- Control Technology for Future Generations - A technical analysis of the LON protocol and the role of LonMark International (62 KB) This paper presents the technical analysis of the LON protocol and the role of LonMark International.
- Creating a Virtual, More Efficient Plant (206 KB) This study reviews an ever-increasing number of servers that are used to perform various functions within a facility.
- Improving motion network noise immunity (272 KB) This article quantifies the contribution of automatic retry to improve the noise immunity by testing the noise immunity performance of two real-time industrial Ethernet protocols and comparing the results.
- The PLC: New Technology, Greater Data Sharing (131 KB) This paper presents an overall view on the Programmable Logic Controllers (PLC).
- Why use an industrial Ethernet Switch? (95 KB) This paper presents the importance of using an industrial Ethernet Switch.
- Balanced Vs Unbalanced Communications Standards (16.39 KB)
- Configuring ATM Routing And PNNIEIGRP (125.81 KB)
- Data Communication and Networking (145.81 KB) This paper explains about basic elements of data communication system, communication protocols and data transmission modes, the use of computer network, and different components of computer network.
- Data Communication Cabling: Standards and Specifications (682.29 KB) This document outlines the Data Communication Cabling Specifications, Guidelines and Standards that are applicable to the environment of the Department of Education (DoE) of Western Australia.
- Data Communication in ATM Networks (869.46 KB)
- Data Communication Networking (438.69 KB)
- Data Communication: XML, XSLT, and JSON (343.47 KB) This paper explains about XML, XSLT and JSON as they relate to data communication.
- Data Communications & Computer Networks (1858.96 KB) This paper explains the history of data communication, followed by general communication theory (Fourier, Nyquist and Shannon).
- Data Communications - The FIrst 2500 Years (56.7 KB)
- Data Communications Solutions (99.28 KB)
- Data Communications: The basics of media, encoding, transmission, connections and remote access (22.53 KB) This paper provides an overview of data communications and explains how the conceptual pieces form a complete communication system.
- Data Communications: Transmission System: Structure and Function (727.35 KB) This paper outlines the major components and theories that comprise any data transmission system.
- Data-Dependent Effects on Jitter Measurement (176.77 KB)
- DataComm Communication Systems (1477.54 KB)
- Defining 4G (662.35 KB)
- Distributed, Intelligent I/O for Industrial Control and Data Acquisition (Seriplex White Paper) (180.89 KB)
- Effect of PRBS Pattern Length on Data-Dependent Jitter (218.68 KB)
- Ethernet & Fieldbus as the basis of an E-Commerce Solution (547.52 KB)
- Ethernet in Avionics Networks (330.68 KB)
- Fieldbus Wiring, Design and Installation Guide (492.39 KB)
- Five Steps To Software Testing (6 KB)
- Group-Key Management Model for Worldwide Wireless Mesh Networks (517.19 KB) A key management model to overcome the scalability issue on security aspect for large-scale deployment of Worldwide WMN is proposed ,which aims to guarantee wellperformed key management services and protection from potential attacks.
- GUI Design - The Intersection of Art and Engineering (835.55 KB)
- Guide To Scanning Technology (81.45 KB)
- Hardware Implementation of Higher Throughput Anti-Collision Algorithm for Radio Frequency Identification System (330.82 KB) This paper presents a proposed hardware implementation of Higher Throughput Anti- Collision Algorithm (HTACA) for Radio Frequency Identification (RFID) system.
- Hardware Prototyping of an Efficient Encryption Engine (415.23 KB) An approach to develop the FPGA of a flexible key RSA encryption engine that can be used as a standard device in the secured communication system is presented.
- Harnessing Mobile Middleware (644.16 KB)
- High performance analog optical links based on quantum dot devices for UWB signal transmission (1528.14 KB) In this study the possibility of quantum dot (QD) laser and QD semiconductor optical amplifier (SOA) applications in ultra-wideband (UWB) communication systems is discussed.
- Homogeneous multi-interface mobile node support in NS2 (318.35 KB) This paper presents the implementation of mobile nodes in NS2 with multiple Wi-Fi interfaces and multiple WiMAX interfaces trying to overcome those limitations.
- How To Choose the Best Router Switching Path (510.18 KB)
- Hybrid channel allocation in wireless cellular networks (124.44 KB) This paper presents a hybrid channel allocation notification to the central pool on each channel request that cannot be satisfied locally at the base station.
- Hybrid message-embedded cipher using logistic map (313.48 KB) The proposed hybrid message embedded scheme consists of hill cipher combined with message embedded chaotic scheme.
- Impact of Mobility models on Mobile Sensor Networks (969.34 KB) In this paper, we have studied the impact of various mobility models with AODV and DSDV routing protocols and have compared the throughput of the models.
- Impact of routing protocol on performance of wireless ad hoc vehicular network (180.48 KB) In this paper, we discuss the impact of routing protocol on performance of wireless ad hoc vehicular network along with recent routing protocols.
- Implementation Of Hybrid Protocol For Routing As Well As Clustering (275.88 KB) In this paper, we propose an improved version which uses both cluster and tree based protocols. The proposed protocol improves the power consumption by improving FND.
- Implementation of SDES and DES Using Neural Network (634.31 KB) In this work a new schedule for XOR design is going to be considered. We will first implement SDES algorithm in MATALAB they possess the most popular design criteria for block ciphers.
- Implementation of Secure Authentication Mechanism for LBS using best Encryption Technique (768.91 KB) In this paper we have proposed an Authentication Mechanism in which mobile Phone Users will send request for some services from server.
- Improved Two-Factor Authenticated Key Exchange Protocol (338.48 KB) This study proposes such a secure authenticated key exchange protocol that achieves fully two-factor authentication and provides forward security of session keys.
- Improving Quality of Service and Reducing Power Consumption with WAN accelerator (216.26 KB) This paper proposes to dynamically apply WAN accelerator within network when a virtual machine is moved to a distant center, in order to prevent the degradation in performance after live migration of virtual machines over a wide area.
- Industrial Ethernet Planning & Installation Guide (1154.18 KB)
- Installing, Configuring and Managing Network Protocols (2.21 MB)
- Integration of Biometric authentication procedure in customer oriented payment system (115.36 KB) The aim of this paper is to integrate the proposed payment model with multi server authentication model for the purpose of maintaining security and accessing different servers (websites).
- Intrinsic Authentication of Multimedia Objects Using Biometric Data Manipulation (407.72 KB) The Biometric Gaussian Stream (BGS) cryptosystem was extended by extensive research experimentation. Using this system, complexity is added to an image by passing it through a Gaussian noise function.
- Introduction to Computer Networks (52.74 KB)
- Investigation of Collision Avoidance and Localization in WSNs (1156.48 KB) The most important two problems in Wireless Sensor Network (WSN) is localization and collision avoidance of the transferred packets. A solution for these obstacles is introduced in this work.
- IPSec over Heterogeneous IPv4 and IPv6 Networks: ISSUES AND IMPLEMENTATION (1059.17 KB) In this work, we study and explore the incompatibility issues of applying IPSec across the translation gateway and then propose a workable solution to implement end to end IPSec in heterogeneous IPv4 and IPv6 networks.
- IPv4/IPv6 Transition (327.82 KB) In this paper we proposed a system that make incompatible nodes; the first based IP4 the other based IPv6, communicate together without increasing packets size, this system is called Bi-Directional Transition System (BDTS).
- Learning and Evaluating Possibilistic Decision Trees using Information Affinity (310.24 KB) This paper investigates the issue of building decision trees from data with imprecise class values where imprecision is encoded in the form of possibility distributions.
- Leveling Process of Total Electron Content (TEC) Using Malaysian Global Positioning System (GPS) Data (455.67 KB) This study investigates the TEC using GPS data collected from Wisma Tanah, Kuala Lumpur, KTPK (3° 10’ 15.44â€N, 101° 43’ 03.35â€E) station and processed and analyzed under quiet geomagnetic day at the equatorial region.
- Localization in Wireless Sensor Network Using MDS (279.68 KB) In this paper, determining the localization of nodes in a Wireless Sensor Network is a very important task, which involves collaboration between sensor nodes.
- Long-Reach Optical Access Technologies (111.53 KB) This study summarize the economic arguments behind long-reach access and examines a number of leading long-reach optical access technologies.
- Macromedia White Paper (447.34 KB)
- Malware Detection, Supportive Software Agents and Its Classification Schemes (144.5 KB) This paper aims at identifying the malware as one of the most dreaded threats to an emerging computer and communication technology.
- MANET-Evaluation of DSDV, AODV and DSR Routing Protocol (123.78 KB) In this paper we have compared the performance of three MANET routing protocol DSDV, AODV and DSR by using NS-2. DSDV is proactive (Table driven routing Protocol) whereas AODV and DSR share similar On Demand behavior.
- Microsoft Digital Pharma (2.25 MB)
- Microwave Photonic Devices and Systems (62.02 KB) This paper is concerned with ultra broadband travelling-wave photomixers and photodetectors, high-speed waveguide modulators, as well as novel electroabsorption transceiver elements.
- Millimeter-wave Radio over Fiber System for Broadband Wireless Communication (1444.81 KB) In this study, an introduction of mm-wave RoF system will be given and the optical techniques of generating mm-wave signals are presented. A design of bidirectional mm-wave RoF systems are considered using Multiplexing.
- Minimum Normalized Transmit Rate Based Fair Scheduling Algorithm in Orthogonal FDM (192.97 KB) In this paper Minimum Normalized Transmit Rate Based Fair Scheduling Algorithms based on Throughput is discussed and also the performance of this algorithm is evaluated through simulation results.
- Modeling and Analysis of Adaptive Buffer Sharing Scheme for Consecutive Packet Loss Reduction in Broadband Networks (481.29 KB) This paper presents an algorithm for optimization of adaptive buffer allocation scheme for traffic based on loss of consecutive packets in data-stream and buffer occupancy level.
- Multi Carrier Symbol Recovery in OFDM using ANN in Wireless Channel (770.89 KB) The investigation is made in the multipath fading environment using different modulation techniques.
- Multi Homing (40.72 KB)
- Multiuser Watermarking using Visual Cryptography (484.46 KB) In this study, a robust watermarking scheme for multiple cover images and multiple owners is proposed. The rest of the techniques are applied to enhance the robustness of the scheme.
- Myths and Actual Practice with Industrial Data Communications and Hazardous Areas (115.86 KB)
- Network based Security model using Symmetric Key Cryptography with Public Key Exchange Protocol (160.98 KB) The main aim of this paper is to strengthen secured communication over the Network by enhancing the strength of the AES algorithm with Diffie-Hellman key exchange Protocol.
- Network Threat Characterization in Multiple Intrusion Perspectives using Data Mining Technique (178.49 KB) This paper presents a threat characterization model for attacks from the victim and the attacker perspective of intrusion using data mining technique.
- Neural Disparity Map Estimation from Stereo Image (745.79 KB) In this paper, we propose a new approach of dense disparity map computing based on the neural network from pair of stereo images.
- New Watermarking Technique Using Data Matrix and Encryption Keys (1708.8 KB) In this paper, we propose a new watermarking technique taking advantage of Data Matrix as well as encryption keys.
- Normalized Transfer of Bulk Data By Using UDP In Dedicated Networks (300.4 KB) Performance Adaptive-UDP is a supreme protocol than other protocols by maintaining memory processing, packetloss processing and CPU utilization.The protocol bulk data transfer is processed with high speed over the dedicated network links.
- On Line Isolated Characters Recognition Using Dynamic Bayesian Networks (344.7 KB) In this paper, our system is a Markovien system which we can see it like a Dynamic Bayesian Networks
- Optical Functions For Microwave Signal Processing In Radar, Communications And Surveillance Systems (340.84 KB) This paper describes the improvements of optoelectronic links and the capability to perform processing functions, in the optical domain, or the radar receive mode processing with optical architecture .
- Optimization of Multiple Vehicle Routing Problems using Approximation Algorithms (314.81 KB) This paper deals with generating of an optimized route for mVRP which uses a methodology of clustering the given cities depending upon the number of vehicles and each cluster is allotted to a vehicle.
- Overview of Different Routing Techniques for Wireless Multimedia Sensor Network (169.05 KB) This paper focuses on the review of such routing techniques used in wireless multimedia sensor network.
- Parallel Joint Channel Coding and Cryptography (355.28 KB) Method of Parallel Joint Channel Coding and Cryptography has been analyzed and simulated in this paper.
- Peer To Peer File Sharing (691.64 KB)
- Performance Analysis and Special Issues of Broadband Strategies in the Computer Communication (289.79 KB) This paper describes the performance analysis and the issues faced by using a broadband access as it allows people to telecommute effectively by providing a similar environment for e-mail, file sharing, and access to corporate servers.
- Performance Analysis of Cellular Wireless Network by Queuing Priority Handoff calls (670.73 KB) In this paper, a mathematical model is proposed to estimate the dropping probabilities of cellular wireless networks by queuing handoff instead of reserving guard channels
- Performance Comparison of Routing Protocols in MANET Varying Network Size (375.53 KB) The Focus is to compare the performance of three routing protocols DSDV, DSR and AODV for CBR traffic by varying no. of nodes in terms of packet delivery ratio, end to end delay, routing overhead and throughput.
- Performance Comparison of Various Routing Protocols with Varying Number of Source Nodes (81.72 KB) In this paper, a comprehensive attempt has been made to compare the performance of three prominent reactive protocols DSR, AODV, CBRP.
- Performance Enhancement of Reactive on Demand Routing Protocol in Wireless Ad Hoc Network (144.31 KB) This paper proposes an improved AODV routing protocol by including route repair scheme to overcome the link failure problems of its predecessor.
- Performance Impact Of Back-Bone Speed in Lan (449.05 KB)
- Performance of mobile IPv6 with different route optimization scheme (524.82 KB) In this paper we have consider Light Weight Route optimization scheme & enhanced light weight route optimization scheme
- Performance of Modified DSR in Presence of Noisy Links using QUALNET Network Simulator in MANET (992.67 KB) We use Signal-to-Noise Ratio as the link-quality metric in a modified version of the of DSR protocol coined as MDSR which takes into consideration the SNR value of a wireless link in addition to the hop count metric to discover new routes.
- Performance study of IEEE 802.16d under Stanford University Interim (SUI)Channel (353.27 KB) In this paper, the performances in terms of bit error rate (BER) of IEEE 802.16d have been investigated by using different SUI channel model.
- PLC Communications in a Process Control System (1.98 MB)
- Point Multiplication Methods for Elliptic curve Cryptography (190.65 KB) This paper gives an introduction to elliptic curve cryptography (ECC) and presents the comparative study of methods for point multiplication operation.
- Prepaid Postpaid Convergent Charging (657.87 KB)
- Probabilistic model for Intrusion Detection in Wireless Sensor Network (260.42 KB) This paper compares the probability of intrusion detection in both the Poisson as well as Gaussian deployment strategies.
- QoS Routing in Mobile Ad-hoc Networks using Agents (384.89 KB) Our proposed scheme optimizes the uncertain weights before QoS prediction using Error Back Propagation (EBP) algorithm, this optimization is done till to get acceptable error limit.
- Quality of Service Based Handover Approach in a WLAN network (113.51 KB) In this paper work we have considered a handover mechanism for IEEE 802.11 Wi-Fi and perform some modifications and then study the effect of these changes on QoS in respective throughput delay and jitter.
- Quantum transduction of telecommunicationsband single photons from a quantum dot by frequency upconversion (573.09 KB) This paper describes the frequency upconversion in a PPLN waveguide to measure single-photon PL from a quantum dot emitting near 1.3 mm with silicon SPADs that are used in high signal-to-noise spectrometry and time-correlated photon counting.
- Recent developments in lightwave network analysis (159.1 KB) This paper provides a review of the theory and techniques used for the small-signal characterization of microwave photonic components.
- Recovery of loss of packet in network using constant packet reordering (107.4 KB) This paper proposes a new version of the TCP which gives the high throughput when the packet reordering occurs and in another case if the packet reordering is not occurs then in that case also it is friendly to other version of the TCP.
- Relational GIS and Remote Sensing Database System for Al-Salt Area, Jordan (652.71 KB) This paper describes the validity and the appropriateness of GIS and Remote Sensing techniques,particularly data fusion of images are evaluated in relation to visualization.
- Reliable Broadcasting Using Efficient Forward Node Selection for Mobile Ad-Hoc Networks (241.72 KB) In this paper, we propose to develop a reliable broadcasting algorithm which is a sender-based algorithm.
- Remote Desktop on Mobile (192.32 KB) In This paper we will see how the remote Desktop with static IP can be accessed using Android based mobile phones,to develop this application we used virtual network computing architecture (VNC.
- Remote Wireless Networking (3.86 MB)
- Repeated Clustering to Improve the Discrimination of Typical Daily Load Profile (957.43 KB) This study examines how the repeated clustering method improves the ability to discriminate among the TDLPs of each cluster.
- Representing Access Control Policies in Use Cases (576.71 KB) This paper proposes the required notation and format to represent security requirements, especially access control policies in use case diagram and use case description.
- Research issues in Outlier mining: High- Dimensional Stream Data (154.97 KB) This paper discusses those issues and how they are addressed in the existing literature.
- Research on Data Mining Using Neural Networks (109.87 KB) In this paper, the data mining based on neural networks is researched in detail, and the key technology and ways to achieve the data mining based on neural networks are also researched.
- Review and analysis of local multipoint distribution system to deliver Voice, Data, Internet, and Video Services (294.29 KB) In this paper, LMDS uses cellular-like network architecture of microwave radios placed at the client's location and at the company's base station to deliver services, mainly telephony, video and internet access.
- Route Request Flooding Attack Using Trust based Security Scheme in Manet (179.33 KB) In this paper,we describe that how the flooding attack occur and the effect of flooding attack and present simulation results to show the detrimental effects of Flooding Attack.
- Safety In Numbers (316.5 KB)
- Secure Framework in Data Processing for Mobile Cloud Computing (144.61 KB) In this paper, we present a new mobile cloud data processing framework through trust management and private data isolation.
- Secure Key Pre-distribution in Wireless Sensor Networks. (212.9 KB) In this paper we have evaluated various existing deterministic, probabilistic and hybrid type of key pre-distribution and dynamic key generation algorithms for distributing pair-wise, group-wise and network-wise keys.
- Secured and Efficient Authentication Scheme for Mobile Cloud (112.46 KB) In this paper, we presented the current state of mobile-cloud authentication technology and our proposed system Mobile Cloud Key Exchange (MCKE), an authenticated key exchange scheme that aims at efficient authentication.
- Securing AODV for MANETs using Message Digest with Secret Key (197.45 KB) In this paper we are presenting a novel and practical security mechanism for securing the AODV routing protocol that protects against a number of attacks carried out in MANETs.
- Self-organization and Topology's Control for Mobile Ad-hoc Networks (441.53 KB) This paper deals with the study of auto-organisation solution for Ad-hoc networks, and the benefit effects brought by this last to the routing-process.
- Short-Term Multi-Cell Dynamic Resource Allocation in Future Cellular Networks (390.98 KB) In this paper, we propose a multi-cell coordinated and un-coordinated dynamic resource sharing algorithms and reuse techniques among base station/ relay station cells.
- Simulation using the Recursive Method in USN (518.61 KB) We propose the recursive contract net protocols which less energy level of terminal node in wireless sensor network.
- SMART: A Secure Multipath Anonymous Routing Technique (191.04 KB) In this paper, a secure multipath anonymous routing protocol (abbreviated as SMART) has been proposed.
- Solutions Approaches to the Flexible Management of Modern IT Infrastructures (641.73 KB)
- Spectral Minutiae Fingerprint Recognition System (313.45 KB) This paper presents the performance of the spectral minutiae fingerprint recognition system, this renders our system suitable for a large-scale fingerprint identification system, thus significantly reducing the time to perform matching.
- State of Component Models Usage: Justifying the Need for a Component Model Selection Framework (427.66 KB) In this article, the need for a component model selection framework is justified.
- Strengthening the Encryption Mechanism in WEP Protocol (116.41 KB) In this paper we analyze some weaknesses on the RC4 stream cipher which is used by WEP Protocol and we proposes an public key encryption scheme Elliptic Curve Cryptography in WEP which will overcomes the drawbacks of RC4 encryption Protocol.
- Strong Capabilities, Difficult Decisions (360.94 KB)
- Study of Reliable Data Communication in Wireless Sensor Networks (323.33 KB) This paper explains about studying the various issues and analyze the design choices proposed in literature in addressing the challenge of sensors-to-sink reliable data communication.
- Study of Wireless Sensor Network in SCADA System for Power Plant (251.3 KB) In this paper, study of wireless SCADA system which is powerful setup for monitoring and controlling the various applications from remotely placed is presented.
- Survey of vertical Handover Decision Algorithms (72.93 KB) In this paper we are presenting the survey of VHD algorithms designed to satisfy these requirements.
- System Architecture of HatterHealthConnect: Integration of Body Sensor Networks and Social Network (541.35 KB) We present the system architecture; both hardware and software, of a prototype implementation using Zephyr HxM heart monitor, Intel-Shimmer EMG senor and a Samsung Captivate smart phone.
- Tackling Radio Frequency Interference Associated with Frequency Converters (174.44 KB)
- TCM-coded OFDM assisted by ANN in Wireless Channels (377.7 KB) The objective of this paper is to use Artificial Neural Network in conjunction with M-ary PSK Trellis Coded Modulation based OFDM as a means of achieving higher throughput and performance improvement in multipath fading channel.
- TCP/IP (177.86 KB) This paper explains briefly about Streams Failure, Upgrade Considerations, Direct TCP/IP, Client Streaming Application and Troubleshooting Slow Hosts and/or Networks.
- TCP/IP and Data Communications Administration Guide (772.29 KB) This paper explains how to set up, maintain, and expand a network running the SolarisTM implementation of the TCP/IP protocol suite.
- TCP/IP Networking Basics & Troubleshooting (675.59 KB) This paper explains about the very basic knowledge about networking and configuring a DVR for remote access via the Internet Protocol as well as some common troubleshooting procedures.
- Techniques for Load Balancing in Wireless LAN (485.88 KB) This suggests new strategies for balancing load in a wireless network connected in star topology.
- Telecom Engine Generators for Backup Powering Solutions (78 KB)
- Telecom Wiring Guideline Paper (459.25 KB)
- Telemetry for Animal Cardiac Research (236.84 KB)
- The ABC's of Etherner Troubleshooting (333.94 KB)
- The Affects of Different Queuing Algorithms within the Router on QoS VoIP application Using OPNET (347.29 KB) In this work, simulation tool “OPNET Modeler version 14.0†is used to implement the proposed network (VoIP Network).
- The Chained-Cubic Tree Interconnection Network (271.43 KB) This paper proposes a new interconnection network topology, referred to as the chained-cubic tree, in which chains of hypercubes are arranged in a tree structure.
- The Effect of Using P-XCAST Routing Protocol on Many-to-Many Applications (366.31 KB) In this paper, P-XCAST was tested using topologies with different sources that were sending and receiving data at the same time to handle foreground and background many-to-many applications.
- The Five Dangers of Poor Network Time Keeping (386.6 KB)
- The Future of IP SAN using SCVM (193.31 KB) Storage Concentrators provide an intelligent centralized storage system for increasing disk utilization and disk space efficiency, and reducing data duplication.
- The Industrial Intranet: A Cause for Change (649.25 KB)
- The New Approach to provide Trusted Platform in MANET (414.01 KB) This paper proposes the new trust scheme, which provides malicious free atmosphere for mobile ad-hoc network.
- Training of Fuzzy Neural Networks via Quantum-Behaved Particle Swarm Optimization (514.09 KB) We have proposed a fuzzy neural network based on RBF network and takagi-sugeno fuzzy system.
- Troubleshooting Networks (223.42 KB)
- Troubleshooting WLAN Connectivity (581.75 KB)
- Tutorial 1: Industrial Communications Fundamentals (135.79 KB)
- Tutorial 2: Industrial Data Communications RS-232/RS-485 (69.96 KB)
- Tutorial 3: Local Area Network Topologies and Access Control (60.43 KB)
- Tutorial 4: Local Area Networks Ethernet (10 Mbit/s) (38.76 KB)
- Tutorial 5: Transmission Control Protocol / Internet Protocol (52.45 KB)
- Tutorial 6: Fieldbus and Device Networks Pt I (77.98 KB)
- Tutorial 7: Fieldbus and Foundation Fieldbus Systems Pt II (102.3 KB)
- Tutorial 8: Fieldbus and Device Networks Pt III (50.81 KB)
- Tutorial 9: Design, Installation and Maintenance of the Fieldbus System Pt IV (22.08 KB)
- Ultra Wide and Communication: Practical Applications and Future Aspects (163.28 KB) This paper discusses the concept behind ultra wide band communication technology, application areas, technological challenges ,spectrum operating zones and future aspects of the technology.
- Using Dial-On-Demand To Trigger Backup Link (38.16 KB)
- Using Gprs To Connect Small, Outlying Stations (175.15 KB)
- Using OPT (1101.7 KB)
- Using Orthogonal Channels for Supporting Multicast Service in Multi-channel Wireless Mesh Networks (245.57 KB) We propose EWM method that is distributed scheme for constructing multicast tree in multi-channel multi-interface wireless mesh networks (MIMC-WMN) which selects relay nodes and in distributed form assign orthogonal radio channels to them.
- Video Compression and Data Flow for Video Surveillance (358.09 KB)
- VLan Security (377.19 KB)
- Wavelet and Optimal Requantization Methodology for Lossy Fingerprint Compression (528.46 KB) The proposed techniques used 9/7 wavelet transform before optimal re-quantization and finally, the output stream of coding symbols is entropy coded by lossless entropy coder; run-length encoding.
- Wireless Communications and Networking (248.59 KB)
- Wireless LAN (WLAN) Switching (1090.73 KB)
- Wireless LAN Networking White Paper (4.13 MB) This paper explains about the usage and properties of Wireless LAN.
- Wireless Security (107.38 KB)
- WPAN MAC Protocol: Designing and Analysis with Different ACK Policies (289.85 KB) This paper uses analytical model to study the performance analysis of WPAN MAC under different parameter
- XML Schema Automatic Matching Solution (493.8 KB) In this paper, we present a solution for XML schema automated matching problem which produces semantic mappings between corresponding schema elements of given source and target schemas.
- A binary adder This article breifs the binary adder.
- 7 reasons to a consider a non-Ethernet industrial network This paper explains the seven reasons to a consider a non-Ethernet industrial network.
- Multi Protocol Label Switching (MPLS) This paper briefly explains about the Multi Protocol Label Switching (MPLS).
- Digital Subscriber Line (DSL) This paper explains briefly about the Digital Subscriber Line (DSL).
- Routers And Routing Protocols This paper explains briefly about the routers and the routing protocols.
- Integrated Service Digital Network ISDN This paper explains briefly about the ISDN devices.
- Local Area Network This paper explains briefly about the LAN.
- Congestion-Control Mechanisms This paper explains about the frame relay implements two congestion-notification mechanisms.
- CSMA( Carrier Sense Multiple Access) This paper explains about the 3 approaches in CSMA.
- Packet Switching Network This paper explians about the switching techiques.
- Network LAN Technologies This paper explains briefly about the network LAN technologies.
- Computer Network - Security This paper explains about the several cryptographic algorithms.
- Digital Transmission This paper explains convert digital data into digital signals.
- Analog Transmission This paper explains the three kinds of digital-to-analog conversions.
- Transmission Media This paper explains briefly about the cables.
- Wireless_Transmission This paper explains briefly about the wireless transmission.
- Multiplexing This paper explains the types of multiplexing.
- Network Switching This paper explains about the types of networks switching.
- Physical Layer - Introduction This paper explains about the types of signals and the reasons for transmission impairment.
- Error Detection and Correction This paper explains briefly about the error control mechanisms.
- Data-link Control and Protocols This paper explains about the point-to-point flow and error control mechanism.
- Network Layer Routing This paper explains briefly about the network layer routing.
- Internetworking This paper deals with tunneling and packet configuration.
- Network Layer Protocols This paper explains about the ICMP,IPV4 and IPV6.
- Transport Layer Introduction This paper explains about the functions and end to end communication of transport layer.
- Transmission Control Protocol This paper explains briefly about the TCP.
- User Datagram Protocol This paper explains briefly about the UDP.
- Client Server Model This paper explains briefly about the client server model.
- Application Protocols This paper describes the few of application layer protocols.
- Network Services This paper describes the various network services.
- Data Mining - Tasks This paper explains about the classification and prediction.
- Data Mining - Issues This paper explains about the performance and diverse data type issues.
- Data Mining - Evaluation This paper explains about the query and update driven approach.
- Data Mining - Systems This paper explains about the data mining system classification.
- Data Mining - Query Language This paper explains about the query language in data mining.
- Data Mining - Classification & Prediction This paper explains about the classification and the prediction.
- Data Mining - Decision Tree Induction This paper explains about the decision tree induction algorithm.
- Data Mining - Miscellaneous Classification Methods This paper explains about the classification methods such as Genetic Algorithms, Rough Set Approach and Fuzzy Set Approaches.
- Data Mining - Cluster Analysis This paper explains about the analysis,requirements and methods of clustering.
- Data Mining - Mining Text Data This paper explains about the basic measures for text retrieval.
- Data_Mining_Mining_World_Wide_Web This paper explains about the challenges in web mining.
- Data Mining - Applications & Trends This paper explains about the data mining application and its trends.
- Data Mining - Themes This paper explains about the theoretical foundations of data mining.
- The tetrode This article explains the configuration of Tetrode.
- Combination tubes This article explains about the Combination of Tubes.
- Tube parameters This article breifs the Tube Parameters.
- Ionization (gas filled) tubes This article describes an Ionization (gas filled) tubes.
- Display tubes This article confers the concept of Display tubes.
- Microwave tubes This aticle explains about the Microwave tubes.
- Switch contact design This article offers the design for Switch Contact.
- Contactors This article breifs about the Contactors.
- Time-delay relays This article explains the Time-delay relays.
- Protective relays This article confers the Protective relays.
- Solid-state relays This article describes the Solid-state relays.
- Ladder diagrams This article explains about the Ladder Diagrams.
- Digital logic functions This article breifs on Digital logic functions.
- Motor control circuits This article affords the Motor control circuits.
- Fail safe design This article offers the design for Fail Safe.
- Programmable logic controllers This article explains the configuration of Programmable Logic Controllers.
- The buffer gate This article describes about The Buffer Gate.
- Multiple input gates This article affords the Multiple input gates.
- TTL NAND and AND gates This article describes the configuration of TTL NAND and AND gates.
- TTL NOR and OR gates This article explains the configuration of TTL NOR and OR gates.
- CMOS gate circuitry This article explains the CMOS gate circuitry.
- Special-output gates This article describes on Special-output gates.
- Logic signal voltage levels This article breifs the Logic signal voltage levels.
- Gate universality This article offers the Gate universality.
- DIP gate packaging This article affords the concept for DIP gate packaging.
- Contact normal state and make/break sequence This article explains about the Contact normal state and make/break sequence.
- Contact bounce This article breifs the Contact bounce.
- Relay construction This article describes the construction of Relay.
- Boolean arithmetic This article explains the Boolean arithmetic.
- Boolean algebraic identities This article confers the Boolean algebraic identities.
- Boolean algebraic properties This article explains the Boolean algebraic properties.
- Boolean rules for simplification This article offers the Simplifications for Boolean Rles.
- Circuit simplification examples This article offers the examples for Circuit Simplification.
- DeMorgans Theorems This article explains the DeMorgans Theorems.
- Converting truth tables into Boolean expressions This article offers about how to Convert truth tables into Boolean expressions.
- Boolean relationships on Venn Diagrams This article confers the Boolean relationships on Venn Diagrams.
- Karnaugh maps, truth tables, and Boolean expressions This article breifs the Karnaugh maps, truth tables, and Boolean expressions.
- Larger 4 variable Karnaugh maps This article describes the Larger 4 variable Karnaugh maps.
- Minterm vs maxterm solution This article offers the Solution for Minterm vs maxterm.
- Sum and product notation This article explains the Sum and product notation.
- Don't care cells in the Karnaugh map This article describes about the Don't care cells in the Karnaugh map.
- Larger 5 & 6variable Karnaugh maps This article explains about the Larger 5 & 6variable Karnaugh maps.
- A Full Adder This article affords the configuration of a Full Adder.
- Decoder This article describes the concept involved in Decoder.
- Encoder This article breifly explains about the Encoder.
- Digital logic with feedback This article confers the Digital logic with feedback.
- The S-R latch This article offers the S-R latch and its configuration.
- The gated S-R latch This article explains the gated S-R latch.
- The D latch This article describes about the D latch.
- Edge triggered latches Flip Flops This article describes about the Edge triggered latches Flip Flops.
- The J K Flip Flop This article confers the concept and configuration involved in the J K Flip Flop.
- Asynchronous flip flop inputs This article explains the Asynchronous flip flop inputs.
- Binary count sequence This article offers the Binary count sequence.
- Asynchronous counters This article describes about the Asynchronous counters.
- Synchronous counters This article breifly explains about the Synchronous counters.
- Finite State Machines This article explains about the Finite State Machines.
- Making a Venn diagram look like a Karnaugh map This article offers the concept of Making a Venn diagram look like a Karnaugh map.
- Permissive and interlock circuits This article describes the Permissive and interlock circuits.
- Serial in serial out shift register This article explains about the Serial in serial out shift register.
- Serial in parallel out shift register This article breifs on Serial in parallel out shift register.
- Parallel in parallel out universal shift register This article describes the Parallel in parallel out universal shift register.
- Ring counters This article explains about the Ring counters.
- The R 2nR DAC This article offers the R 2nR Digital to Analog Converter.
- The R 2R DAC This article describes the R 2R Digital to Analog Converter.
- Flash ADC This article confers the Flash Analog to Digital Converter.
- Digital ramp ADC This article explains the Digital ramp ADC.
- Successive approximation ADC This article explains the Successive approximation ADC.
- Bit groupings This article explains about the Bit groupings.
- Data flow This article offers about the Data flow.
- Decimal versus binary numeration This article affords the Decimal versus binary numeration.
- Delta Sigma ADC This article explains the Delta Sigma ADC.
- Digital memory terms and concepts This article describes the concept of Digital memory terms.
- Digital signals and gates This article offers the Digital signals and gates.
- Historical nonmechanical memory technologies This article describes the Historical nonmechanical memory technologies.
- Look_Up_Tables This article affords the Look up tables and its configuration.
- Memory with moving parts Drives This article breifs about the Memory with moving parts Drives.
- Modern nonmechanical memory This article explains the Modern nonmechanical memory.
- Negative binary numbers This article describes the Negative binary numbers.
- Network_Protocols This article explains the Network protocols.
- Network topology This article describes the Network topology.
- Networks and busses This article confers the Networks and busses.
- Numbers and symbols This article explains about the Numbers and symbols.
- Octal and hexadecimal numeration This article breifs the Octal and hexadecimal numeration.
- Octal and hexadecimal to decimal conversion This aticle describes the Octal and hexadecimal to decimal conversion.
- Optical data communication This article describes the Optical data communication.
- Overflow This article confers the concept of Overflow.
- Practical considerations of ADC circuits This article explains the Practical considerations of ADC circuits.
- Slope (integrating) ADC This article describes the Slope (integrating) ADC.
- Subtraction This article describes the process of Subtraction.
- Switch types This article offers the Types of Switches.
- Systems of numeration This article describes about the Systems of numeration.
- Tracking ADC This article explains about the Tracking ADC.
- Why digital This article breifly explains how to store and access binary data.
- DSLAM (Digital Subscriber Line Access Multiplexer) This paper confers the concept of Digital Subscriber Line Access Multiplexer.
- ADSL Router This paper explains about the ADSL modem.
- Token Ring This article affords a local area networking system originally conceived in the late 1960s.
- Subnet Masks This article breifly discusses about Subnet Masks.
- DHCP Reservation This article describes a permanent IP address assignment.
- NAT (Network Address Translation) This article explains about a technique for preserving scarce Internet IP addresses.
- QoS (Quality of Service) This paper describes about a generic name for a set of algorithms.
- IP Address This article breifly explains about the unique address that different computers on a computer network use to identify and communicate with one another.
- IP Address Classes This paper explains about the original organizational structure for IP addresses.
- IP Address Conflict This paper discusses the IP Address Conflict.
- Routing Protocols This paper breifly explains about the implementation of a routing algorithm in software or hardware.
- IP (Internet Protocol) This article breifly explains about Internet Protocol and its purpose.
- Routing This article explains about the process of moving packets through an internetwork, such as the Internet.
- How to Set a Static IP This article describes about How to Set a Static IP.
- What is Multicast Wireless? This article describes about the transfer of messages to multiple destinations simultaneously, using fewer networks.
- How to Configure a Router This article discusses about How to Configure a Router.
- Port Forwarding This paper breifly explains about a network port from one node to the other.
- IPsec This paper affords about IPSec (IP Security) is a suite of protocols.
- DMZ (DeMilitarized Zone) This article describes the DeMilitarized Zone.
- Network Attacks This article explains about Network Attaacks.
- Denial of Service (DoS) Attacks This article confers about Denial of Service (DoS) attack is one that attempts to prevent the victim from being able to use all.
- Firewalls This article discusses about a software component that restricts unauthorized inward network access.
- Access Control This article explains about the execution of limitations and restrictionsof Access Control.
- What_is_VDSL2 This article describes about the Very High Bit Rate Digital Subscriber Line Generation 2.
- ISDN Modem This article describes about a digital phone connection that can transmit data, voice and video over a normal telephone line.
- PPP Authentication Protocols This paper explains about PPP Authentication Protocols.
- EtherCAT This article affords the Ethernet for Control Automation Technology.
- Tunneling This article explains about a way in which data is transferred between two networks securely.
- Symmetric DSL This article describes about a kind of one kind of Digital Subscriber Line (DSL) used to provide high-speed Internet connectivity.
- Differences Between ISDN and DSL This article breifly discusses the Differences Between ISDN and DSL.
- Asynchronous Transfer Mode ATM This article explains about the Asynchronous Transfer Mode ATM.
- ATM Cell Header Formate This article confers the ATM Cell Header Formate.
- ATM_Reference_Model This article desribes the ATM Reference Model.
- LAN Topologies This article explains the LAN Topologies.
- E and T carrier This article breifly explains about the E and T carrier.
- FiOS This article describes about a special type of data network that is offered to Fiber Optic Subscribers.
- Network Cable is Unplugged This article confers the concept of Network Cable is Unplugged.
- Analog Telephone Adapter This article explains about an an electronic device used to enable one or more analog telephones.
- How Does Wireless Networking Work? This article explains How Does Wireless Networking Work.
- What is PCAP? This article describes about the Packet Capture.
- SIP Gateway This article explains about a device that connects to your Internet modem and relays data.
- What is a Smart Antenna? This article describes about a smart antenna is one that transmits or receives multiple radio frequencies at once.
- WiBro This article breifs about the Wireless Broadband.
- WiFi Signal Strength Meter This article describes about the WiFi Signal Strength Meter.
- What is Intersymbol Interference? This article explains about the signal distortions- Intersymbol Interference.
- MIC (Message Integrity Check) This article describes A message integrity check (MIC), is a security improvement for WEP Encryption.
- Ad Hoc Network This article explains about a type of peer to peer wireless network mode.
- RSN (Robust Secure Network) This article desceibes about a protocol for establishing secure communications over an 802.11 wireless network.
- Bluetooth This article explains about a specification for short distance between two devices.
- W-CDMA (Wideband Code Division Multiple Access) This article explains the radio access scheme used for third generation cellular systems.
- How to Connect a Wireless Router This article explains How to Connect a Wireless Router.
- Fiber Optic Internet This article explains about the Fiber Optic Internet.
- Fiber Optic Patch Panel This article describes about the Fiber Disteibution Panel.
- Fiber Optics This article explains about the Fiber optic technology makes use of light to carry digital signals via optical cables.
- WLAN (Wireless Local Area Network) This article explains aboout a Wireless Local Area Network (LAN) that implements high frequency radio waves instead of wires.
- TCP Sequence Prediction Attack This article offers a TCP sequence prediction attack is an attempt to hijack an existing TCP session by injecting packets
- RADIUS Server This article describes the Remote Authentication Dial In User Service.
- Ethernet This article explains about the Ethernet and its functions.
- Ethernet at the Physical Layer This article explains about the Ethernet at the Physical Layer.
- Understanding Ethernet LAN Segmentation This article describes about how to understand Ethernet LAN Segmentation.
- LC Connectors This paper affords about the LC Connectors.
- VoIP (Voice over Internet Protocol) This paper confers breifly about the Voice over Internet Protocol.
- Ethernet Switch This article describes about the Ethernet Switch.
- Routing Tables This article breifs the Routing Tables.
- Subnetting This article explains the process of breaking down an IP network into smaller sub-networks.
- MTRJ Connectors This paper breifs about a type of fiber optic cable that has an endpoint.
- RJ-11 This article describes the RJ stands for “Registered Jack”- a physical connector interface most often used for telephone wire terminals.
- 568B This article describes about one of the International standards.
- UTP (Unshielded Twisted Pair) This article explains about the Unshielded Twisted Pair.
- Ethernet Crossover Cable This article offers about the Ethernet Crossover Cable.
- Wavelength Division Multiplexing This article affords the concept of Wavelength Division Multiplexing.
- Cat 5 This article describes the Cat 5, short for Category 5, is the current accepted industry standard for network and telephone wiring.
- DWDM (Dense Wavelength Division Multiplexing) This article confers the Dense Wavelength Division Multiplexing.
- RG-11 This article offers about the RG-11 and its Specification.
- Coaxial Cable This article breifly describes about the Coaxial cable, also called coax, is used to transmit radio frequency (RF) signals.
- What is a QSIG? This article describes the QSIG is a signaling protocol that is based on ISDN.
- How to Compare VoIP Providers This article describes about VoIP (Voice over Internet Protocol) is changing the way people communicate.
- RJ-45 This article explains about one of the more popular standard connector types used with unshielded, twisted pair network cables.
- Cat 6 This article explains about a cable standard used mainly for Ethernet computer networking, security systems, and telephone services.
- RG-59 This article breifs about the RG-59 cable is a type of coaxial cable that is used to generate low-power video connections.
- RG-6 This article confers about RG-6 cable is one of the more common types of coaxial cables used for commercial and household purposes.
- RG58 This article explains about the Cable used for Wiring Purposes.
- Multilayer PCB This article breifs the Multilayer Printed Circuit Board.
- Ethernet Fiber Media Converter This article explains about the device Ethernet Fiber Media Converter.
- How to Splice a Coaxial Cable This article describes how to splice the Coaxial Cable.
- DHCP (Dynamic Host Configuration Protocol) This article explains about the DHCP (Dynamic Host Configuration Protocol).
- Broadcast Domain This article describes about the logical part of a network .
- Collision Domain This article explains about the Logical Network Segments.
- DOCSIS (Data Over Cable Service Interface Specification) This article explains about the Data Over Cable Service Interface Specification.
- PPP (Point-to-Point Protocol) This paper describes about the Point-to-Point Protocol.
- VLAN Hopping Thisarticle breifs about the VLAN Hopping.
- How fast is ADSL Speed? This article affords how fast is ADSL Speed.
- DSL vs Cable Modem This paper discusses the differences between DSL vs Cable Modem.
- Ethernet Cable Pinout This article confers the Ethernet Cable Pinout.
- WEP Key Passphrase This article describes the WEP Key Passphrase.
- Communication Networks–An Introduction and Overview This article describes a network is an interconnection of many nodes through which a desired entity flows or travels.
- Message and Packet Switching This paper confers the concepts of message and packet switching.
- Circuit Switching This article explains about developing the concept and application of circuit switching which is a very important component of a telephone network.
- Connectionless And Connection Oriented Packet Switching This article explains about the understanding of two important modes of packet switching, namely, the connectionless and the connection oriented packet switching.
- Communication Process And Layered Architecture This article describes about the basic animal instinct and it is more so for thehuman beings. They need to communicate for conveying their requirements and feelings to each other.
- Communication Between Two Computers And The Layering Concept This article focusses the layering concept in communication process (computer communication).
- Osi Layers And Protocols This paper explains about the layered architecture in communication process (computer architecture)
- Standards - Physical Layer This paper describes about a bandwidth which is used for transmitting voice where a great deal of distortion and interference can be accepted without loss of intelligibility.
- LAN Topologies, Access Mechanisms And Media This article explains about the processing power of the computer increased considerably,the size and the cost also decreased greatly.
- Token Passing LANs This article explains about the Token bus maintenance, Frame structure.
- Distributed Queue Dual Bus ( DQDB ) This article explains about two parallel unidirectional buses are laid down in the area to be covered by the network.
- Fibre Distributed Data Interface (FDDI) This paper describes the high-performance fiber optic token ring LAN running at 100 Mbps over distances up to 200 km with up to 1000 stations connected.
- Internet and IPv4 This article breifs the Datagram which will have a source and destination address named as IP address.
- IP addressing. ICMP This article breifs the the discussion on IPv4 along with the idea of ICMP.
- Internet And Internet Protocol Suite - IPv6 This article explains the Internet Protocol version 6 (IPv6) or Internetworking Protocol, next generation (IPng) was proposed and is now a standard.
- Internet And Internet Protocol Suite - TCP This article breifs about a very popular transport layer protocol, i.e. the TC Protocol.
- Internet And Internet Protocol Suite - UDP. protocol suite This article explains about the connectionless transport layer protocol, i.e. the User Datagram Protocol.
- Digital Switching - Space Switching This article describes about the hierarchical structure of the telephone networks, if the number of switches decrease then the transmission distance increases, and vice-versa.
- Multistage Switching This article explains about the number of incoming traffic becomes unmanageable by a single operator then grouping is important.
- Time Multiplexed Space Switching and Time Switching This article describes about the Electronic Switching System.
- Time and Space Switches This article breifs about the time switch has a capacity limit as even with a memory cycle at 833 MHz (approx 1 ns) only 125000 users can be served by a single switch.
- Frame Relay and ATM This article breifs about the Bit rate and high basic transmission rate interms of frame relay.
- ATM: Concepts And Header This article explains a fixed packet size irrespective of traffic, and Connection Oriented service is used for achieving large throughput (Connectionless Service will be accommodated anyway).
- ATM: Virtual Path,Virtual Channel. ATM Adaptation Layer (AAL) This article discusses about how to adapt the PDUs passed down from the higher layer onto ATM cells, also explains the Virtual path and channel.
- Narrowband And Broadband ISDN This article explains about the concept and definition of Narrowband And Broadband ISDN.
- ISDN: Reference Points, Services And Standards This article explains about the concept and definition of Integrated Services Digital Network.
- B-ISDN This article breifs the Broadband ISDN service sprung from the growing needs of the customers.
- Synchronous Digital Hierarchy This paper defines a structure which enables plesiochronous signals to be combined together and encapsulated within a standard SDH signal.
- Network Security This article breifs about the Network security and its valuable usage.
- Introduction to Multimedia Systems and Processing This paper breifly describes about the Multimedia Systems and Processing.
- 10 ways to speed up slow computer This article explains about the Defragmenting Hard drives, Clean Registry and Delete Temporary, Junk and Obsolete files/Clear cache.
- A Brief History of Unix This article discusses and covers the history of UNIX and an introduction to UNIX.
- Accessing SQLite Databases in PHP using PDO This article explains about PDO or PHP Data Objects is a data abstraction layer, i.e. it provides uniform methods to access different types of databases, as a result switching between or moving to a different database system is relatively easier.
- Advanced Types Of Scheduling This article describes about the various advanced features of scheduling-Multilevel Queue , Multilevel Feedback Queue and Highest Response Ratio Next .
- Authentication Authorisation Accounting (AAA) Protocols: A Look at RADIUS and DIAMETER This paper briefs about an Authentication, Authorisation and Accounting (AAA) processes which are used when the user of a system that is trying to connect to the internet or other network.
- Basics of Computer Network Fundamentals This paper discusses some basic terminologies related to computer networks that will help you understand the fundamentals of computer networks.
- Basics of How Operating System Works This article explains about the basic function performed by a computer is program execution and the program (to be executed) consists of a set of instructions stored in memory.
- Basics of Servlet (Part-1) This article explains about Servlets which are server side components that provide a powerful mechanism for developing server side programs.
- Basics of Stored Procedures This paper describes a collection or batch of T-SQL statements and control-of-flow language that is stored under one name and executed as a single unit.
- Basics of Virtual Machine And Process This article discusses the Operating system is large, but modularity is important thus a computer system is made up of layers and about Virtual machine creates an efficient, dynamic, secure and portable object-oriented facility.
- Byte Ordering Concept - Little Endian & Big Endian This article explains about the way in which the bytes corresponding to a certain value is stored in the memory.
- Consequences of using the Copy-Paste method in programming and how to deal with it This article briefs about a large amount of source code of various applications where we detected suspicious code fragments.
- Database Vs Files This article explains about the attachments of a flat file that has 22400 names stored with one line containing one record.
- Difference between Stored procedures and User Defined functions[UDF] This article explains and compares the difference bwtween Stored procedures and User Defined functions[UDF].
- DNS Cache Poisoning (DCP) This article affords the Brief History of Cache Poisoning and Redirecting Web Traffic.
- File Version Management in PHP This article explains the Management of files, Creating the files in PHP, Different Ways to Open a File, File Close Description and File Upload in PHP.
- Getting Started With Virtual machines This article briefs about a Virtual machine(VM) as the name suggests is a software implementation of a programmable machine running inside another machine i.e an OS running inside another OS e.g. Linux running inside Windows.
- History and Evaluation of Operating System This article explains an operating system which is a program that acts as an interface or intermediary between the user of a computer and the computer hardware.
- How Anti-Viruses Works This paper describes about the working fundamentals of Anti-Virus which is a software or a program that can scan your files and data in your computer prevent you from firmwares and viruses.
- How to Set up Network Lab With Virtual Machines This article explains three type of network supported by the virtual machines.
- How to Stop vBulletin Spam Registration This article explains the Spam Prevention Options for vBulletin and how to Stop vBulletin Spam.
- How to Use Strace - A Linux Debugging Utility This article explains about Strace is a Linux Utility which lists all the system calls and any signals, of any executable running on Linux Operating System. Strace generally comes along with the Linux installation.
- How Web Search Engines Work This article explains about Search engines are the key to finding specific information on the vast expanse of the World Wide Web and its working.
- Introduction to Hard Disk (HDD) This article explains about a hard drive which is a mass storage device found in all PCs (with some -[exclusions) that is used to store permanent data such as the operating system, programs and user files.
- Introduction to Lossless Audio Encoding This article briefs about Lossless Encoding is a method of encoding that allows no loss of data while converting to and from encoded data to normal data.
- KPMG: On Covert Channels in Networks and Eavesdropping Communication Note This article explains about how to provide an insight as to how organisations, multinationals, governements etc. incorporate security within their network and/or lack of security.
- Linux History This article discusses and covers the history of Linux and an introduction to Linux.
- Linux Makefiles (Basics) This article describes about the concept of makefiles using linux.
- Linux Ports This paper describes about the Common server ports of Linux andPort Numbers Used by Some Common Protocols.
- Linux Shells This article briefs about a fast growing operating system, and it is inexpensive and flexible of Linux shell.
- Memory Allocation Schemes This article explains about the relocation-register scheme provides an effective way to allow the operating-system size to change dynamically.
- Notes on Network Security - Introduction This article briefs about the OSI Network Model of: Application, Transport,Network, Datalink and Physical, where amongst this can security be deployed.
- Operation System and Internet This article briefs the Operation system is a program so is standard on every computer.
- Process Control and Multitasking This article explains the Concept of the UNIX kernel which can keep track of many processes at once, dividing its time between the jobs submitted to it.
- Query Optimization This article explains about the most important factors in the performance of the database and with a good database design you also need optimal queries to perform optimally.
- Scheduling and Threads This article explains the Scheduling Queues, Co-Operating Processes and Inter Process Communication (IPC).
- Screen scraping your way into RSS This article describes about the hottest technologies at the moment, and even big web publishers (such as the New York Times) are getting into RSS as well and its screen scrapping.
- Security Protocols This article explains the Data Link Layer Security, Security History, Vulnerabilities and ecurity Enhancements of WLAN.
- Speed up your web pages This article describes about Database design, Query optimization, Fewer HTTP Requests, Gzip your output, External JavaScript and CSS and Minify JavaScript.
- Sur.ly Free Plugin to Protect Against Link Spam This paper describes about a free plugin for different CMSs (including WordPress and Drupal) that protects your website against any improper content that suspicious users might publish, i.e. spam links posted among user-generated content.
- System Security This article briefs the worm propagation techniques and Network Security Essentials.
- Types of Server This article describes a Server is a computer or device on a network that manages network resources.
- Typical errors of porting C++ code on the 64-bit platform This article briefs about how to observe thoroughly those problems which the developer of 64-bit programs can face.
- Unix Network Programming Tutorials - Socket Basics This article briefs about the concept of network programming where in two processes running on different hosts interact through sockets.
- Web Server Error Messages This article briefs the Errors on the Internet, and those annoying error messages, occur quite frequently -- and can be quite frustrating.
- What Are Web Services? This paper describes about the term Web services in which a standardized way of integrating Web-based applications is explained.
- What is Netcat and How to use it This article briefs the Netcat (also known as ‘nc’ or ‘Swiss Army knife’) is a networking utility used for reading or writing from TCP and UDP sockets using an easy interface.
- What is Operating System, Kernel and Types of kernels This paper explains the concept of a kernel is a central component of an operating system.
- Distributed systems-Architecture This article explains about the highl evel architectural aspects of distributed systems.
- Socket-level Programming This article deals with host and service addressing, and then considers TCP and UDP.
- Data serialisation This article deals with the basics of serialisation and then considers several techniques supported by Go APIs.
- Application-Level Protocols This article deals with the basics of serialisation and then considers several techniques supported by Go APIs.
- Managing character sets and encodings This article explains about varies ways of encoding character sets into binary formats of bytes.
- Distributed System-Security This paper describes about the Spam mail, denial of service attacks, phishing attempts and so on are indicative that anyone using the internet does so at their own risk.
- HTTP This article explains about the Web is built on top of the HTTP (Hyper-Text Transport Protocol) which is layered on top of TCP. HTTP has been through three publically available versions, but the latest - version 1.1 - is now the most commonly used.
- A Complete Web Server This paper describes about a lengthy illustration of the HTTP chapter, building a complete Web server in Go. It also shows how to use templates in order to use expressions in text files to insert variable values and to generate repeated sections.
- XML This article discusses about XML which is a significant markup language mainly intended as a means of serialising data structures as a text document.
- Remote Procedure Call This article explains about a Socket and HTTP programming use a message-passing paradigm.
- Network channels This article explains about the Channel server, Channel client and also explains about how to handle timeouts.
- Web sockets This article describes about Web socketswhich are designed to answer a common problem with web systems: the server is unable to initiate or push content to a user agent such as a browser.
- Networking Concepts This article sexplains about the packet switched network, ethernet protocol, internet protocol.
- Network Addressing This article describes about IPv4 Addressing, IP Address, Subnet Mask, Network and Broadcast Addresses.
- The Super User This article explains about how every file on the server has three sets of permissions: user, group, and everyone else.
- Configuring An Interface This article briefs about the network interface in your machine for the first time, using the ip utility.
- Persistent Configuration This article discusses how to define the network configuration in the system so that your interface is configured automatically at boot time.
- DNS This article explains the Domain Name Service, or DNS, is integral to network computing. It provides a mechanism by which IP addresses can be looked up using host names, and vice versa.
- Package Management and Yum This article discusses about a tool called Yum that can be used to locate and install RPM packages and dependencies.
- SSH: The Secure Shell This article describes about the main component of the OpenSSH client software suite is the ssh command. ssh allows you to log into other servers remotely.
- SSH: The Secure Shell Server This article explains about the OpenSSH server runs as a process in the background on a machine and it listens for incoming connection requests on a specified TCP port.
- User Accounts This article discusses about the file which holds information about all of the user accounts on the system.
- More Control Flow Tools This article deals with the usual control flow statements known from other languages, with some twists.
- What can web analytics do for technical communications? This article explains about Web analytics is often used in Internet marketing to understand the success of advertising or determine why customers aren’t completing the purchase process on a website.
- How do you know your site search is working? This article describes some measurements we’re using to help understand what’s wrong with our current search, and then to be able to work out whether our improved search is better.
- 5 similarities & 5 differences: internal communication vs. technical communication This article briefs about Similarities and dissimilarities between technical communication and internal communication.
- A strategy to address the findability problem This paper describes about a complex problem, involving interaction of many elements.
- 10 reasons APIs and development platforms are difficult to use This artcle explains about how to build the own custom applications.
- Self-service support starts in the UI This article explains about to write a good piece of information once so that customers can find it and use it to solve their problems than it is to deal with the same question from different customers repeatedly.
- When’s the best time to usability-test software? This article briefs about Usability testing as part of requirements gathering phase.
- Auto Enhancements: All About the Cold Air Intake This paper describes about how to enhance your vehicle’s performance without having to make drastic alterations on your engine is by using a high-quality cold air intake.
- Ethernet/IP Multicasting Explained This article explains about an Ethernet/IP is a communication standard developed by Allen Bradley in 2001 and has been turned over to ODVA as an “open” standard for communicating real-time information over Ethernet.
- ATA, IDE and EIDE This article explains about the ATA (Advanced Technology Attachment) standard is a standard interface that allows you to connect storage peripherals to PC computers.
- Binary encoding This article explains about the form of encoding that allows computers to run. Binary uses two states (represented by the digits 0 and 1) to encode information.
- Bluetooth - How it works This article describes about the Bluetooth standard, like WiFi, uses the FHSS technique (Frequency-Hopping Spread Spectrum), which involves splitting the frequency band of 2.402-2.480 GHz into 79 channels (called hops) each 1MHz wide, then transmitting the signal using a sequence of channels known to both the sending and receiving stations.
- Bus Topology This article explains about Multipoint connection is used in BUS Topology.
- Cables and connectors This article briefs about the pins and holes in connectors are usually linked to the electric wires which form the cable. The pin layout describes which pins couple with which wires.
- Client-Server Network This article explains about Client-server describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request.
- Computer - Introduction to Memory This article describes about the term "memory" applies to any electronic component capable of temporarily storing data.
- Computer bus - What is it? This article briefs about a bus, in computing, is a set of physical connections (cables, printed circuits, etc.) which can be shared by multiple hardware components in order to communicate with one another.
- Computer Networking This article briefs about a collection of autonomous computers.
- Computer Operating Systems This article briefs about an Operating systems perform basic tasks, such as recognizing input from the keyboard, sending output to the display screen, keeping track of files and directories on the disk, and controlling peripheral devices such as disk drives and printers.
- Computer screen or monitor This article explains about a monitor (or screen) is a computer display unit.
- Creating a local area network This paper describes about how to create a local area network (LAN). Setting up such a network costs very little, contrary to what people may think.
- Creating an RJ45 crossover cable This article explains about the RJ-45 is the one which interests us here, as it it the most widely used.
- Cross-Site Scripting attacks This article describes about Cross-Site Scripting (sometimes abbreviated XSS or CSS) attacks are attacks targeting websites that dynamically display user content without checking and encoding the information entered by users.
- Data transmission - Cabling This article briefs on a physical data-transmission media are available to connect together the various devices on a network.
- Data transmission - Digital data transmission This article explains about Digital transmission which is the sending of information over a physical communications media in the form of digital signals.
- Data transmission - Transmission modes This article describes about transmission on a communications channel between two machines can occur in several different ways.
- Declaring a style sheet (CSS) This article describes about the HTML code indicating both the type of document, meaning the version of the HTML and CSS recommendations used by the pages, and the styles themselves.
- DTS (Digital Theatre Sound) This article determines about DTS (Digital Theatre Sound) is a digital sound coding standard created by Universal.
- Ethernet Cabling This article explains about the various kind of Ethernet cables.
- FAT16 and FAT32 This article briefs about the first file system to be used on a Microsoft operating system was the FAT system, which uses a file allocation table.
- File sharing in Windows XP This article discusses about File sharing which involves making the content of one or more directories available through the network.
- Formatting - Formatting a hard drive This article explains about the purpose of low-level formatting is to divide the disk surface and The tracks are the concentric areas written on both sides of a platter.
- Front Office and Back Office This article describes about the Front-Office (sometimes also called Front line) refers to the front part of the company, visible for the clients and in direct contact with them, such as the marketing, user support, or after-sales service teams. In turn, Back Office refers to all parts of the information system to which the final user does not have access.
- FTP protocol (File Transfer Protocol) This article explains about FTP protocol defines the way in which data must be transferred over a TCP/IP network.
- Hardware Interrupts (IRQ) and Conflicts This article describes about the Concept of Interrupts and a direct memory access channel, called a DMA.
- How email works (MTA, MDA, MUA) This article explains an Email is based around the use of electronic mailboxes. When an email is sent, the message is routed from server to server, all the way to the recipient's email server.
- How to make a bootable windows7 pen drive. This article explains about a virus clean PC for copying process, Original Windows 7 disc and A 4 GB pen drive.
- How to make my computer faster-1 This article explains about a free system tune-up utility with many advanced options.
- How to make my computer faster-2 This article explains about how to customise what type of content you want to clear.
- How to recover permanently deleted files This article explains about how to recover permanently deleted files.
- Hub And Bridges This article explains about the central part of a wheel where the spokes come together.
- Introduction to encryption with DES This article explains about a high security level related to a small key used for encryption and decryption.
- Introduction to Wi-Fi (802.11 or WiFi) This article describes about an international standard describing the characteristics of a wireless local area network (WLAN).
- IP address spoofing This article describes about "IP address spoofing" is a technique that involves replacing the IP address of an IP packet's sender with another machine's IP address.
- IP Addressing This article explains about an IP address consists of four so-called octets separated by dots.
- ISP - Internet service providers This article explains about how does the ISP connect you to the Internet.
- Managing images in HTML This article explains about how do you display images on a web page.
- Messaging protocols (SMTP,POP3 and IMAP4) This article discusses about a protocol operating in online mode, encapsulated in a TCP/IP frame. The mail is sent directly to the recipient's mail server.
- Metropolitan Area Network This article deals with Metropolitan Area Network(MAN)is a computer networks usually spanning a campus or a city, which typically connect a few local area networks using high speed backbone technologies.
- MIME (Multipurpose Internet Mail Extensions) This article explains about MIME describes the type of message content and the encoding used.
- More Networking Protocols COMPUTER NETWORKING This article briefs about a system where each computer listens to the cable before sending anything through the network.
- Motherboard This article briefs about the primary component of a computer is the motherboard (sometimes called the "main board"). The motherboard is the hub which is used to connect all of the computer's essential components.
- NAT- Network address translation, port forwarding and port trigg This article describes about the principle of NAT therefore consists of using a gateway connection to the Internet, having at least one network interface connected to the internal network and at least one network interface connected to the Internet (possessing a routable IP address), in order to connect all the machines to the network.
- Network Address Translation (NAT) This article explains about the translation of an Internet Protocol address (IP address) used within one network to a different IP address known within another network.
- Network cards This article explains about a network card (also called a Network Adapter or Network Interface Card, orNIC for short) acts as the interface between a computer and a network cable.
- Network equipment - Bridges This article briefs on a bridge is a hardware device for linking two networks that work with the same protocol.
- Network Protocols COMPUTER NETWORKING This article explains about a network protocol defines rules and conventions for communication between network devices.
- Network Subnetting This article briefs about a technique that allows a network administrator to divide one physical network into smaller logical networks and, thus, control the flow of traffic for security or efficiency reasons.
- Network tests and diagnostics This article briefs about the IP configuration for each interface; a computer with two network cards and one wireless adapter has 3 interfaces each with its own configuration.
- Networking - 3-Tier Client/Server Architecture This article explains about 3-tier architecture, there is an intermediary level, meaning the architecture is generally split up.
- Networking, basics understanding & functions. Part-1 This article explains about a network is a network of a bunch of computers located geographically at same or different places.
- OOP - Data encapsulation This article briefs on an encapsulation is a way of organizing data and methods into a structure by concealing the the way the object is implemented, i.e. preventing access to data by any means other than those specified.
- OOP - Inheritance This article describes about an Inheritance is specific to object-oriented programming, where a new class is created from an existing class.
- OOP - Polymorphism This paper briefs on the essential concepts of object-oriented programming.
- Operating system This article explains about the operating system (sometimes referred to by its abbreviation OS), is responsible for creating the link between the material resources, the user and the applications (word processor, video game, etc.).
- Partition - Partitioning a hard drive This article explains about the partitioning of a hard drive occurs after the drive has been physically formatted but before it is logically formatted.
- Peer-Peer Networking This article discusses about Peer-to-peer networks are quite common in small offices that do not use a dedicated file server.
- PPP and SLIP protocols This article explains about the notion of a point to point link.
- Private-key (or secret-key) cryptography This article discusses about Symmetric encryption (also called private-key encryption or secret-key encryption) involves using the same key for encryption and decryption.
- Processor This article explains about the processor (CPU, for Central Processing Unit) is the computer's brain. It allows the processing of numeric data, meaning information entered in binary form, and the execution of instructions stored in memory.
- Proxy and reverse proxy servers This article explains about a proxy server which is a machine which acts as an intermediary between the computers of a local area network (sometimes using protocols other than TCP/IP) and the Internet
Most of the time the proxy server is used for the web, and when it is, it's an HTTPproxy. - Random access memory (RAM or PC memory) This article explains about the different types of Types of random access memory and its function.
- Read-only memory (ROM) This article briefs about a type of memory that stores data without electrical current; it is thermo (Read Only Memory) or is sometimes called non-volatile memory as it is not erased when the system is switched off.
- Representation of real numbers and integers This article explains about Representing numbers in a computer is necessary in order for it to be able to store and manipulate them.
- RTP/RTCP protocols This article explains about the Real-time Transport Protocol and Real-time Transport Control Protocol.
- Star Topology This article describes about Star Topology the central node/device acts as master node.
- Switch This article describes about a switch is a device that channels incoming data from any of multiple input ports to the specific output port that will take the data toward its intended destination.
- TCP/IP This article explains about TCP/IP communication is primarily point-to-point, meaning each communication is from one point (or host computer) in the network to another point or host computer.
- The ARP protocol This article discusses about the ARP protocol plays a key role among Internet layer protocols relating to TCP/IP, since it enables the physical address of a network interface card corresponding to an IP address to be known.
- The concept of networks This article explains about the generic term "network" refers to a group of entities (objects, people, etc.) which are connected to one another.
- The OSI Model Computer Networking This article briefs about Compatible interconnection of network devices is fundamental to reliable network communications.
- Types of networks This article explains about Different types of (private) networks are distinguished based on their size (in terms of the number of machines), their data transfer speed, and their reach.
- URL manipulation attacks This article explains about a web application is the vector that makes it possible to indicate the requested resource.
- Using Telnet This article explains about telnet which is a protocol for emulating a remote terminal, which means that it can be used to run commands entered on a keyboard at a remote machine.
- Virtual Private Network (VPN) This article explains about a technology that lets people access their office’s computer network over the Internet while at home or travelling.
- Wide Area Network This article describes about a wide area network (WAN) is a geographically dispersed telecommunications network.
- WiFi modes of operation (802.11 or Wi-Fi) This article discusses about a Wireless adapters or network interface controllers (NICs for short) are network cards with the 802.11 standard which let a machine connect to a wireless network.
- Windows registry, some basic understanding This article describes about how to configure many hidden settings for windows and other applications installed, which are not accessible by the interface of the particular software itself.
- Wireless Internet Video Camera This article explains about Wireless Internet video cameras work by serving up data streams to any computer that connects to them.
- Wireless Print Server This article describes about Wireless print servers for home networks generally are available in both 802.11b and 802.11g varieties.
- Wireless Range Extender This article explains about a wireless range extender increases the distance over which a WLAN signal can spread, overcoming obstacles and enhancing overall network signal quality.
- Wireless Router This article explains about the centrepiece product of many home computer networks is a wireless router.
- 5G wireless will be broadband plus lowband communication This article describes the regions of mobile usage.
- A Comparison of DNS Server Types This article discusses about some of the different types of DNS server setups and what the advantages, use cases, and properties are of each.
- Advantages of MPLS : an example This article explains about the advantages of multi protocol switch labelling.
- Application Virtualization This article explains application virtualization briefly with its features application delivery etc.
- Cloud Computing Basics This article describes about the cloud computing basics and its types.
- Coaxial Cable Basics This article discusses about the basics of coaxial cable.
- Common Server Setups For Your Web Application - Part I This article describes about the commonly used server types with a short description of each, including pros and cons.
- Common Server Setups For Your Web Application - Part II This article describes about the commonly used server types with a short description of each, including pros and cons.
- Configuring your Droplet to Only Use IPv6 Networking This article discusses how to turn off IPv4 networking if you wish to only have IPv6 enabled. Most people will not need to do this, but there are situations where it may make sense. You will still need to have IPv4 available for the localhost so that your programs operate as expected.
- Creating a new Hyper-V Virtual Machine This article discusses the creation of a new virtual machine on Hyper-V where the host environment has the resources and settings.
- Deploying Vyatta VPN server on dynamic IP This article explains about deploying Vyatta VPN server on dynamic IP.
- Ethernet versus Fiber Channel This article describes the introduction of Ethernet vs Fiber Channel.
- How to Make or Repair Cat 5/Ethernet Cables This article describes about how to make or repair the cat5 ethernet cables.
- IEEE 802.11ah This article describes about the first impression on the ieee 802.11ah standard amendment.
- Implementing SSL Termination With HAProxy on Ubuntu 14.04 This article describes how to use HAProxy for SSL termination, for traffic encryption, and for load balancing your web servers.
- Introduction to Computer Networks This article describes about the basics of computer network.
- Introduction to Networking This article discusses about what is networking and types of networks with its architechture.
- MPLS, part I: basic labeling This article describes about the multiprotocol label switching.
- MPLS, part II This article discusses about the VRF awares MPLS-VPN.
- Networking Cables and Connectors This article explains about the networking cables and connectors.
- OSI MODEL This article describes about seven layers of OSI model in detail.
- Pen Computing This article explains the functions of digital pen in detail with its uses.
- Private VLANs: where to deploy them. This article briefs how to configure them, work around them and deploy them in a larger network.
- Problems in a wireless LAN This article explains about hidden terminal, exposed terminal problem and inability to detect collision.
- Redundant switch design without spanning tree This article describes about the redundant switch design without spanning tree.
- Rigging Cables This article discusses importance the rigging cables.
- Router : How it Works This article describes how a router works.
- Security functions: Routers, Switches and Load Balancers This article describes about the security functions of routers, switches and load balancers.
- Security Functions of Firewalls This article describes about the security functions of firewall and different types of firewall.
- Setting up a virtual switch for a Hyper-V network This article explains how to set up a virtual switch to be used as the network over which several virtual machines can communicate.
- Setting up file sharing between guest and host OS in Hyper-V using an Internal network This article describes about making the network configuration settings made on a Hyper-V virtual machine in order to allow file sharing between the virtual machine and host OS.
- Site-to-site VPNs part I: theory. This article discusses about the configuration details of site-to-site (S2S) VPN connections on some required parameters
- Site-to-site VPNs part II: Cisco IOS This article discusses about the configuration details of site-to-site (S2S) VPN connections on Cisco IOS.
- Site-to-site VPNs part III: Cisco ASA This article describes about the configuration details of site-to-site (S2S) VPN connections on Cisco ASA.
- Site-to-site VPNs Part IV: Vyatta This article describes about the configuration details of site-to-site (S2S) VPN connections on Vyatta.
- Storage Differences This article describes about the Fibre channel storage and iCSI storage briefly.
- Tablet PC - How Stuff Works This article explains how a tablet pc works.
- TCP/IP Model This article describes about the layers of TCP/IP Models.
- Testing an Aruba IAP This article describes about testing an Aruba IAP.
- Testing two Aruba IAP This article describes about testing two Aruba IAP.
- The Four Deployment Models of Cloud Computing This article explains the definition of four deployment models of cloud computing.
- The Risk of Lock-in with Cloud Computing This article describes about the risk of lock-in in cloud computing.
- The Three Service Models of Cloud Computing This article discusses about the three service models of cloud computing.
- Types of DoS attack This article discusses about the types of denial of service attack.
- Types of VPN This article describes about the different types of VPN explained.
- Using NSD, an Authoritative-Only DNS Server, on Ubuntu 14.04 This article explains how to install and configure NSD to securely administer our DNS zones on Ubuntu 14.04 servers.
- Virtual switching – A short introduction This article explains about the role of virtual swirching in data center.
- WI-FI : How Stuff It Works This article discusses about the Wi-fi and about its components.
- Wireless best practices This article explains about the wireless best practices.
- Wireless Network Topologies This article describes about the different types of WLANs, all with its own speed, frequency and transmission range.
- Wireless signal modulation This article discusses about the working of wireless.
- A Model for Network Security This article explains the A Model for Network Security.
- Application and Signature - Based IDS This article discusses the advantages and disadvantages of Application and Signature - Based IDS.
- Asynchronous Transfer Mode (ATM) This article describes ATM network interfaces, ATM virtual connections, ATM reference model, advantages and disadvantages of ATM.
- Attacks on Cryptosystems This article explains the middle-man attack, dictionary attack, timing attack and defending from attack.
- Authentication Header This article explains the Authentication Header in detail.
- Basic Combinations of Security Associations This article discusses the basic combinations of security associations and key management.
- Change Cipher Spec, Alert and Handshake Protocol This article describes the Change Cipher Spec, Alert and Handshake Protocol in detail.
- Combining Security Associations This article explains the combining security associations.
- Comparison of OSI &TCP/IP Model and IP Address This article explains the differences of OSI and TCP/IP Model and definition of IP Address.
- Computer Network This article describes about the definition, uses, advantages and types of Computer network.
- Congestion Control This article explains the open loop and close loop congestion control.
- Content Filters This article describes about the content filters in detail.
- Content Outline This article explains the sections and major process steps in content outline.
- Contingency Planning This article discusses the strategy, CP, components of CP, and CP team.
- Damage Assessment and Disaster Recovery Planning This article describes the Damage Assessment and Disaster Recovery Planning, DRP steps and crisis management.
- Deploying Host-Based IDSs and Measuring the Effectiveness of IDSs This article describes the deploying host-based IDSs and measuring the effectiveness of IDSs.
- Design Issues for the Network Layer and Circuit Switching This article explains Design Issues for the Network Layer and Circuit Switching.
- Design of Security Architecture This article explains the Defense in Depth and Security Perimeter.
- Distance Vector Routing Algorithm This article discusses the distance vector routing alogrithm with its structure ,initial and next update.
- Domain Name System (DNS) This article describes about the domain name space and domain name, fully qualified domain name, partially qualified domain name and DNS in internet.
- Dual Signature This article describes the construction of dual signature.
- Elements of Network and Multiplexing This article discusses about the elements of network, multiplexing and ways of communication.
- Encapsulating Security Payload This article discusses the Encryption and Authentication Algorithms and padding.
- Error Control and Detection This article discusses the Error Control and Detection briefly.
- Error Correction This article describes the three types of ARQ.
- Fiber-Optics This article describes the principle of fiber optics, propagation modes, advantages and disadvantages of fiber-optics.
- Firewall architectures This article discusses the packet filtering routers, screened host firewalls, dual-homed firewalls,a nd screened subnet firewalls.
- Firewall Categorization Methods This article explains the Application Gateways, Circuit Gateways, MAC layer Firewalls and Hybrid Firewalls.
- Firewall Rules This article explains the firewall rules set in detail.
- Firewalls in Network Security This article explains firewall categorization methods of Packet Filtering in detail.
- Flow Control This article explains the flow control, Stop and wait Flow Control and Sliding Window Flow Control.
- Frame Relay This article explains about frame relay operation and frame relay layer.
- Framing This article describes the types of framing, LLC frame Format and MAC frame format.
- FTP and Proxy server This article discusses the mechanisms and functions of FTP and types of proxy.
- High -Level Data Link Control(HDLC) This article explains HDLC Frame format, I frames, S frames and U frames.
- Honey Pots, Honey Nets, and Padded Cell system This article explains the Honey Pots, Honey Nets, and Padded Cell system in detail.
