• Main Menu
  • Networking

    • How to Add a Printer to a Wireless Network

      How to Add a Printer to a Wireless Network

      If you want to add a printer to a wireless network, you need to: 1) Ensure that the printer has at least one USB port. 2) Purchase a wireless adapter and connect it to the printer’s USB port. Since wireless adapters work on Plug-and-Play technology, the printer should automatically detect it and begin installing all

    • Mi-Fi

      Mi-Fi

      While Novatel Wireless has copyrighted to name MiFi, it has gone on to mean so much more. Mi-Fi literally stands for my-wifi. In other words, it is a personal credit card shaped piece of hardware that acts as a personal WiFi hot spot for you and a few other computers that you allow onto the

    • 802.11i

      802.11i

      The 802.11i wireless standard was released by the IEEE on June of 2004 and implements improved encryption for wireless networks than realized on past standards released. Commonly referred to as the WPA2 implementation, the 802.11i implementation requires newer encryption standards than seen with the WEP implementation by requiring TKIP (Temporal Key Integrity Protocol) and AES

    • What is VLSM?

      What is VLSM?

      VLSM (Variable Length Subnet Mask) is a technique that network administrators employ in order to use their IP subnet(s) in a more effective manner. By using VLSM, a long mask can be used on a network that has a few hosts and a short net mask on subnets that have a large number of hosts.

    • IP Access Lists

      IP Access Lists

      Access lists are used to control and manage access of interesting and non interesting traffic. Access lists are powerful tools for controlling access both to and from network segments. They can filter uninteresting packets and be used to implement security policies. Using the right combination of access lists, network managers will be armed with the

    • How to Reset a Netgear Router

      How to Reset a Netgear Router

      Netgear routers are some of the most popular routers in the world, providing both residential and commercial users with wireless networks that are accessible from a wide variety of mobile devices such as laptops, tablets, smartphones, and even desktop computers that are outfitted with a wireless adapter (which Netgear also sells). Netgear routers are available

    • How to Network Two Computers

      How to Network Two Computers

      Computers are the basis for both modern technology and modern society. The world of today thrives on information and getting that information from one place to another is crucial to survival. Even in one’s own home, multiple computers must be able to communicate with one another and other devices. This may seem like a daunting

    • What Are Computer Networking Tools?

      What Are Computer Networking Tools?

      A computer networking tool is any type of software that assists in the creation, maintenance, or distribution of a wireless network. Also, computer networking tools aid in a website’s creation, maintenance, advertising, security, and modification. They are responsible for the maintenance of local area networks, especially in situations that involve dozens or hundreds of computers

    • UTP (Unshielded Twisted Pair)

      UTP (Unshielded Twisted Pair)

      UTP (Unshielded Twisted Pair) is a regular copper wire that joins many home and many business computers to the telephone company. UTP is the most common form of twisted pair wiring, because it is less expensive and easier to work with than STP (Shielded Twisted Pair). It is used in Ethernet 10Base-T and 100Base-T networks

    • Cisco Network Management

      Cisco Network Management

      Cisco Network Management Overview of Network Management Different people may take network management as different meanings. It may be considered as solitary network consultant for monitoring network activity using outdated protocol analyzer. While network management in distributed database environment, managing network nodes for generating real time graphics and auto polling of network devices. There are

    networking
    445 queries in 0.505 seconds.