• Main Menu
  • Networking

    • How to Setup a Belkin Router

      How to Setup a Belkin Router

      To begin setting up your Belkin router, you will need: PC or laptop. Cable or DSL modem (one that has a functional Internet connection when plugged directly into your PC or laptop.) Ethernet network cable(s). Verify The Connection To begin, connect your cable or DSL modem directly to your PC or laptop using an Ethernet

    • How to Access Wireless Router Settings

      How to Access Wireless Router Settings

      What is a Wireless Router? A wireless router is a device that wirelessly connects multiple computers and devices to the Internet. Wireless routers’ design and capabilities vary and they drastically range in price, but are used for the same function. Wireless routers are usually very easy to setup and many provide the user with built-in

    • DSLAM (Digital Subscriber Line Access Multiplexer)

      DSLAM (Digital Subscriber Line Access Multiplexer)

      Faster connections to the Internet from phone lines are possible through a Digital Subscriber Line Access Multiplexer (abbreviated to DSLAM).  The role of this network device is located in the telephone exchanges of providers for the services.  The service works by taking advantage of the multiplexing techniques used to connect several Digital Subscriber Lines to

    • WEP Key Passphrase

      WEP Key Passphrase

      A wireless network key is an encryption key for that prevents unauthorized users from accessing a specific wireless network. The user creates wireless network keys, which either a wireless router or a computer that is connected to that wireless router can manage. Wireless network keys can be any length greater than eight characters and can

    • Dynamic DNS

      Dynamic DNS

      Dynamic DNS is a technology that allows you to update the IP address of a domain in real time. In order to fully understand how Dynamic DNS works, it is important to first understand domain names and name servers. Essentially, all website domain names are held on computer servers known as name servers. These servers

    • Ethernet Fiber Media Converter

      Ethernet Fiber Media Converter

      An Ethernet fiber media converter is a device that allows a connection to be made between an Ethernet and a fiber optic cable. This type of connection is important in situations where both cable types are used in a single household or office. Because telephone companies often use fiber optic cables to deliver telephone and

    • DSL vs Cable Modem

      DSL vs Cable Modem

      Two of the most popular technologies that offer speedy access to the World Wide Web are DSL broadband and the cable modem. There are several reasons why this is the case and the first one is that both of these Internet connections are considerably faster than the standard dialup connections. However, when you compare the

    • Ethernet at the Physical Layer

      Ethernet at the Physical Layer

      Ethernet is the most popular Local Area Network architecture that was jointly developed by Digital Equipment Corporation, Intel Corporation and Xerox Corporation. It consists of certain specifications and standards as well as hardware devices and components. Ethernet provides services corresponding to physical layer and data link layer of the OSI reference model. Each Ethernet physical

    • IKE (Internet Key Exchange)

      IKE (Internet Key Exchange)

      The term Internet Key Exchange refers to the networking protocol that designed to configure a SA (security association) within the IPsec protocol suite of applications. Internet Key Exchange (or IKE) is constructed on top of ISAKMP and the Oakley protocol and is often used in the VPN tunneling process. X.509 certificates are used for authentication

    • VoIP Security

      VoIP Security

      Any technology that involves transfer of data or information is prone to compromised security. It happens with telephones, cell phones, email and Internet transactions. Because VoIP (Voice Over Internet Protocol) has the Internet as its mode of transference it’s possible to have your Internet-based called intercepted. To make matters worse, there are techno-troublemakers who are

    networking
    162 queries in 0.420 seconds.