Archive

Category Archives for "Networking"

CCNA Wireless – CCNA Wireless Notes Chapter 5

Types of Wireless Networks

Wireless LANs are not the only type of wireless networks that exist.

Wireless Personal Area Network (WPAN)

WPAN uses low-powered transmitters to create a very short range network, usually 7 to 10 meters. Based on the 802.15 standard and includes technologies such as Bluetooth and ZigBee although ZigBee can have greater range. Unlicensed ISM frequencies are used including the 2.4 GHz band.

Wireless Local Area Network (WLAN)

Wireless service connecting multiple devices using IEEE 802.11 standard over medium-sized range, usually up to 100 meters. Uses unlicensed frequencies in 2.4 GHz and 5 GHz band.

Wireless Metropolitan Area Network (WMAN)

Wireless service over a large geographic area, such as all or portion of a city. One technology used is WiMAX, which is based on the 802.16 standard. Most commonly uses licensed frequencies.

Wireless Wide Area Network (WWAN)

Wireless data service for mobile phones offered over a very large geographic area, such as regional, national or even global by telecommunication carriers. Licensed frequencies are used.

Wireless LAN Topologies

Likelihood of interference increases as the number of wireless devices grows. Wireless devices use half duplex to avoid colliding with other Continue reading

Don’t Miss out on These 5 Spotlights on Security at vForum Online Summer 2017

You’ve likely heard it before: “All businesses are now digital businesses.” But since the business has expanded into digital space, shouldn’t something as critical as business security digitally expand too? That’s where the VMware ubiquitous software layer comes into play — sitting across the application infrastructure and endpoints, no matter where they are.

Now more than ever, it’s clear that security expertise is a must-have for IT. To further enhance your own security knowledge, make sure to join us at vForum Online on June 28th — right from your own desk. As our largest virtual conference, vForum Online is a must-attend event for IT professionals, and especially for those looking to improve their approach to security.

For returning attendees, you may notice we’ve made some alterations to the structure of vForum Online: Now, the conference is divided into several goal-oriented tracks, to ensure we’re aligned to your IT aims.

With this free, half-day event just a few weeks away, we’re counting down the days — and counting up all the reasons you should attend. Get a preview of these five security spotlights you can expect at the conference:

  1. A Modern Approach to IT Security

In our “Transform Security — Reduce Continue reading

Bringing Internet to Nepal’s Remote, Mountainous Villages

In 1997, we finally got the Internet in Nepal. Unfortunately, it was only available in the capital, Kathmandu, which is very far from my village of Nangi. But almost immediately, I started thinking of ways we could get Nangi online. I was already familiar with the Internet from studying in the United States, and I had a lot of ideas about how being online could improve life in Nangi.

For the next four years, I talked to a lot of people about how we could get connected, but nothing seemed feasible. Nangi is in a remote, mountainous part of the country, so we didn’t have wireline phone service. That meant the traditional methods of connecting to the Internet were out, and satellite Internet was prohibitively expensive.

Mahabir Pun

Epic Evaluation: Ubiquiti ERPro-8 vs Play-Doh

It’s the bake off you’ve been waiting for; a five-month real life test of a Ubiquiti ERPro-8 (EdgeRouter Pro) and a tub of Play-Doh™! Over a period of five months I carefully evaluated these two very useful items and discovered their good and bad points. But after five months, which will I choose as the ultimate winner?

PlayDoh vs ERPro-8

The Rules

  1. Each of the two competing items will be utilized over a period of five months for the purpose for which they were intended.
  2. At the end of the five month test period, the performance of both items will be evaluated, and a winner chosen entirely subjectively based on:
    • Suitability for intended purpose during the test
    • Condition at the end of the test
    • Performance of intended purpose at the end of the test

The Tub of Play-Doh™

Product Specifications

The first item to be evaluated is the tub of Play-Doh™. I didn’t skimp on quality, and bought genuine Play-Doh™ as part of a set which included tubs of both light blue and red. Accessories in the box included a roller, a plastic cutting knife, four shaped cutters and an extruder with four built-in shapes as well as four interchangeable extrusion heads.

Play-Doh Set

The entire kit Continue reading

There is No Perimeter in IoT Security

The Internet of Things (IoT) is not just a device connected to the Internet - it is a complex, rapidly evolving system. To understand the implications, analyse risks, and come up with effective security solutions we need to look ahead and take into account other components, such as Big Data and Artificial Intelligence (AI).

Andrei Robachevsky

IDG Contributor Network: Cloud helps Elon Musk further his audacious goals

There are some people whose vision of the future simply defy words. I would put Elon Musk firmly in the category – changing the world through a single initiative isn’t Musk’s style, rather, he wants to deliver his vision of the future across multiple areas. Space travel? Check. Hyper-efficient terrestrial transportation? Also check. Personal automobiles that challenge both existing business and technology models? Check. Solar power with new economics and scale? Also check. While many would question his political leanings, there is no denying that Musk is a genius.I’ve never met Musk, but watching him speak it is obvious that this is one visionary who not only sees a “bigger picture” for the future of humanity, but he also deeply understands the technology constraints and opportunities that will deliver the future. Which is an inspiring thing to watch, but which also places huge challenges upon the individuals who need to deliver that work. By extension, it also pushes the boundaries of what existing technologies can do.To read this article in full or to leave a comment, please click here

Cloud helps Elon Musk further his audacious goals

There are some people whose vision of the future simply defy words. I would put Elon Musk firmly in the category – changing the world through a single initiative isn’t Musk’s style, rather, he wants to deliver his vision of the future across multiple areas. Space travel? Check. Hyper-efficient terrestrial transportation? Also check. Personal automobiles that challenge both existing business and technology models? Check. Solar power with new economics and scale? Also check. While many would question his political leanings, there is no denying that Musk is a genius.I’ve never met Musk, but watching him speak it is obvious that this is one visionary who not only sees a “bigger picture” for the future of humanity, but he also deeply understands the technology constraints and opportunities that will deliver the future. Which is an inspiring thing to watch, but which also places huge challenges upon the individuals who need to deliver that work. By extension, it also pushes the boundaries of what existing technologies can do.To read this article in full or to leave a comment, please click here

Top storage skills to boost your salary

Demand for skilled storage pros is on the rise as enterprise IT teams wrestle with increased storage capacity requirements and evolving business needs. In particular, companies are looking for people with experience migrating from hardware-based storage to cloud storage – and that’s resulting in higher-than-average pay increases, according to Dice.The tech career hub and job-search site released its annual guide to U.S. tech salaries, which finds that overall average pay in the industry fell slightly last year to $92,081, down from $93,328 in 2015. On the raise front, 61% of tech pros received a salary increase from a year ago, and 9% reported a decrease.To read this article in full or to leave a comment, please click here

Top storage skills to boost your salary

Demand for skilled storage pros is on the rise as enterprise IT teams wrestle with increased storage capacity requirements and evolving business needs. In particular, companies are looking for people with experience migrating from hardware-based storage to cloud storage – and that’s resulting in higher-than-average pay increases, according to Dice.The tech career hub and job-search site released its annual guide to U.S. tech salaries, which finds that overall average pay in the industry fell slightly last year to $92,081, down from $93,328 in 2015. On the raise front, 61% of tech pros received a salary increase from a year ago, and 9% reported a decrease.To read this article in full or to leave a comment, please click here

OneLogin hack exposed sensitive US customer data and ability to decrypt data

OneLogin, an identity management company which provides a single sign-on platform for logging into multiple apps and sites, was hacked. US customer data was potentially compromised,“including the ability to decrypt encrypted data.”The company, which claims “over 2000+ enterprise customers in 44 countries across the globe trust OneLogin,” announced the security incident on May 31. It was short on details, primarily saying the unauthorized access it detected had been blocked and law enforcement was notified.To read this article in full or to leave a comment, please click here

OneLogin hack exposed sensitive US customer data and ability to decrypt data

OneLogin, an identity management company which provides a single sign-on platform for logging into multiple apps and sites, was hacked. US customer data was potentially compromised,“including the ability to decrypt encrypted data.”The company, which claims “over 2000+ enterprise customers in 44 countries across the globe trust OneLogin,” announced the security incident on May 31. It was short on details, primarily saying the unauthorized access it detected had been blocked and law enforcement was notified.To read this article in full or to leave a comment, please click here