Data Communications - Technical References
-
Control Technology for Future Generations - A technical analysis of
the LON protocol and the role of LonMark International
(62 KB) This paper presents the technical analysis of the LON protocol
and the role of LonMark International.
-
Creating a Virtual, More Efficient Plant (206 KB) This study reviews an ever-increasing number of servers that
are used to perform various functions within a facility.
-
Improving motion network noise immunity (272 KB) This article quantifies the contribution of automatic
retry to improve the noise immunity by testing the noise immunity
performance of two real-time industrial Ethernet protocols and comparing
the results.
-
The PLC: New Technology, Greater Data Sharing
(131 KB) This paper presents an overall view on the Programmable Logic
Controllers (PLC).
-
Why use an industrial Ethernet Switch?
(95 KB) This paper presents the importance of using an industrial
Ethernet Switch.
-
Balanced Vs Unbalanced Communications Standards
(16.39 KB)
-
Configuring ATM Routing And PNNIEIGRP
(125.81 KB)
-
Data Communication and Networking
(145.81 KB) This paper explains about basic elements of data
communication system, communication protocols and data transmission
modes, the use of computer network, and different components of computer
network.
-
Data Communication Cabling: Standards and Specifications (682.29 KB) This document outlines the Data Communication Cabling
Specifications, Guidelines and Standards that are applicable to the
environment of the Department of Education (DoE) of Western Australia.
-
Data Communication in ATM Networks
(869.46 KB)
-
Data Communication Networking
(438.69 KB)
-
Data Communication: XML, XSLT, and JSON
(343.47 KB) This paper explains about XML, XSLT and JSON as they relate
to data communication.
-
Data Communications & Computer Networks
(1858.96 KB) This paper explains the history of data communication,
followed by general communication theory (Fourier, Nyquist and Shannon).
-
Data Communications - The FIrst 2500 Years
(56.7 KB)
-
Data Communications Solutions
(99.28 KB)
-
Data Communications: The basics of media, encoding, transmission,
connections and remote access
(22.53 KB) This paper provides an overview of data communications and
explains how the conceptual pieces form a complete communication system.
-
Data Communications: Transmission System: Structure and Function (727.35 KB) This paper outlines the major components and theories that
comprise any data transmission system.
-
Data-Dependent Effects on Jitter Measurement
(176.77 KB)
-
DataComm Communication Systems
(1477.54 KB)
-
Defining 4G
(662.35 KB)
-
Distributed, Intelligent I/O for Industrial Control and Data
Acquisition (Seriplex White Paper)
(180.89 KB)
-
Effect of PRBS Pattern Length on Data-Dependent Jitter
(218.68 KB)
-
Ethernet & Fieldbus as the basis of an E-Commerce Solution
(547.52 KB)
-
Ethernet in Avionics Networks
(330.68 KB)
-
Fieldbus Wiring, Design and Installation Guide
(492.39 KB)
-
Five Steps To Software Testing
(6 KB)
-
Group-Key Management Model for Worldwide Wireless Mesh Networks
(517.19 KB) A key management model to overcome the scalability issue on
security aspect for large-scale deployment of Worldwide WMN is proposed
,which aims to guarantee wellperformed key management services and
protection from potential attacks.
-
GUI Design - The Intersection of Art and Engineering
(835.55 KB)
-
Guide To Scanning Technology
(81.45 KB)
-
Hardware Implementation of Higher Throughput Anti-Collision Algorithm
for Radio Frequency Identification System
(330.82 KB) This paper presents a proposed hardware implementation of
Higher Throughput Anti- Collision Algorithm (HTACA) for Radio Frequency
Identification (RFID) system.
-
Hardware Prototyping of an Efficient Encryption Engine
(415.23 KB) An approach to develop the FPGA of a flexible key RSA
encryption engine that can be used as a standard device in the secured
communication system is presented.
-
Harnessing Mobile Middleware
(644.16 KB)
-
High performance analog optical links based on quantum dot devices
for UWB signal transmission
(1528.14 KB) In this study the possibility of quantum dot (QD) laser and
QD semiconductor optical amplifier (SOA) applications in ultra-wideband
(UWB) communication systems is discussed.
-
Homogeneous multi-interface mobile node support in NS2
(318.35 KB) This paper presents the implementation of mobile nodes in
NS2 with multiple Wi-Fi interfaces and multiple WiMAX interfaces trying
to overcome those limitations.
-
How To Choose the Best Router Switching Path
(510.18 KB)
-
Hybrid channel allocation in wireless cellular networks
(124.44 KB) This paper presents a hybrid channel allocation notification
to the central pool on each channel request that cannot be satisfied
locally at the base station.
-
Hybrid message-embedded cipher using logistic map
(313.48 KB) The proposed hybrid message embedded scheme consists of hill
cipher combined with message embedded chaotic scheme.
-
Impact of Mobility models on Mobile Sensor Networks
(969.34 KB) In this paper, we have studied the impact of various
mobility models with AODV and DSDV routing protocols and have compared
the throughput of the models.
-
Impact of routing protocol on performance of wireless ad hoc
vehicular network
(180.48 KB) In this paper, we discuss the impact of routing protocol on
performance of wireless ad hoc vehicular network along with recent
routing protocols.
-
Implementation Of Hybrid Protocol For Routing As Well As
Clustering
(275.88 KB) In this paper, we propose an improved version which uses
both cluster and tree based protocols. The proposed protocol improves
the power consumption by improving FND.
-
Implementation of SDES and DES Using Neural Network
(634.31 KB) In this work a new schedule for XOR design is going to be
considered. We will first implement SDES algorithm in MATALAB they
possess the most popular design criteria for block ciphers.
-
Implementation of Secure Authentication Mechanism for LBS using best
Encryption Technique (768.91 KB) In this paper we have proposed an Authentication Mechanism
in which mobile Phone Users will send request for some services from
server.
-
Improved Two-Factor Authenticated Key Exchange Protocol
(338.48 KB) This study proposes such a secure authenticated key exchange
protocol that achieves fully two-factor authentication and provides
forward security of session keys.
-
Improving Quality of Service and Reducing Power Consumption with WAN
accelerator (216.26 KB) This paper proposes to dynamically apply WAN accelerator
within network when a virtual machine is moved to a distant center, in
order to prevent the degradation in performance after live migration of
virtual machines over a wide area.
-
Industrial Ethernet Planning & Installation Guide
(1154.18 KB)
-
Installing, Configuring and Managing Network Protocols
(2.21 MB)
-
Integration of Biometric authentication procedure in customer
oriented payment system
(115.36 KB) The aim of this paper is to integrate the proposed payment
model with multi server authentication model for the purpose of
maintaining security and accessing different servers (websites).
-
Intrinsic Authentication of Multimedia Objects Using Biometric Data
Manipulation
(407.72 KB) The Biometric Gaussian Stream (BGS) cryptosystem was
extended by extensive research experimentation. Using this system,
complexity is added to an image by passing it through a Gaussian noise
function.
-
Introduction to Computer Networks
(52.74 KB)
-
Investigation of Collision Avoidance and Localization in WSNs
(1156.48 KB) The most important two problems in Wireless Sensor Network
(WSN) is localization and collision avoidance of the transferred
packets. A solution for these obstacles is introduced in this work.
-
IPSec over Heterogeneous IPv4 and IPv6 Networks: ISSUES AND
IMPLEMENTATION
(1059.17 KB) In this work, we study and explore the incompatibility
issues of applying IPSec across the translation gateway and then propose
a workable solution to implement end to end IPSec in heterogeneous IPv4
and IPv6 networks.
-
IPv4/IPv6 Transition
(327.82 KB) In this paper we proposed a system that make incompatible
nodes; the first based IP4 the other based IPv6, communicate together
without increasing packets size, this system is called Bi-Directional
Transition System (BDTS).
-
Learning and Evaluating Possibilistic Decision Trees using
Information Affinity
(310.24 KB) This paper investigates the issue of building decision trees
from data with imprecise class values where imprecision is encoded in
the form of possibility distributions.
-
Leveling Process of Total Electron Content (TEC) Using Malaysian
Global Positioning System (GPS) Data
(455.67 KB) This study investigates the TEC using GPS data collected
from Wisma Tanah, Kuala Lumpur, KTPK (3° 10’ 15.44â€N, 101° 43’
03.35â€E) station and processed and analyzed under quiet geomagnetic day
at the equatorial region.
-
Localization in Wireless Sensor Network Using MDS
(279.68 KB) In this paper, determining the localization of nodes in a
Wireless Sensor Network is a very important task, which involves
collaboration between sensor nodes.
-
Long-Reach Optical Access Technologies
(111.53 KB) This study summarize the economic arguments behind
long-reach access and examines a number of leading long-reach optical
access technologies.
-
Macromedia White Paper
(447.34 KB)
-
Malware Detection, Supportive Software Agents and Its Classification
Schemes
(144.5 KB) This paper aims at identifying the malware as one of the most
dreaded threats to an emerging computer and communication technology.
-
MANET-Evaluation of DSDV, AODV and DSR Routing Protocol
(123.78 KB) In this paper we have compared the performance of three
MANET routing protocol DSDV, AODV and DSR by using NS-2. DSDV is
proactive (Table driven routing Protocol) whereas AODV and DSR share
similar On Demand behavior.
-
Microsoft Digital Pharma
(2.25 MB)
-
Microwave Photonic Devices and Systems
(62.02 KB) This paper is concerned with ultra broadband travelling-wave
photomixers and photodetectors, high-speed waveguide modulators, as well
as novel electroabsorption transceiver elements.
-
Millimeter-wave Radio over Fiber System for Broadband Wireless
Communication
(1444.81 KB) In this study, an introduction of mm-wave RoF system will
be given and the optical techniques of generating mm-wave signals are
presented. A design of bidirectional mm-wave RoF systems are considered
using Multiplexing.
-
Minimum Normalized Transmit Rate Based Fair Scheduling Algorithm in
Orthogonal FDM
(192.97 KB) In this paper Minimum Normalized Transmit Rate Based Fair
Scheduling Algorithms based on Throughput is discussed and also the
performance of this algorithm is evaluated through simulation results.
-
Modeling and Analysis of Adaptive Buffer Sharing Scheme for
Consecutive Packet Loss Reduction in Broadband Networks
(481.29 KB) This paper presents an algorithm for optimization of
adaptive buffer allocation scheme for traffic based on loss of
consecutive packets in data-stream and buffer occupancy level.
-
Multi Carrier Symbol Recovery in OFDM using ANN in Wireless
Channel
(770.89 KB) The investigation is made in the multipath fading
environment using different modulation techniques.
-
Multi Homing
(40.72 KB)
-
Multiuser Watermarking using Visual Cryptography
(484.46 KB) In this study, a robust watermarking scheme for multiple
cover images and multiple owners is proposed. The rest of the techniques
are applied to enhance the robustness of the scheme.
-
Myths and Actual Practice with Industrial Data Communications and
Hazardous Areas
(115.86 KB)
-
Network based Security model using Symmetric Key Cryptography with
Public Key Exchange Protocol
(160.98 KB) The main aim of this paper is to strengthen secured
communication over the Network by enhancing the strength of the AES
algorithm with Diffie-Hellman key exchange Protocol.
-
Network Threat Characterization in Multiple Intrusion Perspectives
using Data Mining Technique
(178.49 KB) This paper presents a threat characterization model for
attacks from the victim and the attacker perspective of intrusion using
data mining technique.
-
Neural Disparity Map Estimation from Stereo Image
(745.79 KB) In this paper, we propose a new approach of dense disparity
map computing based on the neural network from pair of stereo images.
-
New Watermarking Technique Using Data Matrix and Encryption Keys
(1708.8 KB) In this paper, we propose a new watermarking technique
taking advantage of Data Matrix as well as encryption keys.
-
Normalized Transfer of Bulk Data By Using UDP In Dedicated
Networks
(300.4 KB) Performance Adaptive-UDP is a supreme protocol than other
protocols by maintaining memory processing, packetloss processing and
CPU utilization.The protocol bulk data transfer is processed with high
speed over the dedicated network links.
-
On Line Isolated Characters Recognition Using Dynamic Bayesian
Networks
(344.7 KB) In this paper, our system is a Markovien system which we can
see it like a Dynamic Bayesian Networks
-
Optical Functions For Microwave Signal Processing In Radar,
Communications And Surveillance Systems
(340.84 KB) This paper describes the improvements of optoelectronic
links and the capability to perform processing functions, in the optical
domain, or the radar receive mode processing with optical architecture .
-
Optimization of Multiple Vehicle Routing Problems using Approximation
Algorithms
(314.81 KB) This paper deals with generating of an optimized route for
mVRP which uses a methodology of clustering the given cities depending
upon the number of vehicles and each cluster is allotted to a vehicle.
-
Overview of Different Routing Techniques for Wireless Multimedia
Sensor Network
(169.05 KB) This paper focuses on the review of such routing techniques
used in wireless multimedia sensor network.
-
Parallel Joint Channel Coding and Cryptography
(355.28 KB) Method of Parallel Joint Channel Coding and Cryptography has
been analyzed and simulated in this paper.
-
Peer To Peer File Sharing
(691.64 KB)
-
Performance Analysis and Special Issues of Broadband Strategies in
the Computer Communication
(289.79 KB) This paper describes the performance analysis and the issues
faced by using a broadband access as it allows people to telecommute
effectively by providing a similar environment for e-mail, file sharing,
and access to corporate servers.
-
Performance Analysis of Cellular Wireless Network by Queuing Priority
Handoff calls
(670.73 KB) In this paper, a mathematical model is proposed to estimate
the dropping probabilities of cellular wireless networks by queuing
handoff instead of reserving guard channels
-
Performance Comparison of Routing Protocols in MANET Varying Network
Size
(375.53 KB) The Focus is to compare the performance of three routing
protocols DSDV, DSR and AODV for CBR traffic by varying no. of nodes in
terms of packet delivery ratio, end to end delay, routing overhead and
throughput.
-
Performance Comparison of Various Routing Protocols with Varying
Number of Source Nodes
(81.72 KB) In this paper, a comprehensive attempt has been made to
compare the performance of three prominent reactive protocols DSR, AODV,
CBRP.
-
Performance Enhancement of Reactive on Demand Routing Protocol in
Wireless Ad Hoc Network
(144.31 KB) This paper proposes an improved AODV routing protocol by
including route repair scheme to overcome the link failure problems of
its predecessor.
-
Performance Impact Of Back-Bone Speed in Lan
(449.05 KB)
-
Performance of mobile IPv6 with different route optimization
scheme
(524.82 KB) In this paper we have consider Light Weight Route
optimization scheme & enhanced light weight route optimization
scheme
-
Performance of Modified DSR in Presence of Noisy Links using QUALNET
Network Simulator in MANET
(992.67 KB) We use Signal-to-Noise Ratio as the link-quality metric in a
modified version of the of DSR protocol coined as MDSR which takes into
consideration the SNR value of a wireless link in addition to the hop
count metric to discover new routes.
-
Performance study of IEEE 802.16d under Stanford University Interim
(SUI)Channel
(353.27 KB) In this paper, the performances in terms of bit error rate
(BER) of IEEE 802.16d have been investigated by using different SUI
channel model.
-
PLC Communications in a Process Control System
(1.98 MB)
-
Point Multiplication Methods for Elliptic curve Cryptography
(190.65 KB) This paper gives an introduction to elliptic curve
cryptography (ECC) and presents the comparative study of methods for
point multiplication operation.
-
Prepaid Postpaid Convergent Charging
(657.87 KB)
-
Probabilistic model for Intrusion Detection in Wireless Sensor
Network
(260.42 KB) This paper compares the probability of intrusion detection
in both the Poisson as well as Gaussian deployment strategies.
-
QoS Routing in Mobile Ad-hoc Networks using Agents
(384.89 KB) Our proposed scheme optimizes the uncertain weights before
QoS prediction using Error Back Propagation (EBP) algorithm, this
optimization is done till to get acceptable error limit.
-
Quality of Service Based Handover Approach in a WLAN network
(113.51 KB) In this paper work we have considered a handover mechanism
for IEEE 802.11 Wi-Fi and perform some modifications and then study the
effect of these changes on QoS in respective throughput delay and
jitter.
-
Quantum transduction of telecommunicationsband single photons from a
quantum dot by frequency upconversion
(573.09 KB) This paper describes the frequency upconversion in a PPLN
waveguide to measure single-photon PL from a quantum dot emitting near
1.3 mm with silicon SPADs that are used in high signal-to-noise
spectrometry and time-correlated photon counting.
-
Recent developments in lightwave network analysis
(159.1 KB) This paper provides a review of the theory and techniques
used for the small-signal characterization of microwave photonic
components.
-
Recovery of loss of packet in network using constant packet
reordering
(107.4 KB) This paper proposes a new version of the TCP which gives the
high throughput when the packet reordering occurs and in another case if
the packet reordering is not occurs then in that case also it is
friendly to other version of the TCP.
-
Relational GIS and Remote Sensing Database System for Al-Salt Area,
Jordan
(652.71 KB) This paper describes the validity and the appropriateness of
GIS and Remote Sensing techniques,particularly data fusion of images are
evaluated in relation to visualization.
-
Reliable Broadcasting Using Efficient Forward Node Selection for
Mobile Ad-Hoc Networks
(241.72 KB) In this paper, we propose to develop a reliable broadcasting
algorithm which is a sender-based algorithm.
-
Remote Desktop on Mobile
(192.32 KB) In This paper we will see how the remote Desktop with static
IP can be accessed using Android based mobile phones,to develop this
application we used virtual network computing architecture (VNC.
-
Remote Wireless Networking
(3.86 MB)
-
Repeated Clustering to Improve the Discrimination of Typical Daily
Load Profile
(957.43 KB) This study examines how the repeated clustering method
improves the ability to discriminate among the TDLPs of each cluster.
-
Representing Access Control Policies in Use Cases
(576.71 KB) This paper proposes the required notation and format to
represent security requirements, especially access control policies in
use case diagram and use case description.
-
Research issues in Outlier mining: High- Dimensional Stream Data
(154.97 KB) This paper discusses those issues and how they are addressed
in the existing literature.
-
Research on Data Mining Using Neural Networks
(109.87 KB) In this paper, the data mining based on neural networks is
researched in detail, and the key technology and ways to achieve the
data mining based on neural networks are also researched.
-
Review and analysis of local multipoint distribution system to
deliver Voice, Data, Internet, and Video Services
(294.29 KB) In this paper, LMDS uses cellular-like network architecture
of microwave radios placed at the client's location and at the company's
base station to deliver services, mainly telephony, video and internet
access.
-
Route Request Flooding Attack Using Trust based Security Scheme in
Manet
(179.33 KB) In this paper,we describe that how the flooding attack occur
and the effect of flooding attack and present simulation results to show
the detrimental effects of Flooding Attack.
-
Safety In Numbers
(316.5 KB)
-
Secure Framework in Data Processing for Mobile Cloud Computing
(144.61 KB) In this paper, we present a new mobile cloud data processing
framework through trust management and private data isolation.
-
Secure Key Pre-distribution in Wireless Sensor Networks.
(212.9 KB) In this paper we have evaluated various existing
deterministic, probabilistic and hybrid type of key pre-distribution and
dynamic key generation algorithms for distributing pair-wise, group-wise
and network-wise keys.
-
Secured and Efficient Authentication Scheme for Mobile Cloud
(112.46 KB) In this paper, we presented the current state of
mobile-cloud authentication technology and our proposed system Mobile
Cloud Key Exchange (MCKE), an authenticated key exchange scheme that
aims at efficient authentication.
-
Securing AODV for MANETs using Message Digest with Secret Key
(197.45 KB) In this paper we are presenting a novel and practical
security mechanism for securing the AODV routing protocol that protects
against a number of attacks carried out in MANETs.
-
Self-organization and Topology's Control for Mobile Ad-hoc
Networks
(441.53 KB) This paper deals with the study of auto-organisation
solution for Ad-hoc networks, and the benefit effects brought by this
last to the routing-process.
-
Short-Term Multi-Cell Dynamic Resource Allocation in Future Cellular
Networks
(390.98 KB) In this paper, we propose a multi-cell coordinated and
un-coordinated dynamic resource sharing algorithms and reuse techniques
among base station/ relay station cells.
-
Simulation using the Recursive Method in USN (518.61 KB) We propose the recursive contract net protocols which less
energy level of terminal node in wireless sensor network.
-
SMART: A Secure Multipath Anonymous Routing Technique
(191.04 KB) In this paper, a secure multipath anonymous routing protocol
(abbreviated as SMART) has been proposed.
-
Solutions Approaches to the Flexible Management of Modern IT
Infrastructures
(641.73 KB)
-
Spectral Minutiae Fingerprint Recognition System
(313.45 KB) This paper presents the performance of the spectral minutiae
fingerprint recognition system, this renders our system suitable for a
large-scale fingerprint identification system, thus significantly
reducing the time to perform matching.
-
State of Component Models Usage: Justifying the Need for a Component
Model Selection Framework
(427.66 KB) In this article, the need for a component model selection
framework is justified.
-
Strengthening the Encryption Mechanism in WEP Protocol
(116.41 KB) In this paper we analyze some weaknesses on the RC4 stream
cipher which is used by WEP Protocol and we proposes an public key
encryption scheme Elliptic Curve Cryptography in WEP which will
overcomes the drawbacks of RC4 encryption Protocol.
-
Strong Capabilities, Difficult Decisions
(360.94 KB)
-
Study of Reliable Data Communication in Wireless Sensor Networks
(323.33 KB) This paper explains about studying the various issues and
analyze the design choices proposed in literature in addressing the
challenge of sensors-to-sink reliable data communication.
-
Study of Wireless Sensor Network in SCADA System for Power Plant
(251.3 KB) In this paper, study of wireless SCADA system which is
powerful setup for monitoring and controlling the various applications
from remotely placed is presented.
-
Survey of vertical Handover Decision Algorithms
(72.93 KB) In this paper we are presenting the survey of VHD algorithms
designed to satisfy these requirements.
-
System Architecture of HatterHealthConnect: Integration of Body
Sensor Networks and Social Network
(541.35 KB) We present the system architecture; both hardware and
software, of a prototype implementation using Zephyr HxM heart monitor,
Intel-Shimmer EMG senor and a Samsung Captivate smart phone.
-
Tackling Radio Frequency Interference Associated with Frequency
Converters
(174.44 KB)
-
TCM-coded OFDM assisted by ANN in Wireless Channels
(377.7 KB) The objective of this paper is to use Artificial Neural
Network in conjunction with M-ary PSK Trellis Coded Modulation based
OFDM as a means of achieving higher throughput and performance
improvement in multipath fading channel.
-
TCP/IP
(177.86 KB) This paper explains briefly about Streams Failure, Upgrade
Considerations, Direct TCP/IP, Client Streaming Application and
Troubleshooting Slow Hosts and/or Networks.
-
TCP/IP and Data Communications Administration Guide
(772.29 KB) This paper explains how to set up, maintain, and expand a
network running the SolarisTM implementation of the TCP/IP protocol
suite.
-
TCP/IP Networking Basics & Troubleshooting (675.59 KB) This paper explains about the very basic knowledge about
networking and configuring a DVR for remote access via the Internet
Protocol as well as some common troubleshooting procedures.
-
Techniques for Load Balancing in Wireless LAN
(485.88 KB) This suggests new strategies for balancing load in a
wireless network connected in star topology.
-
Telecom Engine Generators for Backup Powering Solutions
(78 KB)
-
Telecom Wiring Guideline Paper
(459.25 KB)
-
Telemetry for Animal Cardiac Research
(236.84 KB)
-
The ABC's of Etherner Troubleshooting
(333.94 KB)
-
The Affects of Different Queuing Algorithms within the Router on QoS
VoIP application Using OPNET
(347.29 KB) In this work, simulation tool â€Å“OPNET Modeler version
14.0†is used to implement the proposed network (VoIP Network).
-
The Chained-Cubic Tree Interconnection Network
(271.43 KB) This paper proposes a new interconnection network topology,
referred to as the chained-cubic tree, in which chains of hypercubes are
arranged in a tree structure.
-
The Effect of Using P-XCAST Routing Protocol on Many-to-Many
Applications
(366.31 KB) In this paper, P-XCAST was tested using topologies with
different sources that were sending and receiving data at the same time
to handle foreground and background many-to-many applications.
-
The Five Dangers of Poor Network Time Keeping
(386.6 KB)
-
The Future of IP SAN using SCVM
(193.31 KB) Storage Concentrators provide an intelligent centralized
storage system for increasing disk utilization and disk space
efficiency, and reducing data duplication.
-
The Industrial Intranet: A Cause for Change
(649.25 KB)
-
The New Approach to provide Trusted Platform in MANET
(414.01 KB) This paper proposes the new trust scheme, which provides
malicious free atmosphere for mobile ad-hoc network.
-
Training of Fuzzy Neural Networks via Quantum-Behaved Particle Swarm
Optimization
(514.09 KB) We have proposed a fuzzy neural network based on RBF network
and takagi-sugeno fuzzy system.
-
Troubleshooting Networks
(223.42 KB)
-
Troubleshooting WLAN Connectivity
(581.75 KB)
-
Tutorial 1: Industrial Communications Fundamentals
(135.79 KB)
-
Tutorial 2: Industrial Data Communications RS-232/RS-485
(69.96 KB)
-
Tutorial 3: Local Area Network Topologies and Access Control
(60.43 KB)
-
Tutorial 4: Local Area Networks Ethernet (10 Mbit/s)
(38.76 KB)
-
Tutorial 5: Transmission Control Protocol / Internet Protocol
(52.45 KB)
-
Tutorial 6: Fieldbus and Device Networks Pt I
(77.98 KB)
-
Tutorial 7: Fieldbus and Foundation Fieldbus Systems Pt II
(102.3 KB)
-
Tutorial 8: Fieldbus and Device Networks Pt III
(50.81 KB)
-
Tutorial 9: Design, Installation and Maintenance of the Fieldbus
System Pt IV
(22.08 KB)
-
Ultra Wide and Communication: Practical Applications and Future
Aspects
(163.28 KB) This paper discusses the concept behind ultra wide band
communication technology, application areas, technological challenges
,spectrum operating zones and future aspects of the technology.
-
Using Dial-On-Demand To Trigger Backup Link
(38.16 KB)
-
Using Gprs To Connect Small, Outlying Stations
(175.15 KB)
-
Using OPT
(1101.7 KB)
-
Using Orthogonal Channels for Supporting Multicast Service in
Multi-channel Wireless Mesh Networks
(245.57 KB) We propose EWM method that is distributed scheme for
constructing multicast tree in multi-channel multi-interface wireless
mesh networks (MIMC-WMN) which selects relay nodes and in distributed
form assign orthogonal radio channels to them.
-
Video Compression and Data Flow for Video Surveillance
(358.09 KB)
-
VLan Security
(377.19 KB)
-
Wavelet and Optimal Requantization Methodology for Lossy Fingerprint
Compression
(528.46 KB) The proposed techniques used 9/7 wavelet transform before
optimal re-quantization and finally, the output stream of coding symbols
is entropy coded by lossless entropy coder; run-length encoding.
-
Wireless Communications and Networking
(248.59 KB)
-
Wireless LAN (WLAN) Switching
(1090.73 KB)
-
Wireless LAN Networking White Paper
(4.13 MB) This paper explains about the usage and properties of Wireless
LAN.
-
Wireless Security
(107.38 KB)
-
WPAN MAC Protocol: Designing and Analysis with Different ACK
Policies
(289.85 KB) This paper uses analytical model to study the performance
analysis of WPAN MAC under different parameter
-
XML Schema Automatic Matching Solution (493.8 KB) In this paper, we present a solution for XML schema
automated matching problem which produces semantic mappings between
corresponding schema elements of given source and target schemas.
-
A binary adder This article breifs the binary adder.
-
7 reasons to a consider a non-Ethernet industrial network This paper explains the seven reasons to a consider a
non-Ethernet industrial network.
-
Multi Protocol Label Switching (MPLS) This paper briefly explains about the Multi Protocol Label
Switching (MPLS).
-
Digital Subscriber Line (DSL) This paper explains briefly about the Digital Subscriber Line
(DSL).
-
Routers And Routing Protocols This paper explains briefly about the routers and the routing
protocols.
-
Integrated Service Digital Network ISDN This paper explains briefly about the ISDN devices.
-
Local Area Network This paper explains briefly about the LAN.
-
Congestion-Control Mechanisms This paper explains about the frame relay implements two
congestion-notification mechanisms.
-
CSMA( Carrier Sense Multiple Access) This paper explains about the 3 approaches in CSMA.
-
Packet Switching Network This paper explians about the switching techiques.
-
Network LAN Technologies This paper explains briefly about the network LAN technologies.
-
Computer Network - Security This paper explains about the several cryptographic
algorithms.
-
Digital Transmission This paper explains convert digital data into digital
signals.
-
Analog Transmission This paper explains the three kinds of digital-to-analog
conversions.
-
Transmission Media This paper explains briefly about the cables.
-
Wireless_Transmission This paper explains briefly about the wireless transmission.
-
Multiplexing This paper explains the types of multiplexing.
-
Network Switching This paper explains about the types of networks switching.
-
Physical Layer - Introduction This paper explains about the types of signals and the reasons
for transmission impairment.
-
Error Detection and Correction This paper explains briefly about the error control mechanisms.
-
Data-link Control and Protocols This paper explains about the point-to-point flow and error
control mechanism.
-
Network Layer Routing This paper explains briefly about the network layer routing.
-
Internetworking This paper deals with tunneling and packet configuration.
-
Network Layer Protocols This paper explains about the ICMP,IPV4 and IPV6.
-
Transport Layer Introduction This paper explains about the functions and end to end
communication of transport layer.
-
Transmission Control Protocol This paper explains briefly about the TCP.
-
User Datagram Protocol This paper explains briefly about the UDP.
-
Client Server Model This paper explains briefly about the client server model.
-
Application Protocols This paper describes the few of application layer protocols.
-
Network Services This paper describes the various network services.
-
Data Mining - Tasks This paper explains about the classification and prediction.
-
Data Mining - Issues This paper explains about the performance and diverse data type
issues.
-
Data Mining - Evaluation This paper explains about the query and update driven approach.
-
Data Mining - Systems This paper explains about the data mining system classification.
-
Data Mining - Query Language This paper explains about the query language in data mining.
-
Data Mining - Classification & Prediction This paper explains about the classification and the prediction.
-
Data Mining - Decision Tree Induction This paper explains about the decision tree induction algorithm.
-
Data Mining - Miscellaneous Classification Methods This paper explains about the classification methods such as
Genetic Algorithms, Rough Set Approach and Fuzzy Set Approaches.
-
Data Mining - Cluster Analysis This paper explains about the analysis,requirements and methods
of clustering.
-
Data Mining - Mining Text Data This paper explains about the basic measures for text retrieval.
-
Data_Mining_Mining_World_Wide_Web This paper explains about the challenges in web mining.
-
Data Mining - Applications & Trends This paper explains about the data mining application and its
trends.
-
Data Mining - Themes This paper explains about the theoretical foundations of data
mining.
-
The tetrode This article explains the configuration of Tetrode.
-
Combination tubes This article explains about the Combination of Tubes.
-
Tube parameters This article breifs the Tube Parameters.
-
Ionization (gas filled) tubes This article describes an Ionization (gas filled) tubes.
-
Display tubes This article confers the concept of Display tubes.
-
Microwave tubes This aticle explains about the Microwave tubes.
-
Switch contact design This article offers the design for Switch Contact.
-
Contactors This article breifs about the Contactors.
-
Time-delay relays This article explains the Time-delay relays.
-
Protective relays This article confers the Protective relays.
-
Solid-state relays This article describes the Solid-state relays.
-
Ladder diagrams This article explains about the Ladder Diagrams.
-
Digital logic functions This article breifs on Digital logic functions.
-
Motor control circuits This article affords the Motor control circuits.
-
Fail safe design This article offers the design for Fail Safe.
-
Programmable logic controllers This article explains the configuration of Programmable Logic
Controllers.
-
The buffer gate This article describes about The Buffer Gate.
-
Multiple input gates This article affords the Multiple input gates.
-
TTL NAND and AND gates This article describes the configuration of TTL NAND and AND
gates.
-
TTL NOR and OR gates This article explains the configuration of TTL NOR and OR gates.
-
CMOS gate circuitry This article explains the CMOS gate circuitry.
-
Special-output gates This article describes on Special-output gates.
-
Logic signal voltage levels This article breifs the Logic signal voltage levels.
-
Gate universality This article offers the Gate universality.
-
DIP gate packaging This article affords the concept for DIP gate packaging.
-
Contact normal state and make/break sequence This article explains about the Contact normal state and
make/break sequence.
-
Contact bounce This article breifs the Contact bounce.
-
Relay construction This article describes the construction of Relay.
-
Boolean arithmetic This article explains the Boolean arithmetic.
-
Boolean algebraic identities This article confers the Boolean algebraic identities.
-
Boolean algebraic properties This article explains the Boolean algebraic properties.
-
Boolean rules for simplification This article offers the Simplifications for Boolean Rles.
-
Circuit simplification examples This article offers the examples for Circuit Simplification.
-
DeMorgans Theorems This article explains the DeMorgans Theorems.
-
Converting truth tables into Boolean expressions This article offers about how to Convert truth tables into
Boolean expressions.
-
Boolean relationships on Venn Diagrams This article confers the Boolean relationships on Venn Diagrams.
-
Karnaugh maps, truth tables, and Boolean expressions This article breifs the Karnaugh maps, truth tables, and
Boolean expressions.
-
Larger 4 variable Karnaugh maps This article describes the Larger 4 variable Karnaugh maps.
-
Minterm vs maxterm solution This article offers the Solution for Minterm vs maxterm.
-
Sum and product notation This article explains the Sum and product notation.
-
Don't care cells in the Karnaugh map This article describes about the Don't care cells in the Karnaugh
map.
-
Larger 5 & 6variable Karnaugh maps This article explains about the Larger 5 & 6variable Karnaugh
maps.
-
A Full Adder This article affords the configuration of a Full Adder.
-
Decoder This article describes the concept involved in Decoder.
-
Encoder This article breifly explains about the Encoder.
-
Digital logic with feedback This article confers the Digital logic with feedback.
-
The S-R latch This article offers the S-R latch and its configuration.
-
The gated S-R latch This article explains the gated S-R latch.
-
The D latch This article describes about the D latch.
-
Edge triggered latches Flip Flops This article describes about the Edge triggered latches Flip
Flops.
-
The J K Flip Flop This article confers the concept and configuration involved in
the J K Flip Flop.
-
Asynchronous flip flop inputs This article explains the Asynchronous flip flop inputs.
-
Binary count sequence This article offers the Binary count sequence.
-
Asynchronous counters This article describes about the Asynchronous counters.
-
Synchronous counters This article breifly explains about the Synchronous
counters.
-
Finite State Machines This article explains about the Finite State Machines.
-
Making a Venn diagram look like a Karnaugh map This article offers the concept of Making a Venn diagram look
like a Karnaugh map.
-
Permissive and interlock circuits This article describes the Permissive and interlock circuits.
-
Serial in serial out shift register This article explains about the Serial in serial out shift
register.
-
Serial in parallel out shift register This article breifs on Serial in parallel out shift register.
-
Parallel in parallel out universal shift register This article describes the Parallel in parallel out universal
shift register.
-
Ring counters This article explains about the Ring counters.
-
The R 2nR DAC This article offers the R 2nR Digital to Analog Converter.
-
The R 2R DAC This article describes the R 2R Digital to Analog Converter.
-
Flash ADC This article confers the Flash Analog to Digital Converter.
-
Digital ramp ADC This article explains the Digital ramp ADC.
-
Successive approximation ADC This article explains the Successive approximation ADC.
-
Bit groupings This article explains about the Bit groupings.
-
Data flow This article offers about the Data flow.
-
Decimal versus binary numeration This article affords the Decimal versus binary numeration.
-
Delta Sigma ADC This article explains the Delta Sigma ADC.
-
Digital memory terms and concepts This article describes the concept of Digital memory terms.
-
Digital signals and gates This article offers the Digital signals and gates.
-
Historical nonmechanical memory technologies This article describes the Historical nonmechanical memory
technologies.
-
Look_Up_Tables This article affords the Look up tables and its configuration.
-
Memory with moving parts Drives This article breifs about the Memory with moving parts Drives.
-
Modern nonmechanical memory This article explains the Modern nonmechanical memory.
-
Negative binary numbers This article describes the Negative binary numbers.
-
Network_Protocols This article explains the Network protocols.
-
Network topology This article describes the Network topology.
-
Networks and busses This article confers the Networks and busses.
-
Numbers and symbols This article explains about the Numbers and symbols.
-
Octal and hexadecimal numeration This article breifs the Octal and hexadecimal numeration.
-
Octal and hexadecimal to decimal conversion This aticle describes the Octal and hexadecimal to decimal
conversion.
-
Optical data communication This article describes the Optical data communication.
-
Overflow This article confers the concept of Overflow.
-
Practical considerations of ADC circuits This article explains the Practical considerations of ADC
circuits.
-
Slope (integrating) ADC This article describes the Slope (integrating) ADC.
-
Subtraction This article describes the process of Subtraction.
-
Switch types This article offers the Types of Switches.
-
Systems of numeration This article describes about the Systems of numeration.
-
Tracking ADC This article explains about the Tracking ADC.
-
Why digital This article breifly explains how to store and access
binary data.
-
DSLAM (Digital Subscriber Line Access Multiplexer) This paper confers the concept of Digital Subscriber Line Access
Multiplexer.
-
ADSL Router This paper explains about the ADSL modem.
-
Token Ring This article affords a local area networking system originally
conceived in the late 1960s.
-
Subnet Masks This article breifly discusses about Subnet Masks.
-
DHCP Reservation This article describes a permanent IP address assignment.
-
NAT (Network Address Translation) This article explains about a technique for preserving scarce
Internet IP addresses.
-
QoS (Quality of Service) This paper describes about a generic name for a set of
algorithms.
-
IP Address This article breifly explains about the unique address that
different computers on a computer network use to identify and
communicate with one another.
-
IP Address Classes This paper explains about the original organizational structure
for IP addresses.
-
IP Address Conflict This paper discusses the IP Address Conflict.
-
Routing Protocols This paper breifly explains about the implementation of a routing
algorithm in software or hardware.
-
IP (Internet Protocol) This article breifly explains about Internet Protocol and its
purpose.
-
Routing This article explains about the process of moving packets through
an internetwork, such as the Internet.
-
How to Set a Static IP This article describes about How to Set a Static IP.
-
What is Multicast Wireless? This article describes about the transfer of messages to multiple
destinations simultaneously, using fewer networks.
-
How to Configure a Router This article discusses about How to Configure a Router.
-
Port Forwarding This paper breifly explains about a network port from one node to
the other.
-
IPsec This paper affords about IPSec (IP Security) is a suite of
protocols.
-
DMZ (DeMilitarized Zone) This article describes the DeMilitarized Zone.
-
Network Attacks This article explains about Network Attaacks.
-
Denial of Service (DoS) Attacks This article confers about Denial of Service (DoS) attack is one
that attempts to prevent the victim from being able to use all.
-
Firewalls This article discusses about a software component that restricts
unauthorized inward network access.
-
Access Control This article explains about the execution of limitations and
restrictionsof Access Control.
-
What_is_VDSL2 This article describes about the Very High Bit Rate Digital
Subscriber Line Generation 2.
-
ISDN Modem This article describes about a digital phone connection that can
transmit data, voice and video over a normal telephone line.
-
PPP Authentication Protocols This paper explains about PPP Authentication Protocols.
-
EtherCAT This article affords the Ethernet for Control Automation
Technology.
-
Tunneling This article explains about a way in which data is transferred
between two networks securely.
-
Symmetric DSL This article describes about a kind of one kind of Digital
Subscriber Line (DSL) used to provide high-speed Internet connectivity.
-
Differences Between ISDN and DSL This article breifly discusses the Differences Between ISDN and
DSL.
-
Asynchronous Transfer Mode ATM This article explains about the Asynchronous Transfer Mode ATM.
-
ATM Cell Header Formate This article confers the ATM Cell Header Formate.
-
ATM_Reference_Model This article desribes the ATM Reference Model.
-
LAN Topologies This article explains the LAN Topologies.
-
E and T carrier This article breifly explains about the E and T carrier.
-
FiOS This article describes about a special type of data network that
is offered to Fiber Optic Subscribers.
-
Network Cable is Unplugged This article confers the concept of Network Cable is Unplugged.
-
Analog Telephone Adapter This article explains about an an electronic device used to
enable one or more analog telephones.
-
How Does Wireless Networking Work? This article explains How Does Wireless Networking Work.
-
What is PCAP? This article describes about the Packet Capture.
-
SIP Gateway This article explains about a device that connects to your
Internet modem and relays data.
-
What is a Smart Antenna? This article describes about a smart antenna is one that
transmits or receives multiple radio frequencies at once.
-
WiBro This article breifs about the Wireless Broadband.
-
WiFi Signal Strength Meter This article describes about the WiFi Signal Strength Meter.
-
What is Intersymbol Interference? This article explains about the signal distortions- Intersymbol
Interference.
-
MIC (Message Integrity Check) This article describes A message integrity check (MIC), is a
security improvement for WEP Encryption.
-
Ad Hoc Network This article explains about a type of peer to peer wireless
network mode.
-
RSN (Robust Secure Network) This article desceibes about a protocol for establishing secure
communications over an 802.11 wireless network.
-
Bluetooth This article explains about a specification for short distance
between two devices.
-
W-CDMA (Wideband Code Division Multiple Access) This article explains the radio access scheme used for third
generation cellular systems.
-
How to Connect a Wireless Router This article explains How to Connect a Wireless Router.
-
Fiber Optic Internet This article explains about the Fiber Optic Internet.
-
Fiber Optic Patch Panel This article describes about the Fiber Disteibution Panel.
-
Fiber Optics This article explains about the Fiber optic technology makes use
of light to carry digital signals via optical cables.
-
WLAN (Wireless Local Area Network) This article explains aboout a Wireless Local Area Network (LAN)
that implements high frequency radio waves instead of wires.
-
TCP Sequence Prediction Attack This article offers a TCP sequence prediction attack is an
attempt to hijack an existing TCP session by injecting packets
-
RADIUS Server This article describes the Remote Authentication Dial In User
Service.
-
Ethernet This article explains about the Ethernet and its functions.
-
Ethernet at the Physical Layer This article explains about the Ethernet at the Physical Layer.
-
Understanding Ethernet LAN Segmentation This article describes about how to understand Ethernet LAN
Segmentation.
-
LC Connectors This paper affords about the LC Connectors.
-
VoIP (Voice over Internet Protocol) This paper confers breifly about the Voice over Internet
Protocol.
-
Ethernet Switch This article describes about the Ethernet Switch.
-
Routing Tables This article breifs the Routing Tables.
-
Subnetting This article explains the process of breaking down an IP network
into smaller sub-networks.
-
MTRJ Connectors This paper breifs about a type of fiber optic cable that has an
endpoint.
-
RJ-11 This article describes the RJ stands for “Registered Jack”- a
physical connector interface most often used for telephone wire
terminals.
-
568B This article describes about one of the International standards.
-
UTP (Unshielded Twisted Pair) This article explains about the Unshielded Twisted Pair.
-
Ethernet Crossover Cable This article offers about the Ethernet Crossover Cable.
-
Wavelength Division Multiplexing This article affords the concept of Wavelength Division
Multiplexing.
-
Cat 5 This article describes the Cat 5, short for Category 5, is the
current accepted industry standard for network and telephone wiring.
-
DWDM (Dense Wavelength Division Multiplexing) This article confers the Dense Wavelength Division Multiplexing.
-
RG-11 This article offers about the RG-11 and its Specification.
-
Coaxial Cable This article breifly describes about the Coaxial cable, also
called coax, is used to transmit radio frequency (RF) signals.
-
What is a QSIG? This article describes the QSIG is a signaling protocol that is
based on ISDN.
-
How to Compare VoIP Providers This article describes about VoIP (Voice over Internet Protocol)
is changing the way people communicate.
-
RJ-45 This article explains about one of the more popular standard
connector types used with unshielded, twisted pair network cables.
-
Cat 6 This article explains about a cable standard used mainly for
Ethernet computer networking, security systems, and telephone services.
-
RG-59 This article breifs about the RG-59 cable is a type of coaxial
cable that is used to generate low-power video connections.
-
RG-6 This article confers about RG-6 cable is one of the more
common types of coaxial cables used for commercial and household
purposes.
-
RG58 This article explains about the Cable used for Wiring Purposes.
-
Multilayer PCB This article breifs the Multilayer Printed Circuit Board.
-
Ethernet Fiber Media Converter This article explains about the device Ethernet Fiber Media
Converter.
-
How to Splice a Coaxial Cable This article describes how to splice the Coaxial Cable.
-
DHCP (Dynamic Host Configuration Protocol) This article explains about the DHCP (Dynamic Host Configuration
Protocol).
-
Broadcast Domain This article describes about the logical part of a network .
-
Collision Domain This article explains about the Logical Network Segments.
-
DOCSIS (Data Over Cable Service Interface Specification) This article explains about the Data Over Cable Service Interface
Specification.
-
PPP (Point-to-Point Protocol) This paper describes about the Point-to-Point Protocol.
-
VLAN Hopping Thisarticle breifs about the VLAN Hopping.
-
How fast is ADSL Speed? This article affords how fast is ADSL Speed.
-
DSL vs Cable Modem This paper discusses the differences between DSL vs Cable Modem.
-
Ethernet Cable Pinout This article confers the Ethernet Cable Pinout.
-
WEP Key Passphrase This article describes the WEP Key Passphrase.
-
Communication Networks–An Introduction and Overview This article describes a network is an interconnection of many
nodes through which a desired entity flows or travels.
-
Message and Packet Switching This paper confers the concepts of message and packet switching.
-
Circuit Switching This article explains about developing the concept and
application of circuit switching which is a very important component of
a telephone network.
-
Connectionless And Connection Oriented Packet Switching This article explains about the understanding of two important
modes of packet switching, namely, the connectionless and the connection
oriented packet switching.
-
Communication Process And Layered Architecture This article describes about the basic animal instinct and it is
more so for thehuman beings. They need to communicate for conveying
their requirements and feelings to each other.
-
Communication Between Two Computers And The Layering Concept This article focusses the layering concept in communication
process (computer communication).
-
Osi Layers And Protocols This paper explains about the layered architecture in
communication process (computer architecture)
-
Standards - Physical Layer This paper describes about a bandwidth which is used for
transmitting voice where a great deal of distortion and interference can
be accepted without loss of intelligibility.
-
LAN Topologies, Access Mechanisms And Media This article explains about the processing power of the computer
increased considerably,the size and the cost also decreased greatly.
-
Token Passing LANs This article explains about the Token bus maintenance, Frame
structure.
-
Distributed Queue Dual Bus ( DQDB ) This article explains about two parallel unidirectional buses are
laid down in the area to be covered by the network.
-
Fibre Distributed Data Interface (FDDI) This paper describes the high-performance fiber optic token ring
LAN running at 100 Mbps over distances up to 200 km with up to 1000
stations connected.
-
Internet and IPv4 This article breifs the Datagram which will have a source and
destination address named as IP address.
-
IP addressing. ICMP This article breifs the the discussion on IPv4 along with the
idea of ICMP.
-
Internet And Internet Protocol Suite - IPv6 This article explains the Internet Protocol version 6 (IPv6) or
Internetworking Protocol, next generation (IPng) was proposed and is now
a standard.
-
Internet And Internet Protocol Suite - TCP This article breifs about a very popular transport layer
protocol, i.e. the TC Protocol.
-
Internet And Internet Protocol Suite - UDP. protocol
suite This article explains about the connectionless transport layer
protocol, i.e. the User Datagram Protocol.
-
Digital Switching - Space Switching This article describes about the hierarchical structure of the
telephone networks, if the number of switches decrease then the
transmission distance increases, and vice-versa.
-
Multistage Switching This article explains about the number of incoming traffic
becomes unmanageable by a single operator then grouping is important.
-
Time Multiplexed Space Switching and Time Switching This article describes about the Electronic Switching System.
