Tuesday, May 5, 2009
Wireless LAN (WLAN)
Digi - Wireless Device Networking
"...device networking for business, develops reliable products and technologies to connect and securely manage local or remote electronic devices over the network or via the web."
Wi-Fi - 802.11a/b/g Wireless LAN Networking -
External and embedded Wi-Fi products make it easy to add embedded 802.11a/b/g wireless LAN networking to any electronic device, or to connect serial devices over a Wi-Fi network.
Network Cable Tester, LAN Tester
Specifications:
This LAN tester for different cable types is indispensable in network installation and maintenance.
This compact device can be used for testing network.
Telephone (rj-45 rj-11 rj12) and most types of computer cable
----LED indication
----advanced design for easy testing
----ability to test cables from a distance and in places that are not easily accessible
----automatically runs all tests and checks for continuity, open, shorted and crossed wire pairs
----switch can automatic shut when open 2-3 minute
----tests: rj-45, 10 base-t, token ring, rj11 / 12 cable
----power supply supply 9v-battery (not incl)
Network Server
A. Network Attached Storage
Multiple users can access the same storage device to share and exchange files. Simply connect up to two USB drives to the M-DM Download Manager, set up a shared folder and let users access the files via local network connection using SMB or FTP.
B. Printer sharing
No need to connect the printer to a specific computer, only need to connect it to this product and this product should be in Local area network, then, all of the computer in the Local area network can use this printer
C. FTP server
The FTP utility on the Mac will be able to read the data on the network storage but you can not write new data to the drive. To do that,you will need to install a dedicated FTP application,which can either be a free utility or professional shareware programs.
Outside Hard drive as a FTP Server, any user who knows IP ID or Password of this products can download the shared data on the hard disk through internet.
Function is similar with some companies which download product data with long-distance.
D. Support BT or other download method
MDT-LS201 Download Manager allows you to put up to ten Torrent files in to a queue, and will download two at a time, to maximise the speed of the download. As soon as one download is finished, the next one will automatically start. If one download is for any reason broken off, the Download Manager will go on to the next download and try that one again later. You can then turn off your computer and go about other things (like sleeping!) and when you come back, you will have all kinds of new media files to enjoy.
After setting the download contents to this product on PC, then, close the PC, this product also can work for long time or finish download task independently.
User group can focus on SOHO crowd, you can download Electronic book or film, or other documents with it when no power on computer.
F. USB OTB Copy
The USB copy function can be used to copy data from one USB storage device to another.Simply connect both drives,tum them on and press the copy button to start the process.In general,the source is on port B and the destination is on port A but there are a couple of exceptions.
The copy function will copy all data stored on the source drive,create a new folder on the destination drive with the current time and then paste the files into that newly created folder.
G. Universal Plug and Play (UPnP is only available on request)
The MDT-LS201 Download Manager supports UPnP v1.0. If you have other devices that can access UPnP storage devices,you will be able to share your files on the attached USB drives in the local network via UPnp
There is no need to configure anything,this function is turned ON by default and other devices will be able to recognise it automatically.
Ø Up to two external USB storage drives
Ø Interface/Ports 10/100Base-TX Auto MDI/MDI-X, 1 port (RJ-45)
Ø USB 2.0 High Speed (USB1.1), 2 upstream ports (Type A)
Ø Half-Duplex and Full-Duplex operation
Ø TCP/IP (UPnP available on request)
Ø Up to 8 simultaneous connections
Ø DHCP Setup, Auto IP, Fixed IP, System Time (NTP)
Ø Setup for Accounts, Status, Access Right and User Setup, Share Level Access
Ø Input: AC 100-240V, 0.6A, 50-60Hz
Ø Output: DC +5V/2A
Product Size 133mm x 8.0mm x 2.0mm
Saturday, May 2, 2009
Firewall
- Packet filtering firewall
- Circuit level firewall
- Application level firewall
- Stateful inspection firewall
A packet filtering firewall is a router or computer (with special software) which screens incoming and outgoing packets. It reads information contained in each packet's TCP and IP headers then accepts or denies the packets based on the rules it has configured. Typically, it looks at rules based on the source address, the destination address, the application, the protocol, the source port number, or the destination port number. A packet filtering firewall operates only in the network layer of the OSI model.
A circuit level firewall monitors TCP handshaking between packets from trusted clients or servers to untrusted hosts to determine if the session is legitimate. A circuit level gateway checks the handshaking occurring with the synchronize (SYN) and acknowledge (ACK) packets in TCP. Since these packets occur at certain times and in a certain order, the circuit level gateway determines if they are operating correctly before allowing the communication. This type of firewall operates at the session layer of the OSI model.
An application level firewall operates a proxy between internal and external machines. It intercepts incoming and outgoing packets and copies and forwards the information to the destination addresses. The application level firewall acts as a proxy for the services it can proxy. For example, you can setup an application level firewall to proxy http and telnet requests - if you do not have it configured to proxy FTP requests, those would get dropped. An application level firewall checks packets up through the application layer of the OSI model.
A stateful inspection firewall combines aspects of the previously described firewalls. It operates at the network layer of OSI model, filtering all incoming and outgoing packets based on source, destination IP address, and port numbers. It also functions as a circuit level firewall by determining which packets in a session are appropriate. A stateful inspection firewall can also mimic an application level gateway in the application layer. A stateful inspection firewall is one of the most common firewalls as it combines features of the first three types.
Transceiver
A Transceiver, or media converter, is a device which interfaces between the network and a local node. An example of a transceiver is an MAU. A transceiver generally converts to different types of connectors, like AUI and RJ-45.
An MAU is a media attachment unit - a device which connects the computer to the Ethernet network.
A transceiver works at the Physical layer (layer 1) of the OSI model.
Modem
A Modem is a device which enables a computer to transmit data over analog telephone lines. Modem is short for modulator-demodulator. A modem converts the digital information in a computer into analog data. Traditional modems can operate at a top speed of 56Kbps, though most do not go that fast on today's phone lines.
A lot of companies still rely on dial-up access using modems for connectivity, though companies are increasingly moving to other methods of connectivity including cellular modem cards and high speed Internet access (such as DSL or cable modem).
A modem operates in the Physical Layer (layer 1) of the OSI model.
ISDN Adapter
A Wireless Access Point (WAP) is a transceiver or radio component in a wireless LAN that acts as the transfer point between wired and wireless signal and vice versa. The access point connects the wired LAN to an antenna. It bridges the wired and wireless networks together.
A Wireless Access Point operates in layer 3 of the OSI model.
CSU/DSU
Friday, May 1, 2009
Gateway
Router
A Router is a device that determines the next point a data packet needs to be forwarded to on to its destination. The router is connected to more than one network and determines where each data packet should be sent based on its current understanding of the networks it is connected to. Routers have table which shows the available routes and decides based on this table what the best route is for a given packet of information.
A router operates in level 3 of the OSI model.
If you have a cable modem or DSL modem at home, you probably have a router between your internal network and Internet.
Bridge
Bridges are most frequently used to connect LAN segments to other LAN segments or to a wide area network (WAN). Bridges are protocol independent, you could connect an Ethernet network with a Token Ring network using a bridge. Typically though, they are used to connect two similar networks together.
HUB
A Hub connects all the nodes of a network using Twisted Pair (UTP or STP) cables. In a Hub, the signals received on one port are transmitted to all other ports, and vice versa. All nodes (work stations) connected using a Hub can listen to one another all the time. The advantage of using a Hub is low cost, and easy integration. The disadvantage is reduced bandwidth, and data security. The reduction in bandwidth comes due to the fact that all workstations are in the same collision domain. If two or more workstations try to transmit during the same time, it results in collision of signals, and the signals are lost altogether. As a result, the available bandwidth of the Ethernet network is reduced.
Network Interface Card(NIC)
The Network Interface Card (NIC) used connect the computer to the external network. It will normally have a PCI connector (Edge connector) to connect to one of the PC expansion slots, and an RJ-45 connector to connect to external Ethernet. Note that the interface connectors may differ depending upon the expansion bus being used (for example, PCI, ISA, EISA, USB etc.), and the networking media being used (for example, 10Base2, 10Base5, 10BaseT, etc.). Each of these have their own interface specifications. Almost all NICs have LED indicators showing the network connectivity.
Wireless Access Point
A Wireless Access Point (WAP) is a transceiver or radio component in a wireless LAN that acts as the transfer point between wired and wireless signal and vice versa. The access point connects the wired LAN to an antenna. It bridges the wired and wireless networks together.
A Wireless Access Point operates in layer 3 of the OSI model.
Using Wireless Routers on ResNet
Many students have more than one network device (desktop, laptop, video game consoles, handheld devices, etc) they wish to use on the network simultaneously. However, ResNet only has enough available IP addresses to allow one network connection per student. So, you can either alternate which network device you currently have registered by editing Your Account (link on left sidebar) or you can use a network router.
Router Basics
A router is a network device allowing multiple computers, handheld devices and game consoles to communicate with each other and share a single connection to the Internet. They usually contain one uplink (WAN) jack and between 4 and 24 ethernet (LAN) jacks where network devices can be plugged in. By connecting a router in the correct way to ResNet, multiple network devices can share the same connection.
Securing Your Wireless Router
ResNet requires you to secure your wireless router to use it on ResNet. You must use wireless encryption, which encodes the data transmitted between your PC and your wireless router. Unfortunately, most routers ship with encryption turned off, leaving it completely exposed. Enable your router's encryption and use the strongest form supported by your comptuer. The Wireless Protected Access (WPA) protocol and more recent WPA2 have supplanted the older and less-secure Wireless Encryption Protocol (WEP).
network service
We can create a custom quote for your business based on the following services:
Campus Network Design
Network Design
Network Design and Implementation
Remote Network Solutions
When a company has several offices, remote connectivity is essential. In most cases, communicating only via email is far from adequate. File sharing, Windows domain-based services, and direct access between workstations are often needed. To achieve this, we build virtual tunnels between your offices, as well as to our own network. Machines in separate locations can now communicate as if they were on the same physical network. And for those working at home or on the road, we provide easy VPN access to the office network.
For critical applications, a single-sided network may not be adequate. Designing redundant systems is one of our specialties. We can set up router and switch redundancy with failover, up to a full network mesh. In case any one device fails, connectivity is not affected. In addition, we are able to utilize multiple Internet links, if available. They can be used in an active-standby scenario, or an active-active one. Load-balancing solutions play an important role in networking, and we take full advantage of what today’s technology offers.