Friday, June 29, 2012

Ford Motor Company - Case Study

Background (General Facts)

Ford Motors is one of three leading automotive manufacturing companies in the United States. Based in Michigan in 1903 by Henry ford and grew to reach revenue of 0 billion and more than 370,000 employees by 1996 [1]. In the 1970's, the automobile market for the major auto makers - General Motors (GM), Ford, and Chrysler- was crunched by competition from foreign manufactures such as Toyota and Honda. In 1999, Ford acquired the Swedish Volvo model in an attempt to compete in the foreign market and expand to other regions. Furthermore, Ford launched a full organization re-engineering business process plan called "Ford 2000" aiming at reestablishing the company's infrastructure. The process meant reduction in their Vehicle Centers (VCs) to only five covering the operations that spanned 200 countries. It also meant cutting redundancies and requiring Information Technology (IT) to be the driving force and the link between Ford centers worldwide.

Technology Update

In building Ford's IT infrastructure, the company focused on implementing a setup that supported the TCP/IP communication protocol based on the U.S. department of Defense requirements. At those days, Ford internal network was meant to serve files transfer unlike most companies that used the network mainly for email communications. Throughout the 1990's, Ford developed a cost effective Global Enterprise Network Integration (GENI) process to link all its locations compromising on the type of the connection and the cabling in favor of full coverage. During the same time, Ford started building its Web Farm, which was basically a set of hardware and software managed by a team for building Ford's public website. The work started by publishing documents for technical references and moved to more advanced images from a live auto show. As a result, the website received 1 million visits a day in less than 2 years after its official launch. Throughout the end of the 90's, Ford established its web services by increasing the amount of information published, building more intelligent and standard web application in 12 weeks period, purchasing more Netscape browsers for setup on its users' machines, and creating a B2B server to allow the suppliers secured access to Ford's Intranet.

Ford Motor Company - Case Study

In the path towards service cost reduction and bringing more business through the web, Ford worked closely with its competitors in the U.S. market GM and Chrysler to establish what came to be known as "Automotive Network Exchange" (ANX) certificate. The protocols aimed at providing a unified communications standard through the Internet to enable suppliers to provide common technology for all manufacturers. Moreover, Ford focused on making information on its web site more accessible and useful by deploying a team to manage the process of adding and updating information based on an analysis of how humans deal with information. One final aspect of Fords endeavor was to try to build a model through its infrastructure that benefited from the model implemented by Dell computers to improve their supply chain and delivery process. The direct model would not work well for automotives as it would with computers, as a result Ford worked on its retailing network remodeling and identifying what would eventually give it the extra edge in delivery time.

Enterprise Architecture Issues

Ford's regional expansion to address the competition for market shares demanded cost management for the infrastructure upgrades IT infrastructure places limitations on the type of application development based on the platforms Easy access to information and prompt delivery of vital data to key individuals requires proper knowledge managementOrganizations reengineering and process remodeling is necessary when adapting new technologies to maintain the cost and increase efficiency Supply chain errors and delays can severely affect the progress of the business and the market value of the corporation
Analysis

Infrastructure Upgrade

Since the inception of the Internet in the 1960's, much effort has been made in standardizing how computers connect to it. In 1982, the International Organization for Standards (ISO) realized that during that period many ad hoc networking systems were already using the TCP/IP protocol for communications and thus adapted it as a standard in its model for the Internet network [2]. The main driver for IP convergence, at that period, was the growth in data traffic through wide area networks (WANs) established by local companies. Furthermore, in 1991, the Internet was open for commercial use, and that demanded a reduction in the total cost of operating the network to cope with 1 million Internet hosts that materialized in only 1-year time. Telecommunications companies like AT&T understood the potential and worked on standardizing the network offering voice services over IP networks that managed the separation between voice and data transmission [3].

At the same time, Ford had launched its plan to update its infrastructure, and seized the opportunity brought by the global movement of integrating the voice, fax transmission network with data transmission and expanded its WAN to include its offices in Europe and elsewhere. The financial benefits also came from the fact that Ford adapted the TCP/IP protocol from the beginning and made sure that all its technical infrastructure upgrades adhere to the standards. This made the transition of its system to the Internet as cost effective as it could be.

Web Technologies

Intranets employ the hypertext and multimedia technology used on the Internet. Prior to 1989, when Tim burners-Lee invented the Web [4], most applications used standard development languages such as C and C++ to create desktop applications that were proprietary and dependent on the platform. For example, applications running on a command-based operating system such as UNIX would not run under Windows, and those working for PCs might not work on Apple computers and vice versa [5]. The invention of HTML (Hyper-Text Markup Language) introduced a new model for applications that conform to the standards provided by a single program, the "Web Browser". Unlike standard applications, the browser brought a unified interface that had a very fast learning curve. Users seem to require no additional training to work with web browsers. Furthermore, system administrators did not have to spend time installing upgrades on users' machines, since the Intranet client/server architecture facilitated all the updates through the connection with the web server [6].

Since Ford established its Intranet, it was aiming at building web applications through the initial analysis of "Mosaic", the early form of web browsers. The technical department at Ford used web languages to create the first web site in 1995. In 1996, the team started building applications making use of the unified "Netscape" browser that was deployed on all machines at the company, and working on a standard template to cut on the development life cycle. There was a substantial cut in training cost due to the user-friendly interface of web applications. Furthermore, the speed of development made vital applications available to different individuals across the company. For example, the B2B site allowed suppliers remote and secured access to various sections of Ford's Intranet. In addition, the development team created an application as a virtual teardown on Ford's website where Ford's engineers could examine parts of competitors' cars and evaluate any new technologies. The alternative would have been an actual trip to a physical location where Ford tears down cars to examine the parts.

Knowledge Management

While there are many definitions for knowledge, each company might adapt its own based on how it analysis data and information to acquire knowledge. The University of Kentucky, for example, defines knowledge as "a vital organization resource. It is the raw material, work-in process, and finished good of decision-making. Distinct types of knowledge used by decision makers include information, procedures, and heuristics, among others... " [7].

Organizations go through different activities to manage the amount of information they collect to form the knowledge base of the company. Activities include creating databases of best practices and market intelligence analysis, gathering filtering and classifying data, incorporating knowledge into business applications used by employees, and developing focal points for facilitating knowledge flow and building skills [8].

Ford was excited about the traffic it was receiving on the Web site and everyone was publishing all the material they have on desk on the Intranet. Nevertheless, there was a growing concern about the usability and usefulness of the material people were adding. As a result, Ford created a "Knowledge Domain Team" to build complete information in nine areas that were identified as vital to the business. The process Ford took was based on surveys and specialists input in how people perceive information, and what is considered vital and what is distracting in the structure of Ford's website. The aim behind the initiative was to reduce the time individuals spent in searching for information through proper indexing of the website content, and making sure that what was important could be accessed in due time, and what is trivial did not overwhelm the researcher with thousands of results.

Business Re-engineering

In the area of organization's re-engineering process innovation is the set of activities that achieve substantial business improvements. Companies seeking to benefit from process innovation go through the regime of identifying the processes, the factors for change, developing the vision, understanding the current process, and building a prototype for the new organization. History shows that organizations who define their processes properly will not have problems managing the issues and developing the change factors [9]. When introducing technology, business redesign is necessary. The industrial fields have been using Information Technology to remodel processes, control production, and manage material for generations. However, it is only recently that companies recognized that the fusion of IT and business would go beyond automation to fundamentally reshaping how business processes are undertaken [10].

When foreign companies were allowed to compete in the U.S. market, Ford understood that to succeed in business in a competitive arena it needed to implement strategies that competitors find difficult to imitate [11]. As a result, Ford bought Sweden Volvo to enter the European market, and partially owned Mazda to have a competitive edge with Japanese cars1 [12]. To achieve that it re-engineered its production development activities and global corporate organization and processes for dramatic cost reduction. Furthermore, it understood that expansion requires collaboration and alignment, and thus planned to establish the IT infrastructure through a WAN that connected all the offices. In the process of innovation and re-engineering, Ford has set policies to manage the cost of establishing the network, built models for continuous implementation, and organized global meetings to align all parties with the process. Adding to that, when it came to managing the website, Ford facilitated an awareness campaign for all the branches to understand that Ford is using the web to collaborate and research and adapting information technology as a way to maximize its business value. The goal for Ford was to maintain its leadership in the market and to do that in the most efficient and cost effective method that is there.

Supply chain management

Supply chain management (SCM) is about coordinating between suppliers, manufactures, distributors, retailers, and customers [13]. The basic idea that SCM applications revolve around is providing information to all those who are involved in making decisions about the product or goods to manage delivery from the supplier to the consumer [14]. Studies show that reducing errors in supply chain distribution, increases revenue, enhances productivity, and reduces the order-to-fulfillment period [15].

Ford often compared its supply chain process to that of Dell's, in an attempt to close the gaps in its own process and reach the level of success Dell has reached. The difference in the distribution model between Dell and Ford lies in the middle link of using retail shops. Since Ford cannot skip retail as a focal distribution point, it worked on establishing a network of retail shops that it owned. Ford made sure shops are not affecting each other in terms of sales, and gave them all a standard look and feel to establish itself in the consumer's market as a prestigious cars sales retail company. Furthermore, extensive re-engineering initiatives were undertaken to enhance Ford external network by eliminating the correlation with smaller suppliers. In that way, Ford made sure that key suppliers have access to forecasting data from customers' purchasing trends and production information to enable a faster order-to-delivery cycle. Ford vision was to create a model that allowed flexibility, predicable processes and delivered the product at the right time to the right consumer.

Conclusions

Ford is an example of how traditional organizations can mature to adapt what is current and maximizes the business value. The process that Ford went through necessitated the continuous support from management. In addition, it depended on alignment between those involved as a key for success. The correlation was not restricted to internal staff; it extended to cover competitors to reach mutual benefits, to work with suppliers to maintain similar grounds and adequate infrastructure, and to create training programs to educate all on the vision and organization's objectives.

Ford technical progress came at a time where the Internet was yet to reach its full potential. The introduction of Fiber-optic cables in the late 90's and the substantial increase in bandwidth would have helped Ford and cut on the cost in endured connecting its own offices. Furthermore, the ISP services that provided hosting servers were limited to only few players, which explained why Ford preferred to manage its own web server and maintain the overhead of the 24 hours uptime and backup.

From this case study, I understood the level of commitment large firms have to maintaining their position in the market. These companies know the revolving nature of business in the sense of how easy it is to fall back if they did not keep up with the change. The Ford process also shows the need for quick and resourceful thinking when faced with situations that might seem to be unfavorable. The way Ford ventured into the foreign market by acquiring local manufacturers was a strategic decision that did not only enabled Ford to merge with different technologies, but it also saved it the additional cost of establishing production centers in Japan and Europe.

Recommendations

Maintaining leadership in the market requires innovative organizations willing to reengineer to succeed. IT fusion with the business means restructuring and remodeling to understand the role IT would play to meet the business objectives Planning and modeling is vital when coordinating work with large teams. Constructing websites is not about content; it is about understanding what adds value and how humans interact with information. Knowledge management is a plan that companies need to develop as part of their initial business process modeling It is not wrong for large firms to try to adapt to successful processes implemented by other firms.
References

Robert D. Austin and Mark Cotteleer,"Ford Motor Co.: Maximizing the Business Value of Web Technologies." Harvard Business Publishing. July 10, 1997. harvardbusinessonline.hbsp.harvard.edu/b02/en/common/item_detail.jhtml;jsessionid=WDARNHINBSYKSAKRGWCB5VQBKE0YOISW?id=198006 (accessed July 30, 2008). Computer History Museum, Internet History 80's. 2006. computerhistory.org/internet_history/internet_history_80s.shtml (accessed July 30, 2008). Darren Wilksch and Peter Shoubridge, "IP Convergence in Global Telecommunications." Defense Science & Technology Organization. March 2001. http://www.dsto.defence.gov.au/publications/2400/DSTO-TR-1046.pdf (accessed July 30, 2008). Computer History Museum, Internet History 80's. H. Joseph Wen, "From client/server to intranet." Information Management & Computer Security (MCB UP Ltd) 6, no. 1 (1998): 15-20. R. Boutaba, K. El Guemioui, and P. Dini, "An outlook on intranet management." Communications Magazine (IEEE), October 1997: 92-99. Joseph M. Firestone, Enterprise Information Portals and Knowledge Management (OXFORD: Butterworth-Heinemann, 2002), 169. David J. Skyrme, "Knowledge management solutions - the IT contribution." ACM SIGGROUP Bulletin (ACM) 19, no. 1 (April 1998): 34 - 39, 34. Thomas H. Davenport, Process Innovation: Reengineering Work Through Information Technology (Watertown,MA: Harvard Business Press, 1993), 28. Thomas H. Davenport "The New Industrial Engineering: Information Technology and Business Process Redesign." Sloan Management Review 31, no. 4 (Summer 1990): 11-28, 12 Gary M. Erickson, Robert Jacobson, and Johny K. Johansson, "Competition for market share in the presence of strategic invisible assets: The US automobile market, 1971-1981." International Journal of Research in Marketing (Elsevier Science) 9, no. 1 (March 1992): 23-37, 23. Austin and Cotteleer, "Ford Motor " , 2. Henk A. Akkermans, et al. "The impact of ERP on supply chain management: Exploratory findings from a European Delphi study." European Journal of Operational Research 146 (2003): 284-301, 286 Thomas H. Davenport and Jeffrey D. Brooks, "Enterprise systems and the supply chain." Journal of Enterprise Information Management 17, no. 1 (2004): 8-19, 9. Kevin B. Hendricks, Vinod R. Singhal, and Jeff K. Stratman. "The impact of enterprise systems on corporate performance:A study of ERP, SCM, and CRM system implementations." Journal of Operations Management 25, no. 1 (January 2007): 65-82.

Ford Motor Company - Case Study

Sally Ahmed is a webmaster , web technology analyst, and a developer for more than 7 years. Earned the Certified Web Professionals title from the International Webmaster Association in 2001. Worked as a technical Internet instructor at New Horizons computer learning center. Worked in several companies where she developed and planned over 20 websites . Holds a Masters degree in web technologies from the University College of Denver, CO. Currently working as a web technology consultant and an E-commerce manager for several local companies.

mobile phone watches Ak Anne Klein Womens Automatic Watch Sale Joshua Sons Diamond Chronograph Cheap

Monday, June 25, 2012

Basic Configuration Tutorial For the Cisco ASA 5505 Firewall

The Cisco ASA 5505 Firewall is the smallest model in the new 5500 Cisco series of hardware appliances. Although this model is suitable for small businesses, branch offices or even home use, its firewall security capabilities are the same as the biggest models (5510, 5520, 5540 etc). The Adaptive Security technology of the ASA firewalls offers solid and reliable firewall protection, advanced application aware security, denial of service attack protection and much more. Moreover, the performance of the ASA 5505 appliance supports 150Mbps firewall throughput and 4000 firewall connections per second, which is more than enough for small networks.

In this article I will explain the basic configuration steps needed to setup a Cisco 5505 ASA firewall for connecting a small network to the Internet. We assume that our ISP has assigned us a static public IP address (e.g 200.200.200.1 as an example) and that our internal network range is 192.168.1.0/24. We will use Port Address Translation (PAT) to translate our internal IP addresses to the public address of the outside interface. The difference of the 5505 model from the bigger ASA models is that it has an 8-port 10/100 switch which acts as Layer 2 only. That is, you can not configure the physical ports as Layer 3 ports, rather you have to create interface Vlans and assign the Layer 2 interfaces in each VLAN. By default, interface Ethernet0/0 is assigned to VLAN 2 and it's the outside interface (the one which connects to the Internet), and the other 7 interfaces (Ethernet0/1 to 0/7) are assigned by default to VLAN 1 and are used for connecting to the internal network. Let's see the basic configuration setup of the most important steps that you need to configure.

Technology Update

Step1: Configure the internal interface vlan
------------------------------------------------------
ASA5505(config)# interface Vlan 1
ASA5505(config-if)# nameif inside
ASA5505(config-if)# security-level 100
ASA5505(config-if)# ip address 192.168.1.1 255.255.255.0
ASA5505(config-if)# no shut

Basic Configuration Tutorial For the Cisco ASA 5505 Firewall

Step 2: Configure the external interface vlan (connected to Internet)
-------------------------------------------------------------------------------------
ASA5505(config)# interface Vlan 2
ASA5505(config-if)# nameif outside
ASA5505(config-if)# security-level 0
ASA5505(config-if)# ip address 200.200.200.1 255.255.255.0
ASA5505(config-if)# no shut

Step 3: Assign Ethernet 0/0 to Vlan 2
-------------------------------------------------
ASA5505(config)# interface Ethernet0/0
ASA5505(config-if)# switchport access vlan 2
ASA5505(config-if)# no shut

Step 4: Enable the rest interfaces with no shut
--------------------------------------------------
ASA5505(config)# interface Ethernet0/1
ASA5505(config-if)# no shut

Do the same for Ethernet0/1 to 0/7.

Step 5: Configure PAT on the outside interface
-----------------------------------------------------
ASA5505(config)# global (outside) 1 interface
ASA5505(config)# nat (inside) 1 0.0.0.0 0.0.0.0

Step 6: Configure default route towards the ISP (assume default gateway is 200.200.200.2
---------------------------------------------------------------------------------------------------------
ASA5505(config)# route outside 0.0.0.0 0.0.0.0 200.200.200.2 1

The above steps are the absolutely necessary steps you need to configure for making the appliance operational. Of course there are much more configuration details that you need to implement in order to enhance the security and functionality of your appliance, such as Access Control Lists, Static NAT, DHCP, DMZ zones, authentication etc.

Visit my website in my resource box below for more information about Cisco products and solutions. You can also learn how to configure any Cisco ASA 5500 Firewall Here.

Basic Configuration Tutorial For the Cisco ASA 5505 Firewall

You can check out my website for more Cisco configuration examples and other related details about designing and implementing Cisco solutions: Cisco Tips and Tutorials.

watch cell phone Cheap Joshua Sons Mens Casino Sale Cheap Technomarine Diamond Chrono Sale

Saturday, June 23, 2012

Fitness 19

Back in 2003 two people who have been in the fitness field for years decided to start a gym where they felt gyms were lacking in some areas. The name of their gym is Fitness 19. Fitness 19 offers gym members some of the highest quality gym equipment there is out there today. Some of the equipment Fitness 19 offers helps enhance the individual's strength training, cardio, and weight development. If you are looking for a Fitness 19 gym near you, all you have to do is simply go to their website and type in your zip code in the small tool bar located at the far left of the page. If that doesn't work you can go to their website and look at their contact page. On their contact page you will find a phone number to reach a customer representative for the area you are living in. The Fitness 19 hours of working out, are very accommodating. They have a payment plan unlike most gyms many attend. Most gyms require the member to pay a fee upfront for a long term. However, the Fitness 19 hours of working out require you to pay as you go so you are not wasting your money on hours you are not actually working out. Also, the Fitness 19 hours of fun you will be having are not just for you to enjoy a nice work out, but also for your children to be occupied in one of the children's rooms. The children's rooms are very secure and safe, not to mention the children can meet other children to interact with and occupy their time as you are working out and doing something for you.

The gym also offers personal training packages which are ideal for any member whom wishes to join. Everyone has different problem areas, some cannot seem to lose their belly bulge, and others cannot seem to tone their calf muscles. Everyone has those areas which after a while of working out seems to stay in a rut. However, if you were to get a personal trainer they can help target those problem areas and you will see drastic changes in no time.

Technology Update

Another great feature the gym offers, is the fact that there sales team employees are not paid on a commission based salary. They are paid an hourly wage. I think that is one of the most refreshing features a company can offer, because when people are being paid based on commission they hound you and pressure you into either leaving the facility all together, or purchasing some dumb item that you regret, which later on down the road you will actually more than likely try to avoid all together.

Fitness 19

You can definitely tell that the owners of this company did their research and tried to fix the problem areas that many gym members in the past had issues with. They have already stuck around since 2003, when the economy belly flopped, and I'm sure they will stick it out for many more years to come.

Fitness 19

You can view the original article here: Fitness 19.

If you would like to read ongoing updates and news about Fitness 19, you can see that here: Fitness 19 News.

cell phone watches Akribos XXIV Skeleton Rose Gold Cheap Cheap Technomarine Diamond Chrono Sale

Tuesday, June 19, 2012

Top 5 - Best Cell Phone Companies Review

Our Top 5 list of Best Cell Phone Service Providers come from user feedback spreading multiple forums and websites and from personal experience. Nick has been a customer of 4 of the 5 major cell phone service providers (exception being US Cellular) pre- and post-merger of these companies (exception being the Verizon/Alltel merger). Nick is currently a satisfied customer with AT&T Wireless. Why so many? No, it wasn't to eventually create a review, but various reasons came into play - moving to college and service had no reception in that area, service reception just sucked, bad customer service, among many other reasons. Nick has used all 4 of the companies as both his cell and home phone. The areas that Nick has tried these cell phone companies are: California (mainly around San Diego, Los Angeles and Orange counties), Oregon, Illinois (including Chicago and suburbs), Indiana (in and around Indianapolis, West Lafayette, Bloomington, and South Bend), Minnesota, Georgia (only around Atlanta), and Rhode Island. Nick certainly understands the common complaints and praises. These are our Top 5 - Best Cell Phone Service Companies. Ridicule us, praise us, hate us, love us for our list.

Please note that there will always be exceptions to individual experiences.

Technology Update

We understand the needs of any one individual or family will differ. This is a quick summary of the costs of the 5 cell phone providers. In terms of the price of individual plans, the individual plan prices at all levels are exactly the same between Verizon Wireless, AT&T, and US Cellular (nationwide plan) with the exception being T-Mobile. US Cellular is by far the cheapest if choosing their "widearea" plan, which only caters to the 25-26 states that they cover. In terms of the price of basic family plans, the basic family plan prices at all levels are exactly the same between Verizon Wireless, AT&T, and US Cellular (again nationwide plan only) with the exception being T-Mobile. T-Mobile sells their family minute plans on different "minute" levels than the other 4, but on a per-minute cost, T-Mobile is the cheapest of all nationwide individual and family plans. All other companies are exactly the same in regards to the basic plan, not the plans with added features. The reason why some cell phone service providers are more "expensive" is because of the cost of adding these additional options/features.

Top 5 - Best Cell Phone Companies Review

5 (4b). Sprint Nextel

Pros:

* Night and weekends start at 7:00 PM, which is 2 hours earlier than the other cell phone service companies

* Free minutes on incoming calls

* 1-year contract as opposed to the standard 2-year contract (you decide if requiring any contract is a pro)

* Strong business-friendly features - 1st mover in walkie-talkie technology - a surprisingly useful function

* Fast internet

Cons:

* No international plans

* Coverage is not as expansive as Verizon Wireless or AT&T, which inevitably means weaker signals, more dropped calls, echoing, etc.

* Limited/outdated phone selection

* Since merger in 2005, plans are not as good a deal as pre-merger

* Post merger, customer service has dropped off as they try to be helpful - the end result should be good news for the customer, not a moot point for customer service

Personal experience: Sprint has always had a limited selection of phones, which to me, really didn't matter. However, as I started relying on my cell phone more and more, I started to care about the looks of my phone (the needs for certain functions remained the same). The phone selection is limited and in many cases seem outdated. From my experience with customer service, Sprint (Nextel) was actually #1 on my list pre-merger in 2005, but it has dropped since then. The customer service pre-merger was excellent - consistent bills from month to month, credits on bogus charges I disputed, and free "loyalty program offers" such as free internet for 6 months. Since the merger in 2005, the customer service still tries to be very helpful, but it gets to the point where you want to start yelling through your phone because of the frustration. Sprint's coverage will be hit or miss if you travel, however, if you're just going to the city for work and going back home to the suburbs, the service will stay consistent for the most part. There is nothing about the cost or the types of plans of Sprint Nextel that really stands out with the exception being international plans. Besides that, the plans offer the usual variety and benefits to meet your need.

4 (4a). US Cellular

Pros:

* Good customer service

* Excellent coverage in the midwest as they should since they are a regional carrier

* Free incoming calls/text messages

* No activation fees on many plans

Cons:

* Poor coverage outside of the 25-26 states that US Cellular covers

* Very limited phone selection; durability of phones offered a concern

* Beware of hidden costs

* Add-ons such as unlimited texting, downloading, etc can add up quickly

* Limited/outdated phone selection

* If downgrading plan, be absolutely sure of your minute usage; they are not helpful in providing advice, but quick to provide recommendations

* If you go over your minutes, get ready to pay big time

The majority of US Cellular's customer base is satisfied by its customer service. The biggest complaint is in the limited selection and durability of the phones. The individual and family nationwide service plans are exactly the same as the others with the exception being T-Mobile. If you live outside of the 25-26 states that US Cellular covers or travel frequently, then choose another cell phone service provider. However, if you live within those states that are covered, US Cellular should be considered as long as you don't mind the phones and/or seemingly unknown brand (outside of the midwest and sports world - White Sox).

3. T-Mobile

Pros:

* Cheapest basic individual and basic family plans out of the 5 cell phone service providers

* myFaves add-on is popular and useful

* 1-year contract as opposed to the standard 2-year contract (you decide if requiring any contract is a pro)

* Lots of different plans and options - most flexible of the 5 cell phone providers and 2nd best offering of plans and options (Verizon is #1 in our opinion)

* Excellent reception in certain populated cities

* Ease of upgrading/downgrading plans - a breeze with great advice and recommendations from customer service, but...

Cons:

* Poor customer service (especially disputes) - worst of the 5 cell phone service providers

* Limited phone selection, tends to sell outdated and even worse, phones that are no longer in production/discontinued

* Inconsistent signal reception/spotty coverage

* Poor insurance policy

* Slow internet

* Pesky about "too much roaming"

Personal experience: I've had a unique love-hate relationship with T-Mobile. The love comes in with the "contract" and the hate comes in with the customer service. I have to start with the "hate" before I go into the "love". After a year and a few months into the service with T-Mobile, like all cell phone providers, I eventually had to call customer service to dispute charges. To put it simply, a complete nightmare. I won't go into the specifics of the dispute, but the way T-Mobile handled the situation from several customer service reps to a couple supervisors was the worst 5-hour nightmare. Yes, I was on the phone for 5 hours getting bounced from department to department, having to explain the dispute over and over again, and had to to take a 1/2 day from work. I started the call at 7:30AM, you do the math. Conclusion of the 5 hour nightmare? I ended up paying the full amount with no leeway given. Even with the energy drinks, steroid shots, power bars, and the like, I couldn't hold up any longer and they would not budge or give anything back that was rightfully owed to me. T-Mobile is great at handling simple customer service requests like upgrading/downgrading a plan or asking simple questions like, do you think I should add the fave-5 plan? They'll actually go through your bills and review your usage and give you great advice and recommendations, but other than that, they have the worst overall customer service of the 5 cell phone service companies when it comes to disputes or anything to do with questioning T-Mobile and their bills. In another instance of "hate", I was experiencing several dropped calls per day and spotty coverage throughout Illinois (specifically Northern suburbs and Chicago). It was extremely frustrating and it got to the point where I called customer service and canceled without hesitation. But Nick, you say, what about the cancellation fee? That's where the "love" comes in, apparently when I signed up for the family plan, we were never obligated to a contract. So all this time, I thought I was under contract and I could've switched at anytime. The reason why T-Mobile barely outranks Sprint Nextel and US Cellular is because of their flexibility and options in their plans, cheapest plan options, better phone selection, although still limited, and more consistent coverage than the last two companies with very good signals in populated areas compared to the two.

2. AT&T

Pros:

* Consistent coverage and reception - closing the gap with Verizon Wireless

* Wide selection of phones - arguably the best selection thanks to the Apple iPhone

* Overall good customer service that helps you and/or resolves issues

* Internet is fast and reliable

* Out of all the phone company mergers, AT&T/Cingular was the biggest improvement

* Rollover minutes is an extremely useful feature/benefit that no other company offers - this is standard on all plans

Cons:

* Dropped calls is hit or miss

* Customer service is absolutely a joy when you are a customer or activating lines/transferring numbers, etc, etc, however, once you become a customer, they are helpful, but they get impatient

* Ever since the merger, extra services/add-ons have increased (compared to just Cingular), which leads to costs piling up quickly

Personal experience: As a current customer of AT&T Wireless, I am satisfied. AT&T Wireless has had the biggest improvements of all the mergers. Their customer service is still lacking compared to Verizon especially once you become a customer, but I have noticed improvements since the merger. Their phone selection is arguably the best. The coverage and reception has been consistent in all the areas I've been to. Although I rarely experience dropped calls, this seems to be a hit or miss issue with others. The one thing that really stands out from the rest of the companies is the rollover minutes. This has saved me lots of money in the long run because a plan I used to have with the other carriers allows me to downgrade due to the extra minutes thus saving me money.

1. Verizon Wireless

Pros:

* Widest variety of plans and options available than any other cell phone company

* Consistent coverage and reception - considered the best, but AT&T is closing the gap

* Wide selection of phones

* Customer service is the most consistent of all the cell phone companies although there are inevitable hit or miss days

Cons:

* Need to keep an eye on your monthly bills - mysterious charges showing up on bills

* Customer service is hit or miss, some days you get great, no, extremely great service, other days you want to reach into your phone and do bad things

* Add-ons can pile up quickly especially the data plans for smartphones

* Most expensive of the 5 cell phone companies (factoring in phones, plans, add-ons, deposit, etc)

* Blocks certain features on your phone, ex: transferring photos to/from your phone requires purchase of software and certain bluetooth features

* If upgrading/downgrading plan, they will extend contract for another 2 years

Personal experience: I have not experienced the "new Verzion" with Alltel, but as much as I hate to admit (being a current and satisfied AT&T customer), Verizon Wireless is the most consistent from customer service to coverage and reception and down to phone selection. One shining customer service moment was when I accidentally dropped my phone in a puddle of water completely ruining my phone. I did not have insurance, as a matter of fact, I never purchase insurance on phones, but after an hour or two of sweet talking, they not only replaced the phone, but rushed the order to me free of charge with next day delivery. An example of a bad customer service is refusing to budge on mysterious charges (over .00) worth that they said would be removed, but never did. I ended up changing services because of this dispute. It took over one year until a collection agency contacted me out-of-the-blue saying I still owed .00 and as one can imagine, my credit score dropped like a ton of bricks.

There you have it, our list of the Top 5 Best Cell Phone Service Companies. We would love to hear your thoughts so feel free to comment on this list. Ridicule us, praise us, hate us, love us for our list. Got topics/categories you'd like topped? Give us a shout through the comments or contact us.

Top 5 - Best Cell Phone Companies Review

You may use parts of this review for your own site or blog as long as you link back to http://www.everythingtopped.com

Nicholas Shin is a Marketing Manager by day, and a review/list creator by night. He focuses on reviews and creating lists by doing research and testing products. He also likes to create lists that are purely for entertainment purposes. As he continues to do hours and hours of research random products and services, he decided to start a website based on his own personal research. The purpose is for the site to become a resourceful solution by providing reliable reviews with the utmost integrity. He finds pleasure in researching and sharing his knowledge with others in hopes that you won't have to spend as much time as he has researching. With that, the site was launched in January of 2009. You can visit the site at http://www.everythingtopped.com

mobile phone watches Joshua Sons Mens Unisex Cheap Cheap Joshua Sons Mens Casino Sale

Saturday, June 16, 2012

How to Get Rid of Trojan Virus - 5 Easy Steps to Get Rid of Trojan Horse Virus

Before we can know how to get rid of trojan virus we need to specify exactly what it is and how it differs from a normal computer virus. A trojan horse virus is a form of malware (malicious software) that leaves your computer open to attack, and derives its name from the famous Greek legend of The Trojan Horse.

The Trojan Horse was used by the ancient Greeks to trick their way into the once impregnable city of the Trojans (Troy) and secretly send in soldiers to open the gates and allow the rest of the Greek army in to take over and conquer the city.

Technology Update

In the same way, computer trojan viruses disguise themselves as seemingly harmless pieces of software or desired files, but then "open the gates" to other forms of malicious software, spyware, keyloggers etc...leaving you open to anything from someone stealing your credit card information, to some basement-dwelling geek gaining remote access to your computer and files. So the trojan virus' real damage is done in its ability to compromise your computer's security and leave it open to other dangers.

How to Get Rid of Trojan Virus - 5 Easy Steps to Get Rid of Trojan Horse Virus

So while a normal computer virus is lethal in itself and can "mutate" and infect other parts of your system, the trojan allows other digital nasties in through the back door. The good news is that this makes it easier to identify and get rid of trojan virus.

How did you get the trojan virus on your computer?

As mentioned above, the trojan virus is often disguised as a normal looking file, so maybe it was an mp3 music file, a patch for a game, an online video, or even a jpeg image file. Either way, it's on your computer, so how do you get rid of trojan horse virus?

Here are the 5 things you need to do right now to get rid of trojan horse virus and avoid it returning:

1. Make sure your anti-virus software is up-to-date and includes all the latest patches and virus, spyware definitions. This will be your first port of call when trying to get rid of trojan virus.

2. Run a system and registry scan to identify the evil trojan virus and then zap it into oblivion to get rid of it. Since it resides within an unimportant file you can easily delete it to get rid of trojan virus - whereas other computer viruses are more tricky to get rid of and need to be "quarantined" to stop them infecting other files on your system.

3. If you know the name of the trojan horse virus then you can check online for information on how to get rid of the trojan virus in question. Microsoft has regular updates on it's site about trojan viruses that affect Windows machines. Online forums also provide you a wealth of information about how to get rid of a trojan horse virus.

4. You could also try to get rid of the trojan virus manually. Check your Task Manager (press Ctrl +Alt +Del on Windows) to identify any programs that may be running in the background that shouldn't be - i.e. they started without your knowledge. If you see any such program, make a note of it's name, click its name to highlight it and click End Task. Open your Control Panel (click the Start menu) and use the Add/Remove programs to find the nasty blighter in question and get rid of it. Be careful with this though as you may end up wrongly deleting a file that is important to your system.

5. Overall you should take a look at your online habits and see how certain actions may compromise the security of your computer and your personal information. If you use Peer-2-Peer (P2P) file-sharing networks then take extra care on what you download, and make sure everything is run through your anti-virus / spyware scanning software first, to get rid of trojan virus that may be attempting to access your system.

How many of your personal details do you enter on your computer on a regular basis? For instance, do you bank online, or pay bills or a credit card? Perhaps you buy gifts and other purchases online? According to CNN, if you use the internet there is a 90% chance that your computer is infected with spyware. How can you be sure that your information is not being viewed by a third party right now?

How to Get Rid of Trojan Virus - 5 Easy Steps to Get Rid of Trojan Horse Virus

How many of your personal details do you enter on your computer on a regular basis? For instance, do you bank online, or pay bills or a credit card? Perhaps you buy gifts and other purchases online? According to CNN, if you use the internet there is a 90% chance that your computer is infected with spyware. How can you be sure that your information is not being viewed by a third party right now?

Put your mind at rest and perform a FREE scan here How To Get Rid Of Trojan Virus.

watch cell phone Joshua Sons Chronograph Sport Cheap Joshua Sons Men S Automatic Cheap Joshua Sons Dual-Time Watch Cheap

Wednesday, June 13, 2012

Intranet

Introduction to Intranets

What exactly is an intranet? It's one of those terms that's more thrown around than understood, and has become more of a buzzword than a commonly understood idea. Simply put, an intranet is a private network with Internet technology used as the underlying architecture. An intranet is built using the Internet's TCP/IP protocols for communications. TCP/IP protocols can be run on many hardware platforms and cabling schemes. The underlying hardware is not what makes an intranet-it's the software protocols that matter.

Technology Update

Intranets can co-exist with other local area networking technology. In many companies, existing "legacy systems" including mainframes, Novell networks, minicomputers, and various databases, are being integrated into an intranet. A wide variety of tools allow this to happen. Common Gateway Interface (CGI) scripting is often used to access legacy databases from an intranet. The Java programming language can be used to access legacy databases as well.

Intranet

With the enormous growth of the Internet, an increasing number of people in corporations use the Internet for communicating with the outside world, for gathering information, and for doing business. It didn't take long for people to recognize that the components that worked so well on the Internet could be equally valuable internally and that is why intranets are becoming so popular. Some corporations do not have TCP/IP networks, the protocol required to access the resources of the Internet. Creating an intranet in which all the information and resources can be used seamlessly has many benefits. TCP/IP-based networks make it easy for people to access the network remotely, such as from home or while traveling. Dialing into an intranet in this way is much like connecting to the Internet, except that you're connecting to a private network instead of to a public Internet provider. Interoperability between networks is another substantial bonus.

Security systems separate an intranet from the Internet. A company's intranet is protected by firewalls-hardware and software combinations that allow only certain people to access the intranet for specific purposes.

Intranets can be used for anything that existing networks are used for-and more. The ease of publishing information on the World Wide Web has made them popular places for posting corporate information such as company news or company procedures. Corporate databases with easy-to-build front-ends use the Web and programming languages such as Java.

Intranets allow people to work together more easily and more effectively. Software known as groupware is another important part of intranets. It allows people to collaborate on projects; to share information; to do videoconferencing; and to establish secure procedures for production work. Free server and client software and the multitude of services, like newsgroups, stimulated the Internet's growth. The consequence of that growth stimulated and fueled the growth of intranets. The ease with which information can be shared, and with which people can communicate with one another will continue to drive the building of intranets.

A Global View of an Intranet

An intranet is a private corporate or educational network that uses the Internet's TCP/IP protocols for its underlying transport. The protocols can run on a variety of network hardware, and can also co-exist with other network protocols, such as IPX. People from inside an intranet can get at the larger Internet resources, but those on the Internet cannot get into the intranet, which allows only restricted access from the Internet.

Videoconferencing is an important application that requires sending massive quantities of data. Intranets can be built using components that allow the extremely high bandwidths required for transferring such information. Often an intranet is composed of a number of different networks inside a corporation that all communicate with one another via TCP/IP. These separate networks are often referred to as subnets. Software that allows people to communicate with each other via e-mail and public message boards and to collaborate on work using workgroup software is among the most powerful intranet programs. Applications that allow different corporate departments to post information, and for people to fill out corporate forms, such as time sheets, and for tapping into corporate financial information are very popular. Much of the software used on intranets is standard, off-the-shelf Internet software such as the Netscape Navigator and the Microsoft Explorer Web browsers. And customized programs are often built, using the Java programming language and CGI scripting. Intranets can also be used to allow companies to do business-to-business transactions, such as ordering parts, sending invoices, and making payments. For extra security, these intranet-to-intranet transactions need never go out over the public Internet, but can travel over private leased lines instead. Intranets are a powerful system for allowing a company to do business online, for example, to allow anyone on the Internet to order products. When someone orders a product on the Internet, information is sent in a secure manner from the public Internet to the company's intranet, where the order is processed and completed. In order to protect sensitive corporate information, and to ensure that hackers don't damage computer systems and data, security barriers called firewalls protect an intranet from the Internet. Firewall technology uses a combination of routers, servers and other hardware and software to allow people on an intranet to use Internet resources, but blocks outsiders from getting into the intranet. Many intranets have to connect to "legacy systems"-hardware and databases that were built before an intranet was constructed. Legacy systems often use older technology not based on the intranet's TPC/IP protocols. There are a variety of ways in which intranets can tie to legacy systems. A common way is to use CGI scripts to access the database information and pour that data into HTML formatted text, making it available to a Web browser. Information sent across an intranet is sent to the proper destination by routers, which examine each TCP/IP packet for the IP address and determine the packet's destination. It then sends the packet to the next router closest to the destination. If the packet is to be delivered to an address on the same subnetwork of the intranet it was sent from, the packet may be able to be delivered directly without having to go through any other routers. If it is to be sent to another subnetwork on the intranet, it will be sent to another internal router address. If the packet is to be sent to a destination outside the intranet-in other words, to an Internet destination-the packet is sent to a router that connects to the Internet

How TCP/IP and IPX Work on Intranets

What distinguishes an intranet from any other kind of private network is that it is based on TCP/IP-the same protocols that apply to the Internet. TCP/IP refers to two protocols that work together to deliver data: the Transmission Control Protocol (TCP) and the Internet Protocol (IP). When you send information across an intranet, the data is broken into small packets. The packets are sent independently through a series of switches called routers. Once all the packets arrive at their destination, they are recombined into their original form. The Transmission Control Protocol breaks the data into packets and recombines them on the receiving end. The Internet Protocol handles the routing of the data and makes sure it gets sent to the proper destination.

In some companies, there may be a mix of TCP/IP-based intranets and networks based on other networking technology, such as NetWare. In that instance, the TCP/IP technology of an intranet can be used to send data between NetWare or other networks, using a technique called IP tunneling. In this instance, we'll look at data being sent from one NetWare network to another, via an intranet. NetWare networks use the IPX (Internet Packet Exchange) protocol as a way to deliver data-and TCP/IP networks can't recognize that protocol. To get around this, when an IPX packet is to be sent across an intranet, it is first encapsulated inside an IP packet by a NetWare server specifically for and dedicated to providing the IP transport mechanism for IPX packets. Data sent within an intranet must be broken up into packets of less than 1,500 characters each. TCP breaks the data into packets. As it creates each packet, it calculates and adds a checksum to the packet. The checksum is based on the byte values, that is, the precise amount of data in the packet. Each packet, along with the checksum, is put into separate IP wrappers or "envelopes." These wrappers contain information that details exactly where on the intranet-or the Internet-the data is to be sent. All of the wrappers for a given piece of data have the same addressing information so that they can all be sent to the same location for reassembly. The packets travel between networks by intranet routers. Routers examine all IP wrappers and look at their addresses. These routers determine the most efficient path for sending each packet to its final destination. Since the traffic load on an intranet often changes, the packets may be sent along different routes, and the packets may arrive out of order. If the router sees the address is one located inside the intranet, the packet may be sent directly to its destination, or it may instead be sent to another router. If the address is located out on the Internet, it will be sent to another router so it can be sent across the Internet. As the packets arrive at their destination, TCP calculates a checksum for each packet. It then compares this checksum with the checksum that has been sent in the packet. If the checksums don't match, TCP knows that the data in the packet has been corrupted during transmission. It then discards the packet and asks that the original packet be retransmitted. TCP includes the ability to check packets and to determine that all the packets have been received. When all the non-corrupt packets are received, TCP assembles them into their original, unified form. The header information of the packets relays the sequence of how to reassemble the packets. An intranet treats the IP packet as it would any other, and routes the packet to the receiving NetWare network. On the receiving NetWare network, a NetWare TCP/IP server decapsulates the IP packet-it discards the IP packet, and reads the original IPX packet. It can now use the IPX protocol to deliver the data to the proper destination.

How the OSI Model Works

A group called the International Standards Organization (ISO) has put together the Open Systems Interconnect (OSI) Reference Model, which is a model that describes seven layers of protocols for computer communications. These layers don't know or care what is on adjacent layers. Each layer, essentially, only sees the reciprocal layer on the other side. The sending application layer sees and talks to the application layer on the destination side. That conversation takes place irrespective of, for example, what structure exists at the physical layer, such as Ethernet or Token Ring. TCP combines the OSI model's application, presentation, and session layers into one which is also called the application layer.

