• Main Menu
  • Networking

    • FTP (File Transfer Protocol)

      FTP (File Transfer Protocol)

      FTP (File Transfer Protocol) is the generic term for a group of computer programs aimed at facilitating the transfer of files or data from one computer to another. It originated in the Massachusetts Institute of Technology (MIT) in the early 1970s when mainframes, dumb terminals and time-sharing were the standard. Although the FTP programs have

    • Intrusion Detection System (IDS)

      Intrusion Detection System (IDS)

      Consumers commonly mistake an intrusion detection system (IDS)with a computer firewall. Although both applications have a similar goal to protect end-users from nefarious hackers and computer malware, an IDS differs from a firewall in that it can be either a device or software program created to monitor an individual computer, computing device, or network for

    • Frame vs Packet

      Frame vs Packet

      A packet and a frame are both packages of data moving through a network. A packet exists at Layer 3 of the OSI Model, whereas a frame exists at Layer 2 of the OSI Model. Layer 2 is the Data Link Layer. The best known Data Link Layer protocol is Ethernet. Layer 3 is the

    • W-CDMA (Wideband Code Division Multiple Access)

      W-CDMA (Wideband Code Division Multiple Access)

      WCDMA (Wideband Code Division Multiple Access) is the radio access scheme used for third generation cellular systems that are being rolled out in various parts of the globe. The 3G systems support wide band services like high speed Internet access and video and high quality image transmission with the same quality as the fixed networks.

    • QoS (Quality of Service)

      QoS (Quality of Service)

      QoS stands for Quality of Service. QoS is a generic name for a set of algorithms which attempt to provide different levels of quality to different types of network traffic. Queuing One method of implementing QoS is to utilize some sort of advanced queuing algorithm. Simple networks process traffic with a FIFO (First In –

    • How to Use Ping to Test a Network

      How to Use Ping to Test a Network

      The following steps elaborate on how to use the Ping utility to perform progressively more distant tests on network connectivity. Ping the Loopback Address – Type Ping 127.0.0.1 Successfully pinging the loopback address verifies that TCP/IP is both installed and configured correctly on the local client. If the loopback test fails, it means IP stack

    • Ethernet Cable

      Ethernet Cable

      This Ethernet cable can be used to connect a network interface card (NIC) to an Ethernet switch or hub. They transmit data using the Ethernet protocol. Ethernet cables have RJ-45 jacks on both ends, each with 8 pins (They look similar to telephone jacks, which use 4 pins or 6 pins). Equipment using an Ethernet

    • VLAN Hopping

      VLAN Hopping

      VLAN Hopping is one of the primary VLAN based attacks used by hackers to infiltrate network security. VLAN hopping is used to attack a network by sending packets to a port which is generally not accessible. VLAN hopping attacks are mainly conducted in the Dynamic Trunking Protocol and, in some cases; the attacks are targeted

    • ADSL Modems

      ADSL Modems

      Description of ADSL A special Internet service which is available in many areas is called the Asymmetrical Digital Subscriber Line (ADSL). ADSL connections use existing copper telephone lines to transmit data to and from the ISP. These connections may be limited by proximity to the ISP or the telephone company because the data will lose strength through

    • Cisco Network Management

      Cisco Network Management

      Cisco Network Management Overview of Network Management Different people may take network management as different meanings. It may be considered as solitary network consultant for monitoring network activity using outdated protocol analyzer. While network management in distributed database environment, managing network nodes for generating real time graphics and auto polling of network devices. There are

    126 queries in 0.201 seconds.