Address Resolution Protocol: How It Works

Understanding How Address Resolution Protocol Works

If your network is using the IPv4 communications protocol, the Address Resolution Protocol, or ARP, is what you need to map IPv4 addresses to MAC addresses. This topic explains how ARP works. Every IP device on an Ethernet network has a unique Ethernet MAC address. When a device sends an Ethernet Layer 2 frame, it […]

Loading

Read More Address Resolution Protocol: How It Works
August 18, 2022

Examining Transport Layer Characteristics In Networking

Examining Transport Layer Characteristics In Networking

Application layer programs generate data that must be exchanged between the source and destination hosts. The transport layer is responsible for logical communications between applications running on different hosts. This may include services such as establishing a temporary session between two hosts and the reliable transmission of information for an application. The transport layer has […]

Loading

Read More Examining Transport Layer Characteristics In Networking
August 18, 2022

Transport Layer Session Establishment: How It Is Done

Discussing Transport Layer Session Establishment

You already know the fundamentals of TCP. Understanding the role of port numbers will help you to grasp the details of the TCP communication process. In this topic, you will also learn about the TCP three-way handshake and session termination processes. Each application process running on a server is configured to use a port number. […]

Loading

Read More Transport Layer Session Establishment: How It Is Done
August 18, 2022

Understanding Dynamic Host Configuration Protocol

Understanding Dynamic Host Configuration Protocol

The Dynamic Host Configuration Protocol (DHCP) for IPv4 service automates the assignment of IPv4 addresses, subnet masks, gateways, and other IPv4 networking parameters. This is referred to as dynamic addressing. The alternative to dynamic addressing is static addressing. When using static addressing, the network administrator manually enters IP address information on hosts.   When a […]

Loading

Read More Understanding Dynamic Host Configuration Protocol
August 18, 2022

The Truth About Domain Name Service

The Truth About Domain Name Service

The webservers that we so often connect to using names like www⋅cisco⋅com, are actually reached by assigning IP addresses to packets. On the internet, these domain names are much easier for people to remember than an IP address such as 74.163.4.161. If Cisco decides to change the numeric address of www⋅cisco⋅com, it is transparent to […]

Loading

Read More The Truth About Domain Name Service
August 18, 2022

Roles Of End Devices In The Network Process

Quotes on Marketing Automation To Help You Boost Your Business

  The network devices that people are most familiar with are end devices. To distinguish one end device from another, each end device on a network has an address. When an end device initiates communication, it uses the address of the destination end device to specify where to deliver the message. An end device is […]

Loading

Read More Roles Of End Devices In The Network Process
August 18, 2022

Insight Into Packet Forwarding Decision Process

Insight Into Packet Forwarding Decision Process

Now that the router has determined the best path for a packet based on the longest match, it must determine how to encapsulate the packet and forward it out to the correct egress interface. The figure explains how a router determines the best path to use to forward a packet.   The figure depicts how […]

Loading

Read More Insight Into Packet Forwarding Decision Process
August 18, 2022

8 General Security Practices For Home Networking

8 General Security Practices For Home Networking

When it comes to general security breaches, home networks are the most susceptible to attacks. The reason is that home network users always have the mindset that they have nothing that the hacker will be interested in. That is why most times, they do not always take the security of their devices serious. In this […]

Loading

Read More 8 General Security Practices For Home Networking
August 18, 2022

Understanding IP PDU Details For IPV4 And IPV6

Understanding IP PDU Details For IPV4 And IPV6

IP was designed as a Layer 3 connectionless protocol. It provides the necessary functions to deliver a packet from a source host to a destination host over an interconnected system of networks. The protocol was not designed to track and manage the flow of packets. These functions, if required, are performed primarily by TCP at […]

Loading

Read More Understanding IP PDU Details For IPV4 And IPV6
August 18, 2022

Highlighting Various Network Security Monitoring Tool

Highlighting Various Network Security Monitoring Tool

  In this article, I want to look at common network security monitoring tools in cybersecurity. Follow me as we look at this together in this article. Common tools that are used for network security monitoring include:   Network protocol analyzers such as Wireshark and Tcpdump NetFlow Security Information and Event Management Systems (SIEM)   […]

Loading

Read More Highlighting Various Network Security Monitoring Tool
August 18, 2022

Analysing Network Security Topology In Cybersecurity

Analysing Network Security Topology In Cybersecurity

“All networks are targets” is a common adage used to describe the current landscape of network security. Therefore, to mitigate threats, all networks must be secured and protected. This article will look at network security topology in Cybersecurity.   This requires a defence-in-depth approach. It requires using proven methods and a security infrastructure consisting of […]

Loading

Read More Analysing Network Security Topology In Cybersecurity
August 18, 2022

Analysing Denial Of Service Attack In Cybersecurity

The Impact Of COVID-19 On Developing Countries

A Denial of Service (DoS) attack creates some sort of interruption of network services to users, devices, or applications. In this article, I want to discuss all that you need to know about the Denial Of Service attack in Cybersecurity, Follow me as we will look at that in this article. There are two major […]

Loading

Read More Analysing Denial Of Service Attack In Cybersecurity
August 18, 2022

Reconnaissance Attacks In Networking: How It Works

Understanding Reconnaissance Attacks In Networking

  Reconnaissance is information gathering. It is analogous to a thief surveying a neighbourhood by going door-to-door pretending to sell something.   What the thief is actually doing is looking for vulnerable homes to break into, such as unoccupied residences, residences with easy-to-open doors or windows, and those residences without security systems or security cameras. […]

Loading

Read More Reconnaissance Attacks In Networking: How It Works
August 18, 2022

Understanding The Evolution Of Security Tools

Understanding The Evolution Of Security Tools

Ethical hacking involves using many different types of tools to test the network and end devices. To validate the security of a network and its systems, many network penetration testing tools have been developed. However, many of these tools can also be used by threat actors for exploitation. In this article, I am going to […]

Loading

Read More Understanding The Evolution Of Security Tools
August 18, 2022

Differences Between A Hacker And A Threat Actor

Differences Between A Hacker And A Threat Actor

  We are under attack and attackers want access to our assets. Assets are anything of value to an organization, such as data and other intellectual property, servers, computers, smartphones, tablets, and more. In this article, we are going to be looking at the differences between a hacker and a threat actor. Follow me as […]

Loading

Read More Differences Between A Hacker And A Threat Actor
August 18, 2022

Use Of Access Control List In Networking

Use Of Access Control List In Networking

  An Access Control List in networking is a series of commands that control whether a device forwards or drops packets based on information found in the packet header. When configured, ACLs perform the following tasks: They limit network traffic to increase network performance. For example, if a corporate policy does not allow video traffic […]

Loading

Read More Use Of Access Control List In Networking
August 18, 2022

Differences Between Wireless And Wired LANs

Differences Between Wireless And Wired LANs

WLANs use Radio Frequencies (RF) instead of cables at the physical layer and MAC sublayer of the data link layer. WLANs share a similar origin with Ethernet LANs. The IEEE has adopted the 802 LAN/MAN portfolio of computer network architecture standards. The two dominant 802 working groups are 802.3 Ethernet, which defined Ethernet for wired […]

Loading

Read More Differences Between Wireless And Wired LANs
August 18, 2022

Guidelines For Ensuring Credit Card Safety

Guidelines For Ensuring Credit Card Safety

  In my previous article, I talked about how online shopping has made life easy for people making transactions online. Despite the fact that it is very easy to make transactions online using credit and debit cards, you need to follow some guidelines in order to secure your funds.   In this article, I want […]

Loading

Read More Guidelines For Ensuring Credit Card Safety
August 16, 2022

Some Facts To Know Virtual LANs Generally

Some Facts To Know Virtual LANs Generally

  Within a switched internetwork, VLANs provide segmentation and organizational flexibility. VLANs provide a way to group devices within a LAN. A group of devices within a VLAN communicate as if they were connected to the same network segment. VLANs are based on logical connections, instead of physical connections.   The figure shows a 3-floor […]

Loading

Read More Some Facts To Know Virtual LANs Generally
August 1, 2022

Video: How To Concatenate In Microsoft Excel

concatenate in microsoft excel

[embedyt] https://www.youtube.com/watch?v=omaxRWsrXz4[/embedyt]   Action Point PS: If you would like to have an online course on any of the courses that you found on this blog, I will be glad to do that on an individual and corporate level, I will be very glad to do that I have trained several individuals and groups and […]

Loading

Read More Video: How To Concatenate In Microsoft Excel
July 23, 2022