The application layer refers to application interfaces, not programs like word processing. MHS (Message Handling Service) is such an interface and it operates at this level of the OSI model. Again, this segmentation and interface approach means that a variety of email programs can be used on an intranet so long as they conform to the MHS standard at this application interface level. The presentation layer typically simply provides a standard interface between the application layer and the network layers. This type of segmentation allows for the great flexibility of the OSI model since applications can vary endlessly, but, as long as the results conform to this standard interface, the applications need not be concerned with any of the other layers. The session layer allows for the communication between sender and destination. These conversations avoid confusion by speaking in turn. A token is passed to control and to indicate which side is allowed to speak. This layer executes transactions, like saving a file. If something prevents it from completing the save, the session layer, which has a record of the original state, returns to the original state rather than allowing a corrupt or incomplete transaction to occur. The transport layer segments the data into acceptable packet sizes and is responsible for data integrity of packet segments. There are several levels of service that can be implemented at this layer, including segmenting and reassembly, error recovery, flow control, and others. The IP wrapper is put around the packet at the network or Internet layer. The header includes the source and destination addresses, the sequence order, and other data necessary for correct routing and rebuilding at the destination. The data-link layer frames the packets-for example, for use with the PPP (Point to Point). It also includes the logical link portion of the MAC sublayer of the IEEE 802.2, 802.3 and other standards. Ethernet and Token Ring are the two most common physical layer protocols. They function at the MAC (Media Access Control) level and move the data over the cables based on the physical address on each NIC (Network Interface Card). The physical layer includes the physical components of the IEEE 802.3 and other specifications.

How TCP/IP Packets Are Processed

Protocols such as TCP/IP determine how computers communicate with each other over networks such as the Internet. These protocols work in concert with each other, and are layered on top of one another in what is commonly referred to as a protocol stack. Each layer of the protocol is designed to accomplish a specific purpose on both the sending and receiving computers. The TCP stack combines the application, presentation, and the session layers into a single layer also called the application layer. Other than that change, it follows the OSI model. The illustration below shows the wrapping process that occurs to transmit data.

The TCP application layer formats the data being sent so that the layer below it, the transport layer, can send the data. The TCP application layer performs the equivalent actions that the top three layers of OSI perform: the application, presentation, and session layers. The next layer down is the transport layer, which is responsible for transferring the data, and ensures that the data sent and the data received are in fact the same data-in other words, that there have been no errors introduced during the sending of the data. TCP divides the data it gets from the application layer into segments. It attaches a header to each segment. The header contains information that will be used on the receiving end to ensure that the data hasn't been altered en route, and that the segments can be properly recombined into their original form. The third layer prepares the data for delivery by putting them into IP datagrams, and determining the proper Internet address for those datagrams. The IP protocol works in the Internet layer, also called the network layer. It puts an IP wrapper with a header onto each segment. The IP header includes information such as the IP address of the sending and receiving computers, and the length of the datagram, and the sequence order of the datagram. The sequence order is added because the datagram could conceivably exceed the size allowed for network packets, and so would need to be broken into smaller packets. Including the sequence order will allow them to be recombined properly. The Internet layer checks the IP header and checks to see whether the packet is a fragment. If it is, it puts together fragments back into the original datagram. It strips off the IP header, and then sends the datagram to the transport layer. The transport layer looks at the remaining header to decide which application layer protocol-TCP or UDP-should get the data. Then the proper protocol strips off the header and sends the data to the receiving application. The application layer gets the data and performs, in this case, an HTTP request. The next layer down, the data link layer, uses protocols such as the Point-to-Point Protocol (PPP) to put the IP datagram into a frame. This is done by putting a header-the third header, after the TCP header and the IP header-and a footer around the IP datagram to fra-me it. Included in the frame header is a CRC check that checks for errors in the data as the data travels over the network. The data-link layer ensures that the CRC for the frame is right, and that the data hasn't been altered while it was sent. It strips off the frame header and the CRC, and sends the frame to the Internet layer. On the receiving computer, the packet travels through the stack, but in the opposite order from which the packet was created. In other words, it starts at the bottom layer, and moves its way up through the protocol stack. As it moves up, each layer strips off the header information that was added by the TCP/IP stack of the sending computer. The final layer is the physical network layer, which specifies the physical characteristics of the network being used to send data. It describes the actual hardware standards, such as the Ethernet specification. The layer receives the frames from the data link layer, and translates the IP addresses there into the hardware addresses required for the specific network being used. Finally, the layer sends the frame over the network. The physical network layer receives the packet. It translates the hardware address of the sender and receiver into IP addresses. Then it sends the frame up to the data link layer.

How Bridges Work

Bridges are hardware and software combinations that connect different parts of a single network, such as different sections of an intranet. They connect local area networks (LANs) to each other. They are generally not used, however, for connecting entire networks to each other, for example, for connecting an intranet to the Internet, or an intranet to an intranet, or to connect an entire subnetwork to an entire subnetwork. To do that, more sophisticated pieces of technology called routers are used.

When there is a great amount of traffic on an Ethernet local area network, packets can collide with one another, reducing the efficiency of the network, and slowing down network traffic. Packets can collide because so much of the traffic is routed among all the workstations on the network. In order to cut down on the collision rate, a single LAN can be subdivided into two or more LANs. For example, a single LAN can be subdivided into several departmental LANs. Most of the traffic in each departmental LAN stays within the department LAN, and so it needn't travel through all the workstations on all the LANs on the network. In this way, collisions are reduced. Bridges are used to link the LANs. The only traffic that needs to travel across bridges is traffic bound for another LAN. Any traffic within the LAN need not travel across a bridge. Each packet of data on an intranet has more information in it than just the IP information. It also includes addressing information required for other underlying network architecture, such as for an Ethernet network. Bridges look at this outer network addressing information and deliver the packet to the proper address on a LAN Bridges consult a learning table that has the addresses of all the network nodes in it. If a bridge finds that a packet belongs on its own LAN, it keeps the packet inside the LAN. If it finds that the workstation is on another LAN, it forwards the packet. The bridge constantly updates the learning table as it monitors and routes traffic. Bridges can connect LANs in a variety of different ways. They can connect LANs using serial connections over traditional phone lines and modems, over ISDN lines, and over direct cable connections. CSU/DSU units are used to connect bridges to telephone lines for remote connectivity. Bridges and routers are sometimes combined into a single product called a brouter. A brouter handles both bridging and routing tasks. If the data needs to be sent only to another LAN on the network or subnetwork, it will act only as a bridge delivering the data based on the Ethernet address. If the destination is another network entirely, it will act as a router, examining the IP packets and routing the data based on the IP address.

How Intranet Routers Work

Just as routers direct traffic on the Internet, sending information to its proper destination, and routers on an intranet perform the same function. Routers-equipment that is a combination of hardware and software-can send the data to a computer on the same sub network inside the intranet, to another network on the intranet, or outside to the Internet. They do this by examining header information in IP packets, and then sending the data on its way. Typically, a router will send the packet to the next router closest to the final destination, which in turn sends it to an even closer router, and so on, until the data reaches its intended recipient.

A router has input ports for receiving IP packets, and output ports for sending those packets toward their destination. When a packet comes to the input port, the router examines the packet header, and checks the destination in it against a routing table-a database that tells the router how to send packets to various destinations. Based on the information in the routing table, the packet is sent to a particular output port, which sends the packet to the next closest router to the packet's destination. If packets come to the input port more quickly than the router can process them, they are sent to a holding area called an input queue. The router then processes packets from the queue in the order they were received. If the number of packets received exceeds the capacity of the queue (called the length of the queue), packets may be lost. When this happens, the TCP protocol on the sending and receiving computers will have the packets re-sent. In a simple intranet that is a single, completely self-contained network, and in which there are no connections to any other network or the intranet, only minimal routing need be done, and so the routing table in the router is exceedingly simple with very few entries, and is constructed automatically by a program called ifconfig. In a slightly more complicated intranet which is composed of a number of TCP/IP-based networks, and connects to a limited number of TCP/IP-based networks, static routing will be required. In static routing, the routing table has specific ways of routing data to other networks. Only those pathways can be used. Intranet administrators can add routes to the routing table. Static routing is more flexible than minimal routing, but it can't change routes as network traffic changes, and so isn't suitable for many intranets. In more complex intranets, dynamic routing will be required. Dynamic routing is used to permit multiple routes for a packet to reach its final destination. Dynamic routing also allows routers to change the way they route information based on the amount of network traffic on some paths and routers. In dynamic routing, the routing table is called a dynamic routing table and changes as network conditions change. The tables are built dynamically by routing protocols, and so constantly change according to network traffic and conditions. There are two broad types of routing protocols: interior and exterior. Interior routing protocols are typically used on internal routers inside an intranet that routes traffic bound only for inside the intranet. A common interior routing protocol is the Routing Information Protocol (RIP). Exterior protocols are typically used for external routers on the Internet. AÊcommon exterior protocol is the Exterior Gateway Protocol (EGP).

Intranets come in different sizes. In a small company, an intranet can be composed of only a handful of computers. In a medium-sized business, it may include dozens or hundreds of computers. And in a large corporation, there may be thousands of computers spread across the globe, all connected to a single intranet. When intranets get large, they need to be subdivided into individual subnets or subnetworks.

To understand how subnetting works, you first need to understand IP addresses. Every IP address is a 32-bit numeric address that uniquely identifies a network and then a specific host on that network. The IP address is divided into two sections: the network section, called the netid, and the host section, called the hostid.

