• Main Menu
  • Networking

    • DMZ (DeMilitarized Zone)

      DMZ (DeMilitarized Zone)

      The majority of non-computer professionals think of a DMZ as the strip of land that serves as the buffer between North and South Korea along the 39th parallel north created as part of the Korean Armistice Agreement in 1953. In the computer security field; however, the DMZ (Demilitarized Zone) is either a logical or physical

    • 192.168


      The Internet Assigned Numbers Authority (IANA) has allocated three IP address ranges that are to be exclusively used for private Internet networks: – (10/8 prefix) – (172.16/12 prefix) – (192.168/16 prefix) The first block “ –” is referred to as the 24-bit block, the second “ –”

    • WiFi Antenna

      WiFi Antenna

      A WiFi antenna is a device that sends and or receives radio signals that computers and other electronic devices use to facilitate wireless communication with each other. While WiFi antennas have many uses, they are most commonly found in or on wireless routers. A wireless router is a device that creates a wireless computer network

    • RG-59


      The RG-59 cable is a type of coaxial cable that is used to generate low-power video connections. The cable works on two conductors that are based on a single common axis. It is also used for RF signal connections. The RG-59 cable conducts video and radio frequencies at an impedance of around 75 ohms. The

    • Network Cable is Unplugged

      Network Cable is Unplugged

      When an error message saying, “Network cable is unplugged” is displayed, it generally means that the computer can detect that there is an ASDL and/or Cable Connection pre-configured on the computer, but an Ethernet cable and/or a cable that is supposed to be plugged into the modem is unplugged. In the case that all of

    • Two Factor Authentication

      Two Factor Authentication

      Two factor authentication is term used to describe any authentication mechanism where more than one thing is required to authentate a user. The two components of two factor authentication are: Something you know Something you have Traditional authentication schemes used username and password pairs to authenticate users. This provides minimal security, because many user passwords

    • What is a Dial-Up Connection?

      What is a Dial-Up Connection?

      A dial-up connection is any connection that is connected through a regular phone line. When that phone line is connected to a modem and then configured to dial a specific number, a user can access the Internet. It is the slowest form of Internet connection, but that is a result of also being the most

    • HSCSD (High Speed Circuit Switched Data)

      HSCSD (High Speed Circuit Switched Data)

      Fixed/Mobile Mobile Circuit/Packet Circuit Max Bandwidth 57.6Kb Range Coverage area of host network Frequency Frequency of host network Host Network GSM Definer ETSI (European Telecommunications Standards Institute) URL http://www.etsi.org/ HSCSD (High Speed Circuit Switched Data) is a specification for data transfer over GSM networks. HSCSD utilizes up to four 9.6Kb or 14.4Kb time slots, for

    • Cisco Switch Commands

      Cisco Switch Commands

      Cisco IOS software is installed in the manageable Cisco switches for better LAN management. It delivers network services and enabled networked applications. The Cisco IOS has a command line interface that helps users to execute the Cisco IOS commands. Cisco Switch Commands The Cisco switch IOS has different EXEC modes with distinctive prompts. These modes

    • 802.1Q


      802.1Q is also known as IEEE 802.1Q or VLAN tagging. It defines a virtual local area network. It is a protocol that allows virtual LANs to communicate with one another using a 3-layered router. It was developed as a part of IEEE 802. Why Was The 802.1Q Standard Developed? Large networks use up a lot

    123 queries in 0.189 seconds.