Vous êtes sur la page 1sur 18

An Introduction to Networking Terminology, Interfaces, and Protocols

Introduction
A basic understanding of networking is important for anyone managing a server. Not only is it essential
for getting your services online and running smoothly, it also gives you the insight to diagnose
problems.
This document will provide a basic overview of some common networking concepts. We will discuss
basic terminology, common protocols, and the responsibilities and characteristics of the different layers
of networking.
This guide is operating system agnostic, but should be very helpful when implementing features and
services that utilize networking on your server.
Networking Glossary
Before we begin discussing networking with any depth, we must define some common terms that you
will see throughout this guide, and in other guides and documentation regarding networking.
These terms will be expanded upon in the appropriate sections that follow:

Connection: In networking, a connection refers to pieces of related information that are


transfered through a network. This generally infers that a connection is built before the data
transfer (by following the procedures laid out in a protocol) and then is deconstructed at the at
the end of the data transfer.

Packet: A packet is, generally speaking, the most basic unit that is transfered over a network.
When communicating over a network, packets are the envelopes that carry your data (in pieces)
from one end point to the other.

Packets have a header portion that contains information about the packet including the source and
destination, timestamps, network hops, etc. The main portion of a packet contains the actual data being
transfered. It is sometimes called the body or the payload.

Network Interface: A network interface can refer to any kind of software interface to
networking hardware. For instance, if you have two network cards in your computer, you can
control and configure each network interface associated with them individually.

A network interface may be associated with a physical device, or it may be a representation of a virtual
interface. The "loopback" device, which is a virtual interface to the local machine, is an example of
this.

LAN: LAN stands for "local area network". It refers to a network or a portion of a network that
is not publicly accessible to the greater internet. A home or office network is an example of a
LAN.

WAN: WAN stands for "wide area network". It means a network that is much more extensive
than a LAN. While WAN is the relevant term to use to describe large, dispersed networks in
general, it is usually meant to mean the internet, as a whole.

If an interface is said to be connected to the WAN, it is generally assumed that it is reachable through
the internet.

Protocol: A protocol is a set of rules and standards that basically define a language that devices
can use to communicate. There are a great number of protocols in use extensively in
networking, and they are often implemented in different layers.

Some low level protocols are TCP, UDP, IP, and ICMP. Some familiar examples of application layer
protocols, built on these lower protocols, are HTTP (for accessing web content), SSH, TLS/SSL, and
FTP.

Port: A port is an address on a single machine that can be tied to a specific piece of software. It
is not a physical interface or location, but it allows your server to be able to communicate using
more than one application.

Firewall: A firewall is a program that decides whether traffic coming into a server or going out
should be allowed. A firewall usually works by creating rules for which type of traffic is
acceptable on which ports. Generally, firewalls block ports that are not used by a specific
application on a server.

NAT: NAT stands for network address translation. It is a way to translate requests that are
incoming into a routing server to the relevant devices or servers that it knows about in the LAN.
This is usually implemented in physical LANs as a way to route requests through one IP address
to the necessary backend servers.

VPN: VPN stands for virtual private network. It is a means of connecting separate LANs
through the internet, while maintaining privacy. This is used as a means of connecting remote
systems as if they were on a local network, often for security reasons.

There are many other terms that you may come across, and this list cannot afford to be exhaustive. We
will explain other terms as we need them. At this point, you should understand some basic, high-level
concepts that will enable us to better discuss the topics to come.
Network Layers
While networking is often discussed in terms of topology in a horizontal way, between hosts, its
implementation is layered in a vertical fashion throughout a computer or network.

What this means is that there are multiple technologies and protocols that are built on top of each other
in order for communication to function more easily. Each successive, higher layer abstracts the raw
data a little bit more, and makes it simpler to use for applications and users.
It also allows you to leverage lower layers in new ways without having to invest the time and energy to
develop the protocols and applications that handle those types of traffic.
The language that we use to talk about each of the layering scheme varies significantly depending on
which model you use. Regardless of the model used to discuss the layers, the path of data is the same.
As data is sent out of one machine, it begins at the top of the stack and filters downwards. At the lowest
level, actual transmission to another machine takes place. At this point, the data travels back up through
the layers of the other computer.
Each layer has the ability to add its own "wrapper" around the data that it receives from the adjacent
layer, which will help the layers that come after decide what to do with the data when it is passed off.
OSI Model
Historically, one method of talking about the different layers of network communication is the OSI
model. OSI stands for Open Systems Interconnect.
This model defines seven separate layers. The layers in this model are:

Application: The application layer is the layer that the users and user-applications most often
interact with. Network communication is discussed in terms of availability of resources,
partners to communicate with, and data synchronization.

Presentation: The presentation layer is responsible for mapping resources and creating context.
It is used to translate lower level networking data into data that applications expect to see.

Session: The session layer is a connection handler. It creates, maintains, and destroys
connections between nodes in a persistent way.

Transport: The transport layer is responsible for handing the layers above it a reliable
connection. In this context, reliable refers to the ability to verify that a piece of data was
received intact at the other end of the connection.

This layer can resend information that has been dropped or corrupted and can acknowledge the receipt
of data to remote computers.

Network: The network layer is used to route data between different nodes on the network. It
uses addresses to be able to tell which computer to send information to. This layer can also
break apart larger messages into smaller chunks to be reassembled on the opposite end.

Data Link: This layer is implemented as a method of establishing and maintaining reliable links
between different nodes or devices on a network using existing physical connections.

Physical: The physical layer is responsible for handling the actual physical devices that are used
to make a connection. This layer involves the bare software that manages physical connections
as well as the hardware itself (like Ethernet).

As you can see, there are many different layers that can be discussed based on their proximity to bare
hardware and the functionality that they provide.
TCP/IP Model
The TCP/IP model, more commonly known as the Internet protocol suite, is another layering model
that is simpler and has been widely adopted. It defines the four separate layers, some of which overlap
with the OSI model:

Application: In this model, the application layer is responsible for creating and transmitting
user data between applications. The applications can be on remote systems, and should appear
to operate as if locally to the end user.

The communication is said to take place between peers.

Transport: The transport layer is responsible for communication between processes. This level
of networking utilizes ports to address different services. It can build up unreliable or reliable
connections depending on the type of protocol used.

Internet: The internet layer is used to transport data from node to node in a network. This layer
is aware of the endpoints of the connections, but does not worry about the actual connection
needed to get from one place to another. IP addresses are defined in this layer as a way of
reaching remote systems in an addressable manner.

Link: The link layer implements the actual topology of the local network that allows the
internet layer to present an addressable interface. It establishes connections between
neighboring nodes to send data.

As you can see, the TCP/IP model, is a bit more abstract and fluid. This made it easier to implement
and allowed it to become the dominant way that networking layers are categorized.
Interfaces
Interfaces are networking communication points for your computer. Each interface is associated with a
physical or virtual networking device.
Typically, your server will have one configurable network interface for each Ethernet or wireless
internet card you have.

In addition, it will define a virtual network interface called the "loopback" or localhost interface. This is
used as an interface to connect applications and processes on a single computer to other applications
and processes. You can see this referenced as the "lo" interface in many tools.
Many times, administrators configure one interface to service traffic to the internet and another
interface for a LAN or private network.
In DigitalOcean, in datacenters with private networking enabled, your VPS will have two networking
interfaces (in addition to the local interface). The "eth0" interface will be configured to handle traffic
from the internet, while the "eth1" interface will operate to communicate with the private network.
Protocols
Networking works by piggybacking a number of different protocols on top of each other. In this way,
one piece of data can be transmitted using multiple protocols encapsulated within one another. We will
talk about some of the more common protocols that you may come across and attempt to explain the
difference, as well as give context as to what part of the process they are involved with.
We will start with protocols implemented on the lower networking layers and work our way up to
protocols with higher abstraction.
Media Access Control
Media access control is a communications protocol that is used to distinguish specific devices. Each
device is supposed to get a unique MAC address during the manufacturing process that differentiates it
from every other device on the internet.
Addressing hardware by the MAC address allows you to reference a device by a unique value even
when the software on top may change the name for that specific device during operation.
Media access control is one of the only protocols from the link layer that you are likely to interact with
on a regular basis.
IP
The IP protocol is one of the fundamental protocols that allow the internet to work. IP addresses are
unique on each network and they allow machines to address each other across a network. It is
implemented on the internet layer in the IP/TCP model.
Networks can be linked together, but traffic must be routed when crossing network boundaries. This
protocol assumes an unreliable network and multiple paths to the same destination that it can
dynamically change between.

