Wireless Networking





An Overview of the Wireless Networking
Here you will find wireless networking tutorials, what is wifi, general security overview, wlans, wpans, wmans, wep and wireless access control overview. Whether you want to make a phone call from your mobile, received a message on your pager, checked your email from a PDA we have come across a wireless data or voice network.  
If a user or a company wants to make a data portable then Wireless networking is the answer. A wireless networking system can avoid the downtime, which may be caused in the wired network. A wireless network is also save your time and efforts in installing the lot of cables.
Also, if you need to relocate a client machine in your office, you only need to move the computer with wireless network card.
Wireless networking is very useful in the public places, libraries, hotels, schools, airports, railway stations where one might find wireless access to the internet. A drawback in the wireless internet is that quality of service (QOS) is not guaranteed if there is any interference then the connection may be dropped.

Wireless Network Types
Wireless Local Area Networks (WLANS)
WLANS allow users in local area, such as in a university or a library to form a network and gain wireless access to the internet. A temporary network can be formed by a small number of users without the need of access point; given that they do not need to access the resources.
Wireless Personal Area Networks (WPANS)
There are two current technologies for wireless personal network Bluetooth and Infra Red. These technologies will allow the connectivity of personal devices within an area of 30 feet. Infra Red requires a direct line and the range is less as compared to Bluetooth technology.
Wireless Metropolitan Area Networks (WMANS)
WMANS allow the connectivity of multiple networks in a metropolitan area such as building in a city. The network connectivity is the alternative of copper or fiber cabling.
Wireless Wide Area Networks (WWANS)
WWANS or Wireless Area Networks can be maintained over large areas such as in different cities or between different countries, via multiple satellite systems or antenna sites. The types of system are called 2G systems.
The following table shows the range those different types of wireless network covers.
Network Meter
Personal Area Network 0-10
Local Area Network 0-100
Wide Are Network 0-10000
Security in Wireless Networking
The following different types of security methods are available in the wireless networking.
Wired Equivalent Privacy (WEP)
Wired Equivalent Privacy is intended to stop the interference of radio frequency that is signaled by unauthorized users and this security measure is most suitable for the small networks. There is not key management protocol and each key is entered manually into the clients that’s why this is very time consuming administrative task. The WEP security method is based on the RC4 encryption algorithm. In the WEP all the client computers and Access points are configured with the same encryption and decryption keys.
Service Set Identifier (SSID)
Service Set Identifier (SSID) acts a simple password by allowing WLAN network to be split up into different networks and each having a unique identifier. These identifiers are configured in the multiple access points. To access any of any networks, a computer is configured in such a way that each is having a corresponding SSID identifier for that network. If the SSID match between the two computers or networks then access is granted to each other.
Media Access Control filtering (MAC Access Control)
A list of the MAC addresses of the client computers can be inputted into an Access point and only those computers are granted to give the access to the network. When a computer makes a request, its MAC address is compared to the list of the MAC addresses to the Access point and based on this access permission granted to deny.
This is a good security method but it is mainly involved in the small wireless networks because there is more manual work is involved of entering the MAC address into the Access point.
Bluetooth
Bluetooth is a simple type of the wireless networking that operates in the digital devices, like mobiles phones, personal computers, PDA, Laptops, digital camera, MP3 players and other Bluetooth enabled devices to form a small network. In the Bluetooth technology eight devices can be connected to each other at the same time. Bluetooth can also be found in the headsets, hands-free kits, wireless keyboards and mouse. Bluetooth technology was invented by Ericsson in 1994 and after four years in 1998 some major mobile phone companies such as Nokia, Ericsson, Intel and Toshiba formed a group to promote this technology.
Bluetooth technology falls in the category of personal area networking because it operates in the range of 30 to 300 feet. Bluetooth uses the radio waves technology, which is not very expensive and has low power consumption. Many different companies are intended to add the Bluetooth chip in their digital devices. Bluetooth technology is getting very popularity because of its low cost and portability.
The Future of Wireless Networking
WLANS wireless networking type is very popular in home networking and more than 20 percent homes with broadband internet are using WLANS and this number is increasing. In a general estimate worldwide hotspots have now reached more than 30,000 and will grow about 210,000 in the next few years. Most large hotels already offer Wi-Fi and the business travelers are willing to pay wireless access. 802.11 is the next Wi-Fi speed standard is set to offer bandwidth around 108Mbps and is still under development. With the speed of 70 Mbps and a range up to 30 miles, the 80216 standard, known as WiMAX is sure to get boost.
Some Tips & Tricks
• When purchasing a wireless NIC card try to get one that is having external antenna. When you are out and using Wi-Fi enabled laptop, disable Microsoft file and sharing, which enables other computers in a network to access data and resources on your computer. In this way, your computer or laptop will be saved from hackers.
• If you are concerned about the interference from the other wireless access point set the AP and wireless computers to use a non-overlapping channel.
• Change the configuration interface password of the access point before you enable it.
• Only buy an access point that is having upgradeable capabilities. By this way you can take the advantage of security enhancements.
• Keep the access point up to date.

WiFi Network





An Introduction to the Wi-Fi (Wireless Fidelity)
Here you will learn how to setup wifi network, how wireless fidelity works, hotspot security, vpn servers. Wi-Fi or wireless fidelity is meant for to be used when referring any type of 802.11 network, whether 802.11, 802.11a and dual band. Any products tested and approved as Wi-Fi certified by the Wi-Fi alliance are interoperable with each other.  
Typically, any Wi-Fi product using the same radio frequency will work with each other even if not Wi-Fi certified. Formerly the term Wi-Fi was used only in the place of the 2.4 GHz 802.11b standard in the same way Ethernet was used.
Wi-fi short for wireless fidelity refers to a set of wireless networking technologies and more specifically referred to as any type of 802.11 network, 802.11b and 802.11a and dual band. The word Wi-Fi was built by an organization named as Wi-Fi alliance. A product that undergoes the Wi-Fi alliance analyses is given the name Wi-Fi certified.
Wi-Fi rapidly gained the fame in the United States with the access point. These devices tested by the “Wi-Fi alliance” are used around the world and allow users to have Wi-Fi capable device like a PDA or Laptop to connect anywhere there is availability of Wi-Fi access point. There are currently three standards that are used to signify the speed of the connection. Both the 802.11a and 802.11b are the capable of 54 Mbps with 802.11a additional features. The most common standard is 802.11b/second because it can transmit the data at 11 Mbps.

All these Wi-Fi connections are fast enough to allow the broadband internet connection. Wireless Fidelity is a fastest growing wireless technology that will probably be as common as phone lines and electric devices. Wi-Fi adds great levels of convenience and high level of production.
Wireless fidelity is planned to be used with the wireless devices but it is most commonly used for internet access. With Wi-Fi you can connect computers in your home, office or anywhere without the need of wires. The computers can just connect to the network that uses radio waves.
How does W-Fi work?
Wi-Fi is the wireless technology to handle the networking/communication. Wi-Fi allocates internet connection globally and to be transmitted by the radio waves. Radio waves are the main cause of Wi-Fi. Radio waves are transmitted from antenna and Wi-Fi receivers pick them up. When a user receives the Wi-Fi signals, a wireless internet connection is produced and a user is prompted to provide the user name and password if required to establish a wireless connection.
What is Wi-Fi Security?
Wi-Fi maintains certain security issues. WEP or Wired Equivalent Privacy is used in the physical and data link layers. It was planned to provide the wireless security by protecting the data, while it transmits from one point to another. Wi-Fi networking usually maintained inside a building premises. The data transmission in the Wi-Fi is protected by Wireless LANs but due to the fact that data travels over the radio waves so there are chance that data can be exposed and capture.
How to secure your WiFi network?
When you buy a wireless router you might find an Installation CD by vendor that CD with guide you through a wizard on setting up router. Here are some suggestions that how can you setup security on the router without using the application software.
1. Open a new browser.
2. You may now type IP address of the router in your browser. The step here is where you can get the management system of the router. Due to different vendors, you need to lookup on your router’s manual for the IP address usually it may be 10.10.10.01, 196.168.1.1 or 192.168.0.1, 100.100.100.1 or something similar to those matches and the default password of the router. Every router management console is different from each other. Try exploring around and find the appropriate section to manage.
3. You should never forget this step to setup an administrative password. The step to set here is often not located in Security section; you will need to take a look at the utilities, user management or system settings. Find it and change the password immediately for any user account.
4. Enable Wireless security. To turn on your encryption look under the wireless security tab. The step over here will need you to either use WPA or WPA-PSK and this will only appropriate if the devices on your network supported it. Otherwise you will need 128-bit WEP. For WPA or WPA-PSK, you would have to type pass phrase/password into a piece of paper and transfer to thumb drive so that you can set the password in the client’s machines.
5. Change your SSID. You should not make your SSID this will be probably a default SSID, normally those who do not configure their SSID will have their router name such as “linksys”, “belkin”, “dlink” etc. Try changing it with someone menacing, which will be threat for them to connect. Like virus geek, virus spreader. Remember that you will need this SSID when you browse through the network from your client machines. You can find these settings in the section of Channel or SSID.
6. Save your configurations and settings by pressing the save changes or save settings button. You will need to save every change that you will make to the router in order to it can take effect and probably you will have to reboot your router multiple times.
Congratulations, finally you have covered the basic settings for your Wi-Fi network
Wi-Fi Hotspot Security: Using VPNs
There are numerous security issues regarding the use of the public wireless networks but all of which can be overcome. One of the solutions for users, as brought up in Wi-Fi Hotspot security, is to use the VPN (Virtual Private Network) to secure the real time traffic of the Wi-Fi hot spot users. Many small to large businesses provide their employees with the VPN access.
Although this access is typically put in place for employees to have the remote access to the corporate network in order to access the files and documents remotely. If you don’t have access to any VPN servers, create your own. By doing this you can remotely access the files from your office as well as other devices such as Wi-Fi video camera to keep an eye on the things while away.
When using the software-based VPN server features in Windows XP Pro, the PC running the server has to be powered-on to access the home network from the Wi-Fi hotspot. VPN routers can cost as low as $70 to $130 and the popular models are Linksys, WRV200 and WRV5G.

System Administration Tips





System Administration Tips
Here you will learn some basic network administration tips, how to secure your computer network, basic troubleshooting guide, it management tools, security measures and basic network troubleshooting tips. The administration of a computer network is a very responsible task of the network administrators. There are certain administration tips if followed, the management becomes easy. Being a network administration you should know the basic network technologies such as TCP/IP, Ethernet, cabling system, basic network hardware, software, directory services and some basic network troubleshooting techniques.
 
Always document your network resources and configurations such as network hardware and software inventory, computers, basic network configurations, logon scripts. Also take a complete backup of your server’s data and manage the resources of network server in such as way that simultaneous access to the server does not affect the performance of the server.
Keep your network software inventory up to date and assure that you have these utilities such as data recovery tools, backup utilities, troubleshooting tools, TCP/IP ports and performance monitoring tools and up-to-date antivirus software
Make your network administrator’s password complex and also train an assistant network administrator. Keep an up-to-dated network security tool such as GFI LanGuard, which can prevent your network from any kind of internet or external security attack. Put a strict restriction in the server room and only authorized persons should be allowed to enter in the server room. Regularly take back of your critical data on other hard disks and write backup data on the CDs. After installing and configuring your server, take an image of your whole hard disk, with a good utility such as Norton Ghost. Always get ready an updated disaster recovery and fault tolerance plans. Do not leave the serve room unattended there must be someone responsible person present every time in the server room. Besides these general tips I have also provided list of the information tips.

Following are the basic tips for administering a computer network.
1. If you are preparing a new system, make sure that you are using the best installation source such as an installation CD. After installing the operating system, also install up-to-date antivirus program such as Norton antivirus, Trend Micro, McAfee, Panda Antivirus or any other antivirus program of your choice.
2. After completing the installation process of all the networking computers, test your network for the performance, speed and security.
3. Keep your network design simple and segment your network in different sections so that it would be easy to isolate a faulty component of the network.
4. Regularly upgrade your network computers with the latest antivirus definitions, software patches and other security measures.
5. Purchase a planned hardware for your network and make a documentation of your hardware and software inventory.
6. Only install the required software applications on your server and networking computers. Any kind of unauthorized software or web based application can become source of viruses and other malicious codes from the internet.
7. Define network IP address, crate user accounts, create user material and keep the resources closer to the user.
8. Train your IT staff as well as all the users and warn them about any unauthorized activities.
9. Administer the access to the internet and put a tight security restriction on the unauthorized internet usage and block all the unwanted ports and web based application access.
10. Secure your gateway computer or proxy server as much as possible because gateway is directly exposed to the internet.
11. Mirror your hard disk.
12. Structure your network.
13. Being a network administrator, always research and test new network technologies and trends.
Also you must know the basic network technologies and troubleshooting tips. Do research and make a plan before setting up a network for your organization or clients. Always fill your resource kit with the data recovery software, backup utilities, up-to-dated antivirus programs, cable testers, cable cutter, cable connectors and other network security and troubleshooting tools. Also, keep yourself upgraded with the latest networking knowledge networking certifications such as MCSE, CCNA, CCNP, Network+, and Server+. Share your knowledge with your colleagues, IT managers and also reply the various networking troubleshooting and management related questions in the different forums on the internet. Hopefully this tutorial will provide you the basic understanding and insight of how to administer a computer network.

Mobile Technology and Communications





Introduction to Mobile Technology and Communications

Here you will learn about mobile technologies, mobile phones, wireless communication introduction, overview to gsm, gprs, sms and mms reviews. A cellular or mobile phone is a long range portable electronic device for communication over long distance.
Current Mobile Phones can support many latest services such as SMS, GPRS, MMS, email, packet switching, WAP, Bluetooth and many more. Most of the mobile phones connect to the cellular networks and which are further connected with the PSTN (Public switching telephone network). Besides mobile communications, there is a wide range of mobile products available such mobile scanners, mobile printers and mobile labelers.
Mobile Network Technology
Mobile phones and their network vary very significantly from provider to provider and country to country. However the basic communication method of all of them is through the electromagnetic microwaves with a cell base station. The cellular companies have large antennas, which are usually mounted over towers, buildings and poles. The cell phones have low-power transceivers that transmit voice and data to the nearest sites usually within the 5 to 8 miles (8 to 13 kilometers away).