- Host-Based IDS This article describes the HDS, advantages and disadvantages of HIDS.
- HTTP and DHCP This article discusses the hypertext markup protocol and dynamic host configuration protocol.
- IDS Control Strategies This article discusses the Centralized Control Strategy, Fully Distributed Control Strategyand partially Distributed Control Strategy.
- IDS Deployment Overview This article explains the deploying netwotk based IDS in detail with advantages on different location.
- IDS Response Behavior This article explains the response behaviour on IDS.
- Incident Response Planning This article explains the incident response, Planning , Detection, Reaction and Recovery.
- Integrated Service Digital Network (ISDN) This article discusses about BRI, PRI and ISDN reference points.
- Internet Standards and the Internet Society This article discusses the The Internet Organizations and RFC Publication.
- Internet, Intranet and Extranet This article describes about the Internet, Intranet and Extranet.
- Introduction to Network Security This article explains the introduction to network security, OSI security Architecture and OSI Security attacks.
- Introduction to Virtual Circuit and X.25 This article discusses on virtual circuit and it types and X.25 briefly.
- Intrusion Detection Systems (IDSs) This article explains the IDS terminology in detail.
- IP Address Class This article discusses about the classes in IP address, Private and public IP address .
- IP Security Architecture This article describes the IPSec Documents Overview with diagram.
- IP Security Overview This article explains the IP Security Overview, Application of IPSec and Benefits of IPSec.
- IP Security Services This article discusses the IPSec services, SA Parameters and SA Selectors.
- IPV6 Addressing This article describes about IPV6 Addressing, ipv4vs ipv6.
- IPV6 and its comparison with IPV4 This article explains the features of IPV6 and its comparison with IPV4.
- Key Technology Components This article describes the firewalls, DMZ, proxy sevrer and IDS in detail.
- Link State Routing Algorithm This article explains the link state routing algorithm, its advantages, comparison between link state and distance vector.
- Modes of communication and Protocol This article discusses about the modes of communication and protocol briefly.
- Multiple Access, Services and Data Link Devices This article explains about the multiple access, services and data link devices like switch, hub and bridge.
- Network Architecture This article explains the peer to peer and client-server model.
- Network Based IDS This article explains the NIDS, NIDS Signature Matching, advantages and disadvantages of NIDS.
- OSI Reference Model- Introduction This article describes network software, protocol hierarchies, layer communication, peer - peer communication and data encapsulation.
- Payment Processing This article explains the SET Transaction Types and Purchase Request.
- Physical Topology and Logical Topology This article discusses the Physical Topology and Logical Topology like bus, mesh, star, ring topology etc.
- Planning for Security This article explains the Introduction to security planning, Information Security Policy, Standards and Practices.
- Point to Point Protocol (PPP) This article explains the ppp framing in detail.
- Policies in Network Security This article explains the Responsible Individual, Schedule of Reviews, Review Procedures and Practices, Policy and Revision Date and Information Security Blueprints in detail.
- Post Office Protocol version 3 (POP3) This article describes POP3 and difference between Pop3 and imap
- Principle of Communication This article explains the principle of communication in detail.
- Protecting Remote Connections This article explains the dialup, radius, securing authentication with kerberos and Sesame in detail.
- Router - Introduction This article describes the routing and routing protocols.
- Secure Electronic Transaction This article explains the secure electronic transaction overview, requirements and Key features.
- Secure Socket Layer Security This article describes about the Secure socket layer architecture in detail.
- Security Attacks This article describes the two types of security attacks : Passive and Active attack.
- Security Services This article discusses the five categories of security services.
- SET Participants This article discusses the SET participants with neat diagram.
- Seven Layers of OSI Reference Model This article discusses the seven layers of osi reference model.
- SMTP and IMAP This article explains the simple mail transfer protocol and internet mail access protocol
- SNMP and Network Management Architectures This article explains the SNMP and network management architectures in detail.
- Socks Server This article explains the selecting the right firewall and configuring and managing firewalls.
- Spanning Tree Protocol(STP) This article describes the need for reduntant topology, Issues with Redundancy
- SSL Record Protocol This article discusses the secure socket layer record protocol in detail.
- Subnet Mask This article describes subnet mask, CIDR and subnetting with class.
- TCP/IP Reference Model This article discusses the TCP/IP Model with UDP, Internet Layer and Network Access Layer.
- The Planning Process This article explains the Off-Site Disaster Data Storage, The Planning Document, Using the plan and Law Enforcement Involvement.
- Three Levels of Control in Network Security This article discusses the Managerial Controls, Operational Controls and Technical Controls.
- Transmission Medium This article explains the guided media like co-axial cable and Twisted pair.
- Transport and Tunnel Modes This article describes the transport mode and tunnel mode.
- Trap and Trace Systems This article discusses the Trap and Trace Systems and active intrusion prevention.
- Types of Network This article explains the types of network like LAN, MAN, WAN and LAN vs WAN.
- Types of Policies - II This article describes the Authorized Access and Usage of Equipment, Prohibited Usage of Equipment, Systems Management and Violations of Policy etc.
- Types of Policy This article discusses the General or security program policies, Issue-specific security policies and Systems-specific security policies.
- Virtual Private Network (VPN) and IPsec This article explains the VPN and Ipsec in detail.
- Virtual Private Network(VPNs) This article explains the VPN, transport and tunnel mode.
- Web Security This article explains the Web Security and its considerations.
- Why Use an IDS? This article describes several compelling reasons to acquire and use an IDS according to NIST's documentation on industry best practices.
- Wireless LAN This article discusses the WLAN, its standards and wireless topologies.
- Wireless Networking This article explains the wireless networking like microwave, radiowave, infrared and satellite microwave.
- Advanced encryption standard (AES) This article explains the secret-key encryption protocol and public-key encryption protocol.
- Application layer and DNS This article describes the Web communication between two end systems and client server model.
- ARP, RARP, IP fragmentation and reassembly This article describes the address resolution protocol, Reverse Address Resolution Protocol and IP fragmentation and Reassembly.
- Authentication This article describes the authentication with combined with encryption and use of the hash function.
- Buffer management: random early detection (RED) This article describes the buffer management, Traffic Management at the Flow Level, Open-Loop Control and Admission Control.
- Clustering protocols This article discusses the Classification of Clustering Protocols and LEACH Clustering Protocol.
- Definitions of terms for earth-orbiting satellites This article explains the definitions of terms for earth-orbiting satellites.
- Destination-sequenced distance vector (DSDV) protocol This article describes the Destination-Sequenced Distance Vector (DSDV) protocol in detail with Routing Tables.
- DHCP - An introduction This article discusses the introduction of dynamic host configuration protocol.
- Differentiated services QOS This article discusses the differential services in detail with Per-Hop Behavior.
- Direct broadcast satellite (DBS) This article explains the direct broadcast satellite, orbital sapacing, power rating, The Home Receiver Indoor Unit (IDU), Frequencies and Polarization.
- Domain name system (DNS) - An introduction This article explains the Domain Name Space, Domain-Name Servers, Name/Address Mapping and DNS Message Format.
- Dual leaky bucket This article describes the Dual Leaky Bucket, Traffic Shaping, Leaky Bucket Traffic Shaper and Token Bucket Traffic Shaper.
- Earth segment - I This article discusses the introduction of earth segements, receive only home tv systems, the outdoor unit and the indoor unit.
- Earth segment - II This article explains the master antenna tv system, community antenna tv system and transmit receive earth stations.
- E-mail, SMTP and FTP This article explains the electronic mail, simple mail transfer protocol and file transfer protocol.
- Fair queueing This article discusses on Fair queueing.
- Flow control and traffic management This article discusses the Closed-Loop Flow Control, End-to-end closed loop control, Hop-by-hop control, End-to-End vs. Hop-by-Hop Congestion Control and Traffic Management at the flow aggregated level /Traffic Engineering.
- ICMP - An introduction This article discusses the Internet control message protocol, ICMP messages, ICMP Basic Error Message Format and ICMP functions.
- Inclined orbits, calendars and universal time This article discusses the inclined orbits, calendars and universal time.
- Interference and satellite access This article describes the single access, preassigned FDMA and Spade system.
- Interference and satellite access - TDMA This article discusses the time division multiple access with interference and satellite access.
- Internet group management protocol and reverse-path multicasting This article explains the IGMP and reverse-path multicasting.
- Internet protocol and IP addressing This article discusses the internet protocol, Classful IPAddresses, IP Addressing and Subnet Addressing.
- Internet protocol V6 (IPV6) This article discusses the IPv6 with its header format.
- Internet routing protocols This article describes the three categories of autonomous system.
- IP routing and CIDR This article explains the IP Routing and Classless Inter domain routing.
- JPEG and MPEG files This article discusses the GIF Files, Moving Images and MPEG Compression.
- Leaky bucket algorithm This article explains the policing and Leaky Bucket Algorithm in detail.
- MP3 and Streaming audio This article describes the mp3 and streaming audio, Limits of Compression with Loss and Basics of Information Theory.
- Multimedia networking This article explains the Overview of Data Compression and Digital Voice and Compression.
- Multiprotocol label switching (MPLS) - I This article explains the MPLS Operation and MPSL Packet Format.
- Multiprotocol label switching (MPLS) - II This article describes the Routing in MPLS Domains and Tunneling and Use of FEC.
- NAT and Mobile IP This article explains the network address translation and Mobile IP.
- Network management This article describes about the network management in detail.
- Network management - II This article explains the Elements of Network Management, Structure of Management Information and Management Information Base.
- Network security - An introduction This article discusses the Overview of Network Security, Elements of Network Security and Threats to Network Security.
- Orbits This article discusses the introduction to orbits and kepler first,second & third law.
- Overlay networks This article discusses about the for connections between two LANs associated with routers R1 and R4.
- Overview of IP telephony This article explains the overview of IP Telephony with the diagram of Voice over IP system.
- Overview of QOS This article explains the overview of QoS and Integrated QoS.
- Overview of security methods This article explains the overview of security methods with Cryptographic Techniques and Authentication Techniques.
- Overview of wireless AD-HOC networks This article explains the overview of wireless adhoc networks.
- Packet network topology This article explains the LAN, CAN, and ISP with packet network topology in detail.
- Packet type and format This article explains the packet type and format in RCTP.
- Packet-mistreatment and denial of service attacks This article discusses the packet-mistreatment and denial of service attacks.
- Packet-switching networks This article explains the packet-switching networks in detail.
- Propagation impairments and space link This article describes the introduction, Atmospheric Losses, Ionospheric Effects and Rain Attenuation.
- Propagation Transmission Losses and System Noise This article describes the propagation transmission losses and system noise.
- Protocol stack in sensor network This article discusses the protocol stack in sensor network architecture in detail.
- Real time transport protocol (RTP) This article explains the Real-time transport protocol and Real-Time Session and Data Transfer.
- Remote login protocols This article explains the TELNET Protocol, Logging to Remote Servers and Secure Shell (SSH) Protocol.
- Reverse-path broadcasting This article explains the operation of reverse path broadcasting.
- Routing in AD-HOC networks This article discusses the Classification of Routing Protocols, Table-Driven Routing Protocols, Source-Initiated Routing Protocols and Routing Protocols for Ad-Hoc Networks .
- Routing in packet networks This article describes the routing in packets with example and Routing Algorithm Classification.
- Routing table poisoning attacks and DNS hacking attacks This article explains the two attacks namely routing table posioning and DNS hacking attacks in detail.
- RSA algorithm – An introduction This article discusses the introduction of RSA algorithm in detail.
- RTP packet header This article describes about the RTP packet header and Real-Time Control Protocol (RTCP).
- Satellite communications This article describes the introduction and frquency allocation of satellite communication.
- Satellite mobile and specialized services This article describes the satellite mobile architecture in detail.
- Secret key encryption protocols This article describes the Data Encryption Standard (DES) in Secret-Key Encryption Protocol.
- Secure hash algorithm (SHA) This article discusses the secure hash algorithm, Authentication and Digital Signature.
- Sensor networks and protocol structures This article describes the Clustering in Sensor Networks.
- Sensor node structure This article explains a typical wireless sensor node structure briefly.
- Shortest path algorithms - An introduction This article discusses the introduction to shortest path algorithm.
- Simple network management protocol (SNMP) This article explains the SNMP PDU format.
- Space segment This article explains the introduction, attitude control, thermal control and station keeping.
- Stream control transmission protocol (SCTP) This article describes the SCTP Packet Structure and features of Stream Control Transmission Protocol.
- TCP connection establishment and termination This article describes the connection establishment and termination.
- TCP segment This article explains the tranmission control protocol segment briefly.
- TCP state transition diagram and mobile IP This article discusses about the TCP state transition diagram and Mobile IP.
- TCP/IP architecture - An introduction This article explains the TCP/IP Architecture with Internet Addresses, Internet Names and Physical Addresses.
- TCP/IP-1 This article describes the TCP/IP Architecture in detail.
- TCP/IP-2 This article describes the TCP Reliable Stream Service and TCP Operation.
- The bellman-ford algorithm: an introduction This article explains the introduction to Bellman-ford algorithm.
- The internet protocol This article explains the internet protocol with IP Packets in detail.
- Traffic management This article discusses the Traffic Management at Packet Level and different strategies for Queue scheduling.
- Traffic management at flow aggregate level This article discusses the traffic management at flow aggregate level.
- Traffic management at flow level This article describes the traffic management at flow level.
- Traffic management at the packet level This article explains the traffic management at the packet level.
- Traffic shaping This article describes the traffic shaping in detail.
- TTC subsystem, transponders and antenna subsystem This article describes the TTC subsystem, transponders and antenna subsystem.
- Uplink and downlink of satellite This article explains the uplink and downlink of satellite.
- User datagram protocol - An introduction This article describes the introduction on UDP.
- Virtual private networks - I This article explains the remote-Access VPN and Site-to-Site VPN in detail.
- Virtual private networks - II This article describes the Tunneling and Point-to-Point Protocol (PPP).
- VoIP quality of service and VoIP signaling protocols This article discusses the VoIP quality of service, VoIP signaling protocols and Session Initiation Protocol.
- World wide web (WWW) and HTTP This article discusses the world wide web and hyper text transfer protocol.
- WRP and CGSR protocol This article explains the Cluster-Head Gateway Switch Routing Protocol, Clustering and Routing Algorithms and Wireless Routing Protocol (WRP).
- The internet of things This article discusses the System design, economy and future.
- Internet addiction This article describes the internet design addiction.
- A short learning CSS3 animations This article explains about the CSS animations and its properties.
- Advancements in software development technology 2015 This article discusses the development in software technology.
- All about near field communication This article discusses the in mobile phone technology.
- An overview of MPLS services This article discusses the Multi-Protocol Label Switching services.
- Assurance conversion with EDB to PST software from crashed EDB files This article describes the EDB file is the default extension file.
- Benefits of hiring virtual receptionist This article describes the benefits of hiring virtual skilled and experienced.
- Best range walkie talkies and advantage This article describes the portable transmitter receiver device and advantages.
- Black hole information This article describes the black hole information.
- Broadband and network installation This article explains the single dial up Internet connection using broadband and network.
- Choosing an antivirus solution for your organization This article discusses how to choose an antivrus for the organisation.
- Choosing and using secure passwords This article explains about the threats, email, trojans, port scanning and spyware.
- Client server networks This article describes the switch to a client-server network.
- Components of a wireless LAN This article explains about the components of the essential wireless LAN.
- Cyber crime: The achilles heel of the business world This article explains the cyber attacks in detail.
