Introduction Once Known Only to Researchers and True Hackers, The

Total Page:16

File Type:pdf, Size:1020Kb

Introduction Once Known Only to Researchers and True Hackers, The Introduction Once known only to researchers and true hackers, the TCP/IP stack of communications protocols has risen to prominence along with the explosion of the Internet and the World Wide Web. It seems every PC these days comes with dial-up protocol software for Net access, and every LAN and WAN has a gateway into the TCP/IP Internet world. Many companies and individuals are setting up Web servers on desktop computers using shareware or the latest commercial server software packages. The proliferation of computers accessing the public Internet is itself sufficient reason for network and information systems professionals to want to master the ins and outs of TCP/IP. An even more pressing reason, however, is the increasing use of private and public TCP/IP networks to link corporate networks into enterprise-wide, distributed computing and information systems. Mission-critical corporate applications require new levels of security, throughput, and reliability. As you'll see throughout this book, the TCP/IP protocol suite has been evolving to meet those challenges. There are new opportunities to exploit as well—technologies such as interactive multimedia conferencing and object- and component-based Java and ActiveX applications. These, too, place new demands on the network infrastructure. Inside this book, you'll find answers to many of the questions you might have about the TCP/IP stack. If you are new to packet-switched approaches, this book will help you master the concepts and architecture of a leading technology. If you've been working with TCP/IP-based networks, you will find useful information on recent extensions that support new forms of multimedia, multicasting, and multiple protocol/interoperable networks, along with enhanced addressing and security features. You'll also find out where to get more information and how to stay abreast of rapidly changing communications standards. Who This Book Is For This book is primarily aimed at readers who have advanced familiarity with networking, protocols, and administration. The advanced and expert user will find this a useful reference and an excellent introduction to the newest members of the TCP/IP protocol family. Less experienced readers will find that care has been taken to explain the usefulness and relevance of this material as an aid to mastering the rich layers of the TCP/IP protocol stack. It's an exciting time because networking technologies evolve rapidly. The authors of this book invite you to explore the TCP/IP Blueprints on which so much of today's newest advances are based. Conventions in This Book This book uses the following conventions: Tip: Tips indicate the author's simple and direct advice on how to do specific tasks better and easier. Note: Notes contain pertinent information that will help expand on the information in the text. Warning: Warnings let you know something you should watch out for. The information presented in these warnings could help save you from disaster. Program names are indicated in all uppercase. Screen messages and commands are shown in a monospaced type style like the command below: ROUTE PRINT Discussions of commands sometimes include variables that are shown in italicized monospace. You should substitute your command or statement where an italicized command or statement is shown. About the Authors First, I'd like to say thanks to the team at Sams Publishing who have prodded, pushed, cajoled, and obtained my output in good time and have managed to make it presentable to you, the reader. Also, I'd like to say a very big thank-you to my wife, who has tolerated the long days and longer nights and has supported and organized me. —Thomas Lee Robin Burk Robin Burk has over 25 years of experience in advanced software and communications technologies, having contributed to the development of packet-switched network software, multiple operating systems, and multimedia applications. After serving as a successful executive in entrepreneurial companies, she now consults on the software development and business use of the Internet. Robin's other passion is breeding and training show dogs. She moderates an e-mail list for English Cocker Spaniel fanciers, and she can be reached at [email protected]. Robin holds an undergraduate degree in Physics/Math and an MBA in finance and operations. Martin J. Bligh Martin J. Bligh is a communications specialist, working for Sequent Computer Systems in the United Kingdom. He has experience in planning, designing, and implementing networks, specializing in UNIX and Windows NT communications and LAN/WAN technologies. He holds a degree in Mathematics and Computing from Oxford University, England, and his interests include distributed operating systems, the application of neural networks, and playing the game of Go. He can be contacted via e-mail at [email protected]. Thomas Lee Thomas Lee is a computer consultant and educator living in the United Kingdom. He has been working with Windows NT since 1993. Educated at Carnegie Mellon University in the United States, he worked on two successful operating systems projects (Comshare's Commander II and ICL's VME) before joining Andersen Consulting in 1981. Thomas founded PS Partnership, a Microsoft Solutions Provider, in 1987, and today is a partner. He is a Fellow of the British Computer Society as well as an MCSE, MCT, and MVP. You can contact Thomas at [email protected]. Richard J. Maring Richard J. Maring is a Senior Programmer/Analyst for the National Association of Securities Dealers (NASD). He is currently tasked with the design and development of an enterprise-scale, Web-based OLAP solution for the internal Executive Information System. He is also a freelance Microsoft Certified Trainer, specializing in all 32-bit Microsoft operating systems. His extensive background includes LAN/MAN/WAN construction, capacity planning, performance tuning, database design, and system development/integration, as well as extensive experience in project management/budgeting. Richard has recently been acquired by Microsoft to serve in their elite Internet Infrastructure and Architecture division as the Site Architect and QA Manager for all microsoft.com Web sites throughout the world. He can be reached via e-mail at [email protected]. Christopher Fisher Christopher Fisher has a B.S. in Anthropology and Computer Science from Trent University and an MBA specialized in MIS from McMaster University. He currently works as a Technology Specialist for a major Canadian bank. Mark Vevers Mark Vevers is a consultant for Research Machines PLc in the United Kingdom, which designs and delivers high-performance networks to the education sector, specializing in IP network design and LAN/WAN connectivity. Mark was educated at Oxford University, England, and holds a Masters degree in Engineering and Computing Science. His background includes UNIX/Windows NT cross-network backup and mass data storage technologies. His other interests include robotics and fast motorcycles. Mark can be reached via e-mail at [email protected]. Acknowledgments Special thanks to Roger for support and grocery shopping. Also to the Laurelwood English Cockers, who intuitively understand how to negotiate a communications session (beg), allocate resources (if it's on the counter, it's ours!), and travel in encapsulated cells (show crates) over broadband highway networks. Thanks, also, to Stephen P. Kowalchuk, who provided an IS manager and practicing network administrator's point of view. —Robin Burk Tell Us What You Think! As a reader, you are the most important critic and commentator of our books. We value your opinion and want to know what we're doing right, what we could do better, what areas you'd like to see us publish in, and any other words of wisdom you're willing to pass our way. You can help us make strong books that meet your needs and give you the computer guidance you require. NOTE: If you have a technical question about this book, call the technical support line at (317)581-3833. Do you have access to CompuServe or the World Wide Web? Then check out our CompuServe forum by typing GO SAMS at any prompt. If you prefer the World Wide Web, check out our site at http://www.mcp.com. As the publishing manager of the group that created this book, I welcome your comments. You can fax, e-mail, or write me directly to let me know what you did or didn't like about this book—as well as what we can do to make our books stronger. Here's the information: Fax: (317) 581-4669 E-mail: [email protected] Mail: Dean Miller Sams Publishing 201 W. 103rd Street Indianapolis, IN 46290 Part I Introduction Chapter 1 Introduction to TCP/IP by Robin Burk 1.1. The History of TCP/IP 1.2. The TCP/IP Protocol Stack 1.3. The Internet Protocol 1.4. Client/Server Relationships in TCP/IP Networks 1.5. Who's in Control Around Here? 1.6. Summary The Transmission Control Protocol and the Internet Protocol are the key data communication mechanisms that underlie the Internet and, in a quiet way, have enabled its rapid growth. In actuality, TCP/IP means more than just these two protocols. As you'll see throughout the book, the TCP/IP protocol suite is a rich, open, and flexible facility that continues to evolve by adapting to new hardware, software, and application environments. It is this adaptability, along with the accessibility of the World Wide Web, which has led to increasing use of the Internet and TCP/IP–based intranets and extranets, by incorporating MIS groups previously wed to stable, vendor-proprietary networks. Inside these chapter you'll find answers to many of the questions you might have about the TCP/IP stack. If you are new to packet-switched approaches, this book will help you master the concepts and architecture of a leading technology.
Recommended publications
  • Cisco IOS Appletalk Configuration Guide Release 12.4
    Cisco IOS AppleTalk Configuration Guide Release 12.4 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 Customer Order Number: DOC-7817505= Text Part Number: 78-17505-01 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Local Infrastructures for School Networking: Current Models and Prospects
    DOCUMENT RESUME ED 349 957 IR 015 693 AUTHOR Newman, Denis; And Others _TITLE Local Infrastructures for School Networking: Current Models and Prospects. Technical Report No. 22. INSTITUTION Center for Technology in Education, New York, NY. SPONS AGENCY Department of Education, Washington, DC.; National Science Foundation, Washington, D.C. PUB DATE May 92 CONTRACT 1-135562167-Al; MDR-9154006 NOTE 30p. PUB TYPE Information Analyses (070) Viewpoints (Opinion/Position Papers, Essays, etc.) (120) EDRS PRICE MF01/PCO" Plus Postage. DESCRIPTORS Communications; Comparative Analysis; *Computer Networks; Educational Change; Educational Technology; Elementary Secondary Education; *Futures (of Society); Information Networks; *Local Area Networks; Microcomputers; *Models; *Telecommunications IDENTIFIERS *Wide Area Networks ABSTRACT This paper identifies a paradigm shift that must take place in school networking. The ultimate goal is to retool the schools with a local technical infrastructure that gives teachersand students immediate access to communication systems andinformation resources, thereby supporting the implementation of advancesin pedagogy and educational technology. The current notionof telecomputing cannot address the information requirements locally within the school and, ultimately, will fragment and inhibit any move toward universal access to information resources. A technologyis needed that combines local and wide area networking(LAN and WAN), making access to remote resources part of the everyday work with school computers. This report contains the following sections: (1) The Problem: Combining Local and Wide Area Communication--facts about the current state of school networks and the dissociation of school LANs and WANs;(2) A Brief History of Network Technology;(3) A Convergence of School LAN's and WAN's--integrating and simplifying a school internetwork;(4) Current Models of School LAN-WAN Connectivity--a comparison of six models; and (5) Prospects for the Future.
    [Show full text]
  • GOLDBERG, GODLES, WIENER & WRIGHT April 22, 2008
    LAW OFFICES GOLDBERG, GODLES, WIENER & WRIGHT 1229 NINETEENTH STREET, N.W. WASHINGTON, D.C. 20036 HENRY GOLDBERG (202) 429-4900 JOSEPH A. GODLES TELECOPIER: JONATHAN L. WIENER (202) 429-4912 LAURA A. STEFANI [email protected] DEVENDRA (“DAVE”) KUMAR HENRIETTA WRIGHT THOMAS G. GHERARDI, P.C. COUNSEL THOMAS S. TYCZ* SENIOR POLICY ADVISOR *NOT AN ATTORNEY April 22, 2008 ELECTRONIC FILING Marlene H. Dortch, Secretary Federal Communications Commission 445 12th Street, SW Washington, DC 20554 Re: Broadband Industry Practices, WC Docket No. 07-52 Dear Ms. Dortch: On April 21, on behalf of Vuze, Inc. (“Vuze”), the undersigned e-mailed the attached material to Aaron Goldberger and Ian Dillner, both legal advisors to Chairman Kevin J. Martin. The material reflects the results of a recent study conducted by Vuze, in which Vuze created and made available to its users a software plug-in that measures the rate at which network communications are being interrupted by reset messages. The Vuze plug-in measures all network interruptions, and cannot differentiate between reset activity occurring in the ordinary course and reset activity that is artificially interposed by a network operator. While Vuze, therefore, has drawn no firm conclusions from its network monitoring study, it believes the results are significant enough to raise them with network operators and commence a dialog regarding their network management practices. Accordingly, Vuze has sent the attached letters to four of the network operators whose rate of reset activity appeared to be higher than that of many others. While Vuze continues to believe that Commission involvement in this Marlene H.
    [Show full text]
  • The Internet Companion, 2Nd Edition
    The Internet Companion, 2nd edition The Internet Companion A Beginner's Guide to Global Networking (2nd edition) by Tracy LaQuey The OBS is pleased to present our free, "distributive" full-text HTML version of the second edition of this bestselling title, linked to resources around the world. As with all our distributive publications, we invite you to browse, comment, and send in your link suggestions. We are also pleased to offer paths to a sibling version of the Internet Companion, produced as a class project at the University of North Carolina. This use of online files points the way to a new form of reading and publishing on the Net: true interactivity where the students or readers can affect a book's content by finding, choosing, and implementing links for it. About the Internet Companion What World Media is Saying About the Internet Companion About Tracy LaQuey Copyright The Internet Companion at the University of North Carolina Buy this Book http://www.obs-us.com/obs/english/books/editinc/top.htm (1 of 3) [5/1/1999 11:46:04 PM] The Internet Companion, 2nd edition Contents Front Matter Foreword Preface Chapter 1 What Is the Internet and Why Should You Know About It? Whence It Came It Keeps Going and Going . The Equalizer Peeling Back the Layers: Differences between Networks Convergence: A Traffic Circle on the Information Highway Mrs. Smith Connects to Washington Business Use Backing Out of the Driveway The Future Chapter 2 Internet: The Lowdown A Network of Networks In the Beginning How Computers Talk Who Runs the Internet? Acceptable
    [Show full text]
  • Emerging Internet Oligopolies: a Political Economy Analysis
    Michele Javary and Robin Mansell Emerging internet oligopolies: a political economy analysis Book section Original citation: Originally published in Mansell, Robin and Javary, Michele (2002) Emerging internet oligopolies: a political economy analysis. In: Miller, Edythe S. and Samuels, Warren J., (eds.) An Institutionalist Approach to Public Utilities Regulation. Michigan State University Press, East Lansing, Michigan, pp. 162-201. ISBN 9780870136245 © 2002 Michigan State University Press This version available at: http://eprints.lse.ac.uk/10442/ Available in LSE Research Online: August 2014 LSE has developed LSE Research Online so that users may access research output of the School. Copyright © and Moral Rights for the papers on this site are retained by the individual authors and/or other copyright owners. Users may download and/or print one copy of any article(s) in LSE Research Online to facilitate their private study or for non-commercial research. You may not engage in further distribution of the material or use it for any profit-making activities or any commercial gain. You may freely distribute the URL (http://eprints.lse.ac.uk) of the LSE Research Online website. This document is the author’s submitted version of the book section. There may be differences between this version and the published version. You are advised to consult the publisher’s version if you wish to cite from it. 3vTrebrw.doc 20/08/2014 1:58 PM Emerging Internet Oligopolies: A Political Economy Analysis by Michele Javary and Robin Mansell * SPRU - Science and Technology Policy Research University of Sussex, Falmer, Brighton, East Sussex BN1 9RF, UK Email: [email protected]; [email protected] First Draft - Not for citation or distribution without the authors’ permission Chapter prepared for a volume of essays honoring Harry M Trebing, edited by Warren J Samuels and Edythe Miller, forthcoming Michigan State University Press, 2000.
    [Show full text]
  • Setting up Your Gatorbox Lv July 1991 Tt
    ® 11lis manual describes how to set up and connect the GatorBox network gateway and how to download its software. Tllis manual, taken together with the 2.0 version of the GatorBox User's Guide and the GatorBox Reference, completely replaces previous versions of the GatorBox documentation. Changes to this manual will be distributed as document updates or new revisions. Your comments about this manual are welcome. Use the forms at the back of the manual or address your comments to: Technical Services Cayman Systems 26 Landsdowne Street Cambridge, MA 02139 Telephone: (617) 494-1999 (9:00AM to 6:00PM EST) FAX: (617) 494-5167 Internet: [email protected] AppleLink: CAYMAN.TECH GatorBox, Cayman Systems, and the Cayman logo are registered trademarks of Cayman Systems, Inc. GatorKeeper, GatorMIM, GatorSystem, GatorPrint, and GatorShare are trademarks of Cayman Systems, Inc. Apple, the Apple logo, AppleLink, AppleTalk, A/lJX, LaserWriter, and Macintosh are registered trademarks of Apple Computer, Inc. EtherTalk, Finder, and Loca!Talk are trademarks of Apple Computer, Inc. UNIX is a registered trademark of American Telephone and Telegraph Company. Ethernet is a registered trademark of Xerox Corporation. NCSA Telnet is a trademark of the Board of Trustees of the University of Illinois at Champaign-Urbana. NFS and Sun are trademarks of Sun Microsystems, Inc. PhoneNET is a trademark of Farallon Computing. MMAC is a trademark of Cabletron Systems, Inc. Changes or modifications to the GatorBox not expressly approved by Cayman Systems can void your authorization to operate the equipment. FCC Class Notice TI1is equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules.
    [Show full text]
  • Network Working Group J. Reynolds Request for Comments: 1700 J
    Network Working Group J. Reynolds Request for Comments: 1700 J. Postel STD: 2 ISI Obsoletes RFCs: 1340, 1060, 1010, 990, 960, October 1994 943, 923, 900, 870, 820, 790, 776, 770, 762, 758,755, 750, 739, 604, 503, 433, 349 Obsoletes IENs: 127, 117, 93 Category: Standards Track ASSIGNED NUMBERS Status of this Memo This memo is a status report on the parameters (i.e., numbers and keywords) used in protocols in the Internet community. Distribution of this memo is unlimited. OVERVIEW This RFC is a snapshot of the ongoing process of the assignment of protocol parameters for the Internet protocol suite. To make the current information readily available the assignments are kept up-to- date in a set of online text files. This RFC has been assembled by catinating these files together with a minimum of formatting "glue". The authors appologize for the somewhat rougher formatting and style than is typical of most RFCs. We expect that various readers will notice specific items that should be corrected. Please send any specific corrections via email to <[email protected]>. Reynolds & Postel [Page 1] RFC 1700 Assigned Numbers October 1994 INTRODUCTION The files in this directory document the currently assigned values for several series of numbers used in network protocol implementations. ftp://ftp.isi.edu/in-notes/iana/assignments The Internet Assigned Numbers Authority (IANA) is the central coordinator for the assignment of unique parameter values for Internet protocols. The IANA is chartered by the Internet Society (ISOC) and the Federal Network Council (FNC) to act as the clearinghouse to assign and coordinate the use of numerous Internet protocol parameters.
    [Show full text]
  • Internet Trends 1995
    Internet Trends 1995 Mary Meeker February 1996 MORGAN STANLEY U.S. Investment Research February 1996 Mary Meeker (212) 761-8042 / [email protected] Technology/New Media Chris DePuy (212) 761-6562 / [email protected] The Internet Report Morgan Stanley Global Technology Group: Other Contributors: Data Networking: George Kelly Economist: Steve Roach PC Software/Hardware & New Media: Mary Meeker Publishing: Doug Arthur Enterprise Software: Chuck Phillips Telecommunications Services: Stephanie Comfort Server Hardware: Steve Milunovich Cable Television: Rich Bilotti Telecommunications Equipment: Neil Danzger Financial Services: David Hilder Computer Services: Mark Wolfenberger Emerging Growth: Mike Sorell Semiconductors: Alan Rieper Semi. Equip., Wireless & Peripherals: Robert Maire Design Software: Alkesh Shah Distribution: Shelby Fleck Cross Industry: Bob Austrian European Technology: Angela Dean Japanese Technology: Takatoshi Yamamoto Japanese Technology: Mitsuko Morita Japanese Technology: Noriko Oki Asia/Pacific Electronics: Richard Wei This memorandum is based on information available to the public. No representation is made that it is accurate or complete. This memorandum is not an offer to buy or sell or a solicitation of an offer to buy or sell the securities mentioned. Morgan Stanley & Co. Inc. and others associated with it may have positions in and effect transactions in securities of companies mentioned and may also perform or seek to perform investment banking services for those companies. MORGAN STANLEY Acknowledgments The authors would like to thank the individuals who helped Morgan Stanley's Technology investment banking team has make this book possible. A report of this scope would not also been critical in helping us uncover emerging have been possible without a lot of hard work and a lot of companies in all areas of technology, most recently related support from many people.
    [Show full text]
  • 1700 J. Postel
    Network Working Group J. Reynolds Request for Comments: 1700 J. Postel STD: 2 ISI Obsoletes RFCs: 1340, 1060, 1010, 990, 960, October 1994 943, 923, 900, 870, 820, 790, 776, 770, 762, 758,755, 750, 739, 604, 503, 433, 349 Obsoletes IENs: 127, 117, 93 Category: Standards Track ASSIGNED NUMBERS Status of this Memo This memo is a status report on the parameters (i.e., numbers and keywords) used in protocols in the Internet community. Distribution of this memo is unlimited. OVERVIEW This RFC is a snapshot of the ongoing process of the assignment of protocol parameters for the Internet protocol suite. To make the current information readily available the assignments are kept up-to- date in a set of online text files. This RFC has been assembled by catinating these files together with a minimum of formatting "glue". The authors appologize for the somewhat rougher formatting and style than is typical of most RFCs. We expect that various readers will notice specific items that should be corrected. Please send any specific corrections via email to <[email protected]>. Reynolds & Postel [Page 1] RFC 1700 Assigned Numbers October 1994 INTRODUCTION The files in this directory document the currently assigned values for several series of numbers used in network protocol implementations. ftp://ftp.isi.edu/in-notes/iana/assignments The Internet Assigned Numbers Authority (IANA) is the central coordinator for the assignment of unique parameter values for Internet protocols. The IANA is chartered by the Internet Society (ISOC) and the Federal Network Council (FNC) to act as the clearinghouse to assign and coordinate the use of numerous Internet protocol parameters.
