First strip the jacket from the cable, being very careful not to cut into the individual conductors. It is wise to take a few practice tries to make sure you are not stripping too deep before you end up cutting too much off. The four twisted pairs. Next untwist the pair to make them workable. Try not to untwist to far as the twisting helps eliminate crosstalk and provides for a better quality cable. Next, arrange the eight conductors according the 568b wiring specifications. This next step can take some Read More
HSDPA
High-Speed Downlink Packet Access (HSDPA) is also known as High-Speed Downlink Protocol Access. HSDPA is a protocol for mobile telephones. It is a third-generation (3G) High-Speed Packet Access technology designed to speed up network capacity and data transmission rate of cellular phones. HSDPA is associated with various Universal Mobile Telecommunications System (UMTS) networks. These include the Global System for Mobile (GSM) Communications. Currently, HSDPA can support speeds ranging from 1.8 Mbps to 14.4 Mbps. While this is not very fast compared to various wired networks, it is a major milestone Read More
WEP (Wired Equivalent Privacy)
Wired Equivalent Privacy (WEP) is the encryption algorithm built into the 802.11 (Wi-Fi) standard. WEP encryption uses the RC4 stream cipher with 40 or 104 bit keys and a 24 bit initialization vector. WEP Key Generation Most 802.11 devices allow WEP keys to be entered using an ASCII passphrase or in hexidecimal format. The conversion between these two formats is an industry standard which is shared by almost all vendors of 802.11 equipment. Some 802.11 devices have difficulty using ASCII passphrases or use a non-standard conversion algorithm. For those devices, Read More
802.16
Heard about WiMax or WirelessMAN? What about 802.16? For people new to these techie concepts, it is worth knowing that among the newest innovations that science and technology of today provides, the 802.16 is the one considered by most experts as a powerful technological tool. It is created as a set of standards designed to enhance the performance of wireless networking. Simply put, the 802.16 is made to provide the so-called "last mile" of Internet access' pace to its end users. The WiMax or 802.16 is deemed as one powerful Read More
Top Reasons for Using VoIP
The number one reason to switch to VoIP technology for telephone service is cost reduction. From that base, VoIP is able to provide some compelling features which makes switching even more attractive. Eliminating Phone Lines With VoIP service, you can cancel your traditional phone service through your local telephone company and place all of your telephone calls over your broadband Internet connection. For a residential customer, this will save around $40 a month. For business customers, the savings can be thousands of dollars a month. Eliminating Long Distance Charges VoIP Read More
Honey Monkey
Honey monkeys are a new way of detecting malicious codes from websites that try to exploit certain vulnerabilities of Internet browsers. The honey monkey system works as an automated web/internet patrol system that is designed to detect harmful materials in the Internet, to be able to come up with solutions, and to catch the people behind these malicious acts. A Honey monkey is actually a virtual computer system that works by logging on to websites just like a normal computer system or personal computer does. However, it is actually a Read More
Intrusion Detection System (IDS)
An Intrusion Detection System (IDS) is a system for detecting misuse of network or computer resources. An IDS will have a number of sensors it utilizes to detect intrusions. Example sensors may be: A sensor to monitor TCP connection requests. Log file monitors. File integrity checkers. The IDS system is responsible for collecting data from it's sensors and analyzing this data to give the security administrator notice of malicious activity on the network. IDS technologies are commonly divided into NIDS (Network Intrusion Detection Systems) and HIDS (Host Intrusion Detection Systems). Read More
Port Forwarding
Port forwarding, also known as tunneling, is basically forwarding a network port from one node to the other. This forwarding technique allows an outside user to access a certain port (in a LAN) through a NAT (network address translation) enabled router. Advantages of Port Forwarding Port forwarding basically allows an outside computer to connect to a computer in a private local area network. Some commonly done port forwarding includes forwarding port 21 for FTP access, and forwarding port 80 for web servers. To achieve such results, operating systems like the Read More
VDSL (Very High Bit-Rate Digital Subscriber Line)
Broadband has revolutionized the way we view and use the internet. The two main types of broadband technology that have pervaded the market are Asymmetric Digital Subscriber Line (ADSL) and cable modems. Both these technologies are a huge leap from the days of the 56 Kbps dial-up connections, with maximum speeds ranging between 8 to 10 Mbps. This makes one wonder, what’s next? Another form of DSL, known as VDSL or Very High Bit-Rate Digital Subscriber Line, is widely regarded as the next step in Internet connectivity. This technology is Read More
Extranet
In the modern world of information and light-speed communications, data must be accessible from anywhere. This very issue is why nearly all businesses have created vast networks of computers throughout their offices. These same companies have an extensive web presence to reach their customers all over the world. A problem then arises, however, when a company wishes to communicate with itself but not with the outside world. The problem is then made worse when those companies wish to allow their employees to connect to the company network from outside of Read More
Share on: