Friday, October 11, 2013
What are advantages and limitations of Wi-Fi?
Posted by
Sunflower
at
10/11/2013 08:25:00 PM
0
comments
Labels: Access Points, Advantages, Communication, Devices, Frequency, Interface, Internet, Limitations, Network, Networking, Physical, Protection, Protocols, Routers, Secure, transmission, Uses, Wifi, Wireless
![]() | Subscribe by Email |
|
Tuesday, October 8, 2013
What are uses of Wifi?
Posted by
Sunflower
at
10/08/2013 10:10:00 PM
0
comments
Labels: Access Points, Communication, Devices, Frequency, Interface, Internet, Links, Modes, Network, Networking, Physical, Protection, Protocols, Routers, Secure, transmission, Uses, Wifi, Wireless
![]() | Subscribe by Email |
|
Monday, October 7, 2013
What is Wifi technology? How does it work?
Posted by
Sunflower
at
10/07/2013 06:55:00 PM
0
comments
Labels: Access, attacks, Connection, Data, Devices, Encryption, Features, files, Information, Interface, Internet, LAN, Network, Packets, Recovery, Standards, Stations, Technology, Wifi, Wireless
![]() | Subscribe by Email |
|
Saturday, September 14, 2013
Explain Border Gateway Protocol (BGP)?
Posted by
Sunflower
at
9/14/2013 08:57:00 AM
0
comments
Labels: BGP, Border gateway protocol, Domain, Exterior, Gateway, Interior, Internet, Messages, Network, Networking, Policies, Process, Protocol, Reach-ability, Route, Routing, Rules, System, Users, Uses
![]() | Subscribe by Email |
|
Saturday, September 7, 2013
Explain the concept of inter-networking?
- OSI or the open system
interconnection model: This model comes with 7 layer architecture that
covers the hardware and the software interface.
- TCP/ IP model: The
architecture of this model is somewhat loosely defined when compared with
the OSI model.
Posted by
Sunflower
at
9/07/2013 11:06:00 PM
0
comments
Labels: device, Gateways, Hardware, Inter-networking, Interface, Internet, LAN, Layers, Link, Networking, Networks, Packets, Protocols, Route, Router, Routing, Software, Switch, Technology, WAN
![]() | Subscribe by Email |
|
Monday, August 12, 2013
What are different methods of broadcasting a packet?
- Anycast
- Broadcast
- Multicast
- Unicast
- Geocast
Categories of Broadcasting Methods
Posted by
Sunflower
at
8/12/2013 01:46:00 PM
0
comments
Labels: Broadcast, Broadcasting, Categories, Data, Information, Interface, Internet, IP, Message, Methods, Networking, Operation, Packets, Recipient, Requirements, Route, Routing, Sender, Transfer, transmission
![]() | Subscribe by Email |
|
Wednesday, July 10, 2013
Explain the concept of piggybacking?
Posted by
Sunflower
at
7/10/2013 01:30:00 PM
0
comments
Labels: Acknowledge, Data, Frames, Internet, Layers, Network layer, Operating System, OSI, Packets, Piggybacking, Protocols, Receiver, Sender, Signals, Technique, Transfer, transmission, Transmit, Uses
![]() | Subscribe by Email |
|
Saturday, April 6, 2013
What are the risks and liabilities with instant messaging?
- Session initiation protocol or SIP of IETF.
- SIP for instant messaging and presence
leveraging extensions or SIMPLE.
- APEX or application exchange.
- IMPP or instant messaging and presence
protocol.
- XMPP or open XML – based extensible messaging
and presence protocol.
- Instant messaging and presence service of open
mobile alliance (this one was developed exclusively for the mobiles.)
- Security risks
- Inappropriate use
- Compliance risks
- Trade secret leakage
About Security Risks
- Delivering viruses, spyware
or Trojan horses through an infected file.
- Using the socially
engineered text that has a web address enticing the recipient to go to an
URL that in turn connects him/ her to a malicious website.
About Inappropriate Use
About Compliance Risks
Posted by
Sunflower
at
4/06/2013 09:13:00 PM
0
comments
Labels: Benefits, Chat, Clients, Communication, Compliance, IM, Instant Messaging, Internet, Liabilities, Media, Messages, Network, Receiver, Risks, Security, Sender, Text, Users, Video, Web
![]() | Subscribe by Email |
|