Thursday, September 27, 2012

Networking Articles and Tips

Networking Articles and Tips


Computer Network Technologies & Application to IT Enabled Services

Posted: 26 Sep 2012 08:30 PM PDT


In today’s world, a computer network is much more than a collection of interconnected devices. The computer network is the resource, which enables to analyse, organise, and disseminate the information that is essential to profitability. The rise of intranets and extranets is the important aspect of computer networking. Intranets and extranets are private business networks [...]

Wednesday, September 26, 2012

Networking Articles and Tips

Networking Articles and Tips


Classes of Routing Protocols

Posted: 25 Sep 2012 08:30 PM PDT


Routing Protocols can be segregated in three types of classes. Distance Vector Protocols Link State Protocols Hybrid Protocols Distance Vector Routing Protocols – Distance vector routing protocols decide the best path of the remote network based on the distance. Every time when the packet passes the router that's called a hop. The path having the [...]

Tuesday, September 25, 2012

Networking Articles and Tips

Networking Articles and Tips


BGP Security Issues and Solutions

Posted: 24 Sep 2012 08:30 PM PDT


As the Internet's de facto interdomain routing protocol, the Border Gateway Protocol (BGP) is the glue that holds the disparate parts of the Internet together. A major limitation of BGP is its failure to adequately address security. Recent high-profile outages and security analyses clearly indicate that the Internet routing infrastructure is highly vulnerable. Moreover, the [...]

Administrative Distance

Posted: 24 Sep 2012 05:00 AM PDT


An administrative distance is used to define the value or merit of routing information received by the router from its neighbor router. An administrative distance is an integer from 0 to 255 where 0 is defined as most trusted and 255 is the least trusted one which means no traffic will be passed through the [...]

Dynamic Routing

Posted: 23 Sep 2012 08:30 PM PDT


Dynamic routing is when protocols are used to update the routing table automatically. In other words the process in which such routing protocols are used which find networks, update routing tables on routers and communicate this routing information with their neighbor routers are called dynamic routing. The protocols which are used in this process are [...]

Monday, September 24, 2012

Networking Articles and Tips

Networking Articles and Tips


Understanding BGP Misconfiguration

Posted: 24 Sep 2012 02:30 AM PDT


It is well-known that simple, accidental BGP configuration errors can disrupt Internet connectivity. Yet little is known about the frequency of misconfiguration or its causes, except for the few spectacular incidents of widespread outages. In this paper, we present the first quantitative study of BGP misconfiguration. Over a three week period, we analyzed routing table [...]

Monday, September 17, 2012

Networking Articles and Tips

Networking Articles and Tips


Recovery Through Rommon Mode

Posted: 16 Sep 2012 07:45 PM PDT


Recovery Through Rommon Mode The switch: prompt or rommon mode  indicates that the switch has not booted up completely and requires the user to complete the boot process. The error loading flash :< image> message indicates that the switch failed to load an image due to a corrupt or missing image. The image may have [...]

Towards Automated Auditing for Network Configuration Changes

Posted: 16 Sep 2012 07:45 PM PDT


IP network operators face the challenge of making and managing low-level device configuration changes to accommodate the rapidly evolving needs of IP  networks. As a first step towards automating this task, we explore a data-driven approach to auditing high-level change activity in IP networks, by  reverse engineering low-level longitudinal configuration data. We demonstrate the utility [...]

Difference between 32 bit and 64 bit OS

Posted: 16 Sep 2012 07:45 PM PDT


Difference between 32 bit and 64 bit Operating system will be the main component of the pc and its features are installed within the central processing unit of the pc. The operating method consists of numerous different type of information in it. Every and every thing that’s being carried out on the computer is becoming [...]

Demilitarized Zone (DMZ)

Posted: 16 Sep 2012 07:45 PM PDT


Demilitarized Zone (DMZ) In computer networks, a DMZ or Demilitarized Zone is a physical or logical subnetwork that contains an organization’s external services, largely to untrusted network, such as Internet.  It prevents outside users from getting direct access to a server that has company data. In other words “demilitarised zone” or DMZ refers to this [...]

ISDN

Posted: 16 Sep 2012 07:45 PM PDT


ISDN utilizes circuit-switching to establish a physical permanent point-to-point connection from the source for the destination. ISDN has standards defined by the ITU that encompass the OSI bottom three layers of that are Physical, Data Link and Network. At the physical layer the ITU has defined the user network interface common as I.430 for Simple [...]

What is FTP ?

Posted: 16 Sep 2012 07:40 PM PDT


FTP stands for File Transfer Protocol. This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account. FTP sites contain books, articles, software, games, images, sounds, multimedia, course [...]