Differentiating Between Baseband and Broadband Signaling Two types of signaling methods are used to transmit information over network media: baseband and broadband. Before we get any further into 802.3 standards we should clarify the difference between the two. Baseband Baseband transmissions typically use digital signaling over a single wire; the transmissions themselves take the form
ICMP is a networking protocol developed to analyse the connectivity between source and destination hosts. The structure of ICMP datagram as follows Data (32 bytes by default) Sequence No: – Since it is sending data repeatedly, ICMP itself assings a sequence number to identify the segment of data Identifier – It is very close to port
If you were to read news in a News paper and find out when that news took place you would look at the date of publishing on the News paper. We need an anchor, a constant, that we all agree to follow in order to relate to the events happening in our lives. similarly when we talk about IT infrastructure a good IT Engineer will also make sure he checks that time when a particular event happen.
We are approaching the time when we will be able to communicate faster than the speed of light. It is well known that as we approach the speed of light, time slows down. Logically, it is reasonable to assume that as we go faster than the speed of light, time will reverse. The major consequence of this for Internet protocols is that packets will arrive before they are sent. This will have a major impact on the way we design Internet protocols. This paper outlines some of the issues and suggests some directions for additional analysis of these issues.
SSH is a networking protocol used for accessing the CLI(shell) remotely with applications. In RHEL7, ssh will be by default running as a daemon service called sshd in port 22. In this blog i want to show you how to secure the ports of SSH by changing it.
This article help you to understand how Backdoor option works in BGP. Generally, Backdoor is a term which technically describes – Bypassing security mechanism to access a Resources. But in BGP it refers to a different thing. Before understanding the BGP Backdoor, We need to understand some Routing Concept and Protocols. BGP is a routing protocol
We all know how easy it is to work with Cisco CLI. It feels natural once you get used to it. But not many know that there is a webpage based GUI to manage Cisco Catalyst Switch. Albeit simple they provide easy to use interface for novices who do not know the CLI. This is a how-to article to help you enable and start using the web based GUI.