• Main Menu
  • Networking

    • How to Use Telnet

      How to Use Telnet

      Telnet is a utility program that allows remote access to other computers if they are installed on a network or have access to the Internet. Telnet lets users run commands on the remote computer. It can execute commands faster than the Web and other popular remote computer access applications. Telnet is not widely used as

    • How to Setup a Wireless Network

      How to Setup a Wireless Network

      For those who have been contemplating setting up a wireless network in their home, there are many reasons to consider how a wireless network will benefit you. One reason that many people decide to set up a wireless network is to share a internet connection. By setting up a wireless network, several family members can

    • Internet Backbone

      Internet Backbone

      In 2005, the one billionth Internet user logged on to the World Wide Web. Hundreds of thousands of new users log in for the first time each week. It is estimated that the 2 billion user mark will be reached in less than 10 years from now. There is no question that the World Wide

    • Antenna Types

      Antenna Types

      In antenna engineering, a dipole is the most basic type of antenna and serves as basic framework for all other antennas. Dipoles consist of a metal rod that acts as a conductor with a radio feed line at its core. The conductor splits the signal and creates a positive electrical charge on one end of

    • Ethernet Crossover Cable

      Ethernet Crossover Cable

      An Ethernet crossover cable can be used to directly connect two network devices through Ethernet. These can either be single computers or they can be networks. Ethernet crossover cables are commonly used for temporarily networking two devices in the absence of a network router, switch, or hub. The principle is the same, but the connection

    • IPsec

      IPsec

      IPSec (IP Security) is a suite of protocols which was designed by Internet Engineering Task Force (IETF) to protect data by signing and encrypting data before it is transmitted over public networks. The IETF Request for Comments (RFCs) 2401-2409 defines the IPSec protocols with regard to security protocols, security associations and key management, and authentication

    • Understanding Cisco IOS

      Understanding Cisco IOS

      Cisco IOS As you know that Cisco is the worldwide leader in providing the hardware solutions as well as the software solutions of LAN and WAN. The hardware solutions mean that the hardware devices such as switches and routers etc but what is the meaning of software solution? The software solution actually means that Cisco

    • IKE (Internet Key Exchange)

      IKE (Internet Key Exchange)

      The term Internet Key Exchange refers to the networking protocol that designed to configure a SA (security association) within the IPsec protocol suite of applications. Internet Key Exchange (or IKE) is constructed on top of ISAKMP and the Oakley protocol and is often used in the VPN tunneling process. X.509 certificates are used for authentication

    • Wireless Routers

      Wireless Routers

      A wireless router is a wireless device that connects one computer or a whole network to another computer or network. It is possible to have a wireless network in a home or office. Travelers definitely come across wireless networks at most international airports. A wireless router, which is responsible for sending information from one computer

    • How to Setup a Linksys Router

      How to Setup a Linksys Router

      One of the most popular router brands on the market is the Linksys router. Despite this popularity; however, end-users are commonly challenged to setup the device in the home, office, or other locations. There are a number of types of Linksys routers on the market to include the WRT54G, WRT610n, and the Linksys e4200 which

    180 queries in 0.478 seconds.