• Main Menu
  • Networking

    • How to Change a WEP Key

      How to Change a WEP Key

      A WEP (Wired Equivalent Privacy) key is a type of security algorithm for wireless devices that protects a computer from hackers and people who are trying to access someone else’s Internet connection. It consists of the numbers 0-9 and the letters A-F and can be 10, 26, or 58 characters long. For devices within the

    • LDAP (Lightweight Directory Access Protocol)

      LDAP (Lightweight Directory Access Protocol)

      LDAP (Lightweight Directory Access Protocol) is a protocol for communications between LDAP servers and LDAP clients. LDAP servers store "directories" which are access by LDAP clients. LDAP is called lightweight because it is a smaller and easier protocol which was derived from the X.500 DAP (Directory Access Protocol) defined in the OSI network protocol stack.

    • 802.1X

      802.1X

      802.1x is an IEEE standard that provides the definition for the encapsulation of EAP (Extensible Authentication Protocol) and is also known as EAPOL (EAP over LAN). The standard was first defined in 2001 and later clarified in 2004 to be used with other IEEE 802 working group defined technologies such as the 802.11 wireless standard.

    • Collision Domain

      Collision Domain

      A computer network can be segmented physically and logically. A collision domain is one of the logical network segments in which the data packets can collide with each other. One of the most common protocols used when referring to a collision domain is the Ethernet protocol. Collision domains are often referred to as ‘Ethernet segments.’

    • WiFi Scanner

      WiFi Scanner

      There are many different products and services available, especially via the Internet, that allow users to detect and crack wireless computer networks. The majority of these programs are illegal, extremely complicated to use, or both. The WiFi Scanner, however, is easy to use and allows the user to detect networks that are further away while

    • MPLS (Multi Protocol Label Switching)

      MPLS (Multi Protocol Label Switching)

      MPLS stands for Multi Protocol Label Switching. The MPLS is often referred to as the layer in between the Data Link and Network layers because of where it operates. The MPLS serves as a method to forward packets of data easily by using labels. What are the Data Link and Network layers? In the seven-layer

    • Hot Standby Router Protocol

      Hot Standby Router Protocol

      The Hot Standby Router Prtocol (HSRP) is a networking protocol that supports the non-disruptive failover of Internet Protocol (IP) traffic in special circumstances. HSRP also allows network hosts to look like they are using a single router and keep connected if the first hop router being used fails to respond. The protocol guards against the

    • RJ-45

      RJ-45

      RJ-45 is one of the more popular standard connector types used with unshielded, twisted pair network cables. The RJ-45 connector type is commonly used with Ethernet cables and includes eight pins that interface with the cable wires electrically and is sometimes used with shielding cabling. The pin-outs of the connector are defined to provide cable

    • FCAPS

      FCAPS

      FCAPS is an ITU standard model for enterprise management. The five FCAPS domains are: Fault Management Configuration Management Accounting Management Performance Management Security Management Fault Management Fault management is the domain where network problems are discovered and corrected. Steps are then taken to prevent them from occurring or recurring. By doing so, the network remains

    • Understanding Data Encapsulation

      Understanding Data Encapsulation

      The sending and receiving of data from a source device to the destination device is possible with the help of networking protocols when data encapsulation is used. The data is encapsulated with protocol information at each OSI reference model layer when a host transmits data to another device across a network. Each layer communicates with

    176 queries in 0.540 seconds.