Routed Vs. Switched Networks
Local network hardware is comprised of routers, switches, firewalls, gateways and cabling. Network hardware typically corresponds to the various "levels" of the OSI or DOD networking model -- such as...
View ArticleHow to Set Up a Spanning Tree on an HP ProCurve to Run a Redundant System
Enable the Spanning Tree Protocol, or STP, on an HP Procurve switch infrastructure when you're configuring multiple network paths to each destination for fault tolerance. STP prevents network loops...
View ArticleWhat Is a DNS Forwarder?
A DNS Forwarder is a type of proxy server. A proxy server acts on behalf of other computers. The World Wide Web uses an addressing system based on “domain names.” A domain name is the...
View ArticleHow to Monitor Visited Websites Using Wireshark
Wireshark can monitor all network traffic to and from your computer, and can also monitor network traffic from other computers on your network using "promiscuous" mode. Depending on your network setup,...
View ArticleWhat are RAS and IAS Servers?
A remote access server guards the entrance to a private network where it connects to either a phone line or the Internet. The RAS refers to an authentication server that checks whether external users...
View ArticleHow to Hard Wire My PS3 When the Router Is in Another Room
The PlayStation 3 game console is the most advanced gaming console by Sony, as of the time of publication. It features an internal hard drive for game saves and other content, a Blu-Ray player and an...
View ArticleHow to Disable STP on a One Port ProCurve
The Spanning Tree Protocol (STP) is a network protocol that is used with networks where multiple bridges, routers, hubs or switches are connected together. It is used to prevent looping errors between...
View ArticleHow to Delete Windows Disk Volume Powershell Script
The Windows Powershell utility is a shell prompt that lets administrators run advanced commands on the computer to manage user resources. The shell looks like a DOS command prompt, but it has several...
View ArticleHow to Block Computers From the Internet With a Netgear WNDR3300
You can block Internet access from any computers connected to your Netgear WNDR3300.The router includes a software interface designed for this type of administrative task. The software on the router...
View ArticleNine Advantages of Database Processing
In the business world, the way your local computer network is set up can have an impact on the performance of your company. With database processing, a software application is tied into a central...
View ArticleHow to Setup a Router With U-verse
At&T's U-Verse RG (Residential Gateway), also referred to as wireless gateways, function as both modems and wireless routers. But if your U-Verse RG uses an outdated wireless broadcast standard and...
View ArticleThe Advantages of Bridging Network Connections
There are several ways to hook up individual computers into a network. One is to use hardware routers to link up the network segments. If you buy hardware bridges, those will also connect the computers...
View ArticleHow to Reduce Powerline Network Noise
Powerline networks use the electrical wires in a building to carry signals for a local area network, instead of using separate network cables. At the time of publication powerline networks can achieve...
View ArticleHow to Find the D-Link Security Code Using the Serial Number
Each D-Link router includes a default security code you use to connect to the router's console. D-Link offers customers a tool that returns a model number from a serial number. Using the returned model...
View ArticleWhat Is Port 445 Used for in Windows 7?
Microsoft's Windows operating system has improved a lot over the years since Windows 3.1 was introduced. Windows 95, NT and other versions have led to Windows 7, which is more flexible and more secure...
View ArticleVMware Cannot Ping
The most complex configuration of a virtual machine in VMware is the network setup, beginning with the decision to use bridged, host-only, NAT or custom. After you've configured the network settings,...
View ArticleHow to Run EXE From SharePoint
Microsoft's SharePoint software allows you to create intranet applications and websites for your company. To launch an application from the site, you link to the document that requires the EXE...
View ArticleWhat Are the Benefits of Hierarchical Network Design?
Hierarchical network design provides efficient, fast and logical traffic forwarding patterns for enterprise network topologies while minimizing the cost of connecting multiple devices at network...
View ArticleHow Many Repeaters Can Be Used in a Network?
Network designers don’t count the total number of repeaters used on a network because they count the total number of repeaters used between two points or "nodes" on the network. The maximum number of...
View ArticleCan You Have Multiple PXE Servers on the Same Network?
The Pre-boot Execution Environment enables computers on a network to request an address and a start-up file automatically over a network when they power up. The scenario is initiated by the chip on the...
View Article