• Main Menu
  • Networking

    • Ad Hoc Network

      Ad Hoc Network

      An ad hoc network is a type of peer to peer wireless network mode where wireless devices communicate with each other directly, without the aid of a Wireless Access Point (WAP) device. Wireless networks typically depend on a base station or WAP device to manage and direct the stream of data between wireless devices. In

    • What is ZigBee?

      What is ZigBee?

      ZigBee is a wireless protocol that was developed as an International standard to enable wireless, machine to machine communication, and networks. It is considered the catalyst for constructing “Smart” enabled buildings and homes since it is based on reliable network communications, a pro-longed battery life, and can be simply operated. The ZigBee Alliance is the

    • Bluetooth DUN

      Bluetooth DUN

      Bluetooth dial-up networking (DUN) is a wireless Internet technology that refers to connecting to the Internet with a Bluetooth enabled cell phone as a modem. Bluetooth DUN offers a low band alternative where there are no local hotspots to provide high speed wireless Internet access. Bluetooth is a wireless protocol that allows wireless communication to

    • Internet Backbone

      Internet Backbone

      In 2005, the one billionth Internet user logged on to the World Wide Web. Hundreds of thousands of new users log in for the first time each week. It is estimated that the 2 billion user mark will be reached in less than 10 years from now. There is no question that the World Wide

    • Belkin Router Default Password

      Belkin Router Default Password

      Belkin is a leading manufacturer of networking devices such as modems, wireless routers, and network storage devices. Belkin also produces a number of other wireless access devices and USB based modem cards and markets a number of data plans for some of the largest Internet Service Providers. Belkin Router Default Password As with any other

    • IP Access Lists

      IP Access Lists

      Access lists are used to control and manage access of interesting and non interesting traffic. Access lists are powerful tools for controlling access both to and from network segments. They can filter uninteresting packets and be used to implement security policies. Using the right combination of access lists, network managers will be armed with the

    • Frame vs Packet

      Frame vs Packet

      A packet and a frame are both packages of data moving through a network. A packet exists at Layer 3 of the OSI Model, whereas a frame exists at Layer 2 of the OSI Model. Layer 2 is the Data Link Layer. The best known Data Link Layer protocol is Ethernet. Layer 3 is the

    • Session Layer

      Session Layer

      The Session Layer is Layer 5 of the OSI (Open Systems Interconnection) Model of computer networking. The Session Layer is directly after the Transport Layer and before the Presentation Layer, allowing it to interact with applications as well as network components. The Session Layer is responsible for opening, maintaining, and closing all sessions between multiple

    • VRRP (Virtual Router Redundancy Protocol)

      VRRP (Virtual Router Redundancy Protocol)

      VRRP stands for Virtual Router Redundancy Protocol. The VRRP is a commonly used method to avoid network outages during important data transfers. Data transfer can be highly susceptible to failure when sent by a single router network. To combat this problem, VRRP creates a virtual connection between routers within the same network and ties them

    • What is the Function of SerDes?

      What is the Function of SerDes?

      SerDes (pronounced sir-dees) stands for Serializer/Deserializer. It is a set of blocks that is commonly found in high speed communications. SerDes’ general purpose is to compensate for limited input/output. The blocks can convert data between serial data and interfaces that are parallel in different directions. Functions of SerDes The generic function is made up of

    123 queries in 0.166 seconds.