Académique Documents
Professionnel Documents
Culture Documents
Introduction
For you to be here, you must have some access to the internet, but do you know much
about your connection, choosing a connection, or what the difference between your's and
your friend's connection is?
This page attempts to address some of these issues, so you can make an informed choice.
Speeds
Speed is the most important thing right? Well, in an uncontented (below) and unlimited
world, speed is probably all it would come down to, these "limits" will be discussed later
on, but let's discuss what speeds could be achieved by various connections.
Big B or little b?
An area of mass confusion, is what is MB what is mb? Well, the significance is in the
case of the b/B! If the B is uppercase, that means byte, if the b is lowecase, that means
bit, the difference being, their are 8 bits in a byte, so 1MB/sec is the same as 8mb/sec.
Most speeds are advertised in their bit speed, i.e. 1mbps/256kbps, all with small bs,
although some people, even ISPs, confuse the meaning.
Speed Table
Technology Typical Speed Maximum Speed
56K Modem 48kbps 56kbps
ISDN Single Channel: 64kbps
Same as Typical
Dual Channel: 128kbps
ADSL 1-2mbps 8mbps
ADSL2+ not in use 25mbps
SDSL 1-2mbps 3mbps
Cable 2mbps 8mbps
Wireless 1mbps 12mbps
56K Modem
This is the original method most of us used to connect to the internet. It's limited to below
56kbps because of what the line can handle. This technology works by converting digital
signals from your computer into a signal for the phone line, using a modem, at the other
end, it's converted back again.
ISDN - Integrated Services Digital Network
This was the faster option available to many dialup users, with a guaranteed connection
of 64 or 128, depending on the number of channels used. A line was typically split into 2
channels, and you would either use both for data, or one for data and the other for
simultaneous voice.
Bandwidth Limits
The first of the limits is how much data you are allowed to download per day or per
month. This is usually specified in GBs, and is common on cheaper services for 1GB a
month, mid range services 15GBmth, or 1GBday, and unlimited on the premium services.
Contention
Contention is when you and other users are contending for the same line or server etc...
for data. It is often expressed as a ratio, such as 50:1 meaning 50 people are sharing the
same bandwidth.
DSL Contention
Here we need a quick idea of how your data gets to your ISPs server:
1) Down your phone line to your exchange.
2) Your exchange into telcos network.
3) Your telcos network to ISP.
From your telephone line, to your exchange, there is just 1 user, yourself, here there is no
contention, you can send and receive data at the fully specified level.
The telephone company will have many users on one exchange, and its at the exchange
your data is split between voice and data. The data is then sent down a network cable
from the exchange, into the telephone company's network. This is where the first
contention comes in, the line may only be, for example, 4mbps. If your ISP says you can
have 1mbps, with a 50:1 contention, then a maximum of 200 people may exist on this
exchange, if they are keeping to their promise. This is not feasible, and the line is
probably capable of a higher data rate, and there will be many lines, but the ratios still
exist. If the ratio is anywhere near being met, the telephone company will most likely
update the exchange.
From the telephone company's network, to your ISPs, there will be another contention,
and this depends on the size of the bandwidth your ISP is willing to buy. This will usually
not be a problem.
Cable Contention
Contention on cable is usually between you and the fibre optic network, this depends on
how many people are using the bandwidth in your area, for example, if the whole street is
downloading a movie, it will slow down, as you're all on the same "cable".
Wireless Contention
Contention on a wireless system can take a few forms. Data must travel from your
transmittor, the the local receiver, then from the local receiver, to the ISPs network.
The bandwidth is limited between your transmittor and the local receiver, but this can be
improved by using multiple carriers at the receiver, the data is likely to travel from the
receiver into the network by a normal network or fibre optic medium.
What is an IP address?
An Internet Protocol address is a unique 32 bit (4 byte) address each computer on the
internet must have, it's an identifier for each computer, and is the way of sending and
retrieving data.
Most dial up users are assigned a new IP address each time they dial up to the internet,
the address will depend on the range of the ISP, this is a dynamic IP address. Permanent
connections such as DSL are most likely to have a static IP address.
An IP address looks like this: 205.45.62.124
Each of the numbers can be in the range 0 - 255.
There are a possible of 4228250625 unique IP addresses.
What is my IP address?
Your IP address at present is: 220.226.12.24
Advertising Cookies
Cookies may also be set by advertisements on a page! Just before the ad image is loaded,
it sets a cookie with information about your site visit, and whatever else the company
wishes to note about you. Companies may use this information to help target specific
groups, it also lets them trace your visits around the web by viewing cookie data.
Disabling Cookies
In Internet Explorer 6, tools>>internet options>>privacy. Sliding the bar will show you
how each privacy settings deals with cookies. When you are satisfied, select apply then
hit ok.
In Internet Explorer 4 or 5, tools>>internet options>>security. Select Internet, click
custom level... . Scroll down to Cookies, and select Disable.
