• Main Menu
  • Networking

    • Types of Network Hardware

      Types of Network Hardware

      The label network hardware is generally given to any piece of equipment with the task of moving data. Common categories of network hardware include: Routers Switches Network Interface Cards         Routers             A router is a network device with interfaces in multiple networks whose task is to copy packets from one network

    • Collision Domain

      Collision Domain

      A computer network can be segmented physically and logically. A collision domain is one of the logical network segments in which the data packets can collide with each other. One of the most common protocols used when referring to a collision domain is the Ethernet protocol. Collision domains are often referred to as ‘Ethernet segments.’

    • What is ZigBee?

      What is ZigBee?

      ZigBee is a wireless protocol that was developed as an International standard to enable wireless, machine to machine communication, and networks. It is considered the catalyst for constructing “Smart” enabled buildings and homes since it is based on reliable network communications, a pro-longed battery life, and can be simply operated. The ZigBee Alliance is the

    • Subnetting


      Subnetting is the process of breaking down an IP network into smaller sub-networks called “subnets.” Each subnet is a non-physical description (or ID) for a physical sub-network (usually a switched network of host containing a single router in a multi-router network). In many cases, subnets are created to serve as physical or geographical separations similar

    • Routing Software

      Routing Software

      Most networks currently run on hardware-based routers from vendors like Cisco, Foundry, and Juniper. Computing power has advanced to the point where this is not necessary. General purpose computing platforms can replace these expensive dedicated hardware routers. These software routing platforms usually run on some version of free or inexpensive Unix. These are a few

    • Fiber Optic Patch Panel

      Fiber Optic Patch Panel

      Fiber optic patch panel, also known as the fiber distribution panel, is used mainly in fiber optic cable management. It helps network technicians in minimizing the clutter of wires when setting up fiber optic cables. It terminates the fiber optic cable while providing access to the cable’s individual fibers for cross connection. They are also

    • MMDS (Multichannel Multipoint Distribution Service)

      MMDS (Multichannel Multipoint Distribution Service)

      MMDS (Multichannel Multipoint Distribution Service) is a broadband wireless point-to-multipoint specification utilizing UHF (Ultra High Frequency) communications. MMDS operates on FCC licensed frequencies. The FCC divided the United States into BTA's (Basic Trading Areas) and auctioned the rights to transmit on the MMDS bands in each of those areas to MMDS service providers. The MMDS

    • 802.11a


      802.11a is one of the many standards used for high speed wireless networks, usually referred to as Wifi. This standard was created by the IEEE (Institute of Electrical and Electronics Engineers) in 1999 and uses several different frequencies including 5.15-5.35/5.47-5.725/5.725-5.875 GHz to send and receive data from one electronic or computer device to another. There

    • Packet Sniffers

      Packet Sniffers

      Packet sniffing is listening (with software) to the raw network device for interesting packets. When the software sees a packet that fits certain criteria, it logs it to a file. The most common criterion for an interesting packet is one that contains words like “login” or “password.” To packet sniff, obtain or code a packet

    • Responding to Network Attacks and Security Incidents

      Responding to Network Attacks and Security Incidents

      Network Attacks Review A network attack occurs when an attacker or hacker uses certain methods or technologies to maliciously attempt to compromise the security of a network. Hackers attack corporate networks to use data for financial gain or for industrial espionage, to illegally use user accounts and privileges, to run code to damage and corrupt

    124 queries in 0.284 seconds.