Menu
Computer Networking Basics and Certification

Computer Number Systems Made Simple
Humans use a decimal based number system. The decimal numbering system uses the ten characters 0,1,2,3,4,5,6,7,8, and 9 to represent numbers. The binary system used by computers has only two characters; 0 and 1. More ...

Basics of Bluetooth Technology
Bluetooth is a wireless technology for short range communication. Bluetooth provides functionality to detect nearby Bluetooth devices, and in order to mitigate interference, implements frequency hopping. More ...

Create a Peer-to-peer Network
Many small to medium sized organizations are wrestling with Windows server and paying excessive licensing fees when they don't need to. Sure, a server provides centralized security administration, but is it really more efficient? More ...

What is Port Forwarding?
Port forwarding redirects a communication request from one address and port number connection to another while the packets are traversing a network gateway. This technique is used to hide hosts residing on an internal network from hosts on external networks. More ...

Network Know-How: An Essential Guide for the Accidental Administrator
This book is a straight to the point description of networks, what they do, how they operate, and how to manage them. The book is largely free of jargon and arcane, obscure terminology. The author does a good job of laying out the essentials in an easy to understand format. More ...

Comparing Different Cloud Architecture Types
Most people are familiar with the concept of a cloud-based data center that rents out computing power to businesses. There are, however, a number of possible cloud types that may be the right choice for a company. More ...

Fiber Broadband Internet Service
Fiber broadband is the optical fiber, which replaces all or part of the usual metal local loops used for the final leg of delivering connectivity in telecommunications. With optical fiber technology it is likely that speeds that are considered to be broadband could change in coming times. More ...

Wireshark and Ethereal Network Protocol Analyzer Toolkit
This book provides complete information and step-by-step Instructions for analyzing protocols and network traffic on Windows, Unix or Mac OS X networks. First, readers will learn about the types of sniffers available today and see the benefits of using Ethereal. More ...

Network+ Certification Exam Tutorial - How And When To Use Virtual LANs (VLANs)
From your Network+ exam studies, you know that switches forward broadcasts, and that sounds great, but that's not always a good thing. A switch can have anywhere from 12 ports to 80 or more, and by default all hosts connected to that switch are going to be in the same broadcast domain. More ...

Bluetooth Basics - Bluetooth Technology Tutorial
You see advertisements for Bluetooth enabled cell phones, PDAs, and laptops, and all sorts of different devices taking advantage of this wireless standard. But, what is it? Bluetooth technology is nothing new, but in many respects it still seems to be more of a buzz word rather than a well understood, commonly accepted technology. More ...

What is Cloud Computing?
You can't be sure where a specific Internet device is, it's just out there in the cloud of devices that is the Internet. An individual connected to the Internet can use an application that's in the cloud. An organization can place their data in the cloud. More ...

Fiber Optic Cabling For Beginners
Traditionally, twisted pair copper cable has been the most common form of network cabling. As technology continues to advance however, fiber optic cable is quickly becoming the standard in network cabling. More ...

Packet Switching Store-and-Forward Transmission
To send a message from a source end system to a destination end system, the source breaks long messages into smaller chunks of data known as packets. Most packet switches use store-and-forward transmission at the inputs to the links. Store-and-forward transmission means that the packet switch must receive the entire packet before it can begin to transmit the first bit of the packet onto the outbound link. More ...


Learn more at amazon.com

Custom Search