Each 32-bit IP address is handled differently, according to what class of network the address refers to. There are three main classes of network addresses: Class A, Class B, and Class C. In some classes, more of the 32-bit address space is devoted to the netid, while in others, more of the address space is devoted to the hostid. In a Class A network, the netid is composed of 8 bits, while the hostid is composed of 24 bits. In a Class B network, both the netid and the hostid are composed of 16 bits. In a Class C network, the netid is composed of 24 bits, while the hostid is composed of 8 bits. There's a simple way of knowing what class a network is in. If the first number of the IP address is less than 128, the network is a Class A address. If the first number is from 128 to 191, it's a Class B network. If the first number is from 192 to 223, it's a Class C network. Numbers above 223 are reserved for other purposes. The smaller the netid, the fewer number of networks that can be subnetted, but the larger number of hosts on the network. A Class A rating is best for large networks while a Class C is best for small ones.

To create a subnet, the demarcation line on the IP address is moved between the netid and the hostid, to give the netid more bits to work with and to take away bits from the hostid. To do this, a special number called a subnet mask is used.

Subnetting is used when intranets grow over a certain size and they begin to have problems. One problem is management of host IP addresses-making sure that every computer on the network has a proper, up-to-date host address, and that old host addresses are put out of use until needed in the future. In a corporation spread out over several locations-or across the world-it's difficult, if not impossible, to have one person responsible for managing the host addresses at every location and department in the company.

Another problem has to do with a variety of hardware limitations of networks. Dissimilar networks may all be part of an intranet. An intranet may have some sections that are Ethernet, other sections that are Token Ring networks, and conceivably other sections that use different networking technologies altogether. There is no easy way for an intranet router to link these dissimilar networks together and route the information to the proper places.

Another set of problems has to do with the physical limitations of network technology. In some kinds of networks, there are some strict limitations on how far cables can extend in the network. In other words, you can't go over a certain distance of cabling without using repeaters or routers. A "thick" Ethernet cable, for example, can only be extended to 500 meters, while a "thin" Ethernet cable can only go to 300 meters. Routers can be used to link these cables together, so that an intranet can be extended well beyond those distances. But when that is done, each length of wire is essentially considered its own subnetwork.

Yet one more set of problems has to do with the volume of traffic that travels across an intranet. Often in a corporation, in a given department, most of the traffic is intradepartmental traffic-in other words, mail and other data that people within a department send to each another. The volume of traffic outside to other departments is considerably less. What's called for is a way to confine intradepartmental traffic inside the departments, to cut down on the amount of data that needs to be routed and managed across the entire intranet.

Subnetting solves all these problems and more. When an intranet is divided into subnets, one central administrator doesn't have to manage every aspect of the entire intranet. Instead, each subnet can take care of its own administration. That means smaller organizations within the larger organization can take care of problems such as address management and a variety of troubleshooting chores. If an intranet is subnetted by divisions or departments, it means that each division or department can guide the development of its own network, while adhering to general intranet architecture. Doing this allows departments or divisions more freedom to use technology to pursue their business goals.

Subnets also get around problems that arise when an intranet has within it different kinds of network architecture, such as Ethernet and Token Ring technologies. Normally-if there is no subnetting-a router can't link these different networks together because they don't have their own addresses. However, if each of the different networks is its own subnet-and so has its own network address-routers can then link them together and properly route intranet traffic.

Subnetting can also cut down on the traffic traveling across the intranet and its routers. Since much network traffic may be confined within departments, having each department be its own subnet means that all that traffic need never cross an intranet router and cross the intranet-it will stay within its own subnet.

Subnetting can also increase the security on an intranet. If the payroll department, for example, were on its own subnet, then much of its traffic would not have to travel across an intranet. Having its data traveling across the intranet could mean that someone could conceivably hack into the data to read it. Confining the data to its own subnet makes that much less likely to happen.

Dividing an intranet into subnets can also make the entire intranet more stable. If an intranet is divided in this way, then if one subnet goes down or is often unstable, it won't affect the rest of the intranet.

This all may sound rather confusing. To see how it's done, let's take a look at a network, and see how to use the IP address to create subnets. Let's say we have a Class B network. That network is assigned the address of 130.97.0.0. When a network is given an address, it is assigned the netid numbers-in this case, the 130.97-and it can assign the host numbers (in this case, 0.0) in any way that it chooses.

The 130.97.0.0 network is a single intranet. It's getting too large to manage, though, and we've decided to divide it into two subnets. What we do is fairly straightforward. We take a number from the hostid field and use it to identify each of the subnets. So one subnet gets the address 130.97.1.0, and the other gets the address 130.97.2.0. Individual machines on the first subnet get addresses of 130.97.1.1, 130.97.1.2, and so on. Individual machines on the second subnet get addresses of 130.97.2.1, 130.97.2.2 and so on.

Sounds simple. But we have a problem. The Internet doesn't recognize 130.97.1.0 and 130.97.2.0 as separate networks. It treats them both as 130.97.0.0 since the "1" and "2" that we're using as a netid is only known to the Internet as a hostid. So our intranet router will not be able to route incoming traffic to the proper network.

To solve the problem, a subnet mask is used. A subnet mask is a 32-bit number in IP form used by intranet routers and hosts that will help routers understand how to route information to the proper subnet. To the outside Internet, there is still only one network, but the subnet mask allows routers inside the intranet to send traffic to the proper host.

A subnet mask is a number such as 255.255.255.0 (the built-in default for Class C addresses; the Class B default is 255.255.0.0 and the default for Class A is 255.0.0.0). A router takes the subnet mask and applies that number against the IP number of incoming mail to the network by using it to perform a calculation. Based on the resulting IP number, it will route mail to the proper subnet, and then to a particular computer on the subnet. For consistency, everyone in a particular intranet will use the same subnet mask.

Subnetting an Intranet

When intranets are over a certain size, or are spread over several geographical locations, it becomes difficult to manage them as a single network. To solve the problem, the single intranet can be subdivided into several subnets, subsections of an intranet that make them easier to manage. To the outside world, the intranet still looks as if it's a single network.

If you're building an intranet and want it to be connected to the Internet, you'll need a unique IP address for your intranet network, which the InterNIC Registration Services will handle. There are three classes of intranet you can have: Class A, Class B, or Class C. Generally, a Class A rating is best for the largest networks, while a Class C is best for the smallest. A Class A network can be composed of 127 networks, and a total of 16,777,214 nodes on the network. A Class B network can be composed of 16,383 networks, and a total of 65,534 nodes. A Class C network can be composed of 2,097,151 networks, and 254 nodes. When an intranet is assigned an address, it is assigned the first two IP numbers of the Internet numeric address (called the netid field) and the remaining two numbers (called the hostid field) are left blank, so that the intranet itself can assign them, such as 147.106.0.0. The hostid field consists of a number for a subnet and a host number. When an intranet is connected to the Internet, a router handles the job of sending packets into the intranet from the Internet. In our example, all incoming mail and data comes to a router for a network with the netid of 147.106.0.0. When intranets grow-for example, if there is a department located in another building, city, or country-there needs to be some way to manage network traffic. It may be impractical and physically impossible to route all the data necessary among many different computers spread across a building or the world. A second network-called a subnetwork or subnet-needs to be created. In order to have a router handle all incoming traffic for a subnetted intranet, the first byte of the hostid field is used. The bits that are used to distinguish among subnets are called subnet numbers. In our example, there are two subnets on the intranet. To the outside world, there appears to be only one network. Each computer on each subnet gets its own IP address, as in a normal intranet. The combination of the netid field, the subnet number, and then finally a host number, forms the IP address. The router must be informed that the hostid field in subnets must be treated differently than non-subnetted hostid fields, otherwise it won't be able to properly route data. In order to do this, a subnet mask is used. A subnet mask is a 32-bit number such as 255.255.0.0 that is used in concert with the numbers in the hostid field. When a calculation is performed using the subnet mask and the IP address, the router knows where to route the mail. The subnet mask is put in people's network configuration files.

Overview of an Intranet Security System

Any intranet is vulnerable to attack by people intent on destruction or on stealing corporate data. The open nature of the Internet and TCP/IP protocols expose a corporation to attack. Intranets require a variety of security measures, including hardware and software combinations that provide control of traffic; encryption and passwords to validate users; and software tools to prevent and cure viruses, block objectionable sites, and monitor traffic.

The generic term for a line of defense against intruders is a firewall. A firewall is a hardware/software combination that controls the type of services allowed to or from the intranet. Proxy servers are another common tool used in building a firewall. A proxy server allows system administrators to track all traffic coming in and out of an intranet. A bastion server firewall is configured to withstand and prevent unauthorized access or services. It is typically segmented from the rest of the intranet in its own subnet or perimeter network. In this way, if the server is broken into, the rest of the intranet won't be compromised. Server-based virus-checking software can check every file coming into the intranet to make sure that it's virus-free. Authentication systems are an important part of any intranet security scheme. Authentication systems are used to ensure that anyone trying to log into the intranet or any of its resources is the person they claim to be. Authentication systems typically use user names, passwords, and encryption systems. Server-based site-blocking software can bar people on an intranet from getting objectionable material. Monitoring software tracks where people have gone and what services they have used, such as HTTP for Web access. One way of ensuring that the wrong people or erroneous data can't get into the intranet is to use a filtering router. This is a special kind of router that examines the IP address and header information in every packet coming into the network, and allows in only those packets that have addresses or other data, like e-mail, that the system administrator has decided should be allowed into the intranet.

