Advert

Subnet Masks

Last edited by . Total of 11 comments in the discussion.

A subnet mask allows users to identify which part of an IP address is reserved for the network and which part is available for host use. By looking at the IP address alone, especially now with classless inter-domain routing, users cannot tell which part of the address is which. Adding the subnet mask or netmask gives users all the information needed to calculate network and host portions of the address with ease. In summary, knowing the subnet mask can allow users to easily calculate whether IP addresses are on the Read More

Share on:

How to Monitor Wireless Traffic

Last edited by . Total of no comments in the discussion.

Wireless traffic is considered to be those Internet protocol packets that are transmitted through an 802.11a, b, g, n, or i wireless protocol. Monitoring Requirements There are a few things to consider when planning to setup wireless traffic monitoring. First, the user must determine what kind of traffic will be monitored. Is the traffic to or from local systems or to and from a system the user has no direct control of? Second, the user needs to have the appropriate wireless adapter installed in his/her system, with its proper driver Read More

Share on:

DOCSIS (Data Over Cable Service Interface Specification)

Last edited by . Total of no comments in the discussion.

Data Over Cable Service Interface Specification (DOCSIS) defines the interface standards for cable modems and supporting equipment involved in high speed data transfer and distribution over cable television system networks. It permits additional high-speed data transfer over an existing cable TV system and is widely used by television operators to offer Internet access through an already existing hybrid fiber coaxial infrastructure. Other devices that recognize and support DOCSIS include HDTV's and Web-enabled set-top boxes for televisions. In other words, the same cable that brings you CSI can also allow you Read More

Share on:

Cisco Router Configuration

Last edited by . Total of 4 comments in the discussion.

Routers are basically used to connect different networks by allowing them to exchange routing information with each other. A router is a network layer device that maintains a database called an IP routing table by learning the ip addresses of directly connected networks by default. After enabling the IP Routing process, the learned networks can also be seen in the IP routing table by exchanging the IP routing information. Cisco is the worldwide leader in providing routers, switches, and other networking devices. Cisco routers are known as the best solution Read More

Share on:

Single Sign-On

Last edited by . Total of no comments in the discussion.

Single Sign-On is a term which describes an enterprise-wide identity management system. In a Single Sign-On system, each user has one username and one password for all of the systems, devices, and applications to which she has access. The two methods utilized by Single Sign-On systems to do this are: Password synchronization – The Single Sign-On system copies the username and password configuration to each system Centralized account management – Each system is configured to query a central database for user authentication and authorization Single Sign-On systems have the promise Read More

Share on:

Understanding Cisco IOS

Last edited by . Total of 1 comment in the discussion.

Cisco IOS As you know that Cisco is the worldwide leader in providing the hardware solutions as well as the software solutions of LAN and WAN. The hardware solutions mean that the hardware devices such as switches and routers etc but what is the meaning of software solution? The software solution actually means that Cisco manufactures manageable devices with a CLI based Cisco IOS Software installed in these devices. With the help of this software you can better manage your network and internetwork environment. Once you have performed and inspection Read More

Share on:

How to Change a WEP Key

Last edited by . Total of 1 comment in the discussion.

A WEP (Wired Equivalent Privacy) key is a type of security algorithm for wireless devices that protects a computer from hackers and people who are trying to access someone else’s Internet connection. It consists of the numbers 0-9 and the letters A-F and can be 10, 26, or 58 characters long. For devices within the same wireless network to communicate with each other, the user must enter the same WEP key on each device. To make this easier, many devices are equipped with software that converts a regular text-based password Read More

Share on:

192.168

Last edited by . Total of 6 comments in the discussion.

The Internet Assigned Numbers Authority (IANA) has allocated three IP address ranges that are to be exclusively used for private Internet networks: 10.0.0.0 – 10.255.255.255 (10/8 prefix) 172.16.0.0 – 172.31.255.255 (172.16/12 prefix) 192.168.0.0 – 192.168.255.255 (192.168/16 prefix) The first block “10.0.0.0 – 10.255.255.255” is referred to as the 24-bit block, the second “172.16.0.0 – 172.31.255.255” as the 20-bit block, and the third and final block “192.168.0.0 – 192.168.255.255” is referred to as the 16-bit block. 192.168.0.0 – 192.168.255.255 is a set of 256 contiguous Class C network numbers. (IP addresses Read More

Share on:

Routing Protocols

Last edited by . Total of no comments in the discussion.

A routing protocol is the implementation of a routing algorithm in software or hardware. A routing protocol uses metrics to determine which path to utilize to transmit a packet across an internetwork. The metrics that routing protocols use include: Number of network layer devices along the path (hop count) Bandwidth Delay Load MTU Cost Routing protocols store the results of these metrics in a routing table. A router connects different networks with each other to share packets of data. To route a packet, a router needs to know: Destination IP Read More

Share on:

What is an OBEX?

Last edited by . Total of no comments in the discussion.

OBEX (Object Exchange) is primarily a communications protocol. The Infrared Data Association maintains the protocol standard and is sometimes referred to as Infrared OBEX or IrOBEX. The protocol’s primary purpose is to exchange binary objects between two devices. As a result, the OBEX protocol acts similar to the HTTP protocol and lets the user’s computer make requests from the server or send pictures, calendar entries, files, business/vCards to the server. What Type of Networks Use the OBEX Protocol? The OBEX protocol is normally used with ad hoc wireless networks. Prior Read More

Share on: