Cut
  • CTRL+V: Paste
  • CTRL+Z: Undo
  • CTRL+B: Bold
  • CTRL+U: Underline
  • CTRL+I: Italic

Mouse click/keyboard modifier combinations for shell objects

  • SHIFT+right click: Displays a shortcut menu containing alternative commands
  • SHIFT+double click: Runs the alternate default command (the second item on the menu)
  • ALT+double click: Displays properties
  • SHIFT+DELETE: Deletes an item immediately without placing it in the Recycle Bin

General keyboard-only commands

  • F1: Starts Windows Help
  • F10: Activates menu bar options
  • SHIFT+F10 Opens a shortcut menu for the selected item (this is the same as right-clicking an object
  • CTRL+ESC: Opens the Start menu (use the ARROW keys to select an item)
  • CTRL+ESC or ESC: Selects the Start button (press TAB to select the taskbar, or press SHIFT+F10 for a context menu)
  • CTRL+SHIFT+ESC: Opens Windows Task Manager
  • ALT+DOWN ARROW: Opens a drop-down list box
  • ALT+TAB: Switch to another running program (hold down the ALT key and then press the TAB key to view the task-switching window)
  • SHIFT: Press and hold down the SHIFT key while you insert a CD-ROM to bypass the automatic-run feature
  • ALT+SPACE: Displays the main window's System menu (from the System menu, you can restore, move, resize, minimize, maximize, or close the window)
  • ALT+- (ALT+hyphen): Displays the Multiple Document Interface (MDI) child window's System menu (from the MDI child window's System menu, you can restore, move, resize, minimize, maximize, or close the child window)
  • CTRL+TAB: Switch to the next child window of a Multiple Document Interface (MDI) program
  • ALT+underlined letter in menu: Opens the menu
  • ALT+F4: Closes the current window
  • CTRL+F4: Closes the current Multiple Document Interface (MDI) window
  • ALT+F6: Switch between multiple windows in the same program (for example, when the Notepad Find dialog box is displayed, ALT+F6 switches between the Find dialog box and the main Notepad window)

Shell objects and general folder/Windows Explorer shortcuts

For a selected object:
  • F2: Rename object
  • F3: Find all files
  • CTRL+X: Cut
  • CTRL+C: Copy
  • CTRL+V: Paste
  • SHIFT+DELETE: Delete selection immediately, without moving the item to the Recycle Bin
  • ALT+ENTER: Open the properties for the selected object

To copy a file

Press and hold down the CTRL key while you drag the file to another folder.

To create a shortcut

Press and hold down CTRL+SHIFT while you drag a file to the desktop or a folder.

General folder/shortcut control

  • F4: Selects the Go To A Different Folder box and moves down the entries in the box (if the toolbar is active in Windows Explorer)
  • F5: Refreshes the current window.
  • F6: Moves among panes in Windows Explorer
  • CTRL+G: Opens the Go To Folder tool (in Windows 95 Windows Explorer only)
  • CTRL+Z: Undo the last command
  • CTRL+A: Select all the items in the current window
  • BACKSPACE: Switch to the parent folder
  • SHIFT+click+Close button: For folders, close the current folder plus all parent folders

Windows Explorer tree control

  • Numeric Keypad *: Expands everything under the current selection
  • Numeric Keypad +: Expands the current selection
  • Numeric Keypad -: Collapses the current selection.
  • RIGHT ARROW: Expands the current selection if it is not expanded, otherwise goes to the first child
  • LEFT ARROW: Collapses the current selection if it is expanded, otherwise goes to the parent

Properties control

  • CTRL+TAB/CTRL+SHIFT+TAB: Move through the property tabs

Accessibility shortcuts

  • Press SHIFT five times: Toggles StickyKeys on and off
  • Press down and hold the right SHIFT key for eight seconds: Toggles FilterKeys on and off
  • Press down and hold the NUM LOCK key for five seconds: Toggles ToggleKeys on and off
  • Left ALT+left SHIFT+NUM LOCK: Toggles MouseKeys on and off
  • Left ALT+left SHIFT+PRINT SCREEN: Toggles high contrast on and off

Microsoft Natural Keyboard keys

  • Windows Logo: Start menu
  • Windows Logo+R: Run dialog box
  • Windows Logo+M: Minimize all
  • SHIFT+Windows Logo+M: Undo minimize all
  • Windows Logo+F1: Help
  • Windows Logo+E: Windows Explorer
  • Windows Logo+F: Find files or folders
  • Windows Logo+D: Minimizes all open windows and displays the desktop
  • CTRL+Windows Logo+F: Find computer
  • CTRL+Windows Logo+TAB: Moves focus from Start, to the Quick Launch toolbar, to the system tray (use RIGHT ARROW or LEFT ARROW to move focus to items on the Quick Launch toolbar and the system tray)
  • Windows Logo+TAB: Cycle through taskbar buttons
  • Windows Logo+Break: System Properties dialog box
  • Application key: Displays a shortcut menu for the selected item

Microsoft Natural Keyboard with IntelliType software installed

  • Windows Logo+L: Log off Windows
  • Windows Logo+P: Starts Print Manager
  • Windows Logo+C: Opens Control Panel
  • Windows Logo+V: Starts Clipboard
  • Windows Logo+K: Opens Keyboard Properties dialog box
  • Windows Logo+I: Opens Mouse Properties dialog box
  • Windows Logo+A: Starts Accessibility Options (if installed)
  • Windows Logo+SPACEBAR: Displays the list of Microsoft IntelliType shortcut keys
  • Windows Logo+S: Toggles CAPS LOCK on and off

Dialog box keyboard commands

  • TAB: Move to the next control in the dialog box
  • SHIFT+TAB: Move to the previous control in the dialog box
  • SPACEBAR: If the current control is a button, this clicks the button. If the current control is a check box, this toggles the check box. If the current control is an option, this selects the option.
  • ENTER: Equivalent to clicking the selected button (the button with the outline)
  • ESC: Equivalent to clicking the Cancel button
  • ALT+underlined letter in dialog box item: Move to the corresponding item
References:
http://support.microsoft.com/kb/126449
Retrival Date:
09/09/10

Monday, July 26, 2010

IPHONE Apps

Pandora Radio

Tune in.

Choose a favorite song or artist and Pandora
Radio plays the music you want to hear and music
just like it. Discover new artists with similar sounds
and skip over songs you don’t like.

Square

Get paid.

Square is a mobile payment system that enables
you to accept credit card payments from customers
and friends — with no contracts, monthly fees, or
hidden costs. Just plug the free card reader into your
iPhone and start swiping.
View in the App Store
http://www.apple.com/iphone/apps-for-iphone/?cid=wwa-naus-seg-iphone10-015&cp=www-seg-iphone10-apps&sr=sem
07-26-10

How to use a computer

In computing, a keyboard is an input device, partially modeled after the typewriter keyboard, which uses an arrangement of buttons or keys, to act as mechanical levers or electronic switches. After punch cards and paper tape, interaction via teletype-style keyboards became the main input device for computers.
Despite the development of alternative input devices, such as the mouse (computing mouse), touch sensitive screens, pen devices, character recognition, voice recognition, and improvements in computer speed and memory size, the keyboard remains the most commonly used and most versatile device used for direct (human) input into computers.
A keyboard typically has characters engraved or printed on the keys and each press of a key typically corresponds to a single written symbol. However, to produce some symbols requires pressing and holding several keys simultaneously or in sequence. While most keyboard keys produce letters, numbers or signs (characters), other keys or simultaneous key presses can produce actions or computer commands.
In normal usage, the keyboard is used to type text and numbers into a word processor, text editor or other program. In a modern computer, the interpretation of key presses is generally left to the software. A computer keyboard distinguishes each physical key from every other and reports all key presses to the controlling software. Keyboards are also used for computer gaming, either with regular keyboards or by using keyboards with special gaming features, which can expedite frequently used keystroke combinations. A keyboard is also used to give commands to the operating system of a computer, such as Windows' Control-Alt-Delete combination, which brings up a task window or shuts down the machine.

Laptop-size

Keyboards on laptops and notebook computers usually have a shorter travel distance for the keystroke and a reduced set of keys. They may not have a numerical keypad, and the function keys may be placed in locations that differ from their placement on a standard, full-sized keyboard.

Thumb-sized

Smaller keyboards have been introduced for laptops, PDAs, cellphones or users who have a limited workspace. The size of a standard keyboard is dictated by the practical consideration that the keys must be large enough to be easily pressed by fingers. To reduce the size of the keyboard, the numeric keyboard to the right of the alphabetic keyboard can be removed, or the size of the keys can be reduced, which makes it harder to enter text.
Another way to reduce the size of the keyboard is to reduce the number of keys and use chording keyer, i.e. pressing several keys simultaneously. For example, the GKOS keyboard has been designed for small wireless devices. Other two-handed alternatives more akin to a game controller, such as the AlphaGrip, are also used as a way to input data and text. Another way to reduce the size of a keyboard is to use smaller buttons and pack them closer together. Such keyboards, often called a "thumbboard" (thumbing) are used in some personal digital assistants such as the Palm Treo and BlackBerry and some Ultra-Mobile PCs such as the OQO.

Numeric

Numeric keyboards contain only numbers, mathematical symbols for addition, subtraction, multiplication, and division, a decimal point, and several function keys (e.g. End, Delete, etc.). They are often used to facilitate data entry with smaller keyboard-equipped laptops or with smaller keyboards that do not have a numeric keypad. A laptop does sometimes have a numeric pad, but not all the time. These keys are also known as, collectively, a numeric pad, numeric keys, or a numeric keypad, and it can consist of the following types of keys:
  • arithmetic operators such as +, -, *, /
  • numeric digits 0-9
  • cursor arrow keys
  • navigation keys such as Home, End, PgUp, PgDown, etc.
  • Num Lock button, used to enable or disable the numeric pad
  • enter key

Non-standard or special-use types

 Chorded

While other keyboards generally associate one action with each key, chorded keyboards associate actions with combinations of key presses. Since there are many combinations available, chorded keyboards can effectively produce more actions on a board with fewer keys. Court reporters' stenotype machines use chorded keyboards to enable them to enter text much faster by typing a syllable with each stroke instead of one letter at a time. The fastest typists (as of 2007) use a stenograph, a kind of chorded keyboard used by most court reporters and closed-caption reporters. Some chorded keyboards are also made for use in situations where fewer keys are preferable, such as on devices that can be used with only one hand, and on small mobile devices that don't have room for larger keyboards. Chorded keyboards are less desirable in many cases because it usually takes practice and memorization of the combinations to become proficient.

 Software

Software keyboards or On-Screen Keyboards often take the form of computer programs that display an image of a keyboard on the screen. Another input device such as a mouse or a touchscreen can be used to each virtual key to enter text. Software keyboards have become very popular in touchscreen enabled cell phones, due to the additional cost and space requirements of other types of hardware keyboards. Microsoft Windows and Mac OS X both include on-screen keyboards that can be controlled with the mouse.

Foldable

A foldable keyboard.
Foldable (also called flexible) keyboards are made of soft plastic or silicone which can be rolled or folded on itself for travel.[2] When in use, these keyboards can conform to uneven surfaces, and are more resistant to liquids than standard keyboards. These can also be connected to portable devices and smartphones. Some models can be fully immersed in water, making them popular in hospitals and laboratories, as they can be disinfected.

 Projection/Laser

Projection keyboards project an image of keys, usually with a laser, onto a flat surface. The device then uses a camera or infrared sensor to "watch" where the user's fingers move, and will count a key as being pressed when it "sees" the user's finger touch the projected image. Projection keyboards can simulate a full size keyboard from a very small projector. Because the "keys' are simply projected images, they cannot be felt when pressed. Users of projected keyboards often experience increased discomfort in their fingertips because of the lack of "give" when typing. A flat, non-reflective surface is also required for the keys to be projected onto. Most projection keyboards are made for use with PDAs due to their small form factor.

Optical keyboard technology

Also known as photo-optical keyboard, light responsive keyboard, Photo-electric keyboard and optical key actuation detection technology.
An optical keyboard technology utilizes light emitting devices and photo sensors to optically detect actuated keys. Most commonly the emitters and sensors are located in the perimeter, mounted on a small PCB. The light is directed from side to side of the keyboard interior and it can only be blocked by the actuated keys. Most optical keyboards require at least 2 beams (most commonly vertical beam and horizontal beam) to determine the actuated key. Some optical keyboards use a special key structure that blocks the light in a certain pattern, allowing only one beam per row of keys (most commonly horizontal beam).
http://en.wikipedia.org/wiki/Keyboard_%28computing%29
07-26-10

Top 100 companies

3COM Corp.
Activision
Adobe
ADTRAN
Advanced Micro Devices, Inc.
Agilent Technologies, Inc.
Altera Corporation
Amazon.com
Analog
Anixter
Apple Computer Inc
Applied Materials, Inc.
Arrow Electronics Inc
ATI Technologies Systems Corporation
Atmel
Autodesk Inc.
Cadence
Canon
CDW
Cirrus Logic, Inc.
Cisco
Cognizant Technology Solutions
Coherent Corp
Computer Associates International, Inc.
Computer Sciences Corporation
Compuware Corp
Comverse Technology, Inc.
Corel
Corning Incorporated
CTG, Inc.
Cypress Semiconductor Corp.
Dell
Diode Inc
eBay
EDS
Electronic Arts
EMC Corp
Exabyte Corporation
Fiserv
Freescale Semiconductor, Inc.
Gateway, Inc.
Google
Hewlett-Packard
IBM
IDT Corporation
Imation
Ingram Micro
Intel Corp.
Intergraph
Intuit Inc.
Iomega Corp.
Komag, Incorporated
LAM Research
Lexmark
Logitech
LSI
Lucent
McAfee
MEMC Electronic Materials, Inc.
Mentor Corporation
Micron Technology
Microsoft
Motorola
N-C-R
National Semiconductor
Network Equipment Technologies, Inc.
Nextel Communications
Nortel
Novell
NVIDIA Corporation
Oracle Corp.
Palm, Inc.
Qualcomm
Quantum
Redback Networks Inc.
SanDisk
Sanmina SCI
Seagate
Silicon Graphics
Solectron Global Systems
Sprint
SSA Global
Sun Microsystems
Sybase
Symantec
Symbol Corp.
SYNNEX Corporation
Synopsys
Tektronix, Inc.
Tellabs Operations Inc
Texas Instruments Incorporated
Transmeta
Unisys
VeriSign
Verizon
Western Digital
Xerox
Xilinx
Yahoo
http://undress4success.com/individuals/bet-work-home-employers/top-100-computer-companies/
07-26-10

Saturday, July 3, 2010

What is a database

Many people are first exposed to databases by playing with Access, which comes included in many versions of Microsoft Office. Access is a powerful product aimed primarily at developers, and many novices come away from dabbling with it determined to stick to more user-friendly packages such as Excel.

That attitude might be OK for individual users, but most small businesses will eventually find themselves contemplating database software as their needs grow and their companies expand. But before you can even go about installing a database, you need to grapple with such confusing concepts as database servers, relational and object databases, and the thorny question of why apparently similar products range in price from free to hundreds of thousands of dollars.

This Buying Guide will help you through the database minefield. While picking a database server will never be as quick a decision as, say, buying a printer, it can be a highly valuable purchase if you go about it the right way.



What is a database? (Back to contents)

A database is simply an organised set of information. Strictly speaking, there's no need for it to even be in computerised form - address books are often used as a simple example of a database, since they contain large volumes of information organised into categories (name, address, and phone number). Despite this, most people now take the term 'database' to refer to information stored electronically.

Note also that the general definition of a database given here could encompass many common PC applications, such as electronic mail (which can be organised by recipient or sender) or information in a spreadsheet (which tends to be structured mathematically). In practice, the term 'database' is most commonly used to refer to highly structured information (examples might include order forms or medical information). Most business databases will contain a carefully planned set of information that can be analysed to indicate overall trends, as well as providing a historical record of past transactions and activities.

A basic database system simply allows you to enter and search for information (a process often known as querying). Most modern databases also support the development of specific applications that run on top of the database, which enable you to access the features you need without having to worry about all the complexities of the system. For instance, within one company general staff might have access to an order entry system, while financial staff have access to automatic reporting systems that provide sales summaries and other information. Both use a database server to store information, but the means of entering this, and the ability to change it after entry, will vary between the different applications.

The types of databases available

As database software has evolved, a number of different approaches to storing and linking information have emerged. Some of the more common include:

Relational databases. A relational database creates formal definitions of all the included items in a database, setting them out in tables, and defines the relationship between them. For instance, a typical business database would include tables for defining both customers and orders. Using ids or keys, the two tables can be related together. Such databases are called 'relational' because they explicitly define these connections (an order form can look up customer details from the customer table rather than having to store the information twice). Most relational databases now make use of SQL to handle queries (discussed in more detail below). Currently these are the most common form of database.

Object databases. Object databases store data in discreet, self-contained units - objects. These objects have specific data, attributes and behaviours associated with them. An extremely simple example might be a product database with a shirt object, which has attributes such as size, colour, and price. In practical use, the main difference between object and relational databases is the way in which data is accessed. Programmers use object-oriented programming languages to access the data objects from the object database by calling methods in their code. This takes much of the information that would have resided in the application code and transfers that information to the object database. Thus the application code is simplified. However, at the same time the fact that the database and application are tightly entwined can make accessing the data outside of the application more complex.

Object-relational databases. Object-relational databases attempt to combine object and relational approaches. This allows the benefits of using objects where necessary to be tied to the strengths of relational databases.

Hierarchical databases. While relational databases arrange data in tabular format, hierarchical databases arrange them in a tree format, with a parent node leading to further child nodes (which in turn may have further nodes of their own). The model is very similar to the way in which a program such as Windows Explorer displays the contents of a hard drive (double-clicking on a parent directory leads down the tree to further information, and so on down the directory tree). This allows for multiple types of subsidiary data, but makes it difficult to identify complex multiple relationships between individual data items (just as there is no obvious link between two subdirectories on a hard drive).

Until recently, hierarchical databases have been more common in computer science fields than in real-world applications. However, hierarchical methods have become more popular with the emergence of XML (Extensible Markup Language), which uses a hierarchical structure, as a common data exchange format.

http://qualityitconcepts1.blogspot.com/2010/07/different-kinds-of-databases.html

07/03/10

Database and why it is important

A database consists of an organized collection of data for one or more multiple uses. One way of classifying databases involves the type of content, for example: bibliographic, full-text, numeric, image. Other classification methods start from examining database models or database architectures: see below. Software organizes the data in a database according to a database model. As of 2010 the relational model occurs most commonly. Other models such as the hierarchical model and the network model use a more explicit representation of relationships.
   A database management system (DBMS) consists of software that organizes the storage of data. A DBMS controls the creation, maintenance, and use of the database storage structures of social organizations and of their users. It allows.
   When we maintain a small table of data, it could be easily accessed through MS Excel. However, this is not possible if we maintain large data as it simply takes much time to retrieve.

when we maintain a large business data through a database using a tool like My SQL, we can add, update, delete or retrieve any data within seconds using a language like SQL.

Also, we can link various databases for our convenience.

Database management systems perform a multitude of functions including providing security, multi-user access, it also transforms data into information. Database management systems also manage data stored and contains programming languages.


07/02/10

Thursday, June 24, 2010

What is Webmail (or Web-based e-mail)

Webmail (or Web-based e-mail) is an e-mail service intended to be primarily accessed via a web browser, as opposed to through a desktop e-mail client (such as Microsoft Outlook, Pegasus Mail, Mozilla's Thunderbird, or Apple Inc.'s Mail). Very popular webmail providers include Gmail, Yahoo! Mail, Hotmail, and AOL Mail.[1]
One advantage of webmail over application-based e-mail is that a user has the ability to access their inbox from any Internet-connected computer around the world. However, the need for Internet access is also a drawback, in that one cannot access old messages when not connected to the Internet (with the exception of some newer technologies, such as Gmail's "Offline Mail"[2] feature). On the other hand, if one uses the IMAP protocol through an application-based e-mail client, all contents of the mailbox will be consistently displayed in both the webmail and the PC e-mail client contexts.
In 1997, before its acquisition by Microsoft, Hotmail (now Windows Live Hotmail) introduced its service, which became one of the first popular web-based e-mail offerings. Following Hotmail's success, Google's introduction of Gmail in 2004 sparked a period of rapid development in webmail, due to Gmail's new features such as JavaScript menus, text-based ads, and bigger storage.

Contents

[hide]

[edit] History

The first webmail software was called WWW Mail[3] and was developed in perl by Soren Vejrum when he was studying and working at the Copenhagen Business School in Denmark. The development started in 1994 and after a period of personal use the first public version was released with freely downloadable source code on February 28, 1995.[4]
The second webmail software was called WebMail and was developed in perl by Luca Manunza[5][6] when he was working at CRS4, in Sardinia. The first working demo[7] was released on March 10, 1995; thereafter the source[8] was released (with registration required) on March 30, 1995.

[edit] Software packages

There are also software packages that allow organizations to offer e-mail through the web for their associates. Some solutions are open source software like Atmail, SquirrelMail, RoundCube, BlueMamba, IlohaMail, and UebiMiau, while others are commercial open source like Atmail or closed source like the Outlook Web Access module for Microsoft Exchange. Conversely, there are programs that can simulate a web browser to access webmail as if it were stored in a POP3 or IMAP account. They are susceptible, though, to changes in the user interface of the web service since there is no standard interface.
Some providers offer web access to other's e-mail servers. This allows web access to mailboxes where the mail server does not offer a web interface, or where an alternative interface is desired.

[edit] Rendering and compatibility

There are important differences in rendering capabilities for many popular webmail services such as Yahoo Mail, Gmail, and Windows Live Hotmail. Due to the various treatment of HTML tags, such as

http://en.wikipedia.org/wiki/E-mail
06/02/10

Wednesday, June 23, 2010

What is stand by mode on a computer

Computers

Sleep mode can go by many different names, including Stand By (for Microsoft Windows 95-Server 2003), Sleep (for Mac OS 8)-(Mac OS X, Windows Vista, Windows 7, Windows Server 2008), and Suspend (Linux). When placed in this Sleep mode, aside from the RAM which is required to restore the machine's state, the computer attempts to cut power to all unneeded parts of the machine. Because of the large power savings, most laptops automatically enter this mode when the computer is running on batteries and the lid is closed.
Though Sleep and Hibernate are generally thought as two separate functions, modern Macintoshes, Windows Vista (termed Hybrid Sleep), and some specially configured Linux machines also feature a variation of Sleep mode that incorporates the strengths of Hibernate. The RAM is copied to the hard drive before sleep mode is initiated, preserving the RAM contents in the event of a power loss.
ACPI is the current standard for power management, superseding APM and providing the backbone for sleep and hibernation on modern computers. Sleep mode corresponds to ACPI mode S3. When a non-ACPI device is plugged in, Windows will sometimes disable stand-by functionality for the whole operating system. Without ACPI functionality, as seen on older hardware, sleep mode is usually restricted to turning off the monitor and spinning down the hard drive.

[edit] Sleep Mode Testing

In the first years of introduction of sleep mode in the consumer market, it was usually not tested as thoroughly as the normal mode, causing various problems especially with peripherals like computer mice. Partly for these reasons, in industrial machines sleep mode was generally avoided because the costs associated with wasted time and materials far outweighed the savings in energy from sleep mode.

[edit] See also


http://en.wikipedia.org/wiki/Sleep_mode
06/23/10

Web Site Hosting

  • File hosting service (redirect from Web storage)
    A file hosting service, online file ... large files that are not web pages. ... Services offered: These sites are often used for web hosting . ...
    8 KB (1,149 words) - 18:40, 10 June 2010
  • Web hosting service (redirect from Web hosting)
    A web hosting service is a type of Internet hosting service that allows ... Personal web site hosting is typically free, advertisement- ...
    11 KB (1,468 words) - 05:01, 22 June 2010
  • Domain name (redirect from Web site name)
    Use in web site hosting: A domain name is a component of a Uniform Resource Locator (URL) used to access web site s, for example ...
    26 KB (3,750 words) - 19:29, 22 June 2010
  • Web traffic (section Increase web site traffic)
    Web traffic is the amount of data sent and received by visitors to a web site . ... individual leasing the bandwidth from an ISP or hosting site. ...
    12 KB (1,857 words) - 21:03, 18 June 2010
  • Sesame Street (section Web site)
    mail than any of the show's human hosts, on its cover and declared, " .. ... "Web site : Since 1998 Sesame Workshop has provided additional ...
    77 KB (10,892 words) - 20:34, 18 June 2010
  • Website (redirect from Web site)
    A website (also spelled Web site; officially styled website by the AP Stylebook ) is ... A web site is hosted on at least one web server , ...
    23 KB (3,271 words) - 16:28, 21 June 2010
  • SNL Financial
    SNL’s products include an online database with real-time news and analytical tools; investor relations Web site hosting; electronic ...
    7 KB (927 words) - 19:10, 28 October 2009
  • Orbitel
    Orbitel also provides services such as web site hosting, domain registration, corporate e-mail and professional consultations. ...
    6 KB (758 words) - 21:31, 17 November 2009
  • Aljazeera (section Web site attacks)
    The English-language site was forced to change internet hosting ... Web site attacks: Immediately after its launch in 2003, the English site was ...
    67 KB (9,373 words) - 11:30, 18 June 2010
  • 2008 Democratic National Convention (section Web Site)
    Convention Denver last hosted the Democratic National Convention in 1908 . ... Criticisms Web Site: for the convention web site, along with ...
    49 KB (6,809 words) - 16:08, 26 May 2010
  • International Lyrics Server
    The International Lyrics Server was a Swiss web site devoted to hosting user-supplied song lyrics . it was hosting over 100,000 song s ...
    1 KB (150 words) - 05:05, 26 November 2009
  • Congress of Industrial Organizations (section Web sites)
    Web sites : http://www. library. gsu. edu/spcoll/labor/wnp/ Work'n'Progress: ... University of California (hosted), Gerhard Peters (database).
    33 KB (5,203 words) - 21:45, 11 June 2010
  • Blue Network (section Web sites)
    for the first broadcast It was hosted by Johnny Olson , who would ... Web sites : last Haendiges | first Jerry | title Vintage Radio Logs | url ...
    78 KB (12,148 words) - 01:17, 7 June 2010
  • National Film Board of Canada (section NFB Web Sites)
    international web users the ability ... in blogs and social sites In October ... Various festivals, film exhibits and university clubs host ...
    37 KB (5,176 words) - 18:32, 16 June 2010
  • Baseball Prospectus (section Web site)
    Web site ... who since 2003 has written the "Under The Knife" daily column, a summary of injury news, and is a host of Baseball Prospectus Radio. ...
    52 KB (7,623 words) - 06:58, 21 June 2010
  • Fuel TV (section Web site)
    The shows host is an adult seemingly in his early 20's. ... Digital media Web site : Fuel TV's website includes extreme sports events listings, ...
    16 KB (2,433 words) - 01:28, 8 June 2010
  • Planet Half-Life (section Site hosting)
    Site hosting ... The web hosting is regulated through GameSpy , though the address of hosted sites is a subset of the Planet Half-Life domain. ...
    12 KB (1,810 words) - 03:19, 14 January 2010
  • Hyperborean cycle (section Web sites)
    A host of other deities play important roles in the cycle; foremost ... Web sites : author Cornford, Laurence J | title A Hyperborean Glossary | ...
    12 KB (1,754 words) - 12:19, 25 February 2010
  • CPanel (redirect from Web host manager)
    web hosting control panel that provides a graphical interface and automation tools designed to simplify the process of hosting a web site. ...
    6 KB (577 words) - 11:23, 22 May 2010
  • Openwares.org
    org is a public Open Source and Freeware software development web site, providing free publishing , packaging , hosting , and marketing ...
    2 KB (254 words) - 11:33, 18 February 2010
    06/23/10

Thursday, June 10, 2010

What is a GIF Image

Definitions of .gif on the Web:
Find definitions of .gif in:  Chinese (Simplified)  Chinese (Traditional)  Czech  Dutch   English  French  German  Italian  Japanese  Korean  Portuguese  Romanian  Russian  Slovak  Spanish  all languages

http://www.google.com/search?hl=en&client=firefox-a&hs=y8m&rls=org.mozilla:en-US:official&defl=en&q=define:.gif&sa=X&ei=AC8RTP6LKsG88gbytJmsBg&ved=0CBIQkAE
06/11/10

What are JPEG Images

Definitions of JPEG on the Web:
Find definitions of JPEG in:  Chinese (Simplified)  Chinese (Traditional)  Czech  Dutch   English  French  German  Italian  Japanese  Korean  Portuguese  Romanian  Russian  Slovak  Spanish  all languages

http://www.google.com/search?hl=en&client=firefox-a&hs=r6m&rls=org.mozilla:en-US:official&defl=en&q=define:JPEG&sa=X&ei=fS4RTPjFM4KC8ga346mOBg&ved=0CBUQkAE
06/11/10

Wednesday, June 9, 2010

NIC Card

Ethernet is a family of frame-based computer networking technologies for local area networks (LANs). The name came from the physical concept of the ether. It defines a number of wiring and signaling standards for the Physical Layer of the OSI networking model as well as a common addressing format and Media Access Control at the Data Link Layer.
Ethernet is standardized as IEEE 802.3. The combination of the twisted pair versions of Ethernet for connecting end systems to the network, along with the fiber optic versions for site backbones, is the most widespread wired LAN technology. It has been used from around 1980[1] to the present, largely replacing competing LAN standards such as token ring, FDDI, and ARCNET.
A standard 8P8C (often called RJ45) connector used most commonly on cat5 cable, a type of cabling used primarily in Ethernet networks.
The Internet Protocol Suite
Application Layer
BGP · DHCP · DNS · FTP · GTP · HTTP · IMAP · IRC · LDAP · Megaco · MGCP · NNTP · NTP · POP · RIP · RPC · RTP · RTSP · SDP · SIP · SMTP · SNMP · SOAP · SSH · Telnet · XMPP · (more)
Transport Layer
TCP · UDP · DCCP · SCTP · RSVP · TLS/SSL · ECN · (more)
Internet Layer
IP (IPv4, IPv6) · ICMP · ICMPv6 · IGMP · IPsec · (more)
Link Layer
ARP/InARP · NDP · OSPF · Tunnels (L2TP) · PPP · Media Access Control (Ethernet, DSL, ISDN, FDDI) · (more)

Contents

[hide]

[edit] History

Ethernet was developed at Xerox PARC between 1973 and 1975.[2] It was inspired by ALOHAnet which Robert Metcalfe had studied as part of his Ph. D. dissertation.[3] In 1975, Xerox filed a patent application listing Metcalfe, David Boggs, Chuck Thacker and Butler Lampson as inventors.[4] In 1976, after the system was deployed at PARC, Metcalfe and Boggs published a seminal paper.[5][note 1]
Metcalfe left Xerox in 1979 to promote the use of personal computers and local area networks (LANs), forming 3Com. He convinced Digital Equipment Corporation (DEC), Intel, and Xerox to work together to promote Ethernet as a standard, the so-called "DIX" standard, for "Digital/Intel/Xerox"; it specified the 10 megabits/second Ethernet, with 48-bit destination and source addresses and a global 16-bit Ethertype type field. The first standard draft was first published on September 30, 1980 by the Institute of Electrical and Electronics Engineers (IEEE).[citation needed] Support of Ethernet's carrier sense multiple access with collision detection (CSMA/CD) in other standardization bodies (i.e. ECMA, IEC and ISO) was instrumental in getting past delays of the finalization of the Ethernet standard due to the difficult decision processes in the IEEE, and due to the competitive Token Ring proposal strongly supported by IBM.[citation needed] Ethernet initially competed with two largely proprietary systems, Token Ring and Token Bus. These proprietary systems soon found themselves buried under a tidal wave of Ethernet products. In the process, 3Com became a major company. 3Com built the first 10 Mbit/s Ethernet adapter (1981).[citation needed] This was followed quickly by DEC's Unibus to Ethernet adapter, which DEC sold and used internally to build its own corporate network, which reached over 10,000 nodes by 1986; far and away the largest extant computer network in the world at that time.[citation needed]
Through the first half of the 1980s, Digital's Ethernet implementation utilized a coaxial cable about the diameter of a US nickel which became known as Thick Ethernet when its successor, Thinnet Ethernet was introduced. Thinnet uses a cable similar to cable television cable of the era. The emphasis was on making installation of the cable easier and less costly.
The observation that there was plenty of excess capacity in unused unshielded twisted pair (UTP) telephone wiring already installed in commercial buildings provided another opportunity to expand the installed base and thus twisted-pair Ethernet was the next logical development in the mid 1980s, beginning with StarLAN. UTP-based Ethernet became widely known with 10BASE-T standard. This system replaced the coaxial cable systems with a system of hubs linked via UTP.
In 1990, Kalpana introduced the first Ethernet switch[6] which replaced the CSMA/CD scheme in favor of a switched full duplex system offering higher performance and at a lower cost than using routers.

[edit] Standardization

Notwithstanding its technical merits, timely standardization was instrumental to the success of Ethernet. It required well-coordinated and partly competitive activities in several standardization bodies such as the IEEE, ECMA, IEC, and finally ISO.
In February 1980 IEEE started a project, IEEE 802, for the standardization of local area networks (LAN).[7]
The "DIX-group" with Gary Robinson (DEC), Phil Arst (Intel) and Bob Printis (Xerox) submitted the so-called "Blue Book" CSMA/CD specification as a candidate for the LAN specification. Since IEEE membership is open to all professionals, including students, the group received countless comments on this brand-new technology.
In addition to CSMA/CD, Token Ring (supported by IBM) and Token Bus (selected and henceforward supported by General Motors) were also considered as candidates for a LAN standard. Due to the goal of IEEE 802 to forward only one standard and due to the strong company support for all three designs, the necessary agreement on a LAN standard was significantly delayed.
In the Ethernet camp, it put at risk the market introduction of the Xerox Star workstation and 3Com's Ethernet LAN products. With such business implications in mind, David Liddle (General Manager, Xerox Office Systems) and Metcalfe (3Com) strongly supported a proposal of Fritz Röscheisen (Siemens Private Networks) for an alliance in the emerging office communication market, including Siemens' support for the international standardization of Ethernet (April 10, 1981). Ingrid Fromm, Siemens representative to IEEE 802 quickly achieved broader support for Ethernet beyond IEEE by the establishment of a competing Task Group "Local Networks" within the European standards body ECMA TC24. As early as March 1982 ECMA TC24 with its corporate members reached agreement on a standard for CSMA/CD based on the IEEE 802 draft. The speedy action taken by ECMA decisively contributed to the conciliation of opinions within IEEE and approval of IEEE 802.3 CSMA/CD by the end of 1982.
Approval of Ethernet on the international level was achieved by a similar, cross-partisan action with Fromm as liaison officer working to integrate IEC TC83 and ISO TC97SC6, and the ISO/IEEE 802/3 standard was approved in 1984.

[edit] General description

A 1990s network interface card. This is a combination card that supports both coaxial-based using a 10BASE2 (BNC connector, left) and twisted pair-based 10BASE-T, using an RJ45 (8P8C modular connector, right).
Ethernet was originally based on the idea of computers communicating over a shared coaxial cable acting as a broadcast transmission medium. The methods used show some similarities to radio systems, although there are fundamental differences, such as the fact that it is much easier to detect collisions in a cable broadcast system than a radio broadcast. The common cable providing the communication channel was likened to the ether and it was from this reference that the name "Ethernet" was derived.
The advantage of CSMA/CD was that, unlike Token Ring and Token Bus, all nodes could "see" each other directly. All "talkers" shared the same medium - a single coaxial cable - however, this was also a limitation; with only one speaker at a time, packets had to be of a minimum size to guarantee that the leading edge of the propagating wave of the message got to all parts of the medium before the transmitter could stop transmitting, thus guaranteeing that collisions (two or more packets initiated within a window of time which forced them to overlap) would be discovered. Minimum packet size and the physical medium's total length were thus closely linked.
From this early and comparatively simple concept, Ethernet evolved into the complex networking technology that today underlies most LANs. The coaxial cable was replaced with point-to-point links connected by Ethernet hubs and/or switches to reduce installation costs, increase reliability, and enable point-to-point management and troubleshooting. StarLAN was the first step in the evolution of Ethernet from a coaxial cable bus to a hub-managed, twisted-pair network. The advent of twisted-pair wiring dramatically lowered installation costs relative to competing technologies, including the older Ethernet technologies.
Above the physical layer, Ethernet stations communicate by sending each other data packets, blocks of data that are individually sent and delivered. As with other IEEE 802 LANs, each Ethernet station is given a single 48-bit MAC address, which is used to specify both the destination and the source of each data packet. Network interface cards (NICs) or chips normally do not accept packets addressed to other Ethernet stations. Adapters generally come programmed with a globally unique address, but this can be overridden, either to avoid an address change when an adapter is replaced, or to use locally administered addresses.
Despite the significant changes in Ethernet from a thick coaxial cable bus running at 10 Mbit/s to point-to-point links running at 1 Gbit/s and beyond, all generations of Ethernet (excluding early experimental versions) share the same frame formats (and hence the same interface for higher layers), and can be readily interconnected.
Due to the ubiquity of Ethernet, the ever-decreasing cost of the hardware needed to support it, and the reduced panel space needed by twisted pair Ethernet, most manufacturers now build the functionality of an Ethernet card directly into PC motherboards, eliminating the need for installation of a separate network card.

[edit] Dealing with multiple clients

[edit] CSMA/CD shared medium Ethernet

Ethernet originally used a shared coaxial cable (the shared medium) winding around a building or campus to every attached machine. A scheme known as carrier sense multiple access with collision detection (CSMA/CD) governed the way the computers shared the channel. This scheme was simpler than the competing token ring or token bus technologies. When a computer wanted to send some information, it used the following algorithm:

[edit] Main procedure

  1. Frame ready for transmission.
  2. Is medium idle? If not, wait until it becomes ready and wait the interframe gap period (9.6 µs in 10 Mbit/s Ethernet).
  3. Start transmitting.
  4. Did a collision occur? If so, go to collision detected procedure.
  5. Reset retransmission counters and end frame transmission.

[edit] Collision detected procedure

  1. Continue transmission until minimum packet time is reached (jam signal) to ensure that all receivers detect the collision.
  2. Increment retransmission counter.
  3. Was the maximum number of transmission attempts reached? If so, abort transmission.
  4. Calculate and wait random backoff period based on number of collisions.
  5. Re-enter main procedure at stage 1.
This can be likened to what happens at a dinner party, where all the guests talk to each other through a common medium (the air). Before speaking, each guest politely waits for the current speaker to finish. If two guests start speaking at the same time, both stop and wait for short, random periods of time (in Ethernet, this time is generally measured in microseconds). The hope is that by each choosing a random period of time, both guests will not choose the same time to try to speak again, thus avoiding another collision. Exponentially increasing back-off times (determined using the truncated binary exponential backoff algorithm) are used when there is more than one failed attempt to transmit.
Computers were connected to an Attachment Unit Interface (AUI) transceiver, which was in turn connected to the cable (later with thin Ethernet the transceiver was integrated into the network adapter). While a simple passive wire was highly reliable for small Ethernets, it was not reliable for large extended networks, where damage to the wire in a single place, or a single bad connector, could make the whole Ethernet segment unusable. Multipoint systems are also prone to very strange failure modes when an electrical discontinuity reflects the signal in such a manner that some nodes would work properly while others work slowly because of excessive retries or not at all (see standing wave for an explanation of why); these could be much more painful to diagnose than a complete failure of the segment. Debugging such failures often involved several people crawling around wiggling connectors while others watched the displays of computers running a ping command and shouted out reports as performance changed.
Since all communications happen on the same wire, any information sent by one computer is received by all, even if that information is intended for just one destination. The network interface card interrupts the CPU only when applicable packets are received: the card ignores information not addressed to it unless it is put into "promiscuous mode". This "one speaks, all listen" property is a security weakness of shared-medium Ethernet, since a node on an Ethernet network can eavesdrop on all traffic on the wire if it so chooses. Use of a single cable also means that the bandwidth is shared, so that network traffic can slow to a crawl when, for example, the network and nodes restart after a power failure.

[edit] Repeaters and hubs

For signal degradation and timing reasons, coaxial Ethernet segments had a restricted size which depended on the medium used. For example, 10Base5 coax cables had a maximum length of 500 meters (1,640 ft) and 10Base2 coax cables had a maximum length of 185 meters (607 ft). Also, as was the case with most other high-speed buses, Ethernet segments had to be terminated with a resistor at each end. For coaxial-cable-based Ethernet, each end of the cable had a 50 ohm (Ω) resistor attached. Typically this resistor was built into a male BNC or N connector and attached to the last device on the bus, or, if vampire taps were in use, to the end of the cable just past the last device. If termination was not done, or if there was a break in the cable, the AC signal on the bus was reflected, rather than dissipated, when it reached the end. This reflected signal was indistinguishable from a collision, and so no communication would be able to take place.
Terminators had a metallic chain attached to them for grounding purposes, however many people never understood how to properly ground cabling and thus grounded the terminators at both ends rather than just one end. This caused many of the grounding loop problems during that era which caused network outages and/or data corruption when swells of electricity traversed the coaxial cabling's outer shield on its path to the ground with the least resistance.
A greater cabling length could be obtained by an Ethernet repeater, which took the signal from one Ethernet cable and repeated it onto another cable. If a collision was detected, the repeater transmitted a jam signal onto all ports (initial repeaters only had 2 ports but they gave way to 4-, 6-, 8-ports and more) to ensure collision detection. Repeaters could be used to transparently connect segments such that up to five Ethernet segments could be inter-joined between any two hosts, of which 3 of those segments could have attached devices and the other 2 segments were only used to increase distance, but would not have any hosts attached (i.e. only repeaters attached at each end). Repeaters could detect an improperly terminated link from the continuous collisions and stop forwarding data from it. Hence they alleviated the problem of cable breakages: when an Ethernet coax segment broke, while all devices on that segment were unable to communicate, repeaters allowed the other segments to continue working - although depending on which segment was broken and the layout of the network the partitioning that resulted may have made other segments unable to reach important servers and thus effectively useless.
The Ethernet 5-4-3 Rule was made following this standard to make it easier to remember. The "5" was the maximum number of segments which could be connected on a single network. The "4" was the maximum number of repeaters which could be used on that network. And the "3" was the maximum number of populated (segments with hosts attached) segments on that network.
People recognized the advantages of cabling in a star topology, primarily that only faults at the star point will result in a badly partitioned network, and network vendors began creating repeaters having multiple ports, thus reducing the number of repeaters required at the star point. Multiport Ethernet repeaters became known as "Ethernet hubs" with repeaters built into the hub itself. Network vendors such as DEC and SynOptics sold hubs that connected many 10Base5 thick coaxial and 10Base2 thin coaxial segments. There were also "multiport transceivers" or "fan-outs". These could be connected to each other and/or a coax backbone. A well-known early example was DEC's DELNI. These devices allowed multiple hosts with AUI connections to share a single transceiver. They also allowed creation of a small standalone Ethernet segment without using a coaxial backbone cable.
A twisted pair Cat-3 or Cat-5 cable is used to connect 10BASE-T Ethernet
Ethernet on unshielded twisted-pair cables (UTP), beginning with StarLAN and continuing with 10BASE-T, was designed for point-to-point links only and all termination was built into the device. This changed hubs from a specialist device used at the center of large networks to a device that every twisted pair-based network with more than two machines had to use. The tree structure that resulted from this made Ethernet networks more reliable by preventing faults with (but not deliberate misbehavior of) one peer or its associated cable from affecting other devices on the network, although a failure of a hub or an inter-hub link could still affect lots of users. Also, since twisted pair Ethernet is point-to-point and terminated inside the hardware, the total empty panel space required around a port is much reduced, making it easier to design hubs with lots of ports and to integrate Ethernet onto computer motherboards.
Despite the physical star topology, hubbed Ethernet networks still use half-duplex and CSMA/CD, with only minimal activity by the hub, primarily the Collision Enforcement signal, in dealing with packet collisions. Every packet is sent to every port on the hub, so bandwidth and security problems aren't addressed. The total throughput of the hub is limited to that of a single link and all links must operate at the same speed.
Collisions reduce throughput by their very nature. In the worst case, when there are lots of hosts with long cables that attempt to transmit many short frames, excessive collisions can reduce throughput dramatically. However, a Xerox report in 1980 summarized the results of having 20 fast nodes attempting to transmit packets of various sizes as quickly as possible on the same Ethernet segment.[8] The results showed that, even for the smallest Ethernet frames (64 Bytes), 90% throughput on the LAN was the norm. This is in comparison with token passing LANs (token ring, token bus), all of which suffer throughput degradation as each new node comes into the LAN, due to token waits.
This report was controversial, as modeling showed that collision-based networks became unstable under loads as low as 40% of nominal capacity. Many early researchers failed to understand the subtleties of the CSMA/CD protocol and how important it was to get the details right, and were really modeling somewhat different networks (usually not as good as real Ethernet).[9]

[edit] Bridging and switching

While repeaters could isolate some aspects of Ethernet segments, such as cable breakages, they still forwarded all traffic to all Ethernet devices. This created practical limits on how many machines could communicate on an Ethernet network. Also as the entire network was one collision domain and all hosts had to be able to detect collisions anywhere on the network, the number of repeaters between the farthest nodes was limited. Finally segments joined by repeaters had to all operate at the same speed, making phased-in upgrades impossible.
To alleviate these problems, bridging was created to communicate at the data link layer while isolating the physical layer. With bridging, only well-formed Ethernet packets are forwarded from one Ethernet segment to another; collisions and packet errors are isolated. Bridges learn where devices are, by watching MAC addresses, and do not forward packets across segments when they know the destination address is not located in that direction.
Prior to discovery of network devices on the different segments, Ethernet bridges (and switches) work somewhat like Ethernet hubs, passing all traffic between segments. However, as the bridge discovers the addresses associated with each port, it only forwards network traffic to the necessary segments, improving overall performance. Broadcast traffic is still forwarded to all network segments. Bridges also overcame the limits on total segments between two hosts and allowed the mixing of speeds, both of which became very important with the introduction of Fast Ethernet.
Early bridges examined each packet one by one using software on a CPU, and some of them were significantly slower than hubs (multi-port repeaters) at forwarding traffic, especially when handling many ports at the same time. This was in part due to the fact that the entire Ethernet packet would be read into a buffer, the destination address compared with an internal table of known MAC addresses and a decision made as to whether to drop the packet or forward it to another or all segments.
In 1989 the networking company Kalpana introduced their EtherSwitch, the first Ethernet switch. This worked somewhat differently from an Ethernet bridge, in that only the header of the incoming packet would be examined before it was either dropped or forwarded to another segment. This greatly reduced the forwarding latency and the processing load on the network device. One drawback of this cut-through switching method was that packets that had been corrupted at a point beyond the header could still be propagated through the network, so a jabbering station could continue to disrupt the entire network. The remedy for this was to make available store-and-forward switching, where the packet would be read into a buffer on the switch in its entirety, verified against its checksum and then forwarded. This was essentially a return to the original approach of bridging, but with the advantage of more powerful, application-specific processors being used. Hence the bridging is then done in hardware, allowing packets to be forwarded at full wire speed. It is important to remember that the term switch was invented by device manufacturers and does not appear in the 802.3 standard.
Since packets are typically only delivered to the port they are intended for, traffic on a switched Ethernet is slightly less public than on shared-medium Ethernet. Despite this, switched Ethernet should still be regarded as an insecure network technology, because it is easy to subvert switched Ethernet systems by means such as ARP spoofing and MAC flooding. The bandwidth advantages, the slightly better isolation of devices from each other, the ability to easily mix different speeds of devices and the elimination of the chaining limits inherent in non-switched Ethernet have made switched Ethernet the dominant network technology.
When a twisted pair or fiber link segment is used and neither end is connected to a hub, full-duplex Ethernet becomes possible over that segment. In full duplex mode both devices can transmit and receive to/from each other at the same time, and there is no collision domain. This doubles the aggregate bandwidth of the link and is sometimes advertised as double the link speed (e.g. 200 Mbit/s) to account for this. However, this is misleading as performance will only double if traffic patterns are symmetrical (which in reality they rarely are). The elimination of the collision domain also means that all the link's bandwidth can be used and that segment length is not limited by the need for correct collision detection (this is most significant with some of the fiber variants of Ethernet).

