Advert

RJ-45

Last edited by . Total of 2 comments in the discussion.

RJ-45 is the standard connector utilized on 4-pair (8-wire) UTP Unshielded Twisted Pair) cable. It is generally implemented for network and telephone cabling.  Sometimes, it's also utilized for serial network connections. The RJ-45 connector is the standard connector for 10Base-T/100Base-TX Ethernet, ISDN, T1, and modern digital telephone systems. Standard RJ-45 pinouts describe the arrangement of the individual wires required when connecting connectors to a cable. RJ-45 connectors appear similar to the RJ-11 connectors utilized for connecting telephone equipments, but they are a bit wider. RJ-45 stands for "Registered Jack – Read More

Share on:

How to Configure Wireless Security

Last edited by . Total of no comments in the discussion.

Wireless security is used to limit the scope of users that have access to services you install when implementing a wireless access point or wireless router device. These devices are used to provide convenient intranet and/or Internet access without having to run cable through buildings or other areas of coverage where return on investment is low. There are two methods used with wireless systems today to limit access: Coverage Area Authentication and Authorization Mechanisms Coverage Area You can limit coverage area with an access point by using the proper antenna Read More

Share on:

Cisco Network Management

Last edited by . Total of 1 comment in the discussion.

Cisco Network Management Overview of Network Management Different people may take network management as different meanings. It may be considered as solitary network consultant for monitoring network activity using outdated protocol analyzer. While network management in distributed database environment, managing network nodes for generating real time graphics and auto polling of network devices. There are number of tools and applications which are used for network management to support network administrators to monitor and maintain networks of all types. In the early 1980s remarkable growth in field of network deployment was Read More

Share on:

Two Factor Authentication

Last edited by . Total of no comments in the discussion.

Two factor authentication is term used to describe any authentication mechanism where more than one thing is required to authentate a user. The two components of two factor authentication are: Something you know Something you have Traditional authentication schemes used username and password pairs to authenticate users. This provides minimal security, because many user passwords are very easy to guess. In two factor authentication, the password still provides the something you know component. In the most common implementations of two factor authentication, the something you have component is provided by Read More

Share on:

IrDA

Last edited by . Total of no comments in the discussion.

IRDA, or Infrared Data Association, is an organization that creates standards for two-way, interoperable, infrared devices. IRDA devices differ from regular infrared devices, such as remote controls and infrared computer mice, because they are able to receive data as well as transmit it. However, IRDA technology can be found in a wide variety of electronics, such as digital cameras, MP3 players, smartphones, and HPC devices. IRDA technology allows these devices to wirelessly share data fast with personal computers in either direction, but requires a direct line-of-sight between the two devices. Read More

Share on:

EVDO (EVolution-Data Optimized)

Last edited by . Total of 1 comment in the discussion.

EVDO is an acronym for "Evolution Data Only" or "Evolution Data Optimized" which is a standard for high speed wireless networks used for Broadband Internet connectivity. EVDO enables computer users to have high speed Internet access without the help of a hotspot. Just by inserting an EVDO card into the computer, users get connected to the Internet within seconds and have Net access at DSL-compatible speeds. While traditional wireless networks assign a dedicated path between the source and destination for the entire duration of the call very similar to fixed-line Read More

Share on:

Cable Stapler

Last edited by . Total of no comments in the discussion.

A cable stapler (cable tie gun) is a mechanical device that is used to secure cables, wires, and other cords. Cable staplers are often used in the construction industry to secure cables during construction and to properly install outlet wires. Cable staplers are also used to bundle rope, twine, straps, and similar materials during transportation to protect valuable materials, as too much movement may damage them. Cable staplers work by mechanically fastening a strap much tighter than any human could ever do. Cable Stapler VS Regular Stapler While regular staplers/staple Read More

Share on:

The Cisco Three Layer Hierarchical Model vs the OSI Model

Last edited by . Total of no comments in the discussion.

The ISO, International Organization for Standardization is the Emily Post of the network protocol world. Just like Ms. Post, who wrote the book setting the standards or protocols for human social interaction, the ISO developed the OSI model as the precedent and guide for an open network protocol set. Defining the etiquette of communication models, it remains today the most popular means of comparison for protocol suites. OSI layers are defined as top down such as: The Application layer The Presentation layer The Session layer The Transport layer The Network Read More

Share on:

Network Card

Last edited by . Total of 2 comments in the discussion.

A network card is an expansion card that installs into a computer and enables that computer to physically connect to a local area network. The most common form of network card in current use is the Ethernet card. Other types of network cards include wireless network cards and Token Ring network cards. Ethernet network cards most often use RJ-45 jacks. Wireless network cards usually have no external connections other than a possible antenna jack. Other terms for network card include network adapter, network interface card, and NIC. Network Card Interfaces Read More

Share on:

Static Route

Last edited by . Total of no comments in the discussion.

A static route is one that a network administrator creates manually. The opposite of a static route is a dynamic route. Dynamic routes are created by routing protocols. Static routes have advantages and disadvantages when compared to dynamic routes. Advantages of Static Routes: Easy to configure No routing protocol overhead Disadvantages of Static Routes: Network changes require manual reconfiguration Network outages cannot be automatically routed around Creating a Static Route under Unix Under Unix, static routes can be created using the `route` command. The example shows the creation of a Read More

Share on: