Monday 21 January 2013

A) INTRODUCTION

#Areas to be covered:


          a) what are protocol?

File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one host or to another host over a TCP-based network, such as the Internet.
FTP is built on a client-server architecture and uses separate control and data connections between the client and the server.[1] FTP users may authenticate themselves using a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that hides (encrypts) the username and password, and encrypts the content, FTP is often secured with SSL/TLS ("FTPS"). SSH File Transfer Protocol ("SFTP") is sometimes also used instead.
The first FTP client applications were command-line applications developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems.[2][3] Dozens of FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into hundreds of productivity applications, such as Web page editors.

         

          b) What is TPC/IP?

The Internet protocol suite is the set of communications protocols used for the Internet and similar networks, and generally the most popular protocol stack for wide area networks. It is commonly known as TCP/IP, because of its most important protocols: Transmission Control Protocol (TCP) and Internet Protocol (IP), which were the first networking protocols defined in this standard. It is occasionally known as the DoD model due to the foundational influence of the ARPANET in the 1970s (operated by DARPA, an agency of the United States Department of Defense).
TCP/IP provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. It has four abstraction layers which are used to sort all Internet protocols according to the scope of networking involved.[1][2] From lowest to highest, the layers are:
  1. The link layer contains communication technologies for a local network.
  2. The internet layer (IP) connects local networks, thus establishing internetworking.
  3. The transport layer handles host-to-host communication.
  4. The application layer contains all protocols for specific data communications services on a process-to-process level. For example, HTTP specifies the web browser communication with a web server.
The TCP/IP model and related protocols are maintained by the Internet Engineering Task Force (IETF).



         c) How does information travel through the Internet?


The Internet is based on packet-switched protocols. Information is carried in packets, which can be imagined as small parcels being passed from computer to computer. Large chunks of data are usually broken up into several smaller packets before being sent through the network. The delivery mechanism, or protocol, that is used to encode the packet ensures safe transit, and provides a way of reconstructing the data when it reaches its destination. The protocols used on the Internet are referred to as TCP/IP, standing for Transmission Control Protocol / Internet Protocol.
As a switched network, the physical connections between computers do not matter as far as Internet traffic is concerned — the protocols ensure that guaranteed information delivery is more important than speed or use of a particular route. This means that a sequence of packets might arrive out of order, with some travelling through the net by a faster, shorter route than others. TCP/IP provides the means for your software to piece together those packets into meaningful data. The ability to take different routes through the network is a fundamental part of the original design of TCP/IP, as it allows the Internet to route around damaged areas of the network.


      
      d) How does the connection work from home?


To connect from home you need several things. Apart from a computer (obviously!) you'll need a phone connection, a modem or ADSL router, and some Internet software. Things will be easier if you're using a relatively recent operation system, such as Windows Vista/XP or MacOSX, but it's possible to connect with older or more obscure systems.
With a modem and the appropriate software, you can dial up another modem connected to another computer, and establish a network connection with it. Usually, this computer is linked into the Internet, and so you're online.
With an ADSL modem or router, a similar procedure happens, but a filter splits the telephone line into voice and data (low and high frequencies) and your router negotiates a connection with the ADSL equipment in the telephone exchange.







B) ISP (INTERNET  SERVICE PROVIDER)


#Areas to be covered;



         a) what is ISP?


An Internet service provider (ISP) is an organization that provides access to the Internet. Access ISPs directly connect clients to the Internet using copper wires, wireless or fiber-optic connections.[1]
Hosting ISPs are a kind of colocation centre that leases server space to smaller businesses and other people. Transit ISPs provide large amounts of bandwidth for connecting hosting ISPs to access ISPs.[2]
Internet service providers can be either community-owned and non-profit, or privately owned and for-profit.



     b) connecting using ISP and how to choose an ISP;dialup,brodband,or mobile?


ISPs provide connections to the Internet through dial-in access (e.g., AOL and MSN), DSL connection (e.g., U.S.West), and cable modem service. You can use an ISP other than the UW to access almost every resource on the UW network.
You will want to start by installing the connectivity solution (this may involve extra hardware as well as software) provided by your ISP. Then, you will need to use some settings that are different than those used for the UW-provided (dial-in or on campus) connection.

The internet is seemingly everywhere these days; from the corner coffee shop to an airplane at 30,000 feet. Despite the ubiquity of internet access in public spaces, our homes are nonetheless domains of the internet service providers, or ISPs.
ISPs connect your home to the larger web, but not every connection is the same, and not every ISP is worth the roughly $50 a month you'll likely pay for high-speed home internet access. For many of us, a computer without an internet connection is just an overpriced typewriter, so some sort of connection is a must.
To take the mystery out of ISPs we've put together this guide to help you figure out the best option in your area.
This article is a wiki, which means you can log in and help edit it to make it better. Wanna lend a hand?




       c) choosing a broadband provider

        
There are a lot of factors to consider when comparing broadband packages, but perhaps the most important are speed, cost and contract length. With so many providers, contracts, offers and packages to choose from, the first step is to know exactly what you need.



  • Beginner's broadband. If you are just starting out, it's likely that you're looking for a package that's easy to set up, not too expensive and offers good customer support.
  • Heavy-Use broadband. You know if you are a heavy-user if you enjoy downloading oodles of songs and movies using peer-to-peer software, or you're a big fan of online gaming. Either way, our heavy-use packages are the ones to look out for.
  • Business broadband. These packages differ from consumer deals as they offer extras like static/fixed-IPs, webspace and email addresses as well as routers and secuity suites.
  • Mobile broadband. If you access the Internet primarily from your laptop, then mobile broadband is an option worth considering - whether to be used at home or on the go. Mobile broadband providers will send you a 'dongle' (modem) that you plug into the USB slot on your laptop to access the Internet, at broadband speeds, wherever there's mobile phone coverage



  •        d) measuring bandwidth

    Throughput of a network can be measured using various tools available on different platforms. This page explains the theory behind what these tools set out to measure and the issues regarding these measurements.
    Reasons for measuring throughput in networks People are often concerned about measuring the maximum data throughput in bits per second of a communications link or network access. A typical method of performing a measurement is to transfer a 'large' file from one system to another system and measure the time required to complete the transfer or copy of the file. The throughput is then calculated by dividing the file size by the time to get the throughput in megabitskilobits, or bits per second.
    Unfortunately, the results of such an exercise will result in the goodput which is typically less than the maximum theoretical data throughput, leading to people believing that their communications link is not operating correctly. In fact, there are many overheads accounted for in goodput in addition to transmission overheads, including latencyTCP Receive Window size and system limitations, which means the calculated goodput does not reflect the maximum achievable throughput






    c) WHO GOVERNS/REGULATES/CONTROLS THE INTERNET?


     The Internet grew as a collaborative network of researchers keen to share their discoveries in a simple, accessible way. Because of this, there was no real need to regulate or control the Internet; the information was already free and was of interest only to other researchers, so it didn't need protection. But as the Internet has grown, it has become a more commercial, public entity, and some who use it now wish it to be governed and policed to prevent certain types of abuse.


    D) WHO OWNS THE INTERNET?



    The simple answer to that question is nobody; and everybody. If you pay for an Internet connection you can consider yourself a shareholder, albeit a silent one, so shouldn’t you be a little more concerned about how it develops and the way it’s run?
    This year there has been a lot of talk about social media and the part it played in the ‘Arab Spring‘. Western cultures applauded the technology as a tool of revolution, lauding its freedom and openness as a fundamental human right. But when that infrastructure was used to incite and co-ordinate mindless violence and looting in theUK riots, those same voices were heard whispering about shutting down networks to stem the free flow of information that could be used for spurious means.
    But one man’s riot is another man’s revolution, right? I can imagine the questions raised in Hosni Mubarak’s private chambers on the eve of the Tahrir Square protests were not dissimilar in essence to those echoing around musty chambers of the Houses of Parliament in August of this year; “Can we stop the people talking?”
    But given that the Internet is a global nervous system of gateways and networks supported and operated by thousands upon thousands of separate entities across every nation on the planet, who has the right to make those decisions and by what measure does revolution become ariot?