[edit] More advanced networks

Simple switched Ethernet networks, while an improvement over hub based Ethernet, suffer from a number of issues:
  • They suffer from single points of failure. If any link fails some devices will be unable to communicate with other devices and if the link that fails is in a central location lots of users can be cut off from the resources they require.
  • It is possible to trick switches or hosts into sending data to a machine even if it's not intended for it (see switch vulnerabilities).
  • Large amounts of broadcast traffic, whether malicious, accidental, or simply a side effect of network size can flood slower links and/or systems.
    • It is possible for any host to flood the network with broadcast traffic forming a denial of service attack against any hosts that run at the same or lower speed as the attacking device.
    • As the network grows, normal broadcast traffic takes up an ever greater amount of bandwidth.
    • If switches are not multicast aware, multicast traffic will end up treated like broadcast traffic due to being directed at a MAC with no associated port.
    • If switches discover more MAC addresses than they can store (either through network size or through an attack) some addresses must inevitably be dropped and traffic to those addresses will be treated the same way as traffic to unknown addresses, that is essentially the same as broadcast traffic (this issue is known as failopen).
  • They suffer from bandwidth choke points where a lot of traffic is forced down a single link.
Some switches offer a variety of tools to combat these issues including:
  • Spanning-tree protocol to maintain the active links of the network as a tree while allowing physical loops for redundancy.
  • Various port protection features, as it is far more likely an attacker will be on an end system port than on a switch-switch link.
  • VLANs to keep different classes of users separate while using the same physical infrastructure.
  • Fast routing at higher levels to route between those VLANs.
  • Link aggregation to add bandwidth to overloaded links and to provide some measure of redundancy, although the links won't protect against switch failure because they connect the same pair of switches.

[edit] Autonegotiation and duplex modes

While the early coaxial cable based variants of Ethernet were half-duplex by design, all the common variants of twisted pair (10BASE-T, 100BASE-TX and 1000BASE-T) and fiber optic Ethernet provide separate channels for send and receive (full-duplex).
To allow use of hubs and for compatibility with existing variants of Ethernet they were originally implemented in a half-duplex manner with the transceiver detecting a collision if an attempt was made to transmit and receive simultaneously. However, if both ends of the link are not hubs, and the hardware supports it, the two channels can be split and used to make a full-duplex link.
In combination with the various speeds, this results in many different modes of operations (10BASE-T half duplex, 10BASE-T full duplex, 100BASE-TX half duplex, …) for Ethernet over twisted pair cable. In 1995, IEEE standard 802.3u (100BASE-TX) was released, allowing two network interfaces connected to each other to autonegotiate the best possible shared mode of operation. While implementation of autonegotiation is not required for a compliant 10BASE-T or 100BASE-TX Ethernet port, it is recommended as default behaviour by IEEE 802.3u. 1000BASE-T devices are required to implement autonegotiation in order to elect the clock master.
Ethernet contains a mechanism for detecting the speed but not the duplex setting of an Ethernet peer that did not use autonegotiation. when the remote does not negotiate An autonegotiating device assumes the remote device is a hub and defaults to half duplex. If the remote is, in fact a hub or a device operating in half duplex mode this works. But if remote is in full duplex mode, this generates a duplex mismatch. When two interfaces are connected and set to different duplex modes, the effect of the duplex mismatch is a network that works, but is much slower than its nominal speed. To avoid this, never set one end of a connection to a forced full-duplex setting and the other end to autonegotiation. Or better yet, never disable autonegotiation on any port. There are no disadvantages of keeping autonegotiation active on all devices.

[edit] Physical layer

The first Ethernet networks, 10BASE5, used thick yellow cable with vampire taps as a shared medium (using CSMA/CD). Later, 10BASE2 Ethernet used thinner coaxial cable (with BNC connectors) as the shared CSMA/CD medium. The later StarLAN 1BASE5 and 10BASE-T used twisted pair connected to Ethernet hubs with 8P8C (RJ45) modular connectors.
Currently Ethernet has many varieties that vary both in speed and physical medium used. The most common forms used are 10BASE-T, 100BASE-TX, and 1000BASE-T. All three utilize Category 5 cables and 8P8C modular connectors. They run at 10 Mbit/s, 100 Mbit/s, and 1 Gbit/s, respectively.
Fiber optic variants of Ethernet are commonly used in structured cabling applications. These variants have also seen substantial penetration in enterprise datacenter applications, but are rarely seen connected to end user systems for cost/convenience reasons. Their advantages lie in performance, electrical isolation and distance (up to tens of kilometers with some versions). 10 gigabit Ethernet is becoming more popular in both enterprise and carrier networks, with development starting on 40 Gbit/s[10][11] and 100 Gbit/s Ethernet.[12] Metcalfe now believes commercial applications using terabit Ethernet may occur by 2015 though he says existing Ethernet standards may have to be overthrown to reach terabit Ethernet.[13]
A data packet on the wire is called a frame and consists of just a long string of binary 0's and 1's. A frame viewed on the actual physical wire would show Preamble and Start Frame Delimiter, in addition to the other data. These are required by all physical hardware. However, they are not displayed by packet sniffing software because these bits are stripped away at OSI Layer 1 by the Ethernet adapter before being passed on to the OSI Layer 2 which is where packet sniffers collect their data from. There are OSI Physical Layer sniffers which can capture and display the Preamble and Start Frame but they are expensive and mainly used to detect physical related problems.
The table below shows the complete Ethernet frame, as transmitted, for the MTU of 1500 bytes (some implementations of gigabit Ethernet and higher speeds support larger jumbo frames). Note that the bit patterns in the preamble and start of frame delimiter are written as bit strings, with the first bit transmitted on the left (not as byte values, which in Ethernet are transmitted least significant bit first). This notation matches the one used in the IEEE 802.3 standard. One octet is eight bits of data (i.e., a byte on most modern computers).
10/100M transceiver chips (MII PHY) work with four bits (one nibble) at a time. Therefore the preamble will be 7 instances of 0101 + 0101, and the Start Frame Delimiter will be 0101 + 1101. 8-bit values are sent low 4-bit and then high 4-bit. 1000M transceiver chips (GMII) work with 8 bits at a time, and 10 Gbit/s (XGMII) PHY works with 32 bits at a time.
802.3 MAC Frame
Preamble Start-of-Frame-Delimiter MAC destination MAC source 802.1Q header (optional) Ethertype/Length Payload (Data and padding) CRC32 Interframe gap
7 octets of 10101010 1 octet of 10101011 6 octets 6 octets (4 octets) 2 octets 46–1500 octets 4 octets 12 octets

64–1522 octets
72–1530 octets
84–1542 octets
After a frame has been sent transmitters are required to transmit 12 octets of idle characters before transmitting the next frame.
From this table, we may calculate the efficiency and net bit rate for Ethernet:
\text{Efficiency} = \frac{\text{Payload 
size}}{\text{Frame size}}
Maximum efficiency is achieved with largest allowed payload size and is \frac{1500}{1538} = 97.53% for untagged Ethernet packets and \frac{1500}{1542} = 97.28% when 802.1Q VLAN tagging is used.
Net bit rate may be calculated from efficiency:
\text{Net bit rate} = \text{Efficiency} \times 
\text{Wire bit rate}\,\!
Maximum net bit rate for 100BASE-TX Ethernet without 802.1Q is 97.53 Mbit/s.

[edit] Ethernet frame types and the EtherType field

There are several types of Ethernet frames:
In addition, all four Ethernet frames types may optionally contain a IEEE 802.1Q tag to identify what VLAN it belongs to and its IEEE 802.1p priority (quality of service). This encapsulation is defined in the IEEE 802.3ac specification and increases the maximum frame by 4 bytes to 1522 bytes.
The different frame types have different formats and MTU values, but can coexist on the same physical medium.
The most common Ethernet Frame format, type II
Versions 1.0 and 2.0 of the Digital/Intel/Xerox (DIX) Ethernet specification have a 16-bit sub-protocol label field called the EtherType. The new IEEE 802.3 Ethernet specification replaced that with a 16-bit length field, with the MAC header followed by an IEEE 802.2 logical link control (LLC) header. The maximum length of a frame was 1518 bytes for untagged (1522 for 802.1p or 802.1q tagged) classical Ethernet v2 and IEEE802.3 frames. The two formats were eventually unified by the convention that values of that field between 64 and 1522 indicated the use of the new 802.3 Ethernet format with a length field, while values of 1536 decimal (0600 hexadecimal) and greater indicated the use of the original DIX or Ethernet II frame format with an EtherType sub-protocol identifier.[14] This convention allows software to determine whether a frame is an Ethernet II frame or an IEEE 802.3 frame, allowing the coexistence of both standards on the same physical medium. See also Jumbo Frames.
By examining the 802.2 LLC header, it is possible to determine whether it is followed by a SNAP (subnetwork access protocol) header. Some protocols, particularly those designed for the OSI networking stack, operate directly on top of 802.2 LLC, which provides both datagram and connection-oriented network services. The LLC header includes two additional eight-bit address fields, called service access points or SAPs in OSI terminology; when both source and destination SAP are set to the value 0xAA, the SNAP service is requested. The SNAP header allows EtherType values to be used with all IEEE 802 protocols, as well as supporting private protocol ID spaces. In IEEE 802.3x-1997, the IEEE Ethernet standard was changed to explicitly allow the use of the 16-bit field after the MAC addresses to be used as a length field or a type field.
Novell's "raw" 802.3 frame format was based on early IEEE 802.3 work. Novell used this as a starting point to create the first implementation of its own IPX Network Protocol over Ethernet. They did not use any LLC header but started the IPX packet directly after the length field. This does not conform to the IEEE 802.3 standard, but since IPX has always FF at the first two bytes (while in IEEE 802.2 LLC that pattern is theoretically possible but extremely unlikely), in practice this mostly coexists on the wire with other Ethernet implementations, with the notable exception of some early forms of DECnet which got confused by this.
Novell NetWare used this frame type by default until the mid nineties, and since Netware was very widespread back then, while IP was not, at some point in time most of the world's Ethernet traffic ran over "raw" 802.3 carrying IPX. Since Netware 4.10, Netware now defaults to IEEE 802.2 with LLC (Netware Frame Type Ethernet_802.2) when using IPX. (See "Ethernet Framing" in References for details.)
Mac OS uses 802.2/SNAP framing for the AppleTalk V2 protocol suite on Ethernet ("EtherTalk") and Ethernet II framing for TCP/IP.
The 802.2 variants of Ethernet are not in widespread use on common networks currently, with the exception of large corporate Netware installations that have not yet migrated to Netware over IP. In the past, many corporate networks supported 802.2 Ethernet to support transparent translating bridges between Ethernet and IEEE 802.5 Token Ring or FDDI networks. The most common framing type used today is Ethernet Version 2, as it is used by most Internet Protocol-based networks, with its EtherType set to 0x0800 for IPv4 and 0x86DD for IPv6.
There exists an Internet standard for encapsulating IP version 4 traffic in IEEE 802.2 frames with LLC/SNAP headers.[15] It is almost never implemented on Ethernet (although it is used on FDDI and on token ring, IEEE 802.11, and other IEEE 802 networks). IP traffic cannot be encapsulated in IEEE 802.2 LLC frames without SNAP because, although there is an LLC protocol type for IP, there is no LLC protocol type for ARP. IP Version 6 can also be transmitted over Ethernet using IEEE 802.2 with LLC/SNAP, but, again, that's almost never used (although LLC/SNAP encapsulation of IPv6 is used on IEEE 802 networks).
The IEEE 802.1Q tag, if present, is placed between the Source Address and the EtherType or Length fields. The first two bytes of the tag are the Tag Protocol Identifier (TPID) value of 0x8100. This is located in the same place as the EtherType/Length field in untagged frames, so an EtherType value of 0x8100 means the frame is tagged, and the true EtherType/Length is located after the Q-tag. The TPID is followed by two bytes containing the Tag Control Information (TCI) (the IEEE 802.1p priority (quality of service) and VLAN id). The Q-tag is followed by the rest of the frame, using one of the types described above.

[edit] Runt frames

A runt frame is an Ethernet frame that is less than the IEEE 802.3 minimum length of 64 bytes. Possible causes are collision, underruns, bad network card or software.[16][17]

[edit] Varieties of Ethernet

The Ethernet physical layer evolved over a considerable time span and encompasses quite a few physical media interfaces and several magnitudes of speed. The speed ranges from 1 Mbit/s to 10 Gbit/s in speed (higher speeds are under development)[citation needed] while the physical medium can range from bulky coaxial cable to twisted pair to optical fiber. In general, network protocol stack software will work similarly on all varieties.

[edit] Related standards

  • Networking standards that are not part of the IEEE 802.3 Ethernet standard, but support the Ethernet frame format, and are capable of interoperating with it.
    • LattisNet—A SynOptics pre-standard twisted-pair 10 Mbit/s variant.
    • 100BaseVG—An early contender for 100 Mbit/s Ethernet. It runs over Category 3 cabling. Uses four pairs. Commercial failure.
    • TIA 100BASE-SX—Promoted by the Telecommunications Industry Association. 100BASE-SX is an alternative implementation of 100 Mbit/s Ethernet over fiber; it is incompatible with the official 100BASE-FX standard. Its main feature is interoperability with 10BASE-FL, supporting autonegotiation between 10 Mbit/s and 100 Mbit/s operation – a feature lacking in the official standards due to the use of differing LED wavelengths. It is targeted at the installed base of 10 Mbit/s fiber network installations.
    • TIA 1000BASE-TX—Promoted by the Telecommunications Industry Association, it was a commercial failure, and no products exist. 1000BASE-TX uses a simpler protocol than the official 1000BASE-T standard so the electronics can be cheaper, but requires Category 6 cabling.
    • G.hn—A standard developed by ITU-T and promoted by HomeGrid Forum for high-speed (up to 1 Gbit/s) local area networks over existing home wiring (coaxial cables, power lines and phone lines). G.hn defines an Application Protocol Convergence (APC) layer that accepts Ethernet frames and encapsulates them into G.hn MSDUs.
It has been observed that Ethernet traffic has self-similar properties, with important consequences for traffic engineering.[citation needed]

[edit] See also

[edit] Notes

  1. ^ The experimental Ethernet described in the 1976 paper ran at 3 Mbit/s and had eight-bit destination and source address fields, so the original Ethernet addresses were not the MAC addresses they are today. By software convention, the 16 bits after the destination and source address fields specified a "packet type", but, as the paper says, "different protocols use disjoint sets of packet types". Thus the original packet types could vary within each different protocol, rather than the packet type in the current Ethernet standard which specifies the protocol being used.
http://en.wikipedia.org/wiki/Ethernet
06/09/10