-
staggered quadrature phase-shift keying
Staggered quadrature phase-shift keying (SQPSK), also known as offset quadrature phase-shift keying (OQPSK), is a method of phase-shift keying (PSK) in which the signal carrier-wave phase transitio...30 Jun 2007
-
KVM switch (keyboard, video, mouse switch)
A KVM (keyboard, video, mouse) switch is a hardware device that allows a user to control multiple computers from a single keyboard, video display monitor and mouse.28 Jun 2007
-
Understanding TCP/IP
This tutorial explains TCP/IP, including history, development, its use as a standard, Requests for Comment and the protocol suite.28 Jun 2007
-
Networking trends in 2007
Networking trends in 2007 comprise wireless, mobility, security and more, all coming together to prove that the network is becoming more disruptive than it seems.28 Jun 2007
-
Network auditing and incident management: Pre-plan your next network meltdown
Network auditing and incident management can prevent unplanned nework meltdowns and outages, and help make your life easier. Five useful building blocks can help you to construct a successful incid...27 Jun 2007
-
Do stateful packet-filtering firewalls have vulnerabilities?
Learn what types of attacks stateful packet-filtering firewalls are vulnerable to in this Q&A with security expert Puneet Mehta.26 Jun 2007
-
Network security: Overlay versus perimeter security model debated at Catalyst
Traditional network perimeter security models using firewalls may soon be pushed out in favor of leveraging VPNs for network security, which could ease the security burden for networking staff, acc...26 Jun 2007
-
What AP configuration will get the best encryption and authentication?
Problems with your wireless connections can be caused by the following. Read security expert Puneet Mehta's response to see what AP configuration will get the best encryption and authentication.26 Jun 2007
-
concentrator
As generally used, a concentrator is a device that acts as an efficient forwarder of data transmission signals.25 Jun 2007
-
flooding
In a network, flooding is the forwarding by a router of a packet from any node to every other node attached to the router except the node from which the packet arrived.25 Jun 2007
-
Audiobook: Intrusion Prevention Fundamentals
Intrusion Prevention Fundamentals: An introduction to network attack mitigation with IPS25 Jun 2007
-
AppleTalk
AppleTalk is a set of local area network communication protocols originally created for Apple computers.25 Jun 2007
-
AMTOR (amateur teleprinting over radio)
AMTOR (amateur teleprinting over radio) is a digital communications method used by radio amateurs, in which the frequency of errors is reduced by handshaking or character repetition.25 Jun 2007
-
automatic repeat request (ARQ)
Automatic repeat request (ARQ) is a protocol for error control in data transmission.25 Jun 2007
-
IS-IS (Intermediate System-to-Intermediate System protocol)
One of the most commonly used routing protocols, the Intermediate System-to-Intermediate System protocol (IS-IS) is based on a routing method known as DECnet Phase V routing, in which routers known...25 Jun 2007
-
Gigabit Ethernet and 10 Gigabit Ethernet: Technology overview
This overview of Gigabit Ethernet and 10G lays the foundation for understanding Gigabit Ethernet technology and the advantages it brings to your network.23 Jun 2007
-
virtual LAN (VLAN)
A virtual (or logical) LAN is a local area network with a definition that maps workstations on some other basis than geographic location (for example, by department, type of user, or primary applic...21 Jun 2007
-
autotrunking
Autotrunking is a function that can be activated for one or more switch ports in a Cisco system of virtual local area networks (VLANs), making those ports capable of carrying traffic for any or all...21 Jun 2007
-
virtual systems management (VSM)
Virtual systems management (VSM), also known as virtual system management, is the process of remotely managing the allocation and use of resources in conventional networks as well as in virtual are...21 Jun 2007
-
GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol)
GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol) is a protocol that facilitates control of virtual local area networks (VLANs) within a larger network . GVRP conforms t...21 Jun 2007
Network Management Strategies for the CIO