Networking & Communications Articles — Knoji
Airfare Daily Deals eCigarettes Eyeglasses Hotels Jewelry Online Backup Online Dating Online Printing Online Tickets Skin Care Textbook Rentals Vitamins Web Hosting Weddings
Find thousands of shopping-related forums
SEARCH
Q&A
Get true answers from experts in Networking & Communications.
Most of the households today have computers with internet connection and majority of them nowadays have wireless routers installed. Most of them have at least one computer connectivity and many of them have multiple devices connected to the wireless router providing a local WLAN setup. Now what then these wireless routers do exactly in internet network connection?
Published by wireless Routers 230 months ago in Networking & Communications | +0 votes | 0 comments
Drobo provides external storage solutions for computers. Their devices can house several drives (3.5" or 2.5" depending on the model) using Serial ATA or Serial Attached SCSI. The connection with the PC is done via USB 2.0 or 3.0, FireWire 800, eSATA, Thunderbold or Gigabit Ethernet. The key advantage of Drobo devices is the ability to add hard drives or swap them without manual migration of data. Below is a listing of Drobo products: Drobo Drobo S Drobo FS DroboPro B800fs B800i B1...
Published by Ioana Moldovan 66 months ago in Networking & Communications | +3 votes | 0 comments
Troubleshooting the network cable Cable testing and certification The important question during installation and troubleshooting a network problem is to know the quality of those cables. Even if the best cables are used, different factors prevent the network from performing at the optimum level. These factors are as follows: Connectors Patch channels Jumpers -Hubs Careless installation Hostile electrical environment
Published by Gazu Lakhotia 68 months ago in Networking & Communications | +0 votes | 0 comments
Using four layer model It is difficult to list down steps to troubleshoot a network problem. The art of troubleshooting depends on the person who is trying to resolve the problem. It depends on the technical knowledge and intuition of that person. The person who has good knowledge about the different entities of the network such as the hardware, software, connections, is considered to be a good troubleshooter.
Published by Gazu Lakhotia 68 months ago in Networking & Communications | +0 votes | 0 comments
Understanding Troubleshooting Model A troubleshooting model can be simplified by breaking It in simple steps even if the problem is very complex. The sequence of steps makes the task of resolving a problem simple and very easy. The following steps must be followed to resolve any network problem: Establish the symptoms - Try to determine the problem by analyzing the symptoms. Symptoms can be established by observing how the affected system is behaving. If you are troubleshooting over t...
Published by Gazu Lakhotia 68 months ago in Networking & Communications | +0 votes | 0 comments
Different forms of Touchy Tools Touchy tools are not physical devices, software's or commands that can be used to resolve network problems. In Touchy tools, the administrator identifies the potential problem by interacting with the user. In this method, you need to ask various questions to the user so as to identify the source of problem. There are no fixed set of questions defined, which you must ask. The type and number of questions asked differ from problem to problem. It also depends on...
Published by Gazu Lakhotia 68 months ago in Networking & Communications | +0 votes | 0 comments
You can download almost everything from thepiratebay.org, movies, music and software. Downloading is easy and fast, it is basically a click and download step. Some people have problem downloading from the site. Always take note of the seeders and leechers, they play a significant role in determining the download rate. This will help on how to use thepiratebay.org for beginners.
Published by jean tolentino 69 months ago in Networking & Communications | +0 votes | 0 comments
A computer server is the brain of a network. It is responsible for vital operations such as communicating and exchanging data with other servers. Here are ways to maintain a server.
Published by toiken 72 months ago in Networking & Communications | +0 votes | 1 comments
Technology has changed the way that we communicate, today it's all cell phones, laptops and ipads, deterring us to communicate face to face even less. If were not for tech innovations we would more than likely still be using old methods of communications.
Published by forstine carter 72 months ago in Networking & Communications | +0 votes | 1 comments
Scam mails are fraudulent electronic violations that must be stopped. However, this is not always possible and thus this article focuses on the basic actions that need to be taken against fraudulent scam emails.
Published by Maeve Johnson 72 months ago in Networking & Communications | +0 votes | 0 comments
The primary task of the OSI model is to facilitate standardization, OSI model allowed different vendors to work together to develop an ultimate solution.
Published by Shree Infosolution 73 months ago in Networking & Communications | +5 votes | 3 comments
The most detailed and comprehensive review of the InterCall
Published by Hurbert Michael 78 months ago in Networking & Communications | +1 votes | 0 comments
Unshielded Twisted Pair Cables (UTP) A pair of unshielded wires wound around each other is known as Unshielded Twisted Pair Cables (UTP) . An UTP is a pair of copper wires would by plastic insulators. Unshielded Twisted Pair Cables (UTP) is the cheapest form of cables available for networking purposes. It is highly used ini Local Area Network (LAN) environments. The installation cost of the cable is very cheap as it is easy to install.
Published by Gazu Lakhotia 80 months ago in Networking & Communications | +5 votes | 2 comments
Shielded Twisted Pair cables (STP) A pair of wires wound around each other and each pair is placed within a shielding foil wrap to guard it from crosstalk. These wires are positioned in an outer copper braid to defend it from peripheral interference. Shielded Twisted Pair cables (STP) is less susceptible to external interference as the shielding absorbs all the EMI and RFI signals. Shielded Twisted Pair cables (STP) can be used in surroundings that are near electrical units and radio towers
Published by Gazu Lakhotia 80 months ago in Networking & Communications | +2 votes | 1 comments
Coaxial Cables Coaxial cables consist of a solid copper core surrounded by an Insulator mainly made up of Poly VinylChloride PVC or Teflon. PVC is a plastic made from the chemical vinyl chloride. It is surrounded by a mesh like ground wire called the Draiding or shielding and an outer cover known as a sheath.
Published by Gazu Lakhotia 80 months ago in Networking & Communications | +2 votes | 2 comments
Tree Topology Vs Hybrid Topology Tree Topology A tree topology combines the characteristics of linear bus and star topology. In Tree topology, group of star networks are connected to the linear bus backbone. Tree topology enables the user to expand and configure the existing network depending on the requirements. Twisted pair cable is commonly used by tree topology. Tree topology is also called as hierarchical structure.
Published by Gazu Lakhotia 81 months ago in Networking & Communications | +5 votes | 2 comments
Ring Topology In Ring topology, each device is connected to adjacent devices forming a circle. Data flows in only one direction, clockwise or anti-clockwise. Each device in the ring topology acts as a repeater. It amplifies the signal transmission and transmits it to the next device.
Published by Gazu Lakhotia 81 months ago in Networking & Communications | +0 votes | 2 comments
Star Topology In star topology, multiple devices are connected to a central connection point known as hub or switch. Devices are attached to the hub by using either copper cables or fiber optic cables. Star networks provide a cost-effective method for sharing information between different users. Star topology can be used in airline reservation counters and small business offices where employees want an access to common applications and files. Basic Structure of Star Topology
Published by Gazu Lakhotia 81 months ago in Networking & Communications | +1 votes | 1 comments
Single Node Topology Topology provides different configurations that are used to create a network. A network is a group of devices connected by communication paths to exchange information and share resources. While connecting computers together to form a network, the user needs to consider the structure, layout and the cabling requirements. A network can be created by using point-to-point connection or multipoint connection. In a point-to-point connection, only two devices are connected to ea...
Published by Gazu Lakhotia 81 months ago in Networking & Communications | +1 votes | 2 comments
Network Selection Criteria A network is selected on the basis of network criteria. During the network selection, it is important to consider these criteria for improving network functionality. These factors are: • Network Performance • Network Reliability • Network Security
Published by Gazu Lakhotia 81 months ago in Networking & Communications | +1 votes | 1 comments
Session Layer of the OSI model This is the fifth layer of the OSI model. This layer establishes, manages, synchronizes and terminates connection between the computers. It also sets up, coordinates and terminates interactions and dialogs between communicating devices. It provides either half duplex or full duplex service.
Published by Gazu Lakhotia 81 months ago in Networking & Communications | +0 votes | 0 comments
Transport Layer of the OSI Model This is the fourth layer of the OSI model. The data unit at this layer is known as segment. The network layer deals with source-to-destination delivery of individual packets and does not recognize any relationship between them. On the other hand, the transport layer ensures that the entire message reaches in order and handles error control and flow control at the source-to destination level.
Published by Gazu Lakhotia 81 months ago in Networking & Communications | +1 votes | 1 comments
Network layer of the OSI Model This is the third layer of the OSI model. The data unit at this layer is known as packet. There is no need of the network layer if the two communicating devices lie on the same network. However, when the two devices are connected on different networks, network layer is essential for providing source to destination delivery of packets. Network layer receives data from transport layer.
Published by Gazu Lakhotia 81 months ago in Networking & Communications | +0 votes | 0 comments
Data Link Layer of the OSI Model Data link layer is the second layer of the OSI model. It handles data transfer between network and the physical layers of the OSI Model. Data unit at the data link layer is called as frame. Data link layer receives data from network layer. It adds header and trailer to the data and passes data to the physical layer. At the receiver side, data link layer receives data from the physical layer. It detaches header and trailer from the data and passes data to the net...
Published by Gazu Lakhotia 81 months ago in Networking & Communications | +0 votes | 0 comments
Physical Layer of the OSI Model Physical Layer is the first or the bottom most layer of the OSI model. This layer is used to establish or terminate a connection to a communication medium. It also defines the electrical and mechanical specifications like cables, connectors and signaling options of the medium. Physical Layer receives data from the upper layer called the data link layer. It converts the received data into bit stream. The data is then transmitted through the medium to the receiver...
Published by Gazu Lakhotia 81 months ago in Networking & Communications | +0 votes | 0 comments
Client/Server Configuration and Open System Interconnection (OSI) Model Client/Server Configuration Client/Server is a configuration of the computer network that includes a server and one or more clients. The client manages the local resources that are used by the user such as monitor, keyboard, CPU and peripherals
Published by Gazu Lakhotia 81 months ago in Networking & Communications | +0 votes | 0 comments
Campus Area Network (CAN) Vs. Metropolitan Area Network (MAN) Vs. Wide Area Network (WAN) Local Area Network is basically used for computer networking of small span of areas but Campus Area Network (CAN), Metropolitan Area Network (MAN) and Wide Area Network (WAN) covers a bigger area and in general connects two or more Local Area Network. In this Article we will try and understand the Difference between Campus Area Network (CAN), Metropolitan Area Network (MAN) and Wide Area Network (WAN)....
Published by Gazu Lakhotia 81 months ago in Networking & Communications | +1 votes | 0 comments
Types of LAN In LANs, data can be transferred using procedure like token passing. As per the techniques used for data sharing, LANs are classified into Ethernet, Token Ring, Token bus and Fiber Distributed Data Interface (FDDI). Ethernet LAN - Enables the user to transmit data at the rate of more than 10 Mbps. In this network the system checks for a medium before transferring data. If the medium is available, the system transmits the information.
Published by Gazu Lakhotia 81 months ago in Networking & Communications | +1 votes | 0 comments
History of Computer Networks (ARPANET) Earlier, computers were only used as stand-alone machines. Computer networks were created to establish a communication link between different users within an organization. The Advanced Research Projects Agency (ARPA) designed Advanced Research Projects Agency Network (ARPANET) for United States Department of Defense. It was the foremost computer network in the Universe.
Published by Gazu Lakhotia 81 months ago in Networking & Communications | +1 votes | 1 comments
Definition of Computer Networks and its advantages Network is a anthology of computers associated to each other. It allows the computers to communicate with each other and sh resources which include information, software and peripheral devices such as printers, scanners Now days, computers are used in a wider range. All the organizations are using multiple computers within their departments to perform their day to day work. It is necessary to connect them which form a network.
Published by Gazu Lakhotia 81 months ago in Networking & Communications | +2 votes | 1 comments
Using VoIP certainly has its own merits. However, VoIP is not a perfect technology and it has its own flaws. Before considering using VoIP at home or at your office you should determine the disadvantages of using VoIP first.
Published by toiken 82 months ago in Networking & Communications | +1 votes | 0 comments
Many of us will agree that telephone service may cost a lot. This is why the Voice over Internet Protocol, or VoIP, is fast becoming the number one alternative for those who would like to talk to their loved ones over great distances
Published by toiken 82 months ago in Networking & Communications | +1 votes | 0 comments
Top business texting abbreviations and acronyms for text messaging or email communications.
Published by Heather Tooley 82 months ago in Networking & Communications | +2 votes | 0 comments
25 secret lingo and slangs for texting about drugs and other substance.
Published by Heather Tooley 82 months ago in Networking & Communications | +7 votes | 1 comments
A Protocol Analyzer or Network Analyzer, is a type of diagnostic software that can examine and display data packets that are being transmitted over a network. It can examine packets from protocol that operate in the physical, Data-link, Network, and Transport layers of the OSI model.
Published by Ankit Bansal 83 months ago in Networking & Communications | +3 votes | 1 comments
Types of Network Cables Network Cables - Connects the PC to Internet or any other network. There are various types of network cables. The network cables commonly used are Shielded Twisted Pair (STP), Unshielded Twisted Pair (UTP), Co-axial cable and Fiber Optic cable. The different types of cables available for networking are as follows:
Published by Nikhil Agarwal 86 months ago in Networking & Communications | +1 votes | 0 comments
A Machine ID or Computer Name in a nutshell, is the name that a computer uses to identify itself from the other machines on a given network. There is also such a thing as a virtual name or id, but that is not the same thing as a computer name and is another lesson for another day. For example: I have a desktop computer, two laptops, a cell phone and a printer on my network. The name of my network...
Published by Michele Cameron Drew 86 months ago in Networking & Communications | +7 votes | 10 comments
Is WPA really better than WEP? The Wi-fi Alliance recommends tha use of WPA specifically the more advanced WPA2 in securing a wireless network connection, be it home or enterprise.
Published by M.J. Grueso 89 months ago in Networking & Communications | +6 votes | 1 comments
1 2 3 4 5 6 7 8 >>