What Does Humana Health Insurance Georgia Offer Georgia Residents?


Humana Health Insurance Georgia is one of the seven main large, national insurance carriers that offer plans to Georgia residents. Humana Health Insurance Georgia has a very member-friendly approach, and their web site has a lot of information and resources that would be helpful to their members.

Humana Health Insurance Georgia Likes Golf

Humana Health Insurance Georgia encourages members to play golf. They report that playing golf is a good way of increasing your exercise, and use your muscle. There are many other organizations that encourage increased activity, but Humana Health Insurance Georgia actually devotes some of its web site to focus on golf and its health benefits. What a clever way of emphasizing healthy habits!

Humana Health Insurance Georgia has several different corporate branches that each focus on different needs of the American people. For example, they have a branch to serve the military, through their TriCare insurance plans. Humana Health Insurance Georgia also has branches that focus on dental, vision, and pharmacy benefits. Their Humana One division finds individual plans, so that Humana Health Insurance Georgia can focus on group plans and the needs of employers. Humana Health Insurance Georgia reports their commitment to helping business owners manage their healthcare costs. If you are a company human resource department head, you will find a lot of answers to your questions at the web site for Humana Health Insurance Georgia.

Humana Health Insurance Georgia Is Committed to Communities

Humana Health Insurance Georgia also contributes to the communities where they serve. They are involved in many different ways of improving communities. Another division of Humana Health Insurance Georgia is their Medicare branch. This branch works hard to lower Medicare program costs, and offers plans like Medicare Advantage to improve the health of seniors. With the current emphasis on healthcare reform, it is these kinds of innovations and efforts that make companies like Humana Health Insurance Georgia represent the insurance industry well.

Humana Health Insurance Georgia has received awards and recognition from several organizations in the insurance industry. They have received awards for the plans, their service, and their leadership.

So, if you are researching health insurance carriers in the state of Georgia, you can look at Blue Cross Blue Shield, Coventry, and many others, but do not neglect to investigate the many plans and policies that Humana Health Insurance Georgia offers to its prospective members.

Secrets For Buying Individual Health Insurance


If you're not knowledgeable about buying individual health insurance, please study through the rest of this article, because we will offer some of the most reliable tips that will reward you with the best medical protection you need.

When there is need for purchasing insurance for anything, even vehicles, you need to be informed of the numerous plans you get. To know more about individual medical insurance for yourself, you have to spend some time studying the providers that sell the plans.

Where to Search for Health Insurance - First off, you need to know the list of insurance companies. This means studying on world wide web for medical insurance for individuals.

Insurance providers can provide you with a comprehensive list of the policy types they give, such as the services that are protected and what is insured for specific medical issues you are living with.

The Internet is a wonderful place to obtain information about health insurance companies and comparing the types of protection and rates each insurer gives. You can also learn that provider to understand the sort of client notes and statements that exist.

What you are looking for with Health protection - You could stumble on numerous insurers that offer good protection, but you are not certain if you're paying too much. You may be billed a little more on specific coverage's, but you must make sure the higher costs are justified. Insurance for X rays or MRI scans for example, are a needed consideration and you need to be certain the plan provides coverage for these.

Individual Health Insurance Tips

Individual health insurance insurers offer medical insurance to individuals and not groups. A lot people don't have access to group medical coverage because they are not working in a good company or their employer has no medical benefits for its workers. In these cases, an individual medical care insurance company will prove very helpful. They have prices and coverages specially targeted to individuals.

Choosing a good individual health care protection provider can save you thousands of dollars in health costs. Count on spending a fair amount of time studying for the trusted quote from an individual care medical protection provider.By using the world wide web, anyone can easily get individual health protection insurers. Search engines, medical coverage information websites and company websites are some of the few ways of comparing prices for individual health protection companies.

Obtaining Car Insurance Quotes To Save Money


Car insurance is an unfortunate reality for all drivers within the US. The vast majority of US states require auto insurance in order to drive a vehicle. In addition, most lenders require that you have insurance on the car before you can drive it off the lot. While insurance represents a definite expense, you will find that there are ways to save money. Car insurance quotes can be used to help you find the lowest price on your auto insurance, but you will need to know how to go about obtaining them.

Online Quotes are Best '“ While you can most certainly call around to local insurance agents and agencies in your area to obtain car insurance quotes, you can do the same thing online. In general, obtaining quotes online is a much more expedient option than calling companies on the phone. In addition, this will allow you to shop around, while spending less time on each option. Most major insurance companies offer an online quote form that will allow you to input your vital information and receive a quote either through email or right on the website.

Shop Around '“ When shopping for auto insurance, it is imperative that you shop around. Comparing offerings from different companies is vital to finding the car insurance quotes you need to save money, yet still protect your investment. It is advised that you compare at least four different auto insurance companies in order to find the right coverage and the right price for your needs. However, if you can compare more than this number, do so

Combine Policies '“ Auto insurance is just one of the types of insurance that most people have to have in the modern world. However, you can save money on all of your insurance policies if you combine them through a single insurance provider. In most cases, insurance companies will give you better rates on auto insurance, homeowners insurance, life insurance and other forms of protection when you use their services for all of your needs.

Compare Coverage Types '“ Finally, when obtaining car insurance quotes, it is important that you compare the various types of coverage offered. You will find that different companies offer different protection types, even on the same basic type of policy. Different coverage types come at different price points. By customizing your protection, you can maximize your savings while still insuring your car

Medigap Plan Serves You Always To Supplement Your Medicare


Medicare supplementary plan is something which is planned and made completely to support your original Medicare plan. It is created remembering that Medicare original does not support all types of health diseases expenditures. It lapses some expenditures that should be made by the insurance policy but it is not made and paid. Therefore you can face some tough times while paying all the money from your pocket. It will cost you some real hustle bustle and tension. Some costs in your nursing home bill will not be covered or included in your insurance payback. You will not also be able to get some disease coverage in the original Medicare plan.

But it is normal and known to all. Now there is a solution in this case and that is doing or applying for a medical supplement which maximizes the benefits of your original Medicare insurance plan. All you have to do is at first enroll your name for original Medicare policy and then have enrolled for Medicare supplement plan which is created for getting maximum and full coverage for Medicare policy. Medicare supplement insurance plans provide you some of the health treatment costs that original Medicare does not cover. Therefore it helps you bear that extra cost that it left away by original Medicare as it is seen several times that some treatment costs are left aside by the original one. It bridges the gap between the original one and the money exactly paid by you to finish your medical thing. That is why the name '˜medigap'. One thing which is very important to be a beneficiary of medigap plan is to be a beneficiary of Medicare original plan. It is mandatory.

There are total twelve plans from A to L. And all these plans offer some specific benefits which maximize your coverage of original Medicare plan. Another thing which is important is that each and every company is bound to provide the same benefits for the plans under the same letter cover. No one can make any alternation to any plan among these. The private companies are bound to maintain the common rules set for their business. They can offer special benefits according to their whim. But there is one worth mentioning point and that is if you are a beneficiary of Medicare Advantage plan you are not eligible to register for any Medicare Supplement Plans. The fact is that the Medicare Advantage plans do not support the Medicare Supplement Plans and you cannot get yourself enrolled for any such policy unless you switch back over to the Original Medicare policy.

There is a different fact to be mentioned in this context. Though there had been no changes in the standard Medigap Insurance Plans after 1992 but by June 1, 2010, these twelve standard Medigap plans would undergo several major changes. With the effect of these changes four of the existing plans would be dropped and instead of that two new plans would be introduced. These changes had been made due to the federal legislation passed in 2005 in which there would be few additional consumer protections for California beneficiaries.

Life Insurance For Midlife And Beyond


Do people in their fifties or sixties even need a life insurance policy? Well, many of them think so. They had planned to save enough to cover themselves by this point in their lives. But that plan never really worked out as well as they thought it would.

When we purchase a policy at a younger age, we tend to think about supporting our kids and spouse. We may also be concerned about making sure our home mortgage is paid off if something happens to us. In theory, these problems will be resolved by the time we hit a certain age.

That age may have come and gone. But a lot of us find that we still owe money on our mortgage. Our plan to self insure with savings did not exactly go the way we planned either. Maybe we had a job loss or other financial setback. In addition, many of us did not get our kids out of our wallets when we thought we would. Maybe they even have their own kids now, and they need our help to raise them.

That 20 year term policy we purchased at 30 may have expired. That group benefit we had a work many not be in force anymore because we quit or retired. For whatever reason, many older people have decided that they did not outlive their need for coverage.

So what type of policy should we buy at our age? Should we choose term or whole life? When we were younger, we probably chose term. Rates are less, and the thought of a few decades of coverage seemed like enough. Besides, when we are young, two or three decades seems like it is very far off.

Now we have lived through those years, and just extending our coverage for another twenty years does not seem quite as attractive. The idea of lower prices is attractive. This is an important thought because we are more expensive to cover because we are older.

One option to consider might be a term policy with a clause that it can be converted to whole life later. These policies can be converted when we are older without having to prove with are healthy. This buys some time. We can purchase term now, and then make a decision later about lifetime coverage. If you are fifty, and buy 20 year term, you can make the switch before your policy expires. That way you will have a better idea of what your retirement situation will be like so you can make a good choice.

But that should not always mean whole life is out of the picture. A permanent policy can be used as an asset later. It builds cash value over time. Sometimes a whole life policy can actually be sold for some percentage of the face value too. It is true that whole life insurance costs more, but it also has some uses over pure term coverage.

What should you do? You need to figure out why you want to purchase coverage in the first place. When you know what your goals are, you are closer to being able to make a good decision.

Health Insurance Reform Weekly Easy To Insure Me Health Insurance Quotes


House and Senate
Things were quiet last week in Washington due to the 30 plus inches of snow the area received. On Feb. 9 House leaders announced that due to the heavy snow in the area they would suspend votes in the House for the remainder of the week. Congress will not be in session this week due to the President's Day recess and will reconvene the week of Feb. 22.

As a result of the congressional schedule, the timeframe for a floor vote on the McCarran-Ferguson antitrust legislation will be pushed back until the week of Feb. 22 at the earliest. Reports have stated that the antitrust bill is part of House Speaker Nancy Pelosi's (D-CA) strategy of moving smaller pieces of health care legislation quickly to help build momentum for a comprehensive health care reform bill. The Speaker also continues to urge House Democrats to pass the Senate bill as long as it is accompanied by a separate "reconciliation" bill that would 'œfix' key provisions in the Senate bill (e.g., raising the threshold for the Cadillac tax and dropping the Nebraska Medicaid provisions) to satisfy some members of her caucus.

The Senate remained in session last week, despite the weather, although Majority Leader Harry Reid (D-NV) stated that the Senate would not conduct any votes. On Feb. 11, Finance Committee Chairman Max Baucus (D-MT) and Ranking Member Charles Grassley (R-IA) released the highly anticipated 'œjobs bill' '“ The Hiring Incentives to Restore Employment (HIRE) Act.

Senators Baucus and Grassley issued a joint statement, emphasizing that this bill was drafted with bipartisan input. They further stated: 'œWe also agree that, once properly reviewed, the package should be considered in a deliberate, but expeditious manner. Any efforts to needlessly delay Senate completion of consideration of this package through partisan means will undermine our goal of timely action in the current economic climate. Action on the expired provisions is long overdue. Timely action on incentives for economic activity and job creation also is needed.'
Hours after details of the 'œHIRE' legislation were released, Majority Leader Reid publicly stated that he was scrapping the bill. Reid told reporters that when the Senate returns from its recess on Feb. 22, 'œwe will move to a smaller package than has been talked about in the press.' Reid went on to state that some of the tax provisions included in the legislation '“ key to garnering Republican support for the deal '“ 'œconfuse' the bill. Reid went on to say that, 'œwe don't have a jobs bill. We have a jobs agenda.'

The draft 'œHIRE' legislation addresses a number of key health care issues:

* The bill extends, by three months, the eligibility period for premium subsidies for state continuation coverage and COBRA continuation coverage to include persons who are unemployed on or before May 31, 2010. The bill also clarifies that these subsidies are available to persons who are involuntarily terminated from their jobs after previously losing their employer-sponsored coverage due to a reduction in hours. The premium subsidies originally were enacted as part of the American Recovery and Reinvestment Act of 2009, also known as the 'œstimulus bill.'

* The bill provides for a seven-month Medicare physician payment fix (sometimes known as the 'œdoc-fix'), maintaining physician payment rates at their current levels through Sept. 30, 2010. Under current law, in the absence of congressional action, physicians are scheduled to face a steep rate reduction on March 1.

* The bill provides for a one-year extension of both Medicare Advantage Special Needs Plans (section 626) and Medicare Cost Plans (section 627).

* The bill includes numerous provisions addressing Medicare fee-for-service reimbursement issues.
White House Health Care Reform Summit
In a pre-Super Bowl interview on CBS, President Obama said that he would like to host a televised health care summit with Republican and Democratic congressional leaders on Feb. 25. While specific details are not yet available, the summit represents the Obama Administration's latest strategy to jumpstart the health care reform debate and seeks bipartisan cooperation following the loss of the Democrats' supermajority in the Senate. Republican leaders expressed interest in the summit, and House Republican Leader John Boehner (OH) issued a statement saying that, "The best way to start on real, bipartisan reform would be to scrap those bills and focus on the kind of step-by-step improvements that will lower health care costs and expand access." In response, White House officials insisted that the President is not interested in starting from scratch on health reform.

This week Democratic and Republican congressional leaders also met with President Obama at the White House to discuss the jobs bill, health reform, energy, trade and other legislative priorities.

Following the meeting, the President spoke with reporters and he made the following comments about health reform: 'œI'm going to be starting from scratch in the sense that I will be open to any ideas that help promote these goals. What I will not do, what I don't think makes sense and I don't think the American people want to see, would be another year of partisan wrangling around these issues; another six months or eight months or nine months worth of hearings in every single committee in the House and the Senate in which there's a lot of posturing. Let's get the relevant parties together; let's put the best ideas on the table. My hope is that we can find enough overlap that we can say this is the right way to move forward, even if I don't get every single thing that I want

Cheap Life Insurance


You can by no means be familiar with when you might breathe your last; life is just swinging on that last breath. Irrespective of countless ideas and schemes we might have for our self and our family, they might simply blow apart all of a sudden with the unforeseen happening. Actually, one can die at any given time whether he/she is young or aged and a life insurance offers protection for you and your family in such ambiguity. It assists you to look after your family even after you are no more. A life insurance can be used as a protector of your near ones once you are no more there to do it personally. You will be providing financial protection to your family and as well secure their future on the whole.

You may not be familiar with that the life insurance not just protects you however as well your entire family. Of course yes, in case of untimely demise you will be provided with this advantage. It is weird however a lot of people are just not familiar with the advantages provided by life insurances. That

More Tips For Saving Money On Your Children's Car Insurance


Boy are insurance premiums shooting through the roof! Seems like a month doesn't go by when some insurance of mine hasn't increased its premiums by just a little bit. Why, at the end of last year 2009 I even got a letter from my health insurance company telling me that times are tough and we all have to band together and pull each other through this recession. Apparently the way to do that is for me to start paying more for that particular health insurance!

But there's one kind of insurance in particular that is historically more expensive then it maybe should be, and that is auto insurance for children. Now I can sort of see the case that the insurance companies make... that is, kids get in lots of car wrecks. They're stupid, they do stupid things, they drive stupidly, they don't pay attention very well, and they simply don't have much driving experience which leads to more auto accidents. And when there's more auto accidents, that means the insurance companies have to pay out more money... which is something that no insurance company likes to do. Hence higher rates for childrens car insurance.

This can be especially hard to handle if your family has several children all of whom need car insurance. But there is some silver lining to this problem. There are several ways that you can lower the cost of your premiums for insuring the children in your family.

The first and most basic tip is to make sure that your children have taken driver's ed. While it is true that most states require the passing of driver's ed in order to issue a valid drivers license, some states don't. If you live in one of those states then make sure that your child has attended and in fact passed driver's ed class anyway. If they do, you can expect a decrease in your insurance premium by sometimes as much is 10% or more. Of course you can must actually pass the class; it's not good enough that they merely attended.

The next tip that most people have already heard of is called the "good student discount". Basically this just means that if your child maintains at least a B average you get a discount. The higher your child's grades are, the higher your discount will be... so keep that in mind, most people don't realize that part. You'd be surprised but sometimes having a good student can lower your insurance premiums by as much as a fourth which is a lot of money if you actually think about it.

Another tip has to do with cars that your children own outright. If your kid owns their own car then insure them under your policy and not under their name. Almost every insurance company offers a multicar discount and this discount can range anywhere from 10% sometimes up to as much as 30% depending on the company. That will give you a significant discount month in and month out.

Finally, if your child lives over a hundred miles away for college and doesn't have a car on campus then you can try for a college student discount which ranges usually from 10% up to 15% and sometimes even 20%. You may be curious why you would need car insurance at all for your children if they're away at college and aren't driving... well they always come home don't they? Spring break, fall break, summer break, Christmas break, and on and on... and when they do what's the first thing they ask for? The keys! So there you go.

There you are, several tried and true tips to lower your insurance premiums for children in your family.

Supplement Your Original Health Plan By Medigap Insurance


Medigap insurance or Medicare supplemental plan is that type of plan which asserts the possibility to get the complete benefits of the Medicare original policy by double. It is purely made remembering the criteria that Medicare original always left some money coverage or insurance money unpaid or undue due to insurance structure or insurance policy. It is normal and common to the insurance holders. For this you if you have to get 100% benefits of your Medicare original plan then you have an option and that is to applying for a Medicare supplemental plan or which is called medigap insurance plan.

Medicare supplement plans or Medigap is the private health insurance plans that are for those people who already have a Medicare policy. The Medigap or Medicare supplement plans helps the Medicare beneficiaries to bear that extra medical cost that are left aside by the original plans. The name Medigap is suggested because it is believed that these policies bridges the gap between the Medicare coverage and the original expenses or the total bill charged. However in the recent studies it is seen that in the United States about 18% of the people having original Medicare policy goes for the supplement plans also.

Some details are here following. Medigap insurance needs to be applied for after you have done an original one as it will be Medicare original's supplement. Other fixed criteria are age and other medical screening before doing the plan. But all the plans are same fixed by the governing body of the private companies which provide medigap insurance. At first you have to enroll your name under the plan A or plan B of original Medicare plan. It is mandatory and vital. A person may obtain a Medigap plan on a guaranteed issue basis during the open enrollment period, which begins within 6 months of turning 65 or enrolling in Medicare Part B at 65 or older. And also that I this period no medical screening is required. But after this open enrollment you have to give a medical screening and test for this health insurance plan. If the screening is felt required then you have to sit for a physician's checkups. You may note down that any other medical insurance plan like Medicare Advantage plan will not be compatible with medigap insurance plan. No private medical coverage plan is under the list of compatibility apart from the original Medicare plan.

Medigap insurance plans may vary state wise but the basic rules are the same and they have to be maintained strictly. No private company on its own can change the rules and other formalities according to its whim. It is always same irrespective of company from where you are getting the medigap insurance. Currently there are 12 standard plans available in USA. They are named after English alphabet starting from A to ends with L. All the 12 plans provide different kinds of benefits and offerings to its customers. Medigap Plans H, I, and J, cannot be sold to people with prescription to drug benefits, although there is a lax of this rule for people who already have those plans and they can keep them.

The Main Types Of Auto Insurance Policies


People take out car insurance policies to safeguard themselves, their vehicles and any third parties in an accident. Everyone knows that a motor vehicle is not necessarily cheap, and the cost of repairs or replacement for one could be devastating. Nowadays it is just reckless to drive without auto insurance.

The first kind of car insurance you are able to take out is fully comprehensive. This covers all aspects of your motor vehicle, and most incidents in a collision. This kind of cover will protect your vehicle and will also pay for repairs to any other car involved in the accident if you were at fault for the collision. The fully comprehensive insurance policy is normally the more expensive policy of the lot, but it is the only kind that covers against all kinds of damages, theft and accidents.

Third party coverage is normally the most affordable kind, and will only cover the cost of repairs to a third party if you have an accident and it was your fault. This is normally the best option if you have an older vehicle, and the expense of fully insuring it would not be viable with regards to how much you pay for the premium monthly, and how much it would actually cost to repair it. Third party coverage can be standard, with only coverage to any other vehicle you hit in an accident, or you can get third party coverage that has fire and theft added onto it. Naturally, this will be a bit more costly than the regular third party coverage, but the extra amount will be worth it.

Specialized car insurance is created for vehicles that are older than 25 years. These vehicles will require special cover as they will usually be more expensive to repair, seeing as most of the parts will be customized due to them not being available on the market anymore. Specialized car insurance is usually quite expensive due to the fact that a classic car will cost more to repair, and can also be costly to replace.

There are many different types of car insurance coverage, but it is up to you the extent of the cover you want for your motor vehicle. Speaking to your insurance house will help clarify all the different types of cover available to you. You need to know how much you can afford, and what you feel is imperative cover to have. If you live in a dangerous area, where your car is more at risk of being stolen or broken into, then you will need the theft coverage. If you live in an area that is more prone to natural disasters, then you will want to insure against effects of Mother Nature. If you do not drive as much as other people, and feel it would be unfair for you to pay the same rates as them, then you could consider pay as you drive insurance.

Regardless of what insurance you need, the best thing to do initially is to compile as many quotes as possible, so that you can make a comparative choice. You'll need to ask questions and find out whether you will be getting the cover you need from the insurance company you have chosen.

California Health Insurance Supports Californians In Good And Bad Times


With hundreds of California Health Insurance Plans available, providers are going beyond expectations to offer additional benefits to their members and the larger community.

Health Insurance for California Provider Donates to Red Cross

One of largest providers of Health Insurance in California -- Anthem Blue Cross of California -- stepped up to help during the southern California wildfires. When residents were forced to flee from their homes, some left behind necessary and valuable prescription medications. Anthem Blue Cross of California provided a one-time 30-day supply override so their members would not have to wait for a 30-day cycle to end before they could refill prescription medications lost during the fires.

Blue Cross of California also extended the range of in-network healthcare providers to help those who were forced to relocate. Anthem said the in-network coverage benefits would be extended to cover out-of-network providers when victims of the wildfires relocated to areas lacking in-network providers.


Anthem also extended assistance to the community at large. Blue Cross of California donated $25,000 to the American Red Cross to help bring relief to victims of the southern California fires.

California Health Insurance Providers Step Up for H1N1 Crisis

Anthem Blue Cross of California is one of many health insurance providers that offer members free H1N1 vaccinations. Many providers are waiving coinsurance, co-pays, and deductible fees to enable more people to receive H1N1 vaccinations. Anthem is also offering low-cost flu-related treatment coverage, including Relenza and Tamiflu. Those enrolled in Medicaid, the State Children's Health Insurance Program, or other publicly-funded health care programs can also receive the H1N1 vaccine at no cost.

Blue Cross of California Makes It Easier to Stay Well in Good Times, Too

Anthem Blue Cross of California continues to offer assistance in normal times with convenient prescription medication mail service for its members. Anthem's NextRX program is available to members who take prescription medications on a regular basis. That includes medications that are used to treat allergies, depression, diabetes, and heart disease, along with oral contraceptives. Members who participate in NextRX may also receive confidential counseling with the Anthem pharmacist, coupons, free shipping, prescription refill reminders, and 24/7 telephone and Web site access.

New Health Insurance Plans for California

Anthem provides a wide range of California Health Insurance Plans, including dental, employer health, and family and individual health plans. It also offers a plan specifically for healthy young people (California TONIK).

Blue Cross of California SmartSense plans offer low costs while still covering essentials, such as doctor office visits and prescription medications. Anthem offers both HMOs and PPOs. PPO Share Plans allow immediate benefits for annual physical exams, doctor office visits, and preventive care. Blue Cross of California also has PPO plans that cover 100 percent of most services after a deductible, and are compatible with Health Savings Accounts.

On the first day of 2010, Anthem Blue Cross Life and Health launched CoreGuard, which is an individual PPO plan. On February 1st, Anthem offered ClearProtection, a second new individual PPO plan. Both plans are designed to address healthcare reform plans proposed by the Senate, and to provide deductible options and prescription drug coverage. Clear Protection also guarantees no rate increases for two years.

In addition, Blue Cross of California provides access to alternative health care practitioners, emergency care worldwide, online services, and specialty programs.

California Health Insurance Plans Offer Many Choices

California Health Insurance providers (including Aetna, Assurant, Blue Cross, Blue Shield, HealthNet, Nationwide, and Pacificare) have hundreds of plans from which to choose. To find the best plan for your needs, evaluate your options carefully. Health Insurance Quotes for California are available online. Free consultation services are also available online so you can ask experts who have worked with these plans for years what terms mean, and get expert advice on how different plans can meet your needs.

3 Top Ways To Get The Free Annual Credit Report


Yes, you can now get your credit report without paying a dime. And unlike before, now is truly free. You no longer have to join a 'free report' Credit by signing 'credit monitoring protection service' for a low annual fee of $ 79 per annum! The days of dodging the annoying charges and service fees for a credit report are over.

As part of 2003 the Fair and Accurate Credit Transactions Act, you are entitled to a free copy of your credit report within a period of 12 months from the three major credit reporting agencies (Experian, Equifax and TransUnion).

The purpose of this act the new government is to ensure that Americans are entitled to be informed about what these three credit reporting agencies say about you without having to pay for it. Since identity theft, fraud and mistakes are very common today, why do you have to pay for a copy of a report to combat these problems?


Here are 3 ways to get your free annual credit report:

The three credit reporting agencies have created a website to request your annual credit report.

1) Go to annualcreditreport.com

2) Call (877) 322-8228 to request your free credit report.

3) Complete a form from the Federal Trade Commission

If you go directly to the three agencies or using any other type of service that may end up having to pay or sign up for subscription services that I mentioned above! Make sure you use one of the 3 methods I've mentioned to get your free annual credit report.

You can get reports from all 3 agencies at once or stagger the reports for each one of them during 1 year. The advantage of staggering the reports you receive is to keep track of how any major changes in your financial situation affects what is in your credit report. For example, if you plan on getting a second mortgage over the next year, or apply for student loans, etc... might be advisable to obtain a report before and after these important events!

This new law does not replace other methods you can take advantage of receiving a free credit report. If you are applying for unemployment or have been denied a loan, or the need for a credit report in order to get a job, you are still entitled to obtain a free credit report.

Enjoy this new government regulation and ensure that all information given by the three credit reporting agencies are correct. Any errors or omissions can lower your credit score and end up costing a lot of money when applied to any type of credit.

Tips To Finding The Best Auto Insurance


It seems easy to find an auto insurance for your car. In addition, you can also find many tools and some cool price comparison sites online which can be of great help. However should your decision be based only on the price factor? Most auto insurance experts will disagree ,but it is important to ensure that your safety is not compromised and there is a guarantee that you and your family will be compensated in the event of a mishap on the road.

These online comparison sites can be great productivity tools and are really convenient, we admit. Using online price comparison should only come after this most important step: Knowing what you need. Having an auto insurance that will not only meet the State's requirement but most importantly provides what you are worth as a person is the only way that you can guarantee that you and your family are safe no matter what happens. If you are thinking of signing a new insurance provider these pointers will help you to choose the best one


1. Calculate minimum requirement for auto insurance. The state requirements decide the minimum coverage given by the auto insurance companies. It is important that you understand that the minimum only covers, well, the minimum; your lifestyle, asset, and essentially your value as a person are some factors that must be factored in before you decide on the coverage amount of your insurance. The higher your net value is, the higher your insurance coverage should be.

2. Note down the discounts that you can avail. That also in no way conveys the meaning that if you have the money then you pay it. Yo ucan rduce your total payable premium using certain deductibles available only in auto insurance. If you have recently purchased on anti theft device for your car, have a clean driving history, or if you belong to a club that the insurance company recognizes, ask if you can apply these as deductibles for your plan.

3. Ask for quotations, if you have assimilated all the information that you require. It is imperative to check out all the risks involved while going with a particular insurance company over other. If you are looking at the right insurance coverage then you must check out at least three auto insurance quotes before you make the decision. You will be able to decide better if you have gathered plenty of information through various options.

Types of Network- LAN, WAN and MAN


Today when we speak of networks, we are generally referring to three primary categories: local area networks, metropolitan area networks, and wide area networks. Into which category a network its size, its ownership, the distance it covers, and its physical architecture determine falls.

Local Area Network (LAN)

A local area network (LAN) is usually privately owned and links the devices in a single office, building, or campus. Depending on the needs of an organization and the type of technology used, a LAN can be as simple as two PCs and a printer in someone's home office, or it can extend throughout a company and include voice, sound, and video peripherals. Currently, LAN size is limited to a few kilometers.


LANs are designed to allow resources to be shared between personal computers or workstations. The resources to be shared can include hardware e.g., a printer, software e.g., an application program, or data. A common example of a LAN, found in many business environments, links a work group of task-related computers, for example, engineering workstations or accounting PCs. One of the computers may be given a large-capacity disk drive and become a server to the other clients. Software can be stored on this central server and used as needed by the whole group. In this example, the size of the LAN may be determined by licensing restrictions on the number of users per copy of software, or by restrictions on the number of users licensed to access the operating system.

In addition to size, LANs are distinguished from other types of networks by their transmission media and topology. In general, a given LAN will use only one type of transmission medium. The most common LAN topologies are bus, ring, and star.
Traditionally, LANs have data rates in the 4 to 16 Mbps range. Today, however speeds are increasing and can reach 100 Mbps with gigabit systems in development.

Metropolitan Area Network (MAN)

A metropolitan area network (MAN) is designed to extend over an entire city. It may be a single network such as a cable television network, or it may be a means of connecting a number of LANs into a larger network so that resources may be shared LAN-to-LAN as well as device-to-device. For example, a company can use a MAN to connect the LANs in all of its offices throughout a city.

A MAN may be wholly owned and operated by a private company, or it may be a service provided by a public company, such as a local telephone company. Many telephone companies provide a popular MAN service called Switched Multi-megabit Data Services (SMDS).

Wide Area Network (WAN)

A wide area network (WAN) provides long-distance transmission of data, voice, image, and video information over large geographical areas that may comprise a country, a continent, or even the whole world.

In contrast to LANs (which depend on their own hardware for transmission), WANs may utilize public, leased, or private communication devices, usually in combinations, and can therefore span an unlimited number of miles. A WAN that is wholly owned and used by a single company is often referred to as an enterprise network.


REFERENCES

1)Computer Networks By Andrew S. Tanenbaum.
2)Computer Networks By William Stalling.
3)Wireless Communication & Networking By William Stalling.
4)CCNA Study Guide By BPB Publications.

Networking Tutorial


This networking tutorial is primarily about TCP/IP network protocols and ethernet network architectures, but also briefly describes other protocol suites, network architectures, and other significant areas of networking. This networking tutorial is written for all audiences, even those with little or no networking experience. It explains in simple terms the way networks are put together, and how data packages are sent between networks and subnets along with how data is routed to the internet. This networking tutorial is broken into five main areas which are:

1. Basics - Explains the protocols and how they work togethe

2. Media - Describes the cabling and various media used to send data between multiple points of a network.

3. Architecture - Describes some popular network architectures.
A network architecture refers to the physical layout (topology) of a network along with the physical transmission media (Type of wire, wireless, etc) and the data access method (OSI Layer 2). Includes ethernet, Token Ring, ARCnet, AppleTalk, and FDDI. This main area of the networking tutorial can and should be skipped by those learning networking and read later.


4. Other Transport Protocols - Describes IPX/SPX, NetBEUI, and more.

5. Functions - Explains some of the functionality of networking such as routing, firewalls and DNS.

6. Further Details - Gives information about some protocols not covered in the "Basics" section. In the future, it will include more information about packet fragmentation and re-assembly along with more details about UDP and especially TCP and TCP connections.

7. More Complex functions - Documents multicasting, dynamic routing, and network management

8. Applications - Documents how some of the applications work such as ping and traceroute. In the future, it will cover telnet, Rlogin, and FTP.

9. Other Concerns - Includes installing drivers, network operating systems, applications, wide area networks, backing up the network and troubleshooting the network.

10. References - Includes a reference list of terms, RFCs and recommended reading.

The reader may read this networking tutorial in any order, but for beginners, it would be best to read through from the beginning with the exception of sections 2 (media), 3 (architecture), and 4 (other). At some point, however, the reader should be able to break from the basics and read about routing and IP masquerading. There are no links to various reading material or software packages inside this networking tutorial, except under the references section. This is because it is more structured, and makes it easier to keep the networking tutorial current.

This networking tutorial will first talk about the network basics so the reader can get a good grasp of networking concepts. This should help the reader understand how each network protocol is used to perform networking. The reader will be able to understand why each protocol is needed, how it is used, and what other protocols it relies upon. This networking tutorial explains the data encapsulation techniques in preparation for transport along with some of the network protocols such as IP, TCP, UDP, ICMP, and IGMP. It explains how ARP and RARP support networking. In functional areas, such as routers, several examples are given so the user can get a grasp on how networking is done in their particular situation.

This networking tutorial covers routing, IP masquerading, and firewalls and gives some explanation of how they work, how they are set up, and how and why they are used. Firewalls and the available packages are described, but how to set them up is left to other documentation specific to the operating system and the package. Application protocols such as FTP and Telnet are also briefly described. Networking terms are also explained and defined.

This networking tutorial explains the setup of networking functions using Linux Redhat version 6.1 as an operating system (OS) platform. This will apply to server functions such as routing and IP masquerading. For more documentation on setting up packages, read documentation on this web site and other locations specific to the operating system and the package. If you know how to set up other operating servers such as Windows NT, you can apply the information in this networking tutorial to help you understand how to configure services on that OS platform.

This networking tutorial was written because I perceived a need for a basic networking document to explain how these networking services work and how to set them up, with examples. It will help a novice to learn networking more quickly by explaining the big picture concerning how the system works together. I have seen much good networking documentation, but little that explains the theory along with practical setup and applications.

http://www.comptechdoc.org/independent/networking/guide/

Networking : Introduction


Networking is the concept of sharing resources and services. A network of computers is a group of interconnected systems sharing resources and interacting using a shared communications link. A network, therefore, is a set of interconnected systems with something to share. The shared resource can be data, a printer, a fax modem, or a service such as a database or an email system.

The individual systems must be connected through a pathway (called the transmission medium) that is used to transmit the resource or service between the computers. All systems on the pathway must follow a set of common communication rules for data to arrive at its intended destination and for the sending and receiving systems to understand each other. The rules governing computer communication are called protocols.


In summary, all networks must have the following:
1.A resource to share (resource)
2.A pathway to transfer data (transmission medium)
3.A set of rules governing how to communicate (protocols)

Having a transmission pathway does not always guarantee communication. When two entities communicate, they do not merely exchange information; rather, they must understand the information they receive from each other. The goal of computer networking, therefore, is not simply to exchange data but to understand and use data received from other entities on the network.
An analogy is people speaking, just because two people can speak, it does not mean they automatically can understand each other. These two people might speak different languages or interpret words differently. One person might use sign language, while the other uses spoken language. As in human communication, even though you have two entities who "speak," there is no guarantee they will be able to understand each other. Just because two computers are sharing resources, it does not necessarily mean they can communicate.

Because computers can be used in different ways and can be located at different distances from each other, enabling computers to communicate often can be a daunting task that draws on a wide variety of technologies.
The two main reasons for using computer networking are to provide services and to reduce equipment costs. Networks enable computers to share their resources by offering services to other computers and users on a network.

The following are specific reasons for networking PCs
1.Sharing files
2.Sharing printers and other devices
3.Enabling centralized administration and security of the resources within the system.
4.Supporting network applications such as electronic mail and database services
5.Limited resources
6.Desire to share the resources
7.Cost Reduction

Today, that's a limiting view, because the most important resource is information. Network lets us share information and Resource Sharing achieves the same

Resource Sharing

The purpose of many computer networks is to permit a far-flung community of users to share computer resources. Many such users now have their own microcomputers, so the shared resources have to be interesting enough to warrant access via a network. The facilities accessible by networks are in fact becoming more interesting at a rapid rate.
The remote computer may contain software that a user needs to employ. It may be proprietary software kept at one location. It may require a larger machine than any at the user's location. The distant computer may provide access to data that is stored and maintained at its location. Sometimes the remote machine controls a large or special printing facility. Sometimes the remote machine compiles programs that are used on smaller peripheral machines.

Cost Reduction
There are various aspects of technology that are likely to force the price of terminal usage drastically lower. This is important because almost all aspects of telecommunications are characterized by high price elasticity. In other words, when the price comes down, the usage goes up.

REFERENCES

1)Computer Networks By Andrew S. Tanenbaum.
2)Computer Networks By William Stalling.
3)Wireless Communication & Networking By William Stalling.
4)CCNA Study Guide By BPB Publications.

NETWORK TOPOLOGIES



The term topology refers to the way a network is laid out, either physically or logically. Two or more devices connect to a link; two or more links form a topology. The topology of a network is the geometric representation of the relationship of all the links and linking devices (usually called nodes) to each other. There are five basic topologies possible: mesh, star, tree, bus, and ring.

These five labels describe how the devices in a network are interconnected rather than their physical arrangement. For example, having a star topology does not mean that all of the computers in the network must be placed physically around a hub in a star shape. A consideration when choosing a topology is the relative status of the devices be linked. Two relationships are possible: peer-to-peer, where the devices share the link equally, and primary-secondary, where one device controls traffic and the others must transmit through it. Ring and mesh topologies are more convenient for peer-to-peer transmission, while star and tree are more convenient for primary-secondary, bus topology is equally convenient for either.


Mesh
In a mesh topology, every device has a dedicated point-to-point link to every other device. The term dedicated means that the link carries traffic only between the two devices it connects. A fully connected mesh network therefore has n*(n - l)/2 physical channels to link n devices. To accommodate that many links, every device on the network must have 7 input/output (I/O) ports.

A mesh offers several advantages over other network topologies. First, the use of dedicated links guarantees that each connection can carry its own data load, thus eliminating the traffic problems that can occur when links must be shared by multiple devices.

Second, a mesh topology is robust. If one link becomes unusable, it does not incapacitate the entire system.

Another advantage is privacy or security. When every message sent travels along dedicated line, only the intended recipient sees it. Physical boundaries prevent other users from gaining access to messages.

Finally, point-to-point links make fault identification and fault isolation easy. Traffic can be routed to avoid links with suspected problems. This facility enables the network manager to discover the precise location of the fault and aids in finding its cause and solution.

The main disadvantages of a mesh are related to the amount of cabling and the number of I/O ports required. First, because every device must be connected to ever other device, installation and reconfiguration are difficult. Second, the sheer bulk of the wiring can be greater than the available space (in walls, ceilings, or floors) can accommodate. And, finally, the hardware required connecting each link (I/O ports and cable can be prohibitively expensive). For these reasons a mesh topology is usually implemented in a limited fashion—for example, as a backbone connecting the main computers of a hybrid network that can include several other topologies.


Star
In a star topology, each device has a dedicated point-to-point link only to a central controller, usually called a hub. The devices are not directly linked to each other. Unlike a mesh topology, a star topology does not allow direct traffic between devices. The controller acts as an exchange. If one device wants to send data to another, it sends the data to the controller, which then relays the data to the other connected device.

A star topology is less expensive than a mesh topology. In a star, each device needs only one link and one I/O port to connect it to any number of others. This factor also makes it easy to install and reconfigure. Far less cabling needs to be housed, and additions, moves, and deletions involve only one connection: between that device and the hub.
Other advantages include robustness. If one link fails, only that link is affected. All other links remain active. This factor also lends itself to easy fault identification and fault isolation. As long as the hub is working, it can be used to monitor link problems and bypass defective links.
However, although a star requires far less cable than a mesh, each node must be linked to a central hub. For this reason more cabling is required in a star than in some other topologies (such as tree, ring, or bus).

Tree
A tree topology is a variation of a star. As in a star, nodes in a tree are linked to a central hub that controls the traffic to the network. However, not every device plugs directly into the central hub. The majority of devices connect to a secondary hub that in turn is connected to the central hub.
The central hub in the tree is an active hub. An active hub contains a repeater, which is a hardware device that regenerates the received bit patterns before sending them out. Repeating strengthens trans- missions and increases the distance a signal can travel.

The secondary hubs may be active or passive hubs. A passive hub provides a simple physical connection between the attached devices.

The advantages and disadvantages of a tree topology are generally the same as those of a star. The addition of secondary hubs, however, brings two further advantages. First, it allows more devices to be attached to a single central hub and can therefore increase the distance a signal can travel between devices. Second, it allows the network to isolate and prioritize communications from different computers. For example, the computers attached to one secondary hub can be given priority over computers attached to another secondary hub. In this way, the network designers and operator can guarantee that time-sensitive data will not have to wait for access to the network.

A good example of tree topology can be seen in cable TV technology where the main cable from the main office is divided into main branches and each branch is divided into smaller branches and so on. The hubs are used when a cable is divided.

Bus
The preceding examples all describe point-to-point configurations. A bus topology, on the other hand, is multipoint. One long cable acts as a backbone to link all the devices in the network.

Nodes are connected to the bus cable by drop lines and taps. A drop line is a connection running between the device and the main cable. A tap is a connector that either splices into the main cable or punctures the sheathing of a cable to create a contact with the metallic core. As a signal travels along the backbone, some of its energy is transformed into heat. Therefore, it becomes weaker and weaker the farther it has to travel. For this reason there is a limit on the number of taps a bus can support and on the distance between those taps.

Advantages of a bus topology include ease of installation. Backbone cable can be laid along the most efficient path, then connected to the nodes by drop lines of various lengths. In this way, a bus uses less cabling than mesh, star, or tree topologies. In a star, for example, four network devices in the same room require four lengths of cable reaching all the way to the hub. In a bus, this redundancy is eliminated. Only the backbone cable stretches through the entire facility. Each drop line has to reach only as far as the nearest point on the backbone.


Disadvantages include difficult reconfiguration and fault isolation. A bus is usually designed to be optimally efficient at installation. It can therefore be difficult to add new devices. As mentioned above, signal reflection at the taps can cause degradation in quality. This degradation can be controlled by limiting the number and spacing of devices connected to a given length of cable. Adding new devices may therefore require modification or replacement of the backbone.

In addition, a fault or break in the bus cable stops all transmission, even between devices on the same side of the problem. The damaged area reflects signals back in the direction of origin, creating noise in both directions.

Ring
In a ring topology, each device has a dedicated point-to-point line configuration only with the two devices on either side of it. A signal is passed along the ring in one direction, from device to device, until it reaches its destination. Each device in the ring incorporates a repeater. When a device receives a signal intended for another device, its repeater regenerates the bits and passes them along.

A ring is relatively easy to install and reconfigure. Each device is linked only to its immediate neighbors (either physically or logically). To add or delete a device requires moving only two connections. The only constraints are media and traffic considerations (maximum ring length and number of devices). In addition, fault isolation is simplified. Generally in a ring, a signal is circulating at all times. If one device does not receive a signal within a specified period, it can issue an alarm. The alarm alerts the network operator to the problem and its location.

However, unidirectional traffic can be a disadvantage. In a simple ring, a break in the ring (such as a disabled station) can disable the entire network. This weakness can be solved by using a dual ring or a switch capable of closing off the break.

LANs


A local area network (LAN) is two or more computers directly linked within a small well-defined area such as a room, building, or group of closely placed buildings. A LAN may be made up of only microcomputers or any combination of microcomputers and large systems.

The computer network that connects the computers in the different parts of the same big city like metropolitan city may be referred to as Metropolitan Area Network (MAN).

Interest in local area networks is constantly growing due to following two developments
1.Developments in communication technology
2.The difference between a LAN and Development of powerful and user-friendly micro-computers


A multi-user system is that a LAN is made up of stand-alone computers whereas a multi-user system typically has one computer that is shared among two or more terminals.

A LAN usually consists of the following
1.Two or more computers
2.Peripheral devices such as printers and hard-disk drives
3.Software to control the operation of the computers or other devices connected to the LAN
4.Special cables, usually coaxial or fiber optic, to connect the computers and other devices
5.A plug-in board to handle the data transmissions.
6.A benefit of a LAN is the reduction of hardware costs because several computers and users can share peripheral devices such as laser printers, hard-disk drives, color plotters, and modems. Another advantage is the users can share data.

Ensuring the security and privacy of data are two concerns of LAN users. The LAN must get the data to its destination, transmit the data correctly, and prevent unauthorized users from gaining access to that data. These tasks are accomplished through both the hardware and LAN software.
They vary in the type and number of computers that can be connected, the speed at which data can be transferred, and the type of the software used to control the network. Some LANs require that all the computers be of a certain brand, while others allow a variety of brands to be connected. The number of computers in a LAN varies widely from smaller LANs that typically connect 2 to 25 computers, to large LANs that can connect as many as 10,000 computers.

The length of the cable connecting a computer to a LAN also varies depending on the LAN. Most LANs allow cables of about 1000 feet, but some allow cables of several miles to be used. The data transfer speeds range from several thousand bits per second to around 10 million bits per second. The programs that control the LANs also vary in the features they offer. Some programs allow the use of more than one operating system; others allow only one. On some LANs, file access is limited to one user at a time; on others, more than one user can access a file simultaneously.

How To Register In Google Webmaster Tools (Google Sitemap)


Sitemap is needed to create a map of blog, to inform google about our blog contents. We expected the contents of our blog will be more quickly identified by google. Before, I have posted about How to enable Google Webmaster Tools.

To register in Sitemap, we should go to webmasters tool google. Sign in with your google ID. Select "add site", type your blog url.
For example = http://cubadak-angek.blogspot.com and click add site.


Than, click "verify your site". choose add a meta tag. After you get a meta tag code, just copy the code to your blog. Precisely under "head" in your blog HTML. Than click verify under of meta tag code.

Type the sitemap option below :

1. Atom.xml
2. Rss.xml
3. feeds/posts/default
4. feeds/posts/default?alt=rss

You can enter one or all of them, it's up to you, but for safely, enter all of them.
Remember that sitemap option above must through with your URL, so full of writing like this:

1. http://ampunden.blogspot.com/Atom.xml

2. http://ampunden.blogspot.com/Rss.xml

3. http://cubadak-angek.blogspot.com/feeds/posts/default

4. http://cubadak-angek.blogspot.com/feeds/posts/default?alt=rss


How Does Sub-Subnetting Work?


Each subnet address at Cornell is assigned a "subnet mask." A subnet mask defines how many bits are used for the network address and how many for the host address.

The subnet mask address is 255.255.255.0, and it currently is the same for all LANs. If you convert the subnet mask address to its binary form, it looks like this:

Subnet mask: 11111111 11111111 11111111 00000000

If you convert our example host address (128.253.21.58) to its binary form, it looks like this:

Host address: 10000000 11111101 00010101 00111010

Together they look like this:

Subnet mask: 11111111 11111111 11111111 00000000

Host address: 10000000 11111101 00010101 00111010


The subnet mask when shown this way, as an overlay on the host address, essentially tells the computer which part of the IP address is a network address and which part is a host address. Everything in the host address that corresponds to a 1 in the subnet mask is a network address and everything in the host address that corresponds to a 0 in the subnet mask is a host address.
Sub-subnetting

Many LANs at Cornell are sub-subnetted.

Sub-subnetting is based on the same concept as subnetting. With sub-subnetting, the mask will be 255.255.255.192. In binary form, this address looks like this:

Sub-subnet mask: 11111111 11111111 11111111 11000000

When you compare the sub-subnet mask to the example IP host address (128.253.21.58), they look like this:

Sub-subnet mask: 11111111 11111111 11111111 11000000

Host address: 10000000 11111101 00010101 00111010

Like the old subnet mask, the sub-subnet mask tells the computer which part of the IP address is the network address and which part is a host address. As explained above, everything in the host address that corresponds to a "1" in the sub-subnet mask is a network address and everything in the host address that corresponds to a 0 in the sub-subnet mask is a host address.

As you can see, there are now ones (1's) in the last byte of the sub-subnet mask. (This is the part, in the subnet mask, that was all zeros (0's) and that identified the host portion of an address.) The ones (1's) that appear in this byte of the sub-subnet mask identify the first two bits of the last byte of an IP address as part of the network portion of the address. The remaining zeros (0's) identify the host portion of the address. By increasing the number of bits assigned to network addressing, the number of possible network addresses increases and the number of possible host addresses for each LAN decreases.
Why is this important?

Gateways need to forward packets to other gateways to get them to the destination LAN. Each network interface card on the gateway is assigned an IP address and a sub-subnet mask. This enables the gateways to route packets from one LAN to another LAN. Once the packet arrives at a gateway that is attached to the destination LAN, the gateway then uses the two bits of the sub-subnet portion of the IP address (the first two bits of the last byte of the IP address) to decide to which sub-subnetted LAN to send the packet.

In order for this to work, each of the LANs connected to a given gateway must have a different set of host addresses. As you know, the host address you assign, for example 58, is translated into a binary address (00111010). Remember, even though you think of this as a host address, the sub-subnet mask forces the gateway to think of the first two bits as part of the network address. If two LANs attached to the same gateway each have hosts with an address of 58, the first two bits in the binary translation will be the same, and even though the hosts are physically on two separate LANs, the gateway won't know to which LAN to send a packet.

To make sure each LAN has a unique set of host addresses, network administrators can no longer assign host numbers from the entire range. Now, each administrator will be assigned a subset of the host addresses available. Within each subset, broadcast, gateway, and diagnostic addresses must be reserved. So, for example, Administrator X can have server addresses at 6 through 9 and workstation addresses at 10 through 63; Administrator Y can have server addresses at 70 through 73 and workstation addresses 74 through 126, etc. If your current host addresses fall outside the range assigned to your LAN, you need to reassign host addresses on your network.

CLIENT AND SERVERS


To use the services available on an Internet, application programs, running at two end computers and communicating with each other, are needed. In other words, in an Internet, the application programs are the entities that communicate with each other, not the computers or users.
The application programs using the Internet follow these client-server model strategies
1.An application program, called the client, running on the local machine, requests a service from another application program, called the server, running on the remote machine, Figure 2.12 illustrates this.

2.A server can provide a service for any client, not just a particular client. In other words, the client-server relationship is many-to-one. Many clients can use the services of one server.

3.Generally, a client program, which requests a service, should run only when it is needed. The server program, which provides a service, should run all of the time because it does not know when its service is needed.


4.Services needed frequently and by many users have specific client-server application programs. For example, we should have client-server application programs that allow users to access files, send e-mail, and so on. For services that are more customized, we should have one generic application program that allows users to access the services available on a remote computer.

Client

A client is a program running on the local machine requesting service from a server. A client program is finite, which means it is started by the user (or another application program) and terminates when the service is complete.

Server

A server is a program running on the remote machine providing service to the clients. When it starts, it opens the door for incoming requests from clients, but it never initiates a service until it is requested to do so.

A server program is an infinite program. When it starts, it runs infinitely unless a problem arises. It waits for incoming requests from clients. When a request arrives, it responds to the request.

How to Enable Google Webmasters Tools in blogspot


These are the simple tricks to enable google webmasters tools for blogger in blogspot:

1. Login to blogger with your google account
2. In the bottom of page, go to "Tools and Resources"
3. Click "Webmasters Tools"
4. Click "Enable Webmasters Tools" button
5. Now your blog already verified by google webmasters tools

I think this is the easiest way to verified blog in blogspot to google webmasters tools. We don't need to edit our HTML template, just click and click.

