Showing posts with label Computing. Show all posts
Showing posts with label Computing. Show all posts

Wednesday, April 2, 2008

Increasing Your Search Engine Ranking


The methods employed to increase your search engine
rankings may seem like rocket science to you, so you have
probably avoided dealing with this issue. I am here to tell
you - the time has come to face your website! A high search
engine ranking for your website is so essential that if you
have the slightest desire to actually succeed in your
business, there is no way you can continue to avoid this
issue.

At least 85% of people looking for goods and services on
the Internet find websites through search engines such as
Google, Yahoo, and MSN. The idea of optimizing your pages
for high search engine rankings is to attract targeted
customers to your site who will be more than likely to make
a purchase. The higher your page comes up in search engine
results, the greater the traffic that is directed to your
website. That's what search engine optimization is about.


You can immerse yourself in all the technical information
available online to figure out how to optimize your web
pages to achieve higher rankings. Or you can look at a few
simple items on your pages, make some small adjustments,
and most likely see improved rankings quite rapidly. The
first item you should examine is the title bar on your
homepage.

The title bar is the colored bar at the top of the page.
Look at the words that appear there when you access your
home page. To increase search engine rankings, the words on
your homepage's title bar should include the most important
keywords or phrases, one of which would include your
company name.

Then click on all your links and examine the title bars on
the pages you access. Each title bar on every single page
of your site should contain the most important keywords and
phrases taken from the page itself. However, avoid very
long strings of keywords, keeping them to six words or
less. Avoid repeating keywords more than once in the title
bars, and make sure that identical words are not next to
each other.

The next item to put under your microscope is your website
content. Search engines generally list sites that contain
quality content rather than scintillating graphics. The
text on your site must contain the most important keywords
- the words that potential customers will be typing into
search engines to find your site.

Aim to have around 250 words on each page, but if this is
not desirable due to your design, aim for at least 100
carefully chosen words. If you want to achieve a high
ranking on search engines, this text is essential. However,
the search engines must be able to read the text, meaning
that the text must be in HTML and not graphic format.

To find out if your text is in HTML format, take your
cursor and try to highlight a word or two. If you are able
to do this, the text is HTML. If the text will not
highlight, it is probably in graphic form. In this case,
ask your webmaster to change the text into HTML format in
order to increase your search engine rankings.

Next we come to what is called meta tags. I know this
sounds like something out of science fiction, but it is
really just simple code. Many people believe that meta tags
are the key to high search engine rankings, but in reality,
they only have a limited effect. Still, it's worth adding
them in the event that a search engine will use meta tags
in their ranking formula.

To find out if your page is set up with meta tags, you must
access the code. To do this, click the "view" button on the
browser menu bar, and select "source." This will pull up a
window revealing the underlying code that created the page.
If there are meta tags, they usually appear near the top of
the window. For example, a meta tag would read: meta
name="keywords" content=. If you do not find code that
reads like this, ask your webmaster to put them in. This
may not do much for your search engine rankings, but any
little boost helps.

Lastly, we come to the issue of link popularity. This is a
factor that is extremely important in terms of search
engine rankings. Almost all search engines use link
popularity to rank your website. Link popularity is based
on the quality of the sites you have linked to from your
links page.

If you type in "free link popularity check" in a popular
search engine, the search engine will then show you what
sites are linked to your site. In the case that there
aren't many sites linked up to yours, or that the sites
that are linked up have low search engine rankings,
consider launching a link popularity campaign. Essentially,
this entails contacting quality sites and requesting that
they exchange links with your site. Of course, this
requires checking out the rankings of the websites you want
to link up with. Linking to popular, quality sites not only
boosts your search engine ranking, but it also directs more
quality traffic to your website.

Search engine rankings are extremely important for a
successful Internet marketing campaign. Before you go out
and hire a search engine optimization company, try taking
some of the simple steps listed above, and see if you can't
boost your rankings yourself. Don't ever ignore this
all-important factor in Internet marketing. Remember, the
higher your search engine ranking, the more quality
customers will be directed your way.


Read more.....

Generator sitemap programs can be downloaded from various sources on the Internet. Generator sitemap programs have two fundamental purposes. Generator


Generator sitemap programs can be downloaded from various sources on the Internet. Generator sitemap programs have two fundamental purposes. Generator sitemap programs help surfers navigate a site effectively. At the same time, a generator sitemap program encourages search engine spiders. Google offers one of the most popular generator sitemap programs ever to hit the Internet.

The generator sitemap of google makes it possible for a website to get listed and get updated by the google search engine. Setting up the generator sitemap helps speed up the addition of the web pages of a site to the google listing. The generator sitemap also makes it easier for a site to get noticed by online surfers. In addition, any changes made to a website that has a generator sitemap is immediately picked up by google. The generator sitemap also helps keep online information fresh and up-to-date for users.

Visibility is key to generator sitemap

Visibility is a major concern when using a generator sitemap. A website that is completely indexed has better chances of getting top search engine placement in page results. Many of the popular browsers used by searchers and that support java recognize generator sitemap programs. These include firefox and Internet explorer.

An online consumer that searches for a specific content on the web can immediately be directed to any one of the web pages of a particular site. The generator sitemap makes it easier for a search engine to provide accurate results from web pages they are familiar with.

Who can benefit from a generator sitemap?

A generator sitemap is highly recommended for websites that often do repeated modification of their web pages. A generator sitemap can be used for websites of any size, regardless of the number of web pages a site may contain.

Although using a generator sitemap is not a guarantee of increased site rankings, it does however provide a website a better opportunity of getting listed on a search engine.

Working with a generator sitemap

Most of the available generator sitemap programs available on the web make use of extensible markup language or XML. Similar to hypertext markup language or HTML, XML is used widely in blogs and syndicated feeds on the Internet. Each line of a XML code for a generator sitemap has a specific purpose.

The location or <.loc> identifies the name of the web page of a website. The line <.lastmod> indicates when the web page was last modified. The format for <.lastmod> can either be dd.mm.yyyy, dd.mm.yyyy hh:mm, dd/mm/yyyy or dd/mm/yyyy hh:mm. Shortcuts can also be used to simply the assignment of dates to the cell.

<.changefreq> advises the search engine of a specific time frame when the web page is regularly updated. This can either be done on an hourly, daily, weekly, monthly or yearly basis. For web pages that are not updated, the value 'never' is used. <.priority> indicates the level of priority that a search engine should give a particular web page of a website. These levels range from 0.0 for least priority to 1.0 for high priority.

Creating a dynamic generator sitemap

Creating a dynamic generator sitemap is useful for websites containing various web pages. The google search engine makes it easy for users to adapt their google sitemap with the help of a python script.

