Clicky

feature photo

Feature Article #1

Carrier Sense Multiple Access Collision Detect (CSMA/CD) Explained

First thing is first: save yourself some trouble and remember that carrier sense multiple access collision detect is best referred to as simply CSMA/CD. We’ve heard some ridiculously long terms before, but CSMA/CD takes the cake. Jokes aside, this media-access mechanism is what keeps networks running. If two or more computers transmit data at the […]

feature photo

Feature Article #2

How the Transport Layer Works

In the previous section we took a look at the Internet Layer. We took apart the IP header information, reviewed IP addresses and routing information, and briefly discussed ARP and RARP technologies. Next in line we have the Transport layer- the layer responsible for actually getting the data packets to a specific location. When we […]

feature photo

Feature Article #3

How to Subnet a Network

A properly designed subnet can do wonders for the security and performance of a network. The main idea in subnetting is to divide a network into smaller pieces, which we call subnets. Actually implementing a subnet is typically more difficult than simply using the default subnet mask of 255.255.255.0. This usually means that temporary or […]

feature photo

Feature Article #4

A Guide To Network Math

You are probably accustomed to using what is called decimal- the numbering system you’ve been learning since kindergarten. In networking we use three primary numbering systems: binary, decimal, and hexadecimal. It is direly important to know what each numbering system is for, and more specifically how to convert from one system to another. But don’t […]

feature photo

Feature Article #5

A Brief Overview Of Networking Media

There is all sorts of networking media lying around for the taking. We have copper-base media, optical fiber, and the new contender: wireless. This article covers a brief overview of each networking media type. By no means is this a complete guide to every single networking media type, but instead it is geared towards what […]

Other Recent Articles

post thumbnail

A Review of The Ooma VoIP Internet Phone

Ooma is a startup voice over IP service; betting all their chips on the idea of offering a mostly-free telephone system. Since late 2009 the service has been convincing techies that they can save a heap of money on their phone bill: the VoIP equivalent of what Geico is to car insurance. Do I Really […]

post thumbnail

Free Cisco Poster Offer

World Data Products, a hardware lifecycle management company based in Minnesota, caught my eye with their free Cisco poster offer. Not one to pass up geeky wall memorabilia, I sent them my contact information here. It only took about two minutes to fill out the form and have it queued for mailing. Around a month […]

post thumbnail

Configure A Router With Packet Tracer

Computer networking professionals getting started with Packet Tracer may find the interface to be flustered. Being a development program, this is only natural. However, learning how to configure a router with Packet Tracer will put professionals on the right track to mastering the program in about half an hour. By this time, you should already […]

post thumbnail

Download Packet Tracer 5 For Free

Packet Tracer 5 is a software suite used to train computer-networking students for CCNA certification. Its primary aim is towards students that don’t have constant access to a Cisco network of devices. It comes standard with tutorials, help topics, and troubleshooting tips that are present in every layer of the OSI model. Packet Tracer 5 […]

post thumbnail

Enable Passwords On Cisco Routers Via Enable Password And Enable Secret

Security is a part of every good technical administrator’s game plan. Luckily the good folks at Cisco have made the task of securitizing a Cisco router fairly straightforward in design- with support given for up to five types of passwords. Taking advantage of these passwords is vital to a network’s internal security, and should be […]

post thumbnail

How a Broadcast Address Works

Imagine you’re Paul Revere, riding from Boston to Lexington to warn citizens that the redcoats were coming. He may not be as fast as computer networks today, but Paul Revere was essentially acting much like a broadcast would- he was relaying his message to the entire town of Lexington. A broadcast, in particular, is a […]

post thumbnail

Dynamic Host Configuration Protocol (DHCP) Definition

Let’s imagine you’re a system administrator at a large company. You are implementing a new network of several hundred computers. All is fine and well until you realize: you have to manually input every single IP address, subnet mask, and gateway settings onto every single computer. You’re paid well, but maybe not that well. For […]

post thumbnail

An Introduction to Dynamic Host Configuration Protocol

Let’s imagine you’re a system administrator at a large company. You are implementing a new network of several hundred computers. All is fine and well until you realize: you have to manually input every single IP address, subnet mask, and gateway settings onto every single computer. You’re paid well, but maybe not that well. For […]

post thumbnail

Securing Cisco Routers with No IP Directed-Broadcast

One of several overlooked commands that can produce a world of hurt for networks is the IP Directed-broadcast command. This command was introduced in Cisco’s routers at IOS version 10. Cisco soon realized that this command was being maliciously exploited in denial of service attacks, and action had to be taken- particularly against smurf attacks. […]

post thumbnail

An Introduction to Cisco Router Configuration

Configuring a router sounds like a tough task. Routers are capable of sending and routing data on a dynamic level- no easy feat. But with this article we are only getting our feet wet. We will take a look at how we connect to a router via the console port and setup a HyperTerminal session […]