Saturday, May 10, 2008

Make your dynamic ip into static & Setup Vpn With Dsl Router.

Recently I had problems with VPN because I have DSL router and dynamic ip. And to create VPN you have to have static ip address, so users can access to your VPN server. So first of all there’s a question: how to make my dynamic ip static?
The answer is simple. You visit the site dyndns.org and create yourself an account. Then... you go to services, and select this option:

Dynamic DNS - A free DNS service for those with dynamic IP addresses.


You click on create hosts and then, you write on the blank text area how would you like to call your host. (so users can access your pc hostname)



So... the name is always the same so users can access the vpn server no matter what is the ip address.


how to make your computer VPN server, (in windows XP)?
1. Click Start > Control Panel.
2. In the Control Panel, open the Network Connections > Create New Connection
Then..

3. On the Welcome To The New Connection Wizard page, click Next.
4. On the Network Connection Type page select the Set Up An Advanced Connection option.
5. On the Advanced Connection Options page select the Accept Incoming Connections option and click Next.
6. On the Devices For Incoming Connections page, I don’t need to connect any devices I just click Next.

7. On the Incoming Virtual Private Network (VPN) Connection page, select the Allow Virtual Private Connections option and click Next.

8. On the User Permissions page, select the users that are allowed to make incoming VPN connections. Click Next.

9. On the Networking Software page click on the Internet Protocol (TCP/IP) entry and click the Properties button.

10. Then you select the range of ip addresses you like to assign.

11. On the Completing The New Connection Wizard page, click Finish to create the connection.

There is a slight difference in creating connection in Windows 2003 server, but the main steps are the same.

And the last thing is.. for the user who want to access this VPN server.

How to make a new VPN connection?

1.Click Start, click Control Panel, click Network and Internet Connections, and then click Network Connections.
2.Click Create a new connection, and then click Next.


3.Click Connect to the network at my workplace, and then click Next.
4.Click Virtual Private Network connection, and then click Next.
5.Type a descriptive name for your company, and then click Next.
6. Then on VPN server selection you write the host name of the VPN server
7. Click Finish.

And that’s it. This worked for me. Thanks to the dyndns.org I solved the problem.

Friday, May 2, 2008

Cisco IOS Commands


Q.How do I telnet to the router?


Choose "Start" -> "Run" and type:
telnet 192.168.1.1


Where 192.168.1.1 is the IP-adresse of the router


Q.How to enable telnet from the outside?

By default routers are configured to accept telnet on port 23 from the inside. In order to get telnet access from the outside, you need to create a NAT entry for this popores.

Connect to the router -> enable -> config. Type:

ip nat ins sou sta tcp 192.168.1.1 23 int dialer0 23000

Now you have outside telnet access on port 23000. NB. This also makes your router more open for hacker attack.


Q.How to go into privileged (enable) mode?

Connect to the router. After the initial password you are in user mode. The prompt will like Router>. This mode is mostly used to view statistics, though it is also a stepping-stone for logging into more privileged mode. You can only view and change the configuration of a Cisco router in privileged mode, which you enter by typing:

enable or en

After a succesfull login the prompt will have changed to Router#

To end Priviliged mode type:

disable


Q.How to go into configuration mode?
Connect to the router -> enable and type:

configure terminal or conf t

To end the config mode press +Z (^Z).

Remember to save any changes that are made by typing: write


Q.How to restart the router?

Connect to the router, go to enable mode and type:
reload

Press enter when prompted to confirm.


Q.How to view the configuration?

In enable mode type:

sh run or wr t


Q.How to configure timeout?
Connect to the router -> enable -> Config mode, type:


int dialer0
time abs


Q.How to change password ?

Connect to the router -> enable -> Config mode, type:

line vty 0 4
password
line con 0
password

To change the Enable password:

no enable secret
enable secret

Q.How to see the actual line speed?

Connect to the router and type:

sh dsl int atm0

How to see the external IP adresse
Connect to the router and type:

sh ip in br dial0


Q.How to set the time?
Connect to the router -> enable mode and type:

clock set 10:17:00 14 june 2001

The format is "hh:mm:ss day month year". NB. clock set ? does not show the correct format.



Q.How to run a HotLine server?
In config mode type :

ip nat ins sou sta tcp w.x.y.z 5500 int dialer0 5500
ip nat ins sou sta tcp w.x.y.z 5501 int dialer0 5501
ip nat ins sou sta tcp w.x.y.z 5502 int dialer0 5502
ip nat ins sou sta tcp w.x.y.z 5503 int dialer0 5503

Hvor w.x.y.z is the internal IP.


Q.How to view the NAT entries?
Connect to the router and type:

sh ip nat trans



How to add NAT entries?
Connect to the router -> enable -> Config mode. The format is:

ip nat inside source static interface dialer0

Protocol is either tcp or udp. I.e. a NAT entry for port 4000 to 192.168.1.10 is done by typing:

ip nat inside source static tcp 192.168.1.10 4000 interface dialer0 4000


Q.How to remove NAT entries?
Connect to the router -> enable mode -> Config mode. The format is:

no ip nat inside source static interface dialer0

I.e. the NAT entry for port 4000 to 192.168.1.10 removed by:

no ip nat inside source static tcp 192.168.1.10 4000 interface dialer0 4000

In some cases the command above will not be succesfull, because the entry is in use. If this is the case type the following before going into config mode.

clear ip nat translation *

Q.How to disable NAT and use multible external addresses?
To enable an external ip range - i.e. 212.52.72.184 - 191. Connect to the router -> enable mode -> Config mode and type:

int eth0
ip address 212.52.72.185 255.255.255.248

(Change the ip number to the external numbers that is desired)

end
write
reload

Login again and delete the access list that controls the access inside out
(decide what IP's that is given access through the router), in config mode:

no access-list 1
access-list 1 permit 212.52.72.184 0.0.0.255

Notice the subnet mask 0.0.0.255 is opposite and equals 255.255.255.0

To disable NAT completely on the inside

no ip nat inside
end
write
reload


This satisfy the requirement from some firewalls that the routers ip address have to be on the same network as the wan link on the firewall. Trafic to DMZ and firewall is now going directly through the router to the firewall.


Q.How to change the address where external traffic is routed to...!

By default most routers will route all external traffic to 192.168.1.2. If this is needs to be change to somethin else i.e. a firewall address. Connect to the router - > enable mode and type:

clear ip nat translation *
configure terminal
no ip nat inside source static 192.168.1.2
ip nat inside source static 192.168.0.2
write
reload

Q.How to copy configuration to a TFTP server?

Connect to the router -> enable mode

copy nvram tftp://xx.xx.xx.xx/config.cfg

This saves a configuration file to the TFTP server at ip xx.xx.xx.xx


Q.How to copy configuration from a TFTP server?

Connect to the router -> enable mode

copy tftp://xx.xx.xx.xx/config.cfg nvram

This loads a configuration file to the TFTP server at ip xx.xx.xx.xx


How to remove a configuration

Connect to the router -> enable mode

delete nvram

This removes all configuration parameters and returns the router/switch to factory default settings.


Q.How to back up the Cisco IOS?

Connect to the router -> enable mode and type :

sh flash

This will show the files stored in the flash memory.

System flash directory:
File Length Name/status
1 3641684 soho70-y1-mz.123-6.bin
[3641748 bytes used, 4746860 available, 8388608 total]
8192K bytes of processor board System flash (Read/Write)

In this case an image called soho70-y1-mz.123-6.bin

To back up this file type:

copy flash tftp://192.168.1.2/xxxxx.bin
Source filename [soho70-y1-mz.123-6.bin]?
Address or name of remote host [192.168.1.2]?
Destination filename [xxxxx.bin]?

Where 192.168.1.2 is the ip-address of the tftp server. When prompted for the source file name type the file name found using the sh flash command. xxxxxx.bin will be the file name the IOS is stored under on the server.


Q.How to restore or upgrade the Cisco Router IOS?

Connect to the router -> enable mode and type :

copy tftp://192.168.1.2/xxxxx.bin flash
Destination filename [xxxxx.bin]?
Accessing tftp://192.168.1.2/xxxxx.bin...

Where 192.168.1.2 is the ip-address of the tftp server and xxxxx.bin is the image in the tftp root. If you do not have enough room in the flash memory to store both copies the router will ask to erase the contents of the flash before writing the new file to the memory.


Q.How to set community strings?

Connect to the router -> enable mode - config mode and type:

snmp-server community XXXXX RO
snmp-server location YYYY
snmp-server contact ZZZZ
snmp-server enable traps tty

Where XXXXX is the community name that the software which is collecting the SNMP trap must use. YYYY and ZZZZ are optional.


Q.How to delete community strings?

Connect to the router -> enable mode - config mode and type:

no snmp-server community XXXXX RO



Q.How to limit the DHCP scope?

There are 2 ways to do this. The first and most difficult is done by connecting to the router -> enable mode - config mode and type:

ip dhcp pool
network
default-router
dns-server 212.54.64.170 212.54.64.171
lease 0 1

Default the routers IP is 192.168.1.1.

I.e. you only want to use the following address pool 192.168.1.32-192.168.1.63 (Not include).
The you have to change to 192.168.1.32 and tol 255.255.255.224.

This page can used to help you calculating the subnet for you address pool: Subnet calculator.

The second and much easier way is just to reserve some address in the existing DHCP scope. I.e. you don't want to use the IP from 192.168.1.40 tol 192.168.1.72. In config mode type :

ip dhcp exclude 192.168.1.40 192.168.1.72
How to disable DHCP

Connect to the router -> enable mode - config mode and type:
no service dhcp

Mac-Windows File sharing & Accessing



In Mac OS X 10.1.x and higher, before you can connect and share files with a Windows computer within your network, you must first create a share folder on the Windows computer. You must also have a local account on that computer. Then follow the appropriate directions below.

Creating a Windows share folder:

1. In Windows, create a new folder or select an existing one. Right-click the folder, and from the contextual menu, select Properties.