Remember Some sites such as Yahoo! Chat require cookies, selecting "Prompt" may
be more appropriate.
In Netscape, edit>>preferences, select advanced. Check "Disable Cookies" and press OK.
Deleting Cookies
Click Here
Sun v Microsoft
Due to a legal battle, Microsoft no longer distribute VM by Install On Demand (IOD).
Microsoft are granted the rights under their license to perform updates to, and distribute
VM for a limited period, under certain agreements. Sun seeks to make Microsoft issue
VM as part of windows or internet explorer, and not as separate web downloads. Sun also
seek for their own plugin to be distributed with Windows and internet explorer. Sun
believe they are protecting users from outdated microsoft java technology.
Further Extensions
Microsoft and Sun came to further decisions to prolong the transition period. Microsoft
may now support the Microsoft Java Virtual Machine software until December 31, 2007.
This means security holes may be fixed as found, leaving a much more secure, longer
transition time. As has been since 1997, no improvements or changes to the way the Java
in the MSJVM works will be made, all that's ever changed in the last 7 years, and for the
next 3 years is security holes.
Here's How:
Click the Start menu button on the Windows taskbar.
If the computer is holding a current IP address, type 'cmd' (without the quotes) in the
text box that appears. A command prompt window appears on the screen.
Type 'ipconfig' (without the quotes) to view the status of the computer's IP
address(es).
Sponsored Links
Wireless NetworkingShare your knowledge and learn from your peers. Visit the
IT community.Networking.ITtoolbox.com
Block/Change IP AddressesAnonymous and Secure. Fast & Easy Setup. Free
Dynamic DNS from No-IP.www.No-IP.com
The Complete IP SiteTrace IP, trace email, hide IP, change IP, proxy test,
blocklistswhatismyipaddress.com
If the computer is holding a current IP address, type 'ipconfig /release' to let go of the
address.
Type 'ipconfig /renew' to obtain a new IP address (whether or not the computer is
holding a current address).
Tips:
If it is not necessary to view the current IP addresses on a computer, simply type
'ipconfig /release' or 'ipconfig /renew' (without the quotes) in the text box that
appears in Step 3.
To bring a computer back onto the network after moving it to a different location, or
experiencing an unexpected outage, first release, then renew the IP address.
Computers on DHCP networks often (but not always) re-establish network
connectivity automatically.
Here's How:
Click the Start menu button on the Windows taskbar.
Type 'winipcfg' (without the quotes) in the text box that appears. A new window
appears on the screen. The "IP Address" field shows the current IP address for the
default network adapter.
If the computer is holding a current IP address, click the Release button to let go of
the address.
Sponsored Links
Tips:
If it is not necessary to view the current IP addresses on a computer, simply type
'winipcfg /release' or 'winipcfg /renew' (without the quotes) to save a step in the
process.
To bring a computer back onto the network after moving it to a different location, or
experiencing an unexpected outage, first release, then renew the IP address.
Computers on DHCP networks often (but not always) re-establish network
connectivity automatically.
Appl This layer supports application and end-user processes. Communication partners are
icatio identified, quality of service is identified, user authentication and privacy are
considered, and any constraints on data syntax are identified. Everything at this layer is
n application-specific. This layer provides application services for file transfers, e-mail,
(Lay and other network software services. Telnet and FTP are applications that exist entirely
er 7) in the application level. Tiered application architectures are part of this layer.
Prese This layer provides independence from differences in data representation (e.g.,
encryption) by translating from application to network format, and vice versa. The
ntati
presentation layer works to transform data into the form that the application layer can
on
accept. This layer formats and encrypts data to be sent across a network, providing
(Lay freedom from compatibility problems. It is sometimes called the syntax layer.
er 6)
Sessi This layer establishes, manages and terminates connections between applications. The
on session layer sets up, coordinates, and terminates conversations, exchanges, and
(Lay dialogues between the applications at each end. It deals with session and connection
er 5) coordination.
Tran
sport This layer provides transparent transfer of data between end systems, or hosts, and is
responsible for end-to-end error recovery and flow control. It ensures complete data
(Lay transfer.
er 4)
Netw This layer provides switching and routing technologies, creating logical paths, known
ork as virtual circuits, for transmitting data from node to node. Routing and forwarding are
(Lay functions of this layer, as well as addressing, internetworking, error handling,
er 3) congestion control and packet sequencing.
At this layer, data packets are encoded and decoded into bits. It furnishes transmission
Data protocol knowledge and management and handles errors in the physical layer, flow
control and frame synchronization. The data link layer is divided into two sublayers:
Link
The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The
(Lay MAC sublayer controls how a computer on the network gains access to the data and
er 2) permission to transmit it. The LLC layer controls frame synchronization, flow control
and error checking.
Physi This layer conveys the bit stream - electrical impulse, light or radio signal -- through
cal the network at the electrical and mechanical level. It provides the hardware means of
(Lay sending and receiving data on a carrier, including defining cables, cards and physical
er 1) aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components.