Wednesday

What is a hostname?



A name is a label that is used to distinguish one thing from another. A person's name, for instance, comprises a set of alphabetic characters that allows a person to be individually addressed. Computers are also named to differentiate one machine from another and to allow for such activities as network communication.
Computers have always needed unique addresses to talk to each other. With the advent of the Internet, the requirements for enabling computers to communicate with each other on a network included the concept of the hostname. The hostname began as a simple string of alphanumeric characters (and possibly a hyphen) and has evolved to its current definition, where hostname means a Fully Qualified Domain Name (FQDN) that absolutely and uniquely identifies every computer hooked up to the Internet via the Domain Name Service (DNS) naming hierarchy.
The true "name" a computer needs in order to communicate on a network is actually a set of numbers. The original computers connected as the Internet used small integers as the host number. For TCP/IP, the main protocol used by the Internet, each computer has a network IP address that follows a specific set of rules to assure its uniqueness and validity. (Additionally, port numbers further specify the access points for particular services on a computer).
It has always been user friendly to associate a host name with a computer (while the computer maintained its internal numerical host number or network address). One of the initial Internet RFCs, "Standardization of Host Mnemonics" lists the table that associated host numbers with their corresponding host names for the first Internet computers. This table was kept in a file called HOST.TXT that was stored on every computer that wished to communicate.
While the original file was not so daunting at 20 entries, it became quickly apparent that this solution was not scalable or flexible enough as the number of host computers connected to the Internet exploded. In order to accommodate the problem of connecting all of the new computers being added to the Internet, a hierarchical database of host names was created called DNS. DNS associates host names with their IP addresses. A complete domain name (that is, an FQDN) includes the name of the host concatenated with its domain name. This naming convention allows for a hierarchy of domain names with the host name being the most specific (and "left-most") part.
The rules for a host name were first standardized in the original host name specification, "DoD Internet Host Table Specification". It states that the name should be a text string consisting of the letters A through Z (upper or lower case), digits 0 through 9, the minus sign (-), and the period (.). Note, the period is only allowed as the last character of the host name if it is the delimiter of the full domain name (FQDN). No spaces are permitted as part of a name. The first character must be an alphabetic character and the last character must not be a minus sign or period. It was also recommended that the host name be no longer than 24 characters in length. Subsequently, in "Requirements for Internet Hosts - Application and Support", the host name rules were updated. The first character could now be either a letter or a digit and software dealing with host names must handle names up to 63 characters in length.
In common usage today, hostname refers specifically to the FQDN that comprises the name of the host, a period, and the domain name. The domain name is composed of labels that begin with the top-level domain and are arranged right to left for the second and, possibly, third level labels. The host name and the domain labels are separated by periods. The total length of the hostname as an FQDN cannot exceed 255 character with each domain name label having a maximum length of 63 characters. For example, if a company's domain name is "example.com." and a particular computer in the company has been named "plato", the hostname for that computer will be "plato.example.com.". Note, that technically FQDNs end in a period to unambiguously define the hostname and to be sure that it is not part of a longer domain name. (although in common usage this final period is often omitted).
The exact rules for the new hostname definition that has evolved is also more rigorous than that of the related original host name specification. The DNS naming rules are explained in "Domain Names - Concepts and Facilities", "Domain Names - Implementation and Specification", and "Clarifications to the DNS Specification".
To summarize, a hostname is a Fully Qualified Domain Name that uniquely and absolutely names a computer. It is composed of the host name and the domain name. The domain name in turn is one or more domain labels that place the computer in the DNS naming hierarchy. The host name and the domain name labels are separated by periods and the total length of the hostname cannot exceed 255 characters.
Now that the syntax of the name of the host as part of the hostname is understood, how does one choose a good name for their computer? Several web sites offer suggestions and the choice is up to the system administrator whose whimsy is only limited to the fact that no two computers in one domain space can have the same host name (because the two computers would have the same hostname!).
RFC 1178, "Choosing a Name for Your Computer" contains several guidelines on how to name - and how not to name - your computers.
A summary of sample guidelines for good host names:
  • Use words/names that are rarely used.
  • Use theme names.
  • Use real words.
  • Don't worry about reusing someone else's hostname.
  • There is always room for an exception.
And some sample guidelines for not so good host names:
  • Don't overload other terms already in common use.
  • Don't choose a name after a project unique to that machine.
  • Don't use your own name.
  • Don't use long names.
  • Avoid alternate spellings.
  • Avoid domain names.
  • Avoid domain-like names.
  • Don't use antagonistic or otherwise embarrassing names.
  • Don't use digits at the beginning of the name.
  • Don't use non-alphanumeric characters in a name.
  • Don't expect case to be preserved.
As a final note, the terms "host name" and "hostname" are often used interchangeably, so be sure to clarify when the term is being used as to whether just the name of the host or the computer's FQDN is being referenced. To see this on a Linux system, by example, the hostname command returns the FQDN while adding the -s option (i.e., hostname -s) returns just the name of the host.

[--------------]

What is a VPN?



A virtual private network (VPN) protects your data and identity over public networks, like the Internet and wireless hotspots. Various protocols are used to create an encrypted tunnel that transports data securely. While a firewall may protect the data on your computer, a VPN will protect your data on the Internet. The goal of a VPN is to implement the same level of security provided by private networks at substantially lower costs.
 

Why use a VPN?

Most VPN's are used to add security. Today's world is evolving quickly and the security pitfalls of modern conveniences are often ignored. Public WIFI hotspots, common in airports and coffee shops, are a hackers dream because they offer streams of visible data waiting to be mined. Using a VPN keeps your information secure.
Deep Packet inspection is another growing concern. Many ISPs would like to analyze statistics from your online activities for marketing and routing purposes. Using a VPN thwarts efforts to conduct deep packet inspections.
Similarly, search engines and social networking sites, like Google and Facebook, are storing information about your online habits indefinitely. Since a VPN provides the user with a different IP address, these privacy invasions are also thwarted.
VPN services provide different gateway cities where the IP address assigned to your computer is located. This allows users to access websites only available to users from a certain country. This application is particularly important for travelers who need to access websites from their home country and for people living in regions rife with censorship, like China and Iran.

Protocols

PPTP is the most common VPN protocol. It uses TCP port 1723 and Generic Routing Encapsulation (GRE) to secure packets. The main advantage of PPTP is that all major operating systems and many smartphones can natively use PPTP without any additional software.
IPsec is a protocol suite developed with IPv6 and often used in conjunction with L2TP tunneling. IPSec VPN services usually require third party software. Associated licensing costs are one of the largest cons of IPsec.
SSL/TLS is the most common encryption protocol on the Internet. Many SSL VPN plans use the OpenVPN client. This free, multi-platform client and the vibrant community that supports it have helped SSL VPNs rise to prominence.
SSTP is the newest popular protocol. It transports PPP or L2TP packets through an SSL 3.0 channel. Since SSTP uses the common HTTPS port 443, it is hard to block in highly censored regions, like the Middle East. Unfortunately, SSTP is only available on Windows Vista and Windows 7 computers.

[--------------]

What is a Proxy Server?



A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server, then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client's request or the server's response for various purposes.

Web proxies


A common proxy application is a caching Web proxy. This provides a nearby cache of Web pages and files available on remote Web servers, allowing local network clients to access them more quickly or reliably.
When it receives a request for a Web resource (specified by a URL), a caching proxy looks for the resulting URL in its local cache. If found, it returns the document immediately. Otherwise it fetches it from the remote server, returns it to the requester and saves a copy in the cache. The cache usually uses an expiry algorithm to remove documents from the cache, according to their age, size, and access history. Two simple cache algorithms are Least Recently Used (LRU) and Least Frequently Used (LFU). LRU removes the least-recently used documents, and LFU removes the least-frequently used documents.
Web proxies can also filter the content of Web pages served. Some censorware applications - which attempt to block offensive Web content - are implemented as Web proxies. Other web proxies reformat web pages for a specific purpose or audience; for example, Skweezer reformats web pages for cell phones and PDAs. Network operators can also deploy proxies to intercept computer viruses and other hostile content served from remote Web pages.
A special case of web proxies are "CGI proxies." These are web sites which allow a user to access a site through them. They generally use PHP or CGI to implement the proxying functionality. CGI proxies are frequently used to gain access to web sites blocked by corporate or school proxies. Since they also hide the user's own IP address from the web sites they access through the proxy, they are sometimes also used to gain a degree of anonymity.
You may see references to four different types of proxy servers:
  • Transparent Proxy
This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.)
  • Anonymous Proxy
This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users.
  • Distorting Proxy
This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers.
  • High Anonymity Proxy
This type of proxy server does not identify itself as a proxy server and does not make available the original IP address.
[--------------]

What is Corporate Internet Connections?




The world of corporate internet technology is completely different from any connectivity package the regular consumer could even dream up. Have you ever been on your computer at work really early in the morning before anybody else gets there? Did you notice how fast you could download a document or surf the internet? This is because corporate internet connections are another realm from what we're used to. If you're starting a business or just looking to up your bandwidth, here are a couple of the common internet connections being used in the corporate arena.
So what are some of the basic technologies that they work with? One of them is called ISDN. ISDN stands for Integrated Services Digital Network. This is basically a telephone line made of copper wiring that provides extremely fast data transmissions. There are two types of ISDN. The first one is call the B-channel. This is used for the transfer of data, video, voice or any other multimedia. The B-channel runs at 64 kbps (kilobytes per second). The other type is called the D-channel. The D-channel will either run at 16 kbps or at 64 kbps depending on how you set it up. The D-channel is primarily used to switch your equipment in the ISDN network and the equipment at your ISDN site. Depending on the size of the corporation, the ISDN network can slow down a bit when more people are on the network downloading video, music or applications. Corporations also use this kind of connection for their video conferencing and for remote access to their computer networks.
Another connection technology that is commonly found in corporations is the use of the T1 line. A T1 line has the power to carry twenty-four digitized voices channels and a date rate of 1.544 megabits per second. A T1 connection can carry about sixty times the amount of data per second than a regular residential modem. The usual cost of a T1 line is around five hundred dollars per month, depending on who the company gets their service from. That may sound like a lot, but it's really nothing in the eyes of a medium sized company. The truth is that even a medium sized company needs more speed than that. Up one from the T1 is the T3 connection. A T3 connection can transmit 43.23 megabits per second and is the equivalent to twenty-eight T1s.
The next up from the T3 connection is the OC1. The OC1 stands for optical carrier because this uses fiber optics instead of copper telephone wiring. The number describes how many multiples of 51.84 megabits per second it can carry. The OC1 is basically a small step up from a T3 connection. Next is the OC3 which can deliver 155.52 megabits per second. Most large companies will use and OC12 connection because it's so strong and reliable.
If you're looking to get your business a great internet connection, you need to ask yourself how much you are willing to spend. If you're a small business with less than ten employees, you could probably go with a T1 connection and be just fine. However, if you're a medium to large sized business who has the money and the resources for an OC3 connection, then you're looking at somewhere around five thousand or more for the speed you want.

[--------------]

What is Wireless?




Wireless Broadband Mobile

Broadband internet service is a form of high speed internet access. In fact, the name "broadband" has come to be synonymous with high speed internet use in general. Since speed is measured by bit rate, the number of bits processed per unit of time, broadband internet service is defined as being 256 kbit/s (kilobits per second) or faster. Broadband typically downloads at a much faster speed than that, however. As a result, broadband internet service is categorized into two different connection groups: Tier 1 (T1) broadband connections range from 1.544 Mbit/s to 2.048 Mbit/s, and Tier 3 (T3) broadband connections range from 44.736 Mbit/s to 159.2 Gbit/s. With these rates of data transmission, broadband represents an evolution from the original high speed internet service, Integrated Services Digital Network (ISDN), and is by far a significant improvement upon the original internet service, dial-up.
The latest development in broadband internet service is the incorporation of wireless capabilities. Wireless broadband internet service is exactly what the name implies: it is your high speed internet access without cables or wires. The versatility of wireless internet, and its potential for increasing productivity by users, has consumers demanding the service at an increasing rate. They want it in their home, at their office, even at their local coffee shop or bistro. Hence the development of wireless broadband internet service: it is a packaged internet service deal that provides the ability to access the internet wirelessly from any location within the service's coverage area.

Wireless Broadband Network


A term you may recognize in association with wireless broadband internet service includes wireless network. A wireless network is a single broadband internet arrangement established for your home or office. It requires several pieces of equipment that are all one-time cost items: a wireless transceiver, such as a wireless card or antenna, and a wireless router. In addition, you will have to purchase the broadband service, which is a continual expense. You cannot utilize your wireless broadband tools without an ongoing broadband service. Together, the wireless devices and the broadband internet service make up your wireless broadband network. When employed, the network will send data to your broadband internet connection via these wireless tools that utilize a special wireless technology (known as Wi-Fi). As a result you will be able to access the internet from anywhere inside the coverage area, as determined by the location of your wireless router.

Wireless Broadband Service


Wireless broadband internet service is growing in popularity for locations outside the home or office as well. When considering broadband, another term you may recognize is wireless internet service. Although often used interchangeably with wireless network, the two do not mean the same thing. Wireless broadband internet service generally refers to a package deal that combines both the wireless technology and broadband service, and to which you can subscribe to. It differs from the wireless network in two ways: 1) it includes both technology and service, whereas having a wireless network necessitates your having to buy both, and 2) it is generally used in larger locations outside the home or office, such as the downtown area of a city or a college campus.
Areas that provide wireless broadband internet service are known as hotspots. Starbucks Coffee and Borders Books are two common retailers that feature internet hotspots. Downtown areas in larger cities and major airports are two common public areas that also feature internet hotspots. They all provide wireless broadband internet service. The service is mostly utilized by laptop computers and handheld devices that are �wireless ready�, meaning they are capable of connecting to the internet via internal or external wireless devices or cards. However, they require a paid subscription to the broadband service intended especially for this wireless use.

Wireless Broadband Mobile


Wireless internet connectivity in cell phones is growing in popularity as well. Cell phones, and other devices featuring windows mobile applications, are now all being designed with advanced wireless technology. This allows them the ability to connect to a wireless broadband internet service, or to the internet via their own cellular phone network. EDGE and EVDO are two of the more popular next-generation mobile system technologies utilized by cellular phone developers.
EDGE (Enhanced Data rates for GSM Evolution) was introduced into the North American via GSM (Global Systems Mobile) networks in 2003 and is now available worldwide. EDGE increases data transmission rates and improves transmission reliability in mobile devices that use it. More importantly, it allows the mobile device to connect to the Internet wirelessly, but its download speed is significantly slower than other mobile wireless technologies. EDGE transmits data at approximately 236.8 kbit/s, which is below the standard for a broadband connection. However, its theoretical maximum speed is 473.6 kbit/s, so it still considered a wireless broadband technology.
EVDO (Evolution-Data Optimized) is significantly faster than EDGE. It transmits data via radio signals, and for this reason is classified as a wireless broadband technology. It is employed in mobile devices around the world via CDMA (Code Division Multiple Access) networks: cellular networks that achieve high data transmission speeds and support a vast number of users.
WiMAX is an emerging wireless broadband technology whose download speeds are approximately 10 mbit/s. It is expected to be within the 40 mbit/s range by next year. There is currently only one major WiMAX provider due to the fact that it must be run on it own network: it cannot utilize GSM or CDMA networks as EDGE and EVDO do. However there are plans for widespread WiMax commercial deployment by 2010, and will be marketed as a significantly advanced wireless alternative to Cable and DSL internet services.

[--------------]