• Main Menu
  • Networking

    • VLAN Hopping

      VLAN Hopping

      VLAN Hopping is one of the primary VLAN based attacks used by hackers to infiltrate network security. VLAN hopping is used to attack a network by sending packets to a port which is generally not accessible. VLAN hopping attacks are mainly conducted in the Dynamic Trunking Protocol and, in some cases; the attacks are targeted

    • DOCSIS (Data Over Cable Service Interface Specification)

      DOCSIS (Data Over Cable Service Interface Specification)

      Data Over Cable Service Interface Specification (DOCSIS) defines the interface standards for cable modems and supporting equipment involved in high speed data transfer and distribution over cable television system networks. It permits additional high-speed data transfer over an existing cable TV system and is widely used by television operators to offer Internet access through an

    • Antenna Types

      Antenna Types

      In antenna engineering, a dipole is the most basic type of antenna and serves as basic framework for all other antennas. Dipoles consist of a metal rod that acts as a conductor with a radio feed line at its core. The conductor splits the signal and creates a positive electrical charge on one end of

    • ISDN (Integrated Services Digital Network)

      ISDN (Integrated Services Digital Network)

      ISDN (Integrated Services Digital Network) is a system of digital phone connections that has been designed for sending voice, video, and data simultaneously over digital or ordinary phone lines, with a much faster speed and higher quality than an analog system can provide. ISDN is basically a set of protocol for making and breaking circuit

    • ADSL Router

      ADSL Router

      An ADSL router is also known as a DSL modem. The router connects the computer to the DSL phone line so the ADSL service can be used. Some countries also use the term NTBBA (Network Termination BroadBand Access). There are some ADSL routers that are also capable of sharing a single Internet connection with a

    • MPLS (Multi Protocol Label Switching)

      MPLS (Multi Protocol Label Switching)

      MPLS stands for Multi Protocol Label Switching. The MPLS is often referred to as the layer in between the Data Link and Network layers because of where it operates. The MPLS serves as a method to forward packets of data easily by using labels. What are the Data Link and Network layers? In the seven-layer

    • Routing Information Protocol

      Routing Information Protocol

      The Routing Information Protocol (RIP) is the IGP standard protocol that is used on Local Area Networks (LANs). It helps to ensure a higher degree of network stability by quickly re-routing network packets if one of the network connections goes offline. When the RIP is active on a network, users experience little to no service

    • WAP (Wireless Application Protocol)

      WAP (Wireless Application Protocol)

      Wireless Application Protocol (WAP) is a technical standard for accessing information over a mobile wireless network. A WAP browser is a web browser for mobile devices that use the protocol. Before the introduction of WAP, mobile service providers had limited opportunities to offer interactive data services, but required interactivity to support Internet and applications such

    • Network Attacks

      Network Attacks

      Understanding Network Attacks A network attack can be defined as any method, process, or means used to maliciously attempt to compromise network security. There are a number of reasons that an individual(s) would want to attack corporate networks. The individuals performing network attacks are commonly referred to as network attackers, hackers, or crackers. A few

    • UDP (User Datagram Protocol)

      UDP (User Datagram Protocol)

      User Datagram Protocol or UDP is part of the Internet Protocol suite. By using UDP, programs running on different computers on a network can send short messages known as Datagrams to one another. UDP can be used in networks where TCP is traditionally implemented, but unlike TCP, it does not guarantee reliability or correct data

    networking
    361 queries in 0.754 seconds.