Breaking News

Search This Blog

Sunday 13 November 2011

हिन्दी संगणक शब्दावली


हिन्दी संगणक शब्दावली

अंग्रेज़ीहिन्दी
(en)codingकूट लेखन
(inter)netअंतरजाल
accessप्रवेश, पहुंच
accessory(ies)सहायक/मददगर चीज़ें
activeसक्रिय, चालू
addजोड़ना, जमा करना
add-on cardऊपरी कार्ड
advancedविकसित
advertiseविज्ञापन/इश्तिहार देना
aggregatorसंचायिका
algorithmपद्धति
allocationबांटना, आवंटन
alphanumericअक्षरांकी(अक्षर-अंकी)
ALU (Arithmatic Logic Unit)अंकगणितीय तार्किक एकक
ampersandऔर का प्रतीक
appendixपरिशिष्ट
applicationअनुप्रयोग, प्रोग्राम
archiveपुराने लेख, लेखागार, (लेख)संग्रह
arithmeticअंकगणित
articleलेख
asteriskतारा
atomपरमाणु
attributeगुण
automaticस्वचालित, खुदकार
auxiliaryसहायक/मददगार
axisधुरी, अक्ष
back slashपीछे तिर्यक रेखा/पीछे झुकी रेखा
backgroundभूमिका
backspaceपीछे (मिटाना)
bandwidthबैंडदैर्घ्य
base addressतल-पता
betaआजमाइश
binaryद्विपदी
blogचिट्ठा
bloggerचिट्ठाकार
blogrollचिट्ठा-सूची
boldमोटे अक्षर
bookmarkपन्ना-निशान, पृष्टचिह्न
botस्वचालक
boxबक्सा, कोष्ठ
browseविचरना, ब्राउज करना
browserविचरक, ब्राउजर
buttonबटन, कुंजी
cacheसंचिकागार, संचिका-संग्राह
cancelनिरस्त/रद्द करना
cardकार्ड
cassetteकैसेट
categoryवर्ग
centerकेंद्र, मध्य
central processing unit (CPU)केंद्रीय प्रक्रमन इकाई
changeबदलाव(n.), बदलना(v.)
chargeआवेश
circuit(ry)परिपथ
circumflexटोपी
classificationवर्गीकरण
clickक्लिक करना, दबाना
clockwiseदक्षिणावर्त
codeकूट संकेत,
colonविसर्ग
commaअल्प विराम
commentटिप्पणी, टीका, राए
compatibilityसंगतता
compileतैयार करना
compoundसंघटन
computerकंप्यूटर, संगणक
configureमूल गुण चुनना
connectसंपर्क/राबता जोड़ना
consoleडिब्बा
constantस्थिर, अचर
contactसंपर्क, राबता
contentसामग्री, अंतर्वस्तु, मसौदा, सजोसामान
conventionपरंपरा
conversionपरिवर्तन, बदलाव
cookieकुकी
copyकापी/प्रतिलिपि/नकल करना
copyrightप्रकाशनाधिकार
core memoryमूल याददाश्त, मूल स्मृति
CPU (Central Processing Unit)केंद्रीय प्रक्रमन इकाई
crawl (a website)(किसी जालघर को) रेंगना
ctrl (key)नियंत्रण (कुंजी)
currentमौजूदा
cursorनिर्देशक, तितली
cycleचक्र
dataतथ्य, आंकड़ा
databaseआंकडाआधार, तथ्यकोष, आंकड़ागार
decimalदशमलव
defaultबुनियादी
definitionपरिभाषा
digitअंक
digitalअंकीय
directoryनिर्देशिका
disableबंद करना
disc/kडिस्क, चक्र
displayप्रदर्शन
distortionविरूपण
documentदस्तावेज
documentsकागजात, प्रपत्र
domainक्षेत्र
downloadनीचे लादना, अधिभारण
drag and dropखींचकर डालना
driveचालक
e-commerceसंगणकीकृत वाणिज्य
editबदलना, संपादन करना
editorसंपादक
emailईमेल, विपत्र
e-mail attachmentई-डाक संलंग्नक
emoticonभाव-निशान
emphasisजोर
enableचालू करना, सक्रीय करना
enterदर्ज करना
entryप्रविष्टि
equalबराबर, सम
eraseमिटाना
errorगलती
escape(key)बाहर(कुंजी), बचाव
exchangeविनिमय, अदला-बदली
exitबाहर
exploreअन्वेषण करना
explorerअन्वेषक
exportबाहर भेजना, निर्यात
extensionविस्तार
facilityसुविधा
FAQआम प्रश्नोत्तरी/आम सवाल-जवाब
fatalघातक
featureखासियत
feedभरण
feedbackप्रतिक्रिया
fetchलाना
fileसंचिका, फाइल
file transfer protocol (FTP)एफ‌टीपी
findढूंढना, खोजना, तलाश करना
firewallसुरक्षा कवच
flag (v.)झंडी लगाना
floppy (disk)नम्यिका, लचीला चक्र
folderनिर्देशिका, पुटक
fontटंक
formप्रपत्र, पर्चा
formatप्रारूप, शक्ल
forwardआगे भेजना, अग्रसारित
frameढांचा, चौखट
fuseफ्यूज
gapदरार
garbageकचरा
gateदरवाजा
getलाना, पाना, प्राप्त/हासिल करना
goजाना
gotoपर जाना
groupसमूह
handshake (modem)बातचीत
hard diskहार्ड डिस्क, स्थायी चक्र
hardwareहार्डवेयर
headerशीर्षक
helpमदद, सहायता
hexadecimalषड्दशमलव
highlightचमकाना
historyइतिहास, रिकार्ड
hit(s)खटक
homeघर
home pageपहला पन्ना, मुख्य पृष्ठ
hostमेजबान
hypertextहाइपर पाठ
hypertext transfer protocol (HTTP)एच‌टीटीपी
iconनिशान
imageचित्र, तस्वीर
importअंदर लाना, आयात
informationजानकारी, मालूमात
inputनिवेश
insertभरना
installबैठाना, बसाना
interfaceमाध्यम, जरिया, अंतरमुख
internetअंतरजाल
internet service provider (ISP)अंतरजाल सेवा प्रदाता
interruptionरुकावट
intervalदरमियान, अंतराल
intranetभीतरी जाल
italicsझुके अक्षर
itemचीज
joinसदस्य बनना
keyकुंजी
keyboardकुंजीपटल
killसमाप्त/खत्म करना
labelनामचिप्पी
laptopलघु संगणक
layerपरत
layoutफैलाव
linearरेखीय
linkकड़ी (यू आर एल)
listसूची
locationजगह
logarithmलघुगणक
loginसत्रारंभ, प्रवेश
logoछाप
logoutनिकास
lossनुकसान, कमी, हानि
loudspeakerध्वनि विस्तारक
lower caseछोटे अक्षर
luminanceआभा
magneticचुंबकीय
Mailing listडाक सूची
mapमानचित्र, नक्शा
memoryयाददाश्त, स्मृति
Mirror (site)आइना जालघर
Modemमोडेम, संजाल साधक यंत्र, आरोहवरोहक
Mouseमाउस
Netiquetteअंतरजाल व्यवहार/बर्ताव
Netizenजालवासी
Network (Information)प्रसारतंत्र
Networkजालतंत्र
Newsgroupसमाचार समूह
Newsreaderसमाचार वाचक
Nodeगांठ, आसंधि
noteपरची, ध्यान दें, टिप
offlineतार के बाहर
onlineतार पर
Open Contentआजाद/मुक्त सामग्री
Open Sourceआजाद/मुक्त स्रोत
Operating Systemसंचालन तंत्र
optionविकल्प
outputउत्पाद
Passwordकूटशब्द, पारण शब्द
Permalinkस्थायी कड़ी
Pingसनसनाना
plugप्लग
Plug-inउपयोगिता
pop-up (ad)उभरने वाला विज्ञापन/इश्तिहार
pop-up (window)उभरने वाली खिड़की
Portद्वार, दरवाजा
Portalचौपाल
Postप्रविष्टी
preferencesपसंद
previewझलक दिखाना
printछापना
Programकार्यक्रम, प्रोग्राम
Progressउन्नति
Protocolबोलचाल
Proxyप्रतिनिधित्व
public domainसार्वजनिक क्षेत्र
readerवाचक, पाठक
relevantमुनासिब, उचित, संगत, प्रसंगोचित, योग्य, उपयुक्त, प्रासंगिक
renameनाम बदलना
requestनिवेदन, गुज़ारिश, अनुरोध
resultपरिणाम, नतीजा
Routerपथकार (?), अनुमार्गक
RSSआरएसएस, अत्याधिक सरल भरण, क्षमल फीड
saveबचाना, रक्षित करना, संजोना
save asनाम देकर बचाना/संजोना
screenपर्दा
Search Engineखोज इंजन, खोजक
Securityसुरक्षा, हिफाजत
selectचुनना
Serverसेवक संगणक
serviceसेवा
site (website)जालघर, जालिस्तान
Softwareतंत्रांश, सॉफ्टवेयर
Spamकचरा ईमेल
speedतेजी, रफ्तार, गति
spreadsheetतालिका-पृष्ठ, फैलीकागज
Spywareभेदिया/खुफिया तंत्रांश
sun(आदित्य जरारे)
surfघूमना, फिरना
Sysopसंचालक
Systemप्रणाली, तंत्र
tabघुंडी
Tag (as in Meta tag)चिप्पी
Templateसांचा, खाका
Terminalअंतक, समापी
Textपाठ
toolऔजार
toolbarऔजार पट्टी
toolboxऔजार का डब्बा
typeटंकण करना
typewriterटंकण मशीन
typistटंकक
Uploadऊपर लादना, चढ़ाना, उद्भारण
upper caseबड़े अक्षर
URIयू आर आई, यूनीफ़ॉर्म रिसोर्स आइडेंटीफ़ायर
URLयू आर एल, यूनीफ़ॉर्म रिसोर्स लोकेटर, जाल पता कड़ी
Usernameसदस्य नाम, प्रयोक्ता नाम
Virusकीड़ा, विषाणु
VoIPवी ओ आइ पी (अंतरजाल-द्वारा-आवाज बोलचाल)
Webजाल
web addressजाल पता
webmasterजाल-उस्ताद, जालघर का निर्देशक
webpageजाल पन्ना/पृष्ठ
Websiteजालघर, जालस्थल, जाल मुकाम
Windowखिड़की, पट, झरोखा
Word Processorशब्द संसाधक
World Wide Webसंजाल तंत्र, विश्व व्यापी जाल
XMLक्षमल, एक्सएमएल
Cellकोशिका
Read more ...

Friday 11 November 2011

Hosted Desktop service


Choosing a Good Hosted Desktop service


There are now many companies who are offering hosted desktopservice to their clients. It seems that more and more people have seen how cost efficient and effective this kind of technological solution is for a variety of companies. That is why many are now flocking to try it in the hopes of getting similar benefits for their businesses.

Thus, there are also plenty of IT support companies who are more than willing to provide a hosted desktop service to their clients. The problem is that not all of them are created equal and each would have their own service standards, some of them of excellent quality but some of them having substandard ones.

That is why it would be critical to know how to properly choose a good IT supportcompany that would provide you with their hosted desktop service. To be able to do this properly, you need to know the following factors which could help you distinguish the quality of their service.

Number of concurrent users:

You should inquire the IT support company who would provide the hosted desktopsolution regarding the number of concurrent users that their system can handle. The capability to handle more concurrent users means that you would be able to expand easier. You would not be handicapped in the number of people that would be able to use the hosted desktop service.

Compatibility with existing technology:

Another thing that you should look into when it comes to a hosted desktop service would be their compatibility with the current technological setup that you have. This means being able ot integrate the hosted desktop with your exciting computer and server equipment as well as with the programs and files that your company uses.

By getting an IT support company that offers a hosted desktop solution that is highly compatible with your existing systems, you would be able to easily wipe away the common problems regarding system migration.

IT Support:

Lastly, you should inquire about the IT Support that they would give your hosteddesktop installation. Being a relatively new technology for your office, people may not be aware of how to operate and maintain such a system.

As such, having a good IT support company provide the necessary operations and maintenance of the system would go a long way in ensuring that you would have little trouble in adapting it to your company.
Read more ...

Hack Computer Password


How To Hack Computer Password In Windows XP All Service Pack



Hacking is crime but hackers are never stop the hacking. When we hack the computer password it is not a big hacking but it is take some place of hacking. People always search about how to hack computer password, how to recover my computer password, how to hack password of win. xp and more search about this topic. Now i give the simple way to hack the password of windows xp all service pack.

1) click on the “Start Button” and click “Run” after that type the “cmd” without the quotes.
  • Type net user then press enter
  • After this process type “Net user [Username of Account]*” then press Enter, without the quotes["], and quotes. Make sure spell of the username is correctl, and you have the ‘*’.
  • To change password press enter.
2) When you are Logged out of the computer and cannot figure out the password at the start up screen, do the following steps for hack the password:
  • Restart the computer and toggle (continue press) the F8 button.
  • You found a screen that will ask you if you want to boot with command prompt (that is one way) or boot in safe mode without command prompt.
3) Note that computer will boot in safe mode in a small window or screen and you will see a menu that asks which account you want to access. We know that the other accounts you can’t get into but there will be a new account called computeradministrator.

4) Click on the computer administrator and go to control panel/user accounts and remove the password.
Read more ...

