Sunday, May 15, 2011

Networking Articles and Tips

Networking Articles and Tips


WiFi Security Best Practices

Posted: 14 May 2011 11:22 PM PDT

1. Use WPA/WPA2 encryption. Avoid using Open or WEP-encrypted WiFi. Use WiFi Protected Access (WPA) or WPA2 with 802.1x authentication if possible. If you use a Pre-Shared Key (PSK) authentication, use a strong passphrase (aka WPA shared key) that is at least eight characters long and is a combination of alphanumeric and special characters. 2. Change default [...]


Reliable Multicast Framework for Light-weight Sessions and Application Level Framing

Posted: 14 May 2011 11:22 PM PDT

This paper describes SRM (Scalable Reliable Multicast), a reliable multicast framework for light-weight sessions and application level framing. The algorithms of this framework are efficient, robust, and scale well to both very large networks and very large sessions. The SRM framework has been prototyped in wb, a distributed whiteboard application, which has been used on [...]


Application Layer Network Window Management in the SSH Protocols

Posted: 10 May 2011 05:52 AM PDT

A number of network applications make use of multiplexed channels inside of a single TCP connection to handle data transfer and/or control information. Because these channels cannot make use of the TCP windows for flow control they must implement their own. This means that a second window can be imposed on top of the existing [...]


The Evolution of Mobile VPN and its Implications for Security

Posted: 10 May 2011 05:44 AM PDT

This document describes how Virtual Private Networking (VPN) technology is evolving for use in wireless handheld devices. Mobile VPNs enable enterprises and service providers to extend their services to mobile employees and partners without compromising the risk in their existing security standards. Traditionally, Virtual Private Networking (VPN) is discussed in the context of creating a [...]


No comments:

Post a Comment