Wednesday

What is a hostname?



A name is a label that is used to distinguish one thing from another. A person's name, for instance, comprises a set of alphabetic characters that allows a person to be individually addressed. Computers are also named to differentiate one machine from another and to allow for such activities as network communication.
Computers have always needed unique addresses to talk to each other. With the advent of the Internet, the requirements for enabling computers to communicate with each other on a network included the concept of the hostname. The hostname began as a simple string of alphanumeric characters (and possibly a hyphen) and has evolved to its current definition, where hostname means a Fully Qualified Domain Name (FQDN) that absolutely and uniquely identifies every computer hooked up to the Internet via the Domain Name Service (DNS) naming hierarchy.
The true "name" a computer needs in order to communicate on a network is actually a set of numbers. The original computers connected as the Internet used small integers as the host number. For TCP/IP, the main protocol used by the Internet, each computer has a network IP address that follows a specific set of rules to assure its uniqueness and validity. (Additionally, port numbers further specify the access points for particular services on a computer).
It has always been user friendly to associate a host name with a computer (while the computer maintained its internal numerical host number or network address). One of the initial Internet RFCs, "Standardization of Host Mnemonics" lists the table that associated host numbers with their corresponding host names for the first Internet computers. This table was kept in a file called HOST.TXT that was stored on every computer that wished to communicate.
While the original file was not so daunting at 20 entries, it became quickly apparent that this solution was not scalable or flexible enough as the number of host computers connected to the Internet exploded. In order to accommodate the problem of connecting all of the new computers being added to the Internet, a hierarchical database of host names was created called DNS. DNS associates host names with their IP addresses. A complete domain name (that is, an FQDN) includes the name of the host concatenated with its domain name. This naming convention allows for a hierarchy of domain names with the host name being the most specific (and "left-most") part.
The rules for a host name were first standardized in the original host name specification, "DoD Internet Host Table Specification". It states that the name should be a text string consisting of the letters A through Z (upper or lower case), digits 0 through 9, the minus sign (-), and the period (.). Note, the period is only allowed as the last character of the host name if it is the delimiter of the full domain name (FQDN). No spaces are permitted as part of a name. The first character must be an alphabetic character and the last character must not be a minus sign or period. It was also recommended that the host name be no longer than 24 characters in length. Subsequently, in "Requirements for Internet Hosts - Application and Support", the host name rules were updated. The first character could now be either a letter or a digit and software dealing with host names must handle names up to 63 characters in length.
In common usage today, hostname refers specifically to the FQDN that comprises the name of the host, a period, and the domain name. The domain name is composed of labels that begin with the top-level domain and are arranged right to left for the second and, possibly, third level labels. The host name and the domain labels are separated by periods. The total length of the hostname as an FQDN cannot exceed 255 character with each domain name label having a maximum length of 63 characters. For example, if a company's domain name is "example.com." and a particular computer in the company has been named "plato", the hostname for that computer will be "plato.example.com.". Note, that technically FQDNs end in a period to unambiguously define the hostname and to be sure that it is not part of a longer domain name. (although in common usage this final period is often omitted).
The exact rules for the new hostname definition that has evolved is also more rigorous than that of the related original host name specification. The DNS naming rules are explained in "Domain Names - Concepts and Facilities", "Domain Names - Implementation and Specification", and "Clarifications to the DNS Specification".
To summarize, a hostname is a Fully Qualified Domain Name that uniquely and absolutely names a computer. It is composed of the host name and the domain name. The domain name in turn is one or more domain labels that place the computer in the DNS naming hierarchy. The host name and the domain name labels are separated by periods and the total length of the hostname cannot exceed 255 characters.
Now that the syntax of the name of the host as part of the hostname is understood, how does one choose a good name for their computer? Several web sites offer suggestions and the choice is up to the system administrator whose whimsy is only limited to the fact that no two computers in one domain space can have the same host name (because the two computers would have the same hostname!).
RFC 1178, "Choosing a Name for Your Computer" contains several guidelines on how to name - and how not to name - your computers.
A summary of sample guidelines for good host names:
  • Use words/names that are rarely used.
  • Use theme names.
  • Use real words.
  • Don't worry about reusing someone else's hostname.
  • There is always room for an exception.
And some sample guidelines for not so good host names:
  • Don't overload other terms already in common use.
  • Don't choose a name after a project unique to that machine.
  • Don't use your own name.
  • Don't use long names.
  • Avoid alternate spellings.
  • Avoid domain names.
  • Avoid domain-like names.
  • Don't use antagonistic or otherwise embarrassing names.
  • Don't use digits at the beginning of the name.
  • Don't use non-alphanumeric characters in a name.
  • Don't expect case to be preserved.
As a final note, the terms "host name" and "hostname" are often used interchangeably, so be sure to clarify when the term is being used as to whether just the name of the host or the computer's FQDN is being referenced. To see this on a Linux system, by example, the hostname command returns the FQDN while adding the -s option (i.e., hostname -s) returns just the name of the host.

[--------------]

What is a VPN?



A virtual private network (VPN) protects your data and identity over public networks, like the Internet and wireless hotspots. Various protocols are used to create an encrypted tunnel that transports data securely. While a firewall may protect the data on your computer, a VPN will protect your data on the Internet. The goal of a VPN is to implement the same level of security provided by private networks at substantially lower costs.
 

Why use a VPN?

Most VPN's are used to add security. Today's world is evolving quickly and the security pitfalls of modern conveniences are often ignored. Public WIFI hotspots, common in airports and coffee shops, are a hackers dream because they offer streams of visible data waiting to be mined. Using a VPN keeps your information secure.
Deep Packet inspection is another growing concern. Many ISPs would like to analyze statistics from your online activities for marketing and routing purposes. Using a VPN thwarts efforts to conduct deep packet inspections.
Similarly, search engines and social networking sites, like Google and Facebook, are storing information about your online habits indefinitely. Since a VPN provides the user with a different IP address, these privacy invasions are also thwarted.
VPN services provide different gateway cities where the IP address assigned to your computer is located. This allows users to access websites only available to users from a certain country. This application is particularly important for travelers who need to access websites from their home country and for people living in regions rife with censorship, like China and Iran.

Protocols

PPTP is the most common VPN protocol. It uses TCP port 1723 and Generic Routing Encapsulation (GRE) to secure packets. The main advantage of PPTP is that all major operating systems and many smartphones can natively use PPTP without any additional software.
IPsec is a protocol suite developed with IPv6 and often used in conjunction with L2TP tunneling. IPSec VPN services usually require third party software. Associated licensing costs are one of the largest cons of IPsec.
SSL/TLS is the most common encryption protocol on the Internet. Many SSL VPN plans use the OpenVPN client. This free, multi-platform client and the vibrant community that supports it have helped SSL VPNs rise to prominence.
SSTP is the newest popular protocol. It transports PPP or L2TP packets through an SSL 3.0 channel. Since SSTP uses the common HTTPS port 443, it is hard to block in highly censored regions, like the Middle East. Unfortunately, SSTP is only available on Windows Vista and Windows 7 computers.

[--------------]

What is a Proxy Server?



A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server, then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client's request or the server's response for various purposes.

Web proxies


A common proxy application is a caching Web proxy. This provides a nearby cache of Web pages and files available on remote Web servers, allowing local network clients to access them more quickly or reliably.
When it receives a request for a Web resource (specified by a URL), a caching proxy looks for the resulting URL in its local cache. If found, it returns the document immediately. Otherwise it fetches it from the remote server, returns it to the requester and saves a copy in the cache. The cache usually uses an expiry algorithm to remove documents from the cache, according to their age, size, and access history. Two simple cache algorithms are Least Recently Used (LRU) and Least Frequently Used (LFU). LRU removes the least-recently used documents, and LFU removes the least-frequently used documents.
Web proxies can also filter the content of Web pages served. Some censorware applications - which attempt to block offensive Web content - are implemented as Web proxies. Other web proxies reformat web pages for a specific purpose or audience; for example, Skweezer reformats web pages for cell phones and PDAs. Network operators can also deploy proxies to intercept computer viruses and other hostile content served from remote Web pages.
A special case of web proxies are "CGI proxies." These are web sites which allow a user to access a site through them. They generally use PHP or CGI to implement the proxying functionality. CGI proxies are frequently used to gain access to web sites blocked by corporate or school proxies. Since they also hide the user's own IP address from the web sites they access through the proxy, they are sometimes also used to gain a degree of anonymity.
You may see references to four different types of proxy servers:
  • Transparent Proxy
This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.)
  • Anonymous Proxy
This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users.
  • Distorting Proxy
This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers.
  • High Anonymity Proxy
This type of proxy server does not identify itself as a proxy server and does not make available the original IP address.
[--------------]

What is Corporate Internet Connections?




The world of corporate internet technology is completely different from any connectivity package the regular consumer could even dream up. Have you ever been on your computer at work really early in the morning before anybody else gets there? Did you notice how fast you could download a document or surf the internet? This is because corporate internet connections are another realm from what we're used to. If you're starting a business or just looking to up your bandwidth, here are a couple of the common internet connections being used in the corporate arena.
So what are some of the basic technologies that they work with? One of them is called ISDN. ISDN stands for Integrated Services Digital Network. This is basically a telephone line made of copper wiring that provides extremely fast data transmissions. There are two types of ISDN. The first one is call the B-channel. This is used for the transfer of data, video, voice or any other multimedia. The B-channel runs at 64 kbps (kilobytes per second). The other type is called the D-channel. The D-channel will either run at 16 kbps or at 64 kbps depending on how you set it up. The D-channel is primarily used to switch your equipment in the ISDN network and the equipment at your ISDN site. Depending on the size of the corporation, the ISDN network can slow down a bit when more people are on the network downloading video, music or applications. Corporations also use this kind of connection for their video conferencing and for remote access to their computer networks.
Another connection technology that is commonly found in corporations is the use of the T1 line. A T1 line has the power to carry twenty-four digitized voices channels and a date rate of 1.544 megabits per second. A T1 connection can carry about sixty times the amount of data per second than a regular residential modem. The usual cost of a T1 line is around five hundred dollars per month, depending on who the company gets their service from. That may sound like a lot, but it's really nothing in the eyes of a medium sized company. The truth is that even a medium sized company needs more speed than that. Up one from the T1 is the T3 connection. A T3 connection can transmit 43.23 megabits per second and is the equivalent to twenty-eight T1s.
The next up from the T3 connection is the OC1. The OC1 stands for optical carrier because this uses fiber optics instead of copper telephone wiring. The number describes how many multiples of 51.84 megabits per second it can carry. The OC1 is basically a small step up from a T3 connection. Next is the OC3 which can deliver 155.52 megabits per second. Most large companies will use and OC12 connection because it's so strong and reliable.
If you're looking to get your business a great internet connection, you need to ask yourself how much you are willing to spend. If you're a small business with less than ten employees, you could probably go with a T1 connection and be just fine. However, if you're a medium to large sized business who has the money and the resources for an OC3 connection, then you're looking at somewhere around five thousand or more for the speed you want.

[--------------]

What is Wireless?




Wireless Broadband Mobile

Broadband internet service is a form of high speed internet access. In fact, the name "broadband" has come to be synonymous with high speed internet use in general. Since speed is measured by bit rate, the number of bits processed per unit of time, broadband internet service is defined as being 256 kbit/s (kilobits per second) or faster. Broadband typically downloads at a much faster speed than that, however. As a result, broadband internet service is categorized into two different connection groups: Tier 1 (T1) broadband connections range from 1.544 Mbit/s to 2.048 Mbit/s, and Tier 3 (T3) broadband connections range from 44.736 Mbit/s to 159.2 Gbit/s. With these rates of data transmission, broadband represents an evolution from the original high speed internet service, Integrated Services Digital Network (ISDN), and is by far a significant improvement upon the original internet service, dial-up.
The latest development in broadband internet service is the incorporation of wireless capabilities. Wireless broadband internet service is exactly what the name implies: it is your high speed internet access without cables or wires. The versatility of wireless internet, and its potential for increasing productivity by users, has consumers demanding the service at an increasing rate. They want it in their home, at their office, even at their local coffee shop or bistro. Hence the development of wireless broadband internet service: it is a packaged internet service deal that provides the ability to access the internet wirelessly from any location within the service's coverage area.

Wireless Broadband Network


A term you may recognize in association with wireless broadband internet service includes wireless network. A wireless network is a single broadband internet arrangement established for your home or office. It requires several pieces of equipment that are all one-time cost items: a wireless transceiver, such as a wireless card or antenna, and a wireless router. In addition, you will have to purchase the broadband service, which is a continual expense. You cannot utilize your wireless broadband tools without an ongoing broadband service. Together, the wireless devices and the broadband internet service make up your wireless broadband network. When employed, the network will send data to your broadband internet connection via these wireless tools that utilize a special wireless technology (known as Wi-Fi). As a result you will be able to access the internet from anywhere inside the coverage area, as determined by the location of your wireless router.