Wednesday 9 November 2011

Create a Web Page




Getting Started

There are basically two ways to make a web page. The first way is to create the page(s) offline and then upload them to your Internet Service Provider (ISP) via FTP. The second way is to create your web page(s) online using a Telnet program by accessing your UNIX account, if you have one.
If you are creating your web page(s) offline, do so in any text editing or word processing document. Make sure that when you save your document, you save it as a "text", "plain text" or "text only" document. Otherwise it will not be read properly by a web browser. Once you have created your page(s), you will need to contact your ISP about how to go about uploading them to your server.
If you have a UNIX account, you can create your web page(s) online. You first need to get a program that can access your UNIX account. I recommend Telnet for the Mac orEwan for Windows 95/98.
Once you can access your account, you need to make a new directory called "public_html". You can do this by typing:
mkdir public_html
After this, change your directory to this new directory called "public_html".
cd public_html
If you want to, you can make other directories, one for all the web pages that you make, and one for all of the graphics that you have. Follow the same steps as above to do this.
Next, you need to think of a filename for your page (this is not a title, but what will be in the URL). A common filename for a main web page, is "index". Once you've decided on this, add ".html" to the end of it. Then type (i.e.)
pico index.html
Of course, use your page's filename, instead of this one. Next, you need to gain some knowledge of the many HTML commands. Lucky for you, I've already gotten some of the basic commands for you. Follow the index below, to decide what to put on your page, and how to do it. Once you've gotten started, exit your page. You can do this by pressingcontrol-x. Then you need to type:
chmod 744 index.html
Only do this with the filename of your page. You only need to do this the very first time that you leave your web page. This command will make sure that nobody else can delete your page. You will need to do this to any other pages that you make in the future. Then, look at your page on the WWW. Lets say that your server is "www.domain.com", your username is "username", and the name of your page is "index.html". The URL would normally be:
http://www.domain.com/~username/index.html
However, you will need to contact your ISP for your URL.
If you have made separate directories for pages and graphics, then you need to include that in the URL also. Lets say that you made a directory for all of your web pages, called "Pages". The new URL would be: http://www.domain.com/~username/Pages/index.html

Title

The first thing to put on your web page, is a title. The title is what will show up in the very top of the window. Let's say that your title is going to be "John Doe's Web Page", you would type:

In HTML, every command is surrounded by <'s, and >'s. And in most commands, you need to tell the web browser when to end this command. You do this by putting a back slash (/) in front of the ending command, as in above. Since HTML isn't case sensitive, above to decide how, and what to put on your page.

Text


Headings

HTML has six levels of headings, numbered 1 through 6, with 1 being the largest. Headings are displayed in larger, or smaller fonts, and usually bolder. If you wanted to type "Hello", this is what you would type for each heading, and what the outcome is:

Hello



Hello



Hello



Hello



Hello



Hello



Hello



Hello



Hello


Hello


Hello


Hello


Paragraphs

Whenever you have more than a sentence of writing, you should have paragraphs. Personally, I don't see what the difference is, but I do it anyway, because then I can find a certain spot better when programing. To Make a paragraph of "This is a web page. How do you like what I've done? Please e-mail me with any suggestions at a@a.com", type:

This is a web page. How do you like what I've done? Please e-mail me with any suggestions at a@a.com

The outcome is:
This is a web page. How do you like what I've done? Please e-mail me with any suggestions at a@a.com

Lists

There are two types of lists that you can make in HTML, dotted, and numbered. To make a dotted list of: red, orange, green, blue, purple, black, and brown, type:


  • red
  • orange
  • green
  • blue
  • purple
  • black
  • brown

The result is:
  • red
  • orange
  • green
  • blue
  • purple
  • black
  • brown
To make a numbered list of: red, orange, green, blue, purple, black, and brown, type:


  1. red
  2. orange
  3. green
  4. blue
  5. purple
  6. black
  7. brown

The result looks like:
  1. red
  2. orange
  3. green
  4. blue
  5. purple
  6. black
  7. brown

Forced Line Breaks

There are many cases in which you want to end typing on one line, and start on the next. To do this, you can use a simple HTML command. This is one of the few commands that you don't have to put an ending command on. Let's say that you wanted to say "Hello, how are you?", but with each word on a separate line. All you have to type is:
Hello,
how
are
you?

The outcome is:
Hello,
how
are
you?

Horizontal Rules

Every now and then, you might want to have a horizontal rule, or line in your page. Horizontal rules can be many different sizes and lengths. You can also have the line be solid black, by typing NOSHADE. Here are several examples of sizes and widths, and what the outcome is:























Character Formatting

You may want to format some of your text differently than others using text styles. There are several types of styles of text that you can use: bolditalicunderlinestrikeout,superscriptsubscriptteletype, and blinking text are examples. To do these styles, surround your text with the following commands:
, for bold
, for italic
, for underlined
, for strikeout
, for superscript
, for subscript
, for teletype
, for blinking text (very annoying)
You can also mix styles together like this!

Linking


URLs

When you make a link, you are making colored text or even a graphic (talked about later). When somebody clicks on this text, it will take them to another web page, or possibly a certain section of a web page. Let's say that you wanted to make a link from your web page, to Yahoo!. The URL of Yahoo! is:
http://www.yahoo.com
To do this, you would type:

What ever text that you want to be colored goes here
The result would be:
What ever text that you want to be colored goes here
You can go ahead and try it if you want to.

Links to Specific Sections

Sometimes, you might want to have a link that will take you further down a page, or to a certain section of another page. An example of this is the index to this web page. You click on the colored text, and it takes you to that section. To do this, you need to do two things. The first, is to make the link, and the second, is to make where the link will lead to.NOTE: You cannot make links to specific sections within a different document unless either you have write permission to the coded source of that document or that document already contains in-document named links.
1) To make the actual link, think of a name for the certain spot. Let's say you are going to call it "spot". If this certain spot is on the same page that the link is, you would type:

Colored Text

Otherwise, you would add "#spot" to the end of the URL.
2) Now, you need to make where the link will take you. Go to the spot where you want the link to take you, and type:

Mailto Links

Most people like to have a link on their web page that automatically sends e-mail to an address. If you want to do this, and your name is Dan, and your e-mail address is a@a.com, type:
Dan
Here is the result of typing this:
Dan

Graphics


Putting Images On A Page

On almost EVERY web page on the net, there is some kind of graphic. I would HIGHLY RECOMMEND that you have AT LEAST one picture on your page. There are mainly two kinds of ways to have graphics on your web page. The first, is to use a graphic that is on another web page somewhere on the web. The second, is to upload the graphic to your own account. Personally, I prefer to use the upload method. If you are using the other way, there is always a chance that the person who made that page will decide to delete that graphic. Then a symbol with a circle, square, and triangle will appear where the graphic was supposed to be, sometimes it will look like it has been torn through the middle:

1)
To display a graphic on some one else's page, you need to find the URL. To do this, I recommend that you have Netscape Navigator. Right click or click and hold down on the graphic, until a menu comes up. Choose "View this Image". Then , copy the URL that appears at the top of the screen, in the "location" box. Let's say that the URL was: http://www.infhost.com/members/web/Images/pic.gif You would type:

The result is:

2)
To display a graphic that is in your account, all you have to do is type in the filename. If you didn't make separate directories for graphics and pages, then you just need to type the graphic's name.(i.e. 

