• Main Menu
  • Networking

    • Ethernet Crossover Cable

      Ethernet Crossover Cable

      An Ethernet crossover cable can be used to directly connect two network devices through Ethernet. These can either be single computers or they can be networks. Ethernet crossover cables are commonly used for temporarily networking two devices in the absence of a network router, switch, or hub. The principle is the same, but the connection

    • Port Forwarding

      Port Forwarding

      Port forwarding, also known as tunneling, is basically forwarding a network port from one node to the other. This forwarding technique allows an outside user to access a certain port (in a LAN) through a NAT (network address translation) enabled router. Advantages of Port Forwarding Port forwarding basically allows an outside computer to connect to

    • Ethernet Fiber Media Converter

      Ethernet Fiber Media Converter

      An Ethernet fiber media converter is a device that allows a connection to be made between an Ethernet and a fiber optic cable. This type of connection is important in situations where both cable types are used in a single household or office. Because telephone companies often use fiber optic cables to deliver telephone and

    • Interior Gateway Routing Protocol

      Interior Gateway Routing Protocol

      The Interior Gateway Routing Protocol (IGRP) is a network routing protocol that is designed to enable routing inside of an Autonomous System (AS). Cisco developed this protocol in the late 1980s in response to the existing Routing Information Protocol’s (RIP) shortcomings. As Cisco routers became more popular, a number of large networks began using IGRP,

    • Ethernet Isolator

      Ethernet Isolator

      An Ethernet or network isolator is a type of galvanic isolator used in copper-based Ethernet systems. It protects devices and users from possible differences in ground potentials of the voltages in two or more different circuits or circuit components. Ethernet isolators depend on electromagnetic induction to bridge a physical isolation gap within Ethernet systems and

    • CSMA/CD


      CSMA/CD (Carrier Sense Multiple Access / Collision Detection) is the protocol used in Ethernet networks to ensure that only one network node is transmitting on the network wire at any one time. Carrier Sense means that every Ethernet device listens to the Ethernet wire before it attempts to transmit. If the Ethernet device senses that

    • Responding to Network Attacks and Security Incidents

      Responding to Network Attacks and Security Incidents

      Network Attacks Review A network attack occurs when an attacker or hacker uses certain methods or technologies to maliciously attempt to compromise the security of a network. Hackers attack corporate networks to use data for financial gain or for industrial espionage, to illegally use user accounts and privileges, to run code to damage and corrupt

    • How to Use Telnet

      How to Use Telnet

      Telnet is a utility program that allows remote access to other computers if they are installed on a network or have access to the Internet. Telnet lets users run commands on the remote computer. It can execute commands faster than the Web and other popular remote computer access applications. Telnet is not widely used as

    • Distance Vector Routing Protocol

      Distance Vector Routing Protocol

      Routing Protocols Whenever different networks connect with each other to communicate and to share the data and resources, it is called internetworking. For internetworking, routers must be used on each network or at backbone to route the packets. To route a packet, a router needs to know: Destination Addresses Sources it can learn from Possible

    • WiFi Signal Strength Meter

      WiFi Signal Strength Meter

      Windows and other operating systems have a WiFi signal strength meter, but this is usually basic software and does not really tell the user much about the wireless signal. Fortunately, there are many other programs that do the same thing, but show the user more details about the wireless connection. We will describe some of

    445 queries in 0.558 seconds.