Wireless Broadband Service


Wireless broadband internet service is growing in popularity for locations outside the home or office as well. When considering broadband, another term you may recognize is wireless internet service. Although often used interchangeably with wireless network, the two do not mean the same thing. Wireless broadband internet service generally refers to a package deal that combines both the wireless technology and broadband service, and to which you can subscribe to. It differs from the wireless network in two ways: 1) it includes both technology and service, whereas having a wireless network necessitates your having to buy both, and 2) it is generally used in larger locations outside the home or office, such as the downtown area of a city or a college campus.
Areas that provide wireless broadband internet service are known as hotspots. Starbucks Coffee and Borders Books are two common retailers that feature internet hotspots. Downtown areas in larger cities and major airports are two common public areas that also feature internet hotspots. They all provide wireless broadband internet service. The service is mostly utilized by laptop computers and handheld devices that are �wireless ready�, meaning they are capable of connecting to the internet via internal or external wireless devices or cards. However, they require a paid subscription to the broadband service intended especially for this wireless use.

Wireless Broadband Mobile


Wireless internet connectivity in cell phones is growing in popularity as well. Cell phones, and other devices featuring windows mobile applications, are now all being designed with advanced wireless technology. This allows them the ability to connect to a wireless broadband internet service, or to the internet via their own cellular phone network. EDGE and EVDO are two of the more popular next-generation mobile system technologies utilized by cellular phone developers.
EDGE (Enhanced Data rates for GSM Evolution) was introduced into the North American via GSM (Global Systems Mobile) networks in 2003 and is now available worldwide. EDGE increases data transmission rates and improves transmission reliability in mobile devices that use it. More importantly, it allows the mobile device to connect to the Internet wirelessly, but its download speed is significantly slower than other mobile wireless technologies. EDGE transmits data at approximately 236.8 kbit/s, which is below the standard for a broadband connection. However, its theoretical maximum speed is 473.6 kbit/s, so it still considered a wireless broadband technology.
EVDO (Evolution-Data Optimized) is significantly faster than EDGE. It transmits data via radio signals, and for this reason is classified as a wireless broadband technology. It is employed in mobile devices around the world via CDMA (Code Division Multiple Access) networks: cellular networks that achieve high data transmission speeds and support a vast number of users.
WiMAX is an emerging wireless broadband technology whose download speeds are approximately 10 mbit/s. It is expected to be within the 40 mbit/s range by next year. There is currently only one major WiMAX provider due to the fact that it must be run on it own network: it cannot utilize GSM or CDMA networks as EDGE and EVDO do. However there are plans for widespread WiMax commercial deployment by 2010, and will be marketed as a significantly advanced wireless alternative to Cable and DSL internet services.

[--------------]

What is an IP address?



Every device connected to the public Internet is assigned a unique number known as an Internet Protocol (IP) address. IP addresses consist of four numbers separated by periods (also called a 'dotted-quad') and look something like 127.0.0.1.
Since these numbers are usually assigned to internet service providers within region-based blocks, an IP address can often be used to identify the region or country from which a computer is connecting to the Internet. An IP address can sometimes be used to show the user's general location.
Because the numbers may be tedious to deal with, an IP address may also be assigned to a Host name, which is sometimes easier to remember. Hostnames may be looked up to find IP addresses, and vice-versa. At one time ISPs issued one IP address to each user. These are called static IP addresses. Because there is a limited number of IP addresses and with increased usage of the internet ISPs now issue IP addresses in a dynamic fashion out of a pool of IP addresses (Using DHCP). These are referred to as dynamic IP addresses. This also limits the ability of the user to host websites, mail servers, ftp servers, etc. In addition to users connecting to the internet, with virtual hosting, a single machine can act like multiple machines (with multiple domain names and IP addresses).

[--------------]

What is an Internet Service Provider?





An Internet Service Provider (also known as an ISP or even as an IAP, internet access provider) is a firm that offers subscribers access to the internet. This internet service provider maintains large runs of cabling and maintains network services in order to transfer and deliver web content to those paying the subscription fee. Typically, these internet service providers focus on DSL, Cable modem, wireless, and more recently, dedicated high-speed interconnects such as T1 or fiber optic service (typically abbreviated Fios). While far less common, ISPs still offer dial up internet service, which is gradually become a phased out. All in all, there are many different types of Internet Service Providers, and within each and every internet service provider there are often varying levels of service, coverage, as well as personal customer service that comes attached with it. An Internet Service Provider is a complete package of services, which should be researched and considered before an Internet Service Provider is selected.

For most users, the most important qualification (beyond the ever present price point) is the speed of the connection. Depending on the intended use, there are a myriad of different internet services, and even varying levels of coverage within each and every service. The slowest of these is dial-up internet service. Modern dial-up transfers web content at a maximum rate of 56.6 kilobits per second. In the early days of internet service, this was typically sufficient, as websites were designed with a lean mentality, with very little imagery and a heavy emphasis on text, and text based linking. As time has progressed however, most websites assume that the user is on a high speed connection, and have therefore loaded their website with visual flair and high file size images. What was once acceptable no longer is for most web users, who opt to selecting a faster service.
Mid-Range services available for home include Cable Internet or Digital Subscriber Line (DSL) service. While DSL is available as slow as 128 Kilobits per second (just slightly more than twice the speed of dial-up service) most of these providers have since upgraded their capacity and provide service as fast as 3000 Kilobits per second. For most people, this is sufficient however there are currently faster services available to those who either desire them, or require them to operate their business.
For those simply not interested in paying for internet access, there are a very small number of Free ISPs available. These providers provide internet service free of charge, typically funded through advertising revenue (much like television broadcasts on most stations). Unfortunately, this variety of ISP is gradually falling by the wayside. Netzero, one the earliest example of this service no longer provides an ad supported internet service, and instead focuses on low priced services such as dial up.
All in all, an Internet Service Provider has the very complicated job of setting up and maintaining a network to connect its users to the internet. The inner workings of an ISP vary significantly from company to company, and much of their inner workings are company secret. It's difficult to understand just how internet service providers operate, however from the buyer's perspective the process of using an ISP are incredibly simple. Once a level of connectivity is decided upon, it's simply up to the buyer to research their alternatives, and determine the best solution for their budget and needs.
[--------------]

What is a Dialup Internet Service

Dialup internet service is a service that allows connectivity to the internet through a standard telephone line. By connecting the telephone line to the modem in your computer and inserting the other end into the phone jack, and configuring the computer to dial a specific number provided by your internet service provider (ISP) you are able to access the internet on your computer. Dial up internet service is provided through several ISP. The majority of internet service providers give you a set of telephone numbers either national or local that allows you to dial into a network that feeds into the internet. This allows you to receive and send email, search the World Wide Web, participate in chat rooms and plenty of other features the web has to offer.
In order to get a dial up internet service a person must definitely have a computer and even more important a modem. There are different types of modems, and most of them are inexpensive to purchase. You can have an internal modem installed in a free slot of your computer, or you can have an external modem that's hooked up to the computer through cables. A telephone line is linked to the modem.
The modem whether external or internal is controlled by software on the computer. With Microsoft Windows operating system that software is the Network Connection utility which allows you to connect to the internet. How? In the Network Connection utility you have to set up ISP profile so that the modem knows what phone number to dial so that you can connect to the internet.
Once you have found an internet service provider and joined you must choose a password and username. Why? When the modem dials the phone number you are given by your ISP, a connection is made, and then information is swap between the modem and the remote server. A remote server is the computer and related software that is established to handle users who want to access a network remotely. The username and password you choose for the modem allows access to the dial up gateway to the internet. The gateway to the internet is a network that allows entry into another network.
If you are looking for an inexpensive internet service dial up is the way to go. Not only is it the cheapest but also the slowest type of access you can get. Since the bandwidth is limited it will take some time for the modem to send and receive information. It will be slow loading web pages, listening to music and watching videos online. There are all kinds of software available that can help speed up your dial up internet.
With dial up internet you cannot use the phone and search the web at the same time. How come? Remember while one end of the telephone is linked to the modem the other end is in the phone outlet. There are internet services available that allows you to use the phone at the same time and be online.
So as you can see dial up internet has its pros and its cons. If you are looking for a inexpensive internet service and don't mind not being able to talk on the phone and use the web at the same time then dial up is definitely for you!


[--------------]

What is Broadband?

Broadband Internet service truly is the most used form of Internet access because of its high access speeds; it is offered in four different forms, DSL (or Digital Subscriber Line), also fiber-optic, cable, and satellite. The old dial-up connection is the only non-broadband internet service available, and even though it is cheaper, most Internet users are moving towards the faster broadband Internet connection.


DSL

The DSL (or Digital Subscriber Line) internet service makes its connection by utilizing unused telephone wires that cause no interruption to your telephone service. The speed you experience with a DSL connection varies with your distance from the switching station. Your speed will be slower the further away you are and faster the closer you are to the switching station and this may be a deciding factor when you attempt to select between a DSL line and a cable connection.


Cable

The broadband cable connection is provided by the local cable TV provider. Here the cable Internet connection speed varies with the number of users on the service at a specific point in time. Given a specific geographical area, users of the broadband cable service share the connection bandwidth which slows the speed the more users are on the system. This will occur at the peak times for example late in the evenings after the work day is over when many people will be accessing the Internet. Somewhat misleadingly, often the cable company would estimate connection speeds that are based on the thinking that you are using the service. But that is clearly not the case.


Fiber-Optic

The newest broadband service is fiber-optic, which is the fastest Internet connection thus far. However, this type of Internet service is still in its infancy as its service areas are quite limited and because the laying down of the fiber-optic cable takes a while to complete. Wherever it is available, the cost not only competes with that of DSL and cable, but it provides a much faster connection than both of those services.


Satellite

The last and slowest broadband service is provided by satellite. Although this is a good replacement for dial-up for those people living in remote rural areas, the installation costs are quite high, but the ongoing monthly charges are competitive to both cable and DSL.

There are many advantages to the DSL and cable broadband service. It provides greater bandwidth than other Internet access forms, and that makes it easier for the computer user to multitask with several applications performing in the background while you surf the web. It is possible for you to surf the web while listening to audio.

The networking of computers in the home is made easier with a broadband connection, by either using wireless or wired modems.

The cost of broadband service is higher annually than the cheaper dial-up version by $100 to $500, but given the advantages and ease of a broadband connection, it is well worth the cost.

A broadband connection allows you to play many popular computer games that rely on a fast Internet connection.

Broadband connection, unlike the old dial-up internet connection, will not engage your phone line when in use. In fact, having a broadband connection makes it possible for you to obtain an Internet phone service so you will no longer need the traditional phone line at all.

Another great benefit of a broadband connection is that you are constantly connected to the Internet. You are quickly able to connect with your work's intranet and email in a matter of seconds.

Many people considering between these broadband Internet service options generally narrow the search to the most popular services which are DSL and cable. A good approach when researching your options would be to ask those in the area you are considering, which service they are using and how it is working for them.

Even though cable broadband Internet service offers a speedy internet connection, this fast speed will not be realized if the connection itself cannot be relied on. For example, the cable connection you receive depends on the shared bandwidth, the number of users on the system at any time, and the latency on the network.

The bandwidth is just one factor that determines the Internet connection's speed. It is a measure of the quantity of data that enters the network over a period of time, and is measured in bps, or bits per second. The greater the data flow, the better the network Internet connection. In broadband connections the supported data rates are generally 300 Kbps and higher, as opposed to the old dial-up maximum of 53Kbps.

Latency is another factor that affects the cable Internet connection's speed. Latency refers to delays incurred in the network data processing. A network is described as low latency if it experiences only small delay times, and high latency if it suffers with long delays. When the latency becomes excessive, data transmission causes a bottleneck that prevents addition data from coming through and this effectively reduces cable's Internet connection bandwidth. So even though the cable bandwidth of your Internet connection is set, its effectiveness can be reduced by bottlenecks of data and a high number of users on the system .

Again, with a broadband DSL connection, the connection speed of the Internet can be severely reduced by the distance a subscriber is located from the switching station. The further away the subscriber is from the switching station, the slower the Internet connection.

Once installed, a broadband connection is always on. The connection is maintained with the use of a cable or DSL modem. These connect the computer to the cable outlet on the wall, in the case of the cable internet connection; or the DSL modem to the phone line. Only when these connections become unplugged, will the Internet connection be lost.

Unlike the old dial-up service, you will not be dialing a specific phone number to gain access to the Internet. With a broadband service, access to the Internet is given by simply double clicking your Internet browser icon of choice (this is usually on your desktop - Internet Explorer, Firefox, Netscape etc.); your default web page will open and you can immediately start surfing the web. The whole process should take no more than about 10 to 15 seconds, depending on the computer's speed itself and baring any issues of slowness. 


[--------------]