- P.O. Box 466, Kuils River, 7579.
- Telephone: 021 906 2296
- Mobile: 082 688 9610
What is needed to access the 3G HSDPA Broadband network?
You'll need a cellphone which is 3G HSDPA capable, or a PC with a Vodafone 3G Broadband Mobile Connect Card or Vodafone Mobile Connect USB Modem.
Where is 3G HSDPA coverage available?
All 3G-base stations have been upgraded to also support 3G HSDPA. Please note that 3G HSDPA technology is sensitive to external influences such as indoor coverage, topography and weather conditions. For more information on where 3G HSDPA coverage is available, click here.
I've looked at the 3G HSDPA coverage map and I should experience broadband access speeds, but I don't - what can I do?
You can contact the dedicated care line on 011 317 1800 to report that you're experiencing a network problem, for which they'll log a call to investigate, or you can send an email requesting assistance.
Can any cellphone access attain broadband access speeds via the 3G HSDPA network?
Current 3G cellphones will connect to the 3G HSDPA network, but only offer throughput speeds of up to 348 Kbps. However new 3G HSDPA enabled cellphones allows throughput of between 400Kpbs and 800Kbps with peaks of 1.2Mbps.
Can customers roam with 3G and 3G HSDPA when travelling abroad?
Yes, Contract customers, who are have enabled "roaming" and connect to a Vodafone participating network, will be able to use mobile data services when travelling abroad. 3G HSDPA data roaming is available in Germany, Austria and Portugal. It must be noted however that it is very costly and potentially more so than 3G due to the increased ability to download more data. Current 3G data roaming rates apply.
What throughput speeds can be attained on the 3G HSDPA broadband mobile network?
The 3G HSDPA technology was built to deliver throughput speeds of up to 1.8 Mbps for downloads, but expect to experience speeds between 400 Kbps and 800 Kbps with peaks of approximately 1.2 Mbps - offering you instant Internet access.
Will I be able to use 3G and GPRS/EDGE, if there is no 3G HSDPA coverage is?
Yes, when 3G HSDPA is not available you will be able to connect via Vodacom's 3G, EDGE or the GPRS mobile data network.
When I am connected to the network, how will I know that I am on 3G HSDPA?
Ensure when you install the Vodafone dashboard software, that you choose 3G as the preferred network - this will ensure that you connect via the 3G HSDPA network whenever 3G HSDPA coverage is available.
Why am I getting slower access speeds whilst "connected" to the 3G HSDPA network?
The 3G HSDPA network has the intelligence to supply you with increased bandwidth, where available, only as you require it thereby providing a far more efficient utilisation of bandwidth. For instance, searching for a Web site on Google would not require large bandwidth, yet downloading a large video clip would require more bandwidth and thus will allocate more bandwidth to the session when you start downloading.
Which packages will be throttled and which will be capped?
If you opt out of Pay-per-use and you are a Kickstart or Playa subscriber you will be capped upon reaching your data limit for the month. To stay connected, you will need to purchase a bandwidth booster before you reach your data cap.
If you are on a Giga package or higher, your service will be slowed down (throttled) to a maximum of 64 kbps* once your cap is reached. You will need to purchase a bandwidth booster in order to continue normal service.
*Excessive use of data once your service has been throttled may result in additional charges to your account.
Can I choose not to have the Pay-per-use service?
Yes you can. Opting out of Pay-per-use means that upon reaching your data limit for the month, your service will either be throttled or capped, depending on your package. When this happens, you are required to top up with a bandwidth booster in order to continue normal service. If you would prefer to opt out of Pay-per-use, click here.
How do I check how much data I have used?
You will receive monthly bandwidth usage emails and will also be able to monitor your usage online.
What is WiMAX?
iBurst WiMAX (Worldwide Interoperability Microwave Access) is a new generation technology that is a wireless alternative to leased line and ADSL which offers connectivity to small, medium and large businesses. iBurst WiMAX is similar to WiFi, the biggest difference is that iBurst WiMAX operates at much higher speeds, over greater distances and can be used by a greater number of users.
iBurst WiMAX can offer an assured Quality of Service (QoS), which ensures the customer receives the data transfer rate that they have subscribed to.
Where is the iBurst WiMAX service available and what is the coverage roll out plan?
Initial deployment of the iBurst WiMAX sites will be in Johannesburg and Pretoria, with a smaller footprint in Durban and Cape Town.
Who would benefit from using the iBurst WiMAX service?
Small, medium and large business owners would benefit from this service.
How does the WiMAX technology differ from 3G/HSDPA, Wi-Fi and ADSL?
iBurst WiMAX summary:
There are 3 iBurst WiMAX service offerings, namely:
- Assured Premium (Uncontended)
- Assured Standard (1:3 contended)
Is iBurst WiMAX mobile / portable?
No. The installed equipment will consist of a fixed antenna which the customer will not be able to move to another location. Should a customer require the equipment to be moved then a new installation will be required which will be coordinated by the projects team.
What are the benefits of iBurst WiMAX?
- iBurst WiMAX can provide the customers (e.g. businesses) with an assured Quality of Service (QoS) - it is effortless, reliable, constant and fast.
- The customers receive the data transfer rate according to their specific requirements.
What contract options are available?
iBurst WiMAX is available on a 24-month or month-to-month contract basis. Customers can choose to either purchase the CPE upfront or have the cost included as part of the subscription bundle.
What devices can iBurst WiMAX be used with?
Only iBurst WiMAX approved Customer Premise Equipment (CPE) can be used to provide an iBurst WiMAX connection.
What iBurst WiMAX service offerings are available?
There are 3 iBurst WiMAX service offerings to choose from, each with different service options:
WIRED V WIRELESS NETWORKING
Building the local area network that's right for you:
Internet Wired Wireless Security Net Wired Wireless LANs Wireless Setup
Computer networks for the home and small business can be built using either wired or wireless technology. Wired Ethernet has been the traditional choice in homes, but Wi-Fi wireless technologies are gaining ground fast. Both wired and wireless can claim advantages over the other; both represent viable options for home and other local area networks (LANs).
Below we compare wired and wireless networking in five key areas:
- ease of installation
- total cost
About Wired LANs
Wired LANs use Ethernet cables and network adapters. Although two computers can be directly wired to each other using an Ethernet crossover cable, wired LANs generally also require central devices like hubs, switches, or routers to accommodate more computers.
For dial-up connections to the Internet, the computer hosting the modem must run Internet Connection Sharing or similar software to share the connection with all other computers on the LAN. Broadband routers allow easier sharing of cable modem or DSL Internet connections, plus they often include built-in firewall support.
Ethernet cables must be run from each computer to another computer or to the central device. It can be time-consuming and difficult to run cables under the floor or through walls, especially when computers sit in different rooms. Some newer homes are pre-wired with CAT5 cable, greatly simplifying the cabling process and minimizing unsightly cable runs.
The correct cabling configuration for a wired LAN varies depending on the mix of devices, the type of Internet connection, and whether internal or external modems are used. However, none of these options pose any more difficulty than, for example, wiring a home theater system.
After hardware installation, the remaining steps in configuring either wired or wireless LANs do not differ much. Both rely on standard Internet Protocol and network operating system configuration options. Laptops and other portable devices often enjoy greater mobility in wireless home network installations (at least for as long as their batteries allow).
Ethernet cables, hubs and switches are very inexpensive. Some connection sharing software packages, like ICS, are free; some cost a nominal fee. Broadband routers cost more, but these are optional components of a wired LAN, and their higher cost is offset by the benefit of easier installation and built-in security features.
Ethernet cables, hubs and switches are extremely reliable, mainly because manufacturers have been continually improving Ethernet technology over several decades. Loose cables likely remain the single most common and annoying source of failure in a wired network. When installing a wired LAN or moving any of the components later, be sure to carefully check the cable connections.
Broadband routers have also suffered from some reliability problems in the past. Unlike other Ethernet gear, these products are relatively new, multi-function devices. Broadband routers have matured over the past several years and their reliability has improved greatly.
Wired LANs offer superior performance. Traditional Ethernet connections offer only 10 Mbps bandwidth, but 100 Mbps Fast Ethernet technology costs little more and is readily available. Although 100 Mbps represents a theoretical maximum performance never really achieved in practice, Fast Ethernet should be sufficient for home file sharing, gaming, and high-speed Internet access for many years into the future.
Wired LANs utilizing hubs can suffer performance slowdown if computers heavily utilize the network simultaneously. Use Ethernet switches instead of hubs to avoid this problem; a switch costs little more than a hub.
For any wired LAN connected to the Internet, firewalls are the primary security consideration. Wired Ethernet hubs and switches do not support firewalls. However, firewall software products like ZoneAlarm can be installed on the computers themselves. Broadband routers offer equivalent firewall capability built into the device, configurable through its own software.
Popular WLAN technologies all follow one of the three main Wi-Fi communication standards. The benefits of wireless networking depend on the standard employed:
- 802.11b was the first standard to be widely used in WLANs.
- The 802.11a standard is faster but more expensive than 802.11b; 802.11a is more commonly found in business networks.
- The newest standard, 802.11g, attempts to combine the best of both 802.11a and 802.11b, though it too is more a more expensive home networking option.
Wi-Fi networks can be configured in two different ways:
- "Ad hoc" mode allows wireless devices to communicate in peer-to-peer mode with each other.
- "Infrastructure" mode allows wireless devices to communicate with a central node that in turn can communicate with wired nodes on that LAN.
Most LANs require infrastructure mode to access the Internet, a local printer, or other wired services, whereas ad hoc mode supports only basic file sharing between wireless devices.
Both Wi-Fi modes require wireless network adapters, sometimes called WLAN cards. Infrastructure mode WLANs additionally require a central device called the access point. The access point must be installed in a central location where wireless radio signals can reach it with minimal interference. Although Wi-Fi signals typically reach 100 feet (30 m) or more, obstructions like walls can greatly reduce their range.
Wireless gear costs somewhat more than the equivalent wired Ethernet products. At full retail prices, wireless adapters and access points may cost three or four times as much as Ethernet cable adapters and hubs/switches, respectively. 802.11b products have dropped in price considerably with the release of 802.11g, and obviously, bargain sales can be found if shoppers are persistent.
Wireless LANs suffer a few more reliability problems than wired LANs, though perhaps not enough to be a significant concern. 802.11b and 802.11g wireless signals are subject to interference from other home appliances including microwave ovens, cordless telephones, and garage door openers. With careful installation, the likelihood of interference can be minimized.
Wireless networking products, particularly those that implement 802.11g, are comparatively new. As with any new technology, expect it will take time for these products to mature.
Wireless LANs using 802.11b support a maximum theoretical bandwidth of 11 Mbps, roughly the same as that of old, traditional Ethernet. 802.11a and 802.11g WLANs support 54 Mbps, that is approximately one-half the bandwidth of Fast Ethernet. Furthermore, Wi-Fi performance is distance sensitive, meaning that maximum performance will degrade on computers farther away from the access point or other communication endpoint. As more wireless devices utilize the WLAN more heavily, performance degrades even further.
Overall, the performance of 802.11a and 802.11g is sufficient for home Internet connection sharing and file sharing, but generally not sufficient for home LAN gaming.
The greater mobility of wireless LANs helps offset the performance disadvantage. Mobile computers do not need to be tied to an Ethernet cable and can roam freely within the WLAN range. However, many home computers are larger desktop models, and even mobile computers must sometimes be tied to an electrical cord and outlet for power. This undermines the mobility advantage of WLANs in many homes.
In theory, wireless LANs are less secure than wired LANs, because wireless communication signals travel through the air and can easily be intercepted. To prove their point, some engineers have promoted the practice of wardriving, that involves traveling through a residential area with Wi-Fi equipment scanning the airwaves for unprotected WLANs. On balance, though, the weaknesses of wireless security are more theoretical than practical. WLANs protect their data through the Wired Equivalent Privacy (WEP) encryption standard, that makes wireless communications reasonably as safe as wired ones in homes.
No computer network is completely secure and homeowners should research this topic to ensure they are aware of and comfortable with the risks. Important security considerations for homeowners tend to not be related to whether the network is wired or wireless but rather ensuring:
- the home's Internet firewall is properly configured
- the family is familiar with the danger of Internet "spoof emails" and how to recognize them
- the family is familiar with the concept of "spyware" and how to avoid it
- babysitters, housekeepers and other visitors do not have unwanted access to the network
You've studied the analysis and are ready to make your decision. Bottom line, then, which is better - wired or wireless? The table below summarizes the main criteria we've considered in this article. If you are very cost-conscious, need maximum performance of your home system, and don't care much about mobility, then a wired Ethernet LAN is probably right for you.
If on the other hand, cost is less of an issue, you like being an early adopter of leading-edge technologies, and you are really concerned about the task of wiring your home or small business with Ethernet cable, then you should certainly consider a wireless LAN.
Many of you will naturally fall somewhere in between these two extremes. If you're still undecided, consider asking friends and family about their experiences with building LANs. And, spend just a few more minutes with our interactive Home Network Advisor tool. It should help you decide on the type of network as well as the gear you will want to have.
Give it a try: Home Network Advisor
MOBILE INTERNET TECHNOLOGIES
What is 1G?
1G is a term rarely used. It refers to the original analogue type mobile networks first used in the early 1980s.
What is 2G?
2G is short for Second Generation. This name is usually given to original GSM network. 1G.
What is 3G?
3G is the third generation of mobile phone standards and technology, superseding 2G, and preceding 4G. It is based on the International Telecommunication Union (ITU) family of standards under the International Mobile Telecommunications programme, IMT-2000.
3G technologies enable network operators to offer users a wider range of more advanced services while achieving greater network capacity through improved spectral efficiency. Services include wide-area wireless voice telephony, video calls, and broadband wireless data, all in a mobile environment. Additional features also include HSPA data transmission capabilities able to deliver speeds up to 14.4Mbit/s on the downlink and 5.8Mbit/s on the uplink.
Unlike IEEE 802.11 (common names Wi-Fi or WLAN) networks, 3G networks are wide area cellular telephone networks which evolved to incorporate high-speed internet access and video telephony. IEEE 802.11 networks are short range, high-bandwidth networks primarily developed for data.
What is 3.5G?
The 3G mobile phone platform is the most advanced form of mobile communication as it allows users to stream video, receive TV signal, send large files and even have voice calls, all that using just a mobile phone. But, what if all that suddenly got a lot better, let's say 7 times better...what would you think about 3G?
According to Ericsson, as of April 2006, we will get to know exactly what 3.5G can offer in terms of bandwidth and users and media will be offered a more impressive range of services which will leave 3G in the dust.
The 3.5G solution promises a data download speed of up to 14Mbps (megabits per second) and an upload speed of up to 1.8Mbps. Compared to that, the mere 384Kbps (kilobits per second) download, and uploads up to 64Kbps that a 3G network now offers are somewhat of a bad joke. Just to point out exactly the bandwidth difference between the two, let's take a 1MB MP3 file and send it over a 3G network. It would reach its destination in 22.4 seconds. The same file, sent over 3.5G would be received in 4.1 seconds. This will mean improvements in mobile voice telephony, video telephony, mobile TV, mobile broadband to laptops, and fixed-broadband services.
3.5G relies on the new HSDPA protocol which is basically its secret weapon for its blazingly fast transfer speeds over those of 3G.
What is HSDPA?
HSDPA, short for High-Speed Downlink Packet Access, is a new protocol for mobile telephone data transmission. It is known as a 3.5G (G stands for generation) technology. Essentially, the standard will provide download speeds on a mobile phone equivalent to an ADSL (Asymmetric Digital Subscriber Line) line in a home, removing any limitations placed on the use of your phone by a slow connection. It is an evolution and improvement on a 3G protocol. HSDPA can achieve theoretical data transmission speeds of 8-10 Mbps (megabits per second). Though any data can be transmitted, applications with high data demands such as video and streaming music are the focus of HSDPA.