The python script generates a sitemap using sitemap protocol. This creates a sitemap from either access logs, URL lists or from web server directories.

Tips for using a generator sitemap from google

As one of more popular search engines offering a generator sitemap for websites on the Internet, google offers a few tips for its loyal users. Using the google sitemap url encoder/decoder is helpful for submitting sitemaps to google. For websites that have numerous web pages, creating a sitemap can be a tremendous task. For this situation it is best to click on the column title in order to make it easier for a URL list to get sorted.

The google generator sitemap allows users to save their settings after creating a sitemap. Users can use these saved settings as a guideline for succeeding generator sitemap updates. The generator sitemap also recognizes the use of robots.txt files.

Using a generator sitemap is a positive move in getting top ranking on the Internet's top search engines as well as high visibility among online users.




Read more.....

Thursday, March 27, 2008

Analyzing Website Traffic


Analyzing your web traffic statistics can be an invaluable
tool for a number of different reasons. But before you can
make full use of this tool, you need to understand how to
interpret the data.

Most web hosting companies will provide you with basic web
traffic information that you then have to interpret and
make pertinent use of. However, the data you receive from
your host company can be overwhelming if you don't
understand how to apply it to your particular business and
website. Let's start by examining the most basic data - the
average visitors to your site on a daily, weekly, and
monthly basis.


These figures are the most accurate measure of your
website's activity. It would appear on the surface that the
more traffic you see recorded, the better you can assume
your website is doing, but this is an inaccurate
perception. You must also look at the behavior of your
visitors once they come to your website to accurately gauge
the effectiveness of your site.

There is often a great misconception about what is commonly
known as "hits" and what is really effective, quality
traffic to your site. Hits simply means the number of
information requests received by the server. If you think
about the fact that a hit can simply equate to the number
of graphics per page, you will get an idea of how overblown
the concept of hits can be. For example, if your homepage
has 15 graphics on it, the server records this as 15 hits,
when in reality we are talking about a single visitor
checking out a single page on your site. As you can see,
hits are not useful in analyzing your website traffic.

The more visitors that come to your website, the more
accurate your interpretation will become. The greater the
traffic is to your website, the more precise your analysis
will be of overall trends in visitor behavior. The smaller
the number of visitors, the more a few anomalous visitors
can distort the analysis.

The aim is to use the web traffic statistics to figure out
how well or how poorly your site is working for your
visitors. One way to determine this is to find out how long
on average your visitors spend on your site. If the time
spent is relatively brief, it usually indicates an
underlying problem. Then the challenge is to figure out
what that problem is.

It could be that your keywords are directing the wrong type
of visitors to your website, or that your graphics are
confusing or intimidating, causing the visitor to exit
rapidly. Use the knowledge of how much time visitors are
spending on your site to pinpoint specific problems, and
after you fix those problems, continue to use time spent as
a gauge of how effective your fix has been.

Additionally, web traffic stats can help you determine
effective and ineffective areas of your website. If you
have a page that you believe is important, but visitors are
exiting it rapidly, that page needs attention. You could,
for example, consider improving the link to this page by
making the link more noticeable and enticing, or you could
improve the look of the page or the ease that your visitors
can access the necessary information on that page.

If, on the other hand, you notice that visitors are
spending a lot of time on pages that you think are less
important, you might consider moving some of your sales
copy and marketing focus to that particular page.

As you can see, these statistics will reveal vital
information about the effectiveness of individual pages,
and visitor habits and motivation. This is essential
information to any successful Internet marketing campaign.

Your website undoubtedly has exit pages, such as a final
order or contact form. This is a page you can expect your
visitor to exit rapidly. However, not every visitor to your
site is going to find exactly what he or she is looking
for, so statistics may show you a number of different exit
pages. This is normal unless you notice a exit trend on a
particular page that is not intended as an exit page. In
the case that a significant percentage of visitors are
exiting your website on a page not designed for that
purpose, you must closely examine that particular page to
discern what the problem is. Once you pinpoint potential
weaknesses on that page, minor modifications in content or
graphic may have a significant impact on the keeping
visitors moving through your site instead of exiting at the
wrong page.

After you have analyzed your visitor statistics, it's time
to turn to your keywords and phrases. Notice if particular
keywords are directing a specific type of visitor to your
site. The more targeted the visitor - meaning that they
find what they are looking for on your site, and even
better, fill out your contact form or make a purchase - the
more valuable that keyword is.

However, if you find a large number of visitors are being
directed - or should I say misdirected - to your site by a
particular keyword or phrase, that keyword demands
adjustment. Keywords are vital to bringing quality visitors
to your site who are ready to do business with you. Close
analysis of the keywords your visitors are using to find
your site will give you a vital understanding of your
visitor's needs and motivations.

Finally, if you notice that users are finding your website
by typing in your company name, break open the champagne!
It means you have achieved a significant level of brand
recognition, and this is a sure sign of burgeoning success.


Read more.....

Advantages and Disadvantages of Purchasing Your Own Affiliate Tracking Software


Millions of business owners rely on affiliate programs to help increase their sales and in turn their profits. If are the owner of an online business, especially one that sells a particular product or service, you may be able to benefit from the use of an affiliate program. If properly implemented, they are a great way to increase your business’s revenue without having to do a large amount of extra work The first step in getting started is to find an affiliate tracking software.

An affiliate tracking software? If you have never heard of this product before, you may be wondering exactly what it is. Affiliate tracking software is the actual program behind your own affiliate program. If you start your own affiliate program, you will be relying on your banners and links to help increase your websites traffic and its sales. These banners will be placed on the websites of your affiliates. With affiliate programs, each time that one of those links is used to generate a sale, the website owner, webmaster, or website publisher, whoever you are partnering with, will receive compensation for their part in the sale.

To be able to compensate your affiliates, you will need to have a way to determine if, when, and who helped you generate a sale. This can only be done with affiliate tracking software. Therefore, if you are interested in starting your own affiliate program, you must have affiliate tracking software. When it comes to affiliate tracking software, you will have a number of different options. Two of those options include purchasing your own affiliate tracking software program or using someone else’s.

If you use someone else’s affiliate tracking software program, you will most likely end up doing business with an affiliate networking company. These companies not only provide you with tracking software, but they also help to track the sales of your affiliates, and even pay them. The payment feature is unique because it is not offered on most software programs that you have to buy on your own. With software programs that you buy on your own, the software should calculate how much you owe each of your affiliates, but you are required to take care of the rest. Depending on what your business is and how busy you are, you may not have time for this.

