• Main Menu
  • Networking

    • What is VDSL2?

      What is VDSL2?

      VDSL2 is an acronym which stands for Very High Bit Rate Digital Subscriber Line Generation 2. This is based on of the original Very High Bit Rate Digital Subscriber Line (VDSL) but runs on a different frequency (30 MHz) over 7 different bands to produce extremely high bandwidth capabilities. The service for VDSL2 is available

    • Cisco Network Management

      Cisco Network Management

      Cisco Network Management Overview of Network Management Different people may take network management as different meanings. It may be considered as solitary network consultant for monitoring network activity using outdated protocol analyzer. While network management in distributed database environment, managing network nodes for generating real time graphics and auto polling of network devices. There are

    • How Firewall Protection Works

      How Firewall Protection Works

      Firewall protection works by blocking certain types of traffic between a source and a destination. All network traffic has a source, a destination, and a protocol. This protocol is usually TCP, UDP, or ICMP. If this protocol is TCP or UDP, there is a source port and a destination port. Most often the source port

    • Ethernet Fiber Media Converter

      Ethernet Fiber Media Converter

      An Ethernet fiber media converter is a device that allows a connection to be made between an Ethernet and a fiber optic cable. This type of connection is important in situations where both cable types are used in a single household or office. Because telephone companies often use fiber optic cables to deliver telephone and

    • VDSL (Very High Bit-Rate Digital Subscriber Line)

      VDSL (Very High Bit-Rate Digital Subscriber Line)

      Broadband has revolutionized the way we view and use the internet. The two main types of broadband technology that have pervaded the market are Asymmetric Digital Subscriber Line (ADSL) and cable modems. Both these technologies are a huge leap from the days of the 56 Kbps dial-up connections, with maximum speeds ranging between 8 to

    • RG-11

      RG-11

      Coaxial cables are necessary for rooftop antennas and dish antennas in order to provide crystal-clear sound and audio input. RG-11 bands typically have 75-ohm wires made of copper. Polyethylene dielectric makes sure that there is minimal loss of picture and sound while the antenna receives audio or video feeds. Most users of the RG-11 have

    • Firewalls

      Firewalls

      A firewall is a software component that restricts unauthorized inward network access. It allows outward information flow. It is set up to control traffic flow between two networks by configured permissions like Allow, Deny, Block, Encrypt, etc. It is normally employed to avoid illegal access to personal computers or corporate networks from external unsafe entities

    • Presentation Layer

      Presentation Layer

      The presentation layer is one of seven layers of the OSI (Open Systems Interconnections) Model and is found between the application layer and the session layer. The presentation layer is commonly used for encryption and decryption as well as the conversion of file formats. The presentation layer is considered the last layer in which data

    • LDAP (Lightweight Directory Access Protocol)

      LDAP (Lightweight Directory Access Protocol)

      LDAP (Lightweight Directory Access Protocol) is a protocol for communications between LDAP servers and LDAP clients. LDAP servers store "directories" which are access by LDAP clients. LDAP is called lightweight because it is a smaller and easier protocol which was derived from the X.500 DAP (Directory Access Protocol) defined in the OSI network protocol stack.

    • How to Change WEP to WPA

      How to Change WEP to WPA

      Changing WEP to WPA is a great way to increase a wireless network’s security. These are the two main types of protection available through modern wireless routers: WEP or Wired Equivalent Privacy is a security algorithm that wireless networks use. Hackers can break into wireless networks using WEP very easily with simple software that is

    networking
    442 queries in 0.368 seconds.