• Main Menu
  • Networking

    • Application Layer

      Application Layer

      The application layer of a software is a protocol that is used for communication between a software and the network layers that it uses. The application layer allows a computer’s network to interpret requests made by the program and allows the program to interpret data from the network. Likewise, the application layer ensures that both

    • 802.11b

      802.11b

      802.11b is the standard that is popularly used for high speed wireless networks. The standard is set by IEEE (Institute of Electrical and Electronics Engineers) and uses a 2.4 gigahertz radio frequency. There are several standards that are in use today for wireless communication from one computer device to another; however 802.11b is cost effective,

    • Extranet

      Extranet

      In the modern world of information and light-speed communications, data must be accessible from anywhere. This very issue is why nearly all businesses have created vast networks of computers throughout their offices. These same companies have an extensive web presence to reach their customers all over the world. A problem then arises, however, when a

    • FTP (File Transfer Protocol)

      FTP (File Transfer Protocol)

      FTP (File Transfer Protocol) is the generic term for a group of computer programs aimed at facilitating the transfer of files or data from one computer to another. It originated in the Massachusetts Institute of Technology (MIT) in the early 1970s when mainframes, dumb terminals and time-sharing were the standard. Although the FTP programs have

    • Intrusion Detection System (IDS)

      Intrusion Detection System (IDS)

      Consumers commonly mistake an intrusion detection system (IDS)with a computer firewall. Although both applications have a similar goal to protect end-users from nefarious hackers and computer malware, an IDS differs from a firewall in that it can be either a device or software program created to monitor an individual computer, computing device, or network for

    • Frame vs Packet

      Frame vs Packet

      A packet and a frame are both packages of data moving through a network. A packet exists at Layer 3 of the OSI Model, whereas a frame exists at Layer 2 of the OSI Model. Layer 2 is the Data Link Layer. The best known Data Link Layer protocol is Ethernet. Layer 3 is the

    • How to Use Ping to Test a Network

      How to Use Ping to Test a Network

      The following steps elaborate on how to use the Ping utility to perform progressively more distant tests on network connectivity. Ping the Loopback Address – Type Ping 127.0.0.1 Successfully pinging the loopback address verifies that TCP/IP is both installed and configured correctly on the local client. If the loopback test fails, it means IP stack

    • VLAN Hopping

      VLAN Hopping

      VLAN Hopping is one of the primary VLAN based attacks used by hackers to infiltrate network security. VLAN hopping is used to attack a network by sending packets to a port which is generally not accessible. VLAN hopping attacks are mainly conducted in the Dynamic Trunking Protocol and, in some cases; the attacks are targeted

    • ADSL Modems

      ADSL Modems

      Description of ADSL A special Internet service which is available in many areas is called the Asymmetrical Digital Subscriber Line (ADSL). ADSL connections use existing copper telephone lines to transmit data to and from the ISP. These connections may be limited by proximity to the ISP or the telephone company because the data will lose strength through

    • Cisco Network Management

      Cisco Network Management

      Cisco Network Management Overview of Network Management Different people may take network management as different meanings. It may be considered as solitary network consultant for monitoring network activity using outdated protocol analyzer. While network management in distributed database environment, managing network nodes for generating real time graphics and auto polling of network devices. There are

    127 queries in 0.484 seconds.