Sorry, we were unable to sign you in.
Please check your email address and password.
Your last basket is still available
The basket of your last visit to Black Box is still available.
Would you like to view the products in this basket?
The Black Box website uses cookies. By continuing the use of the Black Box website, or by pressing the agree button on the right, you consent to the use of cookies on this website.
More information.
...The Black Box explain series make technology simple. It provides you with a clear, concise overview information about networking standards, so you can make an informed purchasing decision. • OSI Model • OSI is a layered network design framework th...
...earlier (over shorter, less twisted pair) is moved more to the left side of the screen, the colour signal arriving later (over a longer pair with higher twist ratio) is moved to the right. • All colours displayed on a screen are made of red, green ...
...be accessed via serial console, Telnet, and Secure Shell. These switches can often be configured and managed as groups. More recent managed switches may also support a Web interface for management through a Web browser. • These high-end switches en...
...combinations and which server was connected to which port—leading to many cryptic, scribbled notes attached to the switch and to the workstation. • Today's versions • But with the advent of on-screen menu's, an operator can use easy-to-read, pop-up...
...Network (ISDN), wireless, and Digital Subscriber Line (DSL). • Remote access enables remote users to dial into your LAN over the phone by using either land lines or a cellular connection. Typically, remote users plug their laptop modems into a h...
...directions to a series of nodes. FDDI accommodates up to 500 nodes per dual-ring network and allows up to 2 kilometers between adjacent nodes. FDDI uses the same token-passing scheme as the IEEE 802.5 Token Ring network to control transmissi...
...equipment —especially servers— generates a lot of heat in a relatively small area. Today’s servers are smaller and have faster CPUs than ever. Because most of the power used by these devices is dissipated into the air as heat, they can really stra...
...send the authentication request to the authenticator. The authenticator passes the request to the authentication server to authenticate and verify, and the server tells the authenticator if the request for authorization for those ports is granted.
...you will need a print server and a router to send and receive e-mails. • If you send e-mails and make appointments with your customers you surely need to have the correct time on your computer. Computer clocks are not as accurate as they should be...