Word: subnet
(lookup in dictionary)
(lookup stats)
Dates: all
Sort By: most recent first
(reverse)
...network bandwidth is not managed, filesharing traffic can overwhelm certain students’ subnet,s” he said...
Before you start installing anything, make sure you have the following information handy: your broadband connection's IP address, subnet mask, default gateway and DNS IP addresses. You can get these things from your Internet provider; your customer-service rep will know what you're talking about. Each is just a series of numbers (e.g., 123.43.2.1) that you'll be prompted to plug in during setup. (If your provider supports a protocol called DHCP, your router should retrieve these settings automatically when you plug it in.) You may also be asked to choose an SSID (service set identifier), work-group...
...termination points for a subnet are the ethernet datajacks in student rooms. Within the subnet, the traffic on the network actually travels to all points, so that when you enter your password, the information is broadcast across the subnet to every datajack...
What prevents others from simply grabbing your information is that most of the time, your computer only views what is intended for it. However, there are tools that allow access to all network traffic on a subnet. Such a technique is referred to as IP-sniffing, and if put to malicious use someone can, for example, collect all the login information flying across the subnet...
...post on harvard.general yesterdayafternoon, Unix Systems Programmer Tom Heftindicated that the fas, husc7, scunix1 and scunix5machines will be split off onto one subnet, whileeverything else will be placed on another subnet...