• Main Menu
  • Networking

    • How to Connect a Wireless Router

      How to Connect a Wireless Router

      Wireless routers are network devices that combine the functionalities of a router and a wireless access point. Wireless routers can be connected to broadband modems to provide wireless access to the Internet to two or more computers or laptops within a home environment. They enable greater mobility for laptops and other portable computers. They can

    • Responding to Network Attacks and Security Incidents

      Responding to Network Attacks and Security Incidents

      Network Attacks Review A network attack occurs when an attacker or hacker uses certain methods or technologies to maliciously attempt to compromise the security of a network. Hackers attack corporate networks to use data for financial gain or for industrial espionage, to illegally use user accounts and privileges, to run code to damage and corrupt

    • Jitter

      Jitter

      Jitter is a variation or dislocation in the pulses of a digital transmission; it may be thought of, in a way, as irregular pulses. Jitter can manifest through variations in amplitude, signal strength, and other elements of such waves. The usual causes include connection timeouts, connection time lags, data traffic congestion, and interference. Simply put,

    • How to Clear the ARP Cache

      How to Clear the ARP Cache

      ARP (Address Resolution Protocol) Cache is a technique used to store “mappings” of  OSI Model Network Layer addresses (IP addresses) to corresponding OSI Model Data Link addresses (MAC addresses). Due to a variety of possible circumstances, ARP cache can become damaged requiring the end user or administrator to determine how to clear the ARP cache

    • Wireless Networks

      Wireless Networks

      Wireless networks are those computer networks that use electromagnetic waves instead of wires in order to carry signals over the various parts of the network. Wireless networks which run over other wireless networks often utilize the lower layer networks to provide security and encryption. Stand-alone wireless networks either provide their own security and encryption features

    • Analog Telephone Adapter

      Analog Telephone Adapter

      An Analog Telephone Adapter (ATA), also known as the Analog Telephony Adapter, is an electronic device used to enable one or more analog telephones or facsimile machines for Voice over Internet Protocol (VoIP) calls and faxes. An Analog Telephone Adapter basically creates a physical connection by use of telephone and Internet cables between a conventional

    • ISDN (Integrated Services Digital Network)

      ISDN (Integrated Services Digital Network)

      ISDN (Integrated Services Digital Network) is a system of digital phone connections that has been designed for sending voice, video, and data simultaneously over digital or ordinary phone lines, with a much faster speed and higher quality than an analog system can provide. ISDN is basically a set of protocol for making and breaking circuit

    • Cat 5

      Cat 5

      Cat 5, short for Category 5, is the current accepted industry standard for network and telephone wiring. Cat 5 is an unshielded twisted pair type cable exclusively designed for high signal integrity. The cable consists of four pairs of 24-guage twisted copper pairs terminating in an RJ-45 jack. If a wire is certified as Category

    • Fiber Optic Patch Panel

      Fiber Optic Patch Panel

      Fiber optic patch panel, also known as the fiber distribution panel, is used mainly in fiber optic cable management. It helps network technicians in minimizing the clutter of wires when setting up fiber optic cables. It terminates the fiber optic cable while providing access to the cable’s individual fibers for cross connection. They are also

    • Power Line Networking

      Power Line Networking

      Power line networking is one of the options in connecting computers to form a home network. This technology powers a "wireless" and "power free" home network. Power line networking does not require the user to install additional cables and power-consuming networking hardware to set up a home network. Instead, power line networking, uses the existing

    networking
    154 queries in 0.386 seconds.