Alternate Text for Images

Some World Wide Web browsers cannot display images. Some users turn off image loading even if their software can display images (especially if they are using a modem or have a slow connection). HTML provides a command to tell readers what they are missing on your pages. The "ALT" attribute lets you specify text to be displayed instead of an image. For example:
How to make a web page
In this example, "pic.gif" is the picture of a sign. With graphics-capable viewers that have image-loading turned on, you see the graphic. With a non-graphic browser or if image-loading is turned off, the words "How to make a web page" is shown in your window. You should try to include alternate text for each image you use in your document, as it is a courtesy for your readers.

Animated Graphics

Some people like to put animation on their web pages. It actually is not that hard. Here is some background history. Most GIFs over the years have only one image per file. According to "technical specifications from 1987", a GIF could have had more than one image per file, making it like a slide show presentation and not a single image. However, most programs that work with GIF are designed around the idea of one image per file. So the multi-image aspect of GIFs was forgotten. In 1989, they added timing and various other abilities to the GIF format, including transparency. Nobody used these new additions either. Then the Web took off. Transparency and interlacing became features people wanted to use and software companies began supporting those features. In order to have animation on your web page, you need to download a program that was made to fit more that one GIF in a file. I recommend GifBuilder for the Mac. Windows users can go here to download another program. Here is one example of a small animation:

Background, text, and link Color

On most pages, you want to have a specific color for the background, text, unvisited links, visited links, and active links. In order to do this, you need to find the code number for the specific color that you are looking for. Here is a HUGE list of code numbers, and here is how you would display this in your page. NOTE: Type these ONLY right below your title. NOTE: You must have the "#" sign before the actual code.
  • for background color
  • for color of text (all non-links)
  • for color of unvisited links
  • for color of visited links
  • for color of active links (while being selected)
You can also string two or more of these commands together:


Background Graphics

Instead of having a solid color as a background, you might want to have one graphic that repeats over and over to create a background. Here are several places that you can go to find background graphics. The text that you would type in for a background called "bk.gif" would be:

Linking with graphics

Sometimes on your web page, you might want to have a graphic that is a link. This is quite simple, since you just mix the two commands of linking, and displaying graphics. Here is an example of a graphic that leads to Yahoo:

You can also have a text link next to the graphic that leads to the same place.
Yahoo!
Here is what you would type in for, first the plain graphic-link, and second, the graphic-link with text:

Yahoo!


Image Maps

Before you create an image map, you need to make sure that your server supports them. Then, you can follow these steps. First, you need to create an image. Draw a picture with sections that could lead to certain places. Second, you need to create an image map file. There are several programs that can do this for you. I recommend WebMap, for the Mac.You can go to Yahoo's Image Map Directory for others. 

Fill-out Forms


Getting Started

Fill-out forms let a reader return information to a Web server for some action. For example, suppose you collect names and email addresses so you can email some information to people who request it. This processing of incoming data is usually handled by a script or program written in Perl or another language that manipulates text, files, and information. If you want to, you can write this program yourself, but I have no idea how to do it. I would check with your server. I know that many servers have scripts available for its users. Let's pretend that the one that I'm going to use is called "fb.pl". This will send a response to your fillout form directly to your email address. NOTE: This script is not real, it is just an example. Check with your ISP to see if they have built-in scripts.

Form Method/Action

The first thing that you type for your guestbook is the Form Method and Action. This is where you enter the Perl script. Most servers and Internet Providers have scripts like this that they provide for you. Check with yours. You cannot have any kind of forms without having a script. The address of the one that I'll be using is:
http://www.domain.com/cgi-bin/fb.pl. If you would like the response sent to your email address, and the address is "a@a.com", you would type this for the first two lines:



TO:


Here is what it will look like:

TO:

Next, you need to decide what questions that you want to ask, and what you will use to ask them. Before you start, though, you might want to check with your server to see if they have any questions that you MUST ask. I know with some ISPs, you must ask what their email address is, their first name, their last name, and what the subject of their question is. You can use single or multiple text fields, larger fields, checkboxes, radio buttons, pull-down lists and scroll-down lists.

Single or multiple fields

In your guestbook, you might want to ask questions that have a single one word answer. To here is what you would type to have four fields that ask for an email address, a first name, a last name, and a subject:
Your Email Address

Your First Name

Your Last Name

Subject

Here is what the result is:
Your Email Address
Your First Name
Your Last Name
Subject


Larger Fields

I would recommend that you have one larger field at the end of your guestbook for comments. You first need to decide how many columns and rows that you want to have. Let's say that you want to have 7 rows, and 45 columns. Here is what you would type:
Please place any questions or comments here:


Here is what the result looks like:
Please place any questions or comments here:


Checkboxes

Let's say that you wanted to ask a question like "What are some things that you like to do?" You could have a list of things with checkboxes. If you wanted the list to be: Watch TV, play on the Internet, read a book, play sports, and study, you would type:
What are some things that you like to do?
Watch TV

Play on the Internet

Read a book

Play sports

Study

The result:
What are some things that you like to do?
Watch TV
Play on the Internet
Read a book
Play sports
Study

Radio Buttons

If you ever want to ask a question with one answer, you can use radio buttons. If you wanted to ask "What WWW browser are you using right now?", and you wanted to have the choices Netscape Navigator 4.x, Netscape Navigator 3.x, Netscape Communicator, Mosaic, and Microsoft Explorer, you would type:
What WWW browser are you using right now?

Netscape Navigator 4.x


Netscape Navigator 3.x

Netscape Communicator

Mosaic

Internet Explorer


The Result:
What WWW browser are you using right now?

Netscape Navigator 4.x

Netscape Navigator 3.x

Netscape Communicator

Mosaic

Internet Explorer


Pull-Down Lists

Another way to ask a question with only one answer is to use a pull-down menu. You can use the SELECTED command to have an option besides the first be selected, as you will see below. If you wanted to ask "What is your favorite color?", and you wanted the list to be of red, yellow, orange, green, blue, purple, black, and brown, with black selected, you would type:
What is your favorite color?



The outcome is:
What is your favorite color? 

Scroll-Down Lists

Some times, you might want to have a scroll-down list on your page. With this, you can decide whether or not you want people to be able to select more that one item. If you do have it with more that one items, the user has to hold down the command or shift key. You can also decide how many of the lines you want visible. Below are two lists of the same things. In the first one, you can only select one item, and it is showing three lines. In the second one, you can select one or more items by holding down command or shift . The second list is showing four lines. The question is "What is your favorite video game system?" The answers are: Nintendo 64, Sony Playstation, Sega Dreamcast, or arcade video games. The text that you type for each list is above the actual list.
What is your favorite video game system?


The outcome is:
What is your favorite video game system?




What is your favorite video game system? (Hold shift to select more that one)


The second outcome is:
What is your favorite video game system? (Hold shift to select more that one) 

Reset Form

On most page that have fill-out forms, there is a reset button at the bottom of the form, next to the "submit" or "send" button. To have a reset button, just type:
To reset the all of the forms, press this button:
The outcome is: (try it!)
To reset the all of the forms, press this button:

Submit Entry

When you are all finished with everything, you need to make a button so that people can submit their entry. To do this, type:
To submit your choices, press this button:
The result is: (NOTE: Please don't click this button. It has been disabled and will not work.)
To submit your choices, press this button:
NOTE: At the very end of your form, you must type
or your forms won't work!!


Frames


What are Frames?

Frames basically split your window in to sections. You can display two or more web pages at a time with frames. You don't necessarily have to have whole pages in a frame. You could just have graphics, too. If you are really interested in putting frames on your page, I recommend that you go here to Sharky's Netscape Frames Tutorial and read the lessons.

Java


What is Java?

Java is a simple, robust, object-oriented, platform-independent multi-threaded, dynamic general-purpose programming environment. It's best for creating applets and applications for the Internet, intranets and any other complex, distributed network.

Programming in Java

I do not know how to program in java. However, it is a very useful language if you know how to use it. If you think that you would like to begin learning the java language, an excellent tutorial can be found here.
Just because I don't know how to program in java, doesn't mean that I don't use it. I love java. It can add so much to a web site. If you really don't want to learn java, but would like to use it on your web pages, I would suggest using free java scripts that can be found around the web. One such web site can be found here at Sharky's JavaScript Answers.


Troubleshooting

Under Construction

For More Information

Read more ...

Internet blackout


How to work around the Comcast Internet blackout


If your Internet service has been blacked out by Comcast, fear not; I've got a way that may well save you. I was hit by the outage last night, figured out a fix, and have been using the Internet without problems --- and without Comcast's help.
I'm a Comcast customer, and last night all of the computers connected to my wireless network lost their Internet connections. The PC connected directly to my router, though, worked without a problem.
I tried turning the router on and off, but that didn't solve the problem. I tried resetting it. That didn't work, either. I upgraded the firmware. Still no go. I even tried using a different router, and that didn't work, either.
Why, I wondered, was my wired PC working, but not my wireless ones? I looked at my wired PC's TCP/IP settings, and found the answer immediately: Instead of using Comcast's DNS servers, I was instead using OpenDNS's servers, a free service from OpenDNS. I had previously found OpenDNS service to be superior to Comcast's. Clearly, the problem was with Comcast's DNS servers, because my wireless PCs were still using Comcast's DNS servers.
The fix was simple: Tell my Linksys WRT160N router to use the OpenDNS servers. Once I did that, everything worked like a charm. Here's how to do it on a Linksys router; the instructions will vary according to your router make and model:
1. Go into your router's configuration screen. For Linksys, that means going to 192.168.1.1, and typing in your user name and password. For most Linksys routers the default user name is admin and there's no password.
2. On the main screen, go to the Static DNS boxes. In Static DNS 1: enter these numbers: 208.67.222.222. In Static DNS 2: enter these numbers: 208.67.220.220. You can see what it should look like, below.
Linksys DNS server setup screen
3. Click Save Settings. After that, I was able to get onto the Internet from all of my PCs, because my entire network, not just my wired PC, was now using the OpenDNS DNS servers.
If you don't have a router, and only have one PC connected to the Internet via Comcast, you'll have to change the TCP/IP settings on that PC to use the OpenDNs DNS servers. How you do this varies according to whether you use a Mac, PC, or Linux, and the exact version of your operating system.
In Windows Vista, for example, right-click the network icon in the system tray, select Network and Sharing Center-->View Status-->Properties, highlight Internet Protocol Version 4 and click Properties. On the General screen, select Use the following DNS server addresses, and in the Preferred DNS server type in 208.67.222.222. In Alernate DNS server type in 220.220. You can see what it should look like, below. Click OK.
Windows Vista TCP/IP settings DNS 
There's no guarantee these steps will fix the problem for you. But it did the trick for me, and I plan on never using Comcast's DNS servers ever again.
Read more ...

Internet Work



How Does the Internet Work?

© 2002, 2005 Rus Shuler, all rights reserved

Contents

  1. Introduction
  2. Where to Begin? Internet Addresses
  3. Protocol Stacks and Packets
  4. Networking Infrastructure
  5. Internet Infrastructure
  6. The Internet Routing Hierarchy
  7. Domain Names and Address Resolution
  8. Internet Protocols Revisited
  9. Application Protocols: HTTP and the World Wide Web
  10. Application Protocols: SMTP and Electronic Mail
  11. Transmission Control Protocol
  12. Internet Protocol
  13. Wrap Up
  14. Resources
  15. Bibliography

Introduction

How does the Internet work? Good question! The Internet's growth has become explosive and it seems impossible to escape the bombardment of www.com's seen constantly on television, heard on radio, and seen in magazines. Because the Internet has become such a large part of our lives, a good understanding is needed to use this new tool most effectively.
This whitepaper explains the underlying infrastructure and technologies that make the Internet work. It does not go into great depth, but covers enough of each area to give a basic understanding of the concepts involved. For any unanswered questions, a list of resources is provided at the end of the paper. Any comments, suggestions, questions, etc. are encouraged and may be directed to the author at the email address given above.

Where to Begin? Internet Addresses

Because the Internet is a global network of computers each computer connected to the Internet must have a unique address. Internet addresses are in the form nnn.nnn.nnn.nnn where nnn must be a number from 0 - 255. This address is known as an IP address. (IP stands for Internet Protocol; more on this later.)
The picture below illustrates two computers connected to the Internet; your computer with IP address 1.2.3.4 and another computer with IP address 5.6.7.8. The Internet is represented as an abstract object in-between. (As this paper progresses, the Internet portion of Diagram 1 will be explained and redrawn several times as the details of the Internet are exposed.)
Diagram 1
Diagram 1
If you connect to the Internet through an Internet Service Provider (ISP), you are usually assigned a temporary IP address for the duration of your dial-in session. If you connect to the Internet from a local area network (LAN) your computer might have a permanent IP address or it might obtain a temporary one from a DHCP (Dynamic Host Configuration Protocol) server. In any case, if you are connected to the Internet, your computer has a unique IP address.
Check It Out - The Ping Program
If you're using Microsoft Windows or a flavor of Unix and have a connection to the Internet, there is a handy program to see if a computer on the Internet is alive. It's called ping, probably after the sound made by older submarine sonar systems.1 If you are using Windows, start a command prompt window. If you're using a flavor of Unix, get to a command prompt. Type ping www.yahoo.com. The ping program will send a 'ping' (actually an ICMP (Internet Control Message Protocol) echo request message) to the named computer. The pinged computer will respond with a reply. The ping program will count the time expired until the reply comes back (if it does). Also, if you enter a domain name (i.e. www.yahoo.com) instead of an IP address, ping will resolve the domain name and display the computer's IP address. More on domain names and address resolution later.


Protocol Stacks and Packets

So your computer is connected to the Internet and has a unique address. How does it 'talk' to other computers connected to the Internet? An example should serve here: Let's say your IP address is 1.2.3.4 and you want to send a message to the computer 5.6.7.8. The message you want to send is "Hello computer 5.6.7.8!". Obviously, the message must be transmitted over whatever kind of wire connects your computer to the Internet. Let's say you've dialed into your ISP from home and the message must be transmitted over the phone line. Therefore the message must be translated from alphabetic text into electronic signals, transmitted over the Internet, then translated back into alphabetic text. How is this accomplished? Through the use of a protocol stack. Every computer needs one to communicate on the Internet and it is usually built into the computer's operating system (i.e. Windows, Unix, etc.). The protocol stack used on the Internet is referred to as the TCP/IP protocol stack because of the two major communication protocols used. The TCP/IP stack looks like this:


Protocol LayerComments
Application Protocols LayerProtocols specific to applications such as WWW, e-mail, FTP, etc.
Transmission Control Protocol LayerTCP directs packets to a specific application on a computer using a port number.
Internet Protocol LayerIP directs packets to a specific computer using an IP address.
Hardware LayerConverts binary packet data to network signals and back.
(E.g. ethernet network card, modem for phone lines, etc.)


If we were to follow the path that the message "Hello computer 5.6.7.8!" took from our computer to the computer with IP address 5.6.7.8, it would happen something like this:

Diagram 2
Diagram 2
  1. The message would start at the top of the protocol stack on your computer and work it's way downward.
  2. If the message to be sent is long, each stack layer that the message passes through may break the message up into smaller chunks of data. This is because data sent over the Internet (and most computer networks) are sent in manageable chunks. On the Internet, these chunks of data are known as packets.
  3. The packets would go through the Application Layer and continue to the TCP layer. Each packet is assigned a port number. Ports will be explained later, but suffice to say that many programs may be using the TCP/IP stack and sending messages. We need to know which program on the destination computer needs to receive the message because it will be listening on a specific port.
  4. After going through the TCP layer, the packets proceed to the IP layer. This is where each packet receives it's destination address, 5.6.7.8.
  5. Now that our message packets have a port number and an IP address, they are ready to be sent over the Internet. The hardware layer takes care of turning our packets containing the alphabetic text of our message into electronic signals and transmitting them over the phone line.
  6. On the other end of the phone line your ISP has a direct connection to the Internet. The ISPs routerexamines the destination address in each packet and determines where to send it. Often, the packet's next stop is another router. More on routers and Internet infrastructure later.
  7. Eventually, the packets reach computer 5.6.7.8. Here, the packets start at the bottom of the destination computer's TCP/IP stack and work upwards.
  8. As the packets go upwards through the stack, all routing data that the sending computer's stack added (such as IP address and port number) is stripped from the packets.
  9. When the data reaches the top of the stack, the packets have been re-assembled into their original form, "Hello computer 5.6.7.8!"

Networking Infrastructure

So now you know how packets travel from one computer to another over the Internet. But what's in-between? What actually makes up the Internet? Let's look at another diagram:

Diagram 3
Diagram 3
Here we see Diagram 1 redrawn with more detail. The physical connection through the phone network to the Internet Service Provider might have been easy to guess, but beyond that might bear some explanation.
The ISP maintains a pool of modems for their dial-in customers. This is managed by some form of computer (usually a dedicated one) which controls data flow from the modem pool to a backbone or dedicated line router. This setup may be referred to as a port server, as it 'serves' access to the network. Billing and usage information is usually collected here as well.
After your packets traverse the phone network and your ISP's local equipment, they are routed onto the ISP's backbone or a backbone the ISP buys bandwidth from. From here the packets will usually journey through several routers and over several backbones, dedicated lines, and other networks until they find their destination, the computer with address 5.6.7.8. But wouldn't it would be nice if we knew the exact route our packets were taking over the Internet? As it turns out, there is a way...
Check It Out - The Traceroute Program
If you're using Microsoft Windows or a flavor of Unix and have a connection to the Internet, here is another handy Internet program. This one is called traceroute and it shows the path your packets are taking to a given Internet destination. Like ping, you must use traceroute from a command prompt. In Windows, use tracert www.yahoo.com. From a Unix prompt, typetraceroute www.yahoo.com. Like ping, you may also enter IP addresses instead of domain names. Traceroute will print out a list of all the routers, computers, and any other Internet entities that your packets must travel through to get to their destination.

If you use traceroute, you'll notice that your packets must travel through many things to get to their destination. Most have long names such as sjc2-core1-h2-0-0.atlas.digex.net and fddi0-0.br4.SJC.globalcenter.net. These are Internet routers that decide where to send your packets. Several routers are shown in Diagram 3, but only a few. Diagram 3 is meant to show a simple network structure. The Internet is much more complex.

Internet Infrastructure

The Internet backbone is made up of many large networks which interconnect with each other. These large networks are known as Network Service Providers or NSPs. Some of the large NSPs are UUNet, CerfNet, IBM, BBN Planet, SprintNet, PSINet, as well as others. These networks peer with each other to exchange packet traffic. Each NSP is required to connect to three Network Access Points or NAPs. At the NAPs, packet traffic may jump from one NSP's backbone to another NSP's backbone. NSPs also interconnect at Metropolitan Area Exchanges or MAEs. MAEs serve the same purpose as the NAPs but are privately owned. NAPs were the original Internet interconnect points. Both NAPs and MAEs are referred to as Internet Exchange Points or IXs. NSPs also sell bandwidth to smaller networks, such as ISPs and smaller bandwidth providers. Below is a picture showing this hierarchical infrastructure.

Diagram 4
Diagram 4
This is not a true representation of an actual piece of the Internet. Diagram 4 is only meant to demonstrate how the NSPs could interconnect with each other and smaller ISPs. None of the physical network components are shown in Diagram 4 as they are in Diagram 3. This is because a single NSP's backbone infrastructure is a complex drawing by itself. Most NSPs publish maps of their network infrastructure on their web sites and can be found easily. To draw an actual map of the Internet would be nearly impossible due to it's size, complexity, and ever changing structure.

