• Main Menu
  • Networking

    • ISAKMP


      ISAKMP (Internet Security Association and Key Management Protocol) is a protocol for establishing Security Associations (SA) and cryptographic keys in a internet environment. ISAKMP defines the procedures for authenticating a communicating peer, creation and management of Security Associations, key generation techniques, and threat mitigation (e.g. denial of service and replay attacks). ISAKMP typically utilizes IKE

    • MAC Addresses (Media Access Control)

      MAC Addresses (Media Access Control)

      A MAC address is an address that exists on Layer 2 of the OSI Model. Layer 2 of the OSI model is the Data Link Layer. The Data Link Layer consists of two sublayers, the Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sublayer controls how a network node

    • Where you can get VoIP Training?

      Where you can get VoIP Training?

      Voice over Internet Protocol (VoIP) is a relatively new technology, because of which individual businesses will need someone who is well versed in the intricacies of VoIP. Companies are often willing to invest in training their IT administrators in VoIP because of the sure returns. But, where do you go to obtain a training course

    • – What Are its Uses and Why is it Important? – What Are its Uses and Why is it Important?

      The IP address is a default commonly used by Linksys routers. Linksys is now a division of Cisco, Incorporated and makes a large number of the broadband routers used throughout the world. The address is not exclusive to Linksys, but most other major router manufacturers use different default addresses for configuration of home or

    • FTP (File Transfer Protocol)

      FTP (File Transfer Protocol)

      FTP (File Transfer Protocol) is the generic term for a group of computer programs aimed at facilitating the transfer of files or data from one computer to another. It originated in the Massachusetts Institute of Technology (MIT) in the early 1970s when mainframes, dumb terminals and time-sharing were the standard. Although the FTP programs have

    • Routing Protocols

      Routing Protocols

      A routing protocol is the implementation of a routing algorithm in software or hardware. A routing protocol uses metrics to determine which path to utilize to transmit a packet across an internetwork. The metrics that routing protocols use include: Number of network layer devices along the path (hop count) Bandwidth Delay Load MTU Cost Routing

    • RADIUS Server

      RADIUS Server

      RADIUS (Remote Authentication Dial In User Service) is a system procedure that offers centralized entrance, approval, as well as accounting administration for individuals or computers to add and utilize a network service. Individuals often need “Authentication” when they try to fix to a network. People have to face far more problems while connecting their computers

    • VLAN Hopping

      VLAN Hopping

      VLAN Hopping is one of the primary VLAN based attacks used by hackers to infiltrate network security. VLAN hopping is used to attack a network by sending packets to a port which is generally not accessible. VLAN hopping attacks are mainly conducted in the Dynamic Trunking Protocol and, in some cases; the attacks are targeted

    • VoIP Codecs

      VoIP Codecs

      A codec (Coder/Decoder) converts analog signals to a digital bitstream, and another identical codec at the far end of the communication converts the digital bitstream back into an analog signal. In the VoIP world, codecs are used to encode voice for transmission across IP networks. Codecs for VoIP use are also referred to as vocoders,

    • How to Build a USB WiFi Antenna

      How to Build a USB WiFi Antenna

      A USB WiFi antenna is a device that provides a computer with access to the Internet when in range of a WiFi access point. It also refers to a USB-based wireless adapter that also provides a computer with Internet access but connects to specific wireless routers rather than public WiFi access points. USB WiFi antennas

    } 121 queries in 0.281 seconds.