Before understanding Packet Switching, let’s explore the basic types of switching. Switching is the important mechanism that provides communication between different endpoints or different computers and manages the data flow between the two end points. There are three types of switching …
Before understanding Circuit Switching, let’s explore the basic types of switching. Switching is an important mechanism that provides communication between different networks or different computer(s) and manages the data flow between the two end points. There are three types of switching …
TOR (The Onion Router) is a software and open network which allows the users to browse the Web anonymously. TOR makes it difficult, if not impossible, for any snoops to see our web mail, search history, social media posts or …
Introduction to Torrenting Torrenting is a P2P (peer-to-peer) file sharing technology used to share files efficiently. This technology relies on a community of decentralized users for file sharing rather than being dependent on traditional single website or source for downloading. …
VPN (Virtual Private Network) is a technology that lets you access the web safely and privately. It acts like a secure tunnel between your device and the internet. The information traveling between a connected device (computer, smartphone, tablet) and a …
The differences between GLC-T and GLC-TE are as follows – SOURCE:https://ipwithease.com
Virtual Private Networks (VPNs) and Proxy servers are both useful tools for improving your online privacy and security, but they serve different purposes. A VPN works by transferring your internet connection to a private server, thus making it much harder …
Introduction : SNAT vs DNAT In our previous post, we discussed about the NAT in detail. NAT is abbreviated for Network Address Translation, so the key word here is translation, as it is the process that is responsible for translation …
The differences between M1 Series, M2 Series and M3 Series are as follows – SOURCE:https://ipwithease.com
Before understanding LAN vs WAN, let’s know the two terms. LAN is abbreviation for Local Area Network. LAN is a network covering a small geographic area and connecting various end devices like computers and printers. LAN may be limited to a home, office, …
Difference between Central CEF and Distributed CEF SOURCE:https://ipwithease.com
In today’s world, a stable internet connection is essential for work, entertainment, and staying connected. But when setting up your home network, you might wonder: What’s the difference between a modem and a router? Many people confuse these two devices, …
Difference between Internet and Intranet SOURCE:https://ipwithease.com
Difference between GTM and LTM FUNCTION GTM LTM Full Form Global Traffic Balancer Local Traffic Manager Industry Standard name Global Load Balancer Server Load balancer Name resolution GTM performs name to IP resolution Does not perform name to IP resolution …
TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are two core protocols of the Internet Protocol (IP) suite. They differ significantly in their features, use cases, and reliability. TCP vs UDP Here’s a detailed comparison: 1. Connection Handling TCP: …
Both Virtual PortChannel (vPC) and Virtual Switching System (VSS) are Cisco technologies designed to improve network redundancy and bandwidth utilization by eliminating Spanning Tree Protocol (STP) blockages. However, they operate differently and are used in different scenarios. Lets explore the …
Before discussing eBGP vs iBGP, let’s understand the two protocols briefly. What is eBGP It is abbreviation for External Border Gateway Protocol and is one of the flavors of BGP protocol. eBGP Routing protocol is used between BGP speaking neighbors …
Syslog is a method to collect messages from devices to a server running a syslog daemon. Logging to a central syslog server helps in aggregation of logs and alerts. Cisco devices can send their log messages to a Unix-style SYSLOG …
Introduction Computer Networks can be divided into various types depending upon their size and usability. The size of a network can be assessed by its geographical distribution. It can be as small as a room with a few devices/computers or …
Introduction Computer Networks can be divided into various types depending upon their size and usability. The size of a network can be assessed by its geographical distribution. It can be as small as a room with a few devices/computers or …
UDP HEADER It consists of four fields each of 2 bytes in length – Source Port(16 bits) – This field identifies the sender’s port. Cleared to zero if not used. Destination Port(16 bits) – This field identifies the receiver’s port. …
UDP (User Datagram Protocol) is a transport layer protocol used primarily for low-latency and loss tolerating connections. Outlined by RFC 768 it provides a best-effort datagram service to an end host.In distinction to TCP, UDP just sends the packets with no packet acknowledgements that ends up into much lower bandwidth overhead and latency. However …
TCP i.e.Transmission Control Protocol is one of main Transport Layer protocol which provides reliable, connection-oriented communication over IP networks between two end stations. When data is provided to the IP protocol, it encapsulates them in IP datagrams. TCP is defined by the …
VRF (Virtual routing and forwarding) is a technology that allows multiple instances of a routing table to co-exist within the same router at the same time. Overlapping IP addresses can be used without conflicting with each other as the routing …
TCP HEADER (Transmission Control Protocol ) Source port (16 bits): Port related to the application in progress on the source machine Destination port (16 bits): Port related to the application in progress on the destination machine Sequence number (32 bits): When the …
Network Topology Leaf-and-spine is a two-layer network topology composed of leaf switches and spine switches. We are all aware of the Cisco’s 3-tier network topology with the following 3 layers – 1)Access Layer 2)Aggregation/Distribution Layer 3)Core layer The Access Layer …
Introduction to WAN Computer Networks can be divided into various types depending upon their size and usability. The size of a network can be assessed by its geographical distribution. It can be as small as a room with a few …
Introduction to LAN Computer Networks can be divided into various types depending upon their size and usability. The size of a network can be assessed by its geographical distribution. It can be as small as a room with a few …
MAC (Media Access Control) Address The MAC address is used by the Media Access Control sublayer of the Data-Link Layer (DLC) of telecommunication protocols. Every NIC (also called LAN card) has a hardware address that’s known as a MAC, for Media Access Control. …
OSPF uses LSAs or Link state Advertisements to share information of each network and populate the LSDB (Link State Database). The main LSA types are : LSA Type 1 (Router LSA):generated by each router for each area it is located. …
VPRN (Virtual Private Routed Network) is a Multipoint-to-Multiponit Layer 3 VPN Service that connects multiple branches in a single logical routed architecture over IP/MPLS network of a Service Provider. This is called Layer 3 VPN generally, but Alcatel-Lucent define this Layer 3 VPN as VPRN(Virtual Private Routed …
SIP i.e. Session Initiation protocol is an open source protocol. It communicates on TCP or UDP on port numbers 5060 or 5061. SIP has got a range of different messages with each having lot of additional data, thus making it …
SCCP stands for Skinny Client Control Protocol . It is a lightweight , proprietary control and communication protocol originally developed by Selsius Systems and later taken over by Cisco Systems.It is a lightweight IP-Based protocol for Signalling with CUCM and CME for Cisco …
Introduction iBGP is abbreviation for Internal Border Gateway Protocol. iBGP protocol is used between the routers within the same autonomous system (AS). iBGP speaking Routers need to form full mesh to maintain full routing information. Full mesh (iBGP neighborship with all Routers …
Introduction eBGP is abbreviation for External Border Gateway Protocol and is one of the flavors of BGP protocol. eBGP Routing protocol is used between BGP speaking neighbors which belong to different ASNs (Autonomous System Numbers). eBGP functions as the protocol for …
Network Switching Network Switching works at Layer 2 (Data Link Layer) of OSI model. Switching is a process of receiving frame from one incoming port (ingress) and then forwarding it to as desired destination (egress). Types of Network Switching Switching …