A brief list of acronyms used in the Ethernet, Fast Ethernet, Gigabit Ethernet, 10Gigabit Ethernet and Power over Ethernet consortia.
|Tutorials||June 29, 2012|
|USGv6 Informational Webinar||
Check out our latest webinar highlighting updates for the USG Test Program and IPv6 Ready Logo program with industry experts Timothy Winters, UNH-IOL; Michayla Newcombe, UNH-IOL and Doug Montgomery, NIST, as they discuss new updates on the USGv6 Test Program.
|External Links||January 2, 2020|
|USGv6 Registry Infographic||Mara Johnson||
Exciting stats to share for the 10th year of the USGv6 Registry! Check below to learn about the products tested, IPv6 capabilities, and more. As of May 2020 there have been 550 total products tested and more to share.
|Tutorials||February 3, 2021|
|USGv6 Testing Process||Michayla Newcombe||
Learn about the USGv6 Testing Process including in-house pre testing, all in this downloadable info graphic.
|Tutorials||February 28, 2022|
|VDSL MCM Simulation||Tim Clark (UNH-IOL)||
An introduction to MCM for VDSL.
|Tutorials||October 2, 2002|
|vIOLett Test Software for Avnu TSN Certification||
Learn how to configure and use our test tool, vIOLett, to test Time Sensitive Networking to be better prepared for certification testing. vIOLett includes 802.1AS (gPTP); 802.1BA and more for coverage all within the vIOLett for Avnu test package. Check out this demo and install video for more information on vIOLett.
|External Links||December 17, 2019|
|Voice over DSL (An Overview)||Deirdre Dinan, Mike Littlefield (UNH-IOL)||
This presentation provides an overview and introduction to Voice over DSL (VoDSL) technologies. The presentation covers the basics of channels voice over DSL, Voice over ATM (VoATM) and Voice over IP (VoIP). The presentation also includes a quick introduction to BLES, which is used to transport voice of AAL2 over ATM.
|Tutorials||June 26, 2012|
|Voice Over IP and Wireless Data Coexistence in a WLAN Switch Deployment||Tom Leary, UNH-IOL; Aruba Networks||
Wireless technology is becoming increasingly integrated into the world's networks. Recent innovations, such as offloading processing to wireless local area network (WLAN) switches at the network's edge, have cleared the way for large-scale enterprise deployments. However, despite improved maintenance and administration tools, switched WLAN networks are vulnerable to issues arising from the heterogeneous network environment, especially the integration of services such as voice over IP (VoIP). An open-industry enterprise services and security test event held from March 21 to March 25, 2005 at the University of New Hampshire InterOperability Laboratory (UNH-IOL) provided a backdrop for testing these solutions.
|White Papers||May 13, 2005|
|What is DLNA Testing?||Austin Pond||
What is DLNA testing? DLNA Testing entails many different forms of testing, all of which are necessary for certification: Pre-Testing, MCVT, CTT, Interoperability, Auto-IP/Small Network, and possibly LPTT. These tests must all pass for all device classes to properly ensure DLNA protocol compliance and interoperability.
|Tutorials||April 16, 2015|
|Wi-Fi 6 Seminar: Broadband Forum TR-398 Certification Update||Lincoln Lavoie||
Part 5 of octoScope's seminar covering Wi-Fi 6 test methods and standards including live demonstrations of OFDMA testing on the octoBox testbed. Featuring speakers from octoScope, University of New Hampshire InterOperability Laboratory and dot11 Labs, this seminar focuses on how testbeds, test methods and data visualization must be enhanced for meaningful Wi-Fi 6 testing.
|External Links||March 17, 2020|
|Wireless Networking Overview||Kevin Karcz, Jeremy Kent||
An overview of various wireless networking technologies, their relationship to one another, and a look at emerging standards.
|Tutorials||September 18, 2014|
|Wireshark Color Filters Tutorial||Jeff Laird||
Explains the use of PTP color filters in Wireshark. Goes with the file: (IOL_PTP_Wireshark_color_filters.txt)
|Tutorials||March 10, 2012|
|WPA-PSK: Step-by-Step||Jeremy deVries||
In today's age of ubiquitous SOHO networks and ever more Wi-Fi in laptops, security is a paramount concern. Unsecured or improperly set up wireless networks can leave you vulnerable to intrusion, viruses, hijacking of bandwidth, and more problems than one can list, which is why properly setting up your secured network using an authentication mechanism such as WPA-PSK is a crucial step in creating a wireless network. This article provides an overview of the Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) security mechanism, and a step-by-step guide to securing your wireless network.
|Tutorials||September 30, 2005|