• Main Menu
  • Networking

    • Ethernet at the Physical Layer

      Ethernet at the Physical Layer

      Ethernet is the most popular Local Area Network architecture that was jointly developed by Digital Equipment Corporation, Intel Corporation and Xerox Corporation. It consists of certain specifications and standards as well as hardware devices and components. Ethernet provides services corresponding to physical layer and data link layer of the OSI reference model. Each Ethernet physical

    • UDP (User Datagram Protocol)

      UDP (User Datagram Protocol)

      User Datagram Protocol or UDP is part of the Internet Protocol suite. By using UDP, programs running on different computers on a network can send short messages known as Datagrams to one another. UDP can be used in networks where TCP is traditionally implemented, but unlike TCP, it does not guarantee reliability or correct data

    • SSID (Service Set IDentifier)

      SSID (Service Set IDentifier)

      The SSID (Service Set IDentifier) is a name that identifies a specific 802.11 wireless network. The name is set by the network administrator who configures the router. Some vendors refer to the SSID simply as the “network name.” The SSID is the name of the wireless network and should not be confused with the host

    • How to Clear the ARP Cache

      How to Clear the ARP Cache

      ARP (Address Resolution Protocol) Cache is a technique used to store “mappings” of  OSI Model Network Layer addresses (IP addresses) to corresponding OSI Model Data Link addresses (MAC addresses). Due to a variety of possible circumstances, ARP cache can become damaged requiring the end user or administrator to determine how to clear the ARP cache

    • How to Network Two Computers

      How to Network Two Computers

      Computers are the basis for both modern technology and modern society. The world of today thrives on information and getting that information from one place to another is crucial to survival. Even in one’s own home, multiple computers must be able to communicate with one another and other devices. This may seem like a daunting

    • 192.168.1.1 – What Are its Uses and Why is it Important?

      192.168.1.1 – What Are its Uses and Why is it Important?

      The 192.168.1.1 IP address is a default commonly used by Linksys routers. Linksys is now a division of Cisco, Incorporated and makes a large number of the broadband routers used throughout the world. The address is not exclusive to Linksys, but most other major router manufacturers use different default addresses for configuration of home or

    • Understanding Data Encapsulation

      Understanding Data Encapsulation

      The sending and receiving of data from a source device to the destination device is possible with the help of networking protocols when data encapsulation is used. The data is encapsulated with protocol information at each OSI reference model layer when a host transmits data to another device across a network. Each layer communicates with

    • How to Replace Your Wireless Router Antenna

      How to Replace Your Wireless Router Antenna

      A wireless router is a computer networking device that routes data packets across another computer or across a wireless IP network. The wireless router comes with an 802.11 interface card and antenna. The wireless router antenna is generally what determines the signal strength of the wireless router. If your signal strength is weak, then you

    • File Sharing

      File Sharing

      A common practice in modern society is the use of file sharing programs and applications. These file sharing programs have been shrouded in controversy, scrutiny, and criticism since their inceptions. Despite that, however, file sharing programs are used by millions of people worldwide on a daily basis and that number is only growing. This article

    • Responding to Network Attacks and Security Incidents

      Responding to Network Attacks and Security Incidents

      Network Attacks Review A network attack occurs when an attacker or hacker uses certain methods or technologies to maliciously attempt to compromise the security of a network. Hackers attack corporate networks to use data for financial gain or for industrial espionage, to illegally use user accounts and privileges, to run code to damage and corrupt

    networking
    451 queries in 0.673 seconds.