|VDSL MCM Simulation||Tim Clark (UNH-IOL)||
An introduction to MCM for VDSL.
|October 2, 2002||Tutorials|
|Voice over DSL (An Overview)||Deirdre Dinan, Mike Littlefield (UNH-IOL)||
This presentation provides an overview and introduction to Voice over DSL (VoDSL) technologies. The presentation covers the basics of channels voice over DSL, Voice over ATM (VoATM) and Voice over IP (VoIP). The presentation also includes a quick introduction to BLES, which is used to transport voice of AAL2 over ATM.
|June 26, 2012||Tutorials|
|Voice Over IP and Wireless Data Coexistence in a WLAN Switch Deployment||Tom Leary, UNH-IOL; Aruba Networks||
Wireless technology is becoming increasingly integrated into the world's networks. Recent innovations, such as offloading processing to wireless local area network (WLAN) switches at the network's edge, have cleared the way for large-scale enterprise deployments. However, despite improved maintenance and administration tools, switched WLAN networks are vulnerable to issues arising from the heterogeneous network environment, especially the integration of services such as voice over IP (VoIP). An open-industry enterprise services and security test event held from March 21 to March 25, 2005 at the University of New Hampshire InterOperability Laboratory (UNH-IOL) provided a backdrop for testing these solutions.
|May 13, 2005||White Papers|
|What is DLNA Testing?||Austin Pond||
What is DLNA testing? DLNA Testing entails many different forms of testing, all of which are necessary for certification: Pre-Testing, MCVT, CTT, Interoperability, Auto-IP/Small Network, and possibly LPTT. These tests must all pass for all device classes to properly ensure DLNA protocol compliance and interoperability.
|April 16, 2015||Tutorials|
|Wireless Networking Overview||Kevin Karcz, Jeremy Kent||
An overview of various wireless networking technologies, their relationship to one another, and a look at emerging standards.
|September 18, 2014||Tutorials|
|Wireshark Color Filters Tutorial||Jeff Laird||
Explains the use of PTP color filters in Wireshark. Goes with the file: (IOL_PTP_Wireshark_color_filters.txt)
|March 10, 2012||Tutorials|
|WPA-PSK: Step-by-Step||Jeremy deVries||
In today's age of ubiquitous SOHO networks and ever more Wi-Fi in laptops, security is a paramount concern. Unsecured or improperly set up wireless networks can leave you vulnerable to intrusion, viruses, hijacking of bandwidth, and more problems than one can list, which is why properly setting up your secured network using an authentication mechanism such as WPA-PSK is a crucial step in creating a wireless network. This article provides an overview of the Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) security mechanism, and a step-by-step guide to securing your wireless network.
|September 30, 2005||Tutorials|