• Main Menu
  • Networking

    • CDMA-2000 1xRTT

      CDMA-2000 1xRTT

      CDMA-2000 1xRTT is a 3G wireless technology based on the CDMA platform. The 1x in 1xRTT refers to 1x the number of 1.25MHz channels. The RTT in 1xRTT stands for Radio Transmission Technology. The CDMA-2000 1xRTT protocol was developed by Qualcomm. CDMA-2000 1xRTT is a CDMA version of the IMT-2000 standard which was developed by

    • Cisco Switch Configuration

      Cisco Switch Configuration

      When executing an inter-network installation, many mechanisms and components are usually involved. Cisco is superior because it is the only inter-networking company with a well made end to end inter-networking solution. Cisco switches makes the LAN more competent by creating multiple collision domains. Each switch port is a split collision domain. With only one device

    • IP Address Conflict

      IP Address Conflict

      An IP (or Internet Protocol) address conflict occurs when two different systems on the same subnet are assigned or otherwise have their network interface configured to use the same IP address. It is possible to have two systems on different subnets configured with the same IP address, but not have a conflict occur due to

    • QoS (Quality of Service)

      QoS (Quality of Service)

      QoS stands for Quality of Service. QoS is a generic name for a set of algorithms which attempt to provide different levels of quality to different types of network traffic. Queuing One method of implementing QoS is to utilize some sort of advanced queuing algorithm. Simple networks process traffic with a FIFO (First In –

    • Firewalls


      A firewall is a software component that restricts unauthorized inward network access. It allows outward information flow. It is set up to control traffic flow between two networks by configured permissions like Allow, Deny, Block, Encrypt, etc. It is normally employed to avoid illegal access to personal computers or corporate networks from external unsafe entities

    • IP Address

      IP Address

      An IP (Internet Protocol) address is a unique address that different computers on a computer network use to identify and communicate with one another. An IP address is used as an identifier to find electronic devices connected to one another on a network. Therefore, each device in the network must have its own unique address.

    • MIC (Message Integrity Check)

      MIC (Message Integrity Check)

      A message integrity check (MIC), is a security improvement for WEP encryption found on wireless networks. The check helps network administrators avoid attacks that focus on using the bit-flip technique on encrypted network data packets. Unlike the older ICV (Integrity Check Value) method, MIC is able to protect both the data payload and header of

    • Physical Layer

      Physical Layer

      The Physical Layer is the lowest layer in the OSI (Open Systems Interconnection) Model of computer networking and is used to transfer electrical signals that represent data from one place to another. While the Physical Layer does not represent data itself, it does provide a means for that data to move. Essentially, the Physical Layer

    • How Unix and Windows traceroutes differ

      How Unix and Windows traceroutes differ

      The Unix/Linux `traceroute` command and the Microsoft Windows `tracert` commands both accomplish the task of tracing network paths, but they do it in slightly different ways. Both of these tools for tracing network routes send out a packet wth TTL (Time To Live) set to 1 and report it’s destnation. Then, they send out a

    • Westell Default Passwords

      Westell Default Passwords

      Westell is a provider of DSL routers and other DSL-based devices that telephone companies and DSL subscribers use for wireless Internet in homes or offices, instead of using cable or satellite Internet. Westell products generally have the same features as other routers, such as dual antennas, four Ethernet ports, and WPA encryption, but connect to

    672 queries in 0.841 seconds.