When a mobile device or phone is turned on, it registers with the mobile telephone exchange or switch. It is a unique identifier and is alerted by the mobile switch when there is an incoming phone call.
The handset listens for the strong signals from the nearest base stations. When a user moves, the mobile device handoff to various nearest sites during phone calls or while waiting between calls it reselect the nearest cell phone sites.
Cell sites have relatively less power radio transmitters. They broadcast their presence and relay communications between the mobile handsets and the switch. On the other hand, the switch connects the call to the same or another mobile network or subscriber.
The dialogue between the mobile phone handset and the cell phone site is a stream of the digital data, which includes the digitized audio. This technology depends on the same system as of mobile phone operator. Some mobile phone technologies have adopted the AMPS for the analog communication and D-AMPS, CDMA2000, EVDO, GSM, UMTS, and GPRS for the digital communication. Each mobile phone network has a unique radio frequency.
There are different mobile communication methods, such as SMS, WAP, WLAN, WIFI, GPRS, Bluetooth, Infrared, IrDA and I-Phone etc. Mobile phones are different from the cordless telephones because they only operate within the specific range. Many types of the mobile computers have been introduced including the Laptop computer, Subnotebook, Portable data terminal (PDT), Personal digital assistance (PDA), Tablet personal computer and smart phone.
Mobile phone features
Mobile phones have features beyond sending text messages and making the short or long distance voice calls, the other features including internet browsing, mp3 playback music, email, personal organizer, built in cameras, MMS, PPT, SMS, call registries, built in games, voice mails, downloading, video call, Bluetooth, infrared and they also serve as the wireless modem for a pc. In many countries of the world such as Australia, Pakistan, India, Maldives and Israel the incoming calls are free. However, in Canada, Hong Kong and the United states a person can be charged per minute for the incoming calls. Few mobile phones carriers in the United States are beginning to receive unlimited phone calls. Mobile technology has both negative and positive impact on every day’s life.
Health impact
Since the invention of the mobile phones many concerns have been raised about the potential health from the mobile phones. Study at the Danish Institute of cancer epidemiology does not show any link between cancer and mobile phone usage. This study only covers the analog phone usage till 1995. However the study by the International Agency for research on cancer shows link between cellular phone usage and tumor frequency.
Mobile dating
Mobile dating also known as cell dating and it allows users to chat, meet and possible involves in romance by SMS, chatting and the web. These services allow their subscribers to provide information about themselves in a short profile and which is stored in the cell phone sets as a dating ID. The users can search for the other IDS or call at a number given to them by the service. Users can find others with the criteria of age, location and gender. Most of these sites are free to use but the standard fees of SMS and dating service charges can apply per minute. Mobile dating websites focus attention on users that share the same social network and proximity.
Some cellular companies offer services such as homing device. This service alerts the users when someone is within the thirty feet of the user. Some cellular companies use Bluetooth technology to connect the users in the bars, clubs and social gatherings and this service is called proximity dating. These services are more popular in European countries, United States, Australia and Canada. Mobile dating websites are gaining popularity.
Mobile Learning
M-learning’ is the follow up of E-learning and which originates from D-learning (distance learning). M-learning is the delivery of education to the students who are not having fixed location or who prefer to use mobile phone technology for learning. The rapid growth in the mobile and communication sector make it possible to develop new forms of education. M-learning means delivery of education by means of the mobile phone devices, PDAs and audio players. M-learners seek the lessons in the small format.
Mobile software
Windows mobile, Palm OS and Symbian OS supports typical application binaries as found on the personal computers. Windows mobile also supports portable executable format which is associated with the .NET Framework. Both Windows Mobile and Palm OS provide free SDK and integrated development environment for the developers. BREW is another format which gives complete control of the handset and access to all its functions. Java (J2ME, Java ME) runs atop a virtual machine, which allows reasonable functionalities. Because of the extra security and compatibility, it is quite simple to write, distribute and execute the mobile Java applications.
Mobile Internet
According to the many sources, one of the major factors of the usage of mobile internet is its speed. Mobile internet has faster connection. Due to this fact, many users tend to use mobile internet. The introduction of the 3G cards has a competitive high speed. All the current service providers and trying to increase their bandwidth to get more customers. The numbers of mobile phones that are cable of surfing the net have been increasing rapidly. One of the greatest problems when browsing the net on the cell phones is the small size of the screen. Because of this many developers are developing the websites that can easily be seen on the cell phones as well.
Mobile society.
Ongoing debates about the cyberspace, e-computing and E-commerce have suggested that the online world somehow will be dramatically different from the life in the analog world. It is true that E-commerce continues to grow and the specific locations of the persons and businesses do not matter that much anyone. This is also true that now we are seeing forums, blogs, discussion groups and social network to re-socialize and form new tribes on the internet. It seems that everyday we are increasingly connected via technologies such as email, cellular phones, instant messaging and all of these technologies are increasingly interconnected with each other. When we communicate on our cell phones, we are also mobile in the sense that we can move freely while in the constant communication.
Here Mobile Phones you will learn about the mobile technologies, cellular phones, wireless communication introduction, overview to gsm, gprs, sms and mms reviews.
When looking for a mobile phone deals, check out phones4u.co.uk for the latest reviews on phones like thesamsung pixon 12 



GSM Technology





What is GSM ?
Here you will learn about gsm network technology introduction, cellular operators, cdma, voice mail, sim cards, dual band, quad band, communication channel, wireless communication and gprs overview. GSM was first introduced in the Finland in the year of 1991. GSM mobile phones operate on the TDMA systems. In the TDMA (time division multiple access system), multiple users can access single radio frequency without any interference. GSM is now the de facto standard for the mobile communication in the world.  
The GSM (Global System for Mobile Communications) is a hugely successful wireless technology in the world. GSM has become the world’s largest growing communication technology and it has been expand in more than 214 countries of the world. The TDMA technology provides the individual time slot within a specific channel for each user.
GSM leads the world as the fastest growing mobile/wireless digital technology that is most reliable and is available in the marketplace today. GSM provides the integrated high-speed data, fax, voice mail, paging and short messages services features. GSM offers the secure communication, privacy and fraud prevention.

After subscribing to the GSM service, you can use your phone at your home, office, across the continent or around the world with the country specific SIM cards. GSM operates on the different frequency levels like 900 MHz, 1800 MHz or 1900 MHz.
1900Mhz is used in the North America and 1800 MHz is for the other locations. Different mobile phone networks around the world operate at different frequencies. If you wish to use your mobile phones outside of your GSM frequency range then you should use a mobile/handset that support multiple frequencies. Before buying a mobile phone, make sure that it is compatible with the different bands of the GSM.
Dual-band – A dual band phone operates at different spectrum like 900 MHz and 1800 MHz. Dual-band GSM works in Europe, Asia, Africa, Australia and Sound America.
Tri-band – A tri band phone operates on the three different frequency levels like 900 MHz, 1800 MHz and 1900 MHz. This means that you can use your mobile phone in Europe, Asia, Australia, Africa and North America.
Quad-band – A quad band GSM capable phone allows you to roam almost everywhere in the world. It covers the different frequency ranges like 850 MHz, 900 MHz, 1800 MHz and 1900 MHz. 99% countries in the world use the GSM standard and it seems that GSM will eventually be the only cell phone standard in the mobile communication world. GSM provides the best voice quality and standard.
Today, there are more than 720 GSM mobile networks across the more than 214 countries. According to the recent statistics, there are more than 2 billion users of the GSM in the world. Major GSM using countries includes China, Russia, United States and India. A mobile phone can be a bewildering affair for a traveler. It is mostly incompatibility with the network of your visiting country, since every country in the world has different frequency band of operation. With a GSM enable mobile phone you can access more than 214 countries around the globe.
GSM is a state of the art technology offering voice, data, fax and SMS capabilities. Most of the mobile phone operators now offers email to SMS service by which you can receive the important news, flight status and other useful information on your mobile phone. Many operators give access to the ISDN services by which fast data transmission is possible. Many other offers GPRS (Global Packet Radio Service) with this service you can connect to the high speed data communication channel like 9600 bps. The two major GSM service providers in the US are the T-mobile and Cingular.
The iPhone 4 is one of the most popular quad band enabled mobile phones currently on the market, it's a good idea to compare prices before you buy. Sites such as Mobile Phone Genie allow you to find the best iPhone deals.

Web Server





What is a Web Server?
Learn Web server software overview, how to configure, how it works, apache, tomcat. Web server is a computer including a software package that provides the specific services to the client computers. Web server delivers the web pages. Every web server has an IP address and a domain name. If you sends a request through your browser for this website http://www.networktutorials.info, the request goes to the server whose domain name is networktutorials.info.  
The server fetches the index or main page of the website and sends it to your browser. Web-based servers are used for hosting the websites. One web server can hosts thousands for one sites. But in the hosting companies there are number of the web servers for load balancing and sharing the other services.
The web hosting companies offer different types of hostings services including Ecommerce hosting, CPanel hosting, PHP hosting and reseller hosting.
A computer can be act as a web server by installing and configuring the server software and connecting the computer to the Internet. Normally, web server computers have to be turn on (online) for almost all the day.

There are many software applications that are used as the web server like IIS, Apache web server, Tom Cat web server. A web server typically accepts thousands of the concurrent incoming requests for the specific domain, that it hosts.
In case if the server is down for any reason, the websites that are hosted on this server cannot be accessed. So the downtime is a biggest negative thing for the web hosting companies. Many hosting companies have to mention the uptime of their servers for the client’s satisfactions like 99.9 % uptime. You may have seen this percentage on many hosting companies’ websites.
The web servers serves the objects in the form of html documents, plain text, images, sounds, video and some other form of the data. Many of the data types may not be placed in the static form but they are shown on the run time by the software programs, that are installed on the web server and the CGI scripts are the most common form of these programs.
Web servers and the browsers such as internet explorer, Firefox, Netscape, Opera etc communicate with the web server by using the HTTP protocols (Hypertext Transfer Protocol). This is very effective method of requesting the data over the Internet. Web servers are in various shapes and sized and run under different operating systems like Windows, Linux, and Unix etc. They are also range differently in prices and working.
Apache Web Server
The Apache web server is the most popular and most commonly used web server today. Apache web server has many features and good functionality that appeals to the users and that’s major cause of its popularity. On the other end, Microsoft’s IIS still is struggling to complete fully with apache web server. IIS is a very good server on the NT platforms and Apache is compatible with the Linux/Unix platforms.
Another big reason for the worldwide acceptance of the Apache web server is its stability. Many big websites on the Internet has chosen Apache web server for their hosting needs.
Additionally, Apache web server is a relatively fast. If your website contents are static then Apache’s working is very efficient and fast and on the other end, if you are using scripts like CGI scripts or others, it usually slows down the speed of the Apache web server.
A Web server is simply a little piece of the software, it takes the file name sent in the GET command, retrieves that files and send it back to the browser.
Most servers implement some level of security on the serving process. For example login/password accessible page requires the proper login and password from the users to accept that page. Web servers have the database and login information of the entire subscriber and only a subscriber of that typical service will be able to see that page. Additionally, while doing secure transactions the web pages allows encrypted transactions between the browsers and the servers such as on the E-commerce websites and other websites where a transaction through a credit card is required.
Basic Overview How Web Server Works
A web server performs various tasks on the request from the clients. To understand the working of the web server, it is necessary to first understand that what is client and server and what is their relationship with each other. A client is a program that sends request to a server and server responds to the requests of the clients.
This generic definition covers many types of relationships between client and servers like database server & web server etc. Web server have to be connected to the internet because client computers need to access them for various needs like data, files, graphics, video and html documents access.
The client program such as browsers and typically designed for the purpose of communicating with the web servers. A browser itself has different levels of features and security. To start the communication between the client (browser) and the server, a set of rules or agreed upon way is required and that is called a protocol. To access the web pages from the server HTTP protocol is required and for the file sharing access FTP protocol is required. There are a large number of the web protocols.
A web server is configured and designed in such a way that it responds to the thousands of the concurrent incoming requests from the clients for different things like html documents, graphics, images or video etc.
Rely on cloud server hosting for an efficient and reliable website solutions.



