Skip to main content

Articles

To read the articles in this section, simply click on the article title or read button on the far right (if visible).

Use the below filters to customise the number of articles displayed or search for specific title topics/keywords.

Suggested Articles:

Network Fundamentals

Network Switches & Bridges

Network Switches are the evolution of Hubs and Repeaters, and enable the creation of networks by connecting multiple devices together. They are cri...
Ethernet Protocol, CSMA/CD, Collisions

Propagation Delay

You may know that the minimum frame size in an Ethernet network is 64 bytes or 512 bits, including the 32 bit CRC. You may also know that the maxim...
Network Cabling

USB Direct Cable Connection, USB Versions, Spec...

Today, Serial and Parallel Direct Cable Connections are considered obsolete methods of transferring data between computers. The fact is that even U...
Network Fundamentals

Network Data Transmission

Network data transmission refers to the process of sending and receiving information between two or more devices connected to a network. It is a cr...

Featured Subcategories:

Netflow Articles:

Netflow vs SNMP. Two Different Approaches to Ne...

SNMP (Simple Network Management Protocol) and Netflow are both popular protocols with admins, prized for their ability to give visibility over the ...

Complete Guide to Netflow: How Netflow & its Co...

This article will cover the basics of Netflow, including its use cases, Netflow supported devices, Netflow history, and variants. We’ll also dive i...

NetFlow Analyzer: Free Download, Step-by-Step I...

In our previous article we explained how a Netflow Analyzer can help you gain visibility into your user traffic, application traffic and data flows...

Netflow: Monitor Bandwidth & Network Utilizatio...

Monitoring network traffic & bandwidth usage via Netflow is mandatory for any type and size network. Gaining visibility into user traffic, appl...

Your IP address:

52.91.84.219

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Network and Server Monitoring

Network and Server Monitoring

Follow Firewall.cx

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Firewall Analyzer

zoho firewall analyzer


VLAN Networks

The VLAN Concept - Introduction to VLANs

We hear about them everywhere, vendors around the world are constantly trying to push them into every type of network and as a result, the Local Area Ne...
VLAN Networks

VLAN Tagging - Understanding VLANs Ethernet Frames

We mentioned that Trunk Links are designed to pass frames (packets) from all VLANs, allowing us to connect multiple switches together and independently ...
VLAN Networks

VLANs - IEEE 802.1q Trunk Link Protocol Analysis

While the VLAN Tagging article briefly covered the IEEE 802.1q protocol this article will continue building upon it by further analyzing the IEEE 802.1q...
VLAN Networks

InterVLAN Routing - Routing between VLAN Networks

This article deals with the popular topic of InterVLAN routing, which is used to allow routing & communication between VLAN networks. Our article an...

Routing

Routing Information Protocol - RIP

Routing Information Protocol (RIP) is a distance-vector routing protocol that is commonly used in small to medium-sized networks. It is one of the...
Routing

OSPF - Part 5: Analysis of OSPF Link State Update (L...

This article explains how OSPF uses Link State Advertisement (LSA) to exchange information about the network topology between routers. When a router rec...
Routing

Hybrid Routing Protocols - Advantages and Disadvanta...

Hybrid routing protocols are a combination of distance-vector and link-state routing protocols, and are used to provide a more efficient and scala...
Routing

Introduction to Routing Protocols

Distance Vector, Link State RIP, IGRP, EIGRP, OSPF Routing protocols were created for routers. These protocols have been designed to allow the exchan...

Virtualization & VM Backup

How to Fix VMware ESXi Virtual Machine 'Invalid Status'

In this article, we'll show you how to deal with VMs which are reported to have an Invalid Status as shown in the screenshot below. This is a commo...
Windows Servers

Windows Server 2016 Licensing Made Easy – Understand...

This article describes the new Windows Server 2016 Licensing model (per-core licensing) Microsoft has implemented for its new server-based operating sys...
SASE & SD-WAN Networks

Key Features of a True Cloud-Native SASE Service. Se...

Secure Access Service Edge (SASE) is an architecture widely regarded as the future of enterprise networking and security. In previous articles we talked...
Windows Servers

Configuring Windows Server Roaming Profiles

Windows roaming profiles allow the mobile users of a company to always work with their personal settings from any network computer in a domain. Roaming ...