What is a Network Sniffer Used For?
Sniffer is another word for network analyzer. Network intruders use sniffing to capture confidential information, and the terms sniffing and eavesdropping are often associated with this practice. More ...
Packet Switching Store-and-Forward Transmission
To send a message from a source end system to a destination end system, the source breaks long messages into smaller chunks of data known as packets. Most packet switches use store-and-forward transmission at the inputs to the links. Store-and-forward transmission means that the packet switch must receive the entire packet before it can begin to transmit the first bit of the packet onto the outbound link. More ...
Network+ Certification Exam Tutorial - How And When To Use Virtual LANs (VLANs)
From your Network+ exam studies, you know that switches forward broadcasts, and that sounds great, but that's not always a good thing. A switch can have anywhere from 12 ports to 80 or more, and by default all hosts connected to that switch are going to be in the same broadcast domain. More ...
Wireless Networking Your PC
Here in one place is everything you need to know about wireless networking your PC. More ...
Network+ Certification Exam Tutorial - DHCP And RARP
Part of passing the Network+ exam is mastering the many different protocols and services you're introduced to in your studies, and that's especially hard when two protocols do much the same thing! That's the case with RARP and DHCP, so let's take a close look at these two protocols and why we use them in the first place. More ...
Wireshark and Ethereal Network Protocol Analyzer Toolkit
This book provides complete information and step-by-step Instructions for analyzing protocols and network traffic on Windows, Unix or Mac OS X networks. First, readers will learn about the types of sniffers available today and see the benefits of using Ethereal. More ...
Comparing Different Cloud Architecture Types
Most people are familiar with the concept of a cloud-based data center that rents out computing power to businesses. There are, however, a number of possible cloud types that may be the right choice for a company. More ...
Satellite Broadband Internet Service
Satellite broadband internet service transmits and receives signals between a ground dish antenna and a geosynchronous satellite. A geosynchronous satellite orbits the Earth with a period equal to the Earth's rotational period and therefor appears motionless, at a fixed position in the sky. More ...
What is Microsoft Azure?
Microsoft Azure is a set of cloud services to help organizations meet business challenges. The services include tools for managing and deploying applications. Microsoft offers PaaS, IaaS, and SaaS to help businesses manage their technology demands. More ...
What is Port Forwarding?
Port forwarding redirects a communication request from one address and port number connection to another while the packets are traversing a network gateway. This technique is used to hide hosts residing on an internal network from hosts on external networks. More ...
Media Access Control (MAC) Sublayer of the OSI Data Link Layer
Layer 7 of the OSI model, the Data Link layer, is concerned with the packaging of data into frames and placing those frames on the network. The Data Link layer actually consists of two sublayers, the Media Access Control layer, described here, and the Logical Link layer. More ...
Network Know-How: An Essential Guide for the Accidental Administrator
This book is a straight to the point description of networks, what they do, how they operate, and how to manage them. The book is largely free of jargon and arcane, obscure terminology. The author does a good job of laying out the essentials in an easy to understand format. More ...
A Complete Explanation of Cloud Computing
This article provides a complete explanation of cloud computing; virtualisation, cloud computing models, cloud deployment models, cloud delivery models, cloud metering and billing, and the future of cloud computing. More ...

