Latest from the Blog
Scenario: You have been tasked to design a Wide Area Network for a distributed HQ deployment that allows staff users to work together in real-time regardless of location. The design will need to be created using Cisco Packet Tracer. There are 3 locations in use for this deployment: – Location 1 – America – LocationContinue reading
VLSM allow us a much tighter control over our addressing scheme. When we are using class C addressing with default sub net mask we end up with only one subnet containing 256 addresses, which we might not need. i.e if we need only 30 hosts and if we have 256 hosst then (256-30)= 226 hostsContinue reading “VLSM (Veriable Length Subnet Mask)”
Internet is simply a connection between many computers or devices which we cannot trust blindly. In a browsers or application we request for websites, i.e. we are requesting to visit http://www.youtube.com. In between our computer and YouTube there might be many hackers who wants to know about our sensitive information. Therefore, the hero of networkContinue reading “Network security !!”
Get new content delivered directly to your inbox.