Network Terminology Review

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Network Terminology Review"

Transcription

1 Network Terminology Review For those of you who have experience with IP networks, this document may serve as a reminder of the current lexicon of terms used in our industry. If you re new to it or specialized in some other field such as business management or accounting, it might serve as a frightening reminder of just how fast our world is hurtling around the sun. If you find yourself in the latter group, our advice is Don t Panic. Remain calm. We re going to make this easy for you, and you will come away from your training with the high level knowledge you need in order to manage the Home Cyber Shield process within your company. During your training, we ll literally be exploring the world of the IP Network. We ll literally be looking under the hood of the Internet. And we can assure you that the concepts behind everything you ll experience are easily explained and easily understood. We can also assure you that you will in no way be harmed or feel any pain. It is our intention that your experience will enlighten and embolden you to create more harmonic networks and achieve world peace. Please read over the terms and make note of ones that you feel you don t understand. We will be using them in the training fairly liberally. If at any time we mention a term and you find you re not remembering or understanding it, please interrupt and let us know. We ll stop and tell you what it is and what it does. Be of good cheer. Soon, you ll be spouting acronyms and meaningless groups of numbers like a pro! The terms are arranged for you by functional group. You may or may not use all of these. Your IP Enabled Machine Your Computer Hardware Internet Protocol (IP) is the protocol for communication over the internet. (the language the internet speaks) Network Interface Controller (NIC or NIC Card) is the piece of hardware in your computer that physically connects you to the Internet. You typically plug your RJ45 connector here. A wireless connection is also considered a NIC. Media Access Control Address (MAC Address) is a unique number hard coded onto most network interfaces that is manufacturer specific. This is the address that is really being routed by a router and is a way to identify unique devices. There are no two MAC Addresses that are the same on the planet. (in theory ) Each NIC in your machine has a unique MAC Address.

2 IP Address is an address given to all computers on the Internet. It is how one machine sends a message to another. Each message is prefaced with the address it wants to send the message to. If you computer is connected by an Ethernet cable to a switch/router, it is on a network. A computer is given an IP Address by the person who sets up the computer typically. It can be typed in manually or set up to go looking for an address. (DHCP Dynamic Host Configuration Protocol) There are currently two forms this address can be. (IPv4 and IPv6) For our discussion we ll stick to IPv4 (version 4), as IPv6 is relatively new. An IPv4 address is a series of 4 numbers separated by dots (.) The numbers are actually expressed in binary, but we translate them into decimal for easy reading. The address might look something like Like postal mail, you need to send and receive data with the correct address. Otherwise your message won t go to the correct place. The numbers can range from 0 to 255. IP Networking Wiring It Together Network Switch is basically a hub for your network. Typically, all devices are connected to a switch to create the network. Think of a central hub (the switch) with spokes radiating out to the devices on the network (computers, printers, wireless access points, routers, etc.). This device is what creates an IP Network. Network Router is a specialized device that moves data from one network to another and is typically used to manage a LAN (Local Area Network) and traffic in and out of the LAN. Dynamic Host Configuration Protocol (DHCP) This is the communication method used by computers or other IP devices to ask for an IP Address. If you set your machine s IP address setup to DHCP upon boot up or network connection it will send out a request to any listening DHCP server and ask for an acceptable IP address. The DHCP server will respond by giving you an open address. You typically only want one DHCP server on your local network. This server makes sure your IP address is unique on the local network. That way no two computers will be sending/receiving information on the same address. Other important information is typically sent to your machine with this request as well. Such as: Where your main route to the outside world is (Gateway Address) Where you are to get your domain names translated and routed (Example: DNS Server converts to ) Static IP is when you manually set your machine s Internet settings, such as IP address, Subnet Mask, Gateway IP address, DNS server(s) IP addresses, etc

3 Local Area Network (LAN) is your local network. (the computer network immediately around you. Such as a home or small business.) The LAN is usually managed by a single router and switch(es) but can be larger. Wide Area Network (WAN) is the larger network outside your LAN. In a larger company you may be part of a smaller LAN (ex: the accounting department) which is part of the WAN of your overall company. The Internet in general is the ultimate WAN. This is the world wide computer network of which we are all a part. The WAN can be a dangerous place if you re not careful. Gateway is the device that routes WAN network traffic to and from your LAN network. Firewalls come in more forms then we can possible cover in this training; fundamentally a firewall is intended to prevent or permit access to a network, network segment, or network service. They are built into most routers now but the quality and speed at which they work can vary greatly based on the quality of device being used. A Firewall is what protects your LAN from the WAN. It also can be used to permit or deny certain types of traffic on the LAN. Bandwidth there are several definitions for this, but for our purposes this is the measurement of data moving through a device interface. This is usually broken down into upload/download. This is not a measurement of available bandwidth, but of current usage. The Lower Level Internet Simple Network Management Protocol (SNMP) is a network protocol designed to help IT people manage IP networks. We use it to monitor network attached devices for conditions that have changed and need our attention. SNMP is one of the most important features that we can look for in networking equipment that might not be familiar to everyone. This is part of what can separate a 30 dollar router from a 200 dollar router. If a device supports SNMP, we can tell a tremendous amount of information about it, such as data throughput, system uptime, internal temperature, etc. A router or a switch can also tell us information about the devices attached to them. ICMP Ping (PING) for the purposes of this training we will always refer to this as just Ping. Further more, we will assume that Ping means an ICMP (Internet Control Message Protocol) echo request, as there is more then one type of ping. So quite simply, a ping is a message that is sent to a device with a request for a response. If a device responds, we can note how long it took to respond and what percentage of times it was asked for a response. This is the most basic form of monitoring. If a device does not support SNMP, this might be the only way we can get information about it. Management Information Base (MIB) this is the database that stores all of the device specific variables that are checked via SNMP.

4 Intrusion Detection Systems (IDS) are built into some routers or can be a stand alone service or device. They scan network traffic in real time, in an attempt to detect malicious behavior. They send messages to the Home Cyber Shield system via SNMP traps. Intrusion Prevention Systems (IPS) are built into some routers or can be stand alone network devices. They are similar to IDS systems, except they go a step further and try and block malicious traffic from the network. It is important to note that neither of these systems are 100% accurate nor foolproof cyber solutions. Remote Desktop Protocol (RDP) is a Microsoft proprietary network protocol that provides a means of remote control for computers. RDP in and of itself is not a secure protocol; however it can be run across other secure protocols. It is one possible method for connecting to a Home Cyber Shield system. Network Monitoring Terminology To give you context in order to understand these terms, let us create a scenario with you. A client has a network that you are monitoring and has a network camera that is not showing up online. You get an that alerts you to the situation. In this scenario, the IP Camera is the network element (it would have a device classification of camera ). We would be checking the availability of the camera via a ping poller. This poller would have a preset rule that says, if the ping takes longer the 100ms do XYZ. The XYZ event that happens is an action (in this case, John Doe). With the Home Cyber Shield system, you are able to customize the preset rule and the actionable event if the rule is broken. The World Wide Web The Upper Level Of The Internet Hypertext Transfer Protocol (HTTP) is one of the fundamental protocols that the Internet and connected devices use to provide information to an end user or to each other. Everyone uses this any time you connect to a web page. The reason this is important is because HTTP is a common way to connect to a network device for activating it or configuring it. It also provides a method of checking to see if a device is operating normally. Domain Name System (DNS) is what allows us to type instead of There are several DNS servers that do this, depending on which one a given website is registered with. Dynamic DNS (DDNS) allows us to provide a client with a Dynamic IP address with a URL or web address that never changes. For instance, if your client uses Comcast for their Internet service provider and Comcast changed your client s IP randomly once a week, you would have trouble knowing where to go to if you needed to connect to a device on their network using the Home Cyber Shield system. So, you would simply install a DDNS updater register with a DDNS server and choose a URL and now even if your client s IP address changes, you can always go to that same web address to access their network. We have built a

5 DDNS updater into the Home Cyber Shield system to help you if a client does not have a static or non changing IP address. Pretty cool, huh? File Transfer Protocol (FTP) is a protocol for transferring files between two network devices. Integrators use it primarily to upload programs to Control systems. Simple Mail Transfer Protocol (SMTP) is a protocol to transfer mail across IP networks. Post Office Protocol (POP3) (with the three standing for the 3 versions) is used by a local client to get from a mail server. Telnet is a network protocol that provides bidirectional connectivity to a network device and is usually used to set up network enabled devices via a virtual terminal. Control systems are often configured this way, as are some routers. Usually one telnets into a device with a terminal (such as Hyperterminal) and types commands. Home Cyber Shield (Powered by dopplervue) Specific Terms Network Elements This is another name for any network device or service that is being monitored by the network monitoring software. Alerts / Alarms happen when a preset threshold is reached by any of the network elements. For example, a device ping response time is outside a given range. An alarm would trigger an action; one of which would be to create a system alert and one of which would be to send an or text message. Alarms are what allow you to be notified of a problem. They are depicted visually and can also trigger a number of actions ( alert, auto power cycle, etc). Device Classifications are broad categories that devices fit into. Router, WAP, Camera, etc. They can be user defined, but we have put some common ones together already in the software which we review in our training sessions. Poller These are jobs that are checking or polling individual network elements. So, if you are pinging a device, you are running a ping poller. They are run automatically at preset intervals. You can change how often these jobs run on any given device. The default is once every 5 minutes meaning, Home Cyber Shield looks to see if every device is responding every 5 minutes, 24/7/365. Network Discovery is the process of having the network monitoring software look for network devices it wishes to monitor. This is done by the Home Cyber Shield software package. Neat. Rules are preset ranges of variables that can trigger actions if a device falls outside the preset variables range. For example, a rules exists that triggers an action if a device takes longer than 100ms to respond to a ping.

6 Events are similar to rules. Except they are not polled, but are sent to the network monitoring software by an SNMP enabled device. Actions are triggered by rules. An action can create an alarm or send an . Peer Node is the name of each client s Home Cyber Shield server. Groups are a way to organize your inventory across multiple client networks. Items may be grouped by location, type, etc. in order to allow for quick access to information about specific inventory items. (Cameras, WAPs, Touch Panels, etc)

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

Multi-Homing Dual WAN Firewall Router

Multi-Homing Dual WAN Firewall Router Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet

More information

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

CompTIA Network+ N Official Cert Guide Mapping Guide to CompTIA Network+ Simulator Labs

CompTIA Network+ N Official Cert Guide Mapping Guide to CompTIA Network+ Simulator Labs CompTIA Network+ N10 005 Official Cert Guide Mapping Guide to CompTIA Network+ Simulator Labs Domain 1.0: Network Concepts 1.1 Compare the layers of the OSI and TCP/IP Models TCP/IP Model Layer Matching

More information

TENVIS Technology Co., Ltd. User Manual. For H.264 Cameras. Version 2.0.0

TENVIS Technology Co., Ltd. User Manual. For H.264 Cameras. Version 2.0.0 TENVIS Technology Co., Ltd User Manual For H.264 Cameras Version 2.0.0 Catalogue Basic Operation... 3 Hardware Installation... 3 Search Camera... 3 Get live video... 5 Camera Settings... 8 System... 8

More information

s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] Topic break down Topic No. of Questions Topic 1: Network Architecture 183 Topic 2: Network Operations 149

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

How To Understand and Configure Your Network for IntraVUE

How To Understand and Configure Your Network for IntraVUE How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of

More information

Basic Network Configuration

Basic Network Configuration Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

Chapter 15: Advanced Networks

Chapter 15: Advanced Networks Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

Firewall Firewall August, 2003

Firewall Firewall August, 2003 Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also

More information

Application Note Configuring the UGate 3000 for use with ClipMail Pro and ClipExpress

Application Note Configuring the UGate 3000 for use with ClipMail Pro and ClipExpress Application Note Configuring the UGate 3000 for use with Introduction This Application Note guides the ClipMail user through the UGate gateway configuration process by using a simple dial up connection

More information

Multi-Homing Security Gateway

Multi-Homing Security Gateway Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000

More information

CompTIA Network+ (Exam N10-005)

CompTIA Network+ (Exam N10-005) CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

Load Balance Router R258V

Load Balance Router R258V Load Balance Router R258V Specification Hardware Interface WAN - 5 * 10/100M bps Ethernet LAN - 8 * 10/100M bps Switch Reset Switch LED Indicator Power - Push to load factory default value or back to latest

More information

6.0. Getting Started Guide

6.0. Getting Started Guide 6.0 Getting Started Guide Netmon Getting Started Guide 2 Contents Contents... 2 Appliance Installation... 3 IP Address Assignment (Optional)... 3 Logging In For the First Time... 5 Initial Setup... 6 License

More information

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if

More information

Computer Networking Fundamentals

Computer Networking Fundamentals Job Ready Assessment Blueprint Computer Networking Fundamentals Test Code: 4414 / Version: 01 Copyright 2011. All Rights Reserved. General Assessment Information Computer Networking Fundamentals Blueprint

More information

Accessing Remote Devices via the LAN-Cell 2

Accessing Remote Devices via the LAN-Cell 2 Accessing Remote Devices via the LAN-Cell 2 Technote LCTN0017 Proxicast, LLC 312 Sunnyfield Drive Suite 200 Glenshaw, PA 15116 1-877-77PROXI 1-877-777-7694 1-412-213-2477 Fax: 1-412-492-9386 E-Mail: support@proxicast.com

More information

Computer Networking Fundamentals

Computer Networking Fundamentals Teacher Assessment Blueprint Test Code: 5910 / Version: 01 Copyright 2011 NOCTI. All Rights Reserved. General Assessment Information Blueprint Contents General Assessment Information Written Assessment

More information

NQA Technology White Paper

NQA Technology White Paper NQA Technology White Paper Keywords: NQA, test, probe, collaboration, scheduling Abstract: Network Quality Analyzer (NQA) is a network performance probe and statistics technology used to collect statistics

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion...

IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion... IP Link Best Practices for Network Integration and Security Table of Contents Introduction...2 Passwords...4 ACL...5 VLAN...6 Protocols...6 Conclusion...9 Abstract Extron IP Link technology enables A/V

More information

Connecting to and Setting Up a Network

Connecting to and Setting Up a Network Chapter 9 Connecting to and Setting Up a Network Reviewing the Basics 1. How many bits are in a MAC address? 48 bits 2. How many bits are in an IPv4 IP address? In an IPv6 IP address? 32 bits, 128 bits

More information

Digicom Remote Control for the SRT

Digicom Remote Control for the SRT Digicom Remote Control for the SRT To operate the SRT remotely, use Remote Desktop; this is available free for Linux, Mac OS-X (from Microsoft), and is included with Windows XP and later. As RD uses a

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Evaluation guide. Vyatta Quick Evaluation Guide

Evaluation guide. Vyatta Quick Evaluation Guide VYATTA, INC. Evaluation guide Vyatta Quick Evaluation Guide A simple step-by-step guide to configuring network services with Vyatta Open Source Networking http://www.vyatta.com Overview...1 Booting Up

More information

Connecting with Computer Science, 2e. Chapter 5 The Internet

Connecting with Computer Science, 2e. Chapter 5 The Internet Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar

More information

Broadband Router User s Manual

Broadband Router User s Manual Broadband Router User s Manual Table of Contents Chapter 1 Introduction...4 1.1 The Broadband Router......4 1.2 Physical Features of Broadband Router...4 1.3 Non-Physical Features of Broadband Router..

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which

More information

Chapter 4 Customizing Your Network Settings

Chapter 4 Customizing Your Network Settings . Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It

More information

1. Hardware Installation

1. Hardware Installation 4 Port 10/100M Internet Broadband Router with USB Printer server Quick Installation Guide #4824904AXZZ0 1. Hardware Installation A. System Requirement Before you getting started, make sure that you meet

More information

Quick Note 53. Ethernet to W-WAN failover with logical Ethernet interface.

Quick Note 53. Ethernet to W-WAN failover with logical Ethernet interface. Quick Note 53 Ethernet to W-WAN failover with logical Ethernet interface. Digi Support August 2015 1 Contents 1 Introduction... 2 1.1 Introduction... 2 1.2 Assumptions... 3 1.3 Corrections... 3 2 Version...

More information

Broadband Router ESG-103. User s Guide

Broadband Router ESG-103. User s Guide Broadband Router ESG-103 User s Guide FCC Warning This equipment has been tested and found to comply with the limits for Class A & Class B digital device, pursuant to Part 15 of the FCC rules. These limits

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

Legal Disclaimers. For C-UL Listed applications, the unit shall be installed in accordance with Part 1 of the Canadian Electrical Code.

Legal Disclaimers. For C-UL Listed applications, the unit shall be installed in accordance with Part 1 of the Canadian Electrical Code. ACS5000 Networking Admin Interface Guide 1/21/2015 Legal Disclaimers Federal Communications Commission (FCC) Compliancy This equipment has been tested and found to comply with the limits for a Class B

More information

Chapter 4 Managing Your Network

Chapter 4 Managing Your Network Chapter 4 Managing Your Network This chapter describes how to perform network management tasks with your ADSL2+ Modem Wireless Router. Backing Up, Restoring, or Erasing Your Settings The configuration

More information

7 6.2 Windows Vista / Windows 7. 10 8.2 IP Address Syntax. 12 9.2 Mobile Port. 13 10.2 Windows Vista / Windows 7. 17 13.2 Apply Rules To Your Device

7 6.2 Windows Vista / Windows 7. 10 8.2 IP Address Syntax. 12 9.2 Mobile Port. 13 10.2 Windows Vista / Windows 7. 17 13.2 Apply Rules To Your Device TABLE OF CONTENTS ADDRESS CHECKLIST 3 INTRODUCTION 4 WHAT IS PORT FORWARDING? 4 PROCEDURE OVERVIEW 5 PHYSICAL CONNECTION 6 FIND YOUR ROUTER S LOCAL NETWORK IP ADDRESS 7 6.1 Windows XP 7 6.2 Windows Vista

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time Essential Curriculum Computer Networking 1 PC Systems Fundamentals 35 hours teaching time Part 1----------------------------------------------------------------------------------------- 2.3 hours Develop

More information

WhatsUp Gold v11 Features Overview

WhatsUp Gold v11 Features Overview WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity

More information

Meraki MX50 Hardware Installation Guide

Meraki MX50 Hardware Installation Guide Meraki MX50 Hardware Installation Guide January 2011 Copyright 2010, Meraki, Inc. www.meraki.com 660 Alabama St. San Francisco, California 94110 Phone: +1 415 632 5800 Fax: +1 415 632 5899 Copyright: 2010

More information

Prestige 650R-31/33 Read Me First

Prestige 650R-31/33 Read Me First Prestige 650R-31/33 Read Me First Prestige Rear Panel Connections PORT DSL CONSOLE LAN 10/100M POWER Connect to a telephone jack using a telephone wire. CONNECTION Connect to a serial port (COM port) on

More information

HREP Series DVR DDNS Configuration Application Note

HREP Series DVR DDNS Configuration Application Note HREP Series DVR DDNS Configuration Application Note DDNS enables your HREP Series DVR to be remotely accessed using a Dynamic DNS server, which is commonly used if a broadband connection does not have

More information

3.5 EXTERNAL NETWORK HDD. User s Manual

3.5 EXTERNAL NETWORK HDD. User s Manual 3.5 EXTERNAL NETWORK HDD User s Manual Table of Content Before You Use Key Features H/W Installation Illustration of Product LED Definition NETWORK HDD Assembly Setup the Network HDD Home Disk Utility

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

Wifi Pan/Tilt IP Camera User Manual

Wifi Pan/Tilt IP Camera User Manual Wifi Pan/Tilt IP Camera User Manual Rev. 3.0 Software Version 3.00 May. 25 th.2009 Table of Contents 1. PRODUCT VIEWS...3 1.1. PRONT PANEL...3 1.2. BACK PANEL...3 1.3. ACCESSORIES...4 2. SETUP AND STARTUP...5

More information

Study Guide CompTIA A+ Certification, Domain 2 Networking

Study Guide CompTIA A+ Certification, Domain 2 Networking Study Guide CompTIA A+ Certification, Domain 2 Networking Brought to you by RMRoberts.com Introduction to CSR Domain - 2 (220-801) The CompTIA A+ 220-801 Domain 2 Networking has expanded a lot since the

More information

networking revision B

networking revision B networking revision B Table of Contents Local area network options (Single Main Repeater Systems)... 3 Wired/Wi-Fi connection through Wi-Fi router... 3 Wired connection through router... 4 Direct connection...

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

Quick Installation Guide

Quick Installation Guide V48.01 Model: FI8919W Quick Installation Guide Outdoor Pan/Tilt Wireless IP Camera For Windows OS ------- Page 1 For MAC OS ------- Page 15 ShenZhen Foscam Intelligent Technology Co., Ltd Quick Installation

More information

CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab

CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab CET442L Lab #2 IP Configuration and Network Traffic Analysis Lab Goals: In this lab you will plan and implement the IP configuration for the Windows server computers on your group s network. You will use

More information

Virtual Server in SP883

Virtual Server in SP883 Virtual Server in SP883 1 Introduction: 1.1 Micronet SP883 is a hard QoS broadband router, means its guaranteed service can provide absolute reservation of resource (bandwidth) for specific traffic;not

More information

Quick Installation Guide

Quick Installation Guide Model: FI8905E Quick Installation Guide Ourdoor POE Network Camera For Windows OS ------- Page 1 For MAC OS ------- Page 14 ShenZhen Foscam Intelligent Technology Co., Ltd Quick Installation Guide - For

More information

Olson Electronics Remote Power Monitoring Meter

Olson Electronics Remote Power Monitoring Meter Olson Electronics Remote Power Monitoring Meter Operation Guide Key Features Amps: 00.00 to 32.00A True RMS (rated short period to 40A) Volts: 200.0 to 250.0V True RMS Watts: 0000 to 9999W KWh: 000000.0

More information

Manual. IP Sensor and Watchdog IPSW2210. I P S W 2 2 1 0 M a n u a l P a g e 1. Relay Output. Power input. 12VDC adapter LED Indicators. 2 Dry.

Manual. IP Sensor and Watchdog IPSW2210. I P S W 2 2 1 0 M a n u a l P a g e 1. Relay Output. Power input. 12VDC adapter LED Indicators. 2 Dry. IP Sensor and Watchdog IPSW2210 Manual Relay Output Power input 12VDC adapter LED Indicators 1 wire 2 Dry Output Green : Power Yellow: Link temperature & humidity contact inputs LED indicator sensor input

More information

Internetworking and IP Address

Internetworking and IP Address Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address

More information

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:

More information

Quick Installation Guide

Quick Installation Guide V2.01 Model: FI9821W Quick Installation Guide Indoor HD Pan/Tilt Wireless IP Camera Black White For Windows OS ------- Page 1 For MAC OS ------- Page 16 ShenZhen Foscam Intelligent Technology Co., Ltd

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

qwertyuiopasdfghjklzxcvbnmqw ertyuiopasdfghjklzxcvbnmqwert yuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopa ghjklzxcvbnmqwertyuiopasdfghj

qwertyuiopasdfghjklzxcvbnmqw ertyuiopasdfghjklzxcvbnmqwert yuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopa ghjklzxcvbnmqwertyuiopasdfghj qwertyuiopasdfghjklzxcvbnmqw ertyuiopasdfghjklzxcvbnmqwert yuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopa Network Discovery sdfghjklzxcvbnmqwertyuiopasdf ARST 5100 Archives and Technology

More information

VIA CONNECT PRO Deployment Guide

VIA CONNECT PRO Deployment Guide VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

Networking Basics for Automation Engineers

Networking Basics for Automation Engineers Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------

More information

CONTENTS. 1. Outline of how to use.1 2. How to setup each step...1

CONTENTS. 1. Outline of how to use.1 2. How to setup each step...1 CONTENTS 1. Outline of how to use.1 2. How to setup each step...1 2.1 Connect your IP Camera to the LAN..1 2.2 Install the following software before view video.....2 2.3 Basic configuration setting...2

More information

GCSE Computing A451 Unit 6.1 Networks

GCSE Computing A451 Unit 6.1 Networks Candidates should be able to: a. Explain the advantages of networking stand-alone computers into a LAN b. Describe H/W needed to connect stand-alone computers into a LAN, including hub/switches, wireless

More information

Network Discovery Preparing for Installation

Network Discovery Preparing for Installation Peregrine Network Discovery Preparing for Installation PART NO: PND-5.0.1-ENG-01011-00284 Copyright 2003 Peregrine Systems, Inc. or its subsidiaries. All rights reserved. Information contained in this

More information

Chapter 2 Connecting the FVX538 to the Internet

Chapter 2 Connecting the FVX538 to the Internet Chapter 2 Connecting the FVX538 to the Internet Typically, six steps are required to complete the basic connection of your firewall. Setting up VPN tunnels are covered in Chapter 5, Virtual Private Networking.

More information

Gigabit Multi-Homing VPN Security Router

Gigabit Multi-Homing VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is a ideal to help the SMBs increase the broadband

More information

IP Address and Pre-configuration Information

IP Address and Pre-configuration Information IP Address and Pre-configuration Information Ethernet Connectivity: Connect your workstation or device to the Digi Cellular Device via one of these methods: Direct from workstation to Digi Cellular Device

More information

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer) Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

ipad Installation and Setup

ipad Installation and Setup ipad Installation and Setup INDEX ipad Features Page 2 Charging.. Page 2 User Guide... Page 3 Setup for ipad use in the office (Office wireless network) Setup Office computers Verify Remote Desktop is

More information

VoIP 110R/200R/422R/404R/440R. User s Guide

VoIP 110R/200R/422R/404R/440R. User s Guide VoIP 110R/200R/422R/404R/440R User s Guide Trademarks Contents are subject to revise without prior notice. All trademarks belong to their respective owners. FCC Warning This equipment has been tested and

More information

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Why should you be concerned? There are over 1 million known computer viruses. An unprotected computer on the

More information

Using Cisco UC320W with Windows Small Business Server

Using Cisco UC320W with Windows Small Business Server Using Cisco UC320W with Windows Small Business Server This application note explains how to deploy the Cisco UC320W in a Windows Small Business Server environment. Contents This document includes the following

More information

Apple s Time Capsule

Apple s Time Capsule FOREVERWARM CONSULTING INC Self-Help Series How to setup Apple s Time Capsule in your Microsoft Windows based Small Business or Home Office A step-by-step guide to installing Apple s Time Capsule in your

More information

Communications and Networking

Communications and Networking Communications and Networking History and Background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and

More information

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------

More information

Chapter 3 Connecting the Router to the Internet

Chapter 3 Connecting the Router to the Internet Chapter 3 Connecting the Router to the Internet This chapter describes how to set up the router on your Local Area Network (LAN) and connect to the Internet. It describes how to configure your DG834GT

More information

Chapter 2 TCP/IP Networking Basics

Chapter 2 TCP/IP Networking Basics Chapter 2 TCP/IP Networking Basics A network in your home or small business uses the same type of TCP/IP networking that is used for the Internet. This manual provides an overview of IP (Internet Protocol)

More information

TCP/IP Basis. OSI Model

TCP/IP Basis. OSI Model TCP/IP Basis 高 雄 大 學 資 訊 工 程 學 系 嚴 力 行 Source OSI Model Destination Application Presentation Session Transport Network Data-Link Physical ENCAPSULATION DATA SEGMENT PACKET FRAME BITS 0101010101010101010

More information

Quick Installation Guide

Quick Installation Guide V2.01 IP Wired / Wireless Camera Quick Installation Guide (For Windows OS) Model: FI8602/FI8602W ShenZhen Foscam Intelligent Technology Co., Ltd Packing List Quick Installation Guide 1) IP CAMERA X 1 2)

More information

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under

More information

Gigabit Content Security Router

Gigabit Content Security Router Gigabit Content Security Router As becomes essential for business, the crucial solution to prevent your connection from failure is to have more than one connection. PLANET is the Gigabit Content Security

More information

Configuring Routers and Their Settings

Configuring Routers and Their Settings Configuring Routers and Their Settings When installing a router on your home network the routers settings are usually defaulted to automatically protect your home, and simplify setup. This is done because

More information

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE Virtual Server and DDNS For BIPAC 741/743GE August, 2003 1 Port Number In TCP/IP and UDP networks, a port is a 16-bit number, used by the host-to-host protocol to identify to which application program

More information

EDGE FX Network configuration

EDGE FX Network configuration Page 1 of 16 TITLE: Category: EDGE FX Network configuration GERBER EDGE Document Number: 4280 Supplied by: Gerber Service Last Modified: April 14, 2011 Summary: In order to connect an EDGE FX to your PC

More information

Networking 4 Voice and Video over IP (VVoIP)

Networking 4 Voice and Video over IP (VVoIP) Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

LAN TCP/IP and DHCP Setup

LAN TCP/IP and DHCP Setup CHAPTER 2 LAN TCP/IP and DHCP Setup 2.1 Introduction In this chapter, we will explain in more detail the LAN TCP/IP and DHCP Setup. 2.2 LAN IP Network Configuration In the Vigor 2900 router, there are

More information

your Gateway Windows network installationguide 802.11b wireless series Router model WBR-100 Configuring Installing

your Gateway Windows network installationguide 802.11b wireless series Router model WBR-100 Configuring Installing your Gateway Windows network installationguide 802.11b wireless series Router model WBR-100 Installing Configuring Contents 1 Introduction...................................................... 1 Features...........................................................

More information

Local Area Networks: Internetworking

Local Area Networks: Internetworking Local Area Networks: Internetworking Chapter 81 Learning Objectives List the reasons for interconnecting multiple local area networks and interconnecting local area networks to wide area networks. Identify

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503

More information

9025- TCP/IP Networking. History and Standards. Review of Numbering Systems. Local Signaling. IP Addressing

9025- TCP/IP Networking. History and Standards. Review of Numbering Systems. Local Signaling. IP Addressing 9025- TCP/IP Networking History and Standards ARPA NCP TCP, IP, ARPANET PARC Collaborative Network Requirements One Protocol? Peer-to-Peer Protocols Documentation and RFCs RFC Categories Where to Find

More information