2. Select the Sharing tab, and check the box next to Share this folder or Share this folder on the network.

3. In the "Share name:" field, provide a name for the share and click OK. A one-word name is simpler and reduces the risk of confusion.

Connecting to a Windows computer on the network:


Beginning in Mac OS X 10.2 and continuing with later releases of OS X, you can browse to a Windows computer on your network:

1. With the Finder active, from the Go menu, select Connect to Server... .

2. In OS X 10.3.x and later, in the Connect to Server window, click the Browse button. In the window that opens, you will see a listing of all the available computers (both Macintosh and Windows) on your local network.

In OS X 10.2.x, in the Connect to Server window, if you do not already see a listing of all the available computers on the local network, click the blue triangle next to the "At:" pull-down menu.
3. Browse to and select the computer to which you wish to connect, and double-click its icon or click the Connect button.

4. Enter the workgroup name as well as your username and password for access to the computer. If you do not know the workgroup name, the default will usually work.

Note: You must have a local account on the Windows computer you're attempting to access.
5. From the pull-down menu, select the share you wish to access and then click OK.

In OS X 10.1.x and later, you can simply enter the IP address and share name to connect to a Windows computer:

1. With the Finder active, from the Go menu, select Connect to Server... .

2. In the "Address:" or "Server Address:" field, type smb:// , then the IP address of the Windows computer to which you wish to connect, followed by a forward slash and then the share name, for example: smb://129.79.1.1/share
3. Click Connect. When prompted, supply the workgroup name as well as your Windows local account username and password. If you do not know the workgroup name, the default will usually work.

Note: You must have a local account on the Windows computer you're attempting to access.
4. Click OK, and the shared folder will appear as a network drive mounted on your OS X computer.

Adding your OS X computer to the Windows workgroup:

Optionally, you can add your OS X computer to the Windows workgroup to make it easier to browse directly to the computer:

1. Open Directory Access, which is located in /Applications/Utilities.

2. If the padlock in the lower-left corner is locked, click it to unlock it, and supply your OS X account password.

3. Make sure SMB or SMB/CIFS is checked, highlight that option, and then click the Configure... button.

4. In the "Workgroup:" field, enter the name of your Windows workgroup and then click OK.

Sharing files with a Windows computer:






To access your OS X 10.2.x and later computer from Windows, you must turn on Windows sharing and then connect from the Windows computer.
Turning on Windows sharing in OS X

1. From the Apple menu, select System Preferences... .

2. In System Preferences, from the View menu, select Sharing.

3. On the Services tab, check the box next to Windows File Sharing or Windows Sharing to permit access to your OS X computer from a Windows computer.

Note: Any Windows user attempting to access your OS X computer must have an account on your computer and must provide the username and password for that account in order to receive access.

In OS X 10.2.x, you must also complete these steps:

1. In System Preferences, from the View menu, select Accounts.

2. Select the user account to which you wish to grant Windows access, and click Edit User... .

3. Check the box next to Allow user to log in from Windows, and click OK.

Accessing your OS X computer from Windows

Note: You must have an OS X user account in order to access the OS X computer this way.

1. From the Start menu, select Run... .

2. In the "Open:" field, enter the following, replacing the IP address with that of the OS X computer to which you wish to connect and shortname with the short name for the OS X user account: \\129.79.1.1\shortname
3. In the authentication window, enter your OS X user account short name and password.

Usefull RUN commands...

ciadv.msc - indexing service

compmgmt.msc - Computer management

devmgmt.msc - Device manager

dfrg.msc - Disk defragment

diskmgmt.msc - Disk management

eventvwr.msc - Event viewer

fsmgmt.msc - Shared folders

gpedit.msc - Group policies

lusrmgr.msc - Local users and groups

ntmsmgr.msc - removable storage operator request

perfmon.msc - Performance monitor

rsop.msc - Resultant set of policies

secpol.msc - Local security settings

services.msc - Various Services

secpol.msc - local security settings

certmgr.msc - certificate manager

wmimgmt.msc - windows management infrastructure

Thursday, May 1, 2008

Enabling Windows file sharing on the Mac

Step 1 - Allowing Windows XP users to log in to a Mac

Steps:
------



1.To let Windows users access a Mac's "Windows shared files" you are first required to allow Windows users to log into the Mac.
2.Select the "Apple" menu (the icon at the top left of screen) and click the "System Preferences" menu item.
3.When the system preferences window appears, select the "View" menu at the top of the screen and select "Accounts".
4.On the new window that appears select the user who will be making their files available on this machine and then select "Edit User".
5.Check the "Allow user to log in from Windows" checkbox and click "Save".


Step 2 - Enabling "Windows file sharing" on the Mac

"Windows file sharing" itself can now be enabled on the Mac. The service is called "Windows file sharing" simply because it is compatible with the official Microsoft Windows file sharing protocol.


Steps:
-----


1.Select the "Apple" menu (the icon at the top left of screen) and click the "System Preferences" menu item.
2.When the system preferences window appears, select the "view" menu at the top of the screen and select "Sharing".
3.In the "Services" tab of the "Sharing" window select the option "Windows File Sharing".




Your Mac is now set up to share its files with Windows XP PCs, Macs and any other computers with Samba clients.

Usefull commands in Winxp.....

Useful Run Commands for Windows


Accessibility Controls -access.cpl

Add Hardware Wizard-hdwwiz.cpl

Add/Remove Programs-appwiz.cpl

Administrative Tools-control admintools

Automatic Updates-wuaucpl.cpl

Bluetooth Transfer Wizard-fsquirt
Calculator-calc

Certificate Manager-certmgr.ms
Character Map-charmap

Check Disk Utility-chkdsk

Clipboard Viewer-clipbrd

Command Prompt-cmd

Component Services-dcomcnfg

Computer Management-compmgmt.msc

Date and Time Properties-timedate.cpl

DDE Shares-ddeshare

Device Manager-devmgmt.msc

Direct X Control Panel (If Installed)-directx.cpl

Direct X Troubleshooter-dxdiag

Disk Cleanup Utility-cleanmgr

Disk Defragment-dfrg.msc

Disk Management-diskmgmt.msc

Disk Partition Manager-diskpart

Display Properties-control desktop

Display Properties-desk.cpl

Display Properties (w/Appearance Tab Preselected)-control color

Dr. Watson System Troubleshooting Utility-drwtsn32

Driver Verifier Utility-verifier

Event Viewer-eventvwr.msc

File Signature Verification Tool-sigverif

Findfast-findfast.cpl

Folders Properties-control folders

Fonts-control fonts

Fonts Folder-fonts

Free Cell Card Game-freecell

Game Controllers-joy.cpl

Group Policy Editor (XP Prof)-gpedit.msc

Hearts Card Game-mshearts
Iexpress Wizard-iexpress
Indexing Service-ciadv.msc

Internet Properties-inetcpl.cpl

IP Configuration (Display Connection Configuration)-ipconfig /all

IP Configuration (Display DNS Cache Contents)-ipconfig /displaydns

IP Configuration (Delete DNS Cache Contents)-ipconfig /flushdns

IP Configuration (Release All Connections)-ipconfig /release

IP Configuration (Renew All Connections)-pconfig /renew

IP Configuration (Refreshes DHCP & Re-Registers DNS)-ipconfig /registerdns

IP Configuration (Display DHCP Class ID)-ipconfig /showclassid

IP Configuration (Modifies DHCP Class ID)-ipconfig /setclassid

Java Control Panel (If Installed)-jpicpl32.cpl

Java Control Panel (If Installed)-javaws

Keyboard Properties-control keyboard

Local Security Settings-secpol.msc

Local Users and Groups-lusrmgr.msc

Logs You Out Of Windows-logoff

Microsoft Chat-winchat

Minesweeper Game-winmine

Mouse Properties-control mouse

Mouse Properties-main.cpl

Network Connections-control netconnections

Network Connections-ncpa.cpl

Network Setup Wizard-netsetup.cpl

Notepad-notepad

Nview Desktop Manager(If Installed)-nvtuicpl.cpl

Object Packager-packager

ODBC Data Source Administrator-odbccp32.cpl

On Screen Keyboard-osk

Opens AC3 Filter (If Installed)-ac3filter.cpl

Password Properties-password.cpl

Performance Monitor-perfmon.msc

Performance Monitor-perfmon

Phone and Modem Options-telephon.cpl

Power Configuration-powercfg.cpl

Printers and Faxes-control printers

Printers Folder-printers

Private Character Editor-eudcedit

Quicktime (If Installed)-QuickTime.cpl

Regional Settings-intl.cpl

Registry Editor-regedit

Registry Editor-regedit32

Remote Desktop-mstsc

Removable Storage-ntmsmgr.msc

Removable Storage Operator Requests-ntmsoprq.msc

Resultant Set of Policy (XP Prof)-rsop.msc

Scanners and Cameras-sticpl.cpl

Scheduled Tasks-control schedtasks

Security Center-wscui.cpl

Services-services.msc

Shared Folders-fsmgmt.msc

Shuts Down Windows-shutdown

Sounds and Audio-mmsys.cpl

Spider Solitare Card Game-spider

SQL Client Configuration-cliconfg

System Configuration Editor-sysedit

System Configuration Utility-msconfig

System File Checker Utility (Scan Immediately)-sfc /scannow

System File Checker Utility (Scan Once At Next Boot)-sfc /scanonce

System File Checker Utility (Scan On Every Boot)-sfc /scanboot

System File Checker Utility (Return to Default Setting)-sfc /revert

System File Checker Utility (Purge File Cache)-sfc /purgecache

System File Checker Utility (Set Cache Size to size x)-sfc /cachesize=x

System Properties-sysdm.cpl

Task Manager-taskmgr

Telnet Client-telnet

User Account Management-nusrmgr.cpl

Utility Manager-utilman

Windows Firewall-firewall.cpl

Windows Magnifier-magnify

Windows Management Infrastructure-wmimgmt.msc

Windows System Security Tool-syskey

Windows Update Launches-wupdmgr

Windows XP Tour Wizard-tourstart

Wordpad-write




A-Z Index of the Windows XP command line

ADDUSERS Add or list users to/from a CSV file
ARP Address Resolution Protocol
ASSOC Change file extension associations
ASSOCIAT One step file association
AT Schedule a command to run at a later time
ATTRIB Change file attributes

BOOTCFG Edit Windows boot settings
BROWSTAT Get domain, browser and PDC info

CACLS Change file permissions
CALL Call one batch program from another
CD Change Directory - move to a specific Folder
CHANGE Change Terminal Server Session properties
CHKDSK Check Disk - check and repair disk problems
CHKNTFS Check the NTFS file system
CHOICE Accept keyboard input to a batch file
CIPHER Encrypt or Decrypt files/folders
CleanMgr Automated cleanup of Temp files, recycle bin
CLEARMEM Clear memory leaks
CLIP Copy STDIN to the Windows clipboard.
CLS Clear the screen
CLUSTER Windows Clustering
CMD Start a new CMD shell
COLOR Change colors of the CMD window
COMP Compare the contents of two files or sets of files
COMPACT Compress files or folders on an NTFS partition
COMPRESS Compress individual files on an NTFS partition
CON2PRT Connect or disconnect a Printer
CONVERT Convert a FAT drive to NTFS.
COPY Copy one or more files to another location
CSCcmd Client-side caching (Offline Files)
CSVDE Import or Export Active Directory data

DATE Display or set the date
Dcomcnfg DCOM Configuration Utility
DEFRAG Defragment hard drive
DEL Delete one or more files
DELPROF Delete NT user profiles
DELTREE Delete a folder and all subfolders
DevCon Device Manager Command Line Utility
DIR Display a list of files and folders
DIRUSE Display disk usage
DISKCOMP Compare the contents of two floppy disks
DISKCOPY Copy the contents of one floppy disk to another
DNSSTAT DNS Statistics
DOSKEY Edit command line, recall commands, and create macros
DSADD Add user (computer, group..) to active directory
DSQUERY List items in active directory
DSMOD Modify user (computer, group..) in active directory

ECHO Display message on screen
ENDLOCAL End localisation of environment changes in a batch file
ERASE Delete one or more files
EXIT Quit the CMD shell
EXPAND Uncompress files
EXTRACT Uncompress CAB files

FC Compare two files
FDISK Disk Format and partition
FIND Search for a text string in a file
FINDSTR Search for strings in files
FOR /F Loop command: against a set of files
FOR /F Loop command: against the results of another command
FOR Loop command: all options Files, Directory, List
FORFILES Batch process multiple files
FORMAT Format a disk
FREEDISK Check free disk space (in bytes)
FSUTIL File and Volume utilities
FTP File Transfer Protocol
FTYPE Display or modify file types used in file extension associations

GLOBAL Display membership of global groups
GOTO Direct a batch program to jump to a labelled line

HELP Online Help
HFNETCHK Network Security Hotfix Checker

IF Conditionally perform a command
IFMEMBER Is the current user in an NT Workgroup
IPCONFIG Configure IP

KILL Remove a program from memory

LABEL Edit a disk label
LOCAL Display membership of local groups
LOGEVENT Write text to the NT event viewer.
LOGOFF Log a user off
LOGTIME Log the date and time in a file

MAPISEND Send email from the command line
MEM Display memory usage
MD Create new folders
MKLINK Create a symbolic link (linkd)
MODE Configure a system device
MORE Display output, one screen at a time
MOUNTVOL Manage a volume mount point
MOVE Move files from one folder to another
MOVEUSER Move a user from one domain to another
MSG Send a message
MSIEXEC Microsoft Windows Installer
MSINFO Windows NT diagnostics
MSTSC Terminal Server Connection (Remote Desktop Protocol)
MUNGE Find and Replace text within file(s)
MV Copy in-use files

NET Manage network resources
NETDOM Domain Manager
NETSH Configure network protocols
NETSVC Command-line Service Controller
NBTSTAT Display networking statistics (NetBIOS over TCP/IP)
NETSTAT Display networking statistics (TCP/IP)
NOW Display the current Date and Time
NSLOOKUP Name server lookup
NTBACKUP Backup folders to tape
NTRIGHTS Edit user account rights

PATH Display or set a search path for executable files
PATHPING Trace route plus network latency and packet loss
PAUSE Suspend processing of a batch file and display a message
PERMS Show permissions for a user
PERFMON Performance Monitor
PING Test a network connection
POPD Restore the previous value of the current directory saved by PUSHD
PORTQRY Display the status of ports and services
PRINT Print a text file
PRNCNFG Display, configure or rename a printer
PRNMNGR Add, delete, list printers set the default printer
PROMPT Change the command prompt
PsExec Execute process remotely
PsFile Show files opened remotely
PsGetSid Display the SID of a computer or a user
PsInfo List information about a system
PsKill Kill processes by name or process ID
PsList List detailed information about processes
PsLoggedOn Who's logged on (locally or via resource sharing)
PsLogList Event log records
PsPasswd Change account password
PsService View and control services
PsShutdown Shutdown or reboot a computer
PsSuspend Suspend processes
PUSHD Save and then change the current directory

QGREP Search file(s) for lines that match a given pattern.

RASDIAL Manage RAS connections
RASPHONE Manage RAS connections
RECOVER Recover a damaged file from a defective disk.
REG Registry: Read, Set, Export, Delete keys and values
REGEDIT Import or export registry settings
REGSVR32 Register or unregister a DLL
REGINI Change Registry Permissions
REM Record comments (remarks) in a batch file
REN Rename a file or files.
REPLACE Replace or update one file with another
RD Delete folder(s)
RDISK Create a Recovery Disk
RMTSHARE Share a folder or a printer
ROBOCOPY Robust File and Folder Copy
ROUTE Manipulate network routing tables
RUNAS Execute a program under a different user account
RUNDLL32 Run a DLL command (add/remove print connections)

SC Service Control
SCHTASKS Create or Edit Scheduled Tasks
SCLIST Display NT Services
ScriptIt Control GUI applications
SET Display, set, or remove environment variables
SETLOCAL Control the visibility of environment variables
SETX Set environment variables permanently
SHARE List or edit a file share or print share
SHIFT Shift the position of replaceable parameters in a batch file
SHORTCUT Create a windows shortcut (.LNK file)
SHOWGRPS List the NT Workgroups a user has joined
SHOWMBRS List the Users who are members of a Workgroup
SHUTDOWN Shutdown the computer
SLEEP Wait for x seconds
SOON Schedule a command to run in the near future
SORT Sort input
START Start a separate window to run a specified program or command
SU Switch User
SUBINACL Edit file and folder Permissions, Ownership and Domain
SUBST Associate a path with a drive letter
SYSTEMINFO List system configuration

TASKLIST List running applications and services
TIME Display or set the system time
TIMEOUT Delay processing of a batch file
TITLE Set the window title for a CMD.EXE session
TOUCH Change file timestamps
TRACERT Trace route to a remote host
TREE Graphical display of folder structure
TYPE Display the contents of a text file

USRSTAT List domain usernames and last login

VER Display version information
VERIFY Verify that files have been saved
VOL Display a disk label

WHERE Locate and display files in a directory tree
WHOAMI Output the current UserName and domain
WINDIFF Compare the contents of two files or sets of files
WINMSD Windows system diagnostics
WINMSDP Windows system diagnostics II
WMIC WMI Commands

XCACLS Change file permissions
XCOPY Copy files and folders

Tuesday, April 29, 2008

What are private IP addresses?

The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP address space for private internets (local networks):

10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255


Also, IP addresses in the range of 169.254.0.0 -169.254.255.255 are reserved for Automatic Private IP Addressing.

These IP's should not be used on the Internet.

Thursday, April 17, 2008

VPN client using XP

Configure a VPN cliet Connection Using Windows XP

In this article we will learn how to configure a connection to a virtual private network (VPN) using Windows XP. This article will show you how to create a new VPN connection using Microsoft Windows XP. By creating an encryption tunnel through the Internet, data can be passed safely.

VPN Overview
A VPN is a private network created over a public one. It’s done with encryption, this way, your data is encapsulated and secure in transit – this creates the ‘virtual’ tunnel. A VPN is a method of connecting to a private network by a public network like the Internet. An internet connection in a company is common. An Internet connection in a Home is common too. With both of these, you could create an encrypted tunnel between them and pass traffic, safely - securely.
If you want to create a VPN connection you will have to use encryption to make sure that others cannot intercept the data in transit while traversing the Internet. Windows XP provides a certain level of security by using Point-to-Point Tunneling Protocol (PPTP) or Layer Two Tunneling Protocol (L2TP). They are both considered tunneling protocols – simply because they create that virtual tunnel just discussed, by applying encryption.
Configure a VPN with XP
If you want to configure a VPN connection from a Windows XP client computer you only need what comes with the Operating System itself, it's all built right in. To set up a connection to a VPN, do the following:
1. On the computer that is running Windows XP, confirm that the connection to the Internet is correctly configured.
· You can try to browse the internet
· Ping a known host on the Internet, like yahoo.com, something that isn’t blocking ICMP
2. Click Start, and then click Control Panel.

3. In Control Panel, double click Network Connections

4. Click Create a new connection in the Network Tasks task pad


5. In the Network Connection Wizard, click Next.

6. Click Connect to the network at my workplace, and then click Next.

7. Click Virtual Private Network connection, and then click Next.
8. If you are prompted, you need to select whether you will use a dialup connection or if you have a dedicated connection to the Internet either via Cable, DSL, T1, Satellite, etc. Click Next.

9. Type a host name, IP or any other description you would like to appear in the Network Connections area. You can change this later if you want. Click Next.

10. Type the host name or the Internet Protocol (IP) address of the computer that you want to connect to, and then click Next.
11. You may be asked if you want to use a Smart Card or not.

12. You are just about done, the rest of the screens just verify your connection, click Next.

13. Click to select the Add a shortcut to this connection to my desktop check box if you want one, if not, then leave it unchecked and click finish.
14. You are now done making your connection, but by default, it may try to connect. You can either try the connection now if you know its valid, if not, then just close it down for now.

