• Main Menu
  • Networking

    • How to Network Two Computers

      How to Network Two Computers

      Computers are the basis for both modern technology and modern society. The world of today thrives on information and getting that information from one place to another is crucial to survival. Even in one’s own home, multiple computers must be able to communicate with one another and other devices. This may seem like a daunting

    • 192.168.1.245

      192.168.1.245

      Cisco is a leading manufacturer of networking devices such as modems, wireless routers, and network storage devices. Cisco products are sold worldwide to millions of consumers for both residential and commercial purposes. Cisco also markets a number of data plans for some of the largest Internet Service Providers in the world. What is 192.168.1.245? 192.168.1.245

    • EDGE (Enhanced Data for Global Evolution)

      EDGE (Enhanced Data for Global Evolution)

      Fixed/Mobile Mobile Circuit/Packet Packet/Circuit Max Bandwidth 384Kb Range Coverage area of host network Frequency Frequency of host network Host Network GSM Definer ETSI (European Telecommunications Standards Institute) URL http://www.etsi.org/ EDGE (Enhanced Data rate for GSM Evolution) is a specification for data transfer on GSM networks. EDGE features both a packet capability, EGPRS (Enhanced General Packet

    • How to Reset a Netgear Router

      How to Reset a Netgear Router

      Netgear routers are some of the most popular routers in the world, providing both residential and commercial users with wireless networks that are accessible from a wide variety of mobile devices such as laptops, tablets, smartphones, and even desktop computers that are outfitted with a wireless adapter (which Netgear also sells). Netgear routers are available

    • The Cisco Three Layer Hierarchical Model vs the OSI Model

      The Cisco Three Layer Hierarchical Model vs the OSI Model

      The ISO, International Organization for Standardization is the Emily Post of the network protocol world. Just like Ms. Post, who wrote the book setting the standards or protocols for human social interaction, the ISO developed the OSI model as the precedent and guide for an open network protocol set. Defining the etiquette of communication models,

    • 2wire Default Password

      2wire Default Password

      The 2wire Ethernet client wirelessly connects electronic devices that are not equipped with wireless cards or adapters to a home network. Once configured on a Windows computer, a 2wire card can be used on any device that has an Ethernet connection (e.g. an Xbox 360). A common problem is determining what the 2wire default password

    • Two Factor Authentication

      Two Factor Authentication

      Two factor authentication is term used to describe any authentication mechanism where more than one thing is required to authentate a user. The two components of two factor authentication are: Something you know Something you have Traditional authentication schemes used username and password pairs to authenticate users. This provides minimal security, because many user passwords

    • 802.11b

      802.11b

      802.11b is the standard that is popularly used for high speed wireless networks. The standard is set by IEEE (Institute of Electrical and Electronics Engineers) and uses a 2.4 gigahertz radio frequency. There are several standards that are in use today for wireless communication from one computer device to another; however 802.11b is cost effective,

    • Packet Fragmentation

      Packet Fragmentation

      Every packet based network has an MTU (Maximum Transmission Unit) size. The MTU is the size of the largest packet that that network can transmit. Packets larger than the allowable MTU must be divided into smaller packets or fragments to enable them to traverse the network. Network Standard MTU Ethernet 1500 Token Ring 4096 Packet

    • How to Monitor Wireless Traffic

      How to Monitor Wireless Traffic

      Wireless traffic is considered to be those Internet protocol packets that are transmitted through an 802.11a, b, g, n, or i wireless protocol. Monitoring Requirements There are a few things to consider when planning to setup wireless traffic monitoring. First, the user must determine what kind of traffic will be monitored. Is the traffic to

    } 119 queries in 0.376 seconds.