• Main Menu
  • Networking

    • Understanding the IPX-SPX Protocol

      Understanding the IPX-SPX Protocol

      IPX/SPX is a protocol suite that is implemented on many corporate internetworks. IPX/SPX was developed to operate in Novell Netware in LAN environment. But today, the IPX/SPX is also used in Microsoft NT, Microsoft XP and Lotus Notes environment along with Vista. IPX/SPX on Cisco IOS The Cisco IOS also provides a wide range of

    • 192.168.2.1 – What Are its Uses and Why is it Important?

      192.168.2.1 – What Are its Uses and Why is it Important?

      192.168.2.1 is a private IP address commonly used by the SMC and Belkin router manufacturers for device setup and troubleshooting. SMC and Belkin specialize in manufacturing home networking equipment that competes with Netgear, D-Link, and Linksys brands in the marketplace. The Internet Assigned Numbers Authority (IANA) does not grant exclusive use of the IP address

    • VoIP (Voice over Internet Protocol)

      VoIP (Voice over Internet Protocol)

      VoIP (Voice over IP) includes communication protocols, technologies and techniques of transmission used for multimedia sessions and voice communication via IP networks. Other terms used synonymously with ‘Voice over IP’ include broadband phone, voice over broadband and Internet telephony.  How Does VoIP Work? VoIP calls require media channel setup, analog voice signal digitalization, encoding, packeting

    • Rogue Wireless Access Point

      Rogue Wireless Access Point

      A Rogue Access Point is a Wi-Fi Access Point which is setup by an attacker for the purpose of sniffing wireless network traffic. 802.11 (Wi-Fi) utilizes SSIDs (Service Set IDentifiers) to authenticate NICs to wireless access points. There is no similar protocol for authenticating wireless access points. It is possible to place a rogue wireless

    • EAP, LEAP, PEAP and EAP-TLS and EAP-TTLS

      EAP, LEAP, PEAP and EAP-TLS and EAP-TTLS

      Once the popularity of WiFi started to take off in the early 2000s, a major issue that was identified with the inherent security included in the 802.11 standard was the weakness of WEP encryption. Although a number of competing security methods have emerged since this time, the EAP, LEAP, PEAP, EAP-TLS, and EAP-TTLS protocols were

    • RJ-11

      RJ-11

      RJ-11 is the standard connector utilized on 2-pair (4-wire) telephone wiring. RJ stands for “Registered Jack”- a physical connector interface most often used for telephone wire terminals. Though the RJ-11 connector has a total of 6 connector positions, typically either only 2 or 4 are actually utilized. RJ-11 connector wiring comes in two standard varieties-

    • What is PCAP?

      What is PCAP?

      PCAP (Packet Capture) is a protocol for wireless Internet communication that allows a computer or device to receive incoming radio signals from another device and convert those signals into usable information. It allows a wireless device to convert information into radio signals in order to transfer them to another device. PCAP runs in the background

    • Coaxial Cable

      Coaxial Cable

      Coaxial cable, also called coax, is used to transmit radio frequency (RF) signals. It has low emission losses and provides protection from electromagnetic interference, allowing signals with low power to be transmitted over longer distances. Coaxial cable is comprised of an inner core, insulator, shield, and outer cover. It is called coaxial because these sections

    • File Sharing

      File Sharing

      A common practice in modern society is the use of file sharing programs and applications. These file sharing programs have been shrouded in controversy, scrutiny, and criticism since their inceptions. Despite that, however, file sharing programs are used by millions of people worldwide on a daily basis and that number is only growing. This article

    • IP Address Classes

      IP Address Classes

      IP Address classes were the original organizational structure for IP addresses. The specific address class would determine the maximum potential size for a computer network. The address class would define which of the specific bits of the address would be used to identify the network and network identification, the bits to identify the host computer

    networking
    480 queries in 0.588 seconds.