HSDPA uses different techniques for modulation and coding. It creates a new channel within W-CDMA called HS-DSCH, or high-speed downlink shared channel. That channel performs differently than other channels and allows for faster downlink speeds. It is important to note that the channel is only used for downlink. That means that data is sent from the source to the phone. It isn't possible to send data from the phone to a source using HSDPA. The channel is shared between all users which lets the radio signals to be used most effectively for the fastest downloads.
The widespread availability of HSDPA may take a while to be realized, or it may never be achieved. Most countries did not have a widespread 3G network in place as of the end of 2005. Many mobile telecommunications providers are working quickly to deploy 3G networks which can be upgraded to 3.5G when the market demand exists. Other providers tested HSDPA through 2005 and have started rolling out the service since mid to late 2006. Early deployments of the service will be at speeds much lower than the theoretically possible rates. Early service will be at 1.8 Mbps, with upgrades to 3.6Mbps as devices are made available that can handle that increased speed.
GLOSSARY OF INTERNET TERMS
ADSL (Asymmetric Digital Subscriber Line)
A method for moving data over regular phone lines. An ADSL circuit is much faster than a regular phone connection, and the wires coming into the subscriber's premises are the same (copper) wires used for regular phone service. ADSL allows downloads at speeds of up to 1.544 megabits (not megabytes) per second, and uploads at speeds of 128 kilobits per second. Another common configuration is symmetrical: 384 Kilobits per second in both directions.
In theory ADSL allows download speeds of up to 9 megabits per second and upload speeds of up to 640 kilobits per second. ADSL is now a popular alternative to Leased Lines and ISDN, being faster than ISDN and less costly than traditional Leased Lines.
A small Java program that can be embedded in an HTML page. Applets differ from full-fledged Java applications in that they are not allowed to access certain resources on the local computer, such as files and serial devices (modems, printers, etc.), and are prohibited from communicating with most other computers across a network. The common rule is that an applet can only make an Internet connection to the computer from which the applet was sent.
Server software that manages one or more other pieces of software in a way that makes the managed software available over a network, usually to a Web server. By having a piece of software manage other software packages it is possible to use resources like memory and database access more efficiently than if each of the managed packages responded directly to requests.
A high-speed line or series of connections that forms a major pathway within a network. The term is relative as a backbone in a small network will likely be much smaller than many non-backbone lines in a large network.
How much stuff you can send through a connection. Usually measured in bits-per-second. A full page of English text is about 16,000 bits. A fast modem can move about 57,000 bits in one second. Full-motion full-screen video would require roughly 10,000,000 bits-per-second, depending on compression.
Bit (Binary DigIT)
A single digit number in base-2, in other words, either a 1 or a zero. The smallest unit of computerized data. Bandwidthis usually measured in bits-per-second.
Blog (weB LOG)
A blog is basically a journal that is available on the web. The activity of updating a blog is "blogging" and someone who keeps a blog is a "blogger." Blogs are typically updated daily using software that allows people with little or no technical background to update and maintain the blog. Postings on a blog are almost always arranged in chronological order with the most recent additions featured most prominently.
A measurement of how fast data is moved from one place to another. A 56K modem can move about 57,000 bits per second.
A Client program (software) that is used to look at various kinds of Internet resources. For example, Microsoft Explorer, Netscape.
A set of Bits that represent a single character. Usually there are 8 Bits in a Byte, sometimes more, depending on how the measurement is being made.
An issuer of Security Certificates used in SSL connections.
CGI (Common Gateway Interface)
A set of rules that describe how a Web Server communicates with another piece of software on the same machine, and how the other piece of software (the ?CGI program?) talks to the web server. Any piece of software can be a CGI program if it handles input and output according to the CGI standard.
A software program that is used to contact and obtain data from a Server software program on another computer, often across a great distance. EachClient program is designed to work with one or more specific kinds of Server programs, and each Server requires a specific kind of Client. A Web Browser is a specific kind of Client.
The most common meaning of "Cookie" on the Internet refers to a piece of information sent by a Web Server to a Web Browser that the Browser software is expected to save and to send back to the Server whenever the browser makes additional requests from the Server. Depending on the type of Cookie used, and the Browsers' settings, the Browser may accept or not accept the Cookie, and may save the Cookie for either a short time or a long time. Cookies might contain information such as login or registration information, online "shopping cart" information, user preferences, etc.
When a Server receives a request from a Browser that includes a Cookie, the Server is able to use the information stored in the Cookie. For example, the Server might customize what is sent back to the user, or keep a log of particular users' requests. Cookies are usually set to expire after a predetermined amount of time and are usually saved in memory until the Browser software is closed down, at which time they may be saved to disk if their "expire time" has not been reached. Cookies do not read your hard drive and send your life story to the CIA, but they can be used to gather more information about a user than would be possible without them.
CSS (Cascading Style Sheet)
A standard for specifying the appearance of text and other elements. CSS was developed for use with HTML in Web pages but is also used in other situations, notably in applications built using XPFE. CSS is typically used to provide a single "library" of styles that are used over and over throughout a large number of related documents, as in a web site. A CSS file might specify that all numbered lists are to appear in italics. By changing that single specification the look of a large number of documents can be easily changed.
Cyberpunk was originally a cultural sub-genre of science fiction taking place in a not-so-distant, dystopian, over-industrialized society. The term grew out of the work of William Gibson and Bruce Sterling and has evolved into a cultural label encompassing many different kinds of human, machine, and punk attitudes. It includes clothing and lifestyle choices as well.
Term originated by author William Gibson in his novel Neuromancer the word Cyberspace is currently used to describe the whole range of information resources available through computer networks.
DNS (Domain Name System)
The Domain Name System is the system that translates Internet domain names into IP numbers. A "DNS Server" is a server that performs this kind of translation.
The unique name that identifies an Internet site. Domain Names always have 2 or more parts, separated by dots. The part on the left is the most specific, and the part on the right is the most general. A given machine may have more than one Domain Name but a given Domain Name points to only one machine.
For example, the domain names below can all refer to the same machine, but each domain name can refer to no more than one machine:
Usually, all of the machines on a given Network will have the same thing as the right-hand portion of their Domain Names (matisse.net in the examples above). It is also possible for a Domain Name to exist but not be connected to an actual machine. This is often done so that a group or business can have an Internet e-mail address without having to establish a real Internet site. In these cases, some real Internet machine must handle the mail on behalf of the listed Domain Name.
Transferring data (usually a file) from a another computer to the computer you are are using. The opposite of upload.
Email (Electronic Mail)
Messages, usually text, sent from one person to another via computer. E-mail can also be sent automatically to a large number of addresses.
A very common method of networking computers in a LAN.
There is more than one type of Ethernet. By 2001 the standard type was "100-BaseT" which can handle up to about 100,000,000 bits-per-second and can be used with almost any kind of computer.
An intranet that is accesible to computers that are not hysically part of a companys' own private network, but that is not accessible to the general public, for example to allow vendors and business partners to access a company web site. Often an intranet will make use of a Virtual Private Network. (VPN.)
A combination of hardware and software that separates a Network into two or more parts for security purposes.
Originally, "flame" meant to carry forth in a passionate manner in the spirit of honorable debate. Flames most often involved the use of flowery language and flaming well was an art form. More recently flame has come to refer to any kind of derogatory comment no matter how witless or crude.
FTP (File Transfer Protocol)
A very common method of moving files between two Internet sites.
FTP is a way to login to another Internet site for the purposes of retrieving and/or sending files. There are many Internet sites that have established publicly accessible repositories of material that can be obtained using FTP, by logging in using the account name "anonymous", thus these sites are called "anonymous ftp servers".
FTP was invented and in wide use long before the advent of the World Wide Web and originally was always used from a text-only interface.
The technical meaning is a hardware or software set-up that translates between two dissimilar protocols, for example America Online has a gateway that translates between its internal, proprietary e-mail format and Internet e-mail format. Another, sloppier meaning of gateway is to describe any mechanism for providing access to another system, e.g. AOL might be called a gateway to the Internet.
GIF (Graphic Interchange Format)
A common format for image files, especially suitable for images containing large areas of the same color. GIF format files of simple images are often smaller than the same file would be if stored in JPEG format, but GIF format does not store photographic images as well as JPEG.
1000 or 1024 Megabytes, depending on who is measuring.
As used in reference to the World Wide Web, ?hit? means a single request from a web browser for a single item from a web server; thus in order for a web browser to display a page that contains 3 graphics, 4 ?hits? would occur at the server: 1 for the HTML page, and one for each of the 3 graphics.
Home Page (or Homepage)
Several meanings. Originally, the web page that your browser is set to use when it starts up. The more common meaning refers to the main web page for a business, organization, person or simply the main page out of a collection of web pages, e.g. "Check out so-and-so's new Home Page."
Any computer on a network that is a repository for services available to other computers on the network. It is quite common to have one host machine provide several services, such as SMTP (email) and HTTP (web).
HTML (HyperText Markup Language)
The coding language used to create Hypertext documents for use on the World Wide Web. HTML looks a lot like old-fashioned typesetting code, where you surround a block of text with codes that indicate how it should appear.
The "hyper" in Hypertext comes from the fact that in HTML you can specify that a block of text, or an image, is linked to another file on the Internet. HTML files are meant to be viewed using a "Web Browser". HTML is loosely based on a more comprehensive system for markup called SGML.
HTTP (HyperText Transfer Protocol)
The protocol for moving hypertextfiles across the Internet. Requires a HTTP client program on one end, and an HTTP server program on the other end. HTTP is the most important protocol used in the World Wide Web (WWW).
Generally, any text that contains links to other documents - words or phrases in the document that can be chosen by a reader and which cause another document to be retrieved and displayed.
Internet (Upper case I)
The vast collection of inter-connected networks that are connected using the TCP/IP protocols and that evolved from the ARPANET of the late 60's and early 70's. The Internet connects tens of thousands of independent networks into a vast global internet and is probably the largest Wide Area Network in the world.
A private network inside a company or organization that uses the same kinds of software that you would find on the public Internet, but that is only for internal use. Compare with extranet.
IP Address (Internet Protocol Number)
Sometimes called a dotted quad. A unique number consisting of 4 parts separated by dots, e.g.
Every machine that is on the Internet has a unique IP number - if a machine does not have an IP number, it is not really on the Internet. Many machines (especially servers) also have one or more Domain Names that are easier for people to remember.
ISDN (Integrated Services Digital Network)
Basically a way to move more dataover existing regular phone lines. ISDN is available to much of the USA and in most markets it is priced very comparably to standard analog phone circuits. It can provide speeds of roughly 128,000 bits-per-second over regular phone lines. In practice, most people will be limited to 56,000or 64,000 bits-per-second.
Unlike DSL, ISDN can be used to connect to many different locations, one at a time, just like a regular telephone call, as long the other location also has ISDN.
ISP (Internet Service Provider)
An institution that provides access to the Internet in some form, usually for money.
Java is a network-friendly programming language invented by Sun Microsystems.
Java is often used to build large, complex systems that involve several different computers interacting across networks, for example transaction processing systems. Java is also becoming popular for creating programs that run in small electronic devicws, such as mobile telephones.
A very common use of Java is to create programs that can be safely downloaded to your computer through the Internet and immediately run without fear of viruses or other harm to your computer or files. Using small Java programs (called "Applets"), Web pages can include functions such as animations,calculators, and other fancy tricks.
JPEG (Joint Photographic Experts Group)
JPEG is most commonly mentioned as a format for image files. JPEG format is preferred to the GIF format for photographic images as opposed to line art or simple logo art.
A thousand bytes. Actually, usually 1024 (210) bytes.
LAN (Local Area Network)
A computer network limited to the immediate area, usually the same building or floor of a building.
Refers to line such as a telephone line or fiber-optic cable that is rented for exclusive 24-hour, 7-days-a-week use from your location to another location. The highest speed data connections require a leased line.
A widely used Open Source Unix-like operating system. Linux was first released by its inventor Linus Torvalds in 1991. There are versions of Linux for almost every available type of computer hardware from desktop machines to IBM mainframes. The inner workings of Linux are open and available for anyone to examine and change as long as they make their changes available to the public. This has resulted in thousands of people working on various aspects of Linux and adaptation of Linux for a huge variety of purposes, from servers to TV-recording boxes.
(or Mailing List) A (usually automated) system that allows people to send e-mail to one address, whereupon their message is copied and sent to all of the other subscribers to the maillist. In this way, people who have many different kinds of e-mail access can participate in discussions together.
A million bytes. Actually, technically, 1024 kilobytes
A specific kind of HTML tag that contains information not normally displayed to the user. Meta tags contan information about the page itself, hence the name ("meta" means "about this subject"). Typical uses of Meta tags are to include information for search engines to help them better categorize a page. You can see the Meta tags in a page if you view the pages' source code.
MIME (Multipurpose Internet Mail Extensions)
Originally a standard for defining the types of files attached to standard Internet mail messages. The MIME standard has come to be used in many situations where one cmputer programs needs to communicate with another program about what kind of file is being sent. For example, HTML files have a MIME-type of text/html, JPEG files are image/jpeg, etc.
Generally speaking, "to mirror" is to maintain an exact copy of something. Probably the most common use of the term on the Internet refers to "mirror sites" which are web sites, or FTP sites that maintain copies of material originated at another location, usually in order to provide more widespread access to the resource. For example, one site might create a library of software, and 5 other sites might maintain mirrors of that library.
Modem (MOdulator, DEModulator)
A device that connects a computer to a phone line. A telephone for a computer. A modem allows a computer to talk to other computers through the phone system. Basically, modems do for computers what a telephone does for humans.
The etiquette on the Internet.
A WWW Browser and the name of a company. The Netscape (tm) browser was originally based on the Mosaic program developed at the National Center for Supercomputing Applications (NCSA).
Any time you connect 2 or more computers together so that they can share resources, you have a computer network. Connect 2 or more networks together and you have an internet.
NNTP (Network News Transport Protocol)
The protocol used by clientand server software to carry USENET postings back and forth over a TCP/IP network. If you are using any of the more common software such as Netscape, Nuntius, Internet Explorer, etc. to participate in newsgroups then you are benefiting from an NNTP connection.
Any single computer connected to a network.
Copyrighted information (such as this Glossary) that is made available by the copyright owner to the general public under license terms that allow reuse of the material, often with the requirement (as with this Glossary) that the re-user grant the public the same rights to the modified version that the re-user received from the copyright owner. Information that is in the Public Domain might also be considered a form of Open Content.
Open Source Software
Open Source Software is software for which the underlying programming code is available to the users so that they may read it, make changes to it, and build new versions of the software incorporating their changes. There are many types of Open Source Software, mainly differing in the licensing term under which (altered) copies of the source code may (or must be) redistributed.
The method used to move data around on the Internet. In packet switching,all the data coming out of a machine is broken up into chunks, each chunk has the address of where it came from and where it is going. This enables chunks of data from many different sources to co-mingle on the same lines, and be sorted and directed along different routes by special machines along the way. This way many people can use the same lines at the same time. You might think of several caravans of trucks all using the same road system to carry materials.
Password A code used to gain access (login) to a locked system. Good passwords contain letters and non-letters and are not simple combinations such as virtue7. A good password might be:
5%df(29) (But don't use that one!)
