Network Troubleshooting and Support
Network Security by Filtering
Filtering allows network administrators to control which packets are permitted or denied
in or out of a network. It can be used to control how much bandwidth can be used by
parts of a network, but is more often used to provide security for a network. More ...
It is important to create a backup procedure for your network. The backup procedure
should define a schedule and the type of backups that will be created. Each backup
disc or tape should be clearly labeled and recorded in a log. More ...
Wireless Network Security
Before the IEEE completed the 802.11i standard the Wi-Fi Alliance released WPA. After
the release of the IEEE 802.11i standard, the Wi-Fi Alliance released WPA2 which is
compatible with both the 802.11i standard and WPA. More ...
How to Choose a Fiber Optic Tool Kit
What do you need in a fiber optic tool kit? There are kits for epoxy and polishing
connector termination, quick connector termination, fusion splicing, mechanical splicing,
optic cleaning, fiber optic testing, and many more. More ...
How to Choose Work Area Network Cable Faceplate Locations
Industry cabling standards require that each location be provided with a minimum of one
work area outlet location. A outlet location is usually a faceplate supporting two or more
modular outlets. More ...
Network Cabling Design
With a small network of a few work stations that is not expected to grow, you might
get away with just "winging" the cable installation, but the installation of a serious
computer network needs a plan. without a plan your network will be prone to frequent
failures and will be difficult to expand. More ...
Network Address Translation (NAT) Protocol
NAT is a protocol that is used by a router to convert IP addresses on the internal private
network to the it's own public IP address for the Internet. If NAT were not used each
computer on the internal private network would be visible to the Internet. More ...
Fiber Optic Cable Tester - What Is It and How to Use?
A fiber optic cable tester is a hand-held troubleshooting device that sends red laser
light down a fiber to check for faults such as cracked fibers or defective splices. More ...
Network Security Model - Defining an Enterprise Security Strategy
These are the five primary security groups that should be considered with any
enterprise security model. These include security policy, perimeter, network,
transaction and monitoring security. These are all part of any effective
company security strategy. More ...
There are two kinds of key encryption: private key and public key. In private key
encryption a single key is used. Public key encryption uses two keys. One key,
called the private key can only be used to decrypt a document. The other key, called
the public key, can only encrypt a document. More ...
Rack Mount Enclosures and Server Racks
when shopping for rack mount cabinets you will see references to cabinets like 10u,
12u, 25u and so on. So what does all of this mean? All computer heights are
measured in units called "U's". In the world of computers, when referring to the
height of a computer, 1 "U" equals 1.75 inches. More ...