• Main Menu
  • Networking

    • NAT (Network Address Translation)

      NAT (Network Address Translation)

      NAT (Network Address Translation) is a technique for preserving scarce Internet IP addresses. Why NAT? The current Internet uses IP addresses in the form xxx.xxx.xxx.xxx. A sample IP address might be 202.187.4.212. Because of the way these IP addresses are allocated, there started to be a shortage of available IP addresses. The current IP (Internet

    • What is VDSL2?

      What is VDSL2?

      VDSL2 is an acronym which stands for Very High Bit Rate Digital Subscriber Line Generation 2. This is based on of the original Very High Bit Rate Digital Subscriber Line (VDSL) but runs on a different frequency (30 MHz) over 7 different bands to produce extremely high bandwidth capabilities. The service for VDSL2 is available

    • ISAKMP

      ISAKMP

      ISAKMP (Internet Security Association and Key Management Protocol) is a protocol for establishing Security Associations (SA) and cryptographic keys in a internet environment. ISAKMP defines the procedures for authenticating a communicating peer, creation and management of Security Associations, key generation techniques, and threat mitigation (e.g. denial of service and replay attacks). ISAKMP typically utilizes IKE

    • Ethernet Hub

      Ethernet Hub

      For any two devices to be connected, they need a common place, or a hub, as it is called in the computer world. It basically connects multiple computers together. Most of the hubs available in the market today support Ethernet standards. This is why they are called Ethernet hubs, and are most commonly used in

    • What is the Function of SerDes?

      What is the Function of SerDes?

      SerDes (pronounced sir-dees) stands for Serializer/Deserializer. It is a set of blocks that is commonly found in high speed communications. SerDes’ general purpose is to compensate for limited input/output. The blocks can convert data between serial data and interfaces that are parallel in different directions. Functions of SerDes The generic function is made up of

    • Fiber Optics

      Fiber Optics

      Fiber optic technology makes use of light to carry digital signals via optical cables. Fiber optic cables are very thin glass wires made from extremely pure optical glass. This technology is based on the concept of light reflection. In the case of fiber optics technology, light carrying digital signals is reflected inside the optical cable

    • Two Factor Authentication

      Two Factor Authentication

      Two factor authentication is term used to describe any authentication mechanism where more than one thing is required to authentate a user. The two components of two factor authentication are: Something you know Something you have Traditional authentication schemes used username and password pairs to authenticate users. This provides minimal security, because many user passwords

    • DSL vs Cable Modem

      DSL vs Cable Modem

      Two of the most popular technologies that offer speedy access to the World Wide Web are DSL broadband and the cable modem. There are several reasons why this is the case and the first one is that both of these Internet connections are considerably faster than the standard dialup connections. However, when you compare the

    • SNMP (Simple Network Management Protocol)

      SNMP (Simple Network Management Protocol)

      Network management systems use SNMP (Simple Network Management Protocol) to communicate with network elements. For this to work, the network element must be equipped with an SNMP agent. Most professional grade network hardware comes with an SNMP agent built in. These agents must be enabled and configured to communicate with the network management system. Operating

    • WEP Key Passphrase

      WEP Key Passphrase

      A wireless network key is an encryption key for that prevents unauthorized users from accessing a specific wireless network. The user creates wireless network keys, which either a wireless router or a computer that is connected to that wireless router can manage. Wireless network keys can be any length greater than eight characters and can

    129 queries in 0.396 seconds.