concept of networking

Most Relevant Content

  • Computer Networking Basics

    Computer networking is a buzzword to the present world. By the virtue of computer networking, the world has become just like a village. So, anyone of the world can communicate with any person of the world within seconds as if they are living in a village. Computer networking does not mean a single element. A lot of networking elements and protocol work behind a computer networking. So, the computer guys who are interested to learn how computer networking works should learn the basic elements and protocol of computer networking. In this article, I will explain some basic networking terms which are frequently used in computer networking. If you are a beginner in computer networking and want to be a network administrator, you should understand these basic networking terms clearly. So, keep reading the rest of this article. I hope, it will be helpful for you. What Is a Computer Network? A computer network is nothing but some rules and regulations used to connect computers together. These computers may have at a small distance or large distance. Basically, a computer network is all of the components (Hardware, Cabling, Network Devices and Software) which are involved in connecting computers. The purpose of [...]

    READ MORE »

  • More Similar Content

  • »

    Computer Network Topology Outline |   September 12, 2017

    The first thing that has to study about a network is its physical shape or design layout. It will be extremely important when a wiring scheme and design are selected for a new network installation. Actually Network Topology refers to physical shape or design layout of a network. Network topology determines how different nodes in a network are connected and how these nodes communicate to each other. Types of Computer Network Topology Network really has two shapes or two types [...]

    READ MORE »

  • »

    Network Bandwidth and Throughput |   February 17, 2017

    Bandwidth and Throughput are two important basic networking terms in computer network. If you wish to be an expert network administrator, you must have better understanding about these two networking terms. As a network user, you should also have better understanding about network bandwidth and throughput so that you can get maximum output from your network service provider. In this article, I will explain about network bandwidth and throughput from very beginning. I hope, this article will enrich your networking [...]

    READ MORE »

  • You May Also Like

  • »

    MikroTik Site to Site VPN with L2TP/IPsec |   March 3, 2018

    VPN (Virtual Private Network) is a technology that provides a secure and encrypted tunnel across a public network. A private network user can send and receive data to any remote private network using this VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik L2TP server is one of the most popular VPN services. It provides a secure and encrypted tunnel across public network for transporting IP traffic using PPP. L2TP/IPsec is more secure than [...]

    READ MORE »

  • »

    MikroTik SSTP VPN Server Configuration with Windows 10 |   April 27, 2020

    VPN (Virtual Private Network) technology provides a secure and encrypted tunnel across a public network. So, a private network user can send and receive data to any remote private network through VPN tunnel as if his/her network device was directly connected to that private network. Secure Socket Tunneling Protocol (SSTP) transports PPP tunnel over TLS channel. SSTP uses TLS channel over TCP port 443. So, SSTP VPN can virtually pass through all firewalls and proxy servers. Because of using TLS [...]

    READ MORE »

  • »

    MikroTik Router Auto Backup via Email |   August 23, 2016

    MikroTik Router is popularly used in not only ISP network but also enterprise office network. So, network administrators of any company should learn how to maintain MikroTik router properly. A regular task of a network administrator is to store configuration file backup. Almost every network administrator takes configuration file backup manually. But MikroTik router provides an E-mail tool by which network administrators can automate configuration file backup regularly via email and can reduce his/her daily manual task easily. E-mail tool is [...]

    READ MORE »

  • »

    Hardening MikroTik RouterOS by Limiting Login Services |   February 6, 2021

    MikroTik RouterOS is usually used as a bridge between WAN and LAN network. WAN network is always an insecure network because attackers always try to hack your RouterOS so that they can compromise it for their own benefit. As a network administrator of MikroTik RouterOS, we should always take anti hacking steps to secure our MikroTik RouterOS. There are a lot of security tasks those we should take care to secure our MikroTik RouterOS. Among these security tasks, we will [...]

    READ MORE »

  • »

    MikroTik HotSpot One to One NAT/Universal HotSpot NAT |   September 27, 2020

    MikroTik Hotspot is an awesome service that can be customized widely. When MikroTik Hotspot is enabled on an interface, it adds dynamic destination NAT rules which will redirect all HTTP and HTTPS requests from unauthorized users to the Hotspot authentication proxy. So, no user can get internet access in Hotspot network without authentication. MikroTik Hotspot also uses one to one NAT providing an IP address from selected IP Pool and this IP address handles user’s data and limitation. Sometimes we [...]

    READ MORE »

  • »

    VMware ESXi 7.0 Installation and Basic Configuration |   December 1, 2020

    VMware vSphere is the pioneer in virtualization world. No other virtualization software is as feature rich as VMware vSphere. More than 500,000 enterprise data center are now using VMware vSphere. It is expected that most of the data center will be turned into virtualization in near future. As VMware vSphere provides more feature than any other virtualization software, it is also expected that demand of VMware vSphere will increase day by day. VMware ESXi is the foundation of VMware vSphere [...]

    READ MORE »

  • »

    How to Create Free SSL/TLS Certificate with OpenSSL |   July 23, 2021

    SSL/TLS certificate is required to encrypt data sent over internet communication. Without encryption, the sent data can be hacked by the middle man attack. SSL/TLS certificate is usually a pair key, public key and private key, solution where data is encrypted with public key and decrypted with private key. In public communication, public key is required to be signed by a CA (certificate authority) but in private communication, there is no need to be signed by any CA. If we [...]

    READ MORE »