Advert

How to Network Two Computers

Last edited by . Total of 2 comments in the discussion.

Computers are the basis for both modern technology and modern society. The world of today thrives on information and getting that information from one place to another is crucial to survival. Even in one’s own home, multiple computers must be able to communicate with one another and other devices. This may seem like a daunting task for the inexperienced user who has never setup a computer network before but it is rather simple. This article will explain what a computer network is and what it is capable of, go over Read More

Share on:

Power Line Networking

Last edited by . Total of no comments in the discussion.

Power line networking is one of the options in connecting computers to form a home network. This technology powers a "wireless" and "power free" home network. Power line networking does not require the user to install additional cables and power-consuming networking hardware to set up a home network. Instead, power line networking, uses the existing power lines and power outlets in a home to send and receive information from one computer to another. Because power line networking needs no additional wiring and power consuming equipments, it is the cheapest method Read More

Share on:

Null Route

Last edited by . Total of 1 comment in the discussion.

A null route is a route that goes to nowhere. The reason for creating a null route is to prevent your system from sending any data to a remote system. Creating a null route Null routes are usually created using the `route` command. This works under both Windows and Unix, although the syntax differs. The example shows the creation of a null route for an entire Class C network: # route add 193.252.19.0 0.0.0.0 add net 193.252.19.0: gateway 0.0.0.0 We can see the route which this command created using the Read More

Share on:

AAA (Authentication, Authorization, and Accounting)

Last edited by . Total of no comments in the discussion.

AAA (Authentication, Authorization, and Accounting) is a model for access control. Authentication Authentication is proving who you are. Authentication answers the question Who is this person? Authentication is the first component of the AAA (Authentication, Authorization, and Accounting) model for access control. Authentication must precede Authorization, because you must prove who you are before the identity management system can determine what you are authorized to do. Authentication is traditionally accomplished using passwords. More secure authentication technologies include two factor authentication and biometrics. Authorization Authorization is defining what you are allowed Read More

Share on:

IAX (Inter-Asterisk eXchange)

Last edited by . Total of no comments in the discussion.

What is IAX? IAX (Inter-Asterisk eXchange) is a call-control protocol for VoIP (Voice over Ineternet Protocol) native to Asterisk PBX and supported by a number of other softswitches and PBXs. IAX was created by Mark Spencer for Asterisk for VoIP signaling, to replace the earlier call control protocols, H.323 and SIP. IAX Advantages The protocol sets up internal sessions that can use whichever codec is desired for voice transmission. IAX is flexible enough to be used with any type of streaming media, including video. IAX (now most commonly referring to Read More

Share on:

How Does Wireless Internet Work?

Last edited by . Total of no comments in the discussion.

Wireless Internet is one of the most common staples in any household that for some people, it might be bizarre to imagine a time when there was no wireless Internet. Wireless Internet is, as the name suggests, Internet that can be used via a computer without having to be hardwired to the router. In other words, the wireless Internet sends out signals that computers pick up and that can be used to upload and download information. While not as fast as a wired Internet connection, wireless Internet has proven to Read More

Share on:

MMDS (Multichannel Multipoint Distribution Service)

Last edited by . Total of 1 comment in the discussion.

MMDS (Multichannel Multipoint Distribution Service) is a broadband wireless point-to-multipoint specification utilizing UHF (Ultra High Frequency) communications. MMDS operates on FCC licensed frequencies. The FCC divided the United States into BTA's (Basic Trading Areas) and auctioned the rights to transmit on the MMDS bands in each of those areas to MMDS service providers. The MMDS bandplan is available from the FCC at http://wireless.fcc.gov/auctions/data/bandplans/mdsband.pdf. MMDS Specifications Fixed/Mobile Fixed Circuit/Packet n/a Max Bandwidth 10Mb Range 70 miles Frequency 2.5GHz-2.686Ghz Host Network None Definer IEEE (Institute of Electrical and Electronic Engineers) URL http://grouper.ieee.org/groups/802/16/ Read More

Share on:

How to Find DNS Servers

Last edited by . Total of no comments in the discussion.

The easiest way to find DNS servers is by using the ‘nslookup’ tool. Start nslookup Set the search type to NS. This tells nslookup to search for nameservers Finally, enter the domain name for the nameservers being searched for Here are some search examples for the most popular searches: Finding the Lincsat DNS Servers $ nslookup > set type=ns > lincsat.com Server: 66.37.143.12 Address: 66.37.143.12#53 Non-authoritative answer: lincsat.com nameserver = ns2.anywarenetworks.com. lincsat.com nameserver = ns1.anywarenetworks.com. Authoritative answers can be found from: Finding the MCI DNS Servers $ nslookup > set Read More

Share on:

127.0.0.1 – What Are its Uses and Why is it Important?

Last edited by . Total of 35 comments in the discussion.

127.0.0.1 is the loopback Internet protocol (IP) address also referred to as the “localhost.” The address is used to establish an IP connection to the same machine or computer being used by the end-user. The same convention is defined for computer’s that support IPv6 addressing using the connotation of ::1. Establishing a connection using the address 127.0.0.1 is the most common practice; however, using any IP address in the range of 127.*.*.* will function in the same or similar manner. The loopback construct gives a computer or device capable of Read More

Share on:

How to Find Your WEP Key

Last edited by . Total of no comments in the discussion.

What is a WEP Key? WEP, which stands for Wired Equivalent Privacy, is a security algorithm used for IEEE 802.11 wireless routers. One of the problems that comes with using a wireless router is that you are transmitting your data by using waves rather than through wires. This means that the data can be picked up by another computer which is something known as eavesdropping. To prevent against this, WEP was implemented in 1997 to prevent this data from being intercepted and analyzed. WEP has since been replaced by WAP Read More

Share on: