• Main Menu
  • Networking

    • Range Extender

      Range Extender

      A range extender is a device that can be placed between two connection points in order to bounce a wireless signal from one device to another. Range extenders work great for large offices and factories that need high-speed Internet throughout the premises without running cables or purchasing satellite Internet. Range extenders can be used with

    • How Unix and Windows traceroutes differ

      How Unix and Windows traceroutes differ

      The Unix/Linux `traceroute` command and the Microsoft Windows `tracert` commands both accomplish the task of tracing network paths, but they do it in slightly different ways. Both of these tools for tracing network routes send out a packet wth TTL (Time To Live) set to 1 and report it’s destnation. Then, they send out a

    • WAP (Wireless Application Protocol)

      WAP (Wireless Application Protocol)

      Wireless Application Protocol (WAP) is a technical standard for accessing information over a mobile wireless network. A WAP browser is a web browser for mobile devices that use the protocol. Before the introduction of WAP, mobile service providers had limited opportunities to offer interactive data services, but required interactivity to support Internet and applications such

    • ADSL Modems

      ADSL Modems

      Description of ADSL A special Internet service which is available in many areas is called the Asymmetrical Digital Subscriber Line (ADSL). ADSL connections use existing copper telephone lines to transmit data to and from the ISP. These connections may be limited by proximity to the ISP or the telephone company because the data will lose strength through

    • What is PCAP?

      What is PCAP?

      PCAP (Packet Capture) is a protocol for wireless Internet communication that allows a computer or device to receive incoming radio signals from another device and convert those signals into usable information. It allows a wireless device to convert information into radio signals in order to transfer them to another device. PCAP runs in the background

    • PPP (Point-to-Point Protocol)

      PPP (Point-to-Point Protocol)

      PPP (Point-to-Point Protocol) is the most widely used method for transporting IP packets over a serial link between the user and the Internet Service Provider (ISP). Although PPP is primarily used over dialup lines, variants such as PPoE (PPP over Ethernet) and PPoA (PPP over ATM) extend PPP to new data-link layer protocols. PPP was

    • Ad Hoc Network

      Ad Hoc Network

      An ad hoc network is a type of peer to peer wireless network mode where wireless devices communicate with each other directly, without the aid of a Wireless Access Point (WAP) device. Wireless networks typically depend on a base station or WAP device to manage and direct the stream of data between wireless devices. In

    • How Does Wireless Networking Work?

      How Does Wireless Networking Work?

      Wireless networking has grown from only being a tool employed by academia and Fortune 500 companies to being deployed in locations such as McDonald’s, Starbucks, and gas stations for free consumer use over the past decade. Consumers can install a wireless network in the home for minimal cost today, and many home theater set-top boxes

    • 502 Proxy Error

      502 Proxy Error

      While surfing the Internet, if an end-user encounters a 502 proxy error, he or she will not be able to view the desired web page. The error message is commonly encountered when accessing websites through a proxy server. The problem is typically caused for one of two reasons: 1 – The Internet Security and Acceleration

    • Network Attacks

      Network Attacks

      Understanding Network Attacks A network attack can be defined as any method, process, or means used to maliciously attempt to compromise network security. There are a number of reasons that an individual(s) would want to attack corporate networks. The individuals performing network attacks are commonly referred to as network attackers, hackers, or crackers. A few

    122 queries in 0.291 seconds.