The Internet Routing Hierarchy

So how do packets find their way across the Internet? Does every computer connected to the Internet know where the other computers are? Do packets simply get 'broadcast' to every computer on the Internet? The answer to both the preceding questions is 'no'. No computer knows where any of the other computers are, and packets do not get sent to every computer. The information used to get packets to their destinations are contained in routing tables kept by each router connected to the Internet.
Routers are packet switches. A router is usually connected between networks to route packets between them. Each router knows about it's sub-networks and which IP addresses they use. The router usually doesn't know what IP addresses are 'above' it. Examine Diagram 5 below. The black boxes connecting the backbones are routers. The larger NSP backbones at the top are connected at a NAP. Under them are several sub-networks, and under them, more sub-networks. At the bottom are two local area networks with computers attached.
Diagram 5
Diagram 5
When a packet arrives at a router, the router examines the IP address put there by the IP protocol layer on the originating computer. The router checks it's routing table. If the network containing the IP address is found, the packet is sent to that network. If the network containing the IP address is not found, then the router sends the packet on a default route, usually up the backbone hierarchy to the next router. Hopefully the next router will know where to send the packet. If it does not, again the packet is routed upwards until it reaches a NSP backbone. The routers connected to the NSP backbones hold the largest routing tables and here the packet will be routed to the correct backbone, where it will begin its journey 'downward' through smaller and smaller networks until it finds it's destination.

Domain Names and Address Resolution

But what if you don't know the IP address of the computer you want to connect to? What if the you need to access a web server referred to as www.anothercomputer.com? How does your web browser know where on the Internet this computer lives? The answer to all these questions is the Domain Name Service or DNS. The DNS is a distributed database which keeps track of computer's names and their corresponding IP addresses on the Internet.
Many computers connected to the Internet host part of the DNS database and the software that allows others to access it. These computers are known as DNS servers. No DNS server contains the entire database; they only contain a subset of it. If a DNS server does not contain the domain name requested by another computer, the DNS server re-directs the requesting computer to another DNS server.
Diagram 6
Diagram 6
The Domain Name Service is structured as a hierarchy similar to the IP routing hierarchy. The computer requesting a name resolution will be re-directed 'up' the hierarchy until a DNS server is found that can resolve the domain name in the request. Figure 6 illustrates a portion of the hierarchy. At the top of the tree are the domain roots. Some of the older, more common domains are seen near the top. What is not shown are the multitude of DNS servers around the world which form the rest of the hierarchy.
When an Internet connection is setup (e.g. for a LAN or Dial-Up Networking in Windows), one primary and one or more secondary DNS servers are usually specified as part of the installation. This way, any Internet applications that need domain name resolution will be able to function correctly. For example, when you enter a web address into your web browser, the browser first connects to your primary DNS server. After obtaining the IP address for the domain name you entered, the browser then connects to the target computer and requests the web page you wanted.
Check It Out - Disable DNS in Windows
If you're using Windows 95/NT and access the Internet, you may view your DNS server(s) and even disable them.
If you use Dial-Up Networking:
Open your Dial-Up Networking window (which can be found in Windows Explorer under your CD-ROM drive and above Network Neighborhood). Right click on your Internet connection and click Properties. Near the bottom of the connection properties window press the TCP/IP Settings... button.
If you have a permanent connection to the Internet:
Right click on Network Neighborhood and click Properties. Click TCP/IP Properties. Select the DNS Configuration tab at the top.
You should now be looking at your DNS servers' IP addresses. Here you may disable DNS or set your DNS servers to 0.0.0.0. (Write down your DNS servers' IP addresses first. You will probably have to restart Windows as well.) Now enter an address into your web browser. The browser won't be able to resolve the domain name and you will probably get a nasty dialog box explaining that a DNS server couldn't be found. However, if you enter the corresponding IP address instead of the domain name, the browser will be able to retrieve the desired web page. (Use ping to get the IP address prior to disabling DNS.) Other Microsoft operating systems are similar.


Internet Protocols Revisited

As hinted to earlier in the section about protocol stacks, one may surmise that there are many protocols that are used on the Internet. This is true; there are many communication protocols required for the Internet to function. These include the TCP and IP protocols, routing protocols, medium access control protocols, application level protocols, etc. The following sections describe some of the more important and commonly used protocols on the Internet. Higher level protocols are discussed first, followed by lower level protocols.

Application Protocols: HTTP and the World Wide Web

One of the most commonly used services on the Internet is the World Wide Web (WWW). The application protocol that makes the web work is Hypertext Transfer Protocol or HTTP. Do not confuse this with the Hypertext Markup Language (HTML). HTML is the language used to write web pages. HTTP is the protocol that web browsers and web servers use to communicate with each other over the Internet. It is an application level protocol because it sits on top of the TCP layer in the protocol stack and is used by specific applications to talk to one another. In this case the applications are web browsers and web servers.
HTTP is a connectionless text based protocol. Clients (web browsers) send requests to web servers for web elements such as web pages and images. After the request is serviced by a server, the connection between client and server across the Internet is disconnected. A new connection must be made for each request. Most protocols are connection oriented. This means that the two computers communicating with each other keep the connection open over the Internet. HTTP does not however. Before an HTTP request can be made by a client, a new connection must be made to the server.
When you type a URL into a web browser, this is what happens:
  1. If the URL contains a domain name, the browser first connects to a domain name server and retrieves the corresponding IP address for the web server.
  2. The web browser connects to the web server and sends an HTTP request (via the protocol stack) for the desired web page.
  3. The web server receives the request and checks for the desired page. If the page exists, the web server sends it. If the server cannot find the requested page, it will send an HTTP 404 error message. (404 means 'Page Not Found' as anyone who has surfed the web probably knows.)
  4. The web browser receives the page back and the connection is closed.
  5. The browser then parses through the page and looks for other page elements it needs to complete the web page. These usually include images, applets, etc.
  6. For each element needed, the browser makes additional connections and HTTP requests to the server for each element.
  7. When the browser has finished loading all images, applets, etc. the page will be completely loaded in the browser window.
Check It Out - Use Your Telnet Client to Retrieve a Web Page Using HTTP
Telnet is a remote terminal service used on the Internet. It's use has declined lately, but it is a very useful tool to study the Internet. In Windows find the default telnet program. It may be located in the Windows directory named telnet.exe. When opened, pull down the Terminal menu and select Preferences. In the preferences window, check Local Echo. (This is so you can see your HTTP request when you type it.) Now pull down the Connection menu and select Remote System. Enter www.google.com for the Host Name and 80 for the Port. (Web servers usually listen on port 80 by default.) Press Connect. Now type
GET / HTTP/1.0
and press Enter twice. This is a simple HTTP request to a web server for it's root page. You should see a web page flash by and then a dialog box should pop up to tell you the connection was lost. If you'd like to save the retrieved page, turn on logging in the Telnet program. You may then browse through the web page and see the HTML that was used to write it.

Most Internet protocols are specified by Internet documents known as a Request For Comments or RFCs. RFCs may be found at several locations on the Internet. See the Resources section below for appropriate URL's. HTTP version 1.0 is specified by RFC 1945.

