Quantcast
Channel: Network Technologies
Browsing all 10 articles
Browse latest View live

10BaseT 10BaseF 10Base2 5-4-3 rule 10Base5 100BaseFX 100BaseT4 100BaseTX

IEEE shorthand identifiers, such as 10Base5, 10Base2, 10BaseT, and 10BaseF include three pieces of information: The number 10: At the front of each identifier, 10 denotes the standard data transfer...

View Article



Main features of 802.2 Logical Link Control 802.3 Ethernet 802.5 token ring...

In this article we would discuss about media protocols, media standards. Later we would explore how system gets access over media and how topology works. Access method CSMA / CD (Carrier Sense Multiple...

View Article

Factors which affect Wireless Network Range Speed Infrared Bluetooth FHSS...

Infrared Infrared (IR) radiation is electromagnetic radiation of a wavelength longer than that of visible light, but shorter than that of microwave radiation. The name means "below red" (from the...

View Article

Image may be NSFW.
Clik here to view.

Star Topology ring Topology bus Topology Logical Physical mesh Topology

Topologies The first thing to consider about a network is its physical shape, or the design layout, which will be extremely important when you select a wiring scheme and design the wiring for a new...

View Article

Network security protocols CHAP MS-CHAP PAP RADIUS RAS PPP SLIP PPPoE PPTP RDP

Security protocols protect a computer from attacks. To understand how security protocols work, you must first understand what types of attacks they protect against. Networks and data are vulnerable to...

View Article


Ip address IPv4 IPv6 public ip private ip APIPA Static Dynamic ip classes

Systems that have interfaces to more than one network require a unique IP address for each network interface. The first part of an Internet address identifies the network on which the host resides,...

View Article

Tcp ip udp ftp smtp HTTPs POP3 IMAP4 telnet SSH ICMP ARP RARP NTP SNMP SCP...

TCP (Transmission Control Protocol) Transmission Control Protocol uses a reliable delivery system to deliver layer 4 segments to the destination. This would be analogous to using a certified,...

View Article

Image may be NSFW.
Clik here to view.

TCP IP model tcp ip stack MAC OSI IPX/SPX IPX SPX NetBEUI AppleTalk

A MAC address is 48 bits long and is represented as a hexadecimal number. Represented in hex, it is 12 characters in length, where each character is 4 bits. To make it easier to read, the MAC address...

View Article


Function of TCP UDP protocols DNS NAT ICS WINS SNMP NFS SMB AFP ISDN FDDI

The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) are used to transmit network data to and from server and client applications. The main difference between the two protocols...

View Article


Image may be NSFW.
Clik here to view.

Dhcp Server

Computers on a IP networks need some essentials information before the can communicate with other hosts. This information include an IP address, and a default route and routing prefix. Configuring IP...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images