Skip to main content

Posts

Routing Protocols - Define Top Network Routing Protocols

Routing is a process in which the layer 3 devices (either router or layer 3 switch) finds the optimal path to deliver a packet from one network to another. Dynamic routing protocols uses metric, cost and hop count to identify the best path from the path available for destination network. Below are the types of Routing Protocol: - Distance Vector Routing Protocol RIP IGRP - Link State Routing Protocol OSPF IS-IS - Advanced Distance vector routing protocol EIGRP Distance Vector Routing Protocol: Distance vector protocols usually send the complete routing table to each neighbor (a neighbor is directly connected router that runs the same routing protocol). They employ some version of Bellman-Ford algorithm to calculate the best routes. Compared with link state routing protocols. Distance vector protocols are easier to configure and require little management, but are susceptible to routing loops and converge slower than the link s
Recent posts

Network Security Tools You Should Use, as per the experts

Securing a network looks like overwhelming. the globe of Security may be complex. Network security tools assist in securing to your monitoring IT environment. The more tools an InfoSec professional has got to work with, the higher they'll be ready to address the task at hand. Accessing to a large range of electronic network security software is simply the beginning. Knowing the way to put them to use is that the essence of network protection. New security threats seemingly appear daily. The progressive nature of those attacks requires dynamic multi-point security solutions. it is critical by the administrators to quickly identify vulnerabilities to guard data security. Encryption Tools Tor Tor tool has gained lots of press when people started talking about the “dark web” some years back. The dark web clothed to not be as scary as urban legends made it dead set be. It is simply looks like a tool to make sure privacy on the web. The system get routes requests to proxy web servers fo

Discuss about Best practices of Mail server IP reputations

Ever wondered why your immediate response intended message wasn't replied in time, or not replied at all? Everyone would have faced email delivery issues from time to time – like messages delivered to Spam directory or rejected/bounced back thanks to the amount of reasons. whether or not bounced back, we'd have left out it. Causing Mail delivery a large number for normal users and a nightmare for admins. Let’s determine the way to prevent our messages ending up within the Spam folder of recipients. Things to notice as a Server Administrator Pre check : Requirements for server setup: The Outgoing IP ( of the Mail server ) should be with a decent reputation from day one. But the information centres ( by mistake or because of negligence ) might deliver Blacklisted IPs to new servers. So, it’s knowing ask them to produce a Clean IP with the order. Also, ask them to feature rDNS value for the Mail sending IP, preferably to server hostname . A secondary IP for post can be benefic

CPU Stress for windows server - utility

CPU Stress CPU Stress may be a utility which will be accustomed simulate CPU activity by running up to 64 threads during a tight loop. Each thread will be started, paused or stopped independently and might be configured with the subsequent parameters: Activity Level this will be Low, Medium, Busy or Maximum which controls how long the thread sleepss between cycles. Also set the mentioned value to Maximum causes the thread to run continuously. Priority This controls the thread priority. see Windows Internals by Mark Russinovich for details on thread priorities Runs on: Client: Windows Vista and better Server: Windows Server 2003 and better Nano Server: 2016 and better Link from windows you can refer: The official updates and errata page for the definitive book on Windows internals . Download Utility from below: CPU Stress:

How to Use STRESS command in Linux/Ubuntu

One can check CPU on Linux other subsystem. Instances within which this can be useful include those during which a computer user wishes to perform tuning activities, a kernel or libc programmer wishes to judge denial of service possibilities, test your systems entirely on high load and monitoring the health and more. this is often also useful for sysadmin, system builders, and overclockers who want to check their hardware under high load and monitor stability and thermal environment. Stress Test CPU and Memory (VM) On a Linux / Unix stress : it's a straightforward workload generator for POSIX systems. It imposes to be configurable number of CPU, memory, I/O, and disk stress on the system. it's written in C, and is free software licensed under the GPLv2. it's not a benchmark, but is very a tool designed stress-ng : it's an updated version of stress tool and it'll check a server for the subsequent features: CPU compute Cache thrashing Drive stress I/O syncs VM stres