PDF (Portable Document Format)
A file format designed to enable printing and viewing of documents with all their formatting (typefaces, images, layout, etc.) appearing the same regardless of what operating system is used, so a PDF document should look the same on Windows, Macintosh, linux, OS/2, etc. The PDF format is based on the widely used Postcript document-description language. Both PDF and Postscript were developed by the Adobe Corporation.
To check if a server is running. From the sound that a sonar systems makes in movies, you know, when they are searching for a submarine.
A (usually small) piece of software that adds features to a larger piece of software. Common examples are plug-ins for the Netscape® browser and web server. Adobe Photoshop® also uses plug-ins.
See also: Browser, Server
PNG (Portable Network Graphics)
PNG is a graphics format specifically designed for use on the World Wide Web. PNG enable compression of images without any loss of quality, including high-resolution images. Another important feature of PNG is that anyone may create software that works with PNG images without paying any fees - the PNG standard is free of any licensing costs.
POP (Point of Presence, also Post Office Protocol)
Two commonly used meanings:
Point of Presence and Post Office Protocol
A Point of Presence usually means a city or location where a network can be connected to, often with dial up phone lines. So if an Internet company says they will soon have a POP in Belgrade, it means that they will soon have a local phone number in Belgrade and/or a place where leased lines can connect to their network. A second meaning, Post Office Protocol refers to a way that e-mail client software such as Eudora gets mail from a mail server. When you obtain an account from an Internet Service Provider (ISP) you almost always get a POP account with it, and it is this POP account that you tell your e-mail software to use to get your mail. Another protocol called IMAP is replacing POP for email.
3 meanings. First and most generally, a place where information goes into or out of a computer, or both. E.g. the serial port on a personal computer is where a modem would be connected. On the Internet port often refers to a number that is part of a URL, appearing after a colon (:) right after the domain name. Every service on an Internet server listens on a particular port number on that server. Most services have standard port numbers, e.g. Web servers normally listen on port 80. Services can also listen on non-standard ports, in which case the port number must be specified in a URL when accessing the server, so you might see a URL of the form:
This shows a gopher server running on a non-standard port (the standard gopher port is 70).
Finally, port also refers to translating a piece of software to bring it from one type of computer system to another, e.g. to translate a Windows program so that is will run on a Macintosh.
Usually used as a marketing term to described a Web site that is or is intended to be the first place people see when using the Web. Typically a "Portal site" has a catalog of web sites, a search engine, or both. A Portal site may also offer email and other service to entice people to use that site as their main "point of entry" (hence "portal") to the Web. Posting
A single message entered into a network communications system.
PPP (Point to Point Protocol)
The most common protocol used to connect home computers to the Internet over regular phone lines. Most well known as a protocol that allows a computer to use a regular telephone line and a modem to make TCP/IPconnections and thus be really and truly on the Internet.
On the Internet "protocol" usually refers to a set of rules that define an exact format for communication between systems. For example the HTTP protocol defines the format for communication between web browsers and web servers, the IMAP protocol defines the format for communication between IMAP email servers and clients, and the SSL protocol defines a format for encrypted communications over the Internet.
Virtually all Internet protocols are defined in RFC documents.
A Proxy Server sits in between a Client and the "real" Server that a Client is trying to use. Client's are sometimes configured to use a Proxy Server, usually an HTTP server. The clients makes all of it's requests from the Proxy Server, which then makes requests from the "real" server and passes the result back to the Client. Sometimes the Proxy server will store the results and give a stored result instead of making a new one (to reduce use of a Network). Proxy servers are commonly established on Local Area Networks
A special-purpose computer (or software package) that handles the connection between 2 or more Packet-Switched networks. Routers spend all their time looking at the source and destination addresses of the packets passing through them and deciding which route to send them on.
A (usually web-based) system for searching the information available on the Web. Some search engines work by automatically searching the contents of other systems and creating a database of the results. Other search engines contains only material manually approved for inclusion in a database, and some combine the two approaches.
A chunk of information (often stored as a text file) that is used by the SSL protocol to establish a secure connection.
SEO (Search Engine Optimization)
The practice of designing web pages so that they rank as high as possible in search results from search engines.
There is "good" SEO and "bad" SEO. Good SEO involves making the web page clearly describe its subject, making sure it contains truly useful information, including accurate information in Meta tags, and arranging for other web sites to make links to the page. Bad SEO involves attempting to deceive people into believing the page is more relevant than it truly is by doing things like adding inaccurate Meta tags to the page.
A computer, or a software package, that provides a specific kind of service to client software running on other computers. The term can refer to a particular piece of software, such as a WWW server, or to the machine on which the software is running, e.g. "Our mail server is down today, that's why e-mail isn't getting out."
A single server machine can (and often does) have several different server software packages running on it, thus providing many different servers to clients on the network. Sometimes server software is designed so that additional capabilities can be added to the main program by adding small programs known as servlets.
SMTP (Simple Mail Transfer Protocol)
The main protocol used to send electronic mail from server to server on the Internet. SMTP is defined in RFC 821 and modified by many later RFC's.
Spam (or Spamming)
An inappropriate attempt to use a mailing list, or USENET or other networked communications facility as if it was a broadcast medium (which it is not) by sending the same message to a large number of people who didn?t ask for it. The term probably comes from a famous Monty Python skit which featured the word spam repeated over and over. The term may also have come from someone?s low opinion of the food product with the same name, which is generally perceived as a generic content-free waste of resources. (Spam® is a registered trademark of Hormel Corporation, for its processed meat product.)