    [Show full text]
  • THUS Group Plc Plc THUS Group THUS Group Plc Annual Report 2008 Annual Report Annual Report 2008
    THUS GroupTHUS plc www.thus.net THUS Group plc Annual ReportAnnual 2008 Annual Report 2008 THUS Group plc 1-2 Berkeley Square 99 Berkeley Street Glasgow G3 7HR THUS Group plc Annual Report 2008 THUS Group plc delivers advanced Ancillary Information: Shareholder and Contact Information telecommunication services to large business customers and public sector Analysis of shareholders (as at 31 March 2008) Share dealing < THUS Group’s shares may be bought or sold at competitive rates. For further details, organisations throughout the UK. Number of Numbers please contact Stocktrade on 0845 601 0995, quoting LOWC0078. Alternatively, Range of holdings shareholders of shares please contact Equiniti on 0871 384 2020 or at www.shareview.co.uk. 73 1–100 287,526 5,402,914 It tailors these services to suit small 101–200 12,694 1,790,592 201–600 8,003 2,793,030 ShareGift and mid-sized businesses through 601–1,000 1,950 1,601,597 ShareGift is an independent registered charity which provides a free service for 1,001–5,000 2,208 4,475,093 shareholders wishing to give small holdings of shares to benefit charitable causes. 5,001–100,000 479 9,227,462 It may be especially useful for those who wish to dispose of a small parcel of shares its Demon branded product range. 100,001 and above 120 157,741,679 which would cost more to sell than they are worth. There are no capital gains tax implications on gifts of shares to charity and it is also possible to obtain income tax relief.
    [Show full text]
  • Network Protocols Configuration Guide, Part 2 Cisco
    NETWORK PROTOCOLS CONFIGURATION GUIDE PART Cisco lOS Release 113 APPLETALK NOVELL IPX Documentation also available on CD-ROM and the World Wide Web Network Protocols Configuration Guide Part Cisco lOS Release 11.3 AppleTalk Novell IPX Corporate Headquarters Cisco Systems Inc 170 West Tasman Drive San Jose CA 95134-1706 USA http//wwwcisco.com Tel 408 526-4000 800 553-NETS 6387 Fax 408 526-4100 Customer Order Number DOCNPCG2-1 1.3 Text Part Number 78-4737-01 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE ALL STATEMENTS INFORMATION AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND EXPRESS OR IMPLIED USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY CONTACT YOUR CISCO REPRESENTATIVE FOR COPY Class devices This has been tested and found to with the limits for Class The following information is for FCC compliance of equipment comply when the to 15 of the FCC rules These limits are designed to provide reasonable protection against harmful interference digital device pursuant part This and can radiate and if not installed and used equipment is operated in commercial environment equipment generates uses radio-frequency energy radio communications of
    [Show full text]
  • VPOP3 Your Email Post Office User Manual
    VPOP3 Your email post office User Manual VPOP3 – Your email post office Copyright Statement This manual is proprietary information of Paul Smith Computer Services and is not to be copied, reproduced, lent or disposed of, nor used for any purpose other than for which it is specifically provided without the written permission of Paul Smith Computer Services. The software described in this document is supplied under a license and may be used or copied only in accordance with the terms of such license, and in particular any warranty of fitness of Paul Smith Computer Services software products for any particular purpose is expressly excluded and in no event will Paul Smith Computer Services be liable for any consequential loss. Because of the nature of this material, hardware and software products may be mentioned by name. In most, if not all, cases, these product names are claimed as trademarks by the companies that manufacture the products. It is not our intention to claim these names or trademarks as our own. All rights reserved. v1.3.0 doc release 0.3 © 1999 Paul Smith Computer Services. Page 2 User Manual v 1.3.0 May 1999 VPOP3 – Your email post office Contents Copyright Statement .............................................................................................................2 Contents 3 Introduction to VPOP3 9 VPOP3’s many other features... .......................................................................................... 10 VPOP3 Requirements...........................................................................................................
    [Show full text]