• Main Menu
  • Data Link Layer

    • Differences Between ISDN and DSL

      Differences Between ISDN and DSL

      Definitions Integrated Services Digital Network (ISDN): ISDN is a digital transmission system, which is used to transmit voice and data through copper telephone wires. In other words, it's a circuit-switched data transmission system that is used for voice and data transmission over the wire. Digital Subscriber Line (DSL): DSL is also a digital transmission system

    • Symmetric DSL

      Symmetric DSL

      Symmetric Digital Subscriber Line (SDSL) is a kind of one kind of Digital Subscriber Line (DSL) used to provide high-speed Internet connectivity. Symmetric DSL is called “symmetrical” because the upstream and downstream connections have the same bandwidth. SDSL maintains the same high speed in both directions while working over the existing “twisted-pair” cables that exist

    • ISDN BRI

      ISDN BRI

      ISDN BRI (Basic Rate Interface) is a standard Integrated Services Digital Network (ISDN) service meant for residential and small scale business Internet connections. There is another type of ISDN configuration called the Primary Rate Interface (PRI) that is designed to provide higher bandwidth. The BRI configuration defined in the physical layer standard I.430 produced by

    • ISDN (Integrated Services Digital Network)

      ISDN (Integrated Services Digital Network)

      ISDN (Integrated Services Digital Network) is a system of digital phone connections that has been designed for sending voice, video, and data simultaneously over digital or ordinary phone lines, with a much faster speed and higher quality than an analog system can provide. ISDN is basically a set of protocol for making and breaking circuit

    • Broadband over Power Lines

      Broadband over Power Lines

      Broadband over Power Lines, or BPL, refers to the transmission (sending and receiving) of digital data through existing power cables and electricity distribution infrastructures. This can be viewed as a mere variation on using television cables; instead of using television cables, though, power transmission lines are going to be used. The Broadband over Power Lines

    • MAC Addresses (Media Access Control)

      MAC Addresses (Media Access Control)

      A MAC address is an address that exists on Layer 2 of the OSI Model. Layer 2 of the OSI model is the Data Link Layer. The Data Link Layer consists of two sublayers, the Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sublayer controls how a network node

    • DOCSIS (Data Over Cable Service Interface Specification)

      DOCSIS (Data Over Cable Service Interface Specification)

      Data Over Cable Service Interface Specification (DOCSIS) defines the interface standards for cable modems and supporting equipment involved in high speed data transfer and distribution over cable television system networks. It permits additional high-speed data transfer over an existing cable TV system and is widely used by television operators to offer Internet access through an

    • Ethernet Splitter

      Ethernet Splitter

      An Ethernet splitter can split a single Internet connection so that two or more computers can connect to the Internet simultaneously. It can also create additional connections for other computers on a network, which can reduce the overall amount of cabling required to setup a network. Unfortunately, Ethernet splitters cannot resolve the network collision issues

    • 802.1p

      802.1p

      802.1p is an IEEE standard that describes mechanisms to prioritize traffic and perform dynamic multicast filtering. Because of its support for priority specification, 802.1p is important for providing Quality of Service (QoS) for better reliability and quality. Quality of Service QoS is a mechanism that allows for better handling of data that passes over a

    • VLAN Hopping

      VLAN Hopping

      VLAN Hopping is one of the primary VLAN based attacks used by hackers to infiltrate network security. VLAN hopping is used to attack a network by sending packets to a port which is generally not accessible. VLAN hopping attacks are mainly conducted in the Dynamic Trunking Protocol and, in some cases; the attacks are targeted

    129 queries in 0.414 seconds.