An ad hoc network is a type of peer to peer wireless network mode where wireless devices communicate with each other directly, without the aid of a Wireless Access Point (WAP) device. Wireless networks typically depend on a base station or WAP device to manage and direct the stream of data between wireless devices. In an ad hoc setup, the network is built spontaneously as and when devices communicate with each other. These devices should ideally be within close range of each other; however quality of connection and speed of Read More
Ethernet Cable Pinout
Ethernet cable connects a network interface card (NIC) with a hub or Ethernet switch. Ethernet cables can be purchased from a computer store. They come in two categories, flat and braided. The flat or solid cable is used when there is a need for a longer cable run. However, it is not flexible. Thus, its position is fixed. The braided cable is easier to use and is more flexible. However, it is useful only in places where a shorter cable run is needed. In the Ethernet cable pinout there are Read More
Multilayer PCB
A printed circuit board (PCB) is a thin board "printed" with electrical wires and made from fiber glass or similar material. PCBs are commonly used in computer devices such as motherboards, network interface cards, and RAM chips. They are relatively cheap and quite fast. When the PCB is fabricated with several layers placed over one another, it is known as a multilayer PCB. The multiple layers establish a reliable set of predetermined interconnections for the electronic circuits. There are several techniques that can be used to accomplish this task. Some Read More
WAP (Wireless Application Protocol)
Wireless Application Protocol (WAP) is a technical standard for accessing information over a mobile wireless network. A WAP browser is a web browser for mobile devices that use the protocol. Before the introduction of WAP, mobile service providers had limited opportunities to offer interactive data services, but required interactivity to support Internet and applications such as: Email by mobile phone Tracking of stock-market prices Sports results News headlines Music downloads WAP Clients WAP clients exist for platforms as varied as PalmOS, EPOC, Windows CE, FLEXOS, OS/9, and JavaOS. WAP Networks Read More
How to Increase a WiFi Signal
The first thing you can try to increase a WiFi signal is to move the laptop computer or mobile device closer to the source of the network that is being accessed. If you have control over the router of the network, you can increase the wireless signal by placing the router on a high area such as a counter or desk rather than have it sitting on the floor. You can also increase the signal by pointing the router’s antenna in a certain direction or placing the router itself in Read More
WiMAX
WiMAX stands for Worldwide Interoperability for Microwave Access. WiMAX is a broadband wireless point-to-multipoint specification from the IEEE 802.16 working group. Unlike wireless LAN technologies such as Wi-Fi (802.11), WiMAX is designed to operate as a wireless MAN (Metropolitan Area Network). This places WiMAX in the same class as the earlier 802.16 standards, MMDS and LMDS. WiMAX Frequencies WiMAX variants operate both on FCC licensed frequencies and on unlicensed frequencies. Licensed WiMAX operates in the 10 to 66GHz range; unlicensed WiMAX operates in the 2 to 11Ghz range. WiMAX Bandwidth Read More
DHCP Server
A DHCP (Dynamic Host Configuration Protocol) server is used on networks that allow computers to be automatically configured for network communication. A DHCP server automatically assigns an IP address to a computer connected to a network from a pre-defined range of IP addresses. It ensures that no two computers on a network are assigned the same address. DHCP can be used for both Ipv4 and Ipv6 network addressing. However, lpv4 and lpv6 are considered separate protocols for each model of IP address assignments. How Does a DHCP Server Work? When Read More
Identity Management
Identity management is a discipline which encompasses all of the tasks required to create, manage, and delete user identities in a computing environment. Identity Management is often abbreviated IdM. Identity Management Tasks During Account Provisioning Identity management begins with the creation of the user account and the assignment of appropriate attributes to the account. The user account is then provisioned into all of the systems to which that user is to be given access. Identity Management Tasks During the Account Lifetime Identity management tasks during the lifetime of the user Read More
FTP Commands
The usable FTP commands will differ from one FTP client to the next, but these are a set of fairly standard FTP commands as implemented in the FreeBSD FTP client. ! [command [args]] Invoke an interactive shell on the local machine. If there are arguments, the first is taken to be a command to execute directly, with the rest of the arguments as its arguments. $ macro-name [args] Execute the macro macro-name that was defined with the macdef command. Arguments are passed to the macro unglobbed. account [passwd] Supply a Read More
MAC Address Filtering
MAC Address filtering is a technique that is implemented on many wireless networks to filter which devices are able to connect to the wireless network. MAC Address filtering allows an administrator to allow specific devices to connect to the network while blocking all other devices. MAC Address filtering is a free service provided by most routers and/or access points and prevents unauthorized users from downloading illegal content, accessing network resources, and using additional bandwidth. How MAC Address Filtering Works MAC Address filtering is accessible through most routers and can Read More
Share on: