What is Client/Server Networking?
The term client/server refers to any network design utilizing "clients" and "servers." Client/server networks can be built on the Internet, on intranets, or in homes.
What is Peer-to-Peer Networking?
In contrast to client/server networking, peer-to-peer is a type of network design where all devices support roughly equivalent capabilities.
How is Network Performance Measured?
The performance or "speed" of a computer network is normally measured in units of bits per second (bps). This quantity can represent either an actual data rate or a theoretical limit to available network bandwidth. The related units of Kbps, Mbps, Gbps represent increasingly larger multiples of bps.
The term "WWW" refers to the open development phase of the Internet in the 1990s. The WWW comprises a global network of Web sites accessible on the Internet.
URLs (Uniform Resource Locators) identify by name Web servers and individual Web pages stored on those servers, anywhere on the Internet.
A URI (Uniform Resource Identifier) names both local and remote Internet resources similar to URLs.
Connecting Two Computers Directly With Cable
The traditional method to network two computers involves making a dedicated link by plugging one cable into the two systems. Several alternatives exist for networking two computers in this manner:
- Ethernet crossover cable
- Null modem serial cable or parallel peripheral cable
- Special-purpose USB cables
Ethernet - Of the above choices, the Ethernet method is preferred as it supports a reliable, high-speed connection with minimal configuration required(100Mbps).
Serial and parallel - This type of cabling, called Direct Cable Connection (DCC) when using Microsoft Windows, offers lower performance but offers the same basic functionality as Ethernet cables. You may prefer this option if you have such cables readily available and network speed is not a concern. Serial and parallel cables are never used to network more than two computers.
USB - Ordinary USB cables must not be used to connect two computers directly to each other. Attempting to do so can electrically damage the computers! However, special USB cables designed for direct connection exist that can be used safely. You may prefer this option over others if your computers l
ack functional Ethernet network adapters.
To make dedicated connections with Ethernet, USB, serial or parallel cables requires
- each computer have a functioning network interface with an external jack for the cable, and
- the network settings on each computer appropriately configured
IP a ddress without network mask is
just set of numbers.
CCNA Video Mentor: (CCNA Exam 640-802) (Video Learning), 2nd Edition
- By Wendell Odom.
- Published by Cisco Press.
- Series: Practical Studies.
ISBN-10: 1-58720-168-2; ISBN-13: 978-1-58720-168-4; Published: Aug 23, 2006; Copyright 2007; Dimensions 7-1/16x9-1/8; Pages: 80; Edition: 1st.
CCNA SNPA QUICK REFERENCE
Product Description
CCSP SNPA Quick Reference
Brandon James Carroll
ISBN-10: 1-58705-542-2
ISBN-13: 978-1-58705-542-3
As a final exam preparation tool, the CCSP SNPA Quick Reference provides a concise review of all objectives on the new CCSP SNPA exam (642-523). This digital Short Cut provides you with detailed, graphical-based information, highlighting only the key topics in cram-style format.
With this document as your guide, you will review topics on securing networks using routers and switches. These fact-filled Quick Reference Sheets allow you to get all-important information at a glance, helping you focus your study on areas of weakness and enhance memory retention of essential exam concepts.
TOC
1. Cisco Security Appliance Technology and Features and Families
2. Getting Started with Cisco Security Appliances Configurations
3. Inbound Traffic, ACLs, Object Grouping
4. AAA Configurations
5. Switching and Routing on ASA
6. Protocol Inspections
7. PIX and ASA VPNs
8. Understanding Transparent Firewall Mode
9. Virtual Firewalls
10. Failover
About the Author:
Brandon James Carroll is one of the country’s leading instructors for Cisco security technologies, teaching classes that include the CCNA, CCNP, and CCSP courses; a number of the CCVP courses’ and custom developed courseware. In his six years with Ascolta, Brandon has developed and taught many private Cisco courses for companies such as Boeing, Intel, and Cisco itself. He is a CCNA, CCNP, and CCSP and a certified Cisco instructor. Brandon is the author of Cisco Access Control Security.
Before becoming a technical instructor for Ascolta, Mr. Carroll was a technician and an ADSL specialist for GTE Network Services and Verizon Communications. His duties involved ISP router support and network design. As a lead engineer, he tested and maintained Frame Relay connections between Lucent B-STDX and Cisco routers. His team was in charge of troubleshooting ISP Frame Relay to ATM cutovers for ADSL customers. Brandon trained new employees at Verizon to the EPG in ADSL testing and troubleshooting procedures and managed a “Tekwizard” database for technical information and troubleshooting techniques. Mr. Carroll majored in information technology at
About the Technical Editor:
Murtaza Bhaiji, CCIE No. 14445 (Security), is a solution-oriented IT security specialist with notable success directing a broad range of corporate IT initiatives over his seven-year career. Murtaza holds a number of certifications in different fields, notably CCIE in Security. He has also been an avid speaker in forums such as Network Society of Pakistan and Ethink-Tank Tanzania. Murtaza’s specialty is in design aspects of solutions using best-fit technologies and products in line with business needs. Currently he is positioned as manager of networking and security for Mideast Data Systems.
India create history, win CB Series | |
India created history by notching up their first-ever cricket tri-series title on Australian soil by pipping the World Champions by nine runs in a nail-biting second final, which saw fortune fluctuating from one team to the other till the very end. |
Zvents releases open-source cluster database to beat Google!
Moving the project from in-house to open source is a way for a relatively small company to get the infrastructure software it needs, Judd says. “We aren’t in the database business. this is the kind of infrastructure that should be in open source. This is not company proprietary stuff,” he says.
The current Hypertable version is a 0.9 alpha release, and has been tested on about 10 nodes so far, Judd says. But Yahoo developers have expressed in interest in “kicking the tires” and testing on more nodes. Yahoo developers are already involved in another way: Hypertable stores its data on a distributed filesystem, and the database developers are currently using the Apache Software Foundation’s Hadoop, which Yahoo supports by employing lead Hadoop developer Doug Cutting and his team and with infrastructure.
The Google database design on which Hypertable is based, Bigtable, attracted a lot of developer buzz and a “Best Paper” award from the USENIX Association for “Bigtable: A Distributed Storage System for Structured Data” a 2006 publication from nine Google researchers including Fay Chang, Jeffrey Dean, and Sanjay Ghemawat. Google’s Bigtable uses the company’s in-house Google File System for storage.
The API for Hypertable is slightly different from Bigtable’s, Judd says. Although it is not a full SQL database, it is more featureful than a simple key/value store such as Brad Fitzpatrick’s memcached. Memcached is widely used along with a conventional SQL database in high-traffic web sites, to cache chunks of HTML and XML and save an application from having to query the main database.
Brian Aker, director of architecture for open source database supplier MySQL AB, says that he can see a development path that would bridge the gap from the Hypertable API to a full SQL database. In an email interview, he wrote, “Someone could turn this into a backend for MySQL without a lot of effort. You would gain an SQL interface by doing this.” For Hypertable as is, Aker says he can see several applications. Besides log data, Hypertable could be useful for image and object servers, and for pre-rendering responses to Representational State Transfer (REST) queries produced by web applications. By Don Marti, LinuxWorld.com,
EST, explained in one of last year’s hot web development books, RESTful Web Services, is a design philosophy for web applications that exposes a web application as a large tree of URLs. Since a client could potentially request or post data to one of many URLs, each responsible for a small piece of information, Hypertable could be a useful way to scale the REST server to handle more traffic.
Google uses Code Jam as job interview
Polish university student Marek Cygan has won this year’s Google Code Jam, the annual programming contest held last Friday at the California headquarters of the search firm.
Dutch student Erik-Jan Krijgsman finished second, followed by Petr Mitrichev from Moscow’s State University.
Cygan beat 99 fellow programmers from 32 countries to the first price of $10,000. The contestants were selected from a group of 14,500 hopefuls from around the world who entered the contest through the internet.
The programmers had 75 minutes to create a solution for three problems, followed by a 10-minute final round. Contestants were allowed to use the Java, C++, C# or VB.NET programming languages.
During an interview at the event, Google declined to provide details about the tasks as the competition was still running.
Previous contests involved contestants creating an application to calculate the shortest route through a maze, and to devise an application that would determine the largest group of people that know each other in a social network.
Another provided the coder with the weight of several children and asked them to create an application that would spread them on a seesaw so that the device would balance.
The tasks are not picked randomly, but are linked to problems that Google itself is facing with its applications.
“Things like finding the fastest way out of a maze is not that different from computing directions in Google Maps,” Jeff Huber, vice president of engineering at Google, told vnunet.com.
The competition helps the company identify programmers who are good at solving such problems and thereby acts as a recruiting tool. About a third of the 100 finalists also had a job interview scheduled.
Huber stressed, however, that winning the competition did not guarantee a job and that Google still followed its regular recruiting procedures. “This is a nice introduction, but not a shortcut,” he said.
This year’s competition marked the first time that a woman made it to the final round. Although Google declined to comment on Stefanie Leitzka’s performance, Huber hoped that the German student’s participation would encourage other women to start a career in computer sciences.
“We have a long way to go to improving the diversity that we should have in the field and the industry,” he acknowledged.
Huber could not provide a percentage of women software engineers in Google’s workforce, but said that the company is “healthy” relative to the industry.
Necessary skills to improve your earnings
Google to bid for 700MHz spectrum
Google intends to bid on wireless spectrum in the 700MHz band when the U.S. Federal Communications Commission begins auctioning that resource in late January, the company announced Friday.
On this topic
FCC awards spectrum to public safety group
Google needs telco partner for 700MHz bid, say analysts
E.U. releases telecom review, proposes spectrum shakeup
Wireless# Certification Official Study Guide
Get practical tips, IT news, how-tos, and the best in tech humor.
Google has previously expressed interest in the spectrum, which is being made available as U.S. television stations move to all-digital broadcasts by February 2009. Earlier this year, Google joined consumer and public-interest groups in calling for the FCC to impose open-access rules on part of the 62MHz of spectrum to be auctioned. In July, the FCC voted to require open-access rules, which would require the winning bidder to allow outside devices and applications on the network.
“We believe it’s important to put our money where our principles are,” Eric Schmidt, Google’s chairman and CEO, said in a statement. “Consumers deserve more competition and innovation than they have in today’s wireless world. No matter which bidder ultimately prevails, the real winners of this auction are American consumers who likely will see more choices than ever before in how they access the Internet.”
Google’s recently acquired interest in wireless spectrum has led it in several directions. The company launched the Open Handset Alliance, an open-development platform for mobile phones, earlier this month.
Google has also supported efforts to push Congress to pass net neutrality requirements, which would prohibit broadband providers from blocking or slowing Web content not approved by them. Google’s interest in the spectrum came after AT&T and other large broadband providers expressed interest in recent years in getting Web-based businesses to pay more for their customers’ use of the broadband networks.
Google will file an application to participate in the 700MHz auction on Monday, the company said in a news release. Google’s application will not include any partners.
In July, Google promised the FCC that it would bid at least US$4.6 billion for a block of spectrum. The FCC later set a reserve price of $4.6 billion on the so-called C Block of spectrum, the 22MHz block where the commission required open access. If the reserve price isn’t met, the FCC would re-auction the spectrum, presumably without the open-access rule.
Test your knowledge in networking
Security Quiz
. Which of the following will NOT help secure your desktop PCs?
2. Which of the following is an example of a strong password?
3. True or false: If you have a firewall on your network you don't need to turn on Windows Firewall.
4. How can you prevent intruders from accessing your wireless network?
5. True or false: If you set your antivirus software to auto-update then you don't need Windows Automatic Updates.
6. True or false: Small businesses are not targets for hackers.
7. What is "phishing?"
8. What product can be used to update all PCs on your network?
9. What method(s) can be used to protect sensitive data from prying eyes?
10. How often should you perform an incremental backup?
Correct answers are below
1 -> D
2-> B
3-> B
4-> C
5-> B
6-> B
7-> A
8-> B
10-> A