Newsletter
Store home > Search
Search results
 
Showing 11-20 of 41 results
< 1 2 3 4 5 >
...require the number of multiplexors PDH networks do. • The speeds of an SDH’s core network and the multiplication of channels are different from PDH systems, too. The box at right details the characteristics. • SDH is a much more efficient metho...
...from the low bandwidth of voice-grade copper wire. At either end of the copper phone line (also known as "twisted copper pairs"), a DSL modem is installed. By adding ordinary telephone splitter boxes, the line can handle simultaneous voice connecti...
...Enhanced version of G.SHDSL Uses 2, 4 or 8 wires to transmit Ethernet and other signals Possible data rates: Up to 5,7 Mbps per 2 wires at up to 6 kilometers distance Up to 15 Mbps per 2 wires at up to 3,5 kilometers distance. • DSL makes use...
...the exploitation of vulnerable data communication equipment by technical surveillance or eavesdropping. • Unprotected equipment emit a signal into the air • What puts your data communication equipment at risk? Many things. But first and forem...
...just looking for free Internet access, but sometimes they’re looking for confidential information such as credit card numbers. And many war drivers, when they locate a wireless network, will post the GPS coordinates of that network on the Internet...
...This can include branch offices, unmanned information kiosks, alarm and control systems, and even HVAC systems for climate control. Other applications include unmanned remote monitoring stations, satellite control equipment at communications towers,...
Fiber To The Office • Fiber To The Office • The classical network • A classical network consists of a rack with switches and patch panels and outlets in your cable conduit. Between the outlets and the patch panel you use Cat5, 6 or 7 cables. H...
...routinely attacked tens of thousands of times every day. Intellectual property is stolen. Records are destroyed. Privacy is compromised. Our ever-growing, ever-faster cyber world makes protecting your network from Internet intruders ever more diffic...
...NAC) is a method of ensuring that only known devices are allowed to connect to your network and that they meet your network’s requirements before they are granted access. • This is NAC at its most basic level. However, today’s NAC is usually ...
...or even a packet of data traveling through a network. • Network addresses are hierarchical. The more details included, the more specific the address becomes and the easier it is to find. • Switches operating at Layer 3 are smarter than Layer ...
< 1 2 3 4 5 >

 
Top Products