• Main Menu
  • Networking

    • Ethernet Cable Pinout

      Ethernet Cable Pinout

      Ethernet cable connects a network interface card (NIC) with a hub or Ethernet switch. Ethernet cables can be purchased from a computer store. They come in two categories, flat and braided. The flat or solid cable is used when there is a need for a longer cable run. However, it is not flexible. Thus, its

    • RG-58

      RG-58

      RG-58 is a coaxial cable that is used for wiring purposes. A coaxial cable, in general, consists of an inner conductor that is surrounded by a spacer. The coaxial cable is electrically charged and sometimes consists of different uninsulated conductors that remain entangled with one another. The insulating spacer of the cable is further surrounded

    • Reverse DNS

      Reverse DNS

      Reverse DNS is the process of using DNS to translate IP addresses to hostnames. It is the opposite of forward DNS, which is used to translate hostnames to IP addresses. Internet names are those used to refer to hosts on the Internet, such as www.tech-faq.com and www.freebsd.org. IP addresses are the numbers that Internet routers

    • FTP (File Transfer Protocol)

      FTP (File Transfer Protocol)

      FTP (File Transfer Protocol) is the generic term for a group of computer programs aimed at facilitating the transfer of files or data from one computer to another. It originated in the Massachusetts Institute of Technology (MIT) in the early 1970s when mainframes, dumb terminals and time-sharing were the standard. Although the FTP programs have

    • What is Multicast Wireless?

      What is Multicast Wireless?

      Multicast is the transfer of messages to multiple destinations simultaneously, using fewer networks. The information is delivered to each of the links only once, and copies are created when the links to the destinations split, thus creating an optimal distribution path. Multicasting reduces unnecessary packet duplication. A wireless network utilizes radio communication, unlike wired networks,

    • VoIP (Voice over Internet Protocol)

      VoIP (Voice over Internet Protocol)

      VoIP (Voice over IP) includes communication protocols, technologies and techniques of transmission used for multimedia sessions and voice communication via IP networks. Other terms used synonymously with ‘Voice over IP’ include broadband phone, voice over broadband and Internet telephony.  How Does VoIP Work? VoIP calls require media channel setup, analog voice signal digitalization, encoding, packeting

    • What is a Sysvol?

      What is a Sysvol?

      SYSVOL is the acronym for the SYSFOL folder and all of the files stored in it on the Windows Operating System (OS). It stores the server’s copy of public data and files for the domain. These files consist of group or user policy information. The information stored in the SYSVOL folder is copied to all

    • Wavelength Division Multiplexing

      Wavelength Division Multiplexing

      Wavelength Division Multiplexing (WDM) is a technology found in fiber optic communications. WDM uses a single fiber to transmit multiple optical signals. It does this by breaking up the signal into different frequencies or wavelengths of color. The various wavelengths indicate that different amounts of data are being transmitted simultaneously. This results in an increase

    • DNS (Domain Name System)

      DNS (Domain Name System)

      Domain Name System (DNS) is an Internet Engineering Task Force (IETF) standard name service which enables applications and users to connect to hosts in TCP/IP based networks by specifying a name. DNS makes it possible to assign domain names to organizations independent of the routing of the numerical IP address. DNS is a hierarchically distributed database that creates hierarchical names

    • How to Change WEP to WPA

      How to Change WEP to WPA

      Changing WEP to WPA is a great way to increase a wireless network’s security. These are the two main types of protection available through modern wireless routers: WEP or Wired Equivalent Privacy is a security algorithm that wireless networks use. Hackers can break into wireless networks using WEP very easily with simple software that is

    networking
    600 queries in 0.706 seconds.