Ethernet





What is Ethernet ?
In this section you will learn about the lan terminology, basic ethernet networking overview, a general introduction to LAN, introduction to IEEE, lan topologies, wan standards. You can also find these categories in this site such as network tutorials, computer networking guide, what is networking, tech study guides, topologies, what is data recovery, wireless communication, computer interview questions and network certification. The IEEE standards have been developed by the International Standards Organization (ISO). The Institute of Electrical and Electronic Engineers (IEEE) in 1985 produced a series of standards for the Local Area Networks, which are called IEEE 802 standards. 
These standards have been accepted widely throughout the IT world. One of the IEEE 802 standards, the IEEE 802.3 is known as “Ethernet”. Ethernet is the most widely used LAN technology. Ethernet was developed by Xerox corporations in 1972 and it was the first LAN.
According to the ISO standards allows manufactures to produce the devices and equipments, which are guaranteed to operate anywhere.

The Ethernet in its simplest form uses a passive bus that operates at 10 Mbps. The bus is formed from the co-axial cable, which connects all the PCs in the LAN.
A single LAN may have 1024 attached computers, although in the real practice most LANS have fewer computers than this number. One or more segments of the co-axial cable are attached to end to end to create the Ethernet Cable Segment. Each segment is terminated by 50 ohm resistors.
In today’s IT world the reliable and timely access to the information has become vital. Today coworkers thousands of miles apart from each other can share data, voice, video etc with the fractions of seconds. Similarly a larger number of the coworkers can review the research data simultaneously. The Internet allows businesses to share information and resources with their customers.
Ethernet is a communication protocol that is embedded in software and hardware devices that intended. Ethernet has become the standard computer networking protocol with the help of the Xerox, Intel and Digital
A basic LAN consists of the following components.
• Two or more computers.
• Network Interface card or LAN Card in each PC.
• Ethernet cable (Cat5, UTP/SPT) cable to connect the two computers.
• A hub, switch or router to route or direct the network traffic.
• Software for the communication/computer networking.
A network interface card (NIC) is attached and installed in each PC and is assigned a unique address. An Ethernet cable is used to connect two computers; Ethernet cable has RJ45connectors at both ends. There can be two scenarios 1. Two computers can directly connect with each other or 2. Each computer is directly connected with the hub/switch and hence communication occurs in the network. The hub or switch acts as relay.
Computer Network can be wireless. Despite of using Ethernet cable for the communication, Wireless Network Interface cards use radio waves to communicate with the wireless switch or hub. A small antenna is used in the wireless NICs, switches and hubs. Although the wireless networks are more easy to use as compared to the cabled networks, but more configurations and extra care is required to setup and run a wireless network.
The alternate technologies to Ethernet are “Token Ring”, which is used in the Ring Topologiesnetworks. Token Ring is designed by the IBM and ATM. In ATM networking, devices are connected with each other over a very large distance (thus forms the WAN), and behaves like LANs.
Ethernet is a well established and widely used network standard for small to medium sized Ethernet networks as well as for other networks. Ethernet has been used over the 3 decades and forms a very excellent networking/communication environment.
Ethernet Terms
Ethernet follows a simple set of rules. To understand these rules its important to understand the
following terminology.
• Node – The devices that are attached to the segments are nodes.
• Frame – The nodes (computers or network devices) communicates in the form of short messages that are known as frames. The frames are chunks of information with variable size.
• Segment – A single shared medium is known as a Ethernet segment.
• Medium – The Ethernet devices are attached to a common medium. The frames of the data travel along with that medium. This medium can be coaxial cable. Today most commonly used communication mediums are UTP/STP cable, fiber optic cables.
Frames are analogous in human language. We have some rules for constructed the sentences. The
Ethernet protocol specifies a set of rules for constructing the frames. The frames length varies. Each frame must contain source and destination address for the identification of the recipient and the send of the message. The nodes can be uniquely and easily identified. Each Ethernet devices must have a single unique address.
Compute networking standards has brought a revolution in the network computing and it made the communication very easy and standarized. Now every computer and networking devices has to to follow the same standard to communicate with each other.

Configure a Network





How to Configure a Network
In this section you will learn how to configure a network, peer to peer, client server, workstation, server, basic data communication.
Peer to Peer network model
Before configuring a computer network, you have to decide that, which networking model you require. There are two main types of network models. Peer to peer and client-server network model. In the peer to peer network model you simply use the same Workgroup for all the computers and a unique name for each computer.
Additionally, you will have to give a unique IP address of the same class A, B, or C for all the computers in your network and its related subnet mask e.g if you decide to use class A IP address for your three computers in your Peer to Peer network then your IP address/Subnet mask settings can be as follows.
Computer Name IP Address Subnet Mask Workgroup
PC1 100.100.100.1 255.0.0.0 Officenetwork
PC2 100.100.100.2 255.0.0.0 Officenetwork
PC3 100.100.100.3 255.0.0.0 Officenetwor


Please note that the above example is for only illustration purpose so you can choose any IP address, computer name and workgroup name of your interest.
For doing this right click on My Computer and then click Properties then go to the Network Identification section and set these.
In a peer to peer network all computers acts as a client because there is not centralized server. Peer to peer network is used where not security is required in the network.
If a computer fails to work then all other computers work normally in peer to peer network.
Client/Server Network Model
In the client/server network model a computer plays a centralized role and is known as a server all other computers in the network are known as clients. All client computers access the server simultaneously for files, database, docs, spreadsheets, web pages and resources like hard diver, printer, fax modem, CD/DVD ROM and others. In other words, all the client computes depends on the server and if server fails to respond or crash then networking/communication between the server and the client computes stops.
If you want to configure a client-server network model then first prepare the server. Install Windows 2000 or Windows 2003 Server from the CD on the server computer and make a domain. You can create a domain by this command on the Run “DCPROMO”. You can give this command once you install the server successfully. After you give the DCPROMO command you will be asked for a unique domain name. All the client computers will use the same unique domain name for becoming the part of this domain. This command will install the active directory on the server, DNS and other required things. A step by step wizard will run and will guide you for the rest of the steps. Make sure that a network cable is plugged in the LAN card of the server when you run the DCPROMO.exe command.
When the Active directory is properly installed on the server, restart the server. You can create network users on the server computer and also name/label the network resources like computers/printers etc.
Once you install the server successfully now come to the client computers. Install Windows 2000 professional on your all client computers. Once you install the Windows 2000 professional on the clients the next step is to make this computer (client computer) a part of the network.
Configuration Steps
1. Choose a unique name for each client computer
2. Choose unique IP address for each computer and relevant.
3. Use the same domain name for all client PCs.
Network/System administrators are required to do these administrative tasks on the server and client computers. Any shared resources on the network either on the server or the clients can be access through the My Network Places in the Windows 2000 platform. There is another way to connect to the shared resources by giving this command in the run \\ComputerName\SharedDriveLetter.
Network configurations steps can be implemented by right clicking the My Computer>Properties>
For giving the IP address you will have to right click on the My Network places>properties>Local Area Connection>Properties>Internet Protocols (TCP/IP)>Properties and then give the IP address and subnet mask of the same range and class for all the computers in the network.

Computer Network Topology


An Overview of Computer Network Topology
Here you will learn network topology introduction, how computers get connected, bus, star, hub, hybrid, mesh, tree topologies and network physical design. In Computer Networking “topology” refers to the layout or design of the connected devices. Network Topologies can be physical or logical. In this section I will illustrate on the different types of the topologies.
Physical Topology means the physical design of a network including the devices, location and cable installation.
Logical Topology refers to the fact that how data actually transfers in a network as opposed to its design.
Topology can be considered as a virtual shape or structure of a network. This shape actually does not correspond to the actual physical design of the devices on the computer network. The computers on the home network can be arranged in a circle shape but it does not necessarily mean that it presents a ring topology.
Computer network topologies can be categorized in the following categories.
  • bus 

  • star 

  • ring

  • mesh 

  • Tree.

Hybrid networks are the complex networks, which can be built of two or more above mentioned topologies.
Bus Topology
Bus topology uses a common backbone to connect all the network devices in a network in a linear shape. A single cable functions as the shared communication medium for all the devices attached with this cable with an interface connector. The device, which wants to communicate send the broadcast message to all the devices attached with the shared cable but only the intended recipient actually accepts and process that message.
Ethernet bus topologies are easy to install and don’t require much cabling and only a main shared cable is used for network communication. 10Base-2 and 10BaseT are two popular types of the Ethernet cables used in the Bus topology. Also, Bus network works with very limited devices. Performance issues are likely to occur in the Bus topology if more than 12-15 computers are added in a Bus Network. Additionally, if the Backbone cable fails then all network becomes useless and no communication fails among all the computers. Unlike in the Star topology in which if one computer is detached from a network then there is not effect on the other computers in a network.
Ring Topology
In ring Network, every computer or devices has two adjacent neighbors for communication. In a ring network, all the communication messages travel in the same directory whether clockwise or anti clockwise. Any damage of the cable of any cable or device can result in the breakdown of the whole network. Ring topology now has become almost obsolete.
FDDI, SONET or Token Ring Technology can be used to implement Ring Technology. Ring topologies can be found in office, school or small buildings.
Star Topology
In the computer networking world the most commonly used topology in LAN is the star topology. Star topologies can be implemented in home, offices or even in a building. All the computers in the star topologies are connected to central devices like hub, switch or router. The functionality of all these devices is different. I have covered the detail of each networking devices in the separate portion of my website. Computers in a network are usually connected with the hub, switch or router with the Unshielded Twisted Pair (UTP) or Shielded Twisted Pair Cables.
As compared to the bus topology, a star network requires more devices & cables to complete anetwork. The failure of each node or cable in a star network, won’t take down the entire network
as compared to the Bus topology.
However if the central connecting devices such as hub, switch or router fails due to any reason,then ultimately all the network can come down or collapse.
Tree Topology
Tree topologies are comprised of the multiple star topologies on a bus. Tree topologies integrate multiple star topologies together onto a bus. Only the hub devices can connect directly with the tree bus and each Hub functions as a root of a tree of the network devices. This bus/star/hybrid combination supports future expandability of the computer networks, much better than a bus or star.
Mesh Topology
Mesh topology work on the concept of routes. In Mesh topology, message sent to the destination can take any possible shortest, easiest route to reach its destination. In the previous topologies star and bus, messages are usually broadcasted to every computer, especially in bus topology. Similarly in the Ring topology message can travel in only one direction i.e clockwise or anticlockwise. Internet employs the Mesh topology and the message finds its route for its destination. Router works in find the routes for the messages and in reaching them to their destinations.The topology in which every devices connects to every other device is called a full Mesh topology unlike in the partial mesh in which every device is indirectly connected to the other devices.
Summary
Topologies are the important part of the network design theory. A better network can be built if you have the knowledge of these topologies and if you know the difference between each topology. Similarly you should have the knowledge of each network device so that you can properly use them according to your network needs. A misconfigured network can result in a waste of time and energy as well as a lots of troubleshooting methods to resolve the issue. So thebasic understanding of the network topologies and network devices is a must to build a good network.

Ways For Teens To Make Money-some Great Tips To Help You Profit From The Internet

So what are some of the best ways for teens to make money? There are many different ways to do this: you can simply go out and get a job and get paid $10 an hour, or you can start working from home. The vast majority of teens will just get a job to start getting some quick cash, and therefore will never learn entrepreneurial skills.

Unfortunately, this can get them into the bad habit of keeping a job the rest of their life. Having a job will never give you financial freedom , because it will never provide you a long-term income stream.

Simply, the minute you stop working your job, the money stops coming in. You can never sell your job to anybody else, because there is no equity involved with it. However, when you build a business, there is equity that gets built up you can then sell it for quite a bit of money.

Today, the vast majority of teens just go out and get a job, never even consider starting a business. This isn't their fault. Quick simply, the school systems do a very bad job of teaching kids entrepreneurial skills, and instead only teach them job skills.

Also, the schools do a very poor job teaching money and financial skills, another necessity for owning your own business. Starting a business isn't even a consideration for most teens as a viable way to make money. Here some ways for teens to start making money with their own business quickly and easily.

As with anything, the Internet offers the most potential to start making money quickly and easily for teens, as well as anybody. What are the quickest ways for teens to make money online today?

The absolute fastest are either affiliate programs or blogging. Affiliate programs are where you start selling other people's products that they have already developed, and simply send them to their website to your affiliate link. You then get a certain percentage of every sale.

One of the best parts about this is that you don't even need a website to start promoting this: simply get an affiliate link three their clickbank or their own affiliate program, start posting ads on the Internet or even in e-mails. This is one of the best ways for teens to make money.

If you know a lot of people's emails, you can simply e-mail them and include the affiliate link at the bottom; also, you might post in forums and other places. Don't ever spam people; simply send them a legitimate email, and include the affiliate link in the bottom.

This is probably the fastest are making some quick money on the internet. The bottom line: remember that you certainly could start making some quick money by going out and getting a job. In fact, it would probably happen faster than if you became an entrepreneur. However, remember that getting a job will never make you wealthy, it will only make your boss rich.

Even if you simply market somebody else's product through an affiliate program, it will teach you some invaluable skills about starting your own business and being an entrepreneur. Hopefully these tips will give you some great ways for teens to make money and start learning entrepreneurial skills as well.

Does Your Business Need a Newsletter

If you are not yet using a newsletter as a part of your internet marketing efforts then you are missing out on potential and existing customers becoming valuable long-term buyers.

Newsletters provide an effective tool for collecting interested visitors' email addresses and converting them into buyers. They also are a great vehicle for keeping in touch with your most valued contact - previous customers. How?

NEWSLETTERS KEEP CUSTOMERS

When you have a customer buy from you, but no newsletter to follow up, than you are virtually handing him or her back to your competitors. Of course, if the service was good and the product memorable they may come back, but what if you have a new product that your existing customer may wish to buy and they do not know about it? What if they lose your website address? What if they just forget about you? A newsletter will prevent these things from happening.

HOW OFTEN?

That depends on various factors. Some businesses contact their subscribers as often as every day, others as infrequently as several times per year. What works for you depends a lot on what you are selling, what information you can give them, how often your subscribers will want to hear from you, etc.

A good rule of thumb for many businesses is once per week. Twice a month if you really feel that is the most you can do. More often and the customer may unsubscribe or routinely delete your messages. Less often and you're allowing your competition the chance to win over your potential customer.

WHAT DO I WRITE ABOUT?

Are you very informed on the product or service? Do you have a lot of contacts? Can you point out related products or services they might be interested in?

You do not need a long newsletter. A sale alert or announcement of a new service or product can do just as well for some businesses, while others find a tips format more suitable. Industry news or 'How to...' and 'Top 5...' topics are a good idea and always try to make a connection between the newsletter and your product or service. Subscribe to several competitors' newsletters (they will surely be subscribing to yours). Use a free email account to subscribe and see what they are providing their customers.

KEEP IT CONSISTENT

It's amazing the amount of newsletters that abound online. Because of this subscribers can forget which ones are legitimate and which are spam.

Keep your format consistent so your newsletter becomes visibly familiar. Also indicate that the subscriber requested the information and provide an unsubscribe link on EVERY issue. You must do this if you want to limit complaints or spam reports.

Your newsletter deserves time and attention - it is the voice of you and your business and will help you to build relationships with your customers (and potential customers) in a way that no other tool can.

Article Marketing - Content Is King

Since the beginning, you've been told that "Content Is King" but there are so many website owners - who have been trying to win the search engine battles - ignore the rules and try to be 'smart'. They used software and tools to trick the search engines to get their websites indexed highly but only to find out that their websites were banned a month later.

