• Main Menu
  • Wireless Networks

    • How to Access a Router

      How to Access a Router

      A router is a networking device that allows your computer to connect to the Internet. Router facilitates a concurrent connection of multiple computers for the same Internet line. The core purpose of a router is to channelize incoming and outgoing data to appropriate computers or other networks. Every newly purchased router has some inbuilt default

    • How to Reset a Netgear Router

      How to Reset a Netgear Router

      Netgear routers are some of the most popular routers in the world, providing both residential and commercial users with wireless networks that are accessible from a wide variety of mobile devices such as laptops, tablets, smartphones, and even desktop computers that are outfitted with a wireless adapter (which Netgear also sells). Netgear routers are available

    • How to Configure a Router

      How to Configure a Router

      One of the main disadvantages of connecting to the Internet via wire is that it prevents you from moving around. On the other hand, by setting up and configuring a router, you can move around with your lap top and surf the web more comfortably. Configuring a router is not difficult; however, people may have

    • HSCSD (High Speed Circuit Switched Data)

      HSCSD (High Speed Circuit Switched Data)

      Fixed/Mobile Mobile Circuit/Packet Circuit Max Bandwidth 57.6Kb Range Coverage area of host network Frequency Frequency of host network Host Network GSM Definer ETSI (European Telecommunications Standards Institute) URL http://www.etsi.org/ HSCSD (High Speed Circuit Switched Data) is a specification for data transfer over GSM networks. HSCSD utilizes up to four 9.6Kb or 14.4Kb time slots, for

    • How to Access a Linksys Router

      How to Access a Linksys Router

      Users can connect to a Linksys router manually by attaching an Ethernet cable from the router to a computer and typing 192.168.1.1 (the default IP address)  in the web browser. This kind of connection is used to setup a router for the first time or troubleshoot problems when a wireless connection is not available. By

    • MAC Address Filtering

      MAC Address Filtering

      MAC Address filtering is a technique that is implemented on many wireless networks to filter which devices are able to connect to the wireless network. MAC Address filtering allows an administrator to allow specific devices to connect to the network while blocking all other devices. MAC Address filtering is a free service provided by most

    • Rogue Wireless Access Point

      Rogue Wireless Access Point

      A Rogue Access Point is a Wi-Fi Access Point which is setup by an attacker for the purpose of sniffing wireless network traffic. 802.11 (Wi-Fi) utilizes SSIDs (Service Set IDentifiers) to authenticate NICs to wireless access points. There is no similar protocol for authenticating wireless access points. It is possible to place a rogue wireless

    • 802.11b

      802.11b

      802.11b is the standard that is popularly used for high speed wireless networks. The standard is set by IEEE (Institute of Electrical and Electronics Engineers) and uses a 2.4 gigahertz radio frequency. There are several standards that are in use today for wireless communication from one computer device to another; however 802.11b is cost effective,

    • How to Increase a WiFi Signal

      How to Increase a WiFi Signal

      The first thing you can try to increase a WiFi signal is to move the laptop computer or mobile device closer to the source of the network that is being accessed. If you have control over the router of the network, you can increase the wireless signal by placing the router on a high area

    • MIC (Message Integrity Check)

      MIC (Message Integrity Check)

      A message integrity check (MIC), is a security improvement for WEP encryption found on wireless networks. The check helps network administrators avoid attacks that focus on using the bit-flip technique on encrypted network data packets. Unlike the older ICV (Integrity Check Value) method, MIC is able to protect both the data payload and header of

    wireless-networks
    } 415 queries in 0.409 seconds.