Tuesday, March 5, 2013

Tracking Kids With GPS

I'm sure you've seen stories on the news and in the newspapers about children that have gone missing. There is nothing sadder than a parent who experiences the loss of their child like this. The good news is that you don't have to endure something like this because there are ways to avoid lost children with today's technology. I'm talking about GPS tracking for children. Through the Global Positioning System we can rest at ease knowing that our kids location can be tracked within several yards.

Kids GPS devices today are small devices and they can be in cell phones, backpacks, watches; even placed directly on the child's clothing. The GPS device will then send out a signal allowing you to track the location of your children at all times. You can program the GPS device to send signals at intervals as short as 15 seconds for near real time tracking of your kids.

Understanding GPS

GPS technology works great for tracking kids that are at high risk due to child custody issues or similar problems. It is possible to set the device up so that it will alert you not only to the child's location, but also if the child leaves a predesignated area or boundary. So you can know if your child leaves their school or the neighborhood playground or pool.

Tracking Kids With GPS

Imagine the peace of mind you'll have when you know that you can simply log into your computer and instantly know where your child is thanks to the GPS tracking device. Some GPS devices also come with panic buttons that the child can use in case of an emergency. The alerts go not only to you, but also to the tracking service so the authorities can be notified in a timely manner.

Often when children are kidnapped the kidnapper will immediately get rid of any cell phone the child may be carrying to avoid being tracked. With a small unseen GPS tracking device attached to the child's clothing you'll still be able to track them and locate them quickly. You and more importantly the p0olice will know exactly where to locate the child and this increases the chances they will be found unharmed dramatically.

GPS devices for small children can be as small as a watch or pager and they run on rechargeable batteries that last up to 24 hours. If you want something with a longer battery life you can get larger GPS tracking units that can transmit for up to 2 weeks on a single charge. Older children like teens can have the GPS units placed in their car to keep track of their locations and driving habits. Some auto GPS units can be programmed to send an alert when the car exceeds a certain speed limit.

While personal GPS units are not cheap you really can't put a price on the peace of mind you'll get knowing you can locate your child in case of some emergency. When the safety of your child is at risk nothing is too expensive. In addition to the cost of the GPS device itself you'll also need to pay a tracking service which will run anywhere from -100 a month depending on the service and features. Having a GPS device tracking your child can be a great way to grant yourself peace of mind.

Tracking Kids With GPS

Learn more about GPS tracking and specifically personal GPS tracking at the authors website.

watch cell phone Hot Deals Castana Round Dining Table

Monday, February 25, 2013

SUV Camping - Using Your SUV as a Tent on Wheels

Owning a Sports Utility Vehicle gives one access to a vast array of outdoor activities. Its' no secret that SUVs can go places ordinary vehicles can't, but little attention has been given to proper SUV camping equipment and methods. That's right, we're talking about sleeping right there in the back of your SUV.

The first consideration, of course, is whether your particular model of vehicle has enough room to actually stretch out and sleep. I'm six feet tall and have no problem sleeping in the back of my Nissan XTerra. The best way to find out if you fit is to crawl in there and lay down! I've found that sleeping in the vehicle itself has advantages. The foremost of these is the security of being in a vehicle during a rainstorm or foul weather. Also, while I'm not averse to old fashioned tent camping, I find that the vehicle is much warmer than the cold ground. Another plus is that I don't roll over in the night to find a tree root stuck in my back. Some great solutions for a good nights sleep in the back of your SUV may actually be in your closet or basement right now. One of the best is a single sized futon pad. These roll-up nicely for transport and provide not only comfort but insulation on colder nights. Some campers like to use inflatable mattresses of various sizes, including the small inflatable models sold for hikers in most outfitter stores. Personally, I use a pad from a chaise lounge on my back deck. It folds well and is rugged enough for tough use. Also, the SUV makes a great base-camp for day-hikes or fishing expeditions. By using the SUV as a tent you don't need to carry a restrictive mummy bag if you don't wish. Break out the cotton sheets and sleep in comfort!

Another consideration is ventilation. Sleeping in your SUV with the windows closed can become uncomfortable, especially in warm weather. Not only do the windows become foggy, but the entire interior of the vehicle can become moist with breath exhalation and quite stuffy. Leaving the windows down is a solution that works fine so long as there are no bugs flying around. However, add a few mosquitoes or other buzzing critter and the night can become very uncomfortable. Fortunately, there are a couple of ready solutions for this problem. The first, and most expensive, is to purchase a truck tent system for your SUV. There are many models designed to fit over the tail gate of many common models. Some are smaller and simply create a little extra space with the gate open. Others create an entire room off the back of the vehicle with screened windows and room for the family. This choice is a matter of personal taste, budget, and intent. Another solution, which can compliment a truck tent or be used solo is a product called the "Magna Screen". These allow you to sleep with your windows down and provide a barrier against insects. Basically, a Magna Screen is a screen that fits magnetically over the exterior of your side window. They're inexpensive, durable and solve the problem nicely.

SUV Camping - Using Your SUV as a Tent on Wheels

Getting to the back-country should be no problem. The best thing you can own is a detailed map of your local National Forest or Park. Make sure to own a map that details all accessible fire roads in the area, and check local conditions to be sure that motor vehicles are allowed where you plan to camp. High end dashboard GPS units, such as Garmin, will also have details on access roads. Once you use a GPS unit you may never buy a map again, and with a good GPS system you can mark all your favorite fishing and camping spots to return again and again with laser precision. So there you have it, your SUV can do even more for you if you're willing to try something new. Sleeping in your SUV may seem odd at first to some, but once you experience the freedom it allows on back-country jaunts you will be sold. Remember, always respect your environment and always practice "leave no trace" tactics when enjoying the outdoors.

SUV Camping - Using Your SUV as a Tent on Wheels
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Jeffrey Gray, founder of TroutWorld.com, has been helping trout fishermen find their way to new and different fishing venues via the internet since 1999.
http://www.troutworld.com -- bringing you great deals on gear, trout fishing news, tips, tricks and a world of information.
http://www.MagnaScreen.com -- The SUV camping solution: Turn your SUV into a tent.

watches cell phone Order Tablespoon Waldorf 7 Micron Silverplated Set Of

Sunday, February 17, 2013

Christmas Gifts For Men - The 3 Must Have Electronic Christmas Gifts For Men

Buying Christmas gifts for men can be a real challenge to say the least. Well this year can be different. Electronic gifts for men sometimes seem to get overlooked due to price, availability and lack of understanding. Buy in confidence this year as the hottest electronic gifts for men have been identified that they will absolutely love.

Global Positioning System (GPS)

There are many models and variations to choose from when it comes to GPS. Some of the more common manufacturers are Garvin Numi, Tom Tom and Magellan. The most popular styles are car mounted and handheld. The handheld version is perfect for the hunter or outdoorsman to reassure him that he knows where he is. Of course the car mounted version is also perfect as it provides hours of entertainment as he tries every voice option on the gadget (and there are a lot). Plus you get the peace of mind knowing that somebody besides him is giving directions.

Christmas Gifts For Men - The 3 Must Have Electronic Christmas Gifts For Men

LCD HDTV

Technology has vastly improved the TV over the years and keeps getting better everyday. From plasma to LCD to monitor styles and now the "touch of color". The LCD HDTV is in my opinion the best gift for men this year. The bigger the TV the better. Definitely would not purchase anything smaller than around a 42-48" size TV. Add on some surround sound speakers, possible a way to record the game (DVR) or even a satellite subscription to watch every game imaginable and again you are done shopping and you will have the happiest man on the block. One of the best Christmas gifts for men that's ever been created.

Video Gaming System

Nothing could be closer to watching the big game than playing a big game. Technology has come so far and the graphics on these gaming systems is unbelievable, who wouldn't want one. Several of the manufacturers have cut their prices this year making them very affordable for what you get. Your man can play football, basketball, golf...any sport. Call the buds over, break out some beverages and it's game day any day of the week. I can't think of any dad who wouldn't be happy to find a video gaming system under the tree on Christmas day.

Christmas Gifts For Men - The 3 Must Have Electronic Christmas Gifts For Men
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Get your men the gifts they want this year. If you thought these were great ideas, check out these other Christmas gifts for men [http://www.christmasgiftsfordad.info/lcd-high-definition-tv/]. From electronics to outdoors to even cookware, these Christmas gifts for men [http://www.christmasgiftsfordad.info/garmin-nuvi-gps/] are sure to be the hottest holiday pleasers.

mobile phone watches Sale Jackson 3018159 Pack And Pop 28 Safety Cheap Rugged Ridge 53703 52 Soft Top With Best Buy Hon Products Hon Simplicity Ii Systems

Social Networking, The Pros and Cons of Social Networks

Social Networking has become increasingly popular nowadays as there are a lot of sites that offer this service. MySpace and Friendster are two of the most popular sites that aim to build communities of people who share common interests and activities, or who are interested in exploring the interests and activities of others.

THE PROS

A social networking site is like a virtual meeting place where people can hang out and discuss different topics. Anything under the sun, in fact. Some use these networking sites to promote their blogs, to post bulletins and updates or to use them as a bridge to a future love interest.

Social Networking, The Pros and Cons of Social Networks

These are just a few of the reasons why social networking is getting a lot of attention lately -- it makes life more exciting for many people.

THE CONS

However, it would be best to make sure that safety and security are the topmost concerns of the social networking site that you currently use. This is because social networking sites require or give you the option to provide personal information such as your name, location, and email address. Unfortunately some people can take this as an opportunity for identity theft. They can copy your information and pretend to be "you" when engaging in illegal activities. Bad news! So be cautious with what you enter into an online networking site.

You could fall into the trap of someone who pretends to be somebody else. For example, they might offer you a job or want to meet up with you just to get your money. This can lead to cyberstalking, where the stalker uses electronic media such as the Internet to pursue or harass you.

THE CONCLUSION

So take your time and be careful in choosing who to trust so you can hopefully avoid this sort of unpleasant thing happening to you. Apart from that, social networking is great thing.

Social Networking, The Pros and Cons of Social Networks
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

If you found this article helpful, you might appreciate my FREE report called "GET TO THE MONEY FASTER". Get it now at http://eprofitnews.org

Article by Gary Harvey of http://FindHotMarkets.com the Internet's BIGGEST LIST of ways to find hot niches, best selling products and hot markets.

watches cell phone Cheap Tiffany Office Furniture Tif1010Pcantflk Presentation Stand

Saturday, February 9, 2013

Social Networking Disadvantages - This Could Save Your Life

Social networking disadvantages are mostly related to safety issues. Online social interaction has become a very popular activity online. Like most popular activities there is always a certain amount of danger involved. Social networking disadvantages will be minimized if you are cautious when you use it. Internet networking is the act of interacting and sharing information with others online. If you share the wrong information to the wrong person it can end in some dangerous results. If you are careful when giving out information and networking on social sites than you will most likely be safe and have a great time connecting with others.

Many social sites have upgraded their security to make it much safer for users. When social interaction sites first appeared on the market they were completely untested. Because of this there were many ways for predators and criminals to do harm to users. Hackers are always a concern with the majority of online sites. This is especially true for certain networking sites which promote tons of personal information about individuals. The social meeting sites have taken a lot of hits in the lack of security they provide. Young teens have been killed, forced to commit suicide, and abducted by child predators while using their social networking site. Although these incidents are horrible acts, they do not happen on a regular basis. Many such sites have raised their age limits and security to ensure better safety for networking users. Social networking disadvantages can be safely dodged if the sites are used properly.

Social networking disadvantages are lessened if you follow some common networking safety tips. The first tip to underrate social networking disadvantages is to utilize the privacy settings on your profile. One of the biggest dangers during socializing is having too much personal information available. You can use the privacy settings to screen incoming individuals and what they see of your profile. The second tip to reduce social networking disadvantages is to maintain your computer defenses. Always have virus protection and anti-virus on your computer. Networking sites can have a host of ads that contain virus code which can infect your computer.

Social Networking Disadvantages - This Could Save Your Life

The third tip to decrease social networking disadvantages is to review the network website's safety notifications, standards, policies, and learn how to report violating content. It can usually be found during the registration process. Make a copy so you have it handy if there is ever a security problem that you need to deal with. Another tip for curtailing social networking disadvantages is to remember to be cautious. Don't post it on your profile unless you want everyone in the world to see it.

Bad people are always lurking online waiting for someone innocent to prey on. People are not who they claim to be the majority of the time. Do not meet anyone from a social site unless you are sure that you know them or who they are. Even if you are comfortable with meeting that person still bring a friend and tell people about the meeting in case anything goes wrong. It is always better to be safe than sorry when it comes to social networking disadvantages.

Social Networking Disadvantages - This Could Save Your Life
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

If you want to know more about someone you've interacted with there are free ways to check some basic info. You can use the link below if you have any doubts. Search Shady Character Now Here [http://free-find-people.com/]

[http://www.products-reviewer.com]

watch cell phone Purchase Imation Black Watch 9840 Volsafe Low Low Price Competition Engineering 3002 43 Steel Fenderwell

Wednesday, February 6, 2013

Starting a Social Networking Website From Scratch

You've seen MySpace, you've heard of Facebook, LinkedIn, Twitter and all the other ones. What do these websites share? They are very popular social networks. Would you like to give it a shot also? In that case, this article will point you in the correct direction.

What do you want to achieve by building a social networking website?

Think about this thoroughly. It is crucial that you comprehend your ambitions early on so you can avoid getting frustrated later. There are usually a couple of options:

Starting a Social Networking Website From Scratch

- you are starting a social networking site for a real physical community you are a member of (e.g. your local soccerclub), with no financial ambitions.

- you are starting a niche community website for a group of people that you are perhaps a member of (or maybe not) with financial ambitions (you want to make some cash)

- you want to start a huge site, like Facebook, LinkedIn, MySpace, with obvious financial ambitions.

Your ambitions and where you stands towards the community you are building a website for will determine your approach. In the following part, we will go over at the various options and the typical costs you can expect.

Starting a website for a a real physical community you are a member of

This is by far the most simple one, as a big chunk of the marketing will simply be word of mouth in your community. It's sufficient to have a person with some influence in the community promote the website (perhaps yourself) and the rest of the group will join.

To start from zero, as with any social network website project, you'll have to think about the needs of the community. Lets take an example. If you are starting a site for a soccerclub, the website will need things like groups, fan profiles, sharing of photos, event management calendar, etc.

Social networking sites are always built with the same basic principle: the goal it to provide online sharing and organisation tools for the members of the community. If you are starting a website for an existing community of which you are a part of, you should have a pretty good idea of what the people need.

Make a list of the functionalities you need, and compare this list to the features of social networking software packages like boonex, phpfox or Dzoic. These are complete out of the box social networking website scripts that you can upload on your website. If this seems complicated to you, you can often get help from the technicians at the customer service. If the service doesn't include this, take a look at the many freelancers available on elance.com for example. The average cost of such software is around 350$.

That might look like a lot of money, but the advantage is that you fully own the site and that you have complete control. You won't have any branding issues (your own logo and design will be on the website) either. If you are building a website for a community which really doesn't require all of this, you can do it a lot cheaper by creating a network at Ning. This is a website that permits people to create social networks on their hosting platform. A basic social network can be started for free.

Remember that when you choose this option, you will be completely dependent on Ning. The name of your website will include Ning, the layout will have Ning all over it, and changing any of this will cost money. You'll have very limited control over your network: it is hosted by Ning, implying that if Ning goes belly-up - so does your site.

So think about this thoroughly, check out Ning and check out some of the out of the box social networking software scripts if you want something more robust and reliable.

Starting a niche social networking site with financial ambitions

Excellent move! You have recognized that there is a huge stack of money out there waiting to be picked up. Niche social networking websites have been around since the dawn of the inet (remember yahoo groups? mIRC)? The difference is the fantastic technology we all have available now.

Facebook is excellent for superficial networking. LinkedIn is great for professional contacts. These sites however do not permit the users to be anonymous (that would be completely besides the point of these sites), implying that members can rarely express themselves fully. And there comes the need for niche networks where members can meet & share all they want without their real-life social networks ever finding out!

There are quite a few methods you can use to make this profitable. There is the obvious way of using AdSense on the networks, or affiliate links. There is off course is the huge e-mailing list you could acquire from having your own niche site. Put all this together, and a popular social network you own could be your new personal piggybank.

If this sounds exiting to you, you'll need to thoroughly think about the following:

What does the community require?

Again, this is the basis for any successful social networking project. Go deep! Here is an example. If you are building a social network for people with insomnia problems, you could have the "what are you doing now" feature of most profiles customized to: "how many hours awake".

Having nifty things like this will greatly enhance member experience. The members will feel like they are part of a community tailored to them, rather than being on a community website with features they don't need.

You'll have already understood that Ning is not an option here. You need full control over the website. If your budget is limited (e.g. below 500$), you'll have to find a social networking script that meets your needs as much as possible to limit the cost of customization afterwards. These software packages are usually open source, implying that you can change whatever you desire. This means that if you do not have developing skills, you are going to need a developer to do it for you. To reduce your costs, get a script that meets your requirements already as much as possible. To find a developer, you can usually refer to the forum of the developers of the site - there are plenty of young programmers out there who are willing to help you out for a very reasonable amount of money. You can also try a freelancing website.

Before starting the site, you'll have to think about how you will seduce members to join you. If you know people inside the community already, then that is a very good head start. You can speak to them and try to get them on board. You'll need to hit existing forums, maybe place a Google ad, or write articles (like the one you are reading now), etc.

You want to create the next huge thing like Facebook, MySpace...

Ok, knowing that you have most likely typed something like "how to start a social networking site", I am going to assume that you are not a developer. This implies that you will not be able to shake a social network out of your sleeve in the next couple of days.

All is not lost however. First of all, get help. Find a group of people who like the idea, and put your minds together. If you can get financing from somewhere, go for it. That's what you'll need to start developing a site that does exactly what you want it to do, with security, powerful servers and everything!

If you've got a great idea - try applying the same method as for niche networks - but think about getting financing as soon as possible. One you hit a hundred thousand users, your network will grow very quickly and you will pay huge amounts of money for the servers to host all of this!

If you are dreaming about the next big thing, experiment a bit beforehand - create some groups on Facebook and see what it takes to get people to join for example

Conclusion:

- small community websites can be created using Ning
- advanced, robust niche networks can be built using social networking scripts that come out of the box
- ideas for huge networks need financing early on to become a hit

Starting a Social Networking Website From Scratch
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Looking for social networking software to get you started? Below software review site will show you which one to pick:

http://www.TopCommunitySoftware.com

watches mobile phone Cheap Tiffany Office Furniture Tif1010Pcantflk Presentation Stand Order Emf And Anti Aging Bracelet E Q Discount Everlast Protex 3 Evergel Training Gloves

Sunday, February 3, 2013

What Are the Effects of Social Networking Websites?

"Words can't describe me", is how Adnan Patrawala, 16 yr old teenager from Mumbai, India had described himself on his Orkut profile. However, his kidnappers and murderers got to know a little more of him and ensnared him into a trap which ultimately led to the death of the young boy. This is perhaps an extreme example of the social impact of these social networking sites such as Orkut, Facebook, MySpace and Friendster on today's youth. But there is no denying its presence or its effects in our lives and minds today.

Often these days when we make new friends we do not ask, "What's your number?" Or "What's your email id?" Instead we ask, "What's your MySpace"? or "Are you on Orkut?" Such is the impact of these sites on our lives .The way we speak, the way we interact and the way we think is changing. Words such as scrapping, blogging, teasers---which a few years back wouldn't have made any sense to anybody; but today it's being used with so much spontaneity.

As a matter of fact, Google even has links to sites, which gives the world's most popular acronyms. It is amusing but that is the way it is.

What Are the Effects of Social Networking Websites?

However, these sites fulfill a very basic criterion of humans. It is that of communication. People living in extreme corners of the world are seen to be getting married, friends from far-off places are able to keep in touch with each other and lovers from two parts of the world stay connected with each other's emotional needs. These help us make new friends, stay in touch with the old ones and let us know more about the persons we care... their likes, dislikes, interests and emotions.

There is an element of addictiveness in these sites and the youth are indeed getting endeared more and more into this addiction. The most appealing thing among these sites is that they provide a platform for the individuals to express their views, gives them the freedom of choice and expression... from anti-war campaigns to global warming issues, from Harry potter fan clubs to Osama bin Laden hate clubs... there is everything for everyone to share and speak about.

What else could be more appealing than the thought of being heard not just by your group of friends but to the whole wide world. And that is where I feel these sites are here to stay. It just emphasizes the fact that man is a social being and shall always remain so.

What Are the Effects of Social Networking Websites?
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Jonathan Popoola specializes in web design cheltenham [http://www.uniquews.co.uk] and web design gloucestershire [http://www.uniquews.co.uk/webdesign.html] Visit my site for information on web design.

cell phone watches Sale Jackson 3018159 Pack And Pop 28 Safety Order 6 Square Tubing Inground Multi Pedestal Utility Best Buy Hon Products Hon Simplicity Ii Systems

Tuesday, January 29, 2013

Networking - Making a Good Email Introduction

Networking can mean many things to many professionals depending on the nature of the networking. It can equate to giving and expecting nothing in return. Etiquette and manners are useful tools for networking for success. Professionals can build great business relationships, expand their networks and help their business grow by referring others rather than themselves. An effective means for offering referrals is through emails. Emails are a subtle form of communication that allows the recipient to respond during any time of the day and give the proper and accurate information and resources to their business counterparts. As the middle man, you can properly introduce friends and colleagues and build your clientele/referral base.

Listed below are some important tips to consider when making business or personal contacts.

Spell Check

Networking - Making a Good Email Introduction

When a professional has agreed to introduce two or more colleagues for business or social purposes, the business professional should draft a concise and meaningful message and proof-read. Grammar should be correct and all names of persons should be spelled properly. This can build your credibility and show that you pay attention to detail as well as respect others.

Background Info.

The person making the introduction should set the stage for how all parties know of each other. Be specific and give details about personal and professional associations so that everyone can feel comfortable with each other. Another good idea is to include educational backgrounds or professional and social interests of your business counterparts. This information can be helpful for future reference or later business and social opportunities.

Company Info.

The professional should then describe the business, company or organization of each person. They should make sure to provide the most useful information for making the right connection for business success. New initiatives, new products, training programs, latest technologies which can be of interest to their business counterpart should be highlighted in the email message. Your business counterparts should be able to identify the significance of working and collaborating together for profit or growth.

Sealing the Deal

After the introduction via email has been made, the professional should encourage both parties to connect or reach out to one another. The professional should provide the proper and appropriate contact info for all parties as well as their own information. Also encourage both parties to follow up and ask for assistance when needed.

Networking - Making a Good Email Introduction
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Chi Chi Okezie is owner/producer of SIMPLEnetworking, LLC in Metro-Atlanta, GA. Newly published author of "SIMPLEnetworking: Creating Opportunities ... The new form of success!" View excerpts of the book and polish your professional approach: http://www.snseminars.com

watches cell phone Low Low Price Competition Engineering 3002 43 Steel Fenderwell Hot Deals Castana Round Dining Table

Friday, January 25, 2013

Disadvantages of Social Media

We are living in a world filled with the social media craze. From Facebook to Twitter, the world has embraced the new tools that help thousands interact each day no matter where they are. There are so many merits that come with social media and this is undeniable. However, what many forget are the down sides. All good things will have flaws and the following are insights into the disadvantages of social media. Statistics have shown that young people form the bulk of the fan base when it comes to social media outlets. However, those who are in all kinds of businesses are also avid users to further their cause. The following are some of the top cons that business people have to face when they employ the services of different social media.

The first disadvantage to speak about can also be an advantage. I'm talking about the viral potential of the media. In other words, when you have some news or item to share with an audience, it can spread like bushfire all around the world. When this news is negative or in bad taste, the same will happen. This is where the disadvantage comes in. It is hard to undertake damage control when you are dealing with social media and your good name might be soiled within hours.

Another one of the top disadvantages worth a mention is the need for intensive labor. If you intend to build a brand and a name through social media, you must be ready to spend time updating your audience on all the relevant issues. Once you become established, you will tend to have a bigger crowd and it can be difficult to meet the needs of all people increasing you labor greatly. However, to remedy this, you can put in place a networking campaign that is manageable and grow gradually.

Disadvantages of Social Media

Another thing to mention is that you must be ready to connect with your audience at all time. According to experts the law of reciprocity will apply. In other words, you need to give and take. If you have updated helpful information on a network, a person who is interested might respond and it is upon you to reply their queries and satisfy their curiosity. This is the essence of social media and if not done properly, your audience might loose faith in you. There are people who evade this and other disadvantages of social media by establishing themselves are entities that give updates that are promotional in nature. This way, the audience will take and run with what they have.

Finally on the disadvantages, you will be required to stay abreast with all upcoming sites and be ready to make the necessary change. If you are not adaptive, then you might be in trouble because social media in nature will change constantly. You need to keep in touch with all the latest in this industry because this is the sure way to safeguard the interests of your business. Remember, social networking for business gain will help you move to heights you have not been to before. Therefore, know the pitfalls discussed above and steer clear of them if you are to win in this game.

Disadvantages of Social Media
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Emma Wanjiku is an experienced writer who focusses on issues affecting you. Her research is based on all aspects and topics of life. For more tips and information go to http://www.emmalifetips.com

watches cell phone Order 6 Square Tubing Inground Multi Pedestal Utility Order Emf And Anti Aging Bracelet E Q

Tuesday, January 22, 2013

Social Networking Websites - 10 Best Social Networking Websites

What is social networking? It is made up of a group of individuals which are connected by common interest, friendship, knowledge and etc. Social networking website is a web-based platform that provides internet users to join or form an online community.

What so great about it? It is changing how people communicate with other people, such as family, friends and everyone else online. It also change the way people make money online as well. You can target customers in social networking site such as friends, family members, friends of your friends and even new customers on the following top ten best social networking websites:

Facebook - This is the leader among the social networking sites. It is a general social networking site. There are more than 600 million of people using Facebook and if you are new to social networking thing, Facebook is the place to be. MySpace - This is another popular site. It provides highly personalized experience around entertainment and connecting people to drives social interaction. YouTube - YouTube is a website that allows you to discover, watch and a channel of self-uploaded originally created videos that you can share with others. This is a great way to build relationships through viral video marketing as well. LinkedIn - This is a website that allows you to network with professionals in your industry and business. This is channel for you to get to know people with similar business interests. Bebo - This is another website which is very popular in UK and Ireland and gaining ground in US as well. Twitter - Twitter offers general social networking and also capitalizes on micro-blogging. It allows you to follow what your friends are doing and also share with people who want to know what you are up to as well. Flickr - Flickr is a photography related networking. It allows photo sharing and commenting with people all over the world. Netlog - This is a European website which includes blog and personal video and a good thing that it is completely advertisement free. Habbo - This is a website which geared towards teenagers. It encourages you to meet new people by mixing gaming and chat rooms. hi5 - This is a website which allows you to connect with, not only your friends, but with all people over the world for free. Variety of features being offered such as chat room, groups and profile customization.

Social Networking Websites - 10 Best Social Networking Websites

There is many other social networking website available. You have to understand the terms of services for each of the above, you can become known around the world and leverage your business and social life out from these social networking websites.

Social Networking Websites - 10 Best Social Networking Websites
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

If you want to make money online, it is not just about latest strategies or the newest fab or getting cutting-edge software. It's about create a SYSTEM that will SLASH away all the trial and error so that you can get results lightning fast! Even for beginners!

An amazing breakthrough Inbox Cash Techniques is created for this purpose and is hands down. Now you can get your Free book and audio by Clicking Here => http://www.inboxcashguru.com.

mobile phone watches Discount Everlast Protex 3 Evergel Training Gloves

Sunday, January 20, 2013

Intranet

Introduction to Intranets

What exactly is an intranet? It's one of those terms that's more thrown around than understood, and has become more of a buzzword than a commonly understood idea. Simply put, an intranet is a private network with Internet technology used as the underlying architecture. An intranet is built using the Internet's TCP/IP protocols for communications. TCP/IP protocols can be run on many hardware platforms and cabling schemes. The underlying hardware is not what makes an intranet-it's the software protocols that matter.

Intranets can co-exist with other local area networking technology. In many companies, existing "legacy systems" including mainframes, Novell networks, minicomputers, and various databases, are being integrated into an intranet. A wide variety of tools allow this to happen. Common Gateway Interface (CGI) scripting is often used to access legacy databases from an intranet. The Java programming language can be used to access legacy databases as well.

Intranet

With the enormous growth of the Internet, an increasing number of people in corporations use the Internet for communicating with the outside world, for gathering information, and for doing business. It didn't take long for people to recognize that the components that worked so well on the Internet could be equally valuable internally and that is why intranets are becoming so popular. Some corporations do not have TCP/IP networks, the protocol required to access the resources of the Internet. Creating an intranet in which all the information and resources can be used seamlessly has many benefits. TCP/IP-based networks make it easy for people to access the network remotely, such as from home or while traveling. Dialing into an intranet in this way is much like connecting to the Internet, except that you're connecting to a private network instead of to a public Internet provider. Interoperability between networks is another substantial bonus.

Security systems separate an intranet from the Internet. A company's intranet is protected by firewalls-hardware and software combinations that allow only certain people to access the intranet for specific purposes.

Intranets can be used for anything that existing networks are used for-and more. The ease of publishing information on the World Wide Web has made them popular places for posting corporate information such as company news or company procedures. Corporate databases with easy-to-build front-ends use the Web and programming languages such as Java.

Intranets allow people to work together more easily and more effectively. Software known as groupware is another important part of intranets. It allows people to collaborate on projects; to share information; to do videoconferencing; and to establish secure procedures for production work. Free server and client software and the multitude of services, like newsgroups, stimulated the Internet's growth. The consequence of that growth stimulated and fueled the growth of intranets. The ease with which information can be shared, and with which people can communicate with one another will continue to drive the building of intranets.

A Global View of an Intranet

An intranet is a private corporate or educational network that uses the Internet's TCP/IP protocols for its underlying transport. The protocols can run on a variety of network hardware, and can also co-exist with other network protocols, such as IPX. People from inside an intranet can get at the larger Internet resources, but those on the Internet cannot get into the intranet, which allows only restricted access from the Internet.

Videoconferencing is an important application that requires sending massive quantities of data. Intranets can be built using components that allow the extremely high bandwidths required for transferring such information. Often an intranet is composed of a number of different networks inside a corporation that all communicate with one another via TCP/IP. These separate networks are often referred to as subnets. Software that allows people to communicate with each other via e-mail and public message boards and to collaborate on work using workgroup software is among the most powerful intranet programs. Applications that allow different corporate departments to post information, and for people to fill out corporate forms, such as time sheets, and for tapping into corporate financial information are very popular. Much of the software used on intranets is standard, off-the-shelf Internet software such as the Netscape Navigator and the Microsoft Explorer Web browsers. And customized programs are often built, using the Java programming language and CGI scripting. Intranets can also be used to allow companies to do business-to-business transactions, such as ordering parts, sending invoices, and making payments. For extra security, these intranet-to-intranet transactions need never go out over the public Internet, but can travel over private leased lines instead. Intranets are a powerful system for allowing a company to do business online, for example, to allow anyone on the Internet to order products. When someone orders a product on the Internet, information is sent in a secure manner from the public Internet to the company's intranet, where the order is processed and completed. In order to protect sensitive corporate information, and to ensure that hackers don't damage computer systems and data, security barriers called firewalls protect an intranet from the Internet. Firewall technology uses a combination of routers, servers and other hardware and software to allow people on an intranet to use Internet resources, but blocks outsiders from getting into the intranet. Many intranets have to connect to "legacy systems"-hardware and databases that were built before an intranet was constructed. Legacy systems often use older technology not based on the intranet's TPC/IP protocols. There are a variety of ways in which intranets can tie to legacy systems. A common way is to use CGI scripts to access the database information and pour that data into HTML formatted text, making it available to a Web browser. Information sent across an intranet is sent to the proper destination by routers, which examine each TCP/IP packet for the IP address and determine the packet's destination. It then sends the packet to the next router closest to the destination. If the packet is to be delivered to an address on the same subnetwork of the intranet it was sent from, the packet may be able to be delivered directly without having to go through any other routers. If it is to be sent to another subnetwork on the intranet, it will be sent to another internal router address. If the packet is to be sent to a destination outside the intranet-in other words, to an Internet destination-the packet is sent to a router that connects to the Internet

How TCP/IP and IPX Work on Intranets

What distinguishes an intranet from any other kind of private network is that it is based on TCP/IP-the same protocols that apply to the Internet. TCP/IP refers to two protocols that work together to deliver data: the Transmission Control Protocol (TCP) and the Internet Protocol (IP). When you send information across an intranet, the data is broken into small packets. The packets are sent independently through a series of switches called routers. Once all the packets arrive at their destination, they are recombined into their original form. The Transmission Control Protocol breaks the data into packets and recombines them on the receiving end. The Internet Protocol handles the routing of the data and makes sure it gets sent to the proper destination.

In some companies, there may be a mix of TCP/IP-based intranets and networks based on other networking technology, such as NetWare. In that instance, the TCP/IP technology of an intranet can be used to send data between NetWare or other networks, using a technique called IP tunneling. In this instance, we'll look at data being sent from one NetWare network to another, via an intranet. NetWare networks use the IPX (Internet Packet Exchange) protocol as a way to deliver data-and TCP/IP networks can't recognize that protocol. To get around this, when an IPX packet is to be sent across an intranet, it is first encapsulated inside an IP packet by a NetWare server specifically for and dedicated to providing the IP transport mechanism for IPX packets. Data sent within an intranet must be broken up into packets of less than 1,500 characters each. TCP breaks the data into packets. As it creates each packet, it calculates and adds a checksum to the packet. The checksum is based on the byte values, that is, the precise amount of data in the packet. Each packet, along with the checksum, is put into separate IP wrappers or "envelopes." These wrappers contain information that details exactly where on the intranet-or the Internet-the data is to be sent. All of the wrappers for a given piece of data have the same addressing information so that they can all be sent to the same location for reassembly. The packets travel between networks by intranet routers. Routers examine all IP wrappers and look at their addresses. These routers determine the most efficient path for sending each packet to its final destination. Since the traffic load on an intranet often changes, the packets may be sent along different routes, and the packets may arrive out of order. If the router sees the address is one located inside the intranet, the packet may be sent directly to its destination, or it may instead be sent to another router. If the address is located out on the Internet, it will be sent to another router so it can be sent across the Internet. As the packets arrive at their destination, TCP calculates a checksum for each packet. It then compares this checksum with the checksum that has been sent in the packet. If the checksums don't match, TCP knows that the data in the packet has been corrupted during transmission. It then discards the packet and asks that the original packet be retransmitted. TCP includes the ability to check packets and to determine that all the packets have been received. When all the non-corrupt packets are received, TCP assembles them into their original, unified form. The header information of the packets relays the sequence of how to reassemble the packets. An intranet treats the IP packet as it would any other, and routes the packet to the receiving NetWare network. On the receiving NetWare network, a NetWare TCP/IP server decapsulates the IP packet-it discards the IP packet, and reads the original IPX packet. It can now use the IPX protocol to deliver the data to the proper destination.

How the OSI Model Works

A group called the International Standards Organization (ISO) has put together the Open Systems Interconnect (OSI) Reference Model, which is a model that describes seven layers of protocols for computer communications. These layers don't know or care what is on adjacent layers. Each layer, essentially, only sees the reciprocal layer on the other side. The sending application layer sees and talks to the application layer on the destination side. That conversation takes place irrespective of, for example, what structure exists at the physical layer, such as Ethernet or Token Ring. TCP combines the OSI model's application, presentation, and session layers into one which is also called the application layer.

