Network Troubleshooting Essay

This essay has a total of 1521 words and 8 pages.

Network Troubleshooting

Introduction
If you've ever been a network administrator, the call you dread the most might be one you
receive in the middle of the night by some panicked employee stating that a portion of
your critical network has gone down. What troubleshooting options are available to provide
answers to your network problem? Besides having a proactive helpdesk that can "read" the
mind of your network, an important part of troubleshooting involves using a network
protocol analyzer. If you've done your research, you realize that there are many choices
on the market today that may satisfy your needs but make a dent your company's pocket
book. Plus, you have to factor in training your helpdesk on how to use this new tool and
if it will provide some type of return on investment (ROI).

After conducting a thorough research of tools to analyze and troubleshoot a network, we
decided to use Ethereal. Many versions such a Snifferยฎ Portable by Network General and
Observerยฎ by Network Instruments provided more options but were only available in "demo"
versions and didn't provide full functionality. Since we wanted to use Tcpdump as one of
the tools in our network troubleshooting arsenal, it made sense to run Ethereal since it
supports this type of filter.

So, what is Ethereal?
Ethereal is a network analyzer. It has the ability to read packets from a network,
decipher them, and then display the results with a very intuitive GUI. According to the
book Ethereal Packet Sniffing, "the most important aspects of Ethereal are as follows:
that it is open source, actively maintained, and free". After conducting thorough
research, Ethereal also supports TcpDump format capture filters, supports over 700
protocols (new ones are added on a regular basis), and the tool can capture data from
Ethernet, Token Ring, 802.11 Wireless, etc. For anyone interested in a command line
interface (CLI) interface for Ethereal, you're in luck since there is a CLI available
called tethereal.

History of Ethereal
Ethereal is a fairly mature networking tool that was developed by Gerald Combs back in
1997, but has only been available to users since 1998. Something unique to this tool is
the numerous dissectors that are available. If you're like me, you may ask yourself, what
are dissectors? According to Brockmeier, they "are what allow Ethereal to decode
individual protocols and present them in readable format". Since the code is open source,
you will notice every few months that the list of supported protocols has increased due to
individual contributions to Ethereal. As you can see from the Linux open source software,
continued support will only improve the features and overall usability of any open source
tool.


Using Ethereal in Your Network
According to Brockmeier, network placement is critical for proper analysis and
troubleshooting. If you find yourself working at a large corporation, it's inevitable that
you will be working in multiple building, across campuses, throughout the country, and
perhaps overseas. It's vital when troubleshooting devices, to verify that you are on the
correct segment of the network. This will not only save time, but money since you can use
your resources more efficiently. It makes sense to have a laptop computer (with some type
of network analyzer installed) for troubleshooting network related issues, since not all
network related problems occur on the same subnet of your network. Figure 1 depicts a
basic network setup where you could use Ethereal to view protocol activity from router to
server, etc.



Figure 1


Compliments of Ethereal Packet Sniffing, 2004


What is TcpDump
To troubleshoot the network we also used a tool called TcpDump. TcpDump is a network
utility that listens to and records traffic on a network. TcpDump helps in solving
problems that can be found in the packet or frame level. By default, it puts the network
interface into promiscuous mode to capture every packet going across the wire. The user
can specify a large number of variables to help filter the data that is being captured.
TcpDump will automatically print the header information of each packet in a text format.
There are several tools that have been created to utilize TcpDump formatted documents.
O'Rielly's Network Troubleshooting Tools book lists several of these tools, "trafshow,
xplot, tcptrace, tcpshow, tcpslice, tcp-reduce, tcpflow, tcpdpriv, and sanitize." The
author also says this about the tools," One reason for using tcpdump is the wide variety
of support tools that are available for use with tcpdump or files created with tcpdump.
There are tools for sanitizing the data, tools for reformatting the data, and tools for
presenting and analyzing the data."
(www.hn.edu.cn/book/NetWork/NetworkingBookshelf_2ndEd/tshoot/)

The pcap library is used to read or write data in the raw format. Thus, it is easy to
write a program to read or write packets in the TcpDump format. For our needs we used the
pcap library that comes with Ethereal to analyze all the packets we captured.


