Found 1627 Articles for Computer Network

Evolution of Networks

Satish Kumar
Updated on 27-Sep-2023 15:19:22

473 Views

Introduction Human beings are social animals. They have always found ways to communicate and connect with each other. From ancient times, people used various forms of communication like writing, oral communication, and visual arts to convey their messages to others. With advent of technology, communication has become faster, easier, and more efficient. This led to development of networks that connected people across world. In this article, we will explore evolution of networks from ancient times to modern era. Ancient Networks Ancient networks were primarily based on oral communication and visual arts. In ancient civilizations like Sumerians, Egyptians, and Greeks, people ... Read More

Ethernet Transmitter Algorithm

Satish Kumar
Updated on 27-Sep-2023 15:05:38

98 Views

Introduction Ethernet is most popular local area network (LAN) technology, which enables transfer of data packets between different devices such as computers, routers, and switches. Ethernet uses a variety of protocols to transmit data packets over a network. One of crucial protocols is Ethernet transmitter algorithm, which governs way data is transmitted over Ethernet network. In this article, we will discuss Ethernet transmitter algorithm, its subheadings, and examples. Overview of Ethernet Transmitter Algorithm The Ethernet transmitter algorithm is a set of rules that governs transmission of data packets over an Ethernet network. algorithm ensures that data packets are transmitted in ... Read More

Ethernet Frame Format

Satish Kumar
Updated on 27-Sep-2023 15:03:21

786 Views

Ethernet is a widely used local area networking technology that enables devices to communicate with each other. Ethernet frames are basic units of data that are transmitted over Ethernet network. In this article, we will explore Ethernet frame format in detail, including various fields that make up frame and purpose of each field. Introduction to Ethernet Frames An Ethernet frame is a packet of data that is transmitted over an Ethernet network. frame is composed of a header, a payload, and a trailer. header and trailer contain information about frame, such as source and destination addresses, while payload contains actual ... Read More

EtherChannel in Computer Network

Satish Kumar
Updated on 27-Sep-2023 14:53:54

133 Views

Introduction In modern computer networks, high availability and increased bandwidth are essential requirements. EtherChannel is a link aggregation technique used to combine multiple physical links into one logical link. This article explains concept of EtherChannel, its benefits, and how it works. What is EtherChannel? EtherChannel is a link aggregation technique used in computer networks to combine multiple physical links into a logical link. goal is to increase available bandwidth and provide redundancy, fault tolerance, and load balancing. In an EtherChannel, multiple physical links are bundled together, appearing as a single logical link to network devices connected to it. Benefits of ... Read More

ADD PPP Command in PPP Configuration

Satish Kumar
Updated on 27-Sep-2023 14:51:57

52 Views

Introduction PPP (Point-to-Point Protocol) is a network protocol that allows communication between two devices over a point-to-point connection. It is a widely used protocol for establishing and managing Internet connections over dial-up, DSL, and other types of connections. PPP uses a variety of commands to configure and manage communication session between two devices. One such command is "ADD PPP" command. In this article, we will discuss ADD PPP command in PPP configuration, its significance, and various examples of its usage. What is ADD PPP Command? The ADD PPP command is a configuration command used to create a new PPP session ... Read More

Adaptive security appliance (ASA) features

Satish Kumar
Updated on 27-Sep-2023 14:48:07

65 Views

In today's digitally connected world, security is a critical concern for organizations of all sizes. With rise of cyber attacks, it has become imperative to implement security measures that not only provide protection but also adapt to evolving threats. One such security measure is Adaptive Security Appliance (ASA). An Adaptive Security Appliance is a security device that is designed to protect network infrastructure by providing advanced security features such as firewall, VPN, and intrusion prevention system (IPS) capabilities. ASA offers a range of features that provide an effective defense against cyber threats, making it a popular choice for organizations seeking ... Read More

Active Directory PenTesting

Satish Kumar
Updated on 27-Sep-2023 14:43:23

387 Views

In today's digital world, cyber attacks are becoming increasingly sophisticated, and organizations must continuously monitor and improve their security measures. Penetration testing, commonly known as pen testing, is a crucial step in identifying vulnerabilities and weaknesses in an organization's systems, networks, and applications. One critical area that needs to be tested is organization's Active Directory (AD). This article will discuss Active Directory pen testing, why it is essential, and some examples of AD vulnerabilities. What is Active Directory? Active Directory is a directory service developed by Microsoft for managing and organizing information about users, computers, and other resources in a ... Read More

Access Networks

Satish Kumar
Updated on 27-Sep-2023 14:34:42

274 Views

Introduction Access networks are means by which internet service providers (ISPs) provide internet connectivity to their customers. They are final part of infrastructure that connects end-users to internet. Access networks can be wired or wireless and have different characteristics that make them suitable for different applications. Wired Access Networks Wired access networks are a type of computer network infrastructure that uses physical cables or wires to connect devices to internet or a local network. They are typically installed in buildings or homes to provide a stable and reliable connection to internet or other devices within network. Wired access networks have ... Read More

Access Control Tactics in Computer Networks

Satish Kumar
Updated on 27-Sep-2023 13:36:09

134 Views

In today's digital age, security of computer networks has become paramount. Computer networks are susceptible to a variety of security threats, ranging from unauthorized access to data breaches. To ensure security of computer networks, access control tactics play a crucial role. Access control is process of restricting access to resources in a computer network. This article explores access control tactics in computer networks, including their types and examples. Types of Access Control Tactics Access control tactics can be broadly classified into two types − physical access control and logical access control. Physical Access Control Physical access control is a security ... Read More

Access and trunk ports

Satish Kumar
Updated on 27-Sep-2023 12:04:45

152 Views

Introduction In computer networking, a network switch is a device that connects network devices together to enable communication within a network. Switches are an essential component of any modern network, and they provide a way to manage network traffic by directing data to appropriate device. Access and trunk ports are two types of ports used on switches to manage network traffic. In this article, we will discuss access and trunk ports, their differences, and when to use them. What are Access and Trunk Ports? Access ports and trunk ports are two types of ports used on network switches. Access ... Read More

Advertisements