Found 37 entries
A little about VOIP
VOIP is an advanced technology that is used as one the modes of telecommunication. It has created its own space in the world of telecommunication. The ...
Basics of the Cisco IOS
Cisco's Internetwork Operating System (IOS) software platform is implemented on the varied hardware used in this course. It is the embedded software a ...
Cisco Router Configuration Basics
Note that this tutorial does not cover physically connecting the router to the networks it will be routing for. It covers operating system configur ...
Dial-on-Demand Routing
Dial-on-Demand routing refers to a collection of Cisco features that allows two or more Cisco routers to establish a dynamic connection over ...
Difference between RIPv1 and RIPv2
The main difference between RIPv1 and RIPv2 is classless routing. RIPv2 incorporates the addition of the network mask in the update to allow classles ...
Frame Relay Concepts
Frame Relay is a connection-oriented data-link technology that defines single-link virtual circuit multiplexing by assigning connection iden ...
How Virtual LANs (VLANS) Work
Introduction
A VLAN is a grouping of computers that is logically segmented by functions, project teams, or applications without regard to the ...
IEEE 802.11 Architecture
Each computer, mobile, portable or fixed, is referred to as a station in 802.11 [Wireless Local Area Networks].
The difference between a portable ...
IEEE 802.11 Standards
The most critical issue affecting WLAN demand has been limited throughput.
The data rates supported by the original 802.11 standards are too slow t ...
Introduction to Bridging and Switching
Bridges and switches operate principally at Layer 2 of the OSI reference model. As such, they are widely referred to as data-link layer devices. Bridg ...
Introduction to Wireless LAN and IEEE 802.11
A wireless LAN (WLAN or WiFi) is a data transmission system designed to provide location-independent network access between computing devices by using ...
IOS Location Process
The sequence of events the bootstrap code follows to find the image follows:
Check the boot field of the configuration register
...
IP Addressing
In a TCP/IP environment, end stations communicate seamlessly with servers or other end stations. This communication occurs because each node using the ...
ISDN BRI Concepts
ISDN refers to a collection of standards that define a digital architecture that provides an integrated voice/data capability to a location, ...
Layer 2 Encapsulation Protocols
High-Level Data Link Control (HDLC) - HDLC is the default encapsulation type on point-to-point, dedicated links, and circuit-switched connec ...
Major Components of a Router
RAM
Random access memory contains the software and data structures that allow the router to function. The principle software running in RAM is ...
NSLOOKUP
Query Internet name servers
Syntax:
nslookup
nslookup host-to-find
nslookup server
interactive mode:
ns ...
Open Systems Interconnection(OSI) Model
The Open Systems Interconnection (OSI) model began as a reference model, but has since been implemented. It was created by the International Organizat ...
PING
Test a network connection. When using ping for fault isolation, it should first be run on the local host, to verify that the local network interface i ...
Ring Topology
A ring network is a network topology where each node is connected to two other nodes, so as to create a ring. Ring networks tend to be inefficient whe ...
Routing
Routing is the process by which an item gets from one location to another. Many items get routed: for example, mail, telephone calls, and trains. In n ...
Star Topology
A star topology is designed with each node (file server, workstations, and peripherals) connected directly to a central network hub or concentrator.
...
TCP/IP Overview
The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research done by the Defense Advanced Res ...
TRACERT
Trace Route - Find the IP address of any remote host. TRACERT is useful for troubleshooting large networks where several paths can be taken to arrive ...
Tree Topology
A tree topology combines characteristics of linear bus and star topologies. It consists of groups of star-configured workstations connected to a linea ...
Types of Attacks on Web Servers
Newspapers Internet magazines came with cover stories when Denial of service (DoS) attacks assaulted a number of large and very successful companies'' ...
Types of VPN
Types of VPN
Secure VPNs use cryptographic tunneling protocols to provide the intended confidentiality (blocking snooping and thus Packet sniffing) ...
Understanding Access Lists
Router Access Lists manage IP traffic as network access grows and filter packets as they pass through the router.
Access list appl ...
WAN Concepts and Terminology
A WAN is different from a LAN. Unlike a LAN, which connects workstations, peripherals, terminals, and other devices in a single building or other smal ...
What is computer networking?
A network is a collection of connected intelligent computing devices. The connection is not necessarily a fancy one. A connection between two computer ...
What is Telnet?
Telnet is a terminal emulation program for TCP/IP networks such as the Internet. The Telnet program runs on your computer and connects your PC to a se ...
WiFi Security
Security is one of the first concerns of people deploying a Wireless LAN, the 802.11 committee has addressed the issue by providing what is called WEP ...
WiFi Security Tips
Enable Encryption on your Access Point. Using 128-bit encryption or higher makes your Wireless Network more secure. WEP and WPA are entirely ...
WiFi: A little about 802.11b
With 802.11b WLANs, mobile users can get Ethernet levels of performance, throughput, and availability.
The basic architecture, features, and servic ...
WiFi: High Speed with 802.11a
802.11a, is much faster than 802.11b, with a 54Mbps maximum data rate operates in the 5GHz frequency range and allows eight simultaneous channels.
...
WiFi: The Data Link Layer
The data link layer within 802.11 consists of two sublayers: Logical Link Control (LLC) and Media Access Control (MAC).
802.11 uses the same 802.2 ...
WiFi: The Physical Layer
The three physical layers originally defined in 802.11 included two spread-spectrum radio techniques and a diffuse infrared specification.
The rad ...