Don't get me wrong! There are actually some legitimate tools that can help you get your websites ranked higher. People pay a hundred dollars or more just to own them. That is fine as long as it works and does not violate the criteria search engines are looking for on a website.

But why are they doing it?

For an obvious reason, I guess - to get as much traffic possible to their websites, which in turn produces more revenue to the website owners.

And then, there are really smart marketers who go by the "Content Is King" rules and are really winning the search engine games day by day. These marketers use words to turn into traffic. With a single 500-word article, within time, they can create hundreds of backlinks to their websites – resulting in more web traffic, more sales, and more profits. Then, they write one more article, and some more.

That's right – we call them article marketers. You can see their names when you search a keyword and their articles appear on the main page of the search engine. You click on the links and their articles come up.

Now let me tell you a little secret. These marketers don't write these articles and post them only on their websites.

First, they write these articles and at the same time allow others to reprint them for free. That makes you able to forward these articles to other people and these other people can also forward to more people provided the content of the articles are not changed or modified. In short, these articles are viral.

Second, they submit these articles to various article directories and online publishers to get maximum exposure. The more publishers they can find, the more audience they can reach. Thus, the more sales they can make.

Think about it. If the pros are doing it and they are getting tons of traffic and sales, then you too can have the same privilege - only if you follow their steps.

Wouldn't you want to generate sales without having to pay a single red cent?

If the answer is a resounding 'yes', then consider article marketing seriously.

Blogging And Adsense - The Simple Way To Make Money

You can believe one of two things about making a significant income from Google AdSense.

1) If you believe the claims of those who are promoting AdSense with the products they are selling, then Google AdSense is the key to your early, as in nest year, retirement.

2) If you believe those who have spent the past year working with AdSense and received something in the neighborhood of $100 for their efforts, you will begin devising an alternative retirement strategy.

But is there a middle ground, a third option which will allow you to make a reasonable income from Google Adsense in return for a reasonable amount of works? There certainly is, if you don't keep looking for the magic tricks and resign yourself to repeating the same R&D over and over again.

Keywords are at the heart of any successful Google AdSense campaign, and you need to find the right ones. The right keywords will be determined by your source of traffic.

If you intend to use natural SEO, then your will need to get and Adwords account and use it to research the keywords with good PPC value, good bidder density, and not many competitors.

Any keywords which can supply you with all three are the ones on which you should build your niche, so use them to build a search engine optimized site, post your AdSense ads, and start looking for your traffic to arrive.

Then do it again, and again, and again, until you have enough sites built on enough smartly chosen keywords to make AdSense pay off for you.

There's one more way to build respectable revenue from Google AdSense. It's called arbitrage, and what it means is that you will buy PPC traffic directly from Google via AdWords, and then steer that traffic to your site displaying AdSense ads.

If you want to engage in arbitrage, look for high PPG value keyword for your websites, and low PPC costs for your ads.

While either of these strategies, if implemented correctly, can generate a reasonable and ongoing income from Google AdSense, the real keyword is patience: you'll almost certainly have to wait months before you see your first AdSense checks.

If done properly, either of these techniques can yield a consistent income, but more than likely, it will take months before this occurs.

RSS:Why You need It

There seem to be several theories as to what RSS stands for so I will go with the most popular, Real Simple Syndication.

OK, enough geek speak, you want to know what it can do for you, right?

I imagine your car radio has several stations programmed in. These will be the stations that best fit your tastes. There may be a few featuring your favourite music and perhaps a traffic report station. Having them programmed into your radio means you can access them with one push of the button instead of searching everytime you want to tune in.

RSS can do the same for your web browsing. Rather than opening endless emails or trawling through websites hoping to find a nugget of useful information you can subscribe to RSS feeds from the people that have something interesting to say.

Your RSS reader will give you a headline and perhaps a line or two from the latest update and you can then decide whether to read on or not in much the same way as you scan the headlines in a newspaper until you see a story of interest.

There are RSS feeds available on just about every topic you can imagine. Whether you want to keep up on world news or the latest trivia you will find many feeds of interest. If your tastes change or the quality of the content drops off then you can just delete the RSS feed from your reader. No more opting out of email lists, putting up with 'follow up' autoresponder messages, just instant on/off access to information that deserves your attention.

This has to be good news as with the rise in popularity of RSS feeds the publishers of feeds have to stay on top of their game. They know that it is very easy for you to wander off elsewhere. You wouldn't continue to buy a newspaper or a magazine that bores you would you? This means that the quality of a feed is generally vey high which is certainly a positive step in the development of the internet.

Finding feeds is very easy - when you find a site or blog that you like just look for an XML or RSS button, usually orange or blue. If you click the button however the page you are taken to is just a bunch of HTML so you need a RSS reader to make sense of it. Just take a note of the url in the browser window at the top of your screen.

If you are a Yahoo subscriber you can simply add the url of the feed into your My Yahoo page. Google also now offers this service through Google Reader. Some browsers, such as Firefox also have RSS readers built in (just choose the add live feed option in the bookmark manager). Other services such as Quikonnex also offer a messaging service too which means you can completely bypass the whole spam ridden, over filtered ISP email system.

With RSS feeds available from broad subjects to narrow niche topics the internet now provides what it was originally supposed to do - share the best quality, most relevant information immediately.

Setting of your payment processors

A crucial point when you are starting an Internet home based business is the setting of payment processors.
This step will enable you to receive money from your customers, no matter from which place of the world the are buying from.
The first thing you will need to do is setting a merchant account.
The difference with the personnal account reside in the fees, and also in the amount that you will be able to receive from your customers.
In other words, you will be able to sell more expansive products, and you will get a better status and relation with your payment processor.
The customer also will see you as a serious vendor, and that will definitivly incease your credibiity.

Let' s get started now.
The first option is paypal, which is a free account, and is also one of the biggest"personnal payment" sites online today.It is a secure and worldwide recognised payment processor.
Actually, it is a part of ebay, and we do not need to present them..
Open an account with them just take 5 minutes, you just need to go to their website and follow their easy instructions. You have several option to accept payment by paypal.

The first one is that you tell the cuso to paypal website, then register. You give your email (the one that you use with paypal), and he send you a payment with your email only, you do not need to give your own bank account infos, or any private information. You give your email and you receive your payment.
The customer can pay by credit card or debit card.
Paypal allow you to copy and paste a code in the order webpage of your site; when you paste this code, a form will appear on your site, with a button, and your customer, when visiting your site just have to click on that button to pay you.
You have to do absolutely nothing, except receive a payment.
And a email will notify that you received a new payment( you will have the option of sending a refund ).
This is for the free payment processors.

The Difference Between Karate and Kung Fu

For many people, especially those who are not familiar with martial arts, the question often arises on what the difference between karate and kung fu is. Upon watching somebody doing martial arts, the untrained eye will find it hard to tell whether that person is doing karate or kung fu. Even those who are beginning martial arts may sometimes be confused about the different styles until further exposure to them will reveal just how different they really are.

Historically, the people living in the islands of Okinawa just south of Japan got exposed to Chinese kung fu martial arts due to the close proximity to China. Over time, the Okinawans and Japanese developed their own styles of martial arts now known as karate from the original influence of Chinese kung fu. Although both karate and kung fu utilize many similar martial arts techniques, most kung fu styles will usually have more variety of techniques compared to karate systems. It's almost like the Japanese streamlined the number of techniques from Chinese systems to develop karate. The Japanese also modified the way techniques are executed in karate as they became more linear compared to kung fu. This is especially evident in the forms or katas (traditional sequence of set moves) where karate techniques are performed with crisp movements that have distinct stop and go motions.

In kung fu forms, movements involve the use of more circular techniques, particularly with the hands. These circular motions give kung fu forms a more visually graceful look as techniques seem to flow from one to another. There is less stop and go with most kung fu styles. This is why some martial artists, especially in North America, often refer to Chinese kung fu as 'soft' styles while karate and tae kwon do are 'hard' styles. This is not to say that hard styles such as karate or tae kwon do are more powerful martial arts than kung fu and other soft styles. The term 'soft' is a bit misleading because the power from circular kung fu moves is often hidden. Circular moves can generate just as much power as linear ones found in hard styles. Most kung fu forms are also usually more complex and longer in duration than most karate forms. To most martial artists, a kung fu form will look much more exotic while a karate form will look more straight forward in terms of martial arts techniques. Interestingly enough, there are karate styles such as goju which do have quite a lot of circular techniques similar to kung fu. Kempo styles are considered a hybrid of Chinese kung fu and Okinawan karate techniques with both circular as well as linear techniques. There are also many more different styles of kung fu compared to karate.

Martial arts weaponry is found in both kung fu and karate styles but different sets of weapons are utilized in each martial arts system. Much like the empty hand forms, the kata with karate weapons are also more linear compared to those with kung fu weapons which have more circular movements. As expected, there is a lot more variety of different Chinese kung fu weapons than found in the Japanese karate styles.

Traditionally, practitioners of karate wear a white uniform called a gi which features the overlapping kimono-like top. Less traditional schools like those in North America will allow colored uniforms. A colored belt will be the finishing touch to the gi with of course the black belt for those at instructor level ranking. Most of the time and especially inside a dojo studio, karate stylists will not wear any shoes while training. Most kung fu stylists will wear a very different looking uniform. Kung fu uniforms usually consist of tops with Chinese 'frog-style' buttons rather than overlapping fronts like the karate gi top. The uniforms can be black or a variety of colors with often lighter fabrics such as satin and shoes are commonly worn. The modern acrobatic Chinese martial arts of wushu can feature satin uniforms with many different bright colors. Many kung fu schools simply utilize t-shirts and baggy pants as uniforms. Satin colored sashes are often worn to signify rank of students but this is actually more of a North American style as most kung fu schools in Asia do not show rankings in uniforms.

Overall, there's more variety of techniques, styles, weapons and uniforms found in the Chinese kung fu systems compared to karate. However, that is not to say that one system or style of martial art is superior to another. They are just different and to the observer, it could come down to personal preference. Some prefer kung fu and some prefer karate. Some ambitious martial artists who desire a full well rounded education practice both kung fu and karate.

Obtain the Variation One

Our company offers the clients the widest range of services on development, maintenance and promotion of websites. We have the talented team of the professionals, use the most advanced technologies and use the individual approach to project of each client. Whatever your budget, we can create cost effective websites for successful presentation of your company on the internet. We Design Delhi provide different services like web design and web application development, web programming for corporations and entrepreneurs and other different web related services Web Design Delhi company e- fuzion does both web site graphic design and complex web programming by using different links. Web Design Delhi team will help you from the very first internet steps - We shall help you to register a domain name, we shall offer web-hosting services for your site, and we shall create for you web site design, we shall Submit Your Site in search engines and we shall develop for you the individual website Promotion Program. Our web development services include new website development, existing website revamping and website maintenance. There is another service of custom web graphics as well that deals in logo, ad, banner, flyers and splash screen design deals. We have an infrastructure capable of developing static or dynamic web pages, e-commerce portals, informative websites, interactive websites etc. Web Design Delhi Company offers a whole range of services for development, maintenance and promotion of websites. We have team of well-qualified and experienced professionals who use the most advanced technologies and their skill sets along with individual approach for each project. Whatever is your budget we can create cost effective websites for successful presentation of your company on the Internet.

Custom programming can also be added for an additional fee. If you need a help for a quote if you require this service. Then log in e-fuzion.com.
If you think you have the desired aptitude of vision, creativity and enthusiasm to put your creativity into designs then Web Design Delhi can be a profitable career choice for you. You also need to develop your skills and knowledge of web design technologies at regular hiatus. Because, this field is one of the maximum changing fields, and to keep pace with the souk you need to be updated in terms of knowledge, skills and technologies being worn.

Submitting your Web Site to Free Directories

Submitting your website to the various online directories is an important part of any Link Popularity campaign. Whilst your traffic from many directories may be minor or irrelevant, relevant incoming links to your website will help in your overall search engine link popularity.
Other than Yahoo!, which is quite frankly beyond the reach of many smaller websites, paying for your directory submission can be a waste of money. You can get just as good a resultfrom submitting to free directories, or those that are free with a reciprocal link. If the directory is exceptionally good, the cost is low, and your directory ranking will be improved by paying a fee, do so if you wish. Personally, I wouldn't recommend you pay for what you can get free elsewhere.
To start with on your submission campaign, in my opinion it is better to submit to those directories that will allow you to easily modify your listing. That way, you can correct mistakes and get your campaign down pat before submitting to directories that don't allow you to logon and modify your submission, thus saving yourself from wasting or reducing in value your efforts in those directories.

What Directories to Submit To
The best are Search Engine Friendly directories (those that actually have your site URL listed at some point, rather than outlinks that are simply code). Some will ask for a reciprocal link, some will not. One list of non-reciprocal directories is at http://info.vilesilencer.com/main.php?rock=seo-friendly.php. Opinion at the moment is suggesting that non-reciprocal or one-way links are better, although any relevant link is useful. Directories that encode their links are mostly useful for traffic if their Alexa Ranking is high enough. Directories that do not encode outgoing links will help your website's Search Engine Ranking.

Deep Linking
It can be worth linking to other pages on your site other than your main page. Before doing this, make sure that the directory you are submitting to permits you to both submit URLs other than your home page (some only allow top level submission), and for the same site to be submitted to different categories (not all directories permit what are essentially multiple submissions of the same website). This will work especially if you have online tools or directories (such as your links page) on your site that are useful and relevant to add to other directory categories.

Choose the Relevant Directory Category
Most directories will have many categories you can submit your site to. Decide on the one that is most relevant, preferably a keyword that you are aiming for high search engine ranking in, and try to submit to the same or similar category in every directory, at least for your main page (also see Deep Linking above). This will increase the ranking of your site relating to the keyword chosen.

Submit to Different Categories
If the directory allows multiple submissions, and your website is relevant in several categories, submit to all the relevant categories you can. This will increase the number of incoming links to your website. Again, carefully check the terms of any directory before trying this to make sure it is permitted.

Write Title
Write the title for your website. Try to include a keyword you are aiming for ranking in in the title, but make the use of it appropriate, don't just bang a keyword in for the sake of it; you could get your site submission rejected.

Write Description
Describe your website in a way that will attract visitors. The length of your description will vary from directory to directory, but most will be under 250 characters. Some will allow up to 1,000 characters, and in those cases write the most comprehensive description of your site and its features that you can. It is a good idea to write several descriptions of different lengths, say from under 50 characters for a brief overview, to around 150 characters for a fuller description, up to 250 characters for a yet more comprehensive listing, and finally a full description as previously mentioned for over 250 characters. Keep your listing pertinent to your website, insert keywords where relevant and appropriate, but do not just submit a keyword listing, as most directories will reject your submission. Save all your descriptions in a text file, and just copy & paste into the descriptions boxes when needed rather than typing the same descriptions out again and again.

Choose Keywords
Again, as with the description mentioned above, the amount of keywords you can use will vary from directory to directory. Some will not give the option, some will allow you numbers of keywords, whilst others go by numbers of characters. Make a list of all relevant keywords for your site, from most important to least, and basically keep adding keywords until either you get to the bottom of your list (unlikely unless your list is really short) or you run out allowed characters/keywords. Check what keywords your competitors are going for if you need inspiration. This can often be done by viewing the source of a web page and checking the META tags. Again, save your keywords to a text file.

Keep Track of Your Progress
Keep a careful record of what directories you have submitted to, and your progress. It is far too easy to totally lose track of what you are doing, which does not help your linking campaign at all. The best way is by using a spreadsheet, such as Excel, to keep track of your campaign. At a minimum, you need to keep track of the following: Directory URL, Directory Name, Date Submitted, User Login & Password for those directories that allow you to alter your details and Response (accepted/declined). Other categories can include: Directory Alexa Ranking, Directory Page Rank (this will be for the home page only), Referral URL (if the directory will improve your ranking for referring visitors) and any Notes. If you are using the deep linking and multiple submissions strategies above, also keep track of what other pages you have submitted to each directory. Make a seperate entry for each URL submitted. For example, your spreadsheet columns could go as follows: Directory Name, Directory URL, URL Submitted, Referral URL, Login, Password, Alexa Ranking, Page Rank, Date Submitted, Response. I would advise keeping the list in alphabetical order, rather than order submitted, as that way you can check more easily whether or not you have submitted to a particular directory.

Do Reciprocal Links Work To Increase My Page Rank

Reciprocal links work like this. You will put your link on someone else's website and they will be able to list their website on yours. It is a trade off. But, there has been a lot of controversy about these links. Do they work to help improve your page rank in search engines? Do they hurt your page rank? Should you bother investing in them? To answer these questions, take a moment to consider both sides of the coin. The bottom line, to most webmasters, is that they are capable of working for you.

Why They May Not Be Good

When reciprocal links first began to be used, it was a trade off between one webmaster and another. If you were in the home decorating business, for example, it would be beneficial to work with and have a link to a company that provides windows. You both would benefit. When the webmasters did this, they found that their websites did in fact rank better. In fact, it worked so well that they went out and sought more and more of them.

There in lies the problem. Instead of working with other website owners to develop a relationship and create a reciprocal link that benefited both parties, many website developers found that they could buy these links instead. Now, they did not have to go to the trouble of luring in those that they would like to have links from but they could just buy them. Okay, this is not so bad right? The problem was that people were buying and using thousands of reciprocal links on their website. This is completely unnatural and it just didn't work well for them.

But, Why?

The search engines soon became wise to this scheme of getting your website to rank well. They developed programs that would spot this problem and in fact people that used this large amount of reciprocal links, in this fashion, were ranked WORSE! They would spend top dollar to get these links from companies that were all too willing to sell them and would end up well back into the search pages.

So, Now What?

Keeping these things in mind, you need to consider wisely if you should in fact use reciprocal links for the websites that you put up. In most cases, if you take the time to work at getting reciprocal links from qualified webmasters instead of buying large amounts of them, you are more capable of securing a sound method for increasing your page rank. If you decide to purchase hundreds of them and slap them on your website quickly, you will face a worst case scenario of lowering your page rank.

Keep in mind as well that one of the best ways to increase traffic to your web page with links is to use one way links. You can get these by using article directory sites. There may not be a sure fire way to take a brand new site and get it as number one in the search engines, you can gain some movement upwards if you use links properly.

Dominating your Niche Market

If you're like me you don't like to exaggerate, in fact, quite the opposite, I prefer to understate things and let the facts and results speak for themselves. In the internet marketing game however, if you don't tell people that your product is better than the next person's and list all the reasons why, you'll end up losing out because your customer never had a chance to see for themselves why your product was so good and the obvious choice when compared to your competitor's.

This means that, you guessed it, your product has to be the best on the market or at least, beat your competitors in the major areas that appeal to your target market. For example, Rapidforex is a leading foreign currency trading course, arguably the best available anywhere. The course teaches everything that any of the other Forex courses teach plus additional unique techniques. The competitor's products were a sounding board to use the principle of exaggeration. That is, by knowing what was on the market and aiming to beat competitors in every area, the product had to match up to what was promoted! And it did.

Other Forex courses offer up to 30 page ebooks free and Rapidforex created a free ebook several hundreds of pages long and better than most that were costing a few hundred dollars. Instead of one strategy, they include more than 30. nstead of a 5 to 10 part mini course, Rapdiforex offers a 20 part eCourse. You get the drift. It may sound like I'm writing a plug for Rapidforex and in a way, I am. The key here is that this website is known to have had massive success and I just so happened to find out the details about it.

They took what others were doing successfully and then did it on a bigger scale. The principle here is if you do something that your competitor is doing and improve it, you'll often see an exponential increase in profits as them. So, do your research and find out what others are doing in your chosen market. By doing more than what they've done, you've got a huge chance of success and most competitors won't go that extra mile to outdo what you're offering the market so you'll end up on top.

How to Create a Splash Page for Your Website?

These splash designs prove to be quite popular, especially among the designers as they allow the designer to show their skills in flash and any other technology on a single page. The splash page design involved in the splash page will be one that is very attractive to the eye of the viewer. Its main intention lies in captivating the viewer the moment he looks at it. It can be a stationary design or an animated design, which in turn makes it more interesting to look at!

There are quite a few advantages and disadvantages to a splash page. The main advantage of a splash page is that through a splash page, one can get all the information required on the first page of the website without much scrolling as splash pages are fast loading. And just think, after all that effort put into the making of that animation or flash splash page design, you can be confident that through a splash page, the visitors of the site at least see the splash design at least once. Splash pages are a great way to show off the best work you can produce, and thus also act as a portfolio of your work and work capacity for potential employers. As the splash page states the technical requirements required for their particular website, it allows the reader to choose, prior to visiting the site, the technology that best fits them and their computers. It is also a great means of using your server logs to get the complete breakdown of the actual number of customers to the website.

The cons to splash pages are not that many or major. It is only that some readers do not like splash pages as it prevents them from entering the website immediately, and thus may leave the site upon seeing the splash page. Splash pages also tend to break search engines as most splash pages have a redirect. It should be remembered that splash pages cannot be used for sending emails to a third party. As it can be seen, the pros of a splash page heavily outweigh the cons of a splash page. It all lies down on how one accepts a splash page on seeing it! Remember, splash pages are fun to build. They are very creative and allow the user to play around with animation and sound, to get the desired splash page design they need!

The Importance Of An Email List For Your Online Business And How To Create One

For any business whether offline or online you need customers. It's much easier to get potential customers into your online store, or business website, by a number of different means, search engine traffic, adverts of many kinds, or from links on other sites. It doesn't matter how they got there in the first place, as long as they buy, you can capture some details then and send them updates on your later offers or deals. But what about if these visitors don't buy, how do you bring them back again if you offer a better deal in the future, or have new products they may be interested in?

That's where an email list becomes your best friend, and online businesses biggest asset. You need to capture those email addresses before the visitor leaves. This is so important that the big name online marketers make building a subscriber list one of their main activities. Some of the figures bandied about concerning email lists may be erroneous, but from my own personal experience, they're not too far out, so I will repeat them here.

Figures quoted for the value of each subscriber range from 50 cents to 1 dollar per subscriber per month, so the larger the subscriber list you have the more you can make each month, you do the maths for yourself. There is a caveat to this, your subscriber list needs to be targeted, ie it's no use trying to sell high heeled shoes to a predominately male audience, or sending your best ad for gardening tools to people who sign up on a site about rap music, if they have little interest you won't make anything. It's also claimed that sales increase after the potential customer has received several emails from an online business, and the extra sales are in the order of over 50% of customers purchase when they are more comfortable with the seller following receipt of the emails.

So now we know the value of having an email list, how do we start to build our own subscriber base?

The easiest method is to use an online "autoresponder" such as getresponse.com which you can preload with messages ready to send to anyone who signs up. Then you will need a way for your website visitors to subscribe to your newsletter or sales letter series, all good autoresponders will give you some html code ready to paste into your webpages into which visitors can place their name and email address as a minimum, and some will allow you to include boxes for more information should you require it.

You now need to post this code into a visible spot in your webpage(s) and make it as easy as possible for your visitor to sign up for your email subscriber list. Now you have a way to capture contact details to give you a second chance at making a sale even after your visitor has left your site. So that's it sit and wait for those subscribers to sign up.

Hold on a minute, why would they want to sign up for your newsletter, or email series?

You need to give the visitor a good reason to subscribe to your list, after all they probably already get enough emails from spam, friends sending them the latest joke, and other online businesses who have their address, so you need to sweeten the deal in their favour. One of the easiest ways to attract subscribers is to offer a free gift for subscribing. The gift can be as simple as making the emails a course to teach them something about the topic of your website, a free ebook (there are plenty available on a variety of subjects if you don't have one to give away already, search in your favourite search engine) or you could offer a competition where subscribers can win one of your products. Whatever you do, try to make it an offer the visitor will find it hard to turn down,and they will subscribe to get it.

So these are the reasons to start your own subscriber list, and an overview of how to start getting subscribers, but what sort of emails should you send as your list grows?

Obviously if you are just selling something, and want to remind visitors why they went to your site in the first place, then send them some information about your product(s) in a series of emails, and include a reminder of the original link so they can go back to review the salespage and hopefully buy. There is a more subtle way though. Information is why most people are looking on the internet, so it makes sense to make your emails informational, and gently bring your sales pitch to the subscribers as part of the information. If you don't have time to write your own informational articles, you can search in article directories for ones written on the topic your site and newsletter deal with, just follow the directories terms for using the articles. These articles can then be preloaded into your autoresponder along with your additional promotional text, ready to be sent. Once it is setup, it can be all left to run automatically.

Hopefully you will now see the benefits of using email newsletters to increase your online business, or website visits, and see that it's not too difficult to get started. An article of this type can only give you an overview of the basics of email subscriber lists for online businesses, but there is plenty more available online, and I'd recommend you to find out more about it, especially how to avoid spam complaints. But most importantly, start your own email subscriber list today, and watch your business grow.