Newsletter
Loja Online > Buscar
Resultados da busca
 
Mostrando 31-40 de 65 resultados
< 1 2 3 4 5 6 7 >
...The Black Box Explains series aims to make technology simple by providing you with a clear, concise overview of copper cabling technology helping you make an informed purchasing decision. • Copper cable for every environment • Solid vs Stranded Pa...
...The Black Box explain series make technology simple. It provides you with a clear, concise overview information about networking standards, so you can make an informed purchasing decision. • OSI Model • OSI is a layered network design framework th...
...be accessed via serial console, Telnet, and Secure Shell. These switches can often be configured and managed as groups. More recent managed switches may also support a Web interface for management through a Web browser. • These high-end switches en...
...combinations and which server was connected to which port—leading to many cryptic, scribbled notes attached to the switch and to the workstation. • Today's versions • But with the advent of on-screen menu's, an operator can use easy-to-read, pop-up...
...earlier (over shorter, less twisted pair) is moved more to the left side of the screen, the colour signal arriving later (over a longer pair with higher twist ratio) is moved to the right. • All colours displayed on a screen are made of red, green ...
...Network (ISDN), wireless, and Digital Subscriber Line (DSL). • Remote access enables remote users to dial into your LAN over the phone by using either land lines or a cellular connection. Typically, remote users plug their laptop modems into a h...
...directions to a series of nodes. FDDI accommodates up to 500 nodes per dual-ring network and allows up to 2 kilometers between adjacent nodes. FDDI uses the same token-passing scheme as the IEEE 802.5 Token Ring network to control transmissi...
...send the authentication request to the authenticator. The authenticator passes the request to the authentication server to authenticate and verify, and the server tells the authenticator if the request for authorization for those ports is granted.
< 1 2 3 4 5 6 7 >

 
Produtos Top