-
Time and Space Switches This article breifs about the time switch has a capacity limit as
even with a memory cycle at 833 MHz (approx 1 ns) only 125000 users can
be served by a single switch.
-
Frame Relay and ATM This article breifs about the Bit rate and high basic
transmission rate interms of frame relay.
-
ATM: Concepts And Header This article explains a fixed packet size irrespective of
traffic, and Connection Oriented service is used for achieving large
throughput (Connectionless Service will be accommodated anyway).
-
ATM: Virtual Path,Virtual Channel. ATM Adaptation Layer
(AAL) This article discusses about how to adapt the PDUs passed down
from the higher layer onto ATM cells, also explains the Virtual path and
channel.
-
Narrowband And Broadband ISDN This article explains about the concept and definition of
Narrowband And Broadband ISDN.
-
ISDN: Reference Points, Services And Standards This article explains about the concept and definition of
Integrated Services Digital Network.
-
B-ISDN This article breifs the Broadband ISDN service sprung from the
growing needs of the customers.
-
Synchronous Digital Hierarchy This paper defines a structure which enables plesiochronous
signals to be combined together and encapsulated within a standard SDH
signal.
-
Network Security This article breifs about the Network security and its valuable
usage.
-
Introduction to Multimedia Systems and Processing This paper breifly describes about the Multimedia Systems and
Processing.
-
10 ways to speed up slow computer This article explains about the Defragmenting Hard drives, Clean
Registry and Delete Temporary, Junk and Obsolete files/Clear cache.
-
A Brief History of Unix This article discusses and covers the history of UNIX and an
introduction to UNIX.
-
Accessing SQLite Databases in PHP using PDO This article explains about PDO or PHP Data Objects is a data
abstraction layer, i.e. it provides uniform methods to access different
types of databases, as a result switching between or moving to a
different database system is relatively easier.
-
Advanced Types Of Scheduling This article describes about the various advanced features of
scheduling-Multilevel Queue , Multilevel Feedback Queue and Highest
Response Ratio Next .
-
Authentication Authorisation Accounting (AAA) Protocols: A Look at
RADIUS and DIAMETER This paper briefs about an Authentication, Authorisation and
Accounting (AAA) processes which are used when the user of a system that
is trying to connect to the internet or other network.
-
Basics of Computer Network Fundamentals This paper discusses some basic terminologies related to computer
networks that will help you understand the fundamentals of computer
networks.
-
Basics of How Operating System Works This article explains about the basic function performed by a
computer is program execution and the program (to be executed) consists
of a set of instructions stored in memory.
-
Basics of Servlet (Part-1) This article explains about Servlets which are server side
components that provide a powerful mechanism for developing server side
programs.
-
Basics of Stored Procedures This paper describes a collection or batch of T-SQL statements
and control-of-flow language that is stored under one name and executed
as a single unit.
-
Basics of Virtual Machine And Process This article discusses the Operating system is large, but
modularity is important thus a computer system is made up of layers and
about Virtual machine creates an efficient, dynamic, secure and portable
object-oriented facility.
-
Byte Ordering Concept - Little Endian & Big Endian This article explains about the way in which the bytes
corresponding to a certain value is stored in the memory.
-
Consequences of using the Copy-Paste method in programming and how to
deal with it This article briefs about a large amount of source code of
various applications where we detected suspicious code fragments.
-
Database Vs Files This article explains about the attachments of a flat file
that has 22400 names stored with one line containing one record.
-
Difference between Stored procedures and User Defined
functions[UDF] This article explains and compares the difference bwtween Stored
procedures and User Defined functions[UDF].
-
DNS Cache Poisoning (DCP) This article affords the Brief History of Cache Poisoning and
Redirecting Web Traffic.
-
File Version Management in PHP This article explains the Management of files, Creating the files
in PHP, Different Ways to Open a File, File Close Description and File
Upload in PHP.
-
Getting Started With Virtual machines This article briefs about a Virtual machine(VM) as the name
suggests is a software implementation of a programmable machine running
inside another machine i.e an OS running inside another OS e.g. Linux
running inside Windows.
-
History and Evaluation of Operating System This article explains an operating system which is a program that
acts as an interface or intermediary between the user of a computer and
the computer hardware.
-
How Anti-Viruses Works This paper describes about the working fundamentals of Anti-Virus
which is a software or a program that can scan your files and data in
your computer prevent you from firmwares and viruses.
-
How to Set up Network Lab With Virtual Machines This article explains three type of network supported by the
virtual machines.
-
How to Stop vBulletin Spam Registration This article explains the Spam Prevention Options for vBulletin
and how to Stop vBulletin Spam.
-
How to Use Strace - A Linux Debugging Utility This article explains about Strace is a Linux Utility which lists
all the system calls and any signals, of any executable running on Linux
Operating System. Strace generally comes along with the Linux
installation.
-
How Web Search Engines Work This article explains about Search engines are the key to finding
specific information on the vast expanse of the World Wide Web and its
working.
-
Introduction to Hard Disk (HDD) This article explains about a hard drive which is a mass storage
device found in all PCs (with some -[exclusions) that is used to store
permanent data such as the operating system, programs and user files.
-
Introduction to Lossless Audio Encoding This article briefs about Lossless Encoding is a method of
encoding that allows no loss of data while converting to and from
encoded data to normal data.
-
KPMG: On Covert Channels in Networks and Eavesdropping Communication
Note This article explains about how to provide an insight as to how
organisations, multinationals, governements etc. incorporate security
within their network and/or lack of security.
-
Linux History This article discusses and covers the history of Linux and an
introduction to Linux.
-
Linux Makefiles (Basics) This article describes about the concept of makefiles using
linux.
-
Linux Ports This paper describes about the Common server ports of Linux
andPort Numbers Used by Some Common Protocols.
-
Linux Shells This article briefs about a fast growing operating system, and it
is inexpensive and flexible of Linux shell.
-
Memory Allocation Schemes This article explains about the relocation-register scheme
provides an effective way to allow the operating-system size to change
dynamically.
-
Notes on Network Security - Introduction This article briefs about the OSI Network Model of: Application,
Transport,Network, Datalink and Physical, where amongst this can
security be deployed.
-
Operation System and Internet This article briefs the Operation system is a program so is
standard on every computer.
-
Process Control and Multitasking This article explains the Concept of the UNIX kernel which can
keep track of many processes at once, dividing its time between the jobs
submitted to it.
-
Query Optimization This article explains about the most important factors in the
performance of the database and with a good database design you also
need optimal queries to perform optimally.
-
Scheduling and Threads This article explains the Scheduling Queues, Co-Operating
Processes and Inter Process Communication (IPC).
-
Screen scraping your way into RSS This article describes about the hottest technologies at the
moment, and even big web publishers (such as the New York Times) are
getting into RSS as well and its screen scrapping.
-
Security Protocols This article explains the Data Link Layer Security, Security
History, Vulnerabilities and ecurity Enhancements of WLAN.
-
Speed up your web pages This article describes about Database design, Query optimization,
Fewer HTTP Requests, Gzip your output, External JavaScript and CSS and
Minify JavaScript.
-
Sur.ly Free Plugin to Protect Against Link Spam This paper describes about a free plugin for different CMSs
(including WordPress and Drupal) that protects your website against any
improper content that suspicious users might publish, i.e. spam links
posted among user-generated content.
-
System Security This article briefs the worm propagation techniques and Network
Security Essentials.
-
Types of Server This article describes a Server is a computer or device on a
network that manages network resources.
-
Typical errors of porting C++ code on the 64-bit platform This article briefs about how to observe thoroughly those
problems which the developer of 64-bit programs can face.
-
Unix Network Programming Tutorials - Socket Basics This article briefs about the concept of network programming
where in two processes running on different hosts interact through
sockets.
-
Web Server Error Messages This article briefs the Errors on the Internet, and those
annoying error messages, occur quite frequently -- and can be quite
frustrating.
-
What Are Web Services? This paper describes about the term Web services in which a
standardized way of integrating Web-based applications is explained.
-
What is Netcat and How to use it This article briefs the Netcat (also known as ‘nc’ or ‘Swiss Army
knife’) is a networking utility used for reading or writing from TCP and
UDP sockets using an easy interface.
-
What is Operating System, Kernel and Types of kernels This paper explains the concept of a kernel is a central
component of an operating system.
-
Distributed systems-Architecture This article explains about the highl evel architectural aspects
of distributed systems.
-
Socket-level Programming This article deals with host and service addressing, and then
considers TCP and UDP.
-
Data serialisation This article deals with the basics of serialisation and then
considers several techniques supported by Go APIs.
-
Application-Level Protocols This article deals with the basics of serialisation and then
considers several techniques supported by Go APIs.
-
Managing character sets and encodings This article explains about varies ways of encoding character
sets into binary formats of bytes.
-
Distributed System-Security This paper describes about the Spam mail, denial of service
attacks, phishing attempts and so on are indicative that anyone using
the internet does so at their own risk.
-
HTTP This article explains about the Web is built on top of the HTTP
(Hyper-Text Transport Protocol) which is layered on top of TCP. HTTP has
been through three publically available versions, but the latest -
version 1.1 - is now the most commonly used.
-
A Complete Web Server This paper describes about a lengthy illustration of the HTTP
chapter, building a complete Web server in Go. It also shows how to use
templates in order to use expressions in text files to insert variable
values and to generate repeated sections.
-
XML This article discusses about XML which is a significant markup
language mainly intended as a means of serialising data structures as a
text document.
-
Remote Procedure Call This article explains about a Socket and HTTP programming use a
message-passing paradigm.
-
Network channels This article explains about the Channel server, Channel client
and also explains about how to handle timeouts.
-
Web sockets This article describes about Web socketswhich are designed
to answer a common problem with web systems: the server is unable to
initiate or push content to a user agent such as a browser.
-
Networking Concepts This article sexplains about the packet switched network,
ethernet protocol, internet protocol.
-
Network Addressing This article describes about IPv4 Addressing, IP Address, Subnet
Mask, Network and Broadcast Addresses.
-
The Super User This article explains about how every file on the server has
three sets of permissions: user, group, and everyone else.
-
Configuring An Interface This article briefs about the network interface in your machine
for the first time, using the ip utility.
-
Persistent Configuration This article discusses how to define the network configuration in
the system so that your interface is configured automatically at boot
time.
-
DNS This article explains the Domain Name Service, or DNS, is
integral to network computing. It provides a mechanism by which IP
addresses can be looked up using host names, and vice versa.
-
Package Management and Yum This article discusses about a tool called Yum that can be used
to locate and install RPM packages and dependencies.
-
SSH: The Secure Shell This article describes about the main component of the OpenSSH
client software suite is the ssh command. ssh allows you to log into
other servers remotely.
-
SSH: The Secure Shell Server This article explains about the OpenSSH server runs as a process
in the background on a machine and it listens for incoming connection
requests on a specified TCP port.
-
User Accounts This article discusses about the file which holds information
about all of the user accounts on the system.
-
More Control Flow Tools This article deals with the usual control flow statements known
from other languages, with some twists.
-
What can web analytics do for technical communications? This article explains about Web analytics is often used in
Internet marketing to understand the success of advertising or determine
why customers aren’t completing the purchase process on a website.
-
How do you know your site search is working? This article describes some measurements we’re using to help
understand what’s wrong with our current search, and then to be able to
work out whether our improved search is better.
-
5 similarities & 5 differences: internal communication vs.
technical communication This article briefs about Similarities and dissimilarities
between technical communication and internal communication.
-
A strategy to address the findability problem This paper describes about a complex problem, involving
interaction of many elements.
-
10 reasons APIs and development platforms are difficult to use This artcle explains about how to build the own custom
applications.
-
Self-service support starts in the UI This article explains about to write a good piece of information
once so that customers can find it and use it to solve their problems
than it is to deal with the same question from different customers
repeatedly.
-
When’s the best time to usability-test software? This article briefs about Usability testing as part of
requirements gathering phase.
-
Auto Enhancements: All About the Cold Air Intake This paper describes about how to enhance your vehicle’s
performance without having to make drastic alterations on your engine is
by using a high-quality cold air intake.
-
Ethernet/IP Multicasting Explained This article explains about an Ethernet/IP is a communication
standard developed by Allen Bradley in 2001 and has been turned over to
ODVA as an “open” standard for communicating real-time information over
Ethernet.
-
ATA, IDE and EIDE This article explains about the ATA (Advanced Technology
Attachment) standard is a standard interface that allows you to connect
storage peripherals to PC computers.
-
Binary encoding This article explains about the form of encoding that allows
computers to run. Binary uses two states (represented by the digits 0
and 1) to encode information.
-
Bluetooth - How it works This article describes about the Bluetooth standard, like WiFi,
uses the FHSS technique (Frequency-Hopping Spread Spectrum), which
involves splitting the frequency band of 2.402-2.480 GHz into 79
channels (called hops) each 1MHz wide, then transmitting the signal
using a sequence of channels known to both the sending and receiving
stations.
-
Bus Topology This article explains about Multipoint connection is used in BUS
Topology.
-
Cables and connectors This article briefs about the pins and holes in connectors are
usually linked to the electric wires which form the cable. The pin
layout describes which pins couple with which wires.
-
Client-Server Network This article explains about Client-server describes the
relationship between two computer programs in which one program, the
client, makes a service request from another program, the server, which
fulfills the request.
-
Computer - Introduction to Memory This article describes about the term "memory" applies to any
electronic component capable of temporarily storing data.
-
Computer bus - What is it? This article briefs about a bus, in computing, is a set of
physical connections (cables, printed circuits, etc.) which can be
shared by multiple hardware components in order to communicate with one
another.
-
Computer Networking This article briefs about a collection of autonomous
computers.
-
Computer Operating Systems This article briefs about an Operating systems perform basic
tasks, such as recognizing input from the keyboard, sending output to
the display screen, keeping track of files and directories on the disk,
and controlling peripheral devices such as disk drives and printers.
-
Computer screen or monitor This article explains about a monitor (or screen) is a computer
display unit.
-
Creating a local area network This paper describes about how to create a local area network
(LAN). Setting up such a network costs very little, contrary to what
people may think.
-
Creating an RJ45 crossover cable This article explains about the RJ-45 is the one which interests
us here, as it it the most widely used.
-
Cross-Site Scripting attacks This article describes about Cross-Site Scripting (sometimes
abbreviated XSS or CSS) attacks are attacks targeting websites that
dynamically display user content without checking and encoding the
information entered by users.
-
Data transmission - Cabling This article briefs on a physical data-transmission media are
available to connect together the various devices on a network.
-
Data transmission - Digital data transmission This article explains about Digital transmission which is the
sending of information over a physical communications media in the form
of digital signals.
-
Data transmission - Transmission modes This article describes about transmission on a communications
channel between two machines can occur in several different ways.
-
Declaring a style sheet (CSS) This article describes about the HTML code indicating both the
type of document, meaning the version of the HTML and CSS
recommendations used by the pages, and the styles themselves.
-
DTS (Digital Theatre Sound) This article determines about DTS (Digital Theatre Sound) is a
digital sound coding standard created by Universal.
-
Ethernet Cabling This article explains about the various kind of Ethernet cables.
-
FAT16 and FAT32 This article briefs about the first file system to be used on a
Microsoft operating system was the FAT system, which uses a file
allocation table.
-
File sharing in Windows XP This article discusses about File sharing which involves making
the content of one or more directories available through the
network.
-
Formatting - Formatting a hard drive This article explains about the purpose of low-level formatting
is to divide the disk surface and The tracks are the concentric areas
written on both sides of a platter.
-
Front Office and Back Office This article describes about the Front-Office (sometimes also
called Front line) refers to the front part of the company, visible for
the clients and in direct contact with them, such as the marketing, user
support, or after-sales service teams. In turn, Back Office refers to
all parts of the information system to which the final user does not
have access.
-
FTP protocol (File Transfer Protocol) This article explains about FTP protocol defines the way in which
data must be transferred over a TCP/IP network.
-
Hardware Interrupts (IRQ) and Conflicts This article describes about the Concept of Interrupts and a
direct memory access channel, called a DMA.
-
How email works (MTA, MDA, MUA) This article explains an Email is based around the use of
electronic mailboxes. When an email is sent, the message is routed from
server to server, all the way to the recipient's email server.
-
How to make a bootable windows7 pen drive. This article explains about a virus clean PC for copying process,
Original Windows 7 disc and A 4 GB pen drive.
-
How to make my computer faster-1 This article explains about a free system tune-up utility with
many advanced options.
-
How to make my computer faster-2 This article explains about how to customise what type of content
you want to clear.
-
How to recover permanently deleted files This article explains about how to recover permanently deleted
files.
-
Hub And Bridges This article explains about the central part of a wheel where the
spokes come together.
-
Introduction to encryption with DES This article explains about a high security level related to a
small key used for encryption and decryption.
-
Introduction to Wi-Fi (802.11 or WiFi) This article describes about an international standard describing
the characteristics of a wireless local area network (WLAN).
-
IP address spoofing This article describes about "IP address spoofing" is a technique
that involves replacing the IP address of an IP packet's sender with
another machine's IP address.
-
IP Addressing This article explains about an IP address consists of four
so-called octets separated by dots.
-
ISP - Internet service providers This article explains about how does the ISP connect you to the
Internet.
-
Managing images in HTML This article explains about how do you display images on a web
page.
-
Messaging protocols (SMTP,POP3 and IMAP4) This article discusses about a protocol operating in online mode,
encapsulated in a TCP/IP frame. The mail is sent directly to the
recipient's mail server.
-
Metropolitan Area Network This article deals with Metropolitan Area Network(MAN)is a
computer networks usually spanning a campus or a city, which typically
connect a few local area networks using high speed backbone
technologies.
-
MIME (Multipurpose Internet Mail Extensions) This article explains about MIME describes the type of message
content and the encoding used.
-
More Networking Protocols COMPUTER NETWORKING This article briefs about a system where each computer listens to
the cable before sending anything through the network.
-
Motherboard This article briefs about the primary component of a computer is
the motherboard (sometimes called the "main board"). The motherboard is
the hub which is used to connect all of the computer's essential
components.
-
NAT- Network address translation, port forwarding and port trigg This article describes about the principle of NAT therefore
consists of using a gateway connection to the Internet, having at least
one network interface connected to the internal network and at least one
network interface connected to the Internet (possessing a routable IP
address), in order to connect all the machines to the network.
-
Network Address Translation (NAT) This article explains about the translation of an Internet
Protocol address (IP address) used within one network to a different IP
address known within another network.
-
Network cards This article explains about a network card (also called a Network
Adapter or Network Interface Card, orNIC for short) acts as the
interface between a computer and a network cable.
-
Network equipment - Bridges This article briefs on a bridge is a hardware device for linking
two networks that work with the same protocol.
-
Network Protocols COMPUTER NETWORKING This article explains about a network protocol defines rules and
conventions for communication between network devices.
-
Network Subnetting This article briefs about a technique that allows a network
administrator to divide one physical network into smaller logical
networks and, thus, control the flow of traffic for security or
efficiency reasons.
-
Network tests and diagnostics This article briefs about the IP configuration for each
interface; a computer with two network cards and one wireless adapter
has 3 interfaces each with its own configuration.
-
Networking - 3-Tier Client/Server Architecture This article explains about 3-tier architecture, there is an
intermediary level, meaning the architecture is generally split up.
-
Networking, basics understanding & functions. Part-1 This article explains about a network is a network of a bunch of
computers located geographically at same or different places.
-
OOP - Data encapsulation This article briefs on an encapsulation is a way of organizing
data and methods into a structure by concealing the the way the object
is implemented, i.e. preventing access to data by any means other than
those specified.
-
OOP - Inheritance This article describes about an Inheritance is specific to
object-oriented programming, where a new class is created from an
existing class.
-
OOP - Polymorphism This paper briefs on the essential concepts of object-oriented
programming.
-
Operating system This article explains about the operating system (sometimes
referred to by its abbreviation OS), is responsible for creating the
link between the material resources, the user and the applications (word
processor, video game, etc.).
-
Partition - Partitioning a hard drive This article explains about the partitioning of a hard drive
occurs after the drive has been physically formatted but before it is
logically formatted.
-
Peer-Peer Networking This article discusses about Peer-to-peer networks are quite
common in small offices that do not use a dedicated file server.
-
PPP and SLIP protocols This article explains about the notion of a point to point link.
-
Private-key (or secret-key) cryptography This article discusses about Symmetric encryption (also called
private-key encryption or secret-key encryption) involves using the same
key for encryption and decryption.
-
Processor This article explains about the processor (CPU, for Central
Processing Unit) is the computer's brain. It allows the processing of
numeric data, meaning information entered in binary form, and the
execution of instructions stored in memory.
-
Proxy and reverse proxy servers This article explains about a proxy server which is a machine
which acts as an intermediary between the computers of a local area
network (sometimes using protocols other than TCP/IP) and the
Internet
Most of the time the proxy server is used for the web, and when it is,
it's an HTTPproxy.
-
Random access memory (RAM or PC memory) This article explains about the different types of Types of
random access memory and its function.
-
Read-only memory (ROM) This article briefs about a type of memory that stores data
without electrical current; it is thermo (Read Only Memory) or is
sometimes called non-volatile memory as it is not erased when the system
is switched off.
-
Representation of real numbers and integers This article explains about Representing numbers in a computer is
necessary in order for it to be able to store and manipulate them.
-
RTP/RTCP protocols This article explains about the Real-time Transport Protocol and
Real-time Transport Control Protocol.
-
Star Topology This article describes about Star Topology the central
node/device acts as master node.
-
Switch This article describes about a switch is a device that channels
incoming data from any of multiple input ports to the specific output
port that will take the data toward its intended destination.
-
TCP/IP This article explains about TCP/IP communication is primarily
point-to-point, meaning each communication is from one point (or host
computer) in the network to another point or host computer.
-
The ARP protocol This article discusses about the ARP protocol plays a key role
among Internet layer protocols relating to TCP/IP, since it enables the
physical address of a network interface card corresponding to an IP
address to be known.
-
The concept of networks This article explains about the generic term "network" refers to
a group of entities (objects, people, etc.) which are connected to one
another.
-
The OSI Model Computer Networking This article briefs about Compatible interconnection of network
devices is fundamental to reliable network communications.
-
Types of networks This article explains about Different types of (private) networks
are distinguished based on their size (in terms of the number of
machines), their data transfer speed, and their reach.
-
URL manipulation attacks This article explains about a web application is the vector that
makes it possible to indicate the requested resource.
-
Using Telnet This article explains about telnet which is a protocol for
emulating a remote terminal, which means that it can be used to run
commands entered on a keyboard at a remote machine.
-
Virtual Private Network (VPN) This article explains about a technology that lets people access
their office’s computer network over the Internet while at home or
travelling.
-
Wide Area Network This article describes about a wide area network (WAN) is a
geographically dispersed telecommunications network.
-
WiFi modes of operation (802.11 or Wi-Fi) This article discusses about a Wireless adapters or network
interface controllers (NICs for short) are network cards with the 802.11
standard which let a machine connect to a wireless network.
-
Windows registry, some basic understanding This article describes about how to configure many hidden
settings for windows and other applications installed, which are not
accessible by the interface of the particular software itself.
-
Wireless Internet Video Camera This article explains about Wireless Internet video cameras work
by serving up data streams to any computer that connects to them.
-
Wireless Print Server This article describes about Wireless print servers for home
networks generally are available in both 802.11b and 802.11g varieties.
-
Wireless Range Extender This article explains about a wireless range extender increases
the distance over which a WLAN signal can spread, overcoming obstacles
and enhancing overall network signal quality.
-
Wireless Router This article explains about the centrepiece product of many home
computer networks is a wireless router.
-
5G wireless will be broadband plus lowband communication This article describes the regions of mobile usage.
-
A Comparison of DNS Server Types This article discusses about some of the different types of DNS
server setups and what the advantages, use cases, and properties are of
each.
-
Advantages of MPLS : an example This article explains about the advantages of multi protocol
switch labelling.
-
Application Virtualization This article explains application virtualization briefly with its
features application delivery etc.
-
Cloud Computing Basics This article describes about the cloud computing basics and its
types.
-
Coaxial Cable Basics This article discusses about the basics of coaxial cable.
-
Common Server Setups For Your Web Application - Part I This article describes about the commonly used server types with
a short description of each, including pros and cons.
-
Common Server Setups For Your Web Application - Part II This article describes about the commonly used server types with
a short description of each, including pros and cons.
-
Configuring your Droplet to Only Use IPv6 Networking This article discusses how to turn off IPv4 networking if you
wish to only have IPv6 enabled. Most people will not need to do this,
but there are situations where it may make sense. You will still need to
have IPv4 available for the localhost so that your programs operate as
expected.
-
Creating a new Hyper-V Virtual Machine This article discusses the creation of a new virtual machine on
Hyper-V where the host environment has the resources and settings.
-
Deploying Vyatta VPN server on dynamic IP This article explains about deploying Vyatta VPN server on
dynamic IP.
-
Ethernet versus Fiber Channel This article describes the introduction of Ethernet vs Fiber
Channel.
-
How to Make or Repair Cat 5/Ethernet Cables This article describes about how to make or repair the cat5
ethernet cables.
-
IEEE 802.11ah This article describes about the first impression on the ieee
802.11ah standard amendment.
-
Implementing SSL Termination With HAProxy on Ubuntu 14.04 This article describes how to use HAProxy for SSL termination,
for traffic encryption, and for load balancing your web servers.
-
Introduction to Computer Networks This article describes about the basics of computer network.
-
Introduction to Networking This article discusses about what is networking and types of
networks with its architechture.
-
MPLS, part I: basic labeling This article describes about the multiprotocol label switching.
-
MPLS, part II This article discusses about the VRF awares MPLS-VPN.
-
Networking Cables and Connectors This article explains about the networking cables and connectors.
-
OSI MODEL This article describes about seven layers of OSI model in detail.
-
Pen Computing This article explains the functions of digital pen in detail with
its uses.
-
Private VLANs: where to deploy them. This article briefs how to configure them, work around them and
deploy them in a larger network.
-
Problems in a wireless LAN This article explains about hidden terminal, exposed terminal
problem and inability to detect collision.
-
Redundant switch design without spanning tree This article describes about the redundant switch design without
spanning tree.
-
Rigging Cables This article discusses importance the rigging cables.
-
Router : How it Works This article describes how a router works.
-
Security functions: Routers, Switches and Load Balancers This article describes about the security functions of routers,
switches and load balancers.
-
Security Functions of Firewalls This article describes about the security functions of firewall
and different types of firewall.
-
Setting up a virtual switch for a Hyper-V network This article explains how to set up a virtual switch to be used
as the network over which several virtual machines can
communicate.
-
Setting up file sharing between guest and host OS in Hyper-V using an
Internal network This article describes about making the network configuration
settings made on a Hyper-V virtual machine in order to allow file
sharing between the virtual machine and host OS.
-
Site-to-site VPNs part I: theory. This article discusses about the configuration details of
site-to-site (S2S) VPN connections on some required parameters
-
Site-to-site VPNs part II: Cisco IOS This article discusses about the configuration details of
site-to-site (S2S) VPN connections on Cisco IOS.
-
Site-to-site VPNs part III: Cisco ASA This article describes about the configuration details of
site-to-site (S2S) VPN connections on Cisco ASA.
-
Site-to-site VPNs Part IV: Vyatta This article describes about the configuration details of
site-to-site (S2S) VPN connections on Vyatta.
-
Storage Differences This article describes about the Fibre channel storage and iCSI
storage briefly.
-
Tablet PC - How Stuff Works This article explains how a tablet pc works.
-
TCP/IP Model This article describes about the layers of TCP/IP Models.
-
Testing an Aruba IAP This article describes about testing an Aruba IAP.
-
Testing two Aruba IAP This article describes about testing two Aruba IAP.
-
The Four Deployment Models of Cloud Computing This article explains the definition of four deployment models of
cloud computing.
-
The Risk of Lock-in with Cloud Computing This article describes about the risk of lock-in in cloud
computing.
-
The Three Service Models of Cloud Computing This article discusses about the three service models of cloud
computing.
-
Types of DoS attack This article discusses about the types of denial of service
attack.
-
Types of VPN This article describes about the different types of VPN
explained.
-
Using NSD, an Authoritative-Only DNS Server, on Ubuntu 14.04 This article explains how to install and configure NSD to
securely administer our DNS zones on Ubuntu 14.04 servers.
-
Virtual switching – A short introduction This article explains about the role of virtual swirching in data
center.
-
WI-FI : How Stuff It Works This article discusses about the Wi-fi and about its components.
-
Wireless best practices This article explains about the wireless best practices.
-
Wireless Network Topologies This article describes about the different types of WLANs, all
with its own speed, frequency and transmission range.
-
Wireless signal modulation This article discusses about the working of wireless.
-
A Model for Network Security This article explains the A Model for Network Security.
-
Application and Signature - Based IDS This article discusses the advantages and disadvantages of
Application and Signature - Based IDS.
-
Asynchronous Transfer Mode (ATM) This article describes ATM network interfaces, ATM virtual
connections, ATM reference model, advantages and disadvantages of ATM.
-
Attacks on Cryptosystems This article explains the middle-man attack, dictionary attack,
timing attack and defending from attack.
-
Authentication Header This article explains the Authentication Header in detail.
-
Basic Combinations of Security Associations This article discusses the basic combinations of security
associations and key management.
-
Change Cipher Spec, Alert and Handshake Protocol This article describes the Change Cipher Spec, Alert and
Handshake Protocol in detail.
-
Combining Security Associations This article explains the combining security associations.
-
Comparison of OSI &TCP/IP Model and IP Address This article explains the differences of OSI and TCP/IP Model and
definition of IP Address.
-
Computer Network This article describes about the definition, uses, advantages and
types of Computer network.
-
Congestion Control This article explains the open loop and close loop congestion
control.
-
Content Filters This article describes about the content filters in detail.
-
Content Outline This article explains the sections and major process steps in
content outline.
-
Contingency Planning This article discusses the strategy, CP, components of CP, and CP
team.
-
Damage Assessment and Disaster Recovery Planning This article describes the Damage Assessment and Disaster
Recovery Planning, DRP steps and crisis management.
-
Deploying Host-Based IDSs and Measuring the Effectiveness of IDSs This article describes the deploying host-based IDSs and
measuring the effectiveness of IDSs.
-
Design Issues for the Network Layer and Circuit Switching This article explains Design Issues for the Network Layer and
Circuit Switching.
-
Design of Security Architecture This article explains the Defense in Depth and Security
Perimeter.
-
Distance Vector Routing Algorithm This article discusses the distance vector routing alogrithm with
its structure ,initial and next update.
-
Domain Name System (DNS) This article describes about the domain name space and domain
name, fully qualified domain name, partially qualified domain name and
DNS in internet.
-
Dual Signature This article describes the construction of dual signature.
-
Elements of Network and Multiplexing This article discusses about the elements of network,
multiplexing and ways of communication.
-
Encapsulating Security Payload This article discusses the Encryption and Authentication
Algorithms and padding.
-
Error Control and Detection This article discusses the Error Control and Detection briefly.
-
Error Correction This article describes the three types of ARQ.
-
Fiber-Optics This article describes the principle of fiber optics, propagation
modes, advantages and disadvantages of fiber-optics.
-
Firewall architectures This article discusses the packet filtering routers, screened
host firewalls, dual-homed firewalls,a nd screened subnet
firewalls.
-
Firewall Categorization Methods This article explains the Application Gateways, Circuit Gateways,
MAC layer Firewalls and Hybrid Firewalls.
-
Firewall Rules This article explains the firewall rules set in detail.
-
Firewalls in Network Security This article explains firewall categorization methods of Packet
Filtering in detail.
-
Flow Control This article explains the flow control, Stop and wait Flow
Control and Sliding Window Flow Control.
-
Frame Relay This article explains about frame relay operation and frame relay
layer.
-
Framing This article describes the types of framing, LLC frame Format and
MAC frame format.
-
FTP and Proxy server This article discusses the mechanisms and functions of FTP and
types of proxy.
-
High -Level Data Link Control(HDLC) This article explains HDLC Frame format, I frames, S frames and U
frames.
-
Honey Pots, Honey Nets, and Padded Cell system This article explains the Honey Pots, Honey Nets, and Padded Cell
system in detail.
-
Host-Based IDS This article describes the HDS, advantages and disadvantages of
HIDS.
-
HTTP and DHCP This article discusses the hypertext markup protocol and dynamic
host configuration protocol.
-
IDS Control Strategies This article discusses the Centralized Control Strategy, Fully
Distributed Control Strategyand partially Distributed Control Strategy.
-
IDS Deployment Overview This article explains the deploying netwotk based IDS in detail
with advantages on different location.
-
IDS Response Behavior This article explains the response behaviour on IDS.
-
Incident Response Planning This article explains the incident response, Planning ,
Detection, Reaction and Recovery.
-
Integrated Service Digital Network (ISDN) This article discusses about BRI, PRI and ISDN reference points.
-
Internet Standards and the Internet Society This article discusses the The Internet Organizations and RFC
Publication.
-
Internet, Intranet and Extranet This article describes about the Internet, Intranet and Extranet.
-
Introduction to Network Security This article explains the introduction to network security, OSI
security Architecture and OSI Security attacks.
-
Introduction to Virtual Circuit and X.25 This article discusses on virtual circuit and it types and X.25
briefly.
-
Intrusion Detection Systems (IDSs) This article explains the IDS terminology in detail.
-
IP Address Class This article discusses about the classes in IP address, Private
and public IP address .
-
IP Security Architecture This article describes the IPSec Documents Overview with diagram.
-
IP Security Overview This article explains the IP Security Overview, Application of
IPSec and Benefits of IPSec.
-
IP Security Services This article discusses the IPSec services, SA Parameters and SA
Selectors.
-
IPV6 Addressing This article describes about IPV6 Addressing, ipv4vs ipv6.
-
IPV6 and its comparison with IPV4 This article explains the features of IPV6 and its comparison
with IPV4.
-
Key Technology Components This article describes the firewalls, DMZ, proxy sevrer and IDS
in detail.
-
Link State Routing Algorithm This article explains the link state routing algorithm, its
advantages, comparison between link state and distance vector.
-
Modes of communication and Protocol This article discusses about the modes of communication and
protocol briefly.
-
Multiple Access, Services and Data Link Devices This article explains about the multiple access, services and
data link devices like switch, hub and bridge.
-
Network Architecture This article explains the peer to peer and client-server model.
-
Network Based IDS This article explains the NIDS, NIDS Signature Matching,
advantages and disadvantages of NIDS.
-
OSI Reference Model- Introduction This article describes network software, protocol hierarchies,
layer communication, peer - peer communication and data encapsulation.
-
Payment Processing This article explains the SET Transaction Types and Purchase
Request.
-
Physical Topology and Logical Topology This article discusses the Physical Topology and Logical Topology
like bus, mesh, star, ring topology etc.
-
Planning for Security This article explains the Introduction to security planning,
Information Security Policy, Standards and Practices.
-
Point to Point Protocol (PPP) This article explains the ppp framing in detail.
-
Policies in Network Security This article explains the Responsible Individual, Schedule of
Reviews, Review Procedures and Practices, Policy and Revision Date and
Information Security Blueprints in detail.
-
Post Office Protocol version 3 (POP3) This article describes POP3 and difference between Pop3 and imap
-
Principle of Communication This article explains the principle of communication in detail.
-
Protecting Remote Connections This article explains the dialup, radius, securing authentication
with kerberos and Sesame in detail.
-
Router - Introduction This article describes the routing and routing protocols.
-
Secure Electronic Transaction This article explains the secure electronic transaction overview,
requirements and Key features.
-
Secure Socket Layer Security This article describes about the Secure socket layer architecture
in detail.
-
Security Attacks This article describes the two types of security attacks :
Passive and Active attack.
-
Security Services This article discusses the five categories of security services.
-
SET Participants
This article discusses the SET participants with neat diagram.
-
Seven Layers of OSI Reference Model This article discusses the seven layers of osi reference model.
-
SMTP and IMAP This article explains the simple mail transfer protocol and
internet mail access protocol
-
SNMP and Network Management Architectures This article explains the SNMP and network management
architectures in detail.
-
Socks Server This article explains the selecting the right firewall and
configuring and managing firewalls.
-
Spanning Tree Protocol(STP) This article describes the need for reduntant topology, Issues
with Redundancy
-
SSL Record Protocol This article discusses the secure socket layer record protocol in
detail.
-
Subnet Mask This article describes subnet mask, CIDR and subnetting with
class.
-
TCP/IP Reference Model This article discusses the TCP/IP Model with UDP, Internet Layer
and Network Access Layer.
-
The Planning Process This article explains the Off-Site Disaster Data Storage,
The Planning Document, Using the plan and Law Enforcement
Involvement.
-
Three Levels of Control in Network Security This article discusses the Managerial Controls, Operational
Controls and Technical Controls.
-
Transmission Medium This article explains the guided media like co-axial cable and
Twisted pair.
-
Transport and Tunnel Modes This article describes the transport mode and tunnel mode.
-
Trap and Trace Systems This article discusses the Trap and Trace Systems and
active intrusion prevention.
-
Types of Network This article explains the types of network like LAN, MAN, WAN and
LAN vs WAN.
-
Types of Policies - II This article describes the Authorized Access and Usage of
Equipment, Prohibited Usage of Equipment, Systems Management and
Violations of Policy etc.
-
Types of Policy This article discusses the General or security program policies,
Issue-specific security policies and Systems-specific security
policies.
-
Virtual Private Network (VPN) and IPsec This article explains the VPN and Ipsec in detail.
-
Virtual Private Network(VPNs) This article explains the VPN, transport and tunnel mode.
-
Web Security This article explains the Web Security and its
considerations.
-
Why Use an IDS? This article describes several compelling reasons to
acquire and use an IDS according to NIST's documentation on industry
best practices.
-
Wireless LAN This article discusses the WLAN, its standards and wireless
topologies.
-
Wireless Networking This article explains the wireless networking like microwave,
radiowave, infrared and satellite microwave.
-
Advanced encryption standard (AES) This article explains the secret-key encryption protocol and
public-key encryption protocol.
-
Application layer and DNS This article describes the Web communication between two end
systems and client server model.
-
ARP, RARP, IP fragmentation and reassembly This article describes the address resolution protocol, Reverse
Address Resolution Protocol and IP fragmentation and Reassembly.
-
Authentication This article describes the authentication with combined with
encryption and use of the hash function.
-
Buffer management: random early detection (RED) This article describes the buffer management, Traffic Management
at the Flow Level, Open-Loop Control and Admission Control.
-
Clustering protocols This article discusses the Classification of Clustering Protocols
and LEACH Clustering Protocol.
-
Definitions of terms for earth-orbiting satellites This article explains the definitions of terms for earth-orbiting
satellites.
-
Destination-sequenced distance vector (DSDV) protocol This article describes the Destination-Sequenced Distance Vector
(DSDV) protocol in detail with Routing Tables.
-
DHCP - An introduction This article discusses the introduction of dynamic host
configuration protocol.
-
Differentiated services QOS This article discusses the differential services in detail with
Per-Hop Behavior.
-
Direct broadcast satellite (DBS) This article explains the direct broadcast satellite, orbital
sapacing, power rating, The Home Receiver Indoor Unit (IDU), Frequencies
and Polarization.
-
Domain name system (DNS) - An introduction This article explains the Domain Name Space, Domain-Name Servers,
Name/Address Mapping and DNS Message Format.
-
Dual leaky bucket This article describes the Dual Leaky Bucket, Traffic Shaping,
Leaky Bucket Traffic Shaper and Token Bucket Traffic Shaper.
-
Earth segment - I This article discusses the introduction of earth segements,
receive only home tv systems, the outdoor unit and the indoor
unit.
-
Earth segment - II This article explains the master antenna tv system, community
antenna tv system and transmit receive earth stations.
-
E-mail, SMTP and FTP This article explains the electronic mail, simple mail transfer
protocol and file transfer protocol.
-
Fair queueing This article discusses on Fair queueing.
-
Flow control and traffic management This article discusses the Closed-Loop Flow Control, End-to-end
closed loop control, Hop-by-hop control, End-to-End vs. Hop-by-Hop
Congestion Control and Traffic Management at the flow aggregated level
/Traffic Engineering.
-
ICMP - An introduction This article discusses the Internet control message protocol,
ICMP messages, ICMP Basic Error Message Format and ICMP functions.
-
Inclined orbits, calendars and universal time This article discusses the inclined orbits, calendars and
universal time.
-
Interference and satellite access This article describes the single access, preassigned FDMA and
Spade system.
-
Interference and satellite access - TDMA This article discusses the time division multiple access with
interference and satellite access.
-
Internet group management protocol and reverse-path multicasting This article explains the IGMP and reverse-path multicasting.
-
Internet protocol and IP addressing This article discusses the internet protocol, Classful
IPAddresses, IP Addressing and Subnet Addressing.
-
Internet protocol V6 (IPV6) This article discusses the IPv6 with its header format.
-
Internet routing protocols This article describes the three categories of autonomous system.
-
IP routing and CIDR This article explains the IP Routing and Classless Inter domain
routing.
-
JPEG and MPEG files This article discusses the GIF Files, Moving Images and MPEG
Compression.
-
Leaky bucket algorithm This article explains the policing and Leaky Bucket Algorithm in
detail.
-
MP3 and Streaming audio This article describes the mp3 and streaming audio, Limits of
Compression with Loss and Basics of Information Theory.
-
Multimedia networking This article explains the Overview of Data Compression and
Digital Voice and Compression.
-
Multiprotocol label switching (MPLS) - I This article explains the MPLS Operation and MPSL Packet Format.
-
Multiprotocol label switching (MPLS) - II This article describes the Routing in MPLS Domains and Tunneling
and Use of FEC.
-
NAT and Mobile IP This article explains the network address translation and Mobile
IP.
-
Network management This article describes about the network management in detail.
-
Network management - II This article explains the Elements of Network Management,
Structure of Management Information and Management Information Base.
-
Network security - An introduction This article discusses the Overview of Network Security, Elements
of Network Security and Threats to Network Security.
-
Orbits This article discusses the introduction to orbits and kepler
first,second & third law.
-
Overlay networks This article discusses about the for connections between two LANs
associated with routers R1 and R4.
-
Overview of IP telephony This article explains the overview of IP Telephony with the
diagram of Voice over IP system.
-
Overview of QOS This article explains the overview of QoS and Integrated QoS.
-
Overview of security methods This article explains the overview of security methods with
Cryptographic Techniques and Authentication Techniques.
-
Overview of wireless AD-HOC networks This article explains the overview of wireless adhoc networks.
-
Packet network topology This article explains the LAN, CAN, and ISP with packet network
topology in detail.
-
Packet type and format This article explains the packet type and format in RCTP.
-
Packet-mistreatment and denial of service attacks This article discusses the packet-mistreatment and denial of
service attacks.
-
Packet-switching networks This article explains the packet-switching networks in detail.
-
Propagation impairments and space link This article describes the introduction, Atmospheric Losses,
Ionospheric Effects and Rain Attenuation.
-
Propagation Transmission Losses and System Noise This article describes the propagation transmission losses and
system noise.
-
Protocol stack in sensor network This article discusses the protocol stack in sensor network
architecture in detail.
-
Real time transport protocol (RTP) This article explains the Real-time transport protocol and
Real-Time Session and Data Transfer.
-
Remote login protocols This article explains the TELNET Protocol, Logging to Remote
Servers and Secure Shell (SSH) Protocol.
-
Reverse-path broadcasting This article explains the operation of reverse path broadcasting.
-
Routing in AD-HOC networks This article discusses the Classification of Routing Protocols,
Table-Driven Routing Protocols, Source-Initiated Routing Protocols and
Routing Protocols for Ad-Hoc Networks .
-
Routing in packet networks This article describes the routing in packets with example and
Routing Algorithm Classification.
-
Routing table poisoning attacks and DNS hacking attacks This article explains the two attacks namely routing table
posioning and DNS hacking attacks in detail.
-
RSA algorithm – An introduction This article discusses the introduction of RSA algorithm in
detail.
-
RTP packet header This article describes about the RTP packet header and Real-Time
Control Protocol (RTCP).
-
Satellite communications This article describes the introduction and frquency allocation
of satellite communication.
-
Satellite mobile and specialized services This article describes the satellite mobile architecture in
detail.
-
Secret key encryption protocols This article describes the Data Encryption Standard (DES)
in Secret-Key Encryption Protocol.
-
Secure hash algorithm (SHA) This article discusses the secure hash algorithm, Authentication
and Digital Signature.
-
Sensor networks and protocol structures This article describes the Clustering in Sensor Networks.
-
Sensor node structure This article explains a typical wireless sensor node structure
briefly.
-
Shortest path algorithms - An introduction This article discusses the introduction to shortest path
algorithm.
-
Simple network management protocol (SNMP) This article explains the SNMP PDU format.
-
Space segment This article explains the introduction, attitude control, thermal
control and station keeping.
-
Stream control transmission protocol (SCTP) This article describes the SCTP Packet Structure and features of
Stream Control Transmission Protocol.
-
TCP connection establishment and termination This article describes the connection establishment and
termination.
-
TCP segment This article explains the tranmission control protocol segment
briefly.
-
TCP state transition diagram and mobile IP This article discusses about the TCP state transition diagram and
Mobile IP.
-
TCP/IP architecture - An introduction This article explains the TCP/IP Architecture with Internet
Addresses, Internet Names and Physical Addresses.
-
TCP/IP-1 This article describes the TCP/IP Architecture in detail.
-
TCP/IP-2 This article describes the TCP Reliable Stream Service and
TCP Operation.
-
The bellman-ford algorithm: an introduction This article explains the introduction to Bellman-ford algorithm.
-
The internet protocol This article explains the internet protocol with IP Packets in
detail.
-
Traffic management This article discusses the Traffic Management at Packet Level and
different strategies for Queue scheduling.
-
Traffic management at flow aggregate level This article discusses the traffic management at flow aggregate
level.
-
Traffic management at flow level This article describes the traffic management at flow level.
-
Traffic management at the packet level This article explains the traffic management at the packet level.
-
Traffic shaping This article describes the traffic shaping in detail.
-
TTC subsystem, transponders and antenna subsystem This article describes the TTC subsystem, transponders and
antenna subsystem.
-
Uplink and downlink of satellite This article explains the uplink and downlink of satellite.
-
User datagram protocol - An introduction This article describes the introduction on UDP.
-
Virtual private networks - I This article explains the remote-Access VPN and Site-to-Site VPN
in detail.
-
Virtual private networks - II This article describes the Tunneling and Point-to-Point Protocol
(PPP).
-
VoIP quality of service and VoIP signaling protocols This article discusses the VoIP quality of service, VoIP
signaling protocols and Session Initiation Protocol.
-
World wide web (WWW) and HTTP This article discusses the world wide web and hyper text transfer
protocol.
-
WRP and CGSR protocol This article explains the Cluster-Head Gateway Switch Routing
Protocol, Clustering and Routing Algorithms and Wireless Routing
Protocol (WRP).
-
The internet of things This article discusses the System design, economy and future.
-
Internet addiction This article describes the internet design addiction.
-
A short learning CSS3 animations This article explains about the CSS animations and its
properties.
-
Advancements in software development technology 2015 This article discusses the development in software technology.
-
All about near field communication This article discusses the in mobile phone technology.
-
An overview of MPLS services This article discusses the Multi-Protocol Label Switching
services.
-
Assurance conversion with EDB to PST software from crashed EDB
files This article describes the EDB file is the default extension
file.
-
Benefits of hiring virtual receptionist This article describes the benefits of hiring virtual skilled and
experienced.
-
Best range walkie talkies and advantage This article describes the portable transmitter receiver device
and advantages.
-
Black hole information This article describes the black hole information.
-
Broadband and network installation This article explains the single dial up Internet connection
using broadband and network.
-
Choosing an antivirus solution for your organization This article discusses how to choose an antivrus for the
organisation.
-
Choosing and using secure passwords This article explains about the threats, email, trojans, port
scanning and spyware.
-
Client server networks This article describes the switch to a client-server network.
-
Components of a wireless LAN This article explains about the components of the essential
wireless LAN.
-
Cyber crime: The achilles heel of the business world This article explains the cyber attacks in detail.
-
Disadvantages of having a server This article explains about the disadvantages of the server in
detail.
-
Disk technologies This article describes the primary functions of the all network
access.
-
Documenting your network This article explains the internet service provider, router, hub
etc.
-
Economies of scale with cloud computing & services practice This article discusses the centralized data storage and other
resources.
-
Effective communication with a walkie talkie This article explains the difference between mobile phones and
walkie talkie.
-
Ensuring healthy & secured wi-fi network in hospitals This article describes the wireless connectivity in secure.
-
Firewall - definition This article explains the firewall definition and its types.
-
Firewalls This article disscusses the firewall filters in all the packets
of data.
-
Firewalls and antivirus - essential security This article explains the software firewall, hardware firewall
and antivirus etc.
-
Getting a network This article explains the peer to peer network and server based
network.
-
Going mobile in the wireless revolution This article disscusses the alternatives of the wireless
revolution in detail.
-
High speed satellite broadband for personal use This article explains the high speed satellite bradband in
detail.
-
How managed it services and cloud computing can improve your
business This article explains the cloud computing in focused on growth
and prosperity.
-
How to connect with available network & telecommunication This article describes the wireless network and wired network.
-
Infection control This article explains the infection control.
-
Internet security This article explains how secure is the internet.
-
ISO 27001 – an introduction This article describes how do we achieve the ISO 27001 standard.
-
Keeping your data secure This article discusses how to keep your data secure.
-
Locating network problems This article explains the other causes of network problems.
-
MAC OS X Server in mixed environments This article explains the featured server operating system.
-
Machine to machine and internet of things This article explains the wired system to interact other devices.
-
Network troubleshooting - introduction This article explains the identifying in the network problem of
troubleshooting.
-
Network troubleshooting – servers This article disscusses the operating system and hardware to the
network.
-
Network troubleshooting - workstations This article explains the networks use the TCP/IP protocol to
transport data .
-
Network with a server This article disscusses the network with a server.
-
Networks This article explains the types of networking in detail.
-
Open source alternatives to windows on servers This article describes the server with Free and Open Source
Software.
-
Peer to peer networks This article disscusses the client-server network in peer to
peer.
-
Peer-to-peer network with a pc set to share files This article describes the standalone PCs to a network.
-
Planning a network installation This article describes the requirements of the network
installation.
-
Principle behind wireless communication This article discusses the radio communication device of
wireless.
-
Quantified self: a craze for measurement This article discusses a craze for measurement.
-
Reduce management and financial load of business with softswitch This article discusses the voice over internet protocol
technology.
-
Remote data backup and disaster recovery services This article explains the remote data backup and disaster
recovery services.
-
Removing spyware, viruses and other malware from windows This article explains removing spyware, viruses and other
malwares.
-
Risk and responsibility in a hyper connected world: implications for
enterprises This article describes the risk and responsibilty in a hyper
connected world, implications for enterprises.
-
Risk area of networking This article disscusses the risk area of networking in detail.
-
Satellite broadband communication – ultimate in wireless network This article explains the Wireless internet connection by using
satellite broadband communication.
-
Securing your network – major threats and how to avoid them This article explains the risk assessment, risk area and risk
environment.
-
2.4 GHZ Inverted F Antenna Eagle Library This article explains the 2.4 ghz inverted F antenna eagle
library.
-
3 Benefits of Using Managed Switches This article explains the advantages of using managed switches.
-
3 Keys to Choosing a Surge Protector This article discusses the three keys to choosing a surge
protector.
-
3 Ways to Use Wireless Ethernet Extenders This article explains three ways to use wireless ethernet
extenders.
-
4 Easy Ways to a Greener Network This article discusses the four easy ways to a greener network.
-
4 Tips to Keep Your Wireless Network Secure This article describes the major points of the wireless network
secure in the wireless signal.
-
5 Methods to Maximize Server Efficiency This article explains the technological systems and its
devices.
-
5 Things to Consider When Choosing a Video Display This article discusses the five things to consider when choosing
video display.
-
5 Ways to Get More Mileage from Your Existing Infrastructure This article explains the five ways to get more mileage from the
existing infrastructure.
-
6 Things to Consider Before Investing in VoIP This article explains the six things to consider before investing
in VOIP.
-
8 Advantages to Choosing Fiber over Copper Cable This article describes the eight advantages to choose fiber over
copper cable.
-
8 Ways to Reduce Power Consumption This article discusses the reduce power consumption and leave you
feeling cool and green.
-
A Brief Note on Modern Communication and Wireless Headsets This article explains the wireless headset and modern
comunication in briefly.
-
A Description on VoIP and VoIP Hardware This article explains the Voice over Internet Protocol in detail.
-
A Few Good Apps This article explains the applications of
operations/infrastructure teams.
-
Access the Internet with Handheld Devices This article explains how to access the internet using handheld
devices.
-
Achieve Network Security This article describes the achieve network security.
-
Advantages of Ping Post Technology This article discusses the management software of power to
convince potential leads technology.
-
An Introduction to VPN This article describes an introduction to virtual private
network.
-
Beat the Heat: Efficient Cooling in the Data Center This article discusses the demand for power is a challenge, so
choosing the best system for your data center.
-
Beware of the Microchip: TEMPEST Standards and Common Criteria This article describes the TEMPEST pertains to technical security
and vulnerable of data communications.
-
Black Box Explains: The ANSI/ISA Standard for Hazardous Locations This article describes the electrical equipment of the classes
and its divisions.
-
Black Box Provides Wireless VGA Video This article explains the interrupt an important presentation to
using swap cables.
-
Bluetooth Advantages for Wireless Communication This article describes the advantages of the bluetooth
communications.
-
Building a Hybrid Cloud This article discusses the importance of the hybrid cloud.
-
Building a Private Cloud This article explains the flexibility of cloud infrastructures.
-
Buying Tips: Plasma v. LCD Screens This article discusses the buying tips of plasma vs LCD screens.
-
Cable 911 This article describes the network organization and performance
in right way to choose cable options.
-
Certify Fiber Optic Cable like a Champ This article discusses the fiber optic cable into the to
electrical interference.
-
Choosing the Right Private Cloud Storage This article explains the several factors of the protocols.
-
Client-Server Networks This article explains the client-server networks.
-
Considerations for Fiber-Based KVM Extension This article describes the KVM signals between buildings in
consider by different power source.
-
Consolidated I/O This article explains the I/O infrastructure and Fibre Channel
over Ethernet (FCoE).
-
Create a Smart Wireless Network for Your Library This article discusses the smart wireless network for your
library
-
Creating Your Own Network Cabling This article explains striping of cable.
-
Desktop Virtualization – More Seats, Fewer Computers This article describes the desktop virtualization is a
computer-sharing technology.
-
Digging into the Software Defined Data Center This article explains data center and concept of its process.
-
Digitize and Optimize Multiple Analog Video Formats for Display on an
HDMI Screen This article explains the bunch of devices to convert, scale, and
switch inputs in using routing.
-
DIY Cheap Internal Wi-Fi AntennaThis article disucsses about the wifi antenna.
-
DVI V. HDMI Digital Video Extenders This article describes the standard digital interface for PCs.
-
Early Origins of Electricity Transmission This article discusses the uses of electricity transmission and
magnetism.
-
Easy, Wireless Access to a Projector Presentation This article explains the new Wireless Video Presentation System
II (AC1131A) from Black Box.
-
Enterprise Wireless: Two models; which one is right for you? This article explains the next generation of wireless technology
and its wireless access.
-
FCOE Multi-Hop; Do You Care? This article explains the capabilities of Fibre Channel over
Ethernet (FCoE).
-
Features of Using USB Temperature Sensor This article describes the temperature monitoring devices and its
features.
-
Five Port Fast Ethernet Managed Switch This article explains the five port fast ethernet managed switch.
-
Five Wireless Security Bandits This article describes the wireless networks is in their ability
to create unexpected connections that can result in security gaps.
-
Focus on the ball: the application This article discusses the application of Software Defined
Networking (SDN)
-
Get a Hold of Real Tough, Heavy-Duty Switches This article explains the Ethernet switches in your wiring closet
and Heavy-Duty Edge Switches.
-
Have We Taken Data Redundancy Too Far? This article discusses the common RAID types of the redundancy.
-
HDBaseT Technology This article discusses the HdbaseT technology in detail.
-
How cloud computing is driving the demand for
WAN optimization This article explains the cloud computing resources shared the
Internet or private WAN.
-
How to clean fiber end-faces This article explains how to clean fiber end- faces.
-
How to Implement Multicasting This article discusses the multicasting delivers identical data
to multiple receivers.
-
How to pick an IT rack This article describes how to choose a IT rack.
-
How to plan for your digital signage application This article explains the digital signage applications and its
power levels for every location.
-
How to terminate your own patch cable This article explains how to terminate your own patch cable.
-
Internal error which occur during OST2PST conversion This article explains the features of the file extension and its
disadvantages.
-
IOS8 and its features This article describes the features of the IOS8 and its uses.
-
IPTables Stateful Firewall and NAT Routing This article discusses the IP tables stateful firewall and NAT
routing in detail.
-
Is Private Cloud A Unicorn? This article describes the Cloud Proponents, Characteristics and
its Models.
-
It’s our time down here– “UNDERLAYS” This article describes the underlays in the network
virtualization.
-
LNA for RTL based SDR receivers This article discusses the LNA for RTL based SDR receivers.
-
Main Energy Consuming Sectors This article discusses the main consumer of energy sectors.
-
Making the Case for IP PBX Systems This article explain the Voice communications have been migrating
from time-based to packet-based switching.
-
Most Common Web Design Mistakes This article describes the common mistakes of the web design.
-
MS Backup Recovery: - Is the Better and Reliable Tool for NT-Backup
Files This article discusses the Ms backup recovery factors and its
users.
-
Multicasting Video over a LAN This article describes the network operates efficiently and
transparently to users.
-
Need of UPS This article discusses Why we need a UPS in detail.
-
Network Abstraction and Virtualization: Where to Start? This article explains server virtualization network
designs.
-
Network Management Needs New Ideas This article describes the network management systems and
cloud architectures.
-
Network Overlays: An Introduction This article discusses the virtualization features and network
infrastructure.
-
Network Security: What is it and how it can be helpful? This article explains the computer networking in the network
infrastructure.
-
Network Statistics with IPtables and RRDtool This article discusses the network statistics with iptables and
rrdtool.
-
Now here is something every IT professional needs This article explains the USB flash drive containing Data Rescue
Engine.
-
Now Named an Avaya Channel Partner This article discusses the highly skilled technicians are
authorized to design in communications systems.
-
One Unsecured Data Port—that’s All It Takes This article discusses the NAC protects your network by
preventing unauthorized devices.
-
Patching Made Easy and Less Expensive This article describes the strain relief, and maintain bend
radius with connectors.
-
Power over Ethernet Flashlight This article explains the power over ethernet flashlight.
-
Power Problems – The threat, the cause, and the effect on your
network This article discusses the most common types of disturbances are
causes, threats and effects.
-
Wireless Networks Security Issues This article describes the wireless networks using the radio
waves.
-
Remote Monitoring: Beyond Virus Protection This article describes the automatic to protect your data center
by backing up your servers
-
Remote Server Applications This article explain the ability to access a network, a
personal computer, a server, or other device from a distance for the
purpose of controlling it or to access data.
-
SDN – Centralized Network Command and Control This article describes the Software Defined Networking (SDN)
architecture and its elements.
-
Selecting Basic Wireless Networking Hardware This article describes the selecting basic wireless networking
hardware.
-
Server/Desktop Virtualization–A Best of Breed Band-Aid This article describes the Virtualization and cloud deployments.
-
SFP, SFP+, and XFP Transceivers This article describes the type of transceiver that plugs into a
special port on a switch or other network device to convert to a copper
or fiber interface.
-
Shining a Light on Nobel Winners for Fiber Optic and CCD
Technology This article discusses the transmission of light in fibers for
optical communication.
-
Simulation of Network Now Will Be Extremely Easy With Mimic Netflow
Simulator This article explains Network simulation services and its
applications.
-
SMT, matrix and Vblock: architectures for private cloud This article discusses the cloud computing hybrid strategies and
its benefits.
-
SNMP – The Most Renowned Protocol for Network Management This article describes the Simple Network Management protocol or
SNMP.
-
Something Up Brocade’s Sleeve and It Looks Good This article discusses the main technology of the hardware and
software.
-
Stateless Transport Tunneling (STT) This article discusses the tunneling protocol of the VXLAN and
NVGRE proposals.
-
Storage Protocols This article discusses the various types of the System Interface
in storage protocols.
-
Taking a good hard look at SDN This article explains the type of SDN vision and SDN
architecture.
-
The ABCs of Cabling Standards This article discusses the two primary organizations in various
types of the cabling definitions.
-
The Cloud Storage Argument This article describes the cloud stoarge arguments in detail.
-
The Difference between Layer 2, 3, and 4 Network Switches This article describes the important functions of a network for
moving data efficiently and quickly.
-
The Difference between Private Cloud and Converged Infrastructure This article explains the difference between Private Cloud and
Converged Infrastructure.
-
The Future of Network Cabling This article describes the communication and exchange of
information via network cabling.
-
The Future of Video Extension This article explains the analog video and digital video in
detail.
-
The Hidden Costs of Old Networking Hardware This article describes about the old networking hardware.
-
The Organizational Challenge This article describes the changing organizational structure and
change management.
-
The Power of Innovative Datacenter Stacks This article discusses the some level of virtualization and types
of integrated stacks.
-
The Psychology of Network (In) Security This article discusses the security about being connected to the
Internet and concern the 4Ds.
-
The relationship between switches, media converters, and OSI
layers This article explains the switches and media converters detail in
terms of layers 2 and layers 3.
-
The two biggest causes of fiber light loss and how to fix them This article explains the two biggest causes of fiber light loss
and how to fix them.
-
Thinking “Out-Of-The-Box:” Black Box’s iCOMPEL This article describes the digital out-of-home (OOH) video
display in the digital signage.
-
Thoughts from a Global Technology Leadership Forum This article discusses the VDI networks technology.
-
Three Common Network Mistakes This article explains three common network mistakes in detail.
-
Three Tips for Managing Network Changes This article describes the network to run efficiently at all
times.
-
Troubleshoot and Calibrate VGA or HDMI/DVI Video Displays with
Ease This article describes the proper use of calibrate remote
computer monitors and high-definition.
-
True Software Defined Networking (SDN) This article explains the SDN of software defined networking.
-
Types of Fiber Cable and Standards This article explains the types of fiber cable and standards.
-
Understanding Fiber Jacket Color Coding This article discusses how to understand the fiber color coding
in detail.
-
USB to 100BASE-FX Optical Fiber Network Card This article describes the USB to 100Base-Fx optical fiber
network card.
-
VDI, The Next Generation Or The Final Frontier This article explains the Virtual Desktop Infrastructures (VDI).
-
VERI-NAC™: The One-Box Vulnerability and Network Access Control This article discusses the laptop connection or unauthorized
wireless access point in Veri-NAC.
-
Virtualization This article describes the virtualization of the cloud computing,
servers, network, and storage.
-
VoIP Softswitch Made a Revolution in VoIP Technology This article discusses the advanced technologies of calling
machines and hardware.
-
VoIP…When Should You Convert? This article explains the VoIP systems affordable and practical
business and its benefits.
-
VXLAN Deep Dive – Part I This article describes the virtualized and multi-tenant
environments.
-
VXLAN Deep Dive – Part II This article discusses the VXLAN is an encapsulation technique.
-
Walkie Talkies and Their Accessories This article describes the transmitter and its accessories in the
communication device.
-
What is all about 5G technologies? This article describes the data transfer and its services of the
technologies.
-
What Network Virtualization Isn’t This article describes the Network Virtualization implementation
of SDN.
-
What's Stopping Cloud? This article discusses the barriers to adoption into major
categories of cloud.
-
Where Are You? This article explains the benefits of server virtualization in
the data center.
-
Why Big Data Is Essential For An Enterprise? This article discusses the big data is a group of data
techniques enterprises.
-
Why Cloud Is As ‘Green’ As It Gets This article describes the Power Usage Effectiveness of the
greenpeace.
-
Why NETAPP Is My ‘A-Game’ Storage Architecture This article describes the storage features and its applications
using netapp.