There are a number of different implementations of the protocol. The most common implementation
today is IPv4, although IPv6 is growing in popularity as an alternative due to the scarcity of IPv4
addresses available and improvements in the protocols capabilities.
ICMP
ICMP stands for internet control message protocol. It is used to send messages between devices to
indicate the availability or error conditions. These packets are used in a variety of network diagnostic
tools, such as ping and traceroute.
Usually ICMP packets are transmitted when a packet of a different kind meets some kind of a problem.
Basically, they are used as a feedback mechanism for network communications.
TCP
TCP stands for transmission control protocol. It is implemented in the transport layer of the IP/TCP
model and is used to establish reliable connections.
TCP is one of the protocols that encapsulates data into packets. It then transfers these to the remote end
of the connection using the methods available on the lower layers. On the other end, it can check for
errors, request certain pieces to be resent, and reassemble the information into one logical piece to send
to the application layer.
The protocol builds up a connection prior to data transfer using a system called a three-way handshake.
This is a way for the two ends of the communication to acknowledge the request and agree upon a
method of ensuring data reliability.
After the data has been sent, the connection is torn down using a similar four-way handshake.
TCP is the protocol of choice for many of the most popular uses for the internet, including WWW,
FTP, SSH, and email. It is safe to say that the internet we know today would not be here without TCP.
UDP
UDP stands for user datagram protocol. It is a popular companion protocol to TCP and is also
implemented in the transport layer.
The fundamental difference between UDP and TCP is that UDP offers unreliable data transfer. It does
not verify that data has been received on the other end of the connection. This might sound like a bad
thing, and for many purposes, it is. However, it is also extremely important for some functions.
Because it is not required to wait for confirmation that the data was received and forced to resend data,
UDP is much faster than TCP. It does not establish a connection with the remote host, it simply fires
off the data to that host and doesn't care if it is accepted or not.

Because it is a simple transaction, it is useful for simple communications like querying for network
resources. It also doesn't maintain a state, which makes it great for transmitting data from one machine
to many real-time clients. This makes it ideal for VOIP, games, and other applications that cannot
afford delays.
HTTP
HTTP stands for hypertext transfer protocol. It is a protocol defined in the application layer that forms
the basis for communication on the web.
HTTP defines a number of functions that tell the remote system what you are requesting. For instance,
GET, POST, and DELETE all interact with the requested data in a different way.
FTP
FTP stands for file transfer protocol. It is also in the application layer and provides a way of
transferring complete files from one host to another.
It is inherently insecure, so it is not recommended for any externally facing network unless it is
implemented as a public, download-only resource.
DNS
DNS stands for domain name system. It is an application layer protocol used to provide a humanfriendly naming mechanism for internet resources. It is what ties a domain name to an IP address and
allows you to access sites by name in your browser.
SSH
SSH stands for secure shell. It is an encrypted protocol implemented in the application layer that can be
used to communicate with a remote server in a secure way. Many additional technologies are built
around this protocol because of its end-to-end encryption and ubiquity.
There are many other protocols that we haven't covered that are equally important. However, this
should give you a good overview of some of the fundamental technologies that make the internet and
networking possible.
Conclusion
At this point, you should be familiar with some basic networking terminology and be able to
understand how different components are able to communicate with each other. This should assist you
in understanding other articles and the documentation of your system.
How a Broadcast Address Works
February 13th, 2008 Related Filed Under

NETWORKS
Imagine youre Paul Revere, riding from Boston to Lexington to warn citizens that the redcoats were
coming. He may not be as fast as computer networks today, but Paul Revere was essentially acting
much like a broadcast would- he was relaying his message to the entire town of Lexington.
A broadcast, in particular, is a simple message that is sent to all clients on a local area network. But just
exactly what enables a network to broadcast a message to every single client on the network?
What is a Broadcast Address?
A broadcast address is an address used to indicate that information being sent out should be delivered
to every client on the local area network. These addresses are always the highest number possible in a
particular network address or subnet. Well cover subnets later, for now lets take a closer look at the
most common broadcast address: Data Link Layer broadcasts.

Broadcasts on the Data Link Layer correspond to MAC addresses. MAC address broadcasts are
generally the easiest to understand, since they arent affiliated with IP addresses or subnetting. In fact,
all you really need to remember is FF:FF:FF:FF:FF:FF. Whereas this MAC address would normally be
comprised of different hexadecimal values, it is instead simply all Fs. (As we know, each F stands for
the highest number in hexadecimal: 15)
When a MAC address broadcast is sent out, each network interface card on the local area network will
see the broadcast address and automatically pass the information up to the upper layers of the OSI
model. So far its simple- right? Now lets get back to the subnetting and IP address topics that are
present on the Network Layer.

How IP Broadcasts are Sent via the Network Layer


Remember how we stated that broadcast addresses are always the highest-most number in an address
range? IP broadcasts are no exception! On a network that isnt subnetted, we can simply place 1s in
place for each bit in the host portion. The result: our very own broadcast address!

Things are still fairly simple: simply replace each host portion with the highest number you can create
with 8 bits: 255. Notice that the network portions do not change- just the host portions.
Sadly, this is where things start to get a little trickier: we need to find the broadcast address of a
subnetted network.
How to Find the Broadcast Address of a Subnetted Network
We need two things to find the broadcast address of a subnetted network: an IP address, and the subnet
mask. The process is simple: find the inverse of the subnet mask. Then take the result, and logically OR
it with the IP address to get the broadcast address.

Of course, we can convert the above binary result to decimal and get the broadcast address of
192.168.16.31. If you arent familiar with the OR process, its rather simple. If there is a 1 in either the
IP or subnet field, then the result will always be a 1. (Otherwise, the result is 0)
Now we know how to find the broadcast address and how it works- but what is it used for?
What are Broadcast Addresses used for?
Broadcasts are generally used for several reasons:

Address Resolution Protocol (ARP) uses broadcasts to map physical addresses to logical
addresses. To build the table of hosts, a device needs to send a broadcast to every other device
on the network to essentially find out who is where.

Several types of network protocols and services use broadcasts in the same way. Dynamic Host
Configuration Protocol (DHCP), for instance, requires that broadcasts be used to dynamically
assign an IP address to computers on a network.

Routing protocols such as Routing Information Protocol (RIP) use broadcasts to send out
advertisements. This advertisement is used by routers to map out the topology of a network,

so that data can be routed to the appropriate place accordingly. (Interesting enough, this
protocol will attempt to find the fasted route through a network to a destination, based on how
many hops it takes to get from the sender to the receiver.)

Final Points of Interest on Broadcasts


Keep in mind that broadcasts will travel to every single client on a network- at least, until a router is
encountered. A router is the only device that can separate a broadcast domain. Logically, this is
mandatory for the internet to exist. What do you think would happen if broadcasts were being sent from
network to network- all over the internet? (Hint: no more Internet.)
Also make note that broadcast addresses should never be used as host addresses. This can be confused
in subnetting, where it isnt always clear where the host portion starts and ends. The broadcast address
is reserved as the highest value- and likewise, no IP address should use a broadcast address or problems
will arise.

Basic Hardware
Hardware is the physical setup of the computer. A standard computer system is going to include:

a motherboard (which is the computers brain that enables the system to run),

a hard drive (to store and retrieve data),

a monitor (to see what youre working on),

a diskette or CD-ROM/DVD-ROM drive (to load and run programs),

a keyboard (to type and interact with the system), and

a mouse (to navigate on the system).


The three main selling points that most people focus on when computer shopping are a computers CPU, RAM
and Hard Drive. Lets look at all three:

CPU The CPU (Central Processing Unit also referred to simply as a processor) is a computers engine. And,
like cars, the bigger the engine (CPU), the faster the machine. Todays computers process information in units
called GHz (gigahertz). CPUs currently range from 1.5 GHz to 3.2 GHz. The higher the number, the faster the
computer speed. You might automatically assume that you want to get the fastest CPU possible. But remember
that youre going to pay for speedand how much speed will you realistically need? For basic everyday use you
dont need top-of-the-line speed. However, the slower your system the longer you will have to wait for programs
to load. Talk with the salesclerk about how much speed will be adequate for your use.

RAM RAM (Random Access Memory) is how much memory space your computer has to store and use
information and software. RAM is also measured in speed, in this case its megabytes (Mb). Like CPUs, the
faster/greater the memory, the better your computers performance and the higher the price. Most computer
experts would recommend at least 128 MB (megabytes) of memory and preferably upward to 512 MB. Most
computers today come with at least 256Mb. The more RAM you have the faster your computer will run and the
less likely you will encounter frustrating problems like your system freezing up, crashing or slowing down. The
good news is that buying memory is relatively cheap and you can also opt to buy additional memory down the
road.

Hard Drive. A computers hard drive is what reads and writes data on a hard disk (meaning its physically stored
somewhere on the computer). It is contained within your computer (on the laptop or in the tower if you are
looking at a desktop computer). A computers hard drive is measured in gigabytes (GB). And, as you probably
guessed, the bigger the hard drive, the betterand the more expensive.

Operating System
Most brand-name new computers will have an operating system pre-installed. Operating systems enable all of
the software you have, or purchase, to run on your system. Examples of well-known operating systems are
Windows XP or Windows Vista. Unless you know a lot about operating systems, youre better off choosing a
brand-name computer that comes pre-loaded with its own operating system. Your operating system will
determine what type of software it can run.
Software
When you purchase your computer it will most likely come with a suite of basic software applications for
example, Microsoft Works or Microsoft Office. These software suites include basic programs that someone
would need for home use and even small business work (i.e. scheduling, email, word processing, spreadsheets,
database, etc.)
Keep in mind that software already loaded onto a new computer comes with a special Operating Equipment
Manufacturers (OEM) license and cannot be transferred to another system. So if, in a few years, you decide to
buy a new system instead of upgrading, you will have to purchase the software (if it doesnt come with your new
system).
If you already know some software that you would like to, or need to, be able to use on your computer make sure
that its compatible with the system you are considering. A salesclerk should be able to tell you what software is
compatible with your system. For example, if you are buying a computer for school, check with your school to
see if you need any special software or that the software that comes with the computer (or that you plan on
purchasing) is compatible with what your school uses.
Optional Accessories
There is a seemingly-endless list of other equipment you may want to purchase for your computer, the most
common pieces for first-time computer buyers being:

DVD-ROM (Digital Versatile Disk-Read Only Memory). Most computers now come equipped with CD-ROM
drives. You may want to upgrade to a DVD-ROM drive which can run both CDs (data and music) and DVDs.
Another upgrade option in this category is CD-RW (Rewritable Compact Disk) and DVD-RW (Rewritable Digital
Versatile Disk) abilities to be able to re-record or re-write over existing data, video or music on CDs and/or
DVDs. There are several DVD writing formats so check to be sure you know what formats your system uses to
make sure its compatible with software that you will likely use.

External Disk Drive or Zip Drives. If you anticipate needing to store a lot of data you might want to consider
purchasing an external disk drive or zip drive. These drives will allow you to store data externally instead of
having to use space on your internal hard drive.

Keyboard. Wait wasnt a keyboard part of the basic computer package? Yes. But you can upgrade here as
well. The keyboards that come with most desktop PCs are very standard, but you can get opt to buy an
upgraded keyboard loaded with extra features (like one-touch email or internet access) and ergonomic styles.

Modems. Most computers now have internal modems which enable you to connect to a phone line to
send/receive faxes and use dial-up internet service. Modem speed is measured in K and 56K is the fastest
internal modem speed you can get. However, depending on the modem included in the system you are
considering you may want to purchase an upgraded (read: faster) modem.

Mouse. While most computers come with a packaged mouse you can spend a few dollars to get an upgraded
one as well, maybe just to get something that looks a bit different or something that even functions differently,
like infrared mousse that work wirelessly.

Printers. The computer system you are considering may be bundled with a printer, but most are not. Most
printers you will be considering fall into one of two categories laser or inkjet. It has to do with how the ink is
actually applied to the paper. Laser printers are faster, more precise and more expensive. Most computerowners will only need black & white laser printers although color laser printers are available (for a LOT more
money). Inkjet printers shoot ink onto the paper and can occasionally leave a tell-tale smudge if the ink hasnt
dried before its touched, but they are much less expensive and more affordable to print in color. If you are
considering an ink-jet make sure you know how much ink cartridges cost for the printer and approximately how
many pages can be printed per cartridge. If you do high-volume printing it may be less expensive over the longterm to invest in a laser printer. You can get an idea of the printers quality level (how precise the printing it) by
its resolution, which is expressed in dots per inch or dpi. Generally the higher the dpi (more dots per square
inch), the higher the resolution and the better the quality. If you are going to print photographs, check to see if
the printer has photo-printing capability and quality.

Routers. If you have more than one computer at home a router is a piece of equipment that will enable you to
connect them in a network. That way you can share files, internet connections and peripheral equipment like
scanners and printers between your computers. If you would like to have more freedom and flexibility in where
you use your computer at home you may want to look into getting a wireless router that enables any configured
computers in your home to get online anywhere in your home.

Scanner. Scanners enable you to take pictures of paper documents or photos and convert them to optical
images you can use and manipulate in your computer.

Speakers and Sound Cards. All computers will come with a built-in sound card and some will have speakers
as well. However, the speakers will be pretty basic so if you need higher-quality or more precise sound you may
want to consider buying a higher-quality set of speakers.

Surge protectors. A flash of lightening or power surge and your computer system can be gone. Toast.
Erased. A surge protector will protect your computer by blowing a fuse if it hit with an electrical surge (instead of
your computer getting slammed with that rush of energy). Since youre probably spending upwards of at least
$1,000 for a computer, its worth it to spend an additional $10 or $25 to buy a little protection with a surge

protector. Remember, however that the only sure way to avoid your computer getting blown up during an
electrical storm is to unplug it!
If you have a question about what other equipment you might be interested in for your system let a sales clerk
know what type of software you plan on using and he/she should be able to tell you what additional pieces you
might want to consider. And dont feel like you have to get everything at once. If moneys tight or youre just
starting out with a home computer, buy the basics, get used to how it works and then add pieces slowly as you
need them and can afford to buy them.
Desktop vs. Laptop
If you have a pretty good idea of how youll use your computer and how much speed and memory you would
like, the next decision is laptop or desktop? Laptops (known as notebooks because they are lighter and more
compact) are often preferred for portability, which is very helpful if you need a computer while traveling. But with
wireless internet capabilities you may consider a laptop for home use over a desktop system. However, there is
some upside to desktop systems (also increasingly referred to as tower computers because the internal
hardware is housed in a large tower.) They are generally less expensive than laptops, have larger screens (for
easier viewing), offer more multimedia features and room for memory over their laptop counterparts. Ultimately
your decision will be driven by what you need in a computer and what you can ideally afford to spend.

Security Basics
Vulnerabilities of various Computer systems.
People who fall in love with the Net do so for different reasons. Many love the ability to quickly
and cheaply keep up with friends and loved ones via e-mail, while others love the vast oceans of
information or the rush of playing Internet games.
However, it's likely that most Internet users share one thing in common as they surf: the last thing
on their minds is computer security.
While that's understandable, it's also a big mistake. It is important to remember that surfing the Net
comes with certain inherent risks. When you log onto the Net, you step into the public arena, even
if you're surfing from a bedroom computer while lounging around in your skivvies!
There are as many bad guys in cyberspace as there are in everyday life, and those shady characters
are constantly prowling the Internet in search of new victims to scam.
However, the media often exaggerate these dangers. It is extremely unlikely (though not
impossible) that anyone reading this article will fall prey to an Internet crime, and in truth the risks
are not much greater than those associated with many fun activities.
Does the potential of breaking a bone keep you from enjoying your favorite ski slope or bike trail?
Of course not. Instead, the smart person uses the necessary caution that will allow for a safe and
enjoyable experience.
That ethos also applies to those who want to surf the Web safely. There are countless ways that
thieves and mischief makers can wreak havoc with your sense of security, but there are just as
many ways to keep intruders at bay via safe-surfing techniques or security software.
Latest Security
For a basic overview of Internet and computer security issues, stop by SecurityFocus . This site
bills itself as the "largest and most comprehensive database of security knowledge and resources
freely available to the public."
Here, you'll find pages devoted to the latest security news, information about the vulnerabilities of
various systems, reviews of security tools and software, a library of online security information and
more. You can also sign up for the BugTraq e-mail updates that keep you abreast of the latest
vulnerabilities.
Admittedly, this site is not exactly light reading. But it offers comprehensive coverage of security
issues.

Online security risks exist only when a computer is actually connected to the Internet. Anyone who
connects to the Net via a phone modem is potentially at risk when they are logged on, but the
danger of a new attack upon security disappears as soon as they log off.
It's a different story for those with broadband connections. In essence, a broadband link gives you
continuous access to the Net 24 hours a day. Those considering the speed and quality advantages of
broadband and mobile broadband should also weigh this additional, very small risk in their
decision process.
Building Firewalls
Unleashing viruses and stealing e-mail content are two major threats to your computer's security.
But they are hardly the only threats. Information that is stored on your computer is potentially
vulnerable to attack. That's why users might consider building their own firewall to keep intruders
out.
Think of a firewall as a heavy steel, dead-bolted front door that protects all the valuables behind it.
Whenever you log onto the Net, and type in a Web address, you are requesting a page that comes to
you via an IP address. Basically, the IP address is a numerical translation of the address that you've
just typed in - for examplewww.allaboutcookies.org is translated into a series of numbers that
allows a computer to search for the information you've requested and to send it back to you.
Pretty neat, but there's also a potential downside. In order to receive the information, you too must
have an IP address, and it is this address that makes you vulnerable to hackers looking to do
naughty things to your computer.
Those with dial-up connections receive a new IP address each time they log on, making them less
vulnerable to attack than broadband users, who have a constant, static address. But the risks are real
for both groups.
Once hackers get into your IP address, they do their damage by accessing applications through a
virtual channel called a port number. Firewall software prevents incoming requests from accessing
these ports.
Those looking for more sophisticated protection can purchase software from companies such
as Symantec or McAfee . Less comprehensive protection can be obtained via a free download
at Zone Labs' Zone Alarm.
The Internet is a new world of limitless fun, but dangers also lurk in the shadows. A solid
understanding of Internet security issues can help keep your private information protected as you
cruise the information superhighway.

Vous aimerez peut-être aussi