Sunteți pe pagina 1din 14

Internet

A global network connecting millions of computers. More than 100 countries are linked into exchanges of data, news and opinions. Unlike online services, which are centrally controlled, the Internet is decentralized by design. Each Interne t computer, called a host, is independent. Its operators can choose which Internet services to use and which local services to make available to the global Internet community. Remarkably, this anarchy by design works exceedingly well. There are a variety of ways to access the Internet. Most online services, such as America Online, offer access to some Internet services. It is also possible to gain access through a commercial Internet Service Provider (ISP). importance of the internet to you Because of all these things, the "internet" is a gigantic library, as well as a world-wide message board, telephone network, and publishing medium. It is open 24 hours a day, and you can find anything you want there, and say anything you want. As well as current events and blogs, information about almost any subject is available in depth and up to date. This is incredibly valuable for every subject you can imagine. Almost every college and government research organization is "on the web", along with libraries, educational institutions, associations, and many commercial directories and sites, If you appreciate the richness of the Web and the Internet, and get the benefits yourself, then you will be better able to provide services on them. You don't have to know how to do those technical things yourself but if you know what is useful, then you will be able to direct your technical staff.

TYPES OF NETWORK
Personal area network A personal area network (PAN) is a computer network used for communication among computer and different information technological devices close to one person. Some examples of devices that are used in a PAN are personal computers, printers, fax machines, telephones, PDAs, scanners, and even video game consoles. A PAN may include wired and wireless devices. The reach of a PAN typically extends to 10 meters. A wired PAN is usually constructed with USB and Fire wire connections while technologies such as Bluetooth and infrared communication typically form a wireless PAN. Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as home, school, computer laboratory, office building, or closely positioned group of buildings. Each computer or device on the network is a node. Current wired LANs are most likely to be based on Ethernet technology, although new standards like ITU-T G.hn also provide a way to create a wired LAN using existing home wires (coaxial cables, phone lines and power lines).

Typical library network, in a branching tree topology and controlled access to resources Home network A home network is a residential LAN which is used for communication between digital devices typically deployed in the home, usually a small number of personal computers and accessories, such as printers and mobile computing devices. An important function is the sharing of Internet access, often a broadband service through a cable TV or Digital Subscriber Line (DSL) provider. Campus network A campus network is a computer network made up of an interconnection of LANs within a limited geographical area. The networking equipment (switches, routers) and transmission media (optical fiber, copper plant, Cat5 cabling etc.) are almost entirely owned (by the campus tenant / owner: an enterprise, university, government etc.). Backbone network A Backbone network or network backbone is part of a computer network infrastructure that interconnects various pieces of network, providing a path for the exchange of information between different LANs or subnetworks. A backbone can tie together diverse networks in the same building, in different buildings in a campus environment, or over wide areas. Normally, the backbone's capacity is greater than that of the networks connected to it. Metropolitan area network A Metropolitan area network (MAN) is a large computer network that usually spans a city or a large campus.

Sample EPN made of Frame relay WAN connections and dialup remote access.

Sample VPN used to interconnect 3 offices and remote users Wide area network A wide area network (WAN) is a computer network that covers a large geographic area such as a city, country, or spans even intercontinental distances, using a communications channel that combines many types of media such as telephone lines, cables, and air waves. A WAN often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer. Enterprise private network An enterprise private network is a network built by an enterprise to interconnect various company sites, e.g., production sites, head offices, remote offices, shops, in order to share computer resources. Virtual private network A virtual private network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. The data link layer protocols of the virtual network are said to be tunneled through the larger network when this is the case. One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features. Internetwork An internetwork is the connection of two or more computer networks via a common routing technology (OSI Layer 3) using routers. The Internet can be seen as a special case of an aggregation of many connected internetworks spanning the whole earth. Another such global aggregation is the telephone network. Intranets and extranets Intranets and extranets are parts or extensions of a computer network, usually a LAN. An intranet is a set of networks, using the Internet Protocol and IP-based tools such as web browsers and file transfer applications, that is under the control of a single administrative entity. That administrative entity closes the intranet to all but specific, authorized users. Most commonly, an intranet is the internal network of an organization. A large intranet will typically have at least one web server to provide users with organizational information. An extranet is a network that is limited in scope to a single organization or entity and also has limited connections to the networks of one or more other usually, but not necessarily, trusted organizations or entitiesa company's customers may be given access to some part of its intranetwhile at the same time the customers may not be considered trusted from a security standpoint. Technically, an extranet may also be categorized as a CAN, MAN, WAN, or other type of network, although an extranet cannot consist of a single LAN; it must have at least one connection with an external network. Internet The Internet is a global system of interconnected governmental, academic, corporate, public, and private computer networks. In other words, the Internet is a worldwide interconnection of computers and networks which are either owned privately or publicly. It is based on the networking technologies of the Internet Protocol Suite. It is the successor of the Advanced Research Projects Agency Network (ARPANET)

developed by DARPA of the United States Department of Defense. The Internet is also the communications backbone underlying the World Wide Web (WWW).

Network topology
A network topology is the layout of the interconnections of the nodes of a computer network. Common layouts are: A bus network: all nodes are connected to a common medium along this medium. This was the layout used in the original Ethernet, called 10BASE5 and 10BASE2. A star network: all nodes are connected to a special central node. This is the typical layout found in in a Wireless LAN, where each wireless client connects to the central Wireless access point. A ring network: each node is connected to its left and right neighbor node, such that all nodes are connected and that each node can reach each other node by traversing nodes left- or rightwards. The Fiber Distributed Data Interface (FDDI) made use of such a topology. A mesh network: each node is connected to an arbitrary number of neighbors in such a way that there is at least one traversal from any node to any other. A fully connected network: each node is connected to every other node in the network. Note that the physical layout of the nodes in a network may not necessarily reflect the network topology. As an example, with FDDI, the network topology is a ring (actually two counter-rotating rings), but the physical topology is a star, because all neighboring connections are routed via a central physical location. Overlay network An overlay network is a virtual computer network that is built on top of another network. Nodes in the overlay are connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network. The topology of the overlay network may (and often does) differ from that of the underlying one.

A sample overlay network: IP over SONET over Optical

Basic hardware components


Apart from the physical communications media themselves as described above, networks comprise additional basic hardware building blocks interconnecting their terminals, such as network interface cards (NICs),hubs, bridges, switches, and routers. Network interface cards A network card, network adapter, or NIC (network interface card) is a piece of computer hardware designed to allow computers to physically access a networking medium. It provides a low-level addressing system through the use of MAC addresses. Each Ethernet network interface has a unique MAC address which is usually stored in a small memory device on the card, allowing any device to connect to the network without

creating an address conflict. Ethernet MAC addresses are composed of six octets. Uniqueness is maintained by the IEEE, which manages the Ethernet address space by assigning 3-octet prefixes to equipment manufacturers. The list of prefixes is publicly available. Each manufacturer is then obliged to both use only their assigned prefix(es) and to uniquely set the 3-octet suffix of every Ethernet interface they produce. Repeaters and hubs A repeater is an electronic device that receives a signal, cleans it of unnecessary noise, regenerates it, and retransmits it at a higher power level, or to the other side of an obstruction, so that the signal can cover longer distances without degradation. In most twisted pair Ethernet configurations, repeaters are required for cable that runs longer than 100 meters. A repeater with multiple ports is known as a hub. Repeaters work on the Physical Layer of the OSI model. Repeaters require a small amount of time to regenerate the signal. This can cause a propagation delay which can affect network communication when there are several repeaters in a row. Many network architectures limit the number of repeaters that can be used in a row (e.g. Ethernet's 5-4-3 rule). Bridges A network bridge connects multiple network segments at the data link layer (layer 2) of the OSI model. Bridges broadcast to all ports except the port on which the broadcast was received. However, bridges do not promiscuously copy traffic to all ports, as hubs do, but learn which MAC addresses are reachable through specific ports. Once the bridge associates a port and an address, it will send traffic for that address to that port only. Switches A network switch is a device that forwards and filters OSI layer 2 datagrams (chunks of data communication) between ports (connected cables) based on the MAC addresses in the packets. [15] A switch is distinct from a hub in that it only forwards the frames to the ports involved in the communication rather than all ports connected. A switch breaks the collision domain but represents itself as a broadcast domain. Switches make forwarding decisions of frames on the basis of MAC addresses. A switch normally h as numerous ports, facilitating a star topology for devices, and cascading additional switches.[16] Some switches are capable of routing based on Layer 3 addressing or additional logical levels; these are called multi-layer switches. The term switch is used loosely in marketing to encompass devices including routers and bridges, as well as devices that may distribute traffic on load or by application content (e.g., a Web URL identifier). Routers A router is an internetworking device that forwards packets between networks by processing information found in the datagram or packet (Internet protocol information from Layer 3 of the OSI Model). In many situations, this information is processed in conjunction with the routing table (also known as forwarding table). Routers use routing tables to determine what interface to forward packets (this can include the "null" also known as the "black hole" interface because data can go into it, however, no further processing is done for said data). Firewalls A firewall is an important aspect of a network with respect to security. It typically rejects access requests from unsafe sources while allowing actions from recognized ones. The vital role firewalls play in network security grows in parallel with the constant increase in 'cyber' attacks for the purpose of stealing/corrupting data, planting viruses, etc.

Network performance
Network performance refers to the service quality of a telecommunications product as seen by the customer. It should not be seen merely as an attempt to get "more through" the network. The following list gives examples of Network Performance measures for a circuitswitched network and one type of packet-switched network, viz. ATM: In an Asynchronous Transfer Mode (ATM) network, performance can be measured by line rate, quality of service (QoS), data throughput, connect time, stability, technology, modulation technique and modem enhancements.

Network security

In the field of networking, the area of network security[20] consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources. Network Security is the authorization of access to data in a network, which is controlled by the network administrator. Users are assigned an ID and password that allows them access to information and programs within their authority. Network Security covers a variety of computer networks, both public and private that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network Security is involved in organization, enterprises, and all other type of institutions. It does as its titles explains, secures the network. Protects and oversees operations being done.

Network resilience
In computer networking: Resilience is the ability to provide and maintain an acceptable level of service in the face of faults and challenges to normal operation.

Views of networks
Users and network administrators typically have different views of their networks. Users can share printers and some servers from a workgroup, which usually means they are in the same geographic location and are on the same LAN, whereas a Network Administrator is responsible to keep that network up and running. A community of interest has less of a connection of being in a local area, and should be thought of as a set of arbitrarily located users who share a set of servers, and possibly also communicate via peer-to-peer technologies.

website .
A set of interconnected webpages, usually including a homepage, generally located on the same server, and prepared and maintained as a collection of information by a person, group, or organization.
Web page definition:

a web page is a document that's created in html that shows up on the internet when you type in or go to the web page's address. Plain English definition of a web page: it's any page that you see when you surf the internet. Every new screen you see is a new web page. A web site can have one web page or millions. If you are interested in getting your own web page on the internet here is what you need to know: you must have three things to put a web page on the internet - a domain name, a web site and a web host.

Browsing the Internet


A browser is a program on your computer that enables you to search ("surf") and retrieve information on the WorldWideWeb (WWW), which is part of the Internet. The Web is

simply a large number of computers linked together in a global network, that can be accessed using an address (URL, Uniform Resource Locator, e.g. http://www.veths.no for the Oslo Veterinary School), in the same way that you can phone anyone in the world given their telephone number. URLs are often long and therefore easy to type incorrectly. They all begin with http://, and many (but not all) begin with http://www. In many cases the first part (http://, or even http://www.) can be omitted, and you will still be abl e to access the page. Try this with http://www.cnn.com.

Searching the Web


If you don't know the telephone number of the person you wish to ring to, you need a telephone directory. The Web provides two methods of searching for pages providing information: sites presenting web pages sorted by category and subcategories, e.g. Yahoo (several sites, including http://www.yahoo.com and http://www.yahoo.no) sites offering search engines that return lists of web pages containing text that matches a search word or string, e.g. Google (http://www.google.com), AltaVista (http://www.altavista.com) and FAST Search (http://www.alltheweb.com). Many web sites offer both, or a combination of, these alternatives. Before you conduct a search, it is important to consider, among others, the following points: 1. Is your choice of search term is adequate, too restrictive or too general? 2. Is the search you have planned to undertake most suited for a search engine that categorizes web sites, so that you can browse through appropriate subcategories when the first results are returned? 3. Are you more interested in using a search engine that merely returns all the web pages it has found containing the search term? 4. Have you read the Search Help pages that most search pages offer? These will tell you how the search engine conducts the search, and therefore how you ought to plan your search. 5. Bear in mind the fact that engines differ in their coverage of the Internet, their speed and whether they are largely compiled manually by people or automatically by 'robots' that scan the Internet. A search strategy must include knowledge of how the search engine you have planned to use handles Boolean Logic and other similar search terms, e.g. transgenic AND mice will find all pages covering transgenic mice, but not pages that only mention transgenic rats transgenic NOT mice will return pages on all species other than mice. "transgenic mice" will find pages that contain the phrase "transgenic mice", i.e. where the words are adjacent in the text, but will not return a page containing the text "transgenic rodents, including mice", for which transgenic NEAR mice would be necessary transgen* will return occurences of trangenesis, transgenic and transgenic (thereby increasing your chances of finding pages you are interested in), but will also return pages featuring the word 'transgender', which is probably not what you were looking for!

URL
Address of a resource on the Internet. The resource can be any type of file stored on a server, such as a Web page, a text file, a graphics file, or an application program. The address contains three elements: the type of protocol used to access the file

(e.g., HTTP for a Web page, ftp for an FTP site); the domain name or IP address of the server where the file resides; and, optionally, the pathname to the file (i.e., description of the file's location). For example, the URL http://www.britannica.com/heritage instructs the browser to use the HTTP protocol, go to the www.britannica.com Web server, and access the file named heritage. How web search engines work

High-level architecture of a standard Web crawler A search engine operates in the following order: Web crawling Indexing Searching. Web search engines work by storing information about many web pages, which they retrieve from the html itself. These pages are retrieved by a Web crawler(sometimes also known as a spider) an automated Web browser which follows every link on the site. Exclusions can be made by the use of robots.txt. The contents of each page are then analyzed to determine how it should be indexed (for example, words are extracted from the titles, headings, or special fields calledmeta tags). Data about web pages are stored in an index database for use in later queries. A query can be a single word. The purpose of an index is to allow information to be found as quickly as possible. Some search engines, such as Google, store all or part of the source page (referred to as a cache) as well as information about the web pages, whereas others, such as AltaVista, store every word of every page they find. This cached page always holds the actual search text since it is the one that was actually indexed, so it can be very useful when the content of the current page has been updated and the search terms are no longer in it. This problem might be considered to be a mild form of linkrot, and Google's handling of it increases usability by satisfying user expectations that the search terms will be on the returned webpage. This satisfies the principle of least astonishment since the user normally expects the search terms to be on the returned pages. Increased search relevance makes these cached pages very useful, even beyond the fact that they may contain data that may no longer be available elsewhere. Search engine bias Although search engines are programmed to rank websites based on their popularity and relevancy, empirical studies indicate various political, economic, and social biases in the information they provide. [15][16]These biases could be a direct result of economic and commercial processes (e.g., companies that advertise with a search engine can become

also more popular in its organic search results), and political processes (e.g., the removal of search results in order to comply with local laws)

Exploring Meaning
The Search for the meaning of life represents our search for patterns that would provide us with some sort of continuity between events and our experiences, in different times and different places. Meaning has to do with our individual attempts to make sense of what we experience going on in our inner and outer worlds .

Email
Electronic mail, commonly called email or e-mail, is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internetor other computer networks. Some early email systems required that the author and the recipient both be online at the same time, in common with instant messaging. Today's email systems are based on a store-and-forward model. Email servers accept, forward, deliver and store messages. Neither the users nor their computers are required to be online simultaneously; they need connect only briefly, typically to an email server, for as long as it takes to send or receive messages. An email message consists of three components, the message envelope, the message header, and the message body. The message header contains control information, including, minimally, an originator's email address and one or more recipient addresses. Usually descriptive information is also added, such as a subject header field and a message submission date/time stamp.

List of Free Email Accounts and Services


There are many free email providers out there. This article covers four of the most widely used services in the United States: AOL, Gmail, Yahoo! Mail and Windows Live Hotmail. All of these services have been around for a long time, are operated by large companies and have many users. Why Use a Free Email Account? You might be wondering why should I use a free email account instead of the one assigned to me by my ISP? Great question a lot of people still use the inboxes provided for them by their Internet Service Providers. The main reason for using a different email provider is to keep your address to matter how you choose to get online.

AIM Mail

AIM Mail is a free email service with unlimited storage by AOL. In years past AOL email addresses were limited to customers of the Internet Service Provider, however anyone may now sign up for a free account.

Gmail

Gmail is a free e-mail service by Google. When Gmail debuted in 2004 it introduced a revolutionary web-based interface that made managing large amounts of email easy. This is accomplished through the conversation view in which multiple replies to the same messaged are grouped together and shown at once, and the integration of Google search technology with your inbox to making locating messages fast and easy.

Windows Live Hotmail

Windows Live Hotmail is a free email service by Microsoft. Storage is unlimited and ads can be removed for a yearly fee. Hotmail has a junk mail filter that keeps spam out of the inbox. Unsolicited messages that get around the junk mail filter can be reported to Microsoft, and the system learns from these junk mail reports.

Yahoo! Mail
Yahoo! Mail is an e-mail service by the search company of the same name. There is a free version and a paid version. Storage is unlimited. The Yahoo! Mail web interface resembles Microsoft Outlook. A list of folders is displayed on the left. The central area shows a list of messages on top, with a pane for reading each selected message on the bottom.

Sending and Receiving Mail


Email communication is no more the same within Zoho CRM. With the Zoho Mail Add on, now you can send Emails to your Leads, Contacts and Potentials modules. You need not go to your favorite Email service to communicate with your contacts. With the Zoho Mail Add-on, you can integrate your favorite mail client with Zoho CRM and Zoho CRM becomes one-stop for all your business communication.

Sending Email
Click the [Module] tab. Module refers to the Leads, Contacts, Accounts, etc. tabs. In the [Module] Home page, select the record from the List View. In the Record Details page, go to Emails Related List and click Send Mail.

In the Compose Mail page, enter the email message, attach files, and specify additional email addresses in CC & BCC fields. Click Send. The email will be sent to the recipients with a copy of the mail stored under Emails Related List, in the sent folder of Zoho Mail and your configured mail client.

Through the Emails tab Click the Emails tab. Click Compose from the left panel. The rest is the regular Email process. The compose window is similar to any mail compose editor with its set of editing and formatting options. If you have configured your outbox, then the mails will be sent after an interval of few inutes.

Through Gmail account With just a few simple steps in the settings you can send mails from your Gmail account and view them as sent items in Zoho Mail as well as in Zoho CRM. To get this option working for your Gmail account, configure the Zoho Mail filter for Gmail POP account: Log in to Zoho Mail, click Settings > Mail Organization > Filters > Add Filter In the Filters page, do the following: Add a Filter Name.

For the message criteria, select Sender Is with your Gmail account (...@gmail.com) In the Move to Folder option, browse and select Sent. Click Save.

To attach documents from Zoho Docs


Click the [Module] tab. Module refers to the Leads, Contacts, Accounts, etc. tabs. In the Module Home page, select a record. In the Record's details page, under Emails Related List, click Send Mail. In the Email Compose window, click Attach from Zoho Docs.

Select the files from Zoho Docs pop-up window and click OK.

Receiving Emails
When you receive an Email, the Zoho Mail servers fetch it into the Zoho Mailbox. The same mail is then fetched into Zoho CRM. The received mails that are related to the particular lead, contact or potential will then get listed under the Emails sect ion in that Lead's, Contact's or Potential's page respectively. Mails related to the primary contact are listed under the Email section in Potential page.

When you double-click on a saved msg file, it opens in Outlook and looks exactly like it did when it was in your Inbox.

Check out the latest buzz: our new Gmail chat features.

But wait, there's more... Add contacts and invite your friends to chat from Quick Contacts See when your friends are online Set your status to busy, sleepy, angry or whatever. Even sneezy. Get Google Talk to make free voice calls too. It's completely synchronized with Quick Contacts Go off the record when you're chatting so nothing gets saved to anyone's Gmail account

S-ar putea să vă placă și