The application layer refers to application interfaces, not programs like word processing. MHS (Message Handling Service) is such an interface and it operates at this level of the OSI model. Again, this segmentation and interface approach means that a variety of email programs can be used on an intranet so long as they conform to the MHS standard at this application interface level. The presentation layer typically simply provides a standard interface between the application layer and the network layers. This type of segmentation allows for the great flexibility of the OSI model since applications can vary endlessly, but, as long as the results conform to this standard interface, the applications need not be concerned with any of the other layers. The session layer allows for the communication between sender and destination. These conversations avoid confusion by speaking in turn. A token is passed to control and to indicate which side is allowed to speak. This layer executes transactions, like saving a file. If something prevents it from completing the save, the session layer, which has a record of the original state, returns to the original state rather than allowing a corrupt or incomplete transaction to occur. The transport layer segments the data into acceptable packet sizes and is responsible for data integrity of packet segments. There are several levels of service that can be implemented at this layer, including segmenting and reassembly, error recovery, flow control, and others. The IP wrapper is put around the packet at the network or Internet layer. The header includes the source and destination addresses, the sequence order, and other data necessary for correct routing and rebuilding at the destination. The data-link layer frames the packets-for example, for use with the PPP (Point to Point). It also includes the logical link portion of the MAC sublayer of the IEEE 802.2, 802.3 and other standards. Ethernet and Token Ring are the two most common physical layer protocols. They function at the MAC (Media Access Control) level and move the data over the cables based on the physical address on each NIC (Network Interface Card). The physical layer includes the physical components of the IEEE 802.3 and other specifications.

How TCP/IP Packets Are Processed

Protocols such as TCP/IP determine how computers communicate with each other over networks such as the Internet. These protocols work in concert with each other, and are layered on top of one another in what is commonly referred to as a protocol stack. Each layer of the protocol is designed to accomplish a specific purpose on both the sending and receiving computers. The TCP stack combines the application, presentation, and the session layers into a single layer also called the application layer. Other than that change, it follows the OSI model. The illustration below shows the wrapping process that occurs to transmit data.

The TCP application layer formats the data being sent so that the layer below it, the transport layer, can send the data. The TCP application layer performs the equivalent actions that the top three layers of OSI perform: the application, presentation, and session layers. The next layer down is the transport layer, which is responsible for transferring the data, and ensures that the data sent and the data received are in fact the same data-in other words, that there have been no errors introduced during the sending of the data. TCP divides the data it gets from the application layer into segments. It attaches a header to each segment. The header contains information that will be used on the receiving end to ensure that the data hasn't been altered en route, and that the segments can be properly recombined into their original form. The third layer prepares the data for delivery by putting them into IP datagrams, and determining the proper Internet address for those datagrams. The IP protocol works in the Internet layer, also called the network layer. It puts an IP wrapper with a header onto each segment. The IP header includes information such as the IP address of the sending and receiving computers, and the length of the datagram, and the sequence order of the datagram. The sequence order is added because the datagram could conceivably exceed the size allowed for network packets, and so would need to be broken into smaller packets. Including the sequence order will allow them to be recombined properly. The Internet layer checks the IP header and checks to see whether the packet is a fragment. If it is, it puts together fragments back into the original datagram. It strips off the IP header, and then sends the datagram to the transport layer. The transport layer looks at the remaining header to decide which application layer protocol-TCP or UDP-should get the data. Then the proper protocol strips off the header and sends the data to the receiving application. The application layer gets the data and performs, in this case, an HTTP request. The next layer down, the data link layer, uses protocols such as the Point-to-Point Protocol (PPP) to put the IP datagram into a frame. This is done by putting a header-the third header, after the TCP header and the IP header-and a footer around the IP datagram to fra-me it. Included in the frame header is a CRC check that checks for errors in the data as the data travels over the network. The data-link layer ensures that the CRC for the frame is right, and that the data hasn't been altered while it was sent. It strips off the frame header and the CRC, and sends the frame to the Internet layer. On the receiving computer, the packet travels through the stack, but in the opposite order from which the packet was created. In other words, it starts at the bottom layer, and moves its way up through the protocol stack. As it moves up, each layer strips off the header information that was added by the TCP/IP stack of the sending computer. The final layer is the physical network layer, which specifies the physical characteristics of the network being used to send data. It describes the actual hardware standards, such as the Ethernet specification. The layer receives the frames from the data link layer, and translates the IP addresses there into the hardware addresses required for the specific network being used. Finally, the layer sends the frame over the network. The physical network layer receives the packet. It translates the hardware address of the sender and receiver into IP addresses. Then it sends the frame up to the data link layer.

How Bridges Work

Bridges are hardware and software combinations that connect different parts of a single network, such as different sections of an intranet. They connect local area networks (LANs) to each other. They are generally not used, however, for connecting entire networks to each other, for example, for connecting an intranet to the Internet, or an intranet to an intranet, or to connect an entire subnetwork to an entire subnetwork. To do that, more sophisticated pieces of technology called routers are used.

When there is a great amount of traffic on an Ethernet local area network, packets can collide with one another, reducing the efficiency of the network, and slowing down network traffic. Packets can collide because so much of the traffic is routed among all the workstations on the network. In order to cut down on the collision rate, a single LAN can be subdivided into two or more LANs. For example, a single LAN can be subdivided into several departmental LANs. Most of the traffic in each departmental LAN stays within the department LAN, and so it needn't travel through all the workstations on all the LANs on the network. In this way, collisions are reduced. Bridges are used to link the LANs. The only traffic that needs to travel across bridges is traffic bound for another LAN. Any traffic within the LAN need not travel across a bridge. Each packet of data on an intranet has more information in it than just the IP information. It also includes addressing information required for other underlying network architecture, such as for an Ethernet network. Bridges look at this outer network addressing information and deliver the packet to the proper address on a LAN Bridges consult a learning table that has the addresses of all the network nodes in it. If a bridge finds that a packet belongs on its own LAN, it keeps the packet inside the LAN. If it finds that the workstation is on another LAN, it forwards the packet. The bridge constantly updates the learning table as it monitors and routes traffic. Bridges can connect LANs in a variety of different ways. They can connect LANs using serial connections over traditional phone lines and modems, over ISDN lines, and over direct cable connections. CSU/DSU units are used to connect bridges to telephone lines for remote connectivity. Bridges and routers are sometimes combined into a single product called a brouter. A brouter handles both bridging and routing tasks. If the data needs to be sent only to another LAN on the network or subnetwork, it will act only as a bridge delivering the data based on the Ethernet address. If the destination is another network entirely, it will act as a router, examining the IP packets and routing the data based on the IP address.

How Intranet Routers Work

Just as routers direct traffic on the Internet, sending information to its proper destination, and routers on an intranet perform the same function. Routers-equipment that is a combination of hardware and software-can send the data to a computer on the same sub network inside the intranet, to another network on the intranet, or outside to the Internet. They do this by examining header information in IP packets, and then sending the data on its way. Typically, a router will send the packet to the next router closest to the final destination, which in turn sends it to an even closer router, and so on, until the data reaches its intended recipient.

A router has input ports for receiving IP packets, and output ports for sending those packets toward their destination. When a packet comes to the input port, the router examines the packet header, and checks the destination in it against a routing table-a database that tells the router how to send packets to various destinations. Based on the information in the routing table, the packet is sent to a particular output port, which sends the packet to the next closest router to the packet's destination. If packets come to the input port more quickly than the router can process them, they are sent to a holding area called an input queue. The router then processes packets from the queue in the order they were received. If the number of packets received exceeds the capacity of the queue (called the length of the queue), packets may be lost. When this happens, the TCP protocol on the sending and receiving computers will have the packets re-sent. In a simple intranet that is a single, completely self-contained network, and in which there are no connections to any other network or the intranet, only minimal routing need be done, and so the routing table in the router is exceedingly simple with very few entries, and is constructed automatically by a program called ifconfig. In a slightly more complicated intranet which is composed of a number of TCP/IP-based networks, and connects to a limited number of TCP/IP-based networks, static routing will be required. In static routing, the routing table has specific ways of routing data to other networks. Only those pathways can be used. Intranet administrators can add routes to the routing table. Static routing is more flexible than minimal routing, but it can't change routes as network traffic changes, and so isn't suitable for many intranets. In more complex intranets, dynamic routing will be required. Dynamic routing is used to permit multiple routes for a packet to reach its final destination. Dynamic routing also allows routers to change the way they route information based on the amount of network traffic on some paths and routers. In dynamic routing, the routing table is called a dynamic routing table and changes as network conditions change. The tables are built dynamically by routing protocols, and so constantly change according to network traffic and conditions. There are two broad types of routing protocols: interior and exterior. Interior routing protocols are typically used on internal routers inside an intranet that routes traffic bound only for inside the intranet. A common interior routing protocol is the Routing Information Protocol (RIP). Exterior protocols are typically used for external routers on the Internet. AÊcommon exterior protocol is the Exterior Gateway Protocol (EGP).

Intranets come in different sizes. In a small company, an intranet can be composed of only a handful of computers. In a medium-sized business, it may include dozens or hundreds of computers. And in a large corporation, there may be thousands of computers spread across the globe, all connected to a single intranet. When intranets get large, they need to be subdivided into individual subnets or subnetworks.

To understand how subnetting works, you first need to understand IP addresses. Every IP address is a 32-bit numeric address that uniquely identifies a network and then a specific host on that network. The IP address is divided into two sections: the network section, called the netid, and the host section, called the hostid.

Each 32-bit IP address is handled differently, according to what class of network the address refers to. There are three main classes of network addresses: Class A, Class B, and Class C. In some classes, more of the 32-bit address space is devoted to the netid, while in others, more of the address space is devoted to the hostid. In a Class A network, the netid is composed of 8 bits, while the hostid is composed of 24 bits. In a Class B network, both the netid and the hostid are composed of 16 bits. In a Class C network, the netid is composed of 24 bits, while the hostid is composed of 8 bits. There's a simple way of knowing what class a network is in. If the first number of the IP address is less than 128, the network is a Class A address. If the first number is from 128 to 191, it's a Class B network. If the first number is from 192 to 223, it's a Class C network. Numbers above 223 are reserved for other purposes. The smaller the netid, the fewer number of networks that can be subnetted, but the larger number of hosts on the network. A Class A rating is best for large networks while a Class C is best for small ones.

To create a subnet, the demarcation line on the IP address is moved between the netid and the hostid, to give the netid more bits to work with and to take away bits from the hostid. To do this, a special number called a subnet mask is used.

Subnetting is used when intranets grow over a certain size and they begin to have problems. One problem is management of host IP addresses-making sure that every computer on the network has a proper, up-to-date host address, and that old host addresses are put out of use until needed in the future. In a corporation spread out over several locations-or across the world-it's difficult, if not impossible, to have one person responsible for managing the host addresses at every location and department in the company.

Another problem has to do with a variety of hardware limitations of networks. Dissimilar networks may all be part of an intranet. An intranet may have some sections that are Ethernet, other sections that are Token Ring networks, and conceivably other sections that use different networking technologies altogether. There is no easy way for an intranet router to link these dissimilar networks together and route the information to the proper places.

Another set of problems has to do with the physical limitations of network technology. In some kinds of networks, there are some strict limitations on how far cables can extend in the network. In other words, you can't go over a certain distance of cabling without using repeaters or routers. A "thick" Ethernet cable, for example, can only be extended to 500 meters, while a "thin" Ethernet cable can only go to 300 meters. Routers can be used to link these cables together, so that an intranet can be extended well beyond those distances. But when that is done, each length of wire is essentially considered its own subnetwork.

Yet one more set of problems has to do with the volume of traffic that travels across an intranet. Often in a corporation, in a given department, most of the traffic is intradepartmental traffic-in other words, mail and other data that people within a department send to each another. The volume of traffic outside to other departments is considerably less. What's called for is a way to confine intradepartmental traffic inside the departments, to cut down on the amount of data that needs to be routed and managed across the entire intranet.

Subnetting solves all these problems and more. When an intranet is divided into subnets, one central administrator doesn't have to manage every aspect of the entire intranet. Instead, each subnet can take care of its own administration. That means smaller organizations within the larger organization can take care of problems such as address management and a variety of troubleshooting chores. If an intranet is subnetted by divisions or departments, it means that each division or department can guide the development of its own network, while adhering to general intranet architecture. Doing this allows departments or divisions more freedom to use technology to pursue their business goals.

Subnets also get around problems that arise when an intranet has within it different kinds of network architecture, such as Ethernet and Token Ring technologies. Normally-if there is no subnetting-a router can't link these different networks together because they don't have their own addresses. However, if each of the different networks is its own subnet-and so has its own network address-routers can then link them together and properly route intranet traffic.

Subnetting can also cut down on the traffic traveling across the intranet and its routers. Since much network traffic may be confined within departments, having each department be its own subnet means that all that traffic need never cross an intranet router and cross the intranet-it will stay within its own subnet.

Subnetting can also increase the security on an intranet. If the payroll department, for example, were on its own subnet, then much of its traffic would not have to travel across an intranet. Having its data traveling across the intranet could mean that someone could conceivably hack into the data to read it. Confining the data to its own subnet makes that much less likely to happen.

Dividing an intranet into subnets can also make the entire intranet more stable. If an intranet is divided in this way, then if one subnet goes down or is often unstable, it won't affect the rest of the intranet.

This all may sound rather confusing. To see how it's done, let's take a look at a network, and see how to use the IP address to create subnets. Let's say we have a Class B network. That network is assigned the address of 130.97.0.0. When a network is given an address, it is assigned the netid numbers-in this case, the 130.97-and it can assign the host numbers (in this case, 0.0) in any way that it chooses.

The 130.97.0.0 network is a single intranet. It's getting too large to manage, though, and we've decided to divide it into two subnets. What we do is fairly straightforward. We take a number from the hostid field and use it to identify each of the subnets. So one subnet gets the address 130.97.1.0, and the other gets the address 130.97.2.0. Individual machines on the first subnet get addresses of 130.97.1.1, 130.97.1.2, and so on. Individual machines on the second subnet get addresses of 130.97.2.1, 130.97.2.2 and so on.

Sounds simple. But we have a problem. The Internet doesn't recognize 130.97.1.0 and 130.97.2.0 as separate networks. It treats them both as 130.97.0.0 since the "1" and "2" that we're using as a netid is only known to the Internet as a hostid. So our intranet router will not be able to route incoming traffic to the proper network.

To solve the problem, a subnet mask is used. A subnet mask is a 32-bit number in IP form used by intranet routers and hosts that will help routers understand how to route information to the proper subnet. To the outside Internet, there is still only one network, but the subnet mask allows routers inside the intranet to send traffic to the proper host.

A subnet mask is a number such as 255.255.255.0 (the built-in default for Class C addresses; the Class B default is 255.255.0.0 and the default for Class A is 255.0.0.0). A router takes the subnet mask and applies that number against the IP number of incoming mail to the network by using it to perform a calculation. Based on the resulting IP number, it will route mail to the proper subnet, and then to a particular computer on the subnet. For consistency, everyone in a particular intranet will use the same subnet mask.

Subnetting an Intranet

When intranets are over a certain size, or are spread over several geographical locations, it becomes difficult to manage them as a single network. To solve the problem, the single intranet can be subdivided into several subnets, subsections of an intranet that make them easier to manage. To the outside world, the intranet still looks as if it's a single network.

If you're building an intranet and want it to be connected to the Internet, you'll need a unique IP address for your intranet network, which the InterNIC Registration Services will handle. There are three classes of intranet you can have: Class A, Class B, or Class C. Generally, a Class A rating is best for the largest networks, while a Class C is best for the smallest. A Class A network can be composed of 127 networks, and a total of 16,777,214 nodes on the network. A Class B network can be composed of 16,383 networks, and a total of 65,534 nodes. A Class C network can be composed of 2,097,151 networks, and 254 nodes. When an intranet is assigned an address, it is assigned the first two IP numbers of the Internet numeric address (called the netid field) and the remaining two numbers (called the hostid field) are left blank, so that the intranet itself can assign them, such as 147.106.0.0. The hostid field consists of a number for a subnet and a host number. When an intranet is connected to the Internet, a router handles the job of sending packets into the intranet from the Internet. In our example, all incoming mail and data comes to a router for a network with the netid of 147.106.0.0. When intranets grow-for example, if there is a department located in another building, city, or country-there needs to be some way to manage network traffic. It may be impractical and physically impossible to route all the data necessary among many different computers spread across a building or the world. A second network-called a subnetwork or subnet-needs to be created. In order to have a router handle all incoming traffic for a subnetted intranet, the first byte of the hostid field is used. The bits that are used to distinguish among subnets are called subnet numbers. In our example, there are two subnets on the intranet. To the outside world, there appears to be only one network. Each computer on each subnet gets its own IP address, as in a normal intranet. The combination of the netid field, the subnet number, and then finally a host number, forms the IP address. The router must be informed that the hostid field in subnets must be treated differently than non-subnetted hostid fields, otherwise it won't be able to properly route data. In order to do this, a subnet mask is used. A subnet mask is a 32-bit number such as 255.255.0.0 that is used in concert with the numbers in the hostid field. When a calculation is performed using the subnet mask and the IP address, the router knows where to route the mail. The subnet mask is put in people's network configuration files.

Overview of an Intranet Security System

Any intranet is vulnerable to attack by people intent on destruction or on stealing corporate data. The open nature of the Internet and TCP/IP protocols expose a corporation to attack. Intranets require a variety of security measures, including hardware and software combinations that provide control of traffic; encryption and passwords to validate users; and software tools to prevent and cure viruses, block objectionable sites, and monitor traffic.

The generic term for a line of defense against intruders is a firewall. A firewall is a hardware/software combination that controls the type of services allowed to or from the intranet. Proxy servers are another common tool used in building a firewall. A proxy server allows system administrators to track all traffic coming in and out of an intranet. A bastion server firewall is configured to withstand and prevent unauthorized access or services. It is typically segmented from the rest of the intranet in its own subnet or perimeter network. In this way, if the server is broken into, the rest of the intranet won't be compromised. Server-based virus-checking software can check every file coming into the intranet to make sure that it's virus-free. Authentication systems are an important part of any intranet security scheme. Authentication systems are used to ensure that anyone trying to log into the intranet or any of its resources is the person they claim to be. Authentication systems typically use user names, passwords, and encryption systems. Server-based site-blocking software can bar people on an intranet from getting objectionable material. Monitoring software tracks where people have gone and what services they have used, such as HTTP for Web access. One way of ensuring that the wrong people or erroneous data can't get into the intranet is to use a filtering router. This is a special kind of router that examines the IP address and header information in every packet coming into the network, and allows in only those packets that have addresses or other data, like e-mail, that the system administrator has decided should be allowed into the intranet.

All intranets are vulnerable to attack. Their underlying TCP/IP architecture is identical to that of the Internet. Since the Internet was built for maximum openness and communication, there are countless techniques that can be used to attack intranets. Attacks can involve the theft of vital company information and even cash. Attacks can destroy or deny a company's computing resources and services. Attackers can break in or pose as a company employee to use the company's intranet resources.

Firewalls are hardware and software combinations that block intruders from access to an intranet while still allowing people on the intranet to access the resources of the Internet. Depending on how secure a site needs to be, and on how much time, money, and resources can be spent on a firewall, there are many kinds that can be built. Most of them, though, are built using only a few elements. Servers and routers are the primary components of firewalls.

Most firewalls use some kind of packet filtering. In packet filtering, a screening router or filtering router looks at every packet of data traveling between an intranet and the Internet.

Proxy servers on an intranet are used when someone from the intranet wants to access a server on the Internet. A request from the user's computer is sent to the proxy server instead of directly to the Internet. The proxy server contacts the server on the Internet, receives the information from the Internet, and then sends the information to the requester on the intranet. By acting as a go-between like this, proxy servers can filter traffic and maintain security as well as log all traffic between the Internet and the network.

Bastion hosts are heavily fortified servers that handle all incoming requests from the Internet, such as FTP requests. A single bastion host handling incoming requests makes it easier to maintain security and track attacks. In the event of a break in, only that single host has been compromised, instead of the entire network. In some firewalls, multiple bastion hosts can be used, one for each different kind of intranet service request.

How Firewalls Work

Firewalls protect intranets from any attacks launched against them from the Internet. They are designed to protect an intranet from unauthorized access to corporate information, and damaging or denying computer resources and services. They are also designed to stop people on the intranet from accessing Internet services that can be dangerous, such as FTP.

Intranet computers are allowed access to the Internet only after passing through a firewall. Requests have to pass through an internal screening router, also called an internal filtering routeror choke router. This router prevents packet traffic from being sniffed remotely. A choke router examines all pack-ets for information such as the source and destination of the packet. The router compares the information it finds to rules in a filtering table, and passes or drops the packets based on those rules. For example, some services, such as rlogin, may not be allowed to run. The router also might not allow any packets to be sent to specific suspicious Internet locations. A router can also block every packet traveling between the Internet and the internal network, except for e-mail. System administrators set the rules for determining which packets to allow in and which to block. When an intranet is protected by a firewall, the usual internal intranet services are available-such as e-mail, access to corporate databases and Web services, and the use of groupware. Screened subnet firewalls have one more way to protect the intranet-an exterior screening router, also called an exterior filtering router or an access router. This router screens packets between the Internet and the perimeter network using the same kind of technology that the interior screening router uses. It can screen packets based on the same rules that apply to the internal screening router and can protect the network even if the internal router fails. It also, however, may have additional rules for screening packets specifically designed to protect the bastion host. As a way to further protect an intranet from attack, the bastion host is placed in a perimeter network-a subnet-inside the firewall. If the bastion host was on the intranet instead of a perimeter network and was broken into, the intruder could gain access to the intranet. A bastion host is the main point of contact for connections coming in from the Internet for all services such as e-mail, FTP access, and any other data and requests. The bastion host services all those requests-people on the intranet contact only this one server, and they don't directly contact any other intranet servers. In this way, intranet servers are protected from attack.

Intranet
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Pawan Bangar, technical Director, Birbals, India.

www.birbals.com

www.seobirbals.com

www.hbirbals.com

www.ebirbals.com

pawan@ebirbals.com

cell phone watches Sale Jackson 3018159 Pack And Pop 28 Safety Cheap Rugged Ridge 53703 52 Soft Top With Order Tablespoon Waldorf 7 Micron Silverplated Set Of