- Disadvantages of having a server This article explains about the disadvantages of the server in detail.
- Disk technologies This article describes the primary functions of the all network access.
- Documenting your network This article explains the internet service provider, router, hub etc.
- Economies of scale with cloud computing & services practice This article discusses the centralized data storage and other resources.
- Effective communication with a walkie talkie This article explains the difference between mobile phones and walkie talkie.
- Ensuring healthy & secured wi-fi network in hospitals This article describes the wireless connectivity in secure.
- Firewall - definition This article explains the firewall definition and its types.
- Firewalls This article disscusses the firewall filters in all the packets of data.
- Firewalls and antivirus - essential security This article explains the software firewall, hardware firewall and antivirus etc.
- Getting a network This article explains the peer to peer network and server based network.
- Going mobile in the wireless revolution This article disscusses the alternatives of the wireless revolution in detail.
- High speed satellite broadband for personal use This article explains the high speed satellite bradband in detail.
- How managed it services and cloud computing can improve your business This article explains the cloud computing in focused on growth and prosperity.
- How to connect with available network & telecommunication This article describes the wireless network and wired network.
- Infection control This article explains the infection control.
- Internet security This article explains how secure is the internet.
- ISO 27001 – an introduction This article describes how do we achieve the ISO 27001 standard.
- Keeping your data secure This article discusses how to keep your data secure.
- Locating network problems This article explains the other causes of network problems.
- MAC OS X Server in mixed environments This article explains the featured server operating system.
- Machine to machine and internet of things This article explains the wired system to interact other devices.
- Network troubleshooting - introduction This article explains the identifying in the network problem of troubleshooting.
- Network troubleshooting – servers This article disscusses the operating system and hardware to the network.
- Network troubleshooting - workstations This article explains the networks use the TCP/IP protocol to transport data .
- Network with a server This article disscusses the network with a server.
- Networks This article explains the types of networking in detail.
- Open source alternatives to windows on servers This article describes the server with Free and Open Source Software.
- Peer to peer networks This article disscusses the client-server network in peer to peer.
- Peer-to-peer network with a pc set to share files This article describes the standalone PCs to a network.
- Planning a network installation This article describes the requirements of the network installation.
- Principle behind wireless communication This article discusses the radio communication device of wireless.
- Quantified self: a craze for measurement This article discusses a craze for measurement.
- Reduce management and financial load of business with softswitch This article discusses the voice over internet protocol technology.
- Remote data backup and disaster recovery services This article explains the remote data backup and disaster recovery services.
- Removing spyware, viruses and other malware from windows This article explains removing spyware, viruses and other malwares.
- Risk and responsibility in a hyper connected world: implications for enterprises This article describes the risk and responsibilty in a hyper connected world, implications for enterprises.
- Risk area of networking This article disscusses the risk area of networking in detail.
- Satellite broadband communication – ultimate in wireless network This article explains the Wireless internet connection by using satellite broadband communication.
- Securing your network – major threats and how to avoid them This article explains the risk assessment, risk area and risk environment.
- 2.4 GHZ Inverted F Antenna Eagle Library This article explains the 2.4 ghz inverted F antenna eagle library.
- 3 Benefits of Using Managed Switches This article explains the advantages of using managed switches.
- 3 Keys to Choosing a Surge Protector This article discusses the three keys to choosing a surge protector.
- 3 Ways to Use Wireless Ethernet Extenders This article explains three ways to use wireless ethernet extenders.
- 4 Easy Ways to a Greener Network This article discusses the four easy ways to a greener network.
- 4 Tips to Keep Your Wireless Network Secure This article describes the major points of the wireless network secure in the wireless signal.
- 5 Methods to Maximize Server Efficiency This article explains the technological systems and its devices.
- 5 Things to Consider When Choosing a Video Display This article discusses the five things to consider when choosing video display.
- 5 Ways to Get More Mileage from Your Existing Infrastructure This article explains the five ways to get more mileage from the existing infrastructure.
- 6 Things to Consider Before Investing in VoIP This article explains the six things to consider before investing in VOIP.
- 8 Advantages to Choosing Fiber over Copper Cable This article describes the eight advantages to choose fiber over copper cable.
- 8 Ways to Reduce Power Consumption This article discusses the reduce power consumption and leave you feeling cool and green.
- A Brief Note on Modern Communication and Wireless Headsets This article explains the wireless headset and modern comunication in briefly.
- A Description on VoIP and VoIP Hardware This article explains the Voice over Internet Protocol in detail.
- A Few Good Apps This article explains the applications of operations/infrastructure teams.
- Access the Internet with Handheld Devices This article explains how to access the internet using handheld devices.
- Achieve Network Security This article describes the achieve network security.
- Advantages of Ping Post Technology This article discusses the management software of power to convince potential leads technology.
- An Introduction to VPN This article describes an introduction to virtual private network.
- Beat the Heat: Efficient Cooling in the Data Center This article discusses the demand for power is a challenge, so choosing the best system for your data center.
- Beware of the Microchip: TEMPEST Standards and Common Criteria This article describes the TEMPEST pertains to technical security and vulnerable of data communications.
- Black Box Explains: The ANSI/ISA Standard for Hazardous Locations This article describes the electrical equipment of the classes and its divisions.
- Black Box Provides Wireless VGA Video This article explains the interrupt an important presentation to using swap cables.
- Bluetooth Advantages for Wireless Communication This article describes the advantages of the bluetooth communications.
- Building a Hybrid Cloud This article discusses the importance of the hybrid cloud.
- Building a Private Cloud This article explains the flexibility of cloud infrastructures.
- Buying Tips: Plasma v. LCD Screens This article discusses the buying tips of plasma vs LCD screens.
- Cable 911 This article describes the network organization and performance in right way to choose cable options.
- Certify Fiber Optic Cable like a Champ This article discusses the fiber optic cable into the to electrical interference.
- Choosing the Right Private Cloud Storage This article explains the several factors of the protocols.
- Client-Server Networks This article explains the client-server networks.
- Considerations for Fiber-Based KVM Extension This article describes the KVM signals between buildings in consider by different power source.
- Consolidated I/O This article explains the I/O infrastructure and Fibre Channel over Ethernet (FCoE).
- Create a Smart Wireless Network for Your Library This article discusses the smart wireless network for your library
- Creating Your Own Network Cabling This article explains striping of cable.
- Desktop Virtualization – More Seats, Fewer Computers This article describes the desktop virtualization is a computer-sharing technology.
- Digging into the Software Defined Data Center This article explains data center and concept of its process.
- Digitize and Optimize Multiple Analog Video Formats for Display on an HDMI Screen This article explains the bunch of devices to convert, scale, and switch inputs in using routing.
- DIY Cheap Internal Wi-Fi AntennaThis article disucsses about the wifi antenna.
- DVI V. HDMI Digital Video Extenders This article describes the standard digital interface for PCs.
- Early Origins of Electricity Transmission This article discusses the uses of electricity transmission and magnetism.
- Easy, Wireless Access to a Projector Presentation This article explains the new Wireless Video Presentation System II (AC1131A) from Black Box.
- Enterprise Wireless: Two models; which one is right for you? This article explains the next generation of wireless technology and its wireless access.
- FCOE Multi-Hop; Do You Care? This article explains the capabilities of Fibre Channel over Ethernet (FCoE).
- Features of Using USB Temperature Sensor This article describes the temperature monitoring devices and its features.
- Five Port Fast Ethernet Managed Switch This article explains the five port fast ethernet managed switch.
- Five Wireless Security Bandits This article describes the wireless networks is in their ability to create unexpected connections that can result in security gaps.
- Focus on the ball: the application This article discusses the application of Software Defined Networking (SDN)
- Get a Hold of Real Tough, Heavy-Duty Switches This article explains the Ethernet switches in your wiring closet and Heavy-Duty Edge Switches.
- Have We Taken Data Redundancy Too Far? This article discusses the common RAID types of the redundancy.
- HDBaseT Technology This article discusses the HdbaseT technology in detail.
- How cloud computing is driving the demand for WAN optimization This article explains the cloud computing resources shared the Internet or private WAN.
- How to clean fiber end-faces This article explains how to clean fiber end- faces.
- How to Implement Multicasting This article discusses the multicasting delivers identical data to multiple receivers.
- How to pick an IT rack This article describes how to choose a IT rack.
- How to plan for your digital signage application This article explains the digital signage applications and its power levels for every location.
- How to terminate your own patch cable This article explains how to terminate your own patch cable.
- Internal error which occur during OST2PST conversion This article explains the features of the file extension and its disadvantages.
- IOS8 and its features This article describes the features of the IOS8 and its uses.
- IPTables Stateful Firewall and NAT Routing This article discusses the IP tables stateful firewall and NAT routing in detail.
- Is Private Cloud A Unicorn? This article describes the Cloud Proponents, Characteristics and its Models.
- It’s our time down here– “UNDERLAYS” This article describes the underlays in the network virtualization.
- LNA for RTL based SDR receivers This article discusses the LNA for RTL based SDR receivers.
- Main Energy Consuming Sectors This article discusses the main consumer of energy sectors.
- Making the Case for IP PBX Systems This article explain the Voice communications have been migrating from time-based to packet-based switching.
- Most Common Web Design Mistakes This article describes the common mistakes of the web design.
- MS Backup Recovery: - Is the Better and Reliable Tool for NT-Backup Files This article discusses the Ms backup recovery factors and its users.
- Multicasting Video over a LAN This article describes the network operates efficiently and transparently to users.
- Need of UPS This article discusses Why we need a UPS in detail.
- Network Abstraction and Virtualization: Where to Start? This article explains server virtualization network designs.
- Network Management Needs New Ideas This article describes the network management systems and cloud architectures.
- Network Overlays: An Introduction This article discusses the virtualization features and network infrastructure.
- Network Security: What is it and how it can be helpful? This article explains the computer networking in the network infrastructure.
- Network Statistics with IPtables and RRDtool This article discusses the network statistics with iptables and rrdtool.
- Now here is something every IT professional needs This article explains the USB flash drive containing Data Rescue Engine.
- Now Named an Avaya Channel Partner This article discusses the highly skilled technicians are authorized to design in communications systems.
- One Unsecured Data Port—that’s All It Takes This article discusses the NAC protects your network by preventing unauthorized devices.
- Patching Made Easy and Less Expensive This article describes the strain relief, and maintain bend radius with connectors.
- Power over Ethernet Flashlight This article explains the power over ethernet flashlight.
- Power Problems – The threat, the cause, and the effect on your network This article discusses the most common types of disturbances are causes, threats and effects.
- Wireless Networks Security Issues This article describes the wireless networks using the radio waves.
- Remote Monitoring: Beyond Virus Protection This article describes the automatic to protect your data center by backing up your servers
- Remote Server Applications This article explain the ability to access a network, a personal computer, a server, or other device from a distance for the purpose of controlling it or to access data.
- SDN – Centralized Network Command and Control This article describes the Software Defined Networking (SDN) architecture and its elements.
- Selecting Basic Wireless Networking Hardware This article describes the selecting basic wireless networking hardware.
- Server/Desktop Virtualization–A Best of Breed Band-Aid This article describes the Virtualization and cloud deployments.
- SFP, SFP+, and XFP Transceivers This article describes the type of transceiver that plugs into a special port on a switch or other network device to convert to a copper or fiber interface.
- Shining a Light on Nobel Winners for Fiber Optic and CCD Technology This article discusses the transmission of light in fibers for optical communication.
- Simulation of Network Now Will Be Extremely Easy With Mimic Netflow Simulator This article explains Network simulation services and its applications.
- SMT, matrix and Vblock: architectures for private cloud This article discusses the cloud computing hybrid strategies and its benefits.
- SNMP – The Most Renowned Protocol for Network Management This article describes the Simple Network Management protocol or SNMP.
- Something Up Brocade’s Sleeve and It Looks Good This article discusses the main technology of the hardware and software.
- Stateless Transport Tunneling (STT) This article discusses the tunneling protocol of the VXLAN and NVGRE proposals.
- Storage Protocols This article discusses the various types of the System Interface in storage protocols.
- Taking a good hard look at SDN This article explains the type of SDN vision and SDN architecture.
- The ABCs of Cabling Standards This article discusses the two primary organizations in various types of the cabling definitions.
- The Cloud Storage Argument This article describes the cloud stoarge arguments in detail.
- The Difference between Layer 2, 3, and 4 Network Switches This article describes the important functions of a network for moving data efficiently and quickly.
- The Difference between Private Cloud and Converged Infrastructure This article explains the difference between Private Cloud and Converged Infrastructure.
- The Future of Network Cabling This article describes the communication and exchange of information via network cabling.
- The Future of Video Extension This article explains the analog video and digital video in detail.
- The Hidden Costs of Old Networking Hardware This article describes about the old networking hardware.
- The Organizational Challenge This article describes the changing organizational structure and change management.
- The Power of Innovative Datacenter Stacks This article discusses the some level of virtualization and types of integrated stacks.
- The Psychology of Network (In) Security This article discusses the security about being connected to the Internet and concern the 4Ds.
- The relationship between switches, media converters, and OSI layers This article explains the switches and media converters detail in terms of layers 2 and layers 3.
- The two biggest causes of fiber light loss and how to fix them This article explains the two biggest causes of fiber light loss and how to fix them.
- Thinking “Out-Of-The-Box:” Black Box’s iCOMPEL This article describes the digital out-of-home (OOH) video display in the digital signage.
- Thoughts from a Global Technology Leadership Forum This article discusses the VDI networks technology.
- Three Common Network Mistakes This article explains three common network mistakes in detail.
- Three Tips for Managing Network Changes This article describes the network to run efficiently at all times.
- Troubleshoot and Calibrate VGA or HDMI/DVI Video Displays with Ease This article describes the proper use of calibrate remote computer monitors and high-definition.
- True Software Defined Networking (SDN) This article explains the SDN of software defined networking.
- Types of Fiber Cable and Standards This article explains the types of fiber cable and standards.
- Understanding Fiber Jacket Color Coding This article discusses how to understand the fiber color coding in detail.
- USB to 100BASE-FX Optical Fiber Network Card This article describes the USB to 100Base-Fx optical fiber network card.
- VDI, The Next Generation Or The Final Frontier This article explains the Virtual Desktop Infrastructures (VDI).
- VERI-NAC™: The One-Box Vulnerability and Network Access Control This article discusses the laptop connection or unauthorized wireless access point in Veri-NAC.
- Virtualization This article describes the virtualization of the cloud computing, servers, network, and storage.
- VoIP Softswitch Made a Revolution in VoIP Technology This article discusses the advanced technologies of calling machines and hardware.
- VoIP…When Should You Convert? This article explains the VoIP systems affordable and practical business and its benefits.
- VXLAN Deep Dive – Part I This article describes the virtualized and multi-tenant environments.
- VXLAN Deep Dive – Part II This article discusses the VXLAN is an encapsulation technique.
- Walkie Talkies and Their Accessories This article describes the transmitter and its accessories in the communication device.
- What is all about 5G technologies? This article describes the data transfer and its services of the technologies.
- What Network Virtualization Isn’t This article describes the Network Virtualization implementation of SDN.
- What's Stopping Cloud? This article discusses the barriers to adoption into major categories of cloud.
- Where Are You? This article explains the benefits of server virtualization in the data center.
- Why Big Data Is Essential For An Enterprise? This article discusses the big data is a group of data techniques enterprises.
- Why Cloud Is As ‘Green’ As It Gets This article describes the Power Usage Effectiveness of the greenpeace.
- Why NETAPP Is My ‘A-Game’ Storage Architecture This article describes the storage features and its applications using netapp.
- Why Should I Encrypt My Data? This article describes the ensure data security over an MPLS network to encrypting data.
- Why We Need Network Abstraction This article explains on the network constructs and cloud models.
- Why You Should Invest In Remote Power Control This article explains about the remote power control is the ability to reset at equipment’s location.
- Why you’re ready to create a Private Cloud This article explains about the private cloud adoption methods and their advantages.
- Simplify marketing decisions with crm solutions This article describes the CRM solutions with the marketing decisions.
- Bus Topology: Advantages and Disadvantages This article explains the bus topology is the simplest of network topologies & its types.
- Characteristics of Good Software This article explains the developing any kind of software product.
- Classical TCP Improvements This article discusses the improvements of TCP.
- Client Server Network Architecture This article describes the client server features, components and its diagram.
- Client Server Network: Advantages and Disadvantages This article discusses the advantages and disadvantages of client-server networking.
- Difference between Prototype Model and Waterfall Model This article explains the difference between the two of this Software Developments.
- Difference between Testing and Debugging This article discusses the difference between Software Testing and Debugging.
- Hybrid Topology: Advantages and Disadvantages of Hybrid Topology This article discusses the connection of various links and nodes in hybrid topology.
- Mesh Topology: Advantages and Disadvantages This article explains the each of the network node, computer and other devices.
- Network Topology and Types of Network Topologies This article discusses the computer network topology is the way various components of a network.
- P2P - What is Peer-To-Peer? This article explains the peer to peer network capabilities and responsibilities.
- Peer-To-Peer (P2P): Advantages and Disadvantages This article describes the advantages and disadvantages of a peer-to-peer network.
- Pros and Cons of Outsourcing Testing Activity This article describes the software testing is the science of finding defects in a part of software.
- Prototype Model: Advantages and Disadvantages This article discusses the prototype acts as a sample to test the process.
- Ring Topology: Advantages and Disadvantages This article discusses the all the nodes are connected to each-other in ring topology.
- Spiral Model: Advantages and Disadvantages This article describes the type of iterative software development model.
- Star Topology: Advantages and Disadvantages This article describes the all the components of network are connected to the central device.
- Traditional TCP This article explains about the TCP and its characteristics.
- Tree Topology: Advantages and Disadvantages This article describes the integrates the characteristics of Star and Bus Topology.
- Waterfall Model of SDLC This article explains the linear sequential model of waterfall model in SDLC.
- Waterfall Model: Advantages and Disadvantages This article describes the advantages and disadvantages of the waterfall model.
- What Are Proxy Servers? This article explains the proxy server just connects clients to the main web server.
- HP WI-FI direct mouse on linux This article explains the wi-fi direct mouse on linux.
- Network activity led with linux led subsystem This article explains the network activity LED with linux subsystem.
- Fighting the summer storms – choosing a ups or bps This article describes the fighting summer stroms, choosing a UPS or BPS.
- The fight for digital sovereignty: industrial factors This article discusses the fight for digital sovereignty with industrial factors.
- The Cybersecurity challenge This article explains the cybersecurity challenge in detail.
- The bring your own device nightmare This article explains the possible solutions of bring your own device.
- Wireless networking security considerations This article describes about the wireless networking security.
- Virus hoax alert This article discusses the virus hoax alert.
- Thin Client networks This article describes the concept of thin client computing.
- Server software: Windows server 2003 and small business server 2003 This article describes the advantages and disadvantages in the Windows Server software.
- What is a Network This article describes the networks of protocol, switch, cable etc.
- Wireless networks This article explains the Wireless network technology.
- Wireless LAN standards This article describes the wireless LAN technologies.
- Wireless networks security issues This article describes the wireless networks using the radio waves.
- Virtual private networks This article describes the a private networks of the remote access.
- SMA Connectors This article explains the SMA connector that Designed to Support Radio Frequency Signals
- What are the major benefits of call analytics? This article describes the benefits of call analytics permit organizations.
- The key advantages of business intelligence and analytics This article describes the business intelligence solutions of that advantages.
- System wires - In walls installation This article explains the internet technological innovation systems.
- The importance of business it support This article discusses the importance of the communications.
- A Brief History of GPS This article explains the different type of GPS module and most common form of antennas.
- A Synchronous Solution This article discusses the uses separate lines for data and a “clock”.
- Advanced Protocols This article describes the two frames are required to transmit the slave address.
- Basic Terminology This article discusses the terminology terms are covered in a lot more detail in our Serial Communication.
- Binary This article discusses the variety of base-number systems are using binary.
- Binary in Programming This article explains the bitwise operators in programming.
- Bits, Nibbles and Bytes This article describes the Common binary number lengths and Padding with leading zeros.
- Bitwise Operators This article discusses the number of ways to manipulate binary values.
- Changing/deleting com ports (windows) This article discusses the Changing/Deleting COM Ports in the Windows.
- Command line (windows, mac, linux) This article describes the use command line interfaces to create serial connections.
- Common pitfalls This article discusses the two devices trying to transmit data at the same time.
- Configuring a GPS receiver This article discusses the type of various chipset GPS is using powerful processor.
- Connecting to your device This article explains the how to connect a device, which port it has been assigned, and communicate over that port.
- Coolterm (windows, mac, linux) This article discusses the coolterm useful no matter which operating system.
- Counting and converting This article explains the Counting in binary and converting a binary and decimal.
- Gps accuracy This article discusses the satellite position and the GPS factors of the signals.
- Gps basics This article explains the used or benefitted from a GPS receiver.
- Gps message formats This article explains the different message formats over a serial interface. In the GPS data.
- Hardware setup This article discusses the receive and demodulate the IR signal from a common remote control.
- How does GPG work This article describes the data sent down to earth from each satellite using GPS.
- Hyperterminal (windows) This article discusses the hyperterminal is the defacto terminal program.
- I2C This article describes the Inter-integrated Circuit is a protocol intended to allow multiple “slave” digital integrated circuits.
- I2c at the hardware level This article discusses the I2C bus consists of two signals: SCL and SDA.
- I2c communication protocol This article explains the two types of frame and certain protocol for the devices .
- IR communication This article explains the communication is a common and easy to use wireless communication technology.
- IR communication basics This article describes the modulating a signal is like assigning a pattern to your data.
- Reading GPS data This article describes the connecting to a microcontroller and connecting to a computer.
- Real-term (windows) This article describes the designed specifically for sending binary and other difficult-to-type streams of data.
- Rules of serial This article explains the asynchronous serial protocol is using error-free data transfers.
- Serial communication This article discusses the interfaces transfer multiple bits at the same time.
- Serial peripheral interface (SPI) This article describes the interface used to send data between microcontrollers and small peripherals.
- Spi - slave select (ss) This article describes the SS is used when multiple slaves are present to select the one.
- Spi receiving data This article explains the generates the clock signal in the SPI multiple slaves.
- Tera term (windows) This article explains the one of the more popular Windows terminal programs.
- Terminal echo test This article describes the specifics of each terminal program.
- Transmitting ir example This article explains the IR LED imitate an IR remote to control an appliance.
- UARTS This article describes the serial packets and control those physical hardware lines.
- What is a terminal? This article describes the referred to as text terminals, and later came graphical terminals.
- Wiring and hardware This article explains the sending data and another for receiving.
- Zterm (mac) This article explains the ZTerm is another terminal option for Mac users.
- Authoritative Only Server This article discusses the term of authoritative only server uses and its two concepts.
- Binary Image Scaling This article describes the binary image scaling.
- Binary Morphology This article explains binary morphology in detail.
- Binary Morphology – Atomic Operations This article discusses the binary morphology.
- Binary Morphology and Cellular Automata This article explains the set of rules applied to a binary image to generate another image.
- Binary Rank-Order and Median Filter Using an Accumulator This article decsribes the median filter is a nonlinear filter that selects, for every position of the filter.
- Binary to Gray Downscaling This article explains the binary to gray downscaling in detail.
- Caching Name Servers (Resolver) This article discusses the obtains information from another server in response to a host query and then saves the data locally.
- Difference between MAC Address and IP Address This article discusses the difference between the MAC address and IP address.
- Difference between POP & IMAP This article explains the difference between the POP and the IMAP.
- Difference between TCP & UDP Protocol This article explains the difference between the TCP and the UDP protocol.
- DNS Configuration Types This article discusses the types of the DNS configuration.
- DNS Security This article discusses the DNS security types in detail.
- DNS Security - II This article discusses the DNS security in detail.
- Dynamic ARP Inspection This article explains the dynamic ARP inspection.
- EIGRP Dynamic Routing or Summary Static Routes This article discusses the EIGRP dynamic routing.
- Enabling IPV6 on My Home Network This article explains the how to enable IPv6 on my home network.
- Forwarding (A.K.A Proxy) Name Servers This article describes the forwards requests to another DNS and caches the results.
- Good Practices for Selecting Strong Passwords This article discusses the good practices for selecting strong passwords.
- Gray to Binary Upscaling This article discusses the useful to convert a low resolution grayscale or color image.
- Grayscale Convolution Using an Accumulator This article explains the algorithm for convolution with a flat, rectangular filter.
- Grayscale Morphology This article decsribes the Max and Min operations are used in the binary morphology.
- How Do You Scale A Grayscale Image? This article describes the assuming that a scaling factors in grayscale image.
- How Many IP Addresses are Available in IPV6 This article describes the used to identify the sender and receiver machine.
- Implement Stack Using Two Queues This article discusses the code to implement a Queue using two stacks.
- IP Routing in Small Networks This article explains the IP routing in small networks.
- IP Source Guard This article discusses the IP source Guard in detail.
- IPv4 in-ADDR.ARPA Reverse Mapping Domain This article explains the domain name structure as a tree starting from the root.
- Master (Primary) Name Servers This article describes the one or more zone files for which this DNS is authoritative.
- Slave Name Servers This article explains the zone data using a zone transfer operation in the slave DNS.
- Split Horizon DNS Server This article describes the DNS server give different responses (IP addresses) based on the source address.
- VLANS and IP Routing On an Ethernet Routing Switch This article explains the VLAN and IP routing on an ethernet routing switch.
- A Loosely Coupled Integration Solution This article describes the loosely coupled integration solution.
- Advantages to Key-Based Authentication This article describes the advantages to key-based authentication.
- Aggregating Strategies: Multiple Channels vs. Single Channel This article describes the aggregating strategies: multiple channels vs. single channel.
- Application Integration Criteria and Options This article explains the application integration criteria and options.
- Are all the devices on your home on the same network? This article explains all the devices on your home on the same network.
- Basic Messaging Concepts This article describes the Messaging involves certain basic concepts.
- Basic Routing Math This article describes the basic routing math in detail.
- Challenges of Asynchronous Messaging This article discusses the challenges of asynchronous messaging.
- Channel Adapter and Messaging Bridge This article discusses the channel adapter and messaging bridge.
- Contemplating “Mobility” This article discusses the contemplating “mobility”.
- Content Based Router This article explains the route a message to the correct system based on message content.
- Content-Based Router and Message Filter This article describes the content-based router and message filter.
- Datatype Channel and Invalid Message Channels This article explains the datatype channel and invalid message channels.
- Dead Letter Channel and Guaranteed Delivery This article describes the dead letter channel and guaranteed delivery.
- Diagram Notation This article discusses the notation that accommodates all these different components.
- Distributed Applications vs. Integration and Commercial Messaging Systems This article describes the distributed applications vs. integration and commercial messaging systems.
- Don’t Forget To Have Fun with Your Technology This article explains the dangers of Public/Unknown Wi-Fi and setting your network up the right way into the cord.
- Dynamic Router and Splitter This article discusses the dynamic router and splitter.
- Dynamic SSH Port Forwarding (SSH+Socks) This article discusses the dynamic SSH port forwarding (SSH+SOCKS).
- Faster Wireless Isn’t Always Better Wireless This article describes the faster wireless isn’t always better wireless.
- HTTP Requests This article discusses the HTTP requests in detail.
- HTTP Responses This article explains the HTTP responses with its types.
- Introducing SSH This article discusses the introducing SSH in detail.
- Introduction to Integration Styles This article explains the introduction to integration styles.
- Introduction to Message Patterns This article describes the introduction to message patterns.
- Introduction to Message Construction This article describes the introduction to message construction.
- Introduction to Message Routing This article explains the message source from the ultimate destination of the message.
- Introduction to Message Transformation This article discusses the introduction to message transformation.
- Introduction to Messaging Endpoints This article explains the introduction to messaging endpoints.
- Introduction to Simple Messaging Examples This article discusses the introduction to simple messaging examples.
- IP Addresses This article describes the IP addresses in detail.
- IP Subnets This article explains the subnet is a collection of similar IP addresses.
- Loose Coupling of Interaction This article explains the loose coupling of interaction.
- Message Bus and Command Message This article explains the message bus and command message.
- Message Channel Decisions This article describes the applications of message channel decisions.
- Message Channel Themes This article explains the applications of message channel themes.
- Message Translator This article discusses the construct messages and how to route them to the correct destination.
- Normalizer This article explains the Normalizer to route each message type through a custom Message Translator.
- Pipes and Filters This article discusses the different solutions by connecting the components to different pipes.
- Point-To-Point Channel and Publish-Subscribe Channel This article discusses the point-to-point channel and publish-subscribe channel.
- Real-World Simplifications and IP Network Configuration This article describes the real-world simplifications and IP network configuration.
- Remembering back when wireless was edgy This article explains the remembering back when wireless was edgy.
- Representing Netmasks and Subnets This article explains the representing netmasks and subnets.
- Routable -V- Un-Routable Protocols – A Home Networking Pitfall This article discusses the routable -v- un-routable protocols – a home networking pitfall.
- Routing Packets This article discusses the IP protocol can send packets across different networks.
- Routing Slip This article describes the validations varies widely and may depend on external systems.
- Secure FTP This article discusses the secure file transfer protocol.
- SSH Key Authentication This article explains the SSH key authentication.
- SSH Port Forwarding This article describes the SSH port forwarding with its example.
- SSH Security This article describes the SSH security in using the SSH protocol.
- Starting 2015 with No More Clarity on 802.11AC Wiring than 2014 This article describes the starting 2015 with no more clarity on 802.11ac wiring than 2014.
- Testing and Monitoring This article discusses the execution of messages is a critical operations and support function.
- The Loan Broker Application This article discusses the uses of loan broker application.
- The Memo of Wireless Networking This article discusses the memo of wireless networking.
- The Structure of a Subnet and Broadcast Addresses This article discusses the structure of a subnet and broadcast addresses.
- The wireless tools they are a changin This article explains the wireless tools they are a-changin’.
- Thinking Asynchronously This article explains the Messaging is an asynchronous technology.
- Three Building Blocks This article describes the three building blocks in JSON.
- Using SSH to Run a Command on another Computer This article explains the using SSH to run a command on another computer.
- What is a Messaging System? This article explains the messaging the way a database system manages data persistence.
- What is Messaging? This article discusses the use messaging to integrate applications.
- When do you jump in on 11AC? This article describes the going to transform the way we use wireless.
- Why Use Messaging? This article describes the advantages that can be gained using messaging.
- Wireless is so not about Wireless Networking Anymore This article discusses the wireless is so not about wireless networking anymore.
- With 11AC, the WLAN Industry Owes Customers a New Kind of Network Switch This article explains the WLAN industry owes customers a new kind of network switch with 11ac.