What is a Wireless Honeypot Attack? Normally, when a wireless client (PC, Laptop) is switched on, it will try to probe the nearby area for access points for a particular...
Rogue Access Points: Sometimes, an employee, or a guest might bring along inexpensive consumer grade access points and connect them to the corporate LAN to get wireless access. This can...
Link Aggregation Architecture Diagram: Extending your network using Link Aggregation: Link Aggregation and its advantages: Link Aggregation is a very useful method to combine multiple links to form a single...
In this article, we will see why its important to select the right voice codec for IP Telephony (VOIP) implementations and a short introduction to some of the popular voice...
So, as mentioned above, a wireless intrusion prevention system continuously scans for various wireless threats over the air and reports the same, when found. Some of them are automatically configured...
These days, video based applications are on the rise and the Internet is expected to satisfactorily cater to the bandwidth intensive and latency sensitive video content, notwithstanding its shortcomings like...
The first image defines what is iSCSI and what exactly its role is, in Storage Area Networks. Convergence is happening over IP everywhere (one reason why IP is exciting!), and...
Transmission of video has become an important function that needs to be supported by WAN networks including the Internet. But, if video is handled in its raw form, the bandwidth...
What is a Content Delivery Network? Various Web 2.0 technologies have transformed the Internet and the Internet is now enabling content to be delivered in various forms – Text, Images,...
Well, this is not exactly Infographics! It is just an attempt to explain the basic concepts of DMZ – Demilitarized Zone (Computer Networking) through an image. These days, the web-servers...
We all know that the IEEE 802.11n standard for Wi-Fi supports up to 600 Mbps for creating a wireless network. But are all 802.11n compliant devices same? Is the 600...
In bigger organizations and service providers, multiple Firewalls are routinely utilized for each department or class of subscribers as some of them require individual Firewall policies. And more importantly, they...
If I have to answer that question in one word : No!! But anyways in this post, I would like the readers to say (in the comments section) if Gigabit...
An overview of Optical Fiber Cables/ Communication is given in the above Infographics. You can find a more in-depth technical information about OFC here. There is also a nice flash...