A somewhat vague term generally referring to software that is secretly installed on a users computer and that monitors use of the computer in some way without the users' knowledge or consent.
Most spyware tries to get the user to view advertising and/or particular web pages. Some spyware also sends information about the user to another machine over the Internet.
Spyware is usually installed without a users' knowledge as part of the installation of other software, especially software such as music sharing software obtained via download.
SQL (Structured Query Language)
A specialized language for sending queries to databases. Most industrial-strength and many smaller database applications can be addressed using SQL. Each specific application will have its own slightly different version of SQL implementing features unique to that application, but all SQL-capable databases support a common subset of SQL.
A example of an SQL statement is:
SELECT name,email FROM people_table WHERE contry='uk'
Sysop (System Operator)
Anyone responsible for the physical operations of a computer system or network resource. For example, a System Administrator decides how often backups and maintenance should be performed and the System Operator performs those tasks.
TCP/IP (Transmission Control Protocol/Internet Protocol)
This is the suite of protocols that defines the Internet. Originally designed for the UNIX operating system, TCP/IP software is now included with every major kind of computer operating system. To be truly on the Internet, your computer must have TCP/IP software.
A device that allows you to send commands to a computer somewhere else. At a minimum, this usually means a keyboard and a display screen and some simple circuitry. Usually you will use terminal software in a personal computer - the software pretends to be (emulates) a physical terminal and allows you to type commands to a computer somewhere else.
A special purpose computer that has places to plug in many modemson one side, and a connection to a LAN or host machine onthe other side. Thus the terminal server does the work of answering the calls and passes the connections on to the appropriate node. Mostterminal servers can provide PPP or SLIP services if connectedto the Internet.
A computer program is either hidden inside another program or that masquerades as something it is not in order to trick potential users into running it. For example a program that appears to be a game or image file but in reality performs some other function. The term "Trojan Horse" comes from a possibly mythical ruse of war used by the Greeks sometime between 1500 and 1200 B.C. A Trojan Horse computer program may spread itself by sending copies of itself from the host computer to other computers, but unlike a virus it will (usually) not infect other programs.
A computer operating system (the basic software running on a computer, underneath things like word processors and spreadsheets). Unix is designed to be used by many people at the same time (it is multi-user) and has TCP/IP built-in. It is the most common operating system for servers on the Internet. Apple computers' Macintosh operating system, as of version 10 ("Mac OS X"), is based on Unix.
Transferring data (usually a file) from a the computer you are using to another computer. The opposite of download.
URI (Uniform Resource Identifier)
An address for s resource available on the Internet. The first part of a URI is called the "scheme". the most well known scheme is http, but there are many others. Each URI scheme has its own format for how a URI should appear.
Here are examples of URIs using the http, telnet, and news schemes:
URL (Uniform Resource Locator)
The term URL is basically synonymous with URI. URI has replaced URL in technical specifications.
URN (Uniform Resource Name)
A URI that is supposed to be available for along time. For an address to be a URN some institution is supposed to make a commitment to keep the resource available at that address.
A chunk of computer programming code that makes copies of itself without any concious human intervention. Some viruses do more than simply replicate themselves, they might display messages, install other software or files, delete software of files, etc.
A virus requires the presence of some other program to replicate itself. Typically viruses spread by attaching themselves to programs and in some cases files, for example the file formats for Microsoft word processor and spreadsheet programs allow the inclusion of programs called "macros" which can in some cases be a breeding ground for viruses.
VPN (Virtual Private Network)
Usually refers to a network in which some of the parts are connected using the public Internet, but the data sent across the Internet is encrypted, so the entire network is "virtually" private.
WAN (Wide Area Network)
Any internet or network that covers an area larger than a single building or campus.
Short for "World Wide Web."
A document designed for viewing in a web browser. Typically written in HTML. A web site is made of one or more web pages.
The entire collection of web pages and other information (such as images, sound, and video files, etc.) that are made available through what appears to users as a single web server. Typically all the of pages in a web site share the same basic URL, for example the following URLs are all for pages within the same web site:
The term has a somewhat informal nature since a large organization might have separate "web sites" for each division, but someone might talk informally about the organizations' "web site" when speaking of all of them.
Wi-Fi (Wireless Fidelity)
A popular term for a form of wireless data communication, basically Wi-Fi is "Wireless Ethernet".
A worm is a virus that does not infect other programs. It makes copies of itself, and infects additional computers (typically by making use of network connections) but does not attach itself to additional programs; however a worm might alter, install, or destroy files and programs.
WWW (World Wide Web)
World Wide Web (or simply Web for short) is a term frequently used (incorrectly) when referring to "The Internet", WWW has two major meanings:
First, loosely used: the whole constellation of resources that can be accessed using Gopher, FTP, HTTP,telnet, USENET, WAIS and some other tools.
Second, the universe of hypertext servers (HTTP servers), more commonly called "web servers", which are the servers that serve web pages to web browsers.
XML (eXtensible Markup Language)
A widely used system for defining data formats. XML provides a very rich system to define complex documents and data structures such as invoices, molecular data, news feeds, glossaries, inventory descriptions, real estate properties, etc. As long as a programmer has the XML definition for a collection of data (often called a "schema") then they can create a program to reliably process any data formatted according to those rules.