15. In the Network Connections window, right-click the new connection and select properties. Let’s take a look at how you can customize this connection before it’s used.
16. The first tab you will see if the General Tab. This only covers the name of the connection, which you can also rename from the Network Connection dialog box by right clicking the connection and selecting to rename it. You can also configure a First connect, which means that Windows can connect the public network (like the Internet) before starting to attempt the ‘VPN’ connection. This is a perfect example as to when you would have configured the dialup connection; this would have been the first thing that you would have to do. It's simple, you have to be connected to the Internet first before you can encrypt and send data over it. This setting makes sure that this is a reality for you.

17. The next tab is the Options Tab. It is The Options tab has a lot you can configure in it. For one, you have the option to connect to a Windows Domain, if you select this check box (unchecked by default), then your VPN client will request Windows logon domain information while starting to work up the VPN connection. Also, you have options here for redialing. Redial attempts are configured here if you are using a dial up connection to get to the Internet. It is very handy to redial if the line is dropped as dropped lines are very common.

18. The next tab is the Security Tab. This is where you would configure basic security for the VPN client. This is where you would set any advanced IPSec configurations other security protocols as well as requiring encryption and credentials.

19. The next tab is the Networking Tab. This is where you can select what networking items are used by this VPN connection.

20. The Last tab is the Advanced Tab. This is where you can configure options for configuring a firewall, and/or sharing.

Connecting to Corporate
Now that you have your XP VPN client all set up and ready, the next step is to attempt a connection to the Remote Access or VPN server set up at the corporate office. To use the connection follow these simple steps. To open the client again, go back to the Network Connections dialog box.
1. One you are in the Network Connection dialog box, double-click, or right click and select ‘Connect’ from the menu – this will initiate the connection to the corporate office.

2. Type your user name and password, and then click Connect. Properties bring you back to what we just discussed in this article, all the global settings for the VPN client you are using.
3. To disconnect from a VPN connection, right-click the icon for the connection, and then click “Disconnect”
Summary
In this article we covered the basics of building a VPN connection using Windows XP. This is very handy when you have a VPN device but don’t have the ‘client’ that may come with it. If the VPN Server doesn’t use highly proprietary protocols, then you can use the XP client to connect with. In a future article I will get into the nuts and bolts of both IPSec and more detail on how to configure the advanced options in the Security tab of this client.

Wednesday, April 16, 2008

CCNA ---Glossary

10Base2
A physical layer communications specification for 10Mbps, baseband data transmission over a coaxial cable (Thinnet) with a maximum cable segment length of 200 meters

10Base5
A physical layer communications specification for 10Mbps, baseband data transmission over a coaxial cable (Thicknet) with a maximum cable segment length of 500 meters

Access Control List (ACL)
Most network security systems operate by allowing selective use of services. An Access Control List is the usual means by which access to, and denial of, services is controlled. It is simply a list of the services available, each with a list of the hosts permitted to use the service

acknowledgment (ACK)
A type of message sent to indicate that a block of data arrived at its destination without error. See also: Negative Acknowledgement

address
There are four types of addresses in common use within the Internet. They are email address; IP,internet or Internet address; hardware or MAC address; and URL. See also: email address, IP address, internet address, MAC address

address mask
A bit mask used to identify which bits in an IP address correspond to the network and subnet portions of the address. This mask is often referred to as the subnet mask because the network portion of the address (i.e., the network mask) can be determined by the encoding inherent in an IP address. See also: Classless Inter- domain Routing.

address resolution
Conversion of a network-layer address (e.g. IP address) into the corresponding physical address (e.g., MAC address). See also: IP address, MAC address.

Address Resolution Protocol (ARP)
Used to dynamically discover the low level physical network hardware address that corresponds to the high level IP address for a given host. ARP is limited to physical network systems that support broadcast packets that can be heard by all hosts on the network. It is defined in. See also: proxy ARP, Reverse Address Resolution Protocol.

Administrative Domain (AD)
A collection of hosts and routers, and the interconnecting network(s), managed by a single administrative authority.


administrivia
Administrative tasks, most often related to the maintenance of mailing lists, digests, news gateways, etc.

Advanced Research Projects Agency (ARPA)
An agency of the U.S. Department of Defense responsible for the development of new technology for use by the military. ARPA (formerly known as DARPA, nee ARPA) was responsible for funding much of the development of the Internet we know today, including the Berkeley version of Unix and TCP/IP

American Standard Code for Information Interchange (ASCII)
A standard character-to-number encoding widely used in the computer industry. See also: EBCDIC.
anonymous FTP
Anonymous FTP allows a user to retrieve documents, files, programs, and other archived data from anywhere in the Internet without having to establish a userid and password. By using the special userid of "anonymous" the network user will bypass local security checks and will have access to publicly accessible files on the remote system. See also: archive site, File Transfer Protocol, World Wide Web.
ANSI
See: American National Standards Institute

Appletalk
A networking protocol developed by Apple Computer for communication between Apple Computer products and other computers. This protocol is independent of the network layer on which it is run. Current implementations exist for Localtalk, a 235Kb/s local area network; and Ethertalk, a 10Mb/s local area network
application
A program that performs a function directly for a user. FTP, mail and Telnet clients are examples of network applications.

application layer
The top layer of the network protocol stack. The application layer is concerned with the semantics of work (e.g., formatting electronic mail messages). How to represent that data and how to reach the foreign node are issues for lower layers of the network.

Application Program Interface (API)
A set of calling conventions which define how a service is invoked through a software package.

ASCII
See: American Standard Code for Information Interchange

Asynchronous Transfer Mode (ATM)
A standard which defines high-load, high-speed (1.544Mbps through 1.2Gbps), fixed-size packet switching with dynamic bandwidth allocation. ATM is also known as "fast packet."

authentication
The verification of the identity of a person or process.

Autonomous System (AS)
Internet (TCP/IP) terminology for a collection of routers under a single administrative authority using a common Interior Gateway Protocol (IGP) for routing packets. See subnetwork.

backbone
The top level in a hierarchical network. Stub and transit networks which connect to the same backbone are guaranteed to be interconnected. See also: stub network, transit network.
bandwidth
Technically, the difference, in Hertz (Hz), between the highest and lowest frequencies of a transmission channel. However, as typically used, the amount of data that can be sent through a given communications circuit.
BAR
Backbone Access Router between a MAN and the JANET backbone.
baseband
A transmission medium through which digital signals are sent without complicated frequency shifting. In general, only one communication channel is available at any given time. Ethernet is an example of a baseband network. See also: broadband, Ethernet.
Basic Encoding Rules (BER)
Standard rules for encoding data units described in ASN.1. Sometimes incorrectly lumped under the term ASN.1, which properly refers only to the abstract syntax description language, not the encoding technique. See also: Abstract Syntax Notation One.
BBS
See: Bulletin Board System
BCP
The newest subseries of RFCs which are written to describe Best Current Practices in the Internet. Rather than specifying a protocol, these documents specify the best ways to use the protocols and the best ways to configure options to ensure interoperability between various vendors' products. BCPs carry the endorsement of the IESG. See also: Request For Comments, Internet Engineering Steering Group.
BDP
Netscape's Browser Distribution Program.
BGP : Border Gateway Protocol
binary
11001001
Bitnet
Because It's Time NETwork. An academic computer network that provided interactive electronic mail and file transfer services, using a store-and-forward protocol, based on IBM Network Job Entry protocols. Bitnet-II encapsulated the Bitnet protocol within IP packets and depended on the Internet to route them.
Bluetooth
An IEEE standard 802.15.1 for short range (up to 10m) wireless links between mobile computers, phones and other portable peripheral devices. This uses the 2.4GHz band with a data rate of 1Mbit/s. Work was in progress in March 2002 on a High Rate (20Mbit/s or greater) version 802.15.3 in the same 2.4GHz band. Also known as Personal Area Network. See also: Wireless Local Area Network.
BNC
Bayonet Nut Connector. A connector used on coaxial cables such as 10Base2 Ethernet.
BOOTP
The Bootstrap Protocol, described is used for booting diskless nodes. Updated in superseded by DHCP. See also: Reverse Address Resolution Protocol, Dynamic Host Configuration Protocol.
Border Gateway Protocol (BGP)
The Border Gateway Protocol is an exterior gateway protocol defined in . It's design is based on experience gained with EGP, as defined in STD 18, and EGP usage in the NSFNET Backbone, See also: Exterior Gateway Protocol.
bounce
The return of a piece of mail because of an error in its delivery.
bridge
A device which forwards traffic between network segments based on datalink layer information. These segments would have a common network layer address. See also: gateway, router.
broadband
A transmission medium capable of supporting a wide range of frequencies. It can carry multiple signals by dividing the total capacity of the medium into multiple, independent bandwidth channels, where each channel operates only on a specific range of frequencies. See also: baseband.
broadcast
A special type of multicast packet which all nodes on the network are always willing to receive. See also: multicast, unicast
broadcast storm
An incorrect packet broadcast onto a network that causes multiple hosts to respond all at once, typically with equally incorrect packets which causes the storm to grow exponentially in severity.See also: Ethernet meltdown.
brouter
A device which bridges some packets (i.e., forwards based on datalink layer information) and routes other packets (i.e., forwards based on network layer information). The bridge/route decision is based on configuration information. See also: bridge, router.
Bulletin Board System (BBS)
A computer, and associated software, which typically provides electronic messaging services, archives of files, and any other services or activities of interest to the bulletin board system's operator. Although BBS's have traditionally been the domain of hobbyists, an increasing number of BBS's are connected directly to the Internet, and many BBS's are currently operated by government, educational, and research institutions. See also: Electronic Mail, Internet, Usenet.

checksum
A computed value which is dependent upon the contents of a packet. This value is sent along with the packet when it is transmitted. The receiving system computes a new checksum based upon the received data and compares this value with the one sent with the packet. If the two values are the same, the receiver has a high degree of confidence that the data was received correctly.
circuit switching
A communications paradigm in which a dedicated communication path is established between two hosts, and on which all packets travel. The telephone system is an example of a circuit switched network. See also: connection-oriented, connectionless, packet switching.
Classless Inter-domain Routing (CIDR)
A proposal, to allocate IP addresses so as to allow the addresses to be aggregated when advertised as routes. It is based on the elimination of intrinsic IP network addresses; that is, the determination of the network address based on the first few bits of the IP address. See also: IP address, network address, supernet. [Source: RFC1983]
client
A computer system or process that requests a service of another computer system or process. A workstation requesting the contents of a file from a file server is a client of the file server. See also: client-server model, server.
client-server model
A common way to describe the paradigm of many network protocols. Examples include the name-server/name-resolver relationship in DNS and the file-server/file-client relationship in NFS. See also: client, server, Domain Name System, Network File System.
CLNP
Connectionless Network Protocol. The OSI protocol for providing the OSI Connectionless Network Service (datagram service). CLNP is the OSI equivalent to Internet IP, and is sometimes called ISO IP.
CLTP
Connectionless Transport Protocol. Provides for end-to-end Transport data addressing (via Transport selector) and error control (via checksum), but cannot guarantee delivery or provide flow control. The OSI equivalent of UDP.
CMIP
Common Management Information Protocol. The OSI network management protocol.
CMOT
CMIP Over TCP. An effort to use the OSI network management protocol to manage TCP/IP networks.
CNAME
Canonical Name (alternative name for a host) in Domain Name Service.

connection-oriented
The data communication method in which communication proceeds through three well-defined phases: connection establishment, data transfer, connection release. TCP is a connection-oriented protocol. See also: circuit switching, connectionless, packet switching, Transmission Control Protocol.
connectionless
The data communication method in which communication occurs between hosts with no previous setup. Packets between two hosts may take different routes, as each is independent of the other. UDP is a connectionless protocol. See also: circuit switching, connection-oriented, packet switching, User Datagram Protocol.
Coordinating Committee for Intercontinental Research Networks (CCIRN)
A committee that includes the United States FNC and its counterparts in North America and Europe. Co-chaired by the executive directors of the FNC and the European Association of Research Networks (RARE), the CCIRN provides a forum for cooperative planning among the principal North American and European research networking bodies. See also: Federal Networking Council, RARE.
core gateway
Historically, one of a set of gateways (routers) operated by the Internet Network Operations Center at Bolt, Beranek and Newman (BBN). The core gateway system formed a central part of Internet routing in that all groups must advertise paths to their networks from a core gateway.

cracker
A cracker is an individual who attempts to access computer systems without authorization. These individuals are often malicious, as opposed to hackers, and have many means at their disposal for breaking into a system. See also: hacker, Computer Emergency Response Team, Trojan Horse, virus, worm.
Cyclic Redundancy Check (CRC)
A number derived from a set of data that will be transmitted. By recalculating the CRC at the remote end and comparing it to the value originally transmitted, the receiving node can detect some types of transmission errors

Data Encryption Key (DEK)
Used for the encryption of message text and for the computation of message integrity checks (signatures). See also: encryption.
Data Encryption Standard (DES)
A popular, standard encryption scheme. See also: encryption, Pretty Good Privacy, RSA.
datagram
A self-contained, independent entity of data carrying sufficient information to be routed from the source to the destination computer without reliance on earlier exchanges between this source and destination computer and the transporting network. See also: frame, packet.
Data Link Layer
The OSI layer that is responsible for data transfer across a single physical connection, or series of bridged connections, between two Network entities.
DCE (1)
Data Circuit-terminating Equipment
default route
A routing table entry which is used to direct packets addressed to networks not explicitly listed in the routing table.

DHCP : Dynamic Host Configuration Protocol
dialup
A temporary, as opposed to dedicated, connection between machines established over a standard phone line.
Distributed Computing Environment (DCE)
An architecture of standard programming interfaces, conventions, and server functionalities (e.g., naming, distributed file system, remote procedure call) for distributing applications transparently across networks of heterogeneous computers. Promoted and controlled by the Open Software Foundation (OSF), a consortium led by Digital, IBM and Hewlett Packard.
distributed database
A collection of several different data repositories that looks like a single database to the user. A prime example in the Internet is the Domain Name System.
domain
"Domain" is a heavily overused term in the Internet. It can be used in the Administrative Domain context, or the Domain Name context. See also: Administrative Domain, Domain Name System.
Domain Name System (DNS)
The DNS is a general purpose distributed, replicated, data query service. The principal use is the lookup of host IP addresses based on host names. The style of host names now used in the Internet is called "domain name", because they are the style of names used to look up anything in the DNS. Some important domains are: .COM (commercial), .EDU (educational), .NET (network operations), .GOV (U.S. government), and .MIL (U.S. military). Most countries also have a domain. The country domain names are based on ISO 3166. For example, .US (United States), .UK (United Kingdom), .AU (Australia). It is defined in STD 13,. See also: Fully Qualified Domain Name, Mail Exchange Record.
dot address (dotted decimal notation)
Dot address refers to the common notation for IP addresses of the form A.B.C.D; where each letter represents, in decimal, one byte of a four byte IP address. See also: IP address.
DPA
Data Protection Act.
DTE
Data Terminal Equipment

dynamic adaptive routing
Automatic rerouting of traffic based on a sensing and analysis of current actual network conditions. NOTE: this does not include cases of routing decisions taken on predefined information.
DUL
Dial-up User List, which has entries for ranges of IP addresses used by Internet Service Providers for modem users.
Dynamic Host Configuration Protocol (DHCP)
A framework for passing configuration information to hosts on a TCP/IP network, using an options field; a development from the BOOTP Bootstrap Protocol.

Electronic Mail (email)
A system whereby a computer user can exchange messages with other computer users (or groups of users) via a communications network. Electronic mail is one of the most popular uses of the Internet.
email address
The domain-based or UUCP address that is used to send electronic mail to a specified destination. For example an editor's address is "gmalkin@xylogics.com". See also: bang path, mail path, UNIX- to-UNIX CoPy.
encapsulation
The technique used by layered protocols in which a layer adds header information to the protocol data unit (PDU) from the layer above. As an example, in Internet terminology, a packet would contain a header from the physical layer, followed by a header from the datalink layer (e.g. Ethernet), followed by a header from the network layer (IP), followed by a header from the transport layer (TCP), followed by the application protocol data.
encryption
Encryption is the manipulation of a packet's data in order to prevent any but the intended recipient from reading that data. There are many types of data encryption, and they are the basis of network security. See also: Data Encryption Standard.
end system
An OSI system which contains application processes capable of communicating through all seven layers of OSI protocols. Equivalent to Internet host.
error checking
The examination of received data for transmission errors. See also: checksum, Cyclic Redundancy Check.
ESMTP
Extended Simple Mail Transfer Protocol. See Simple Mail Transfer Protocol.
Exterior Gateway Protocol (EGP)
A protocol which distributes routing information to the routers which connect autonomous systems. The term "gateway" is historical, as "router" is currently the preferred term. There is also a routing protocol called EGP See also: Autonomous System, Border Gateway Protocol, Interior Gateway Protocol.
file transfer
The copying of a file from one computer to another over a computer network. See also: File Transfer Protocol, Kermit, Gopher, World Wide Web.
File Transfer Protocol (FTP)
A protocol which allows a user on one host to access, and transfer files to and from, another host over a network.
fragment
A piece of a packet. When a router is forwarding an IP packet to a network that has a maximum packet size smaller than the packet size, it is forced to break up that packet into multiple fragments. These fragments will be reassembled by the IP layer at the destination host. See also: Maximum Transmission Unit.


fragmentation
The IP process in which a packet is broken into smaller pieces to fit the requirements of a physical network over which the packet must pass. See also: reassembly.
frame
A frame is a datalink layer "packet" which contains the header and trailer information required by the physical medium. That is, network layer packets are encapsulated to become frames. See also: datagram, encapsulation, packet.
Fully Qualified Domain Name (FQDN)
The FQDN is the full name of a system, rather than just its hostname. For example, "venera" is a hostname and "venera.isi.edu" is an FQDN. See also: hostname, Domain Name System.

gateway
The term "router" is now used in place of the original definition of "gateway". Currently, a gateway is a communications device/program which passes data between networks having similar functions but dissimilar implementations. This should not be confused with a protocol converter. By this definition, a router is a layer 3 (network layer) gateway, and a mail gateway is a layer 7 (application layer) gateway. See also: mail gateway, router, protocol converter.

General Packet Radio Service (GPRS)
An ETSI standard for packet-based wireless data communications at speeds up to a theoretical 171 kilobits per second, for continuous connection to the Internet, for portable computers and mobile phones. Addition of Virtual Private Network facilities will allow a degree of security for mobile access to important data. GPRS is based on the Global System for Mobile infrastructure, using up to 8 time slots (provided for 8 voice calls on a given frequency) only when there is information to transmit, rather than completely reserved as in a voice circuit. GPRS is being developed into Enhanced Data GSM Environment (EDGE), using a new modulation scheme for higher data rates up to 384 kilobits per second, as a step on the way to Universal Mobile Telecommunications Service (UMTS). See also: Virtual Private Network.

Global System for Mobile communications
An ETSI standard for second generation digital cellular wireless voice and data communications using time division multiple access transmission methods. Formerly known as Groupe Spécial Mobile, which was the study group of the Conference of European Posts and Telegraphs (CEPT) set up to develop a pan-European system for terrestrial mobiles

GSM
See: Global System for Mobile communications
GUI
Graphical User Interface, typically consisting of windows, menus and pointer (e.g. mouse) hence WIMP.

hacker
A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular. The term is often misused in a pejorative context, where "cracker" would be the correct term. See also: cracker.
HDLC
High level Data Link Control, ISO standard for carrying data over a link with error and flow control.
header
The portion of a packet, preceding the actual data, containing source and destination addresses, and error checking and other fields. A header is also the part of an electronic mail message that precedes the body of a message and contains, among other things, the message originator, date and time. See also: Electronic Mail, packet, error checking.
hierarchical routing
The complex problem of routing on large networks can be simplified by reducing the size of the networks. This is accomplished by breaking a network into a hierarchy of networks, where each level is responsible for its own routing. The Internet has, basically, three levels: the backbones, the mid-levels, and the stub networks. The backbones know how to route between the mid-levels, the mid-levels know how to route between the sites, and each site (being an autonomous system) knows how to route internally. See also: Autonomous System, Exterior Gateway Protocol, Interior Gateway Protocol, stub network, transit network.

High Performance Computing and Communications (HPCC)
High performance computing encompasses advanced computing, communications, and information technologies, including scientific workstations,
supercomputer systems, high speed networks, special purpose and experimental systems, the new generation of large scale parallel systems, and application and systems software with all components well integrated and linked over a high speed network.

hop
A term used in routing. A path to a destination on a network is a series of hops, through routers, away from the origin.
host
A computer that allows users to communicate with other host computers on a network. Individual users communicate by using application programs, such as electronic mail, Telnet and FTP.


hostname
The name given to a machine. See also: Fully Qualified Domain Name.

hub
A device connected to several other devices. In ARCnet, a hub is used to connect several computers together. In a message handling service, a hub is used for the transfer of messages across the network.
hyperlink
A pointer within a hypertext document which points (links) to another document, which may or may not also be a hypertext document. See also: hypertext.
hypertext
A document, written in HTML, which contains hyperlinks to other documents, which may or may not also be hypertext documents. Hypertext documents are usually retrieved using WWW. See also: hyperlink, Hypertext Markup Language, World Wide Web.
Hypertext Markup Language (HTML)
The language used to create hypertext documents. It is a subset of SGML and includes the mechanisms to establish hyperlinks to other documents. See also: hypertext, hyperlink, Standardized General Markup Language. [Source: RFC1983]
Hypertext Markup Protocol (HTTP)
The protocol used by WWW to transfer HTML files. A formal standard is still under development in the IETF. See also: hyperlink, hypertext, Hypertext Markup Language, World Wide Web.

IIS
Internet Information Service (Microsoft).
IGP
See: Interior Gateway Protocol
IGRP
Internet Gateway Routing Protocol. A proprietary IGP used by cisco System's routers. [Source: RFC1208]
Integrated Services Digital Network (ISDN)
An emerging technology which is beginning to be offered by the telephone carriers of the world. ISDN combines voice and digital network services in a single medium, making it possible to offer customers digital data services as well as voice connections through a single "wire". The standards that define ISDN are specified by CCITT. See also: CCITT.

International Organization for Standardization (ISO)
A voluntary, nontreaty organization founded in 1946 which is responsible for creating international standards in many areas, including computers and communications. Its members are the national standards organizations of the 89 member countries, including ANSI for the U.S. See also: American National Standards Institute, Open Systems Interconnection. [Source: TAN]


internet
While an internet is a network, the term "internet" is usually used to refer to a collection of networks interconnected with routers. See also: network.
internet address
A IP address that uniquely identifies a node on an internet. An Internet address (capital "I"), uniquely identifies a node on the Internet. See also: internet, Internet, IP address.
Internet Corporation for Assigned Numbers and Names (ICANN)
Successor to Internet Assigned Numbers Authority for Internet management functions performed under contract to US Government.
Internet Control Message Protocol (ICMP)
ICMP is an extension to the Internet Protocol. It allows for the generation of error messages, test packets and informational messages related to IP. It is defined in STD 5
Internet Message Access Protocol (IMAP)
allowing a client to read and manipulate electronic mail messages and message folders (mailboxes) on a server.
Internet Protocol (IP, IPv4)
The Internet Protocol (version 4), is the network layer for the TCP/IP Protocol Suite. It is a connectionless, best-effort packet switching protocol. See also: packet switching, TCP/IP Protocol Suite, Internet Protocol Version 6.
Internet Protocol security (IPsec)
A packet layer security standard consisting of Authentication Header (AH) and Encapsulating Security Payload (ESP) elements, defined in respectively. Useful for Virtual Private Networks.
Internet Protocol Version 6 (IPng, IPv6)
IPv6 (version 5 is a stream protocol used for special applications) is a new version of the Internet Protocol which is designed to be an evolutionary step from its predecessor, version 4. There are many RFCs defining various portions of the protocol, its auxiliary protocols, and the transition plan from IPv4. . The name IPng (IP next generation) is a nod to STNG (Star Trek Next Generation).
IP address
The 32-bit address defined by the Internet Protocol in RFC 791. It is usually represented in dotted decimal notation. See also: dot address, internet address, Internet Protocol, network address, subnet address, host address.

layer
Communication networks for computers may be organized as a set of more or less independent protocols, each in a different layer (also called level). The lowest layer governs direct host-to-host communication between the hardware at different hosts; the highest consists of user applications. Each layer builds on the layer beneath it. For each layer, programs at different hosts use protocols appropriate to the layer to communicate with each other. TCP/IP has five layers of protocols; OSI has seven. The advantages of different layers of protocols is that the methods of passing information from one layer to another are specified clearly as part of the protocol suite, and changes within a protocol layer are prevented from affecting the other layers. This greatly simplifies the task of designing and maintaining communication programs. See also: Open Systems Interconnection, TCP/IP Protocol Suite.
Lightweight Directory Access Protocol
This protocol provides access for management and browser applications that provide read/write interactive access to the X.500 Directory. See also: X.500.
link
A pointer which may be used to retreive the file or data to which the pointer points.
list server
An automated mailing list distribution system. List servers handle the administrivia of mailing list maintenance, such as the adding and deleting of list members. See also: mailing list.
listserv
An automated mailing list distribution system originally designed for the Bitnet/EARN network. See also: mailing list.
Local Area Network (LAN)
A data network intended to serve an area of only a few square kilometers or less. Because the network is known to cover only a small area, optimizations can be made in the network signal protocols that permit data rates up to 100Mb/s. See also: Ethernet, Fibre Distributed Data Interface, token ring, Metropolitan Area Network, Wide Area Network, Wireless Local Area Network.
Logical Link Control (LLC)
The upper portion of the datalink layer, as defined in IEEE 802.2. The LLC sublayer presents a uniform interface to the user of the datalink service, usually the network layer. Beneath the LLC sublayer is the MAC sublayer. See also: 802.x, layer, Media Access Control

MAC address
The hardware address of a device connected to a shared media. See also: Media Access Control, Ethernet, token ring. [Source: MALAMUD]
mail bridge
A mail gateway that forwards electronic mail between two or more networks while ensuring that the messages it forwards meet certain administrative criteria. A mail bridge is simply a specialized form of mail gateway that enforces an administrative policy with regard to what mail it forwards. See also: Electronic Mail, mail gateway.
Mail Exchange Record (MX Record)
A DNS resource record type indicating which host can handle mail for a particular domain. See also: Domain Name System, Electronic Mail.
mail exploder
Part of an electronic mail delivery system which allows a message to be delivered to a list of addresses. Mail exploders are used to implement mailing lists. Users send messages to a single address and the mail exploder takes care of delivery to the individual mailboxes in the list. See also: Electronic Mail, email address, mailing list.
mail gateway
A machine that connects two or more electronic mail systems (including dissimilar mail systems) and transfers messages between them. Sometimes the mapping and translation can be quite complex, and it generally requires a store-and-forward scheme whereby the message is received from one system completely before it is transmitted to the next system, after suitable translations. See also: Electronic Mail.
mail path
A series of machine names used to direct electronic mail from one user to another. This system of email addressing has been used primarily in UUCP networks which are trying to eliminate its use altogether. See also: bang path, email address, UNIX-to-UNIX CoPy.
mail server
A software program that distributes files or information in response to requests sent via email. Internet examples include Almanac and netlib. Mail servers have also been used in Bitnet to provide FTP-like services. See also: Bitnet, Electronic Mail, FTP.
mailing list
A list of email addresses, used by a mail exploder, to forward messages to groups of people. Generally, a mailing list is used to discuss certain set of topics, and different mailing lists discuss different topics. A mailing list may be moderated. This means that messages sent to the list are actually sent to a moderator who determines whether or not to send the messages on to everyone else. Requests to subscribe to, or leave, a mailing list should ALWAYS be sent to the list's "-request" address (e.g., ietf-request@cnri.reston.va.us for the IETF mailing list) or majordomo server. See also: Electronic Mail, mail exploder, email address, moderator, majordomo.
Media Access Control (MAC)
The lower portion of the datalink layer. The MAC differs for various physical media. See also: MAC Address, Ethernet, Logical Link Control, token ring.
medium
The material used to support the transmission of data. This can be copper wire, coaxial cable, optical fibre, or electromagnetic wave (as in microwave).
Metropolitan Area Network (MAN)
A data network intended to serve an area approximating that of a large city. Such networks are being implemented by innovative techniques, such as running fibre cables through subway tunnels. A popular example of a MAN is SMDS. See also: Local Area Network, Switched Multimegabit Data Service, Wide Area Network
MMC
Microsoft Management Console.
multicast
A packet with a special destination address which multiple nodes on the network may be willing to receive. See also: broadcast, unicast

name resolution
The process of mapping a name into its corresponding address. See also: Domain Name System.
Name Server
software which matches mnemonic names to raw addresses. This might be a Campus Name Server for local PCs (using a JNT protocol called Name Lookup Protocol or NLP), or a Domain Name Server for local hosts on an Internet site - such as the Bradford campus network.
Name Server record
A DNS resource record type indicating which host can provide the Domain Name Service facilities for a particular domain. See also: Domain Name System.
namespace
A commonly distributed set of names in which all names are unique.
NetBIOS
Network Basic Input Output System. The standard interface to networks on IBM PC and compatible systems before the rise of TCP/IP.
network
A computer network is a data communications system which interconnects computer systems at various different sites. A network may be composed of any combination of LANs, MANs or WANs. See also: Local Area Network, Metropolitan Area Network, Wide Area Network, internet.
network address
The network portion of an IP address. For a class A network, the network address is the first byte of the IP address. For a class B network, the network address is the first two bytes of the IP address. For a class C network, the network address is the first three bytes of the IP address. In each case, the remainder is the host address. In the Internet, assigned network addresses are globally unique. See also: Internet, IP address, subnet address, host address, Internet Registry, OSI Network Address.
Network Address Translation (NAT)
A method of converting between a range of IP addresses on the public side of a routing device, and a (typically smaller) range of IP addresses on the private side. Often used as to conserve IP addresses, since the private side can use "unrouteable" ranges of IP numbers, which can be safely re-used in many such locations. Also used to conceal identities of private hosts when implemented as part of a firewall. See also: Unroutable Address, IP Address.
Network File System (NFS)
A protocol developed by Sun Microsystems, and defined in , which allows a computer system to access files over a network as if they were on its local disks. This protocol has been incorporated in products by more than two hundred companies, and is now a de facto Internet standard.
Network Information Center (NIC)
A NIC provides information, assistance and services to network users. See also: Network Operations Center. [Source: RFC1392]
Network Information Services (NIS)
A set of services, generally provided by a NIC, to assist users in using the network. Also a service used by UNIX administrators to manage databases distributed across a network (a product of Sun Microsystems(R) - formerly known as Yellow Pages). See also: Network Information Center.
Network Layer
The OSI layer that is responsible for routing, switching, and subnetwork access across the entire OSI environment.
Network News Transfer Protocol (NNTP)
A protocol, , for the distribution, inquiry, retrieval, and posting of news articles. See also: Usenet.
Network Operations Center (NOC)
A location from which the operation of a network or internet is monitored. Additionally, this center usually serves as a clearinghouse for connectivity problems and efforts to resolve those problems. See also: Network Information Center. [Source: NNSC]
Network Time Protocol (NTP)
A protocol that assures accurate local timekeeping with reference to radio and atomic clocks located on the Internet. This protocol is capable of synchronizing distributed clocks within milliseconds over long time periods. It is defined in STD 12, (POSTSCRIPT format) . See also: Internet.
NT
New Technology, a version of Microsoft Windows operating system. The initials WNT bear the same relationship to VMS as IBM does to HAL. I'm sorry Dave...
NTP
Network Time Protocol, , provides the mechanisms to synchronise hosts and coordinate time distribution in a large diverse internet.
NTU
Network Termination Unit

ODBC
Open DataBase Connectivity. An application programming interface to allow programs to use databases, using Structured Query Language as its database access language.
Open Shortest-Path First (OSPF)
A link state, as opposed to distance vector, routing protocol. It is an Internet standard IGP defined The multicast version, MOSPF, is defined . See also: Interior Gateway Protocol, Routing Information Protocol.
Open Systems Interconnection (OSI)
A suite of protocols, designed by ISO committees, to be the international standard computer network architecture. See also: International Organization for Standardization.
OSI Network Address
The address, consisting of up to 20 octets, used to locate an OSI Transport entity. The address is formatted into an Initial Domain Part which is standardized for each of several addressing domains, and a Domain Specific Part which is the responsibility of the addressing authority for that domain.
OSI Presentation Address
The address used to locate an OSI Application entity. It consists of an OSI Network Address and up to three selectors, one each for use by the Transport, Session, and Presentation entities.

Packet
The unit of data sent across a network. "Packet" a generic term used to describe unit of data at all levels of the protocol stack, but it is most correctly used to describe application data units


packet switching
A communications paradigm in which packets (messages) are individually routed between hosts, with no previously established communication path. See also: circuit switching, connection- oriented, connectionless.
PAD
Packet Assembler Disassembler; the hardware or software interface between a user's terminal and a packet-switching network. A PAD assembles the user's input characters into packets for network transmission, and disassembles packets of output characters into their component characters for output on the terminal. The PAD facility may run on a host computer or on a dedicated processor (such as the JNT-PAD).
PHP
PHP: Hypertext Processor. An HTML-embedded scripting language used to create dynamic web pages by running scripts on the web server and embedding the results in web pages.
Physical Layer
The OSI layer that provides the means to activate and use physical connections for bit transmission. In plain terms, the Physical Layer provides the procedures for transferring a single bit across a Physical Media.
Physical Media
Any means in the physical world for transferring signals between OSI systems. Considered to be outside the OSI Model, and therefore sometimes referred to as "Layer 0." The physical connector to the media can be considered as defining the bottom interface of the Physical Layer, i.e., the bottom of the OSI Reference Model.
Point Of Presence (POP)
A site where there exists a collection of telecommunications equipment, usually digital leased lines and multi-protocol routers.
Point-to-Point Protocol (PPP)
The Point-to-Point Protocol, provides a method for transmitting packets over serial point-to-point links. There are many other RFCs which define extensions to the basic protocol. See also: Serial Line IP.
polling
Connecting to another system to check for things like mail or news.
port
A port is a transport layer demultiplexing value. Each application has a unique port number associated with it. See also: Transmission Control Protocol, User Datagram Protocol.
Post Office Protocol (POP)
A protocol designed to allow single user hosts to read mail from a server. Version 3, the most recent and most widely used, See also: Electronic Mail.
postmaster
The person responsible for taking care of electronic mail problems, answering queries about users, and other related work at a site. See also: Electronic Mail.
Presentation Layer
The OSI layer that determines how Application information is represented (i.e., encoded) while in transit between two end systems.

protocol
A formal description of message formats and the rules two computers must follow to exchange those messages. Protocols can describe low-level details of machine-to-machine interfaces (e.g., the order in which bits and bytes are sent across a wire) or high-level exchanges between allocation programs (e.g., the way in which two programs transfer a file across the Internet).
protocol converter
A device/program which translates between different protocols which serve similar functions (e.g., TCP and TP4).
proxy
The mechanism whereby one system "fronts for" another system in responding to protocol requests. Proxy systems are used in network management to avoid having to implement full protocol stacks in simple devices, such as modems.
proxy ARP
The technique in which one machine, usually a router, answers ARP requests intended for another machine. By "faking" its identity, the router accepts responsibility for routing packets to the "real" destination. Proxy ARP allows a site to use a single IP address with two physical networks. Subnetting would normally be a better solution. See also: Address Resolution Protocol

QoS
Quality of Service, a measure of the priority of packets in a shared network, principally in terms of latency in transmission. Of interest in real-time applications e.g. video.

queue
A backup of packets awaiting processing
RADIUS
Remote Authentication Dial In User Service is a protocol which allows an Authentication Server to authenticate, authorise and carry configuration information for one or more Network Access servers. These have links, typically for dialup access clients, that need authentication. This allows username and password information to be held in one place for many access lines.
Rainbow
a package for the PC allowing file transfer and terminal access between Ethernet based PCs and Ethernet or X25 based hosts, via Coloured Book protocols, running over Pink Book protocol. Written by Edinburgh University. Of historical interest.
remote login
Operating on a remote computer, using a protocol over a computer network, as though locally attached. See also: Telnet.


Remote Procedure Call (RPC)
An easy and popular paradigm for implementing the client-server model of distributed computing. In general, a request is sent to a remote system to execute a designated procedure, using arguments supplied, and the result returned to the caller. There are many variations and subtleties in various implementations, resulting in a variety of different (incompatible) RPC protocols.

repeater
A device which propagates electrical signals from one cable to another. See also: bridge, gateway, router.
resolve
Translate an Internet name into its equivalent IP address or other DNS information.

Reverse Address Resolution Protocol (RARP)
A protocol, which provides the reverse function of ARP. RARP maps a hardware (MAC) address to an internet address. It is used primarily by diskless nodes when they first initialize to find their internet address. See also: Address Resolution Protocol, BOOTP, internet address, MAC address
Round-Trip Time (RTT)
A measure of the current delay on a network.

route
The path that network traffic takes from its source to its destination. Also, a possible path from a given host to another host or destination.

routed
Route Daemon. A program which runs under 4.2BSD/4.3BSD UNIX systems (and derived operating systems) to propagate routes among machines on a local area network, using the RIP protocol. Pronounced "route-dee". See also: Routing Information Protocol, gated.

router
A device which forwards traffic between networks. The forwarding decision is based on network layer information and routing tables, often constructed by routing protocols. See also: bridge, gateway, Exterior Gateway Protocol, Interior Gateway Protocol.

routing
The process of selecting the correct interface and next hop for a packet being forwarded. See also: hop, router, Exterior Gateway Protocol, Interior Gateway Protocol.

routing domain
A set of routers exchanging routing information within an administrative domain. See also: Administrative Domain, router.




Routing Information Protocol (RIP)
A distance vector, as opposed to link state, routing protocol. It is an Internet standard IGP defined in STD 34. See also: Interior Gateway Protocol, Open Shortest Path First....
RSA
A public-key cryptographic system which may be used for encryption and authentication. It was invented in 1977 and named for its inventors: Ron Rivest, Adi Shamir, and Leonard Adleman. See also: encryption, Data Encryption Standard, Pretty Good Privacy.


server
A provider of resources (e.g., file servers and name servers). See also: client, Domain Name System, Network File System.
Session Layer
The OSI layer that provides means for dialogue control between end systems.
signature
The three or four line message at the bottom of a piece of email or a Usenet article which identifies the sender. Large signatures (over five lines) are generally frowned upon. See also: Electronic Mail, Usenet.
Simple Mail Transfer Protocol (SMTP)
A protocol, , used to transfer electronic mail between computers, with extensions specified in many other RFCs. It is a server to server protocol, so other protocols are used to access the messages. See also: Electronic Mail, Post Office Protocol, RFC 822.
Simple Network Management Protocol (SNMP)
The Internet standard protocol developed to manage nodes on an IP network. The first version is defined in (STD 15). SNMPv2 (version 2) is defined in too many RFCs to list. It is currently possible to manage wiring hubs, toasters, jukeboxes, etc. See also: Management Information Base.
SQL
Structured Query Language. The international standard language for defining and accessing relational databases.
Squid
A Web proxy cache package.
SSH
Secure Shell, a package for eliciting secure (i.e. encrypted) interactive connections across a public network such as the Internet.
SSL
Secure Socket Layer protocol, a method for eliciting secure (i.e. encrypted) connections (e.g. to web services) across a public network such as the Internet. Now extended as Transport Layer Security (TLS).
stub network
A stub network only carries packets to and from local hosts. Even if it has paths to more than one other network, it does not carry traffic for other networks. See also: backbone, transit network.
subnet
A portion of a network, which may be a physically independent network segment, which shares a network address with other portions of the network and is distinguished by a subnet number. A subnet is to a network what a network is to an internet. See also: internet, network.
subnet address
The subnet portion of an IP address. In a subnetted network, the host portion of an IP address is split into a subnet portion and a host portion using an address (subnet) mask. See also: address mask, IP address, network address, host address.
subnetwork
A collection of OSI end systems and intermediate systems under the control of a single administrative domain and utilizing a single network access protocol. Examples:- private X.25 networks, collection of bridged LANs.

Telnet
Telnet is the Internet standard protocol for remote terminal connection service. It is defined in STD 8, and extended with options by many other RFCs.
terminal server
A device which connects many terminals to a LAN through one network connection. A terminal server can also connect many network users to its asynchronous ports for dial-out capabilities and printer access. See also: Local Area Network.
token ring
A token ring is a type of LAN with nodes wired into a ring. Each node constantly passes a control message (token) on to the next; whichever node has the token can send a message. Often, "Token Ring" is used to refer to the IEEE 802.5 token ring standard, which is the most common type of token ring. See also: 802.x, Local Area Network.
topology
A network topology shows the computers and the links between them. A network layer must stay abreast of the current network topology to be able to route packets to their final destination.
traceroute
A program available on many systems which traces the path a packet takes to a destination. It is mostly used to debug routing problems between hosts. There is also a traceroute protocol defined in .
transceiver
Transmitter-receiver. The physical device that connects a host interface to a local area network, such as Ethernet. Ethernet transceivers contain electronics that apply signals to the cable and sense collisions.
transit network
A transit network passes traffic between networks in addition to carrying traffic for its own hosts. It must have paths to at least two other networks. See also: backbone, stub network.
Transmission Control Protocol (TCP)
An Internet Standard transport layer protocol defined in It is connection-oriented and stream-oriented, as opposed to UDP. See also: connection-oriented, stream-oriented, User Datagram Protocol.

Transport Layer
The OSI layer that is responsible for reliable end- to-end data transfer between end systems.
Transport Layer Security (TLS)
An IETF standard in for eliciting secure (i.e. encrypted) connections (e.g. to web services) across a public network such as the Internet. Formerly known as Secure Sockets Layer (SSL).
Trojan Horse
A computer program which carries within itself a means to allow the creator of the program access to the system using it. See also: virus, worm.
tunnelling
Tunnelling refers to encapsulation of protocol A within protocol B, such that A treats B as though it were a datalink layer. Tunnelling is used to get data between administrative domains which use a protocol that is not supported by the internet connecting those domains. See also: Administrative Domain.
twisted pair
A type of cable in which pairs of conductors are twisted together to produce certain electrical properties

unicast
An address which only one host will recognize. See also: broadcast, multicast.
Uniform Resource Locator (URL)
A URL is a compact (most of the time) string representation for a resource available on the Internet. URLs are primarily used to retrieve information using WWW. The syntax and semantics for URLs are defined in . See also: World Wide Web.
Universal Time Coordinated (UTC)
This is Greenwich Mean Time.
Unrouteable Address
Certain ranges of IP addresses are designated in as exclusively for internal use. These are 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.16.255.255, and 192.168.0.0 to 192.168.255.255. A correctly configured router will not allow packets from any of these addresses through to the Internet. The only way that information can pass between hosts with any of these IP addresses and the outside world is to have a device (typically a firewall) that translates between these internal addresses and a specific collection of IP addresses that are assigned in the normal way. The internal IP addresses can be safely re-used in many such locations. See also: Network Address Translation, IP Address.
User Datagram Protocol (UDP)
An Internet Standard transport layer protocol defined in STD 6,. It is a connectionless protocol which adds a level of reliability and multiplexing to IP. See also: connectionless, Transmission Control Protocol.

virtual circuit
A network service which provides connection-oriented service regardless of the underlying network structure. See also: connection-oriented.


Virtual Private Network (VPN)
A client across a public network such as the Internet may appear to be part of a private network by encapsulating the private packets inside public packets which are routed in the normal way to a device (typically a firewall) on the private network which unpacks them and sends them on the private network, a process known as tunnelling. The tunnel can exist at the data link layer using Point to Point Tunnelling Protocol (PPTP) or the IETF standard Layer 2 Tunneling Protocol (L2TP) , or at the IP layer using IETF-defined IP Security (IPsec) protocol extensions from . There should also be some form of authentication and authorisation, and encryption of at least the authentication process (and preferably data transfers too) so IPsec is the most desireable method.
virus
A program which replicates itself on computer systems by incorporating itself into other programs which are shared among computer systems. See also: Trojan Horse, worm.

Wi-Fi Protected Access (WPA)
A development of Wired Equivalent Privacy to overcome deficiencies in WEP as used in Wireless LANs, by incorporating elements of 802.11i security before the latter (to be known subsequently as WPA v2) is fully developed. Temporary Key Integrity Protocol (TKIP) is incorporated to allow different encryption keys for each packet transmitted, as are RADIUS support and facilities to stop rogue network points attracting authenticated users to steal their credentials. See also: RADIUS, Wired Equivalent Privacy.
Wireless Application Protocol (WAP)
A stack of protocols, akin to the OSI model or the TCP/IP stack, to implement the layers needed for communication with wireless devices, security, applications, etc, promoted as an open standard by the WAP Forum http://www.wapforum.org/.
Wireless Application Protocol Gateway
A WAP client may receive documents from an ordinary WWW server via a WAP gateway, a proxy which converts between WAP requests and HTTP requests (including CGI programs) and converts the output to WAP formats (e.g. WML or WMLScript) followed by compression to binary for sending to the client. WWW pages may also be coded directly in WML on the WWW server before receipt by the gateway.
Wireless Application Environment (WAE)
WAE is the programming environment for WAP. WAE is handled by a browser program in the device, and consists of Wireless Markup Language (WML), WMLScript and Wireless Telephony Application (WTA).
Wireless Datagram Protocol (WDP)
The transport layer of WAP, which transforms datagrams from upper layer protocols into the formats specific to datapaths, bearers and devices, e.g. GSM or SMS or GPRS. Thus upper layers have no need to program for the physical layer of communication such as air interface.
Wired Equivalent Privacy (WEP)
A security protocol within IEE standard 802.11b intended to give Wireless Local Area Networks the degree of privacy expected of fixed LANs. Encryption over air between the devices and fixed access points (rather than end to end) goes part way towards countering the eavesdropping risk of signals spilling out of buildings. However, the length of the key may be only 40 bits (up to 128 bits is allowed) even if WEP is turned on, and the encryption method produces some predictable sequences, so it is prone to statistical analysis to recover keys. Also the Service Set Identifier (SSID) is broadcast in clear in probes from the access point (unless turned off); this is used as a "password" for packets sent between members of specific LANs, so is useful for eavesdroppers to acquire, especially if obvious names are chosen e.g. 10Downing.
As an interim solution, the IEE 802.1x standard is available for port-level authentication and key management i.e. rapid changes and secure key delivery. This incorporates Extensible Authentication Protocol (EAP). This was first designed for wired (e.g. dialup) links, and is not itself a cipher standard, so the first version authenticates the MAC address rather than the user. The authentication is passed through from the fixed access point to an authentication server such as RADIUS or Kerberos. However, there are no checks that an access point is what it claims to be, so there is a way of masquerading or intercepting the authentication process.
Work on the 802.11i standard is ongoing at March 2003, but this addresses such issues as mutual and per-packet authentication, and could incorporate Advanced Encryption Standard (AES). An interim standard Wi-Fi Protected Access (WPA) contains some of the technologies to overcome WEP deficiencies.
It is imperative that further security measures are taken on top of WEP and its immediate successors, such as Virtual Private Network schemes, although Network Layer solutions such as IPsec are tricky when roaming devices use DHCP for dynamic IP addresses, and products orientated to wireless working are necessary. See also: 802.11, Kerberos, RADIUS, Wireless Local Area Network, Wireless Protected Access.
Wireless Local Area Network (WLAN)
A data network intended to serve an area of only a few hundres square metres or less, using radio communications between mobile computers and (typically) a fixed access point which provides onward connections to fixed networks such as the Internet. There are several competing technologies such as HIPERLAN in Europe and the 802.11 series in the USA. This is the next level up in distance from Personal Area Networks such as Bluetooth. See also: Bluetooth, 802.11, HIPERLAN.
whois
An Internet program which allows users to query a database of people and other Internet entities, such as domains, networks, and hosts, kept at the DDN NIC. The information for people shows a person's company name, address, phone number and email address. See also: Defense Data Network Network ..., white pages, Knowbot, X.500.
Wide Area Network (WAN)
A network, usually constructed with serial lines, which covers a large geographic area. See also: Local Area Network, Metropolitan Area Network
World Wide Web (WWW or W3)
A hypertext-based, distributed information system created by researchers at CERN in Switzerland. Users may create, edit or browse hypertext documents. The clients and servers are freely available.
workstation
A networked personal computing device with more power than a standard IBM PC or Macintosh. Typically, a workstation has an operating system such as unix that is capable of running several tasks at the same time. It has several megabytes of memory and a large, high-resolution display. Examples are Sun Sparcstations and Digital Alpha stations.
worm
A computer program which replicates itself and is self- propagating. Worms, as opposed to viruses, are meant to spawn in network environments. Network worms were first defined by Shoch & Hupp of Xerox in ACM Communications (March 1982). The Internet worm of November 1988 is perhaps the most famous; it successfully propagated itself on over 6,000 systems across the Internet. See also: Trojan Horse, virus.