• Main Menu
  • Networking

    • Broadband over Power Lines

      Broadband over Power Lines

      Broadband over Power Lines, or BPL, refers to the transmission (sending and receiving) of digital data through existing power cables and electricity distribution infrastructures. This can be viewed as a mere variation on using television cables; instead of using television cables, though, power transmission lines are going to be used. The Broadband over Power Lines

    • ATM (Asynchronous Transfer Mode)

      ATM (Asynchronous Transfer Mode)

      ATM (Asynchronous Transfer Mode) is a technological system developed for both local and wide area networks (LAN and WAN), and designed to handle data as well as video and voice traffic in real time, all at the same time. The system architecture makes use of switches that set up logical circuits at both ends of

    • Types of Network Hardware

      Types of Network Hardware

      The label network hardware is generally given to any piece of equipment with the task of moving data. Common categories of network hardware include: Routers Switches Network Interface Cards         Routers             A router is a network device with interfaces in multiple networks whose task is to copy packets from one network

    • What is the SMB Protocol?

      What is the SMB Protocol?

      The Server Message Block (SMB) protocol is designed to support file sharing, serial ports, printers, and other communications interfaces such as mail slots and named pipes established between two or more computers. The protocol can be used on top of the TCP/IP or other network protocols such as NetBEUI on the Internet. SMB primarily allows

    • ICMP (Internet Control Message Protocol)

      ICMP (Internet Control Message Protocol)

      ICMP is the Internet Control Message Protocol. ICMP is a complementary protocol to IP (Internet Protocol). Like IP, ICMP resides on the Network Layer of the OSI Model. ICMP is designed for sending control and test messages across IP networks. Unlike the Transport Layer protocols TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) which

    • How Do ADSL Microfilters Work?

      How Do ADSL Microfilters Work?

      ADSL Internet Access Asynchronous Digital Subscriber Line (ADSL) is a broadband Internet option that is commonly available in many locations. Asynchronous only means that the download speeds and the upload speeds are different (with the upload speeds usually being significantly lower) and provides a fast option to browse the web. Internet access through ADSL requires one

    • Understanding the Cisco Three-Layer Hierarchical Model

      Understanding the Cisco Three-Layer Hierarchical Model

      Understanding the Cisco Three-Layer Hierarchical Model Hierachical network design helps us to make networks more reliable and predictable. Level by level design help to understand networking factions easily like, we can use tools like access lists at specific level and can avoid them from others. Cisco layer model consist of the following three layers. The

    • Rogue Wireless Access Point

      Rogue Wireless Access Point

      A Rogue Access Point is a Wi-Fi Access Point which is setup by an attacker for the purpose of sniffing wireless network traffic. 802.11 (Wi-Fi) utilizes SSIDs (Service Set IDentifiers) to authenticate NICs to wireless access points. There is no similar protocol for authenticating wireless access points. It is possible to place a rogue wireless

    • Ethernet Isolator

      Ethernet Isolator

      An Ethernet or network isolator is a type of galvanic isolator used in copper-based Ethernet systems. It protects devices and users from possible differences in ground potentials of the voltages in two or more different circuits or circuit components. Ethernet isolators depend on electromagnetic induction to bridge a physical isolation gap within Ethernet systems and

    • 568B

      568B

      568B, or more formally EIA/TIA 568B, is one of the International standards which include the definition for how the pins or wires in a RJ-45 cable are arranged or terminated. The termination of the cable can occur at several locations which include an individual cable connecting a computer to an Ethernet port, the ending socket

    networking
    182 queries in 0.730 seconds.