Skip to main content

Posts

Showing posts from April 26, 2020

What is VPN? - Protocols of VPN

Virtual Private Network is a connection method used to add security and privacy to private and public networks.  For instance, like WiFi Hotspots and the Internet. Corporations use Virtual Private Networks to protect sensitive data.  However, using a personal VPN is increasingly becoming more popular as more interactions that were previously face-to-face transition to the Internet.  Increase privacy with a Virtual Private Network because the user's initial IP address replaced with one from the Virtual Private Network provider.  Subscribers can obtain an IP address from any gateway city the VPN service provides. For instance, you may live in San Francisco, but with a Virtual Private Network, you can appear to live in Amsterdam, New York, or any number of gateway cities. Virtual Private Network, allows you to create a secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from p...

What is STP? - Explain Advantages and Disadvantages

The Spanning Tree Protocol is a network protocol that builds a loop-free logical topology for Ethernet networks. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them. STP is a protocol. It actively monitors all links of the network. To finds a redundant link, it uses an algorithm, known as the STA (spanning-tree algorithm). The STA algorithm first creates a topology database then it finds and disables the redundant links. Once redundant links are disabled, only the STP-chosen links remain active. If a new link is added or an existing link is removed, the STP re-runs the STA algorithm and re-adjusts all links to reflect the change. STP (Spanning Tree Protocol) automatically removes layer 2 switching loops by shutting down the redundant links. A redundant link is an additional link between two switches. A redundant link is usually created for backup purposes. Just like every coin has two sides, a redundant link, along with...

What is Unicast, Broadcast amd Multicast in Computer Network?

The  cast  term here signifies some data(stream of packets) is being transmitted to the recipient(s) from client(s) side over the communication channel that help them to communicate. Let’s see some of the “cast” concepts that are prevailing in the computer networks field. 1. Unicast: This type of information transfer is useful when there is a participation of single sender and single recipient. So, in short you can term it as a one-to-one transmission. For example, a device having IP address 10.1.2.0 in a network wants to send the traffic stream(data packets) to the device with IP address 20.12.4.2 in the other network,then unicast comes into picture. This is the most common form of data transfer over the networks. 2. Broadcast: Broadcasting transfer (one-to-all) techniques can be classified into two types : Limited Broadcasting: Suppose you have to send stream of packets to all the devices over the network that you reside, this broadcasting comes handy. For this ...

What is Network Toplogy? Types of Network Topology

Network topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial fieldbuses and computer networks. Types of Network Topology Mesh Topology Star Topology Bus Topology Ring Topology Hybrid Topology Mesh Topology mesh topology as an every device is connected to another device via particular channel. Every device is connected with another via dedicated channels. These channels are known as links. If suppose, N number of devices are connected with each other in mesh topology, then total number of ports that is required by each device is ​ N-1. In the Figure 1, there are 5 devices connected to each other, hence total number of ports required is 4. If suppose, N number of devices are connected with each other in mesh topology, then total number of dedicated links required to connect the...

Top Basic troubleshooting commands for Routings

Routing Commands Well as per my 2.5 + years of experience I know that the Troubleshooting is about three big things: predicting what can happen, determining the anomalies, and investigating why that anomalies happened. also the many network admins break down network infrastructure problems by analyzing the Layer 3 path through the network, hop by hop, in both directions. Below are the basic commands which can help you with Troubleshooting Ping   Show Interface   Show IP Interface   Traceroute   Show Protocols   Show IP Protocols   Telnet   Show running-config   show IP route   Show IP protocol database PING The first most commonly used command is Ping. The ping stands for Packet Internet Groper. It operates in the network layer of the OSI Model and uses the ICMP protocol. It is the first command you must use while troubleshooting a network. The ping command allows you to test whether there is a co...

What is BGP? - Border Gateway Protocol

What is BGP? Border Gateway Protocol (BGP) is used to Exchange routing information for the internet and is the protocol used between ISP which are different ASes. Border Gateway Protocol is the protocol that makes the Internet work. Networks or autonomous systems that need to interact with each other do so through peering, which is made possible with BGP. BGP - Border Gateway Protocol Border Gateway Protocol (BGP) is the postal service of the Internet. When someone drops a letter into a mailbox, the postal service processes that piece of mail and chooses a fast, efficient route to deliver that letter to its recipient. Similarly, when someone submits data across the Internet, BGP is responsible for looking at all of the available paths that data could travel and picking the best route, which usually means hopping between autonomous systems. BGP is the protocol that makes the Internet work. It does this by enabling data routing on the Internet. When a user in Singapore...