Advert

192.168.0.1 – What Are its Uses and Why is it Important?

Last edited by . Total of no comments in the discussion.

192.168.0.1 is a private IP address that is commonly used by Netgear and D-Link routers. The Netgear and D-Link brands are competitors to the Linksys division of Cisco, Incorporated and make a large number of the Internet routers used world-wide. The network address is not granted to the Netgear and D-Link companies exclusively; however, as other major router manufacturers are free to choose to use same default address if desired. If there is another router installed on a local network that uses the same default IP, it may be changed Read More

Share on:

Denial of Service (DoS) Attacks

Last edited by . Total of 3 comments in the discussion.

A Denial of Service (DoS) attack is one that attempts to prevent the victim from being able to use all or part of his/her network connection. A denial of service attack may target a user to prevent him/her from making outgoing connections on the network. It may also target an entire organization to either prevent outgoing traffic or to prevent incoming traffic to certain network services, such as the organizations web page. Denial of service attacks are much easier to accomplish than remotely gaining administrative access to a target system. Read More

Share on:

DHCP Scope

Last edited by . Total of 5 comments in the discussion.

A DHCP scope is a valid range of IP addresses that are available for assignment or lease to client computers on a particular subnet. In a DHCP server, a scope is configured to determine the address pool of IPs that the server can provide to DHCP clients. Scopes determine which IP addresses are provided to the clients. They should be defined and activated before DHCP clients use the DHCP server for its dynamic IP configuration. Users can configure as many scopes on a DHCP server as required in the network Read More

Share on:

How to Become a VoIP Reseller

Last edited by . Total of 23 comments in the discussion.

If you are serious about reselling Voice over Internet Protocol (VoIP) services, there are some questions you will need to ask yourself first. Here are some simple guidelines to help you determine if and how you should pursue your goal of becoming a VoIP reseller. Know the Service If you really want to be a reseller for VoIP services, you need at least a basic working knowledge of how VoIP works and what type of applications are currently commonly used. Among the things you will need to understand are gateways Read More

Share on:

RG-6

Last edited by . Total of 3 comments in the discussion.

RG-6 cable is one of the more common types of coaxial cables used for commercial and household purposes. The term RG-6 is a generic label that can be used to describe a whole range of cable designs. In fact, all cable designs described under RG-6 may well differ from one another in center conductor composition, dielectric type, or shielding characteristics. RG-6 was originally a military specification meaning Radio Guide, but this term has become obsolete due to lack of use. Today it is used to describe coaxial cables with 75-ohm Read More

Share on:

Plenum Cable

Last edited by . Total of no comments in the discussion.

The plenum is hidden space within a building which is used for HVAC (Heating, Ventilation, and Air Conditioning) and to run cables. Plenum space is normally above a suspended ceiling or under a raised floor. Buildings without plenum spaces will have cabling and HVAC ducts within plain view. The plenum space is normally used to accommodate the communication wires for the building's computer and telephone network. Recent studies have shown that wiring and cabling within the plenum space could be dangerous and be exposed to fire/burning possibilities. Plenum cable is Read More

Share on:

UTP (Unshielded Twisted Pair)

Last edited by . Total of 6 comments in the discussion.

UTP (Unshielded Twisted Pair) is a regular copper wire that joins many home and many business computers to the telephone company. UTP is the most common form of twisted pair wiring, because it is less expensive and easier to work with than STP (Shielded Twisted Pair). It is used in Ethernet 10Base-T and 100Base-T networks as well as in home and office telephone wiring. Two insulated copper wires are twisted around each other to decrease crosstalk or electromagnetic induction between pairs of wires. The twist in UTP helps to reduce Read More

Share on:

How to Use Telnet

Last edited by . Total of no comments in the discussion.

Telnet is a utility program that allows remote access to other computers if they are installed on a network or have access to the Internet. Telnet lets users run commands on the remote computer. It can execute commands faster than the Web and other popular remote computer access applications. Telnet is not widely used as it does not have a secure connection to the remote computer. However, some computer users still prefer it over LAN connections. What Do You Need to Establish a Telnet Connection? Anyone who wants to establish Read More

Share on:

How to Disable the XP Firewall

Last edited by . Total of no comments in the discussion.

The firewall application built into Microsoft Windows XP protects your computer from many unpleasant network attacks. Unfortunately, the XP firewall also occasionally causes a legitimate application to fail. It is sometimes necessary to disable the Windows XP firewall in order to enable these applications to work. Steps to Disable the Windows XP firewall Click the button. Highlight . Click . Click . Check the circle beside . Click the button.

Share on:

Collision Domain

Last edited by . Total of no comments in the discussion.

A computer network can be segmented physically and logically. A collision domain is one of the logical network segments in which the data packets can collide with each other. One of the most common protocols used when referring to a collision domain is the Ethernet protocol. Collision domains are often referred to as ‘Ethernet segments.’ The term ‘collision domain’ is also used when describing the circumstances in which a single network device sends packets throughout a network segment and forces every other device in that network segment to pay attention Read More

Share on: