Wednesday, September 25, 2013

NetworkEducator.com - Networking Articles, Tips, Resources, Configuration

NetworkEducator.com - Networking Articles, Tips, Resources, Configuration


Classes of Routing Protocols

Posted: 25 Sep 2012 08:30 PM PDT

Routing Protocols can be segregated in three types of classes. Distance Vector Protocols Link State Protocols Hybrid Protocols Distance Vector Routing Protocols – Distance vector routing protocols decide the best path of the remote network based on the distance. Every time when the packet passes the router that's called a hop. The path having the [...]

The post Classes of Routing Protocols appeared first on Network Educator.

Dynamic Routing

Posted: 23 Sep 2012 08:30 PM PDT

Dynamic routing is when protocols are used to update the routing table automatically. In other words the process in which such routing protocols are used which find networks, update routing tables on routers and communicate this routing information with their neighbor routers are called dynamic routing. The protocols which are used in this process are [...]

The post Dynamic Routing appeared first on Network Educator.

Recovery Through Rommon Mode

Posted: 16 Sep 2012 07:45 PM PDT

Recovery Through Rommon Mode The switch: prompt or rommon mode  indicates that the switch has not booted up completely and requires the user to complete the boot process. The error loading flash :< image> message indicates that the switch failed to load an image due to a corrupt or missing image. The image may have [...]

The post Recovery Through Rommon Mode appeared first on Network Educator.

Demilitarized Zone (DMZ)

Posted: 16 Sep 2012 07:45 PM PDT

In computer networks, a DMZ or Demilitarized Zone is a physical or logical sub-network that contains an organization’s external services, largely to untrusted network, such as Internet.  It prevents outside users from getting direct access to a server that has company data. In other words “demilitarized zone” refers to this isolated zone that hosts the [...]

The post Demilitarized Zone (DMZ) appeared first on Network Educator.

Risks of File Sharing Technology

Posted: 16 Sep 2012 07:45 PM PDT

Risks of File Sharing Technology File sharing technology is a popular way for users to share,” or exchange files between them. But using this technology makes you susceptible to risks such as attack, infection and exposure of personal information. What is file sharing? File sharing uses technology that allows internet users to share files that [...]

The post Risks of File Sharing Technology appeared first on Network Educator.

How to adjust Virtual Machine Memory ?

Posted: 18 Jun 2012 09:40 PM PDT

How to Adjust Virtual Machine Memory ? Digital device is the device that’s created for the intent of controlling the application of the program that is involved when using the windows. The digital machine enables the person to carry out all the activities at better job and for that reason it is regarded to get completed [...]

The post How to adjust Virtual Machine Memory ? appeared first on Network Educator.

No comments:

Post a Comment