All intranets are vulnerable to attack. Their underlying TCP/IP architecture is identical to that of the Internet. Since the Internet was built for maximum openness and communication, there are countless techniques that can be used to attack intranets. Attacks can involve the theft of vital company information and even cash. Attacks can destroy or deny a company's computing resources and services. Attackers can break in or pose as a company employee to use the company's intranet resources.

Firewalls are hardware and software combinations that block intruders from access to an intranet while still allowing people on the intranet to access the resources of the Internet. Depending on how secure a site needs to be, and on how much time, money, and resources can be spent on a firewall, there are many kinds that can be built. Most of them, though, are built using only a few elements. Servers and routers are the primary components of firewalls.

Most firewalls use some kind of packet filtering. In packet filtering, a screening router or filtering router looks at every packet of data traveling between an intranet and the Internet.

Proxy servers on an intranet are used when someone from the intranet wants to access a server on the Internet. A request from the user's computer is sent to the proxy server instead of directly to the Internet. The proxy server contacts the server on the Internet, receives the information from the Internet, and then sends the information to the requester on the intranet. By acting as a go-between like this, proxy servers can filter traffic and maintain security as well as log all traffic between the Internet and the network.

Bastion hosts are heavily fortified servers that handle all incoming requests from the Internet, such as FTP requests. A single bastion host handling incoming requests makes it easier to maintain security and track attacks. In the event of a break in, only that single host has been compromised, instead of the entire network. In some firewalls, multiple bastion hosts can be used, one for each different kind of intranet service request.

How Firewalls Work

Firewalls protect intranets from any attacks launched against them from the Internet. They are designed to protect an intranet from unauthorized access to corporate information, and damaging or denying computer resources and services. They are also designed to stop people on the intranet from accessing Internet services that can be dangerous, such as FTP.

Intranet computers are allowed access to the Internet only after passing through a firewall. Requests have to pass through an internal screening router, also called an internal filtering routeror choke router. This router prevents packet traffic from being sniffed remotely. A choke router examines all pack-ets for information such as the source and destination of the packet. The router compares the information it finds to rules in a filtering table, and passes or drops the packets based on those rules. For example, some services, such as rlogin, may not be allowed to run. The router also might not allow any packets to be sent to specific suspicious Internet locations. A router can also block every packet traveling between the Internet and the internal network, except for e-mail. System administrators set the rules for determining which packets to allow in and which to block. When an intranet is protected by a firewall, the usual internal intranet services are available-such as e-mail, access to corporate databases and Web services, and the use of groupware. Screened subnet firewalls have one more way to protect the intranet-an exterior screening router, also called an exterior filtering router or an access router. This router screens packets between the Internet and the perimeter network using the same kind of technology that the interior screening router uses. It can screen packets based on the same rules that apply to the internal screening router and can protect the network even if the internal router fails. It also, however, may have additional rules for screening packets specifically designed to protect the bastion host. As a way to further protect an intranet from attack, the bastion host is placed in a perimeter network-a subnet-inside the firewall. If the bastion host was on the intranet instead of a perimeter network and was broken into, the intruder could gain access to the intranet. A bastion host is the main point of contact for connections coming in from the Internet for all services such as e-mail, FTP access, and any other data and requests. The bastion host services all those requests-people on the intranet contact only this one server, and they don't directly contact any other intranet servers. In this way, intranet servers are protected from attack.

Intranet

Pawan Bangar, technical Director, Birbals, India.

www.birbals.com

www.seobirbals.com

www.hbirbals.com

www.ebirbals.com

pawan@ebirbals.com

mobile phone watches Akribos XXIV Skeleton Rose Gold Cheap

Tuesday, June 12, 2012

Creating a Facebook Account

Creating a Facebook account is simple and easy. As soon as the Facebook homepage loads, there is an application to create an account on the right side of the screen, ready to be filled out. Start by entering your first and last name in the spaces provided. Next, enter an e-mail that you can be easily reached at, then create a password. Try not to use any personal information and pick an alphanumeric code that is easily remembered. After entering this information, use the drop down menus to choose your gender and date of birth. Lastly, Click "Sign Up".

This next section is a security check section. The code you will be entering will tell the site that you are a real human being. Enter in the two words with the appropriate capitalization and characters. Remember to put a space in between the two phrases. If you're having trouble reading the words, you can click on the highlighted link entitled "an audio CAPTCHA" to hear another phrase. After you have entered the information needed to continue, click "Sign Up" once more.

Technology Update

This will take you to a three step process. This process will allow you to customize you Facebook information, add friends and add a picture to your main profile. If any of the steps provided are of no use to you, you can click on the "Skip this step" link at the bottom, right hand side at anytime to move onto the next step.

Creating a Facebook Account

The first step will have you adding friends and family to your Facebook. Based on your Internet Protocol address, or IP, Facebook can determine your location and suggest people you may be interested in adding. Simply click on "Add friend" if you'd like to add someone, or click "Ignore" to remove them from this section completely. Friends can always be added later using the search engine provided after signing up. When you're done adding friends, you will automatically be taken to the next step.

Step Two will have you add your schools and work information so you can join a Facebook Network. Enter in your secondary school and college, or university. Next, use the drop down menus to identify what year you left. If you are employed and want to make your place of employment public, enter in the company you work for in the "Company" box, then hit the "Save and Continue" button. This will take you to another contact adding section, where you can add people who attend or have attended your secondary school, college, university or place of employment. Again, repeat Step One's process to add these contacts to your friends list on Facebook.

The final step, Step Three, will allow you to add a photo of yourself. You can take a new picture using the "Take a Photo" with a web camera, or upload a previously taken photo from your computer. If you are uploading a picture from your computer, a box will open inside of Facebook. Click on the "Browse" button, select the folder the picture is located in on your computer, and click on the picture you'd like to use. If you are taking a new picture, this will also open a new window in Facebook. Click on "Save picture" to take a picture of yourself. When you are done adding a photograph of yourself, click "Save and Continue".

Check your e-mail and click on the link provided to verify your account is real. You will then be taken to your new Facebook homepage, and you're done. Have fun adding friends, posting links, and connecting to others with one of the largest social networking sites on the web!

Creating a Facebook Account

Garry is a Facebook regular. He has recently published an article about Facebook Login problems at his technology news site.

watches mobile phone Joshua Sons Dual-Time Watch Cheap

Sunday, June 10, 2012

Free Spyware Anti Virus Software Download from Google

At the beginning of 2006 Google announced a new product called the "Google Pack." The Google Pack is essentially a selection of over 10 free software packages including free anti spyware & anti virus software. At the center of Google Pack there is an installer which simplifies the task of managing and keeping all the software updated.

To start with Google offered 2 good anti virus and anti spyware software programs. The anti virus software was Symantec's Norton Anti Virus 2005 - not the latest version of the product but a more than competent ant virus solution. The major limitation with this product was that only 6 months of free virus definitions were provided after that point the user needed to upgrade.

Technology Update

The anti spyware software was provided by Lavasoft. The product was called "Ad-Aware SE" which was already freely available for free on popular download sites like CNet's Download.com. The spyware detection capabilities were good but by no means the best. You also needed to manually remember to update the spyware definitions and initiate scans.

Free Spyware Anti Virus Software Download from Google

In the Spring of 2007 Google replaced the free spyware & anti virus software offered by Google Pack. The anti virus software was still supplied by Symantec however the Norton Anti Virus 2005 was replaced by a special edition of Norton Security Scan which scans and also removes virus threats. The product is based on the award-winning Norton AntiVirus products. More importantly Norton Security Scan provides free updates and is not limited to just 6 months.

Google also replaced the anti spyware software with Spyware Doctor Starter Edition. Spyware Doctor consistently scores very highly it most magazine test and is usually fighting with Webroot's Spyware Sweeper for the 1st or 2nd spot. While the Starter Edition lacks some of the active spyware prevention features of the full version it still retain the powerful scanning and detection capabilities. As with Norton Security Scan definitions are free and automatic for life.

Google Pack also contains a number of other excellent applications. In my opinion Norton Security Scan and Spyware Doctor are good enough reasons to download Google Pack. You can learn more from the link below. If you are looking to protect your computer there is no better free spyware anti virus software download available.

Free Spyware Anti Virus Software Download from Google

Richard Rogers is a PC enthusiast and runs a number of PC related sites. He recommends you download essential free software with Google Pack.

watch mobile phone Akribos XXIV Watches Cheap Prices