Examples using TcpDump
As mentioned above there are many variables that the user can put into action to filter
and concentrate the data. Illustrated in Figure 2 is a basic TcpDump command line the -s
specifies the size of each packet to be recorded, the -c specifies the amount of packets
captured, and the -w tells it to write the packet information to a file. After executing
Continues for 4 more pages >>




  • HewlettPackard Strategy
    HewlettPackard Strategy Strategy Paper Hewlett Packard, Inc. (NYSE: HWP) TABLE OF CONTENTS SECTION 1 2 BACKGROUND 2 SECTION 2 2 MISSION, GOALS, AND STRATEGIES 2 Company Mission 2 Company Goals 2 Company Strategies 2 Management By Wandering Around. 2 Management By Objective. 2 Open-Door-Policy 2 Open Communication 2 SECTION 3 2 STAKEHOLDERS 2 Stockholders: 2 Employees: 2 Competition: 2 Major suppliers: 2 SECTION 4 2 EXTERNAL ENVIRONMENT 2 Industry Environment 2 Differentiation versus Commodity 2
  • Censorship
    Censorship The Internet is a wonderful place of entertainment and education but like all places used by millions of people, it has some murky corners people would prefer children not to explore. In the physical world society as a whole conspires to protect children, but there are no social or physical constraints to Internet surfing. The Internet Censorship Bill of 1995, also known as the Exon/Coats Communications Decency Act, has been introduced in the U.S. Congress. It would make it a criminal
  • Computer Viruses
    Computer Viruses Computer Viruses Introduction In the past decade, computer and networking technology has seen enormous growth. This growth however, has not come without a price. With the advent of the "Information Highway", as it’s coined, a new methodology in crime has been created. Electronic crime has been responsible for some of the most financially devastating victimizations in society. In the recent past, society has seen malicious editing of the Justice Department web page (1), unauthori
  • Computer Viruses1
    Computer Viruses1 Computer Viruses Essay written by Jeramiah Billings Introduction In the past decade, computer and networking technology has seen enormous growth. This growth however, has not come without a price. With the advent of the "Information Highway", as it\'s coined, a new methodology in crime has been created. Electronic crime has been responsible for some of the most financially devastating victimizations in society. In the recent past, society has seen malicious editing of the Justi
  • Contrast DOS to Unix
    Contrast DOS to Unix Compare and Contrast Microsoft DOS with UNIX Arthur Bennis Microcomputer Operating Systems CGS 1560 INTRODUCTION As is suggestive of its name, an operating system (OS) is a collection of programs that operate the personal computer (PC). Its primary purpose is to support programs that actually do the work one is interested in, and to allow competing programs to share the resources of the computer. However, the OS also controls the inner workings of the computer, acting as a t
  • DESIGNING A NETWORK
    DESIGNING A NETWORK I. STATEMENT & BACKGROUND The college of Business (COB) server is now being used to support deliver to the Computer Information System (CIS) department. The CIS professors would be using the server for various operations. Assignments, e-mail, and other types of information would be easier for the students to access. Network users are able to share files, printers and other resources; send electronic messages and run programs on other computers. However, certain important issu
  • Electronic Commerce
    Electronic Commerce Table of Contents Introduction…………………………………………………………………2 History of E-commerce……………………………………………………..4 Economic Impact……………………………………………………………5 Advantages of E-commerce…………………………………………………5 Disadvantages of E-commerce……………………………………………...7 The Future of E-commerce………………………………………………….9 Summary…………………………………………………………………...11 References………………………………………………………………….12 Electronic Commerce Electronic commerce, or e-commerce has developed very rapidly in the last few years and has left some
  • Government Censorship
    Government Censorship Thesis: Government Censorship would damage the atmosphere of the freedom to express ideas on the Internet; therefore, government should not encourage censorship. Introduction I. In the Internet community, there is a large volume of technical terms. For this reason, it is first necessary to examine the terminology specific to Internet. 1.The internet is a world wide computer network. 1.Electronic mail (email), which is one component of the Internet, approximates person to pe
  • Hacking a Art
    Hacking a Art In today\'s fast-paced world, the high-tech computer industry offers a unique opportunity for high-paying jobs. Many people start their careers much younger than I have, so consequently I have to search for a career in a field that will offer me adequate financial rewards in a limited amount of time. I started working with computers four years ago, upgrading systems, and increasing modem speeds to enable me access to the World Wide Web. I find programming to be the most interesting
  • How to design a network
    how to design a network I. STATEMENT & BACKGROUND The college of Business (COB) server is now being used to support deliver to the Computer Information System (CIS) department. The CIS professors would be using the server for various operations. Assignments, e-mail, and other types of information would be easier for the students to access. Network users are able to share files, printers and other resources; send electronic messages and run programs on other computers. However, certain important
  • Networking and Telecommunication Management
    Networking and Telecommunication Management Networking and Telecommunication Management “The AT&T long-distance networks crashes and millions of calls go unanswered. A computer hacker reprograms a switching station and calls to a Florida probation office are shunted to a New York phone-sex hotline. An illegal computer bulletin board publishes a pilfered BellSouth document on the 911 emergency system, which made it available to anyone who dials up”. The above incidents are described in Bruce Ster
  • Networking1
    Networking1 Design and Installation of Internal Network for the Air Force Base Computer Training Center CMIS 370 INTRODUCTION The Air Force Base Network Standardization and Evaluation Section is responsible for the training, licensing, and certifying of network professionals through the use of in-residence courses, computer based training (CBT), and formal task evaluations. There are 18 Network Control Center (NCC) personnel assigned to manage the backbone of the base network and over 40 system
  • None Provided1
    None Provided1 In today\'s fast-paced world, the high-tech computer industry offers a unique opportunity for high-paying jobs. Many people start their careers much younger than I have, so consequently I have to search for a career in a field that will offer me adequate financial rewards in a limited amount of time. I started working with computers four years ago, upgrading systems, and increasing modem speeds to enable me access to the World Wide Web. I find programming to be the most interestin
  • None Provided3
    None Provided3 ______________________________________________________________________ Untold Windows Tips and Secrets By Ankit Fadia ankit@bol.net.in _______________________________________________________________________ Welcome to another Hacking Truths Manual. This time I have a collection of Tips and Tricks which no body normally knows, the secrets which Microsoft is afraid to tell the people, the information which you will seldom find all gathered up and arranged in a single file. To fully
  • NT Server
    NT Server NT Server 4.0 study notes How do you move a PDC or a BDC to a new domain? Change the Domain Name System Policy Editor will allow you to restrict logon times - true or false? False What is the correct syntax to start a program such as Network Monitor with a low priority start /low netmon A local group is located in each computers account database Why would you run Win16 apps in a separate NTVDMS? To allow a Win16 app to interoperate with other apps in a separate memory space Will it min
  • Operating Systems
    Operating Systems Purpose The first thing I wanted to do for this project was to determine how the computer system I chose was going to be used. I wanted to purchase a personal computer system, with monitor and printer that I could use to do Web-based research. The research will be done out of my house. It will be primarily based on comparing different start-up companies to determine investments for the future. Since I determined that all my research was going to be over the Internet, it was imp
  • Oppertunities and challenges of the internet
    oppertunities and challenges of the internet Opportunities and Challenges of the Internet In a world of light-speed data transmission, any individual with little training and expertise can make a fortune from the Internet. Many companies, like E-bay or Amazon.com, thrive from business done only through Internet transactions. As computer technology progresses, data transmission becomes faster, and as high level encryption becomes available for public use, the amount of Internet consumers also gro
  • TCPIP Security
    TCPIP Security TCP/IP Security The TCP/IP protocols, the basis for today\'s Internet, lack even the most basic mechanisms for security, such as authentication or encryption. As usage of the Internet and TCP/IP protocols increases, their lack of built-in security has become more and more problematic. This paper describes a variety of basic flaws in TCP/IP protocols and their implementations, and discusses solutions and work-arounds to these problems. Also covered is the new IPv6, the next-generat
  • Windows Evolution
    Windows Evolution Microsoft: The Company It wouldnt be fair to talk about the Windows Operating System without first looking at the origins of the company that developed it. William H. Gates III and Paul Allen founded Microsoft in 1975. They were both only 19 years old. In 1980 International Business Machines Corporation (IBM) chose Microsoft to write the operating system for the IBM PC personal computer, to be introduced the following year. As part of its contract with IBM, Microsoft was permi
  • Windows NT
    Windows NT Windows NT Operating System Windows NT History. Since it was first released in 1993, Microsoft Windows NT Server has established itself as the network operating system (NOS) of choice for countless organizations of all sizes in private industry and public agencies. They have discovered that Windows NT Server is extremely reliable, highly scalable, and capable of handling the complex, mission-critical demands of even large Fortune 500 corporations. But the widespread adoption of Window
  • Wireless Technology
    Wireless Technology Wireless Technology applied to Computer Processing I. Abstract Wireless technology can provide many benefits to computing including faster response to queries, reduced time spent on paperwork, increased online time for users, just-in-time and real time control, tighter communications between clients and hosts. Wireless Computing is governed by two general forces: Technology, which provides a set of basic building blocks and User Applications, which determine a set of operatio
  • Prodigy
    prodigy ______________________________________________________________________ Untold Windows Tips and Secrets By Ankit Fadia ankit@bol.net.in _______________________________________________________________________ Welcome to another Hacking Truths Manual. This time I have a collection of Tips and Tricks which no body normally knows, the secrets which Microsoft is afraid to tell the people, the information which you will seldom find all gathered up and arranged in a single file. To fully reap th
  • Sun vs Microsoft
    Sun vs Microsoft Sun Microsystems, Inc. Introduction By 1998 Sun had become a global Fortune 500 leader in enterprise network computing with operations in 150 countries and generating billion in revenues. Sun’s competitors in the technical markets were primarily Intel, Hewlett-Packard (HP), International Business Machine (IBM), Compaq Computer Corporation (CPQ) and Silicon Graphics, Inc. (SGI). The information technology industry, the market for Sun’s services and products, was extremely comp
  • Ecommerce Market Study
    Ecommerce Market Study Prepared for: Paul Boray, MBA Prepared by: Pat Wilson June 10, 1999 Student Number: 100077846 Executive Summary The firms objectives can be met and a goahead is suggested subject to addressing the recommendations. Macrosegmentation of the market identified machinery, wood, base metals and plastics as target markets for the firm. Revenue expectation based on a 0.4% market share is 9,000. Break even is 9,000 and requires contributions from 17 customer projects at an
  • Annual report project
    annual report project 1. Company Information and History 1.Objective and core values The main objective of Motorola is to create shareholder value by continuing to be the world\'s premier electronic and communications equipment company from a creative, strategic and financial standpoint. Motorola supports its objectives with a set of core values. ท To anticipate and exceed the needs of its customers. ท To provide an environment for growth for the individual dedicated to professionalism and creat
  • Ecommerce1
    ecommerce1 With the astonishing growth of the Internet, many companies are finding new and exciting ways to expand upon their business opportunities. There are very few successful companies that do not use computers in their everyday business activities, which also means there are few companies that do not use e-commerce. To emphasize the point that the effect of the Internet is so widespread in today’s business communities, one online article stated that more than 100000 companies have Internet
  • Ecommerce2
    ecommerce2 With the astonishing growth of the Internet, many companies are finding new and exciting ways to expand upon their business opportunities. There are very few successful companies that do not use computers in their everyday business activities, which also means there are few companies that do not use e-commerce. To emphasize the point that the effect of the Internet is so widespread in today’s business communities, one online article stated that more than 100000 companies have Internet
  • Ecommerce3
    ecommerce3 E - Commerce: An Introduction With the astonishing growth of the Internet, many companies are finding new and exciting ways to expand upon their business opportunities. There are very few successful companies that do not use computers in their everyday business activities, which also means there are few companies that do not use e-commerce. To emphasize the point that the effect of the Internet is so widespread in today\'s business communities, one on-line article stated that "more th
  • Ecommerce4
    ecommerce4 Electronic Commerce Edward Caputo Many new and exciting business and purchasing opportunities are becoming available due to the phenomenal growth of the Internet and peoples interest to save time and money by purchasing goods via the web. If you think about all the companies that you know that don’t use computers for their everyday business than you either are stumped or just thought of one that will soon be forced to evolve or will soon go out of business. There are very few successf
  • Electronic commerce
    electronic commerce Electronic Commerce There are very few successful companies that do not use computers in their everyday business activities, which also means there are few companies that do not use e-commerce. To emphasize the point that the effect of the Internet is so widespread in today’s business communities, one online article stated that more than 100,000 companies have Internet addresses, and 20000 companies have home pages on the Internet as of February 1999 (DataQuest, 1999). These
  • How To Be a Hacker
    How To Be a Hacker How To Become A Hacker Why This Document? As editor of the Jargon File, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizard hacker?". Oddly enough there don\'t seem to be any FAQs or Web documents that address this vital question, so here\'s mine. If you are reading a snapshot of this document offline, the current version lives at http://www.tuxedo.org/esr/faqs/hacker-howto.html. What Is A Hacker? The Jargon File cont
  • Internet and Networking
    Internet and Networking In the 1960s, time-sharing brought about the first interactive access to computers. This was a mix of data transmission technology and a teletypewriter. The result was an interactive terminal. These terminals were connected to a server with low-speed lines, allowing the users to interact with the computer and take advantage of its resources. Time-sharing gave multiple users the ability to use the computer at the same time, for completely separate tasks, and provided them
  • Intro computing
    intro computing Introduction The relentless advance of IT and telecommunications systems has brought dramatic benefits to individuals, businesses and other organisations. These years, the world has developed into an information economy, and the applying of new technologies is at the centre of the activity. New technologies are being developed at a record pace. Those celebrities such as Bill Gates of Microsoft, Steven Jobs of Apple all emerged to create information technology dynasties for 1980s
  • Job Design and Staffing
    Job Design and Staffing Abstract The Analysis of Jobs A focus on jobs as important elements in organizational structures and information systems may help with investigation and evaluation of work and work experience. These notes/checklists are offered to aid examination of your own job from a self-development point of view. They may also help ท In projects that generally involve the design of jobs for an organization. ท Those involved in staff recruitment, training, employee appraisal and reward
  • Linux
    Linux Introduction ท TOPIC: Can Linux succeed in a Windows world? Linux is a Unix-language-based computer platform and is described as being slimmer, faster, more reliable and flexible than Windows and can better serve consumers and businesses. Is there any truth in the statements being made about this rival operating system? ท Brief history about the origins of Windows and Linux ท General functions of any operating system ท The capabilities of Windows and Linux and what requirements of an opera
  • Network
    network In today\'s world of technology the faulty security is becoming an almost incurable problem In today\'s world, there are several opportunities for the everyday user to breach security networks. The opportunities are endless for intrusions on networks. In 1997, thirty-five hackers hired by the National Security Agency launched several simulated attacks on the U.S electronic info-structure. The project was called Eligible Receiver and its main goal was to gain root level access to thirty-s
  • Network Security
    Network Security Network Security Network security, what is it? In today’s society not many people understand what network security is or how it works. As a person or as a network administrator you must understand the steps and processes of setting up a network security system. One of the first items that you have to come up with is an idea of why you want a network. Once you have figured this out you then have to secure many areas of the computer some of the areas include the securing of deskto
  • WIRELESS LOCAL AREA NETWORK WLAN
    WIRELESS LOCAL AREA NETWORK WLAN WIRELESS LOCAL AREA NETWORK (WLAN) 1. Introduction. A wireless LAN (WLAN) is a flexible data communication system implemented as an extension to, or as an alternative for, a wired LAN within a building or campus. Using electromagnetic waves, WLANs transmit and receive data over the air, minimizing the need for wired connections. Thus, WLANs combine data connectivity with user mobility, and, through simplified configuration, enable movable LANs. Over the last seve
  • Wireless Technology applied to Computer Processing
    Wireless Technology applied to Computer Processing Wireless Technology applied to Computer Processing Abstract Wireless technology can provide many benefits to computing including faster response to queries, reduced time spent on paperwork, increased online time for users, just-in-time and real time control, tighter communications between clients and hosts. Wireless Computing is governed by two general forces: Technology, which provides a set of basic building blocks and User Applications, which
  • E commerce
    E commerce Remember the time when there was no Internet? Where advances in telecommunications and computing largely occurred side-by-side in the past, today, they converge in the Internet. Timesharing, the concept of linking a large numbers of users to a single computer via remote terminals, was developed at MIT in the late 50s and early 60s. In 1973, Bob Kahn and Vint Cerf developed the basic ideas of the Internet. Now days almost everybody is connected to Internet. WORLD INTERNET CONNECTIVITY