-
Why Should I Encrypt My Data? This article describes the ensure data security over an MPLS
network to encrypting data.
-
Why We Need Network Abstraction This article explains on the network constructs and cloud models.
-
Why You Should Invest In Remote Power Control This article explains about the remote power control is the
ability to reset at equipment’s location.
-
Why you’re ready to create a Private Cloud This article explains about the private cloud adoption methods
and their advantages.
-
Simplify marketing decisions with crm solutions This article describes the CRM solutions with the marketing
decisions.
-
Bus Topology: Advantages and Disadvantages This article explains the bus topology is the simplest of network
topologies & its types.
-
Characteristics of Good Software This article explains the developing any kind of software
product.
-
Classical TCP Improvements This article discusses the improvements of TCP.
-
Client Server Network Architecture This article describes the client server features, components and
its diagram.
-
Client Server Network: Advantages and Disadvantages This article discusses the advantages and disadvantages of
client-server networking.
-
Difference between Prototype Model and Waterfall Model This article explains the difference between the two of this
Software Developments.
-
Difference between Testing and Debugging This article discusses the difference between Software Testing
and Debugging.
-
Hybrid Topology: Advantages and Disadvantages of Hybrid Topology This article discusses the connection of various links and nodes
in hybrid topology.
-
Mesh Topology: Advantages and Disadvantages This article explains the each of the network node, computer and
other devices.
-
Network Topology and Types of Network Topologies This article discusses the computer network topology is the way
various components of a network.
-
P2P - What is Peer-To-Peer? This article explains the peer to peer network capabilities and
responsibilities.
-
Peer-To-Peer (P2P): Advantages and Disadvantages This article describes the advantages and disadvantages of a
peer-to-peer network.
-
Pros and Cons of Outsourcing Testing Activity This article describes the software testing is the science of
finding defects in a part of software.
-
Prototype Model: Advantages and Disadvantages This article discusses the prototype acts as a sample to test the
process.
-
Ring Topology: Advantages and Disadvantages This article discusses the all the nodes are connected to
each-other in ring topology.
-
Spiral Model: Advantages and Disadvantages This article describes the type of iterative software development
model.
-
Star Topology: Advantages and Disadvantages This article describes the all the components of network are
connected to the central device.
-
Traditional TCP This article explains about the TCP and its characteristics.
-
Tree Topology: Advantages and Disadvantages This article describes the integrates the characteristics of Star
and Bus Topology.
-
Waterfall Model of SDLC This article explains the linear sequential model of waterfall
model in SDLC.
-
Waterfall Model: Advantages and Disadvantages This article describes the advantages and disadvantages of the
waterfall model.
-
What Are Proxy Servers? This article explains the proxy server just connects clients to
the main web server.
-
HP WI-FI direct mouse on linux This article explains the wi-fi direct mouse on linux.
-
Network activity led with linux led subsystem This article explains the network activity LED with linux
subsystem.
-
Fighting the summer storms – choosing a ups or bps This article describes the fighting summer stroms, choosing a UPS
or BPS.
-
The fight for digital sovereignty: industrial factors This article discusses the fight for digital sovereignty with
industrial factors.
-
The Cybersecurity challenge This article explains the cybersecurity challenge in detail.
-
The bring your own device nightmare This article explains the possible solutions of bring your own
device.
-
Wireless networking security considerations This article describes about the wireless networking security.
-
Virus hoax alert This article discusses the virus hoax alert.
-
Thin Client networks This article describes the concept of thin client
computing.
-
Server software: Windows server 2003 and small business server
2003 This article describes the advantages and disadvantages in the
Windows Server software.
-
What is a Network This article describes the networks of protocol, switch, cable
etc.
-
Wireless networks This article explains the Wireless network technology.
-
Wireless LAN standards This article describes the wireless LAN technologies.
-
Wireless networks security issues This article describes the wireless networks using the radio
waves.
-
Virtual private networks This article describes the a private networks of the remote
access.
-
SMA Connectors This article explains the SMA connector that Designed to Support
Radio Frequency Signals
-
What are the major benefits of call analytics? This article describes the benefits of call analytics permit
organizations.
-
The key advantages of business intelligence and analytics This article describes the business intelligence solutions of
that advantages.
-
System wires - In walls installation This article explains the internet technological innovation
systems.
-
The importance of business it support This article discusses the importance of the communications.
-
A Brief History of GPS This article explains the different type of GPS module and most
common form of antennas.
-
A Synchronous Solution This article discusses the uses separate lines for data and a
“clock”.
-
Advanced Protocols This article describes the two frames are required to transmit
the slave address.
-
Basic Terminology This article discusses the terminology terms are covered in a lot
more detail in our Serial Communication.
-
Binary This article discusses the variety of base-number systems are
using binary.
-
Binary in Programming This article explains the bitwise operators in programming.
-
Bits, Nibbles and Bytes This article describes the Common binary number lengths and
Padding with leading zeros.
-
Bitwise Operators This article discusses the number of ways to manipulate binary
values.
-
Changing/deleting com ports (windows) This article discusses the Changing/Deleting COM Ports in the
Windows.
-
Command line (windows, mac, linux) This article describes the use command line interfaces to create
serial connections.
-
Common pitfalls This article discusses the two devices trying to transmit data at
the same time.
-
Configuring a GPS receiver This article discusses the type of various chipset GPS is using
powerful processor.
-
Connecting to your device This article explains the how to connect a device, which port it
has been assigned, and communicate over that port.
-
Coolterm (windows, mac, linux) This article discusses the coolterm useful no matter which
operating system.
-
Counting and converting This article explains the Counting in binary and converting a
binary and decimal.
-
Gps accuracy This article discusses the satellite position and the GPS factors
of the signals.
-
Gps basics This article explains the used or benefitted from a GPS
receiver.
-
Gps message formats This article explains the different message formats over a serial
interface. In the GPS data.
-
Hardware setup This article discusses the receive and demodulate the IR signal
from a common remote control.
-
How does GPG work This article describes the data sent down to earth from each
satellite using GPS.
-
Hyperterminal (windows) This article discusses the hyperterminal is the defacto terminal
program.
-
I2C This article describes the Inter-integrated Circuit is a protocol
intended to allow multiple “slave” digital integrated circuits.
-
I2c at the hardware level This article discusses the I2C bus consists of two signals: SCL
and SDA.
-
I2c communication protocol This article explains the two types of frame and certain protocol
for the devices .
-
IR communication This article explains the communication is a common and easy to
use wireless communication technology.
-
IR communication basics This article describes the modulating a signal is like assigning
a pattern to your data.
-
Reading GPS data This article describes the connecting to a microcontroller and
connecting to a computer.
-
Real-term (windows) This article describes the designed specifically for sending
binary and other difficult-to-type streams of data.
-
Rules of serial This article explains the asynchronous serial protocol is using
error-free data transfers.
-
Serial communication This article discusses the interfaces transfer multiple bits at
the same time.
-
Serial peripheral interface (SPI) This article describes the interface used to send data between
microcontrollers and small peripherals.
-
Spi - slave select (ss) This article describes the SS is used when multiple slaves are
present to select the one.
-
Spi receiving data This article explains the generates the clock signal in the SPI
multiple slaves.
-
Tera term (windows) This article explains the one of the more popular Windows
terminal programs.
-
Terminal echo test This article describes the specifics of each terminal program.
-
Transmitting ir example This article explains the IR LED imitate an IR remote to control
an appliance.
-
UARTS This article describes the serial packets and control those
physical hardware lines.
-
What is a terminal? This article describes the referred to as text terminals, and
later came graphical terminals.
-
Wiring and hardware This article explains the sending data and another for
receiving.
-
Zterm (mac) This article explains the ZTerm is another terminal option for
Mac users.
-
Authoritative Only Server This article discusses the term of authoritative only server uses
and its two concepts.
-
Binary Image Scaling This article describes the binary image scaling.
-
Binary Morphology This article explains binary morphology in detail.
-
Binary Morphology – Atomic Operations This article discusses the binary morphology.
-
Binary Morphology and Cellular Automata This article explains the set of rules applied to a binary image
to generate another image.
-
Binary Rank-Order and Median Filter Using an Accumulator This article decsribes the median filter is a nonlinear filter
that selects, for every position of the filter.
-
Binary to Gray Downscaling This article explains the binary to gray downscaling in detail.
-
Caching Name Servers (Resolver) This article discusses the obtains information from another
server in response to a host query and then saves the data
locally.
-
Difference between MAC Address and IP Address This article discusses the difference between the MAC address and
IP address.
-
Difference between POP & IMAP This article explains the difference between the POP and the
IMAP.
-
Difference between TCP & UDP Protocol This article explains the difference between the TCP and the UDP
protocol.
-
DNS Configuration Types This article discusses the types of the DNS configuration.
-
DNS Security This article discusses the DNS security types in detail.
-
DNS Security - II This article discusses the DNS security in detail.
-
Dynamic ARP Inspection This article explains the dynamic ARP inspection.
-
EIGRP Dynamic Routing or Summary Static Routes This article discusses the EIGRP dynamic routing.
-
Enabling IPV6 on My Home Network This article explains the how to enable IPv6 on my home network.
-
Forwarding (A.K.A Proxy) Name Servers This article describes the forwards requests to another DNS and
caches the results.
-
Good Practices for Selecting Strong Passwords This article discusses the good practices for selecting strong
passwords.
-
Gray to Binary Upscaling This article discusses the useful to convert a low resolution
grayscale or color image.
-
Grayscale Convolution Using an Accumulator This article explains the algorithm for convolution with a flat,
rectangular filter.
-
Grayscale Morphology This article decsribes the Max and Min operations are used in the
binary morphology.
-
How Do You Scale A Grayscale Image? This article describes the assuming that a scaling factors in
grayscale image.
-
How Many IP Addresses are Available in IPV6 This article describes the used to identify the sender and
receiver machine.
-
Implement Stack Using Two Queues This article discusses the code to implement a Queue using two
stacks.
-
IP Routing in Small Networks This article explains the IP routing in small networks.
-
IP Source Guard This article discusses the IP source Guard in detail.
-
IPv4 in-ADDR.ARPA Reverse Mapping Domain This article explains the domain name structure as a tree
starting from the root.
-
Master (Primary) Name Servers This article describes the one or more zone files for which this
DNS is authoritative.
-
Slave Name Servers This article explains the zone data using a zone transfer
operation in the slave DNS.
-
Split Horizon DNS Server This article describes the DNS server give different responses
(IP addresses) based on the source address.
-
VLANS and IP Routing On an Ethernet Routing Switch This article explains the VLAN and IP routing on an ethernet
routing switch.
-
A Loosely Coupled Integration Solution This article describes the loosely coupled integration solution.
-
Advantages to Key-Based Authentication This article describes the advantages to key-based
authentication.
-
Aggregating Strategies: Multiple Channels vs. Single Channel This article describes the aggregating strategies: multiple
channels vs. single channel.
-
Application Integration Criteria and Options This article explains the application integration criteria and
options.
-
Are all the devices on your home on the same network? This article explains all the devices on your home on the same
network.
-
Basic Messaging Concepts This article describes the Messaging involves certain basic
concepts.
-
Basic Routing Math This article describes the basic routing math in detail.
-
Challenges of Asynchronous Messaging This article discusses the challenges of asynchronous messaging.
-
Channel Adapter and Messaging Bridge This article discusses the channel adapter and messaging bridge.
-
Contemplating “Mobility” This article discusses the contemplating “mobility”.
-
Content Based Router This article explains the route a message to the correct system
based on message content.
-
Content-Based Router and Message Filter This article describes the content-based router and message
filter.
-
Datatype Channel and Invalid Message Channels This article explains the datatype channel and invalid message
channels.
-
Dead Letter Channel and Guaranteed Delivery This article describes the dead letter channel and guaranteed
delivery.
-
Diagram Notation This article discusses the notation that accommodates all these
different components.
-
Distributed Applications vs. Integration and Commercial Messaging
Systems This article describes the distributed applications vs.
integration and commercial messaging systems.
-
Don’t Forget To Have Fun with Your Technology This article explains the dangers of Public/Unknown Wi-Fi and
setting your network up the right way into the cord.
-
Dynamic Router and Splitter This article discusses the dynamic router and splitter.
-
Dynamic SSH Port Forwarding (SSH+Socks) This article discusses the dynamic SSH port forwarding
(SSH+SOCKS).
-
Faster Wireless Isn’t Always Better Wireless This article describes the faster wireless isn’t always better
wireless.
-
HTTP Requests This article discusses the HTTP requests in detail.
-
HTTP Responses This article explains the HTTP responses with its types.
-
Introducing SSH This article discusses the introducing SSH in detail.
-
Introduction to Integration Styles This article explains the introduction to integration styles.
-
Introduction to Message Patterns This article describes the introduction to message patterns.
-
Introduction to Message Construction This article describes the introduction to message construction.
-
Introduction to Message Routing This article explains the message source from the ultimate
destination of the message.
-
Introduction to Message Transformation This article discusses the introduction to message
transformation.
-
Introduction to Messaging Endpoints This article explains the introduction to messaging endpoints.
-
Introduction to Simple Messaging Examples This article discusses the introduction to simple messaging
examples.
-
IP Addresses This article describes the IP addresses in detail.
-
IP Subnets This article explains the subnet is a collection of similar IP
addresses.
-
Loose Coupling of Interaction This article explains the loose coupling of interaction.
-
Message Bus and Command Message This article explains the message bus and command message.
-
Message Channel Decisions This article describes the applications of message channel
decisions.
-
Message Channel Themes This article explains the applications of message channel themes.
-
Message Translator This article discusses the construct messages and how to route
them to the correct destination.
-
Normalizer This article explains the Normalizer to route each message type
through a custom Message Translator.
-
Pipes and Filters This article discusses the different solutions by connecting the
components to different pipes.
-
Point-To-Point Channel and Publish-Subscribe Channel This article discusses the point-to-point channel and
publish-subscribe channel.
-
Real-World Simplifications and IP Network Configuration This article describes the real-world simplifications and IP
network configuration.
-
Remembering back when wireless was edgy This article explains the remembering back when wireless was
edgy.
-
Representing Netmasks and Subnets This article explains the representing netmasks and subnets.
-
Routable -V- Un-Routable Protocols – A Home Networking Pitfall This article discusses the routable -v- un-routable protocols – a
home networking pitfall.
-
Routing Packets This article discusses the IP protocol can send packets across
different networks.
-
Routing Slip This article describes the validations varies widely and may
depend on external systems.
-
Secure FTP This article discusses the secure file transfer protocol.
-
SSH Key Authentication This article explains the SSH key authentication.
-
SSH Port Forwarding This article describes the SSH port forwarding with its example.
-
SSH Security This article describes the SSH security in using the SSH
protocol.
-
Starting 2015 with No More Clarity on 802.11AC Wiring than 2014 This article describes the starting 2015 with no more clarity on
802.11ac wiring than 2014.
-
Testing and Monitoring This article discusses the execution of messages is a critical
operations and support function.
-
The Loan Broker Application This article discusses the uses of loan broker application.
-
The Memo of Wireless Networking This article discusses the memo of wireless networking.
-
The Structure of a Subnet and Broadcast Addresses This article discusses the structure of a subnet and broadcast
addresses.
-
The wireless tools they are a changin This article explains the wireless tools they are a-changin’.
-
Thinking Asynchronously This article explains the Messaging is an asynchronous
technology.
-
Three Building Blocks This article describes the three building blocks in JSON.
-
Using SSH to Run a Command on another Computer This article explains the using SSH to run a command on another
computer.
-
What is a Messaging System? This article explains the messaging the way a database system
manages data persistence.
-
What is Messaging? This article discusses the use messaging to integrate
applications.
-
When do you jump in on 11AC? This article describes the going to transform the way we use
wireless.
-
Why Use Messaging? This article describes the advantages that can be gained using
messaging.
-
Wireless is so not about Wireless Networking Anymore This article discusses the wireless is so not about wireless
networking anymore.
-
With 11AC, the WLAN Industry Owes Customers a New Kind of Network
Switch This article explains the WLAN industry owes customers a new kind
of network switch with 11ac.
Most of the time the proxy server is used for the web, and when it is, it's an HTTPproxy.
Comments
Post a Comment