• Main Menu
  • Networking

    • Cisco Switch Configuration

      Cisco Switch Configuration

      When executing an inter-network installation, many mechanisms and components are usually involved. Cisco is superior because it is the only inter-networking company with a well made end to end inter-networking solution. Cisco switches makes the LAN more competent by creating multiple collision domains. Each switch port is a split collision domain. With only one device

    • Honey Monkey

      Honey Monkey

      Honey monkeys are a new way of detecting malicious codes from websites that try to exploit certain vulnerabilities of Internet browsers. The honey monkey system works as an automated web/internet patrol system that is designed to detect harmful materials in the Internet, to be able to come up with solutions, and to catch the people

    • How to Secure a Linksys Wireless Router

      How to Secure a Linksys Wireless Router

      A Linksys wireless router is a device that converts digital information into wireless radio waves and vice versa. Linksys wireless routers, like other wireless routers, are used for wireless computer networking. They use an antenna and an Ethernet or coaxial cable connection to allow computers to connect to a wireless network that is within range.

    • Routing Tables

      Routing Tables

      A routing table is a grouping of information stored on a networked computer or network router that includes a list of routes to various network destinations. The data is normally stored in a database table and in more advanced configurations includes performance metrics associated with the routes stored in the table. Additional information stored in

    • Network Routers

      Network Routers

      A network router is a network device with interfaces in multiple networks whose task is to copy packets from one network to another. Routers operate at Layer 3 of the OSI Model, the Network Layer. This is in contrast to switches, which operate at Layer 2 of the OSI Model, the Data-Link Layer. A network

    • DSLAM (Digital Subscriber Line Access Multiplexer)

      DSLAM (Digital Subscriber Line Access Multiplexer)

      Faster connections to the Internet from phone lines are possible through a Digital Subscriber Line Access Multiplexer (abbreviated to DSLAM).  The role of this network device is located in the telephone exchanges of providers for the services.  The service works by taking advantage of the multiplexing techniques used to connect several Digital Subscriber Lines to

    • Bluetooth

      Bluetooth

      Bluetooth is a specification for short distance wireless communication between two devices. Bluetooth Specifications Fixed/Mobile Mobile Circuit/Packet Both Max Bandwidth 1Mb Range 10 meters Frequency 2.40GHz-2.483.5Ghz (U.S. and Europe) or 2.472Ghz-2.497Ghz (Japan) Host Network None Definer Bluetooth SIG Bluetooth technology is named after Harald Bluetooth, a Danish king who managed to consolidate Denmark and a

    • How to Monitor Wireless Traffic

      How to Monitor Wireless Traffic

      Wireless traffic is considered to be those Internet protocol packets that are transmitted through an 802.11a, b, g, n, or i wireless protocol. Monitoring Requirements There are a few things to consider when planning to setup wireless traffic monitoring. First, the user must determine what kind of traffic will be monitored. Is the traffic to

    • WEP (Wired Equivalent Privacy)

      WEP (Wired Equivalent Privacy)

      Wired Equivalent Privacy (WEP) is the encryption algorithm built into the 802.11 (Wi-Fi) standard. WEP encryption uses the RC4 stream cipher with 40 or 104 bit keys and a 24 bit initialization vector. WEP Key Generation Most 802.11 devices allow WEP keys to be entered using an ASCII passphrase or in hexidecimal format. The conversion

    • Routing Protocols

      Routing Protocols

      A routing protocol is the implementation of a routing algorithm in software or hardware. A routing protocol uses metrics to determine which path to utilize to transmit a packet across an internetwork. The metrics that routing protocols use include: Number of network layer devices along the path (hop count) Bandwidth Delay Load MTU Cost Routing

    109 queries in 0.586 seconds.