  • History of the Internet
    History of the Internet The technology revolution is upon us. In the past there have been many triumphs in the world of technology. To this date, people are able to communicate over thousands of miles with the greatest of ease. The Internet connects nearly 400 million users worldwide and is an essential part of how we work, play, communicate, and conduct commerce. We use the Internet in ways that seemed unimaginable The term "Internet" refers to the global information system that -- (i) is logic
  • History of the Internet
    History of the Internet The technology revolution is upon us. In the past there have been many triumphs in the world of technology. To this date, people are able to communicate over thousands of miles with the greatest of ease. The Internet connects nearly 400 million users worldwide and is an essential part of how we work, play, communicate, and conduct commerce. We use the Internet in ways that seemed unimaginable The term "Internet" refers to the global information system that -- (i) is logic
  • Security
    Security Overview Security is the discipline of using effective protection measures to safeguard important assets from abuse. In other words, “security” is about protecting important things. Protection involves not just mechanisms (such as locks and doors), but also proper selection and use of mechanisms. Properly applied, the various disciplines of information security really come down to risk management that is not fundamentally different from risk management in other situations such as financ
  • Wireless Technology and Computers
    Wireless Technology and Computers Wireless Technology applied to Computer Processing Abstract Wireless technology can provide many benefits to computing including faster response to queries, reduced time spent on paperwork, increased online time for users, just-in-time and real time control, tighter communications between clients and hosts. Wireless Computing is governed by two general forces: Technology, which provides a set of basic building blocks and User Applications, which determine a set
  • Ecommerce
    Ecommerce E-Commerce Table of Contents I. E-Commerce: An Introduction II. History of E-Commerce III. Economic Impact IV. Advantages of E-Commerce V. Disadvantages of E-Commerce VI. The Future of E-Commerce E-Commerce กV An Introduction With the astonishing growth of the Internet, many companies are finding new and exciting ways to expand upon their business opportunities. There are very few successful companies that do not use computers in their everyday business activities, which also means th
  • Ecommerce
    Ecommerce E-Commerce Table of Contents I. E-Commerce: An Introduction II. History of E-Commerce III. Economic Impact IV. Advantages of E-Commerce V. Disadvantages of E-Commerce VI. The Future of E-Commerce E-Commerce กV An Introduction With the astonishing growth of the Internet, many companies are finding new and exciting ways to expand upon their business opportunities. There are very few successful companies that do not use computers in their everyday business activities, which also means th
  • Ecommerce
    Ecommerce E-Commerce Table of Contents I. E-Commerce: An Introduction II. History of E-Commerce III. Economic Impact IV. Advantages of E-Commerce V. Disadvantages of E-Commerce VI. The Future of E-Commerce E-Commerce กV An Introduction With the astonishing growth of the Internet, many companies are finding new and exciting ways to expand upon their business opportunities. There are very few successful companies that do not use computers in their everyday business activities, which also means th
  • Ecommerce
    Ecommerce E-Commerce Table of Contents I. E-Commerce: An Introduction II. History of E-Commerce III. Economic Impact IV. Advantages of E-Commerce V. Disadvantages of E-Commerce VI. The Future of E-Commerce E-Commerce กV An Introduction With the astonishing growth of the Internet, many companies are finding new and exciting ways to expand upon their business opportunities. There are very few successful companies that do not use computers in their everyday business activities, which also means th
  • HewlettPackard Strategy
    HewlettPackard Strategy Strategy Paper Hewlett Packard, Inc. (NYSE: HWP) TABLE OF CONTENTS SECTION 1 2 BACKGROUND 2 SECTION 2 2 MISSION, GOALS, AND STRATEGIES 2 Company Mission 2 Company Goals 2 Company Strategies 2 Management By Wandering Around. 2 Management By Objective. 2 Open-Door-Policy 2 Open Communication 2 SECTION 3 2 STAKEHOLDERS 2 Stockholders: 2 Employees: 2 Competition: 2 Major suppliers: 2 SECTION 4 2 EXTERNAL ENVIRONMENT 2 Industry Environment 2 Differentiation versus Commodity 2
  • Internet
    internet Emanuel HALAPCIUC Ruxandra ICA Internet-ul si (r)evolutia comunicatiilor Fac. Management, anul II, gr.126 Cuprins: ท Internetul – aparitie, scurt istoric ท E-business, afacerea sec. 21 ท Nevoia de viteza si noile tehnologii de comunicatie ท Mobilitate maxima: cu Internetul la plimbare ท Tendinte pentru viitorul apropiat ท Bibliografie Acum 4 decenii se lansa cu mare pompa primul satelit de comunicatii, Echo 1. La acea vreme, evenimentul capta atentia intregii lumi. Azi, lansarea unui s