Advert

DHCP (Dynamic Host Configuration Protocol)

Last edited by . Total of 3 comments in the discussion.

An IP address can be defined as a unique numeric identifier (address) that is assigned to each computer operating in a TCP/IP based network. Manually configuring computers with IP addresses and other TCP/IP configuration parameters is not an intricate task. However, manually configuring thousands of workstations with unique IP addresses would be a time consuming, and cumbersome experience. When you manually assign IP addresses, you increase the risk of duplicating IP address assignments, configuring the incorrectsubnet masks, and incorrectly configuring other TCP/IP configuration parameters. This is where the Dynamic Host Read More

Share on:

LDAP (Lightweight Directory Access Protocol)

Last edited by . Total of no comments in the discussion.

LDAP (Lightweight Directory Access Protocol) is a protocol for communications between LDAP servers and LDAP clients. LDAP servers store "directories" which are access by LDAP clients. LDAP is called lightweight because it is a smaller and easier protocol which was derived from the X.500 DAP (Directory Access Protocol) defined in the OSI network protocol stack. LDAP servers store a hierarchical directory of information. In LDAP parlance, a fully-qualified name for a directory entry is called a Distinguished Name. Unlike DNS (Domain Name Service) FQDN's (Fully Qualified Domain Names), LDAP DN's Read More

Share on:

VLAN (Virtual Local Area Network)

Last edited by . Total of 19 comments in the discussion.

VLAN (Virtual Local Area Network) is a logical local area network (or LAN) that extends beyond a single traditional LAN to a group of LAN segments, given specific configurations. Since a VLAN is a logical entity, its creation and configuration is done completely in software. How is a VLAN Identified? Since a VLAN is a software concept, identifiers and configurations for a VLAN must be properly prepared for it to function as expected. Frame coloring is the process used to ensure that VLAN members or groups are properly identified and Read More

Share on:

9 to 25 Pin Serial Adapter Pinout

Last edited by . Total of no comments in the discussion.

This adapter will enable you to connect a 25 pin male serial cable to a 9 pin female serial connector on your computer. 9 pin female connector 25 pin male connector 9-Pin to 25-Pin Adapter Pinout Signal 9-Pin 25-Pin Carrier Detect 1 8 Receive Data 2 3 Transmit Data 3 2 Data Terminal Ready 4 20 System Ground 5 7 Data Set Ready 6 6 Request to Send 7 4 Clear to Send 8 5 Ring Indicator 9 22 This data was contributed by the team at The Hardware Book.

Share on:

Hostname

Last edited by . Total of 1 comment in the discussion.

The term 'HostName' refers to the name given to a particular machine that is part of a computer network. The machine can be a simple computer, a network server, a network printer, a fax machine or copier, a modem, a network storage device or any other electronic device connected to a network. Each of these machines can be assigned a unique hostname by which they are identified in the network. There are various naming systems used to assign hostnames and each of them has their own naming convention that is Read More

Share on:

802.11i

Last edited by . Total of no comments in the discussion.

802.11i is a draft IEEE standard for 802.11 wireless network security. 802.11i defines several new standards, and also relies heavily on many existing standards. New Protocols in 802.11i 802.11i introduced the RSN (Robust Secure Network) protocol for establishing secure communications. 802.11i also introduced the WRAP (Wireless Robust Authentication Protocol) and CCMP encryption protocols. WRAP and CCMP are both based upon the AES encryption algorithm. 802.11i utilizes EAP (Extensible Authentication Protocol) as the end-to-end transport for authentication methods between the wireless NIC (Network Interface Card) and the WAP (Wireless Access Point). Read More

Share on:

WiFi Scanner

Last edited by . Total of no comments in the discussion.

There are many different products and services available, especially via the Internet, that allow users to detect and crack wireless computer networks. The majority of these programs are illegal, extremely complicated to use, or both. The WiFi Scanner, however, is easy to use and allows the user to detect networks that are further away while increasing signal strength for those networks. This article will explore the WiFi Scanner and define what it does. What is WiFi Scanner The WiFi Scanner, unlike other wireless network detection devices, is an external device Read More

Share on:

Routing Software

Last edited by . Total of no comments in the discussion.

Most networks currently run on hardware-based routers from vendors like Cisco, Foundry, and Juniper. Computing power has advanced to the point where this is not necessary. General purpose computing platforms can replace these expensive dedicated hardware routers. These software routing platforms usually run on some version of free or inexpensive Unix. These are a few of the competing open source routing software packages. Quagga Quagga is a routing software suite, providing implementations of OSPFv2, OSPFv3, RIP v1 and v2, RIPv3 and BGPv4 for Unix platforms, particularly FreeBSD, Linux, Solaris and Read More

Share on:

How to Change an IP Address

Last edited by . Total of 21 comments in the discussion.

The IP address is a logical address assigned to a network card in order to establish communication over the network and identify the computer over it. Network administrators usually assign IP addresses based on certain rules and regulations. Reasons to Change an IP Address Even if someone is part of a small network routed through a single IP address, the people outside that network can only see the IP address of the gateway being used. If someone is directly connected to the Internet cloud, it is basically the same thing. Read More

Share on:

UDP (User Datagram Protocol)

Last edited by . Total of 6 comments in the discussion.

User Datagram Protocol or UDP is part of the Internet Protocol suite. By using UDP, programs running on different computers on a network can send short messages known as Datagrams to one another. UDP can be used in networks where TCP is traditionally implemented, but unlike TCP, it does not guarantee reliability or correct data sequencing. Datagrams may go missing without notice or arrive in a different order from how they were sent. David P. Reed formulated the protocol in 1980 and officially defined it in RFC 768. UDP uses Read More

Share on: