• Main Menu
  • Networking

    • ARP (Address Resolution Protocol)

      ARP (Address Resolution Protocol)

      ARP is the Address Resolution Protocol. The ARP protocol maps addresses between the Data Link Layer and the Network Layer of the OSI Model. The Data Link layer of TCP/IP networks utilizes MAC addresses; the Network Layer of TCP/IP networks utilizes IP addresses. ARP and RARP The ARP protocol is used to map IP addresses

    • Reverse DNS

      Reverse DNS

      Reverse DNS is the process of using DNS to translate IP addresses to hostnames. It is the opposite of forward DNS, which is used to translate hostnames to IP addresses. Internet names are those used to refer to hosts on the Internet, such as www.tech-faq.com and www.freebsd.org. IP addresses are the numbers that Internet routers

    • Single Sign-On

      Single Sign-On

      Single Sign-On is a concept that allows an end-user to access multiple, related but independent, software applications using a single account. That is, an end-user logs into his/her account only once and then access multiple applications without needing to login again. Single Sign-On is often abbreviated SSO. One the same line, Single Sign-Off is a

    • Tunneling

      Tunneling

      Tunneling is a way in which data is transferred between two networks securely. All the data being transferred is fragmented into smaller packets or frames and then passed through the tunnel. This process is different from a normal data transfer between nodes. Every frame passing through the tunnel will be encrypted with an additional layer

    • Ethernet Crossover Cable

      Ethernet Crossover Cable

      An Ethernet crossover cable can be used to directly connect two network devices through Ethernet. These can either be single computers or they can be networks. Ethernet crossover cables are commonly used for temporarily networking two devices in the absence of a network router, switch, or hub. The principle is the same, but the connection

    • How to Configure a Router

      How to Configure a Router

      One of the main disadvantages of connecting to the Internet via wire is that it prevents you from moving around. On the other hand, by setting up and configuring a router, you can move around with your lap top and surf the web more comfortably. Configuring a router is not difficult; however, people may have

    • Enabling IP Routing

      Enabling IP Routing

      WAN connects different LANs with each other to communicate and to share data and resources. As a result, routers must be used on each network or at backbone to route the IP packets and IP routing should be enabled on the routers. Routers must learn the destinations that are not directly connected by building and

    • TKIP (Temporal Key Integrity Protocol)

      TKIP (Temporal Key Integrity Protocol)

      TKIP (Temporal Key Integrity Protocol) is part of a draft standard from the IEEE 802.11i working group. TKIP utilizes the RC4 stream cipher with 128-bit keys for encryption and 64-bit keys for authentication. TKIP is an enhancement to WEP (Wired Equivalent Privacy) security. TKIP enhances WEP by adding a per-packet key mixing function to de-correlate

    • How to Send Text Messages Free

      How to Send Text Messages Free

      Cell phone text messages typically use the SMS (Short Message Service) protocol. Most cellular service providers charge fees to send and receive text messages. There are numerous ways to send text messages for free, but they vary among cell service providers. Send Free Text Messages by Purchasing the Right Service Plan Some cell service plans

    • ATM (Asynchronous Transfer Mode)

      ATM (Asynchronous Transfer Mode)

      ATM (Asynchronous Transfer Mode) is a technological system developed for both local and wide area networks (LAN and WAN), and designed to handle data as well as video and voice traffic in real time, all at the same time. The system architecture makes use of switches that set up logical circuits at both ends of

    120 queries in 0.322 seconds.