• Main Menu
  • Networking

    • What is a QSIG?

      What is a QSIG?

      QSIG is a signaling protocol that is  based on ISDN. It communicates signals between private branch exchanges (PBXs) within a Private Integrated Services Network (PISN) using the application-level ROSE and connection-level Q9.31 protocols. QSIG uses ISDN as the physical link layer in the exchanges and is often used in enterprise voice or integrated service networks.

    • DNS (Domain Name System)

      DNS (Domain Name System)

      Domain Name System (DNS) is an Internet Engineering Task Force (IETF) standard name service which enables applications and users to connect to hosts in TCP/IP based networks by specifying a name. DNS makes it possible to assign domain names to organizations independent of the routing of the numerical IP address. DNS is a hierarchically distributed database that creates hierarchical names

    • DOCSIS (Data Over Cable Service Interface Specification)

      DOCSIS (Data Over Cable Service Interface Specification)

      Data Over Cable Service Interface Specification (DOCSIS) defines the interface standards for cable modems and supporting equipment involved in high speed data transfer and distribution over cable television system networks. It permits additional high-speed data transfer over an existing cable TV system and is widely used by television operators to offer Internet access through an

    • What is EIGRP?

      What is EIGRP?

      Local and international networks require information to be constantly updated in order to properly route communications. Routing protocols were developed in order to help keep information flowing to the proper locations and to maintain network connectivity on both LAN and WAN. The Enhanced Interior Gateway Routing Protocol (EIGRP) is one of the most popular internal

    • How to Add a Printer to a Wireless Network

      How to Add a Printer to a Wireless Network

      If you want to add a printer to a wireless network, you need to: 1) Ensure that the printer has at least one USB port. 2) Purchase a wireless adapter and connect it to the printer’s USB port. Since wireless adapters work on Plug-and-Play technology, the printer should automatically detect it and begin installing all

    • Subscriber Connectors (SCs)

      Subscriber Connectors (SCs)

      The Subscriber Connector (SC) is a fiber optic connector with a push-pull latching mechanism that provides quick insertion and removal while ensuring a positive connection. The SC is also available in a duplex configuration. It has a benefit in keyed duplex capability to support send/receive channels. This connector is commonly used for most modern network

    • How to Send Text Messages Free

      How to Send Text Messages Free

      Cell phone text messages typically use the SMS (Short Message Service) protocol. Most cellular service providers charge fees to send and receive text messages. There are numerous ways to send text messages for free, but they vary among cell service providers. Send Free Text Messages by Purchasing the Right Service Plan Some cell service plans

    • Wireless Modems

      Wireless Modems

      A wireless modem is a network device which connects to a wireless network. Modems are frequently associated with telephone systems, but wireless modems are used with computers to connect to the Internet. Connecting a wireless modem to the computer will directly connect to your wireless ISP (Internet Service Provider). Wireless modems operate at speeds comparable

    • What is the SMB Protocol?

      What is the SMB Protocol?

      The Server Message Block (SMB) protocol is designed to support file sharing, serial ports, printers, and other communications interfaces such as mail slots and named pipes established between two or more computers. The protocol can be used on top of the TCP/IP or other network protocols such as NetBEUI on the Internet. SMB primarily allows

    • Access Control

      Access Control

      Access control is the execution of limitations and restrictions on whoever tries to occupy a certain protected property, thereby keeping people as safe as possible. As modern society moves further into the cyber age, these access control systems become almost completely computer controlled. This article will further explain what access control is, how it works,

    networking
    } 276 queries in 0.365 seconds.