Ubiquiti's Trivial File Transfer Protocol (TFTP) recovery method is the process followed to recover firmware on Ubiquiti devices. This method is useful when there is an unstable device connection or when the device cannot be accessed. These difficulties are typically due to some form of firmware corruption. Firmware corruption can occur due to a number of reasons, but the most common is by Electro-Static Discharge (ESD), and ESD is mainly caused by using unshielded cable and connectors. Fortunately, Ubiquiti's TFTP recovery method allows the recovery of firmware on most Ubiquiti devices. In this article, we explain how to perform this recovery.
MikroTik is renowned for its flexible use and competitive price. Some prospective users, however, are discouraged by its configurations which can at times be complex. Below, we explain how to create a MikroTik Point to Point (PtP) bridge link. We also discuss our configuration recommendations.
In July 2021, Scoop became a Master Distributor for Rackstuds in South Africa. The concept for Rackstuds™ arose in 2000 by Pete Stothers (Rackstuds™ founder and Director) when he had to resort to stacking telephone books below a device to align the rails with the cage nuts.
What is AI? AI, or Artificial Intelligence is the simulation of human intelligence processed by computers, this means that computers have the ability to perform human tasks and make its own logical decisions without human intervention. AI has the ability to analyse data in real time much faster, more reliable and efficient than any human can. Therefore AI is used to perform both simple and really complicated tasks, and is designed to be more accurate and to assist humans in day to day activities.
With the variety of cable available to the networking industry, it is important to know which type of cable to use for your installation so that you ensure overall network performance, stability and speed. In this article, we discuss Ethernet cable and the most common standards used in the industry and network deployments today.
April 2021, we celebrated being in business for 20 years. Our Scoop story, like many other good stories, began long, long ago in 2001, when we opened our doors to our 96 square meter warehouse-office space in Montague Gardens, Cape Town with a team of 3, we were the new kids on the block of ICT in South Africa. The story of Scoop is a tale of inspired leadership that transformed vision into reality, with countless transitions and milestones which now includes having a nationwide presence with branches in Cape Town, Midrand and Durban with a team of 65 Scoopies.
How does our most popular Ubiquiti Access Point, the UAP-AC-LR compare to Ubiquiti's WiFi 6 counterpart, the U6-Lite? We wanted to find out and did some of our own testing. WiFi 6 is becoming increasingly popular as more vendors are ramping up production to make way for the latest WiFi standard. The reason WiFi 6 is so welcomed is that it provides better performance on both 2.4GHz and 5GHz frequency bands. In addition, it uses a brand new modulation and coding scheme called OFDMA which is better suited for higher density WiFi environments. Ubiquiti is no exception to the list of vendors moving to WiFi 6 and they have launched a few products under their popular UniFi brand. Ubiquiti have a couple of different models available and in the pipeline.
We are super excited to announce the addition of the Reyee brand to our product range. Reyee, pronounced 'Ree-Yee', is manufactured by the company Ruijie who have been around for over 20 years. Ruijie predominantly focused on enterprise networking solutions for the Chinese market, manufacturing an extensive range of wired and wireless products including routers, switches and access points. More recently, Ruijie launched the Reyee brand which is directed at the SMB (Small-Medium Business) and SOHO (Small Office Home Office) markets.
Traffic filtering is a method of identifying and prioritizing different traffic types passing through a common router by applying filter rules based on your network requirements. When using MikroTik RouterOS, there are several ways to achieve this. One of the most common techniques is to apply traffic limitations by making use of IP Address Lists. Traffic can either be filtered by source, or destination IP addresses. If you want to filter specific users on your LAN, this can be achieved by using source addresses. Anything leaving the LAN (Internet) will be classified with destination addresses. A combination of these and other settings can also be used to achieve more specific results, but it all depends on your requirements.
When using a Switch or Power Sourcing Equipment (PSE), the PSE needs to meet the power requirements of Powered Devices (PDs). Examples of PDs include IP surveillance cameras, Voice over IP (VoIP), and Wireless Access Points (WAPs). All PSEs have a PoE Budget - This is the total amount of power PSEs can supply to PDs at one time, measured in watts. In this article, we will explain why the budget is often over-estimated.