Packet Filtering using Access Control Lists (ACLS)
Jul 26, 2021
Networks tend to be vulnerable (to security risks) due to the incoming and outgoing unwanted and dangerous traffic. A security mechanism is needed to control the flow of traffic and provide a secure remote...
Differences between a Hub, a Switch, and a Router
Jul 16, 2021
In networking, the terms switches, hubs, and routers are sometimes used interchangeably which is wrong.
Comparison between the HTTP/3 and HTTP/2 Protocols
Jul 5, 2021
HTTP stands for HyperText Transfer Protocol. It has been the de facto way of information transfer on the World Wide Web. While version 1.1 is still the most widely implemented protocol, it has its limitations....
Understanding Quality of Service (QoS)
Jun 27, 2021
QoS is an essential set of technologies that allows one to optimize their network to run at its full potential. The importance of having a peak-performing network is it ensures that intensive applications run...
Networking Management Using CDP and LLDP Protocols
Jun 22, 2021
One of the basic steps in network management and troubleshooting is to ensure the network connectivity is up and running. To achieve this, one must understand how devices connect between the network topology...