As we have learned in my previous blog about IGMP (Internet Group Management Protocol) version 1 and version2. Thisblog will cover IGMP version 3 how it is a better approach to use this version, and how IGMPv3 solves the Source authentic issue with the concept of Source-Specific Multicast (SSM). Terminology of IGMP Version 3 IGMPv3 uses Membership Report message as it is like use as the previous IGMP version 1 & version 2. IGMPv3 uses multicast address 224.0.0.22 on all enabledIGMPv3 multicast […]
Here we will discuss what is cloud computing in which we will be discussing about the foundation topics of cloud computing like what is cloud hype, the history about the foundation topics of cloud computing like what is cloud hype, the history about cloud computing, common cloud characteristics, on-demand self-service, rapid elasticity, resource pooling, etc. […]
As a Network Security Engineer, this is our responsibility to secure your organization’s data over the internet. Our goal is to give you detailed information about How your data would be protected over the internet and Which protocols and Frameworks will be used to protect your data. We already discussed IKev1 working with IPsec. In […]
What is IPsec? IPsec VPN (internet protocol security) is a protocol or method to encrypt the traffic between two branches or sites. It is used to secure the traffic over an untrusted network, and we can understand by its name that it provides security of INSIDE network IPs. It provides Confidentiality, Integrity, and Authentication over […]
In this blog, we will learn about VLAN Trunking Protocol generally called VTP. We will see why VTP came into existence and will discuss how it works and where it can be deployed. For understanding, we will take some examples. Before VLAN trunking protocol (VTP), for creation, addition, deletion, renaming of VLAN, we must go […]
An Area type of ospf is a logical group of devices within a single administration. Cisco recommends that the single area should not have more than 50 routers. It has a 32 bit long ID and area-id can be represented in decimal number or ipv4 format Area type of ospf. WHY DO WE USE AREA […]
What is GSLB? Global Server Load Balancer (GSLB) enables balancing server traffic load across multiple physical sites. It Refers to web traffic management and application delivery over multiple data centers whether it is public or private clouds in multiple geographical areas. A load of hosted applications on the servers at each location is managed by […]
What is SDN? SDN is Software Defined Networking, which is an approach of network management, managing our devices centrally. This will give us easy monitoring and easy troubleshooting of distributed network devices. By removing the control plane of network devices, SDN will attempt to centralize the network intelligence in our network component. Having one or […]
An organization will work flawlessly when they have the best IT provider or managed IT services provider. But what if your IT provider is not giving what they promised? How will you ask them to cooperate, so they do what they have in SOW? Or is it time to switch the IT provider? What Signs […]
Remember Edward Snowden and how he leaked highly classified information from the NSA in the year 2013 when he was an employee of the CIA. The amount of information revealed by him was highly classified and being a government employee, this was a very serious offense. Now this was something that was “done” by a […]