• Main Menu
  • Networking

    • WEP Key Passphrase

      WEP Key Passphrase

      A wireless network key is an encryption key for that prevents unauthorized users from accessing a specific wireless network. The user creates wireless network keys, which either a wireless router or a computer that is connected to that wireless router can manage. Wireless network keys can be any length greater than eight characters and can

    • How to Change WEP to WPA

      How to Change WEP to WPA

      Changing WEP to WPA is a great way to increase a wireless network’s security. These are the two main types of protection available through modern wireless routers: WEP or Wired Equivalent Privacy is a security algorithm that wireless networks use. Hackers can break into wireless networks using WEP very easily with simple software that is

    • MAC Address Filtering

      MAC Address Filtering

      MAC Address filtering is a technique that is implemented on many wireless networks to filter which devices are able to connect to the wireless network. MAC Address filtering allows an administrator to allow specific devices to connect to the network while blocking all other devices. MAC Address filtering is a free service provided by most

    • Frame vs Packet

      Frame vs Packet

      A packet and a frame are both packages of data moving through a network. A packet exists at Layer 3 of the OSI Model, whereas a frame exists at Layer 2 of the OSI Model. Layer 2 is the Data Link Layer. The best known Data Link Layer protocol is Ethernet. Layer 3 is the

    • Where you can get VoIP Training?

      Where you can get VoIP Training?

      Voice over Internet Protocol (VoIP) is a relatively new technology, because of which individual businesses will need someone who is well versed in the intricacies of VoIP. Companies are often willing to invest in training their IT administrators in VoIP because of the sure returns. But, where do you go to obtain a training course

    • Routing Protocols

      Routing Protocols

      A routing protocol is the implementation of a routing algorithm in software or hardware. A routing protocol uses metrics to determine which path to utilize to transmit a packet across an internetwork. The metrics that routing protocols use include: Number of network layer devices along the path (hop count) Bandwidth Delay Load MTU Cost Routing

    • DNS (Domain Name System)

      DNS (Domain Name System)

      Domain Name System (DNS) is an Internet Engineering Task Force (IETF) standard name service which enables applications and users to connect to hosts in TCP/IP based networks by specifying a name. DNS makes it possible to assign domain names to organizations independent of the routing of the numerical IP address. DNS is a hierarchically distributed database that creates hierarchical names

    • Ethernet Cable Pinout

      Ethernet Cable Pinout

      Ethernet cable connects a network interface card (NIC) with a hub or Ethernet switch. Ethernet cables can be purchased from a computer store. They come in two categories, flat and braided. The flat or solid cable is used when there is a need for a longer cable run. However, it is not flexible. Thus, its

    • Multilayer PCB

      Multilayer PCB

      A printed circuit board (PCB) is a thin board "printed" with electrical wires and made from fiber glass or similar material. PCBs are commonly used in computer devices such as motherboards, network interface cards, and RAM chips. They are relatively cheap and quite fast. When the PCB is fabricated with several layers placed over one

    • How to Monitor Wireless Traffic

      How to Monitor Wireless Traffic

      Wireless traffic is considered to be those Internet protocol packets that are transmitted through an 802.11a, b, g, n, or i wireless protocol. Monitoring Requirements There are a few things to consider when planning to setup wireless traffic monitoring. First, the user must determine what kind of traffic will be monitored. Is the traffic to

    networking
    178 queries in 0.741 seconds.