NETWORK PROTOCOLS


In computer networks, communication occurs between entities in different systems. An entity is anything capable of sending or receiving information. Examples include application programs, file transfer packages, browsers, database management systems, and electronic mail software.

A system, is a physical object that contains one or more entities, Examples include computers and terminals. But two entities cannot just send bit streams to each other and expect to be understood. For communication to occur, the entities must agree on a protocol. A protocol is a set of rules that govern data communication. A protocol defines what is communicated, how it is communicated, and when it is communicated. The key elements of a protocol are syntax, semantics, and timing.


Syntax
Syntax refers to the structure or format of the data, meaning the order in which they are presented. For example, a simple protocol might expect the first eight bits of data to be the address of the sender, the second eight bits to be the address of the receiver, and the rest of the stream to be the message itself.
Semantics

Semantics refers to the meaning of each section of bits. How is a particular pattern to be interpreted, and what action is to be taken based on that interpretation. For example, does an address identify the route to be taken or the final destination of the message?

Timing
Timing refers to two characteristics: when data should be sent and how fast they can be sent. For example, if a sender produces data at 100 Mbps but the receiver can process data at only 1 Mbps, the transmission will overload the receiver and data will be largely lost.
In data communication, a protocol is a set of rules that govern all aspects of information communication.

Protocols Example
There are a many standard protocols to choose from, standard protocols have their own advantage and disadvantage i.e., some are simpler than the others, some are more reliable, and some are faster.

From a user’s point of view, the only interesting aspect about protocols is that our computer or device must support the right ones if we want to communicate with other computers. The protocols can be implemented either in hardware or in software. Some of the popular protocols are:

1.TCP/IP
2.HTTP
3.FTP
4.SMTP
5.POP
6.Token-Ring
7.Ethernet
8.Xmodem
9.Kermit
10.MNP, etc.

Network Architectures


Ethernet is the most popular physical layer LAN technology in use today. Other LAN types include Token Ring, Fast Ethernet, Fiber Distributed Data Interface (FDDI), Asynchronous Transfer Mode (ATM) and LocalTalk. Ethernet is popular because it strikes a good balance between speed, cost and ease of installation. These benefits, combined with wide acceptance in the computer marketplace and the ability to support virtually all popular network protocols, make Ethernet an ideal networking technology for most computer users today.

The Institute for Electrical and Electronic Engineers (IEEE) defines the Ethernet standard as IEEE Standard 802.3. This standard defines rules for configuring an Ethernet network as well as specifying how elements in an Ethernet network interact with one another. By adhering to the IEEE standard, network equipment and network protocols can communicate efficiently.


Fast Ethernet

For Ethernet networks that need higher transmission speeds, the Fast Ethernet standard (IEEE 802.3u) has been established. This standard raises the Ethernet speed limit from 10 Megabits per second (Mbps) to 100 Mbps with only minimal changes to the existing cable structure.

There are three types of Fast Ethernet: 100BASE-TX for use with level 5 UTP cable, 100BASE-FX for use with fiber-optic cable, and 100BASE-T4 which utilizes an extra two wires for use with level 3 UTP cable. The 100BASE-TX standard has become the most popular due to its close compatibility with the 10BASE-T Ethernet standard. For the network manager, the incorporation of Fast Ethernet into an existing configuration presents a host of decisions.

Managers must determine the number of users in each site on the network that need the higher throughput, decide which segments of the backbone need to be reconfigured specifically for 100BASE-T and then choose the necessary hardware to connect the 100BASE-T segments with existing 10BASE-T segments. Gigabit Ethernet is a future technology that promises a migration path beyond Fast Ethernet so the next generation of networks will support even higher data transfer speeds.

Token Ring

Token Ring is another form of network configuration which differs from Ethernet in that all messages are transferred in a unidirectional manner along the ring at all times. Data is transmitted in tokens, which are passed along the ring and viewed by each device. When a device sees a message addressed to it, that device copies the message and then marks that message as being read. As the message makes its way along the ring, it eventually gets back to the sender who now notes that the message was received by the intended device. The sender can then remove the message and free that token for use by others.

Various PC vendors have been proponents of Token Ring networks at different times and thus these types of networks have been implemented in many organizations.

FDDI
FDDI (Fiber-Distributed Data Interface) is a standard for data transmission on fiber optic lines in a local area network that can extend in range up to 200 km (124 miles). The FDDI protocol is based on the token ring protocol. In addition to being large geographically, an FDDI local area network can support thousands of users.

Protocols:
Network protocols are standards that allow computers to communicate. A protocol defines how computers identify one another on a network, the form that the data should take in transit, and how this information is processed once it reaches its final destination. Protocols also define procedures for handling lost or damaged transmissions or "packets." TCP/IP (for UNIX, Windows NT, Windows 95 and other platforms), IPX (for Novell NetWare), DECnet (for networking Digital Equipment Corp. computers), AppleTalk (for Macintosh computers), and NetBIOS/NetBEUI (for LAN Manager and Windows NT networks) are the main types of network protocols in use today.

Although each network protocol is different, they all share the same physical cabling. This common method of accessing the physical network allows multiple protocols to peacefully coexist over the network media, and allows the builder of a network to use common hardware for a variety of protocols. This concept is known as "protocol independence,"

techiwarehouse.com

Basic Structure Of IP Addresses


IP (Internet Protocol) addresses are used to identify hosts on the campus Internet, a Cornell network that ties into the Internet, a global network. If the computer is attached to Cornell's network, it needs an IP address to be recognized as part of the campus Internet.

IP addresses are constructed according to a set of specific rules so that hosts on any part of the Internet can communicate with each other. This document describes IP addresses only as they apply to Cornell's campus network. (If you want to know more about Internet addressing, refer to Internetworking with TCP/IP: Principles, Protocols, and Architecture by Douglas Comer, Prentice Hall).

An IP address consists of a 32-bit binary number, which is typically presented as four decimal numbers (one for each 8-bit byte) separated by decimal points. For example, 128.253.21.58.


Internet addresses at Cornell have three parts:

* network address
* subnet address
* host address

When you configure a host for sub-subnetting, you are primarily concerned about the host address, but some understanding of the network address and subnet address is useful.

* Network Address
Cornell has four addresses for its backbone networks. They are 128.253.0.0, 128.84.0.0, 132.236.0.0, and 140.251.0.0. The latter is used only by the Cornell University College. These addresses are assigned to Cornell. Cornell cannot change the first two parts of each address, but is free to use the last two parts in any way it chooses in order to identify Local Area Networks (subnets) and hosts that are connected to the campus Internet.

* Subnet Address
The subnet address is the address given to your Local Area Network (LAN). Cornell's system provides for 254 LANs connected to each of the main networks. So, for example, if your LAN is identified on the network as 128.253.0.0, a possible subnet addresses (or LAN address) might be 128.253.21.0. The third number, 21, identifies the subnet.

* Host Address
The host address is the address given to the workstation, other computer, or device that is connected to the LAN. Cornell's system provides for 256 host addresses on each LAN. So, for example, if your host is identified on the LAN as 128.253.21.0 a possible host address is 128.253.21.58. The last number, 58, identifies the host.

Not all 256 numbers are available as host addresses on any given LAN. Zero (0) and 255 are reserved for broadcast purposes. (Hosts are set up to "grab" any message marked with their own address or a broadcast address; for example, if your host address is 128.253.21.58 and it "sees" a message addressed to 128.253.21.255, it will grab the message. In this way, hosts can send messages to large groups without having to know each address on their LAN.)

One (1) is reserved for the gateway/router that sits between the LAN and next network level. The numbers 2-5 are reserved by CIT for diagnostic and management use.