Tuesday, December 25, 2012

Networking Articles and Tips

Networking Articles and Tips


TFTP (Trivial File Transfer Protocol)

Posted: 25 Dec 2012 04:52 AM PST

TFTP or Trivial File Transfer Protocol is a very simple lightweight protocol which is used to copy files to and from devices which supports TCP/IP.  It is is one of the more important protocols, specially while working with Cisco devices ( routers and switches) as it is the primary method of transferring configuration file and IOS images. [...]

Monday, November 5, 2012

Networking Articles and Tips

Networking Articles and Tips


Demilitarized Zone (DMZ)

Posted: 16 Sep 2012 07:45 PM PDT


Demilitarized Zone (DMZ) In computer networks, a DMZ or Demilitarized Zone is a physical or logical subnetwork that contains an organization’s external services, largely to untrusted network, such as Internet.  It prevents outside users from getting direct access to a server that has company data. In other words “demilitarised zone” or DMZ refers to this [...]

Sunday, October 28, 2012

Networking Articles and Tips

Networking Articles and Tips


Temporary Post Used For Theme Detection (4dbe3fdd-15eb-4218-90b1-09f9ad3e7214 – 3bfe001a-32de-4114-a6b4-4005b770f6d7)

Posted: 28 Oct 2012 01:24 AM PDT


This is a temporary post that was not deleted. Please delete this manually. (0a77e3b0-c6c5-4534-99c1-3444423cedd2 – 3bfe001a-32de-4114-a6b4-4005b770f6d7)

Thursday, September 27, 2012

Networking Articles and Tips

Networking Articles and Tips


Computer Network Technologies & Application to IT Enabled Services

Posted: 26 Sep 2012 08:30 PM PDT


In today’s world, a computer network is much more than a collection of interconnected devices. The computer network is the resource, which enables to analyse, organise, and disseminate the information that is essential to profitability. The rise of intranets and extranets is the important aspect of computer networking. Intranets and extranets are private business networks [...]

Wednesday, September 26, 2012

Networking Articles and Tips

Networking Articles and Tips


Classes of Routing Protocols

Posted: 25 Sep 2012 08:30 PM PDT


Routing Protocols can be segregated in three types of classes. Distance Vector Protocols Link State Protocols Hybrid Protocols Distance Vector Routing Protocols – Distance vector routing protocols decide the best path of the remote network based on the distance. Every time when the packet passes the router that's called a hop. The path having the [...]

Tuesday, September 25, 2012

Networking Articles and Tips

Networking Articles and Tips


BGP Security Issues and Solutions

Posted: 24 Sep 2012 08:30 PM PDT


As the Internet's de facto interdomain routing protocol, the Border Gateway Protocol (BGP) is the glue that holds the disparate parts of the Internet together. A major limitation of BGP is its failure to adequately address security. Recent high-profile outages and security analyses clearly indicate that the Internet routing infrastructure is highly vulnerable. Moreover, the [...]

Administrative Distance

Posted: 24 Sep 2012 05:00 AM PDT


An administrative distance is used to define the value or merit of routing information received by the router from its neighbor router. An administrative distance is an integer from 0 to 255 where 0 is defined as most trusted and 255 is the least trusted one which means no traffic will be passed through the [...]

Dynamic Routing

Posted: 23 Sep 2012 08:30 PM PDT


Dynamic routing is when protocols are used to update the routing table automatically. In other words the process in which such routing protocols are used which find networks, update routing tables on routers and communicate this routing information with their neighbor routers are called dynamic routing. The protocols which are used in this process are [...]

Monday, September 24, 2012

Networking Articles and Tips

Networking Articles and Tips


Understanding BGP Misconfiguration

Posted: 24 Sep 2012 02:30 AM PDT


It is well-known that simple, accidental BGP configuration errors can disrupt Internet connectivity. Yet little is known about the frequency of misconfiguration or its causes, except for the few spectacular incidents of widespread outages. In this paper, we present the first quantitative study of BGP misconfiguration. Over a three week period, we analyzed routing table [...]