June 2007

  • staggered quadrature phase-shift keying

    Staggered quadrature phase-shift keying (SQPSK), also known as offset quadrature phase-shift keying (OQPSK), is a method of phase-shift keying (PSK) in which the signal carrier-wave phase transitio...

  • KVM switch (keyboard, video, mouse switch)

    A KVM (keyboard, video, mouse) switch is a hardware device that allows a user to control multiple computers from a single keyboard, video display monitor and mouse.

  • Understanding TCP/IP

    This tutorial explains TCP/IP, including history, development, its use as a standard, Requests for Comment and the protocol suite.

  • Networking trends in 2007

    Networking trends in 2007 comprise wireless, mobility, security and more, all coming together to prove that the network is becoming more disruptive than it seems.

  • Network auditing and incident management: Pre-plan your next network meltdown

    Network auditing and incident management can prevent unplanned nework meltdowns and outages, and help make your life easier. Five useful building blocks can help you to construct a successful incid...

  • Do stateful packet-filtering firewalls have vulnerabilities?

    Learn what types of attacks stateful packet-filtering firewalls are vulnerable to in this Q&A with security expert Puneet Mehta.

  • What AP configuration will get the best encryption and authentication?

    Problems with your wireless connections can be caused by the following. Read security expert Puneet Mehta's response to see what AP configuration will get the best encryption and authentication.

  • Network security: Overlay versus perimeter security model debated at Catalyst

    Traditional network perimeter security models using firewalls may soon be pushed out in favor of leveraging VPNs for network security, which could ease the security burden for networking staff, acc...

  • concentrator

    As generally used, a concentrator is a device that acts as an efficient forwarder of data transmission signals.

  • flooding

    In a network, flooding is the forwarding by a router of a packet from any node to every other node attached to the router except the node from which the packet arrived.

  • Audiobook: Intrusion Prevention Fundamentals

    Intrusion Prevention Fundamentals: An introduction to network attack mitigation with IPS

  • AppleTalk

    AppleTalk is a set of local area network communication protocols originally created for Apple computers.

  • AMTOR (amateur teleprinting over radio)

    AMTOR (amateur teleprinting over radio) is a digital communications method used by radio amateurs, in which the frequency of errors is reduced by handshaking or character repetition.

  • automatic repeat request (ARQ)

    Automatic repeat request (ARQ) is a protocol for error control in data transmission.

  • IS-IS (Intermediate System-to-Intermediate System protocol)

    One of the most commonly used routing protocols, the Intermediate System-to-Intermediate System protocol (IS-IS) is based on a routing method known as DECnet Phase V routing, in which routers known...

  • Gigabit Ethernet and 10 Gigabit Ethernet: Technology overview

    This overview of Gigabit Ethernet and 10G lays the foundation for understanding Gigabit Ethernet technology and the advantages it brings to your network.

  • virtual LAN (VLAN)

    A virtual (or logical) LAN is a local area network with a definition that maps workstations on some other basis than geographic location (for example, by department, type of user, or primary applic...

  • autotrunking

    Autotrunking is a function that can be activated for one or more switch ports in a Cisco system of virtual local area networks (VLANs), making those ports capable of carrying traffic for any or all...

  • virtual systems management (VSM)

    Virtual systems management (VSM), also known as virtual system management, is the process of remotely managing the allocation and use of resources in conventional networks as well as in virtual are...

  • GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol)

    GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol) is a protocol that facilitates control of virtual local area networks (VLANs) within a larger network . GVRP conforms t...