Application Protocols: SMTP and Electronic Mail

Another commonly used Internet service is electronic mail. E-mail uses an application level protocol calledSimple Mail Transfer Protocol or SMTP. SMTP is also a text based protocol, but unlike HTTP, SMTP is connection oriented. SMTP is also more complicated than HTTP. There are many more commands and considerations in SMTP than there are in HTTP.
When you open your mail client to read your e-mail, this is what typically happens:
  1. The mail client (Netscape Mail, Lotus Notes, Microsoft Outlook, etc.) opens a connection to it's default mail server. The mail server's IP address or domain name is typically setup when the mail client is installed.
  2. The mail server will always transmit the first message to identify itself.
  3. The client will send an SMTP HELO command to which the server will respond with a 250 OK message.
  4. Depending on whether the client is checking mail, sending mail, etc. the appropriate SMTP commands will be sent to the server, which will respond accordingly.
  5. This request/response transaction will continue until the client sends an SMTP QUIT command. The server will then say goodbye and the connection will be closed.
A simple 'conversation' between an SMTP client and SMTP server is shown below. R: denotes messages sent by the server (receiver) and S: denotes messages sent by the client (sender).
      This SMTP example shows mail sent by Smith at host USC-ISIF, to
      Jones, Green, and Brown at host BBN-UNIX.  Here we assume that
      host USC-ISIF contacts host BBN-UNIX directly.  The mail is
      accepted for Jones and Brown.  Green does not have a mailbox at
      host BBN-UNIX.

      -------------------------------------------------------------

         R: 220 BBN-UNIX.ARPA Simple Mail Transfer Service Ready
         S: HELO USC-ISIF.ARPA
         R: 250 BBN-UNIX.ARPA

         S: MAIL FROM:
         R: 250 OK

         S: RCPT TO:
         R: 250 OK

         S: RCPT TO:
         R: 550 No such user here

         S: RCPT TO:
         R: 250 OK

         S: DATA
         R: 354 Start mail input; end with .
         S: Blah blah blah...
         S: ...etc. etc. etc.
         S: .
         R: 250 OK

         S: QUIT
         R: 221 BBN-UNIX.ARPA Service closing transmission channel
This SMTP transaction is taken from RFC 821, which specifies SMTP.

Transmission Control Protocol

Under the application layer in the protocol stack is the TCP layer. When applications open a connection to another computer on the Internet, the messages they send (using a specific application layer protocol) get passed down the stack to the TCP layer. TCP is responsible for routing application protocols to the correct application on the destination computer. To accomplish this, port numbers are used. Ports can be thought of as separate channels on each computer. For example, you can surf the web while reading e-mail. This is because these two applications (the web browser and the mail client) used different port numbers. When a packet arrives at a computer and makes its way up the protocol stack, the TCP layer decides which application receives the packet based on a port number.
TCP works like this:
  • When the TCP layer receives the application layer protocol data from above, it segments it into manageable 'chunks' and then adds a TCP header with specific TCP information to each 'chunk'. The information contained in the TCP header includes the port number of the application the data needs to be sent to.
  • When the TCP layer receives a packet from the IP layer below it, the TCP layer strips the TCP header data from the packet, does some data reconstruction if necessary, and then sends the data to the correct application using the port number taken from the TCP header.
This is how TCP routes the data moving through the protocol stack to the correct application.
TCP is not a textual protocol. TCP is a connection-oriented, reliable, byte stream service. Connection-oriented means that two applications using TCP must first establish a connection before exchanging data. TCP is reliable because for each packet received, an acknowledgement is sent to the sender to confirm the delivery. TCP also includes a checksum in it's header for error-checking the received data. The TCP header looks like this:
Diagram 7
Diagram 7
Notice that there is no place for an IP address in the TCP header. This is because TCP doesn't know anything about IP addresses. TCP's job is to get application level data from application to application reliably. The task of getting data from computer to computer is the job of IP.
Check It Out - Well Known Internet Port Numbers
Listed below are the port numbers for some of the more commonly used Internet services.
FTP20/21
Telnet23
SMTP25
HTTP80
Quake III Arena27960


Internet Protocol

Unlike TCP, IP is an unreliable, connectionless protocol. IP doesn't care whether a packet gets to it's destination or not. Nor does IP know about connections and port numbers. IP's job is too send and route packets to other computers. IP packets are independent entities and may arrive out of order or not at all. It is TCP's job to make sure packets arrive and are in the correct order. About the only thing IP has in common with TCP is the way it receives data and adds it's own IP header information to the TCP data. The IP header looks like this:

Diagram 8
Diagram 8
Above we see the IP addresses of the sending and receiving computers in the IP header. Below is what a packet looks like after passing through the application layer, TCP layer, and IP layer. The application layer data is segmented in the TCP layer, the TCP header is added, the packet continues to the IP layer, the IP header is added, and then the packet is transmitted across the Internet.

Diagram 9
Diagram 9

Wrap Up

Now you know how the Internet works. But how long will it stay this way? The version of IP currently used on the Internet (version 4) only allows 232 addresses. Eventually there won't be any free IP addresses left. Surprised? Don't worry. IP version 6 is being tested right now on a research backbone by a consortium of research institutions and corporations. And after that? Who knows. The Internet has come a long way since it's inception as a Defense Department research project. No one really knows what the Internet will become. One thing is sure, however. The Internet will unite the world like no other mechanism ever has. The Information Age is in full stride and I am glad to be a part of it.

Resources

Below are some interesting links associated with some of the topics discussed. (I hope they all still work. All open in new window.)
http://www.ietf.org is the home page of the Internet Engineering Task Force. This body is greatly responsible for the development of Internet protocols and the like.
http://www.internic.org is the organization responsible for administering domain names.
http://www.faqs.org/rfcs/rfcsearch.html is an excellent RFC search engine useful for finding any RFC.
http://navigators.com/isp.html is Russ Haynal's ISP Page. This is a great site with links to most NSPs and their backbone infrastructure maps.
http://www.investintech.com/content/historyinternet/ is A Brief Guide to the History of the Internet, sent by Kendra.

Bibliography

The following books are excellent resources and helped greatly in the writing of this paper. I believe Stevens' book is the best TCP/IP reference ever and can be considered the bible of the Internet. Sheldon's book covers a much wider scope and contains a vast amount of networking information.
  • TCP/IP Illustrated, Volume 1, The Protocols.
    W. Richard Stevens.
    Addison-Wesley, Reading, Massachusetts. 1994.
  • Encyclopedia of Networking.
    Tom Sheldon.
    Osbourne McGraw-Hill, New York. 1998.
Although not used for writing this paper, here are some other good books on the topics of the Internet and networking:
  • Firewalls and Internet Security; Repelling the Wiley Hacker.
    William R. Cheswick, Steven M. Bellovin.
    Addison-Wesley, Reading, Massachusetts. 1994.
  • Data Communications, Computer Networks and Open Systems. Fourth Edition.
    Fred Halsall.
    Addison-Wesley, Harlow, England. 1996.
  • Telecommunications: Protocols and Design.
    John D. Spragins with Joseph L. Hammond and Krzysztof Pawlikowski.
    Addison-Wesley, Reading, Massachusetts. 1992.
Read more ...
Designed By Blogger Templates