• Main Menu
  • Networking

    • IP Address Conflict

      IP Address Conflict

      An IP (or Internet Protocol) address conflict occurs when two different systems on the same subnet are assigned or otherwise have their network interface configured to use the same IP address. It is possible to have two systems on different subnets configured with the same IP address, but not have a conflict occur due to

    • Dynamic DNS

      Dynamic DNS

      Dynamic DNS is a technology that allows you to update the IP address of a domain in real time. In order to fully understand how Dynamic DNS works, it is important to first understand domain names and name servers. Essentially, all website domain names are held on computer servers known as name servers. These servers

    • Routing


      Routing is the process of moving packets through an internetwork, such as the Internet. Routing actually consists of two separate, but related, tasks: Defining paths for the transmission of packets through an internetwork. Forwarding packets based upon the defined paths. Routing takes place in IP networks, based on IP routing tables and its entries. The

    • Network Routers

      Network Routers

      A network router is a network device with interfaces in multiple networks whose task is to copy packets from one network to another. Routers operate at Layer 3 of the OSI Model, the Network Layer. This is in contrast to switches, which operate at Layer 2 of the OSI Model, the Data-Link Layer. A network

    • Cat 3

      Cat 3

      Cat 3, short for Category 3, is a UTP (Unshielded Twisted Pair) cable designed to carry voice and data up to 10 Mbps (mega bits per second), with possible transmission frequencies up to 16 MHz. Cat 3 cable is part of a family of copper cabling standards defined jointly by the Electronic Industries Alliance (EIA)

    • Network Layer

      Network Layer

      The Network Layer is located at the 3rd position in the seven layer OSI model. It offers serviceable and practical ways of transmitting variable length data series from a source to a destination through one or more networks, while preserving the class of service and error handling tasks. The Network Layer is accountable for source

    • Packet Sniffers

      Packet Sniffers

      Packet sniffing is listening (with software) to the raw network device for interesting packets. When the software sees a packet that fits certain criteria, it logs it to a file. The most common criterion for an interesting packet is one that contains words like “login” or “password.” To packet sniff, obtain or code a packet

    • – What Are its Uses and Why is it Important? – What Are its Uses and Why is it Important? is a private IP address commonly used by the SMC and Belkin router manufacturers for device setup and troubleshooting. SMC and Belkin specialize in manufacturing home networking equipment that competes with Netgear, D-Link, and Linksys brands in the marketplace. The Internet Assigned Numbers Authority (IANA) does not grant exclusive use of the IP address

    • Routing Protocols

      Routing Protocols

      A routing protocol is the implementation of a routing algorithm in software or hardware. A routing protocol uses metrics to determine which path to utilize to transmit a packet across an internetwork. The metrics that routing protocols use include: Number of network layer devices along the path (hop count) Bandwidth Delay Load MTU Cost Routing

    • Broadband over Power Lines

      Broadband over Power Lines

      Broadband over Power Lines, or BPL, refers to the transmission (sending and receiving) of digital data through existing power cables and electricity distribution infrastructures. This can be viewed as a mere variation on using television cables; instead of using television cables, though, power transmission lines are going to be used. The Broadband over Power Lines

    482 queries in 0.751 seconds.