Having to pay your own affiliates may seem like a disadvantage to buying your own affiliate tracking software; however, it doesn’t necessarily have to be. Even though you are still required to send out your own payments, you will generally find that this process is easy to do. That is because most affiliate tracking software programs are designed to automatically calculate the amount of money each of your affiliates make. Whether you choose to pay your affiliates on a weekly or monthly basis, you should be able to find out, right away, how much money you have to pay them. If you are paying them with a check, you can simply write the check and move on to something else.

A potential disadvantage to purchasing your own software can actually turn into an advantage. That disadvantage is customer service support. A large number of affiliate tracking software programs do not come with customer support. Almost all will come with a detailed user guide, but customer service support is not guaranteed. Despite the fact not all software programs offer customer support, there are even more that do. This means that if you want to have access to customer service support, you just need to find affiliate tracking software that has the support included. If free customer service support is included, it should be outlined in the software description or software features section.

The above mentioned advantages and disadvantages are important when determining whether or not you should purchase your own affiliate tracking software or do business with an affiliate networking company. Whichever decision you make, you should be well on your way to seeing an increase in profits. The affiliate tracking software program you choose will not have a direct impact on how much money you make, but it will have an impact on how easily your affiliate program flows.

PPPPP

Word Count 698





Read more.....

Tuesday, March 25, 2008

5 Ways to Keep Visitors Coming Back


A lot of successful websites depend on returning visitors to account for a major part of their traffic. Returning visitors are easier to convert into paying customers because the more often they return to a site, the more trust they have in that site. The credibility issue just melts away. Hence, keep your visitors coming back to your site with the following methods:

1) Start a forum, chatroom or shoutbox

When you start a forum, chatroom or shoutbox, you are providing your visitors a place to voice their opinions and interact with their peers -- all of them are visitors of your site. As conversations build up, a sense of community will also follow and your visitors will come back to your site almost religiously every day.

2) Start a web log (blog)

Keep an online journal, or more commonly known as a blog, on your site and keep it updated with latest news about yourself. Human beings are curious creatures and they will keep their eyes glued to the monitor if you post fresh news frequently. You will also build up your credibility as you are proving to them that there is also a real life person behind the website.

3) Carry out polls or surveys


Polls and surveys are other forms of interaction that you should definitely consider adding to your site. They provide a quick way for visitors to voice their opinions and to get involved in your website. Be sure to publish polls or surveys that are strongly relevant to the target market of your website to keep them interested to find out about the results.

4) Hold puzzles, quizzes and games

Just imagine how many office workers procrastinate at work every day, and you will be able to gauge how many people will keep visiting your site if you provide a very interesting or addicting way of entertainment. You can also hold competitions to award the high score winner to keep people trying continuously to earn the prize.

5) Update frequently with fresh content

Update your site frequently with fresh content so that every time your visitors come back, they will have something to read on your site. This is the most widely known and most effective method of attracting returning visitors, but this is also the least carried out one because of the laziness of webmasters. No one will want to browse a site that looks the same over ten years, so keep your site updated with fresh bites!


Read more.....

Important Rules in Website Design


When it comes to your website, extra attention should be paid to every minute detail to make sure it performs optimally to serve its purpose. Here are seven important rules of thumb to observe to make sure your website performs well.

1) Do not use splash pages

Splash pages are the first pages you see when you arrive at a website. They normally have a very beautiful image with words like "welcome" or "click here to enter". In fact, they are just that -- pretty vases with no real purpose. Do not let your visitors have a reason to click on the "back" button! Give them the value of your site up front without the splash page.

2) Do not use excessive banner advertisements

Even the least net savvy people have trained themselves to ignore banner advertisements so you will be wasting valuable website real estate. Instead, provide more valueable content and weave relevant affiliate links into your content, and let your visitors feel that they want to buy instead of being pushed to buy.

3) Have a simple and clear navigation

You have to provide a simple and very straightforward navigation menu so that even a young child will know how to use it. Stay away from complicated Flash based menus or multi-tiered dropdown menus. If your visitors don't know how to navigate, they will leave your site.

4) Have a clear indication of where the user is

When visitors are deeply engrossed in browsing your site, you will want to make sure they know which part of the site they are in at that moment. That way, they will be able to browse relevant information or navigate to any section of the site easily. Don't confuse your visitors because confusion means "abandon ship"!

5) Avoid using audio on your site

If your visitor is going to stay a long time at your site, reading your content, you will want to make sure they're not annoyed by some audio looping on and on on your website. If you insist on adding audio, make sure they have some control over it -- volume or muting controls would work fine.



Read more.....

Thursday, March 20, 2008

Firefox 3 beta 4 code freeze tonight, beta 5 release looks likely


The Mozilla Firefox 3 development team expects to freeze the beta 4 code tonight as planned but will likely have to release yet another beta to address some of the outstanding bugs and blockers in the code.

During its weekly Firefox meeting on Tuesday, developers said they will freeze the code tonight, on Feb 26 (before midnight) as planned but will likely have to release a beta 5 before moving onto release candidate mode.

The team hoped that Beta 4 would be the last, as it shoots to ship the final Firefox 3 in early 2008.

“Nothing is going to stop the code freeze tonight [but] a fifth beta is going ot be required,” said one of the developers leading the meeting today. He and others said there are more than 200 bugs remaining in the code, though many have fixes and patches that need to be integrated into the build and tested before the browser beta 4 can be shipped.

“We’re not breaking them because we’re jerks but because we’re stupid,” quipped one of the developers. “No one is really happy about this. Obviously, .. the goal of beta 4 was [to be]the last beta but it’s not.”

Beta 4 incorporates significant new user interface enhancements, including new Vista and Mac OSX icons. The Linux icons are complete, developers said today,

Firefox 3 is expected to be released in early 2008. Developers did not say when Beta 4 would be available to the general public for testing or when Beta 5 would debut.

An update to this report will be provided as details come in.


Read more.....

Google playing politics with open source


For open source, a choice between Google and Microsoft is a false choice.

Yet that’s what Google CEO Eric Schmidt is offering, as when he claims a Microsoft-Yahoo combination might “break the Internet” or that the two might act against the openness of the Internet.

It’s a false choice, in part, because neither Google nor Microsoft can come to the argument with clean hands. Google’s open source efforts are mainly done under Apache licenses, which don’t require they be shared. It does not support the AGPL.

Its catchphrase to “do no evil” is like the Declaration’s statement that “all men are created equal.” It is an aspiration. Reality is different.

Schmidt is playing with open source here much as politicians have been playing with race, religion and gender. By creating a phony “either-or” choice they create majorities and minorities.

But open source is about consensus.

Consensus is when we all agree to agree, then build from there. Even Microsoft has been forced, lately, to bow to consensus. Its Open Specifications Promise may be pie crust, but that’s more than we’ve had before, and that’s progress.

Microsoft’s machinations around Office Open XML, which continue, are all aimed at offering reassurances that a proprietary standard need not be treated as one. True or not, they are at least trying to appear less evil.

They are doing so because the Internet consensus has power. That power is more important than any single vendor’s commitment to it.

Business competition is inevitable. Neither the Internet nor open source are guarantees against it. Both offer a level playing field in which everyone’s evil becomes relative, and no one has the power to make it absolute.

Not Microsoft. Not Google. And that’s not a pie crust promise. It’s a promise we can build on.


Read more.....

How to Install Ruby on Rails with Instant Rails and Create a Website Using JEdit and the Ruby Plugin


1.Goto rubyforge.org/projects/instantrails and click on the download link.

2.Right-click on the InstantRails-2.0-win.zip link and save the .zip file to a local directory.
3.Wait until it is downloaded which could take a couple minutes.

We are going to need a zip program for our installation as well as doing backups, etc. during development, so we will install the free 7zip program now.

4.Goto www.7-zip.org and click on the download link for the 32-bit .exe.
5.Click on Save File .
6.Double-click on the file that you downloaded.
7.Click on the Install button.
8.Click on finish.

Now that the Instant Rails zip file is on our hard drive and we have a zip program, we are going to unzip and install Instant Rails

9.Right-click on the zip file and unzip it.
10.Type in c:\instantRails and click OK .
11.Wait a couple minutes for it to unzip.
12.Hold down the CTRL-SHIFT keys and drag the InstantRails.exe icon down to your tool bar so you can start it easily.
13.When it informs you that the configuration files moved, click OK .
14.Click Unblock so that the XP firewall allows Apache to work.
15.Click on the "I" icon and select Rails Applications and then Manage Rails Applications....
16.Check Cookbook and click Configure Startup Mode... .
17.Note the port number and click Cancel .
18.Click Start with Mongrel .
19.Click Unblock .
20.In your browser, enter http://localhost:3001 where 3001 is the port number you noted above. You will see the Online Cookbook application which means that Instant Rails is installed and working.

To run our edit JEdit which we will install in the next step, we first need Java so we will download and install it now.

21.Goto developers.sun.com/downloads.
22.Click on the Java SE (JDK) 6 link.
23.Click on the Download button for JDK 6u1.
24.Click Accept and Click on Windows Offline Installation, Multi-language.
25.Click OK to save it to disk.
26.Save it to C:\download\java6.
27.After it has finished downloading, you will have this file in your directory.
28.Double click on file that was downloaded.
29.Accept agreement.
30.Click Next and it will install for about 8 minutes.
31.Unclick the Show the readme file checkbox and click Finish .
32.

Read more.....

Friday, February 1, 2008

An overview of the continuous data protection


IT-organisms were caught between a rock and a hard ground. Charged with protecting the information of their business, IT organizations have aggressive Service Level Agreements (SLA), the impact on nature and the way the Council of the implementation of data protection hiring Recovery Point Objectives ( RPO), and the recovery time (RTO).
Organizations are struggling with shrinking or nonexistent backup window, the need to restore quickly, in most cases at a certain point in time, as well as compliance with legal or regulatory guidelines. The creation of backup copies on tape no longer appropriate, it is not only difficult to manage for backups and recoveries, but there is a lack of speed, reliability, flexibility and simplicity of the computer needs SLAs strict. Save it to disk with virtual tape or simulated Virtual Tape Libraries brief also notes that the administration of the solution is pushed Tape-centric and a timetable. You stick to the explosion of data, with the challenge to ensure the protection of remote offices, and you have risen to the challenge, there is a lot of today's business environment - with computers before the meeting on Harmonization of lines of business life today, the requirements related to technology.

As a result, a growing number of IT organizations traditional development of their backup and recovery strategies for continuous data protection (CDP) solutions. RPOs CDP, and improves dramatically, while the elimination of RTOs backup window. What's more, PSC not only reduces the need for a cartridge in the backup and recovery process, but it is also quite simple, often Recovery, users can restore their own files without the aid of computers.

What is the CDP?

CDP is a process that will enable organizations to collect continuous tracks or modifications of data and records regardless of changes in primary education, the recovery of certain items in the past. PSC can block file systems, or application and can be based on objects restored granularities fine gradations of recovery points in time.

PSC reduces the complexity of data protection system and represents a classic challenge theing the backup window, since it eliminates the need for complete information, differential or incremental backups by the continuous data protection, and then immediately the hard disk. CDP is not a complete replacement for traditional backup, but an important part of a good flare backup and restore of the Community strategy.

Maybe increased the CDP for backup and recovery of the e-mail? Given that the dominant form of communication for business transactions, E-Mail is an application of Mission-Critical for organizations of all sizes. It produces an enormous amount of information that is readily available and protected. The loss of a single message May generate hours of unnecessary work and frustrating for administrators and / or the user and can be low productivity or likely to affect the activity. And with the introduction of Microsoft Exchange 2007, organizations need to be protective measures solutions, including the assumption of the last offer from Microsoft.

It is not surprising that the amount of data e-mail, to the protection and availability grows exponentially. IT, which is faced with the challenge of securing these critical data within the existing backup window, and is recovering rapidly. In addition, they must not only be able to save and restore the overall e-mail databases, but they also need a system that allows the recovery of individual mailboxes or by e-mail . However, if the directors should have a complete backup copy of the e-mail, database, disaster recovery purposes and to be able to individual e-mail, folders or mailboxes, they usually make backups were separated.

Granular Recovery born New technologies that enable e-mails, mailboxes and individual files must be restored, without having to start all over a database of mail, and letters without separate and redundant backups. In an Exchange environment, for example, a simple pastime full or incremental backups of Exchange is necessary to dramatically reduce the time needed to protect all mailboxes, but at the same time reduces the backup storage required.

PSC considerably simplified backup and recovery of the e-mail to completely eliminate the need for implementing planned daily E-mail backup and recovery acceleration, in order to ensure continuity of supply ' e-mail.

How does the CDP end users can improve their own data?

Given that the CDP is a disk-based protection and recovery of the solution, it is possible to detail allow their own data. Some offer solutions PSC for this type of functionality, some with the help of a simple web interface that do not have the training, and allows users of old versions of files, without contact with computers. Empowering users to retrieve their own data free spread to other needs of business-critical of the organization.

SB-Thanks to these solutions recovery, the recovery lost, damaged or replaced data is as simple as searching and download files from the Internet. There is no tape to find or load and no further information on the restoration, see the appropriate file. Most importantly, these solutions do not require the installation of client software or individual officers on desktops and laptops a paradigm familiar Web does not require training. Users need only a standard Web browser, so that retrieval of data easier than ever.

Is CDP protection against data loss or corruption, because of security threats?

DP offers inherent in dealing with security threats by protecting data from the destructive impact of these attacks by viruses, worms, Trojan horses, etc.. Thanks to backing up data continuously CDP allows organizations, and the latest "good" data that are stored prior to the attack. The ability to "dial-back", a short time before that loss is a major gain for today's economy and information technology.

What is the role of traditional tape backup and data protection play today?

For decades, band has emerged as an effective tool for data protection and recovery. Tape is inexpensive media for data storage and portable format can easily be moved off-site. The administrators are also familiar with adhesive tape and procedural backup band, so it's a fairly simple task to be fulfilled, if only directors can be trained data from tapes.

Tape-based backup systems with the flexibility and simplicity, that many organizations now have to be given to a solution. The speed of the recovery, especially for files or e-mails is also a problem with the support solutions. Proper media and bandwidth management turnover, coupled with the need to strengthen the monitoring and management of the health of the band equipment are complex systems that require computer skills of the staff.
Today, there are more and more organizations have become a Disk-to-Disk-to-Tape strategy. It capitalizes on the characteristics of speed and reliability for Disk-based Backup - continues, including the protection and data migration, and then on the tape data and long-term side of data protection and storage off-site.

Utilizing both disk and tape-based data systems and methods of nature and in the right way, the greatest protection for businesses and help to ensure that IT strategies on the approximation of its needs best.

Pat Hanavan, Vice President, Product Management, Data & Systems Management Group at Symantec.



Read more.....

Network Protocols


Network protocols such as
HTTP, TCP / IP, SMTP and provide a basis that a large part of the Internet is based on. To find out more about these protocols and how they work.

•IP and IPv6
•FireWire
•DHCP
•PPPoE
•FTP
•TCP and UDP

What is a network protocol?
Network protocols defined a language of rules and conventions to improve communication between the network devices.
What is Debian?

For packages, is a method of network protocols, including IP and frame relay for the provision of data on a network of individual computers as part of the small pieces.
ARP - Address Resolution Protocol
ARP converts an IP address for the network physical address. ARP protocol is a low-level rule supplement, in the drivers of the operating systems network. ARP is the most frequently used on Ethernet networks.
Http - Hypertext Transfer Protocol
The Hypertext Transfer Protocol - HTTP - provides a standard for browsers and Web servers to communicate. HTTP is a protocol to the application layer network built on TCP.
ATM protocol - Asynchronous Transfer Mode networking
ATM is a broadband networking standard developed for both voice and data communications. ATM works, the backup layer (OSI Layer 2), that is more than the fiber or twisted-pair cable.

Spanning Tree Protocol
The Spanning Tree protocol implements a standardized to prevent the transmission of redundant data along hops between a source and destination.
NTP - Network Time Protocol
Network Time Protocol, is a system that runs on the servers synchronize clocks time for the computer of the day through the Internet.
SOCKS
SOCKS is an Internet protocol developed for the customer to communicate with the proxy server (or VPN server) via the network firewall.
Frame Relay
Frame Relay is a network protocol designed for use in Wide Area Networks (WAN). Frame Relay works on glass fibre or ISDN lines.
X.25
X.25 is a standard for connecting protocols for the placement and routing of packets between networks. The X.25 protocols work, the physical, data-linking, and network layers (layers 1 to 3) of the OSI model.
SNMP - Simple Network Management Protocol
SNMP is a TCP / IP protocol for the management of the network, including the monitoring and control of network devices.
H.323
H.323 is a standard protocol for multimedia communications. H.323, support for the real-time transmission of audio and video over networks, the packet.
SS7 - Signaling System 7
The SS7 protocol provides mechanisms for the exchange of special purposes or messages through the public telephone network.
SCTP - Stream Control Transmission Protocol
SCTP is an alternative to TCP and UDP ports. Some network protocols at a higher level, SIP and SS7-use SCTP.
Protocol analyzer Ethereal Network
Ethereal is a utility program of high quality, by the students, researchers and companies for the monitoring of network traffic.
"Internet Core Protocols - The Definitive Guide"
The book brings in terms of the basic technical background, such as TCP, ICMP and ARP.ireless?
Wired Wireless
Easy installation of moderate difficulty, but attention interference
Costing more with less
High reliability relatively high
Performance very well, well,
Security quite well enough
Limited mobility pending


Read more.....

Wired Wireless Networking?


Building the Local Area Network, the way ahead
Computer networks for the home and small businesses can be built with wireless or landline. Wired Ethernet, the traditional election in homes, but the Wi-Fi, wireless technologies are rapidly growing. Both wireline and wireless, has advantages over the other, the two viable options to represent the house and other local area networks (LANs).

Here you can compare the wired and wireless networks in five key areas:

•Easy installation
•Total Cost
•Reliability
•Power
•Security

About Wired LAN
Wired Ethernet LAN, using the cable and network adapter.
Although both computers can be directly connected with one Ethernet cable crossover cable, wireline LANs Rule also a power devices such as hubs, switches, routers or multiple computers.

Dial-up Internet connections and hosting your computer you need to use the modem Internet connection sharing or similar software to share the connection with other computers on the local network. Broadband Router facilitate the exchange of cable modem or ADSL-Internet, and they are often also a built-in firewall care.
Installation
Ethernet cable needs from any computer to another computer or to the central unit. It can be expensive and difficult to run cables underground, or by walls, especially when the computers are based in different areas. Some newer homes are already wired with cable CAT5, significantly simplified and reduced cabling I adidas cable is underway.

The correct settings for wiring on a local area network drahtgebundenes varies depending on the composition of the device, type of Internet connection and whether internal or external modems are used. It should, however, not to use these options represent more difficult, for example, the wiring system of a home theater.

As a result of the installation of equipment, the steps in the pattern of local networks wired or wireless, do not differ greatly. Both rely on standard Internet protocol network and operating system configuration options. Portable computers and other portable devices are often more mobility and wireless home network of installation (at least as long as the batteries permitting).
Cost
Ethernet cable, hubs and switches are very cheap. Sharing Connection Some software, like ICS, were released, some priced a little expense. Broadband Router more expensive, but they are optional components of a cable network, and their cost is higher by the performance of the ease of use and built-in security features.
Reliability
Ethernet cable, hubs and switches are highly reliable, in part because producers have increasingly to continue to improve Ethernet technology over several decades. A good number of cables likely remains the most common retail and annoying source of failure in a cable network. During the installation of a local area network or drahtgebundenes Move one of the components of the suite, you should carefully check the connections.

Routers broadband have also suffered some reliability problems in the past. Unlike other speed Ethernet, these products are relatively new, multifunction devices. Broadband Router matured, in recent years, and greatly improved their reliability.
Performance
Wired LAN offer a remarkable performance. Traditional Ethernet offer only 10 Mbps bandwidth, but 100 Mbps Fast Ethernet, the technology is a bit more and can be easily reached. Although 100 Mbit / s provides a theoretical maximum performance never really achieved in practice, Fast Ethernet should be enough for the house, sharing files, games and high-speed Internet access for many years into the future .

Wired LAN Hubs suffer from the use of performance computers slowed down if the network at the same time. Instead, use Ethernet hubs to avoid this problem, a switch costs just over a turnstile.
Security
In the case of a cable network connected to the Internet, are the main firewall security are taken into account. Wired Ethernet hubs and switches do not support firewalls. However, the firewall software like ZoneAlarm products can be installed on the computer itself broadband router offer qualifications firewall, which in the device, software configurable own.
The comparison of wireless LANs with wired technologies
On the subject of wireless LANs
Popularity monitor all wireless technologies one of the top three Wi-Fi communication. The advantages of wireless networking vary depending on the standard used:

•802.11b, the first standard widely used in wireless networks.
•The 802.11a standard is faster but more expensive than 802.11b, 802.11a is more prevalent in business networks.
•The final 802.11g standard, attempts to combine the best of both 802.11a and 802.11b, although it is also the most expensive is not an option for home networking.

Installation
Wi-Fi networks can be configured so that one of two ways:

•"Ad hoc" mode allows you to communicate on mobile devices and networks Peer-To-Peer mode.
•"Infrastructure" mode allows mobile devices to communicate with a central node, which provide communication with the LAN cable node.

Most wireless LANs are in need of infrastructure for the method of accessing the Internet a local printer or other cable services, while the ad hoc mode only supports basic file sharing between mobile devices .

The two uses Wi-Fi, wireless network adapters necessary, and sometimes wireless LAN cards. Infrastructure Mode wireless network requires a complement to the central access point. The access point should be installed in a central location, the wireless radio signals reach with minimal intervention. Although Wi-Fi technology, generally signals up to 100 feet (30 meters) or more, obstacles such as walls can reduce significantly their assortment.
Cost
Gearbox wireless costs a little more than the equivalent wired Ethernet products. In retail prices, wireless adapter and access costs three or four times more than the Ethernet cable adapters and hubs / switches, respectively. 802.11b fell in the prices of essential products for the release 802.11g and, of course, to conclude the sale shall, if they are persistent Shopper.
Reliability
Wireless Local Area Networks are a bit more problematic than the reliability of wireless LANs, even though it may not be enough for great concern. 802.11b and 802.11g wireless signals interfere with other home applicances including microwaves, cordless phones and garage door opening. With care taken in the facility, the likelihood of disturbances can be minimized.

The products of wireless networks, in particular those in the implementation 802.11g, are relatively new. As with any new technology, with whom he still has some time to mature these products.
Performance
Wireless LAN 802.11b supports with maximum theoretical bandwidth of 11 Mbps, roughly the same as that of the old, traditional Ethernet. 802.11a and 802.11g wireless 54 Mbit / s over, that's about half the bandwidth of Fast Ethernet. In addition, the Wi-Fi is far from the performance sensitive, which means that the maximum power of computers deteriorate further from the access point or other termination point communications. Among other wireless devices for greater use of wireless networking, performance even further with the devil.

Overall, the performance of 802.11a and 802.11g is sufficient for domestic use and sharing of Internet file sharing, but as a general rule, is not sufficient for domestic use LAN Gaming.

The greater mobility of wireless LANs will help offset the performance disadvantage. Computer mobile should not be attached to an Ethernet cable, and can freely in the wireless sector. However, many computers at home are more models of desktop and laptop computers are sometimes a cable and electrical outlets for guarantees of power. It undermines the advantage of the mobility of wireless networks in many homes.
Security
In theory, wireless LANs are less secure than wired LANs, wireless, because communication signals through the air and can be easily intercepted. To prove his point of view, some engineers have encouraged the practice of wardriving that travel through a residential area with Wi-Fi equipment to scan the airwaves for wireless networks unprotected. The balance, but the weaknesses of the wireless security are more theoretical than practical. WLANs protect their data by the Wired Equivalent Privacy (WEP) encryption standard that wireless communications as safe as reasonably cable are available in retirement homes.

No network is absolutely safe and owner of this research topic should ensure that they are aware of and comfortable with the risks. Key security considerations for homeowners are generally not linked, if the network wired or wireless, but also to ensure:

•The origin of the Internet, the firewall properly configured
•The family about the dangers of the Internet "e-mails, and how to recognize
•The family is incompatible with the concept of "spyware" and how to avoid it
•Childcare, and other unwanted visitors Haushälterinnen have no access to the network
What is better - wired or wireless?
Conclusion
She studied at the analysis and who are ready to make your choice. In fact, therefore, it is best - wired or wireless? The table below summarizes the main criteria that we have in this article. If you are very conscious of costs, we must optimize the performance of your system at home, not a lot of care and mobility, then drahtgebundenes Ethernet LAN is perhaps the most suitable for you.

If, on the other hand, the cost is less of a problem, as you a fan of advanced technologies, and you are really concerned about the role wiring your home or small business with an Ethernet cable, then you should certainly wireless LAN.

Many of you have, of course, somewhere between these two extremes. If you are still undecided, fashion, friends and family wondered about the experience gained in establishing LANs.d, spend only a few minutes on our interactive network Home Advisor Tool. It should help you decide on the type of network that you have of the gearbox.

Give it a try: Home Network Advisor

Wired Wireless?
Wired Wireless
Easy installation of moderate difficulty, but attention interference
Costing more with less
High reliability relatively high
Performance very well, well,
Security quite well enough
Limited mobility pending



Read more.....

What network?


N in the world of computers, networks, the practice of linking two or more devices together on the computer, for the purposes of data sharing. Networks with a mixture of computer hardware and computer software.

Area Networks

The networks can be of several types. An approach defined the nature of the network of the geographical area bounded. Local Area Networks (LANs), for example, who, as a general rule, which is accessible by a single house, and Wide Area Networks (WAN), and reach across cities, countries, or in the world. The Internet is the biggest festival of the public WAN.

Network Design

Computer networks also differ in their design of the two types of high-level design are referred client-server and peer-to-peer. Client-server network with a central server, computers, storing e-mails, Web pages, files and / or applications. In the case of a network peer-to-peer, in contrast, tend to take charge of all computers, the same functions. Client / server networks are much more common in business and peer-to-peer much more common in homes.

A network topology present its layout or structure from the point of view of data flows. In the so-called bus systems, for example, all computers to share and communicate on a common approach, whereas in a star network, all data flowing through a central. Common types of network topologies, bus, star, ring and mesh.

Network protocols

In networking, language communication devices used by a computer means the record. Another way to classify networks is the amount of minutes they support. Networks often several protocols supported to implement specific applications. More popular are the TCP / IP protocols, the protocol most commonly found on the Internet and home networks.
Wired Wireless Networking?

Several of the same network protocols such as TCP / IP, working in the wired and wireless networks. Networks Ethernet cables are superior in businesses, schools and homes for several decades. In recent times, however, the wireless networking, alternatives have been identified as the main technology for the development of new networks.



Read more.....

Tuesday, January 22, 2008

Ads Masquerading as Security Warnings


Popup windows are always disturbing, but if you get a warning out of the blue that you might have a security problem it's doubly disturbing. Vendors of what purports to be security software are taking advantage of nervous users to trick them into downloading their software, or at least visiting their Web site.

Ever see a window pop up while you were Web surfing that was filled with dire warnings and big, red exclamation points? It may look like a warning from Windows, but it's just an ad. The ad company may have put a faint "advertisement" notice in the bottom of the box, but the point of the design is to mislead the user into thinking that there is a problem and that clicking "Yes" will help with it.

It turns out that clicking anywhere in this ad, whether on the phony "Yes" or "No" buttons or anywhere else, takes you to the vendor Web site where you can download their product. I am not going to get into whether these products are worth the time of day. The interesting thing is that you can design a popup Web page to resemble a dialog box that a user might encounter if they actually have a Windows problem.

How do you recognize that a window is a popup Web ad and not a message of doom from Windows? This can be difficult. First, even if a window presents a dire message, don't panic. Note that if you look at the title bar and status bar, the top and bottom of the window, you can tell that it is a window created within your browser. This is a clue, but not conclusive proof that the window is not a security warning. It is possible that Windows, or a third party product like your antivirus software, could use such a window for legitimate purposes, but I'd call it a long shot. At this point you can look on the window presumptively as an advertisement.

If you are still curious, right-click on the window and select properties (In Netscape, choose "View Page Info"). You should be able to see the site from which it came. A real dialog box from Windows would have a non-standard address starting with something like 'res:.' A Web ad will have a real web address.

If you maintain and update your antivirus, antispam, and antispyware software, you should not be getting warnings about these programs. If you get warnings about your computer that appear to be real, jot down the information contained in the warning, along with the programs running at the time of the warning. Then, ask someone, who knows computers, about the message or search the Internet.

The important thing for you to do is not to react quickly to messages that come up out of nowhere, but to stop and scrutinize them. At this point you're already ahead of the game.


Read more.....

Ad-Aware Personal Edition


It isn’t enough to protect yourself from viruses, worms, and Trojans. Your system can become bogged down with spyware, adware, and malware. Getting rid of unwanted popup screens and annoying search hijacks requires anti-adware software. In a previous Tutor Tip (Spybot Search and Destroy), I told you about Spybot Search and Destroy, a free program to hunt down spyware on your computer and get rid of it. Spybot works on adware, but no single program can rid you of all adware. The second tool in your arsenal should be Ad-Aware from Lavasoft. You can download the free "personal SE" version of Ad-Aware at http://www.lavasoft.com/support/download/.

Once you have downloaded the program, you can install it easily. Simply follow the on-screen instructions. To run Ad-Aware, double-click the icon on the Desktop or click the Start button and go to All Programs (Programs in Windows 98). Click on Lavasoft Ad-Aware SE Personal and then Ad-Aware SE Personal.

Updating Definitions
When you start Ad-Aware, it will check to see if you are using the latest version of the program and whether your antispyware definitions are up-to-date. Be sure to download the latest version before running a scan. The antispyware definitions are akin to the virus definitions used by your antivirus program and should be updated. If Ad-Aware finds your definitions to be more than 15 days old, it will ask if you would like to check for updates. The answer is yes, so click OK. This procedure will require an Internet connection. If you are not already connected, do so. Then, click the Connect button on the Performing WebUpdate screen. Ad-Aware will inform you when the update is complete.

Note: You can manually update the definitions by clicking the "Check for updates now" link above the program’s Start button or by clicking the globe icon (WebUpdate tool) in the upper right corner of the main screen.

Scanning for Spyware
Click the Start button in the lower right corner of the status screen to begin the scan. On the next screen, you may be asked to select a "Scan Mode." If this is the first time you are running Ad-Aware on your system, select "Perform Full System scan." For most, the smart system scan can be chosen. Make your choice and click Next. This will start the scan, which will take a few minutes to complete.

After the scan is completed, you will be presented with options to "Show Logfile" and to proceed to the "Next" step. Make your selection and, if you choose to view the log, simply use the "back" button to return you to the previous screen. When you click the "next" button you will open the results screen where you can review the objects detected by Ad-aware.

Please be sure to review each item that has been presented in the results screen before removing it. Ad-aware is designed to report possible suspicious content present on your system and to allow you a simple method for removing it should you so decide. Note that Lavasoft does not suggest or recommend that everything detected by Ad-aware should be removed. It is up to you the user to make that determination.

According to Lavasoft, "All items detected by Ad-Aware are qualified using a Threat Assessment Chart (TAC) prior to inclusion. The system is based on a total of 10 points, 1 being the least and 10 being the most threatening and/or problematic. Behavior and intent weigh more heavily towards becoming a legitimate detection than do the technical aspects." You can read more about this in the "Threat Assessment Chart - TAC" section of the Ad-Aware help file. Information about the items Ad-Aware detects can be found in Lavasoft’s TAC database.

What to do with a Detected Item
Every item detected by Ad-Aware will be categorized as either Critical Objects or Negligible Objects. Among the Negligible Objects will be things called "MRUs." MRUs (or MRU Lists) store information about the most recently used items, for example files, search words and programs. MRU Lists are not considered to be a threat to your privacy. Ad-Aware supplies you with the ability to remove these MRU lists if you wish to do so. If you are not sure what to do with an item, quarantine it.

The Negligible Objects list shows the following:

* Obj.: Select objects by ticking the box
* Type: Tells the type of the object
* Description: A brief description of the object
* Location: Tells the location of the object
* No. Items: Tells the number of objects in each MRU List

Critical Objects should be removed, but you can view the list of Critical Objects and determine whether or not to delete them. The list includes the following:

* Obj.: Select objects by ticking the box
* Name: Names the company that developed the object or the target family
* Type: Tells what kind of object it is, such as File, Registry Value, tracking cookie, etc.
* Category: Tells the category in which Lavasoft has it listed, such as Data Miner, Malware, etc.
* Object: Tells where the object is located: its path in Explorer, or its location in the Registry
* Comment: includes the name of the object and a brief description. To read the complete text in the comment scroll to the right side of the screen, open the window full screen, hover your mouse over the entry, or use the right click-context menu.

If you have made the decision to remove an item or multiple items - tick each entry individually or select a single item from the list - right-click with your mouse, and then select the appropriate option from the right-click menu. When you are satisfied with your selections, click the Next button to begin the removal process.

If you have decided to keep an item, select it from the results list (be sure to unselect other content you wish to remove following this step) and right-click the entry to open the right-click menu. Either select each item individually for each component to be ignored or choose the "select all objects" option. Select the "add selection to ignore list" to add this content to your ignore list. Ad-aware will not present this item to you when you perform further scans. Once this content has been added to your ignore lis,t you will be taken back to the scan results screen where you can repeat the above process as required, to not select anything more (all items are unchecked), or to remove the content as you choose.

If you are not certain about an item, you can Quarantine it. Quarantined objects are not deleted from your system, but will not be running on your system, either. You can view and manage quarantined items by clicking the lock icon (Quarantine Manager) on the main status screen. In the Quarantine Manager you can choose to restore the item or permanently delete it.

Ad-Aware should be used to scan your system at least once a week. This will reduce pop-ups and other annoying ads and make your Web surfing experience a more pleasant one.



Read more.....

ActiveX


In a recent Tutor Tip (Is Your Internet Connection Secure?), I recommended that you browse to Symantec’s Security page and check your system for leaks. One of the requirements for the tests to work is having something called ActiveX running in your browser. This elicited several requests for information about ActiveX.

What is ActiveX?
Developed by Microsoft Corporation, ActiveX is a technology used to add interactive controls to Web pages. These controls can be anything from a single push-button to a complete spreadsheet. ActiveX controls only work in certain browsers. Of course, Microsoft's latest release of its own Web browser, Internet Explorer, recognizes ActiveX controls. Netscape's browser does not recognize these controls.

ActiveX is (another) Microsoft strategy for market dominance. Like a lot of Microsoft-centric software, ActiveX is bloated, awkward to use, slow, and has a tendency to make the experience of browsing the Web unpleasant. When encountering some ActiveX controls, browsers often lock up, slow down, freeze, and crash. More seriously, there are security risks inherent in the ActiveX model. ActiveX security rests on the "Authenticode" system which is a scheme for identifying the authors of ActiveX controls. Security is therefore based on trust.

ActiveX controls are only as safe as the company that created them. If a control has a digital signature, it means that the control has not been tampered with and is guaranteed to be exactly the same as when the software publisher created it. The ActiveX controls used by reputable sites are digitally signed by that company. When you see the Security Warning dialog box, check for the statement "Publisher authenticity verified by VeriSign." This statement guarantees that the control has not been tampered with since being signed by the publisher.

How to enable ActiveX in Internet Explorer
The default browser settings in Internet Explorer 5.0 or higher will allow ActiveX controls to download and run. A Medium Security Level allows ActiveX controls to download and run.

1. From the browser menu, click Tools > Internet Options
2. Click on the Security tab
3. Select the globe icon representing the Internet Zone
4. Click Custom Level
5. Scroll down to the ActiveX controls and plug-ins section
6. Under Download signed ActiveX controls select Prompt
7. Under Run ActiveX controls and plug-ins select Enable
8. Under Script ActiveX controls marked safe for scripting select Enable
9. Click OK to close the Security Settings window
10. Click OK to close the Internet Options window


Read more.....

Sunday, January 13, 2008

Building a low cost TCP/IP-based Wide Area Network in Indonesia


TCP/IP-based computer network is a de-facto industrial standard in Wide Area computer Network (WAN) to allow various networking tasks, such as remote login, file transfer, e-mail, be done in more efficient manner. In this paper, we report our collaborative efforts involving a number of researchers (mostly from ITB) in Indonesia to adopt and built hardware and software prototypes based on packet radio technology to enable the development of low cost but more efficient TCP/IP-based WAN in developing countries which accommodates the requirements in research as well as manufacturing communities. We are presently building various hardware prototypes, which include low speed (1200 and 4800 bps) packet radio interface on PC based on Intel 8273 High-Level Data link Controller (HDLC) chip, PC-based Terminal Node Controller with one-chip modem Texas Instrument TCM 3105 (1200 bps AFSK modem) and 56Kbps MSK RF-modem at 29MHz for

intercity high speed trunk. On software side, we report on our effort in adopting TCP/IP suite on PC which allow us to interconnect Ethernet / Token Ring based wired Local Area Network (LAN) via packet radio WAN as well as to exhange messages between packet radio world to InterNet. Furthermore, at system level, more complex configuration of packet radio stations, which involve several packet radio satellites (PACSAT) currently in operation, have been used to perform experiment in exchanging information between North-America and Indonesia. The use of PACSAT is found to reduce the required time by 75% from the average two days via the conventional HF-forwarder network to about 12 hours or even faster. Having completed some of the prototypes, we believe that packet radio technology will give us an ample hope to built a low cost but efficient TCP/IP-based WAN in Indonesia to serve research, manufacturing industrial and business communities.

why we need to build computer network?

  • faster exchange of information which serves as a common ground for advancing the technology.

  • crucial infra-structure to build more efficient environment in advancing the technology in Indonesia, i.e., a bridge between research & development communities and manufacturing communities.



review of the current situation in Indonesia:


  • PUSILKOM-UI has tried to implement UUCP-based computer network in Indonesia which relies heavily on the expensive long-distance phone links. Furthermore, UUCP uses a fairly simple communication protocols which involves mainly file transfer operations to convey messages from one machine to another and, thus, reach the destination. However, this approach lack of the capabilities, such as network management and automatic routing to accommodate the ever expanding computer network.

  • Several professional computer-based industries in Indonesia such as USI/IBM and Schlumberger have built their own computer network which connected to InterNet and, thus, allow them to communicate internationally. However, no further attempts has been made by these companies to expand their networking capabilities to allow ordinary users outside their institutions in using their network.

  • Several national industries, such as, PT. INTI and PT. ELNUSA, are currently working on a low cost approach to built wide area computer network in Indonesia based on 9600 bps packet radio technology running on UHF 440MHz. X.25 link layer protocol is used on top of their 9600 bps physical radio link.

  • A similar approach has been used in last 5 years by quite a number of amateur radio operators in Indonesia to built their very own wide area packet radio network.





Read more.....