networking basic concepts

Most Relevant Content

  • What Are the 7 Layers of OSI Model and How Do They Work

    The OSI Model stands for Open Systems Interconnection Model, a conceptualized framework used to describe the seven layers of a telecommunication system or network. It was established as an international standard in the year 1984 by the International Organization for Standardization. This model helps visualize how networks operate and is still used today to figure out and solve network problems, such as by a web development company. In this article, we will talk about the 7 layers of the OSI Model and how each of them work. Layer 1 – Physical Layer The physical layer concerns the part of the model used for transmitting raw data bits (0s and 1s) across the network between sending and receiving devices. This can be through a physical cable or even a wireless connection between physical nodes. The physical layer can also represent voltages, frequencies, pin layouts, and other things. Any other physical devices part of this transmission, like hubs and modems, are also included. Ethernet, USB, Bluetooth, IEEE 802.11 etc. protocols work on Physical Layer. Layer 2 – Data Link Layer The data link layer is in charge of establishing or eliminating a connection between physical nodes that may be connected through a [...]

    READ MORE »

  • »

    Computer Networking Basics |   February 10, 2017

    Computer networking is a buzzword to the present world. By the virtue of computer networking, the world has become just like a village. So, anyone of the world can communicate with any person of the world within seconds as if they are living in a village. Computer networking does not mean a single element. A lot of networking elements and protocol work behind a computer networking. So, the computer guys who are interested to learn how computer networking works should [...]

    READ MORE »

  • You May Also Like

  • »

    How to Block WiFi Access although Password is Known |   April 23, 2024

    We usually get internet connection from any ISP and buy any WiFi Router and then configure wireless/AP with password and configure DHCP Server to get connection from own WiFi devices. We use these WiFi Routers/APs at home, office, workspace or any other public places. Usually, we get connected to our WiFi using our provided WiFi password. Initially there will be no problem to keep your network safe using password authentication. But day by day your password will be known by [...]

    READ MORE »

  • »

    MikroTik Router Integration and Configuration on GNS3 |   September 19, 2018

    GNS3 is a network simulator software used by hundreds of thousands of network engineers worldwide to emulate, configure, test and troubleshoot virtual and real networks. GNS3 can talk a large number of network vendors including MikroTik. MikroTik introduces Cloud Hosted Router (a RouterOS version) that is used to run as virtual machine and a virtual machine can easily be integrated with GNS3. So, network administrators who are fond of MikroTik Router can now configure, test and troubleshoot their MikroTik network [...]

    READ MORE »

  • »

    MikroTik User Manager RADIUS Installation on RouterOS 7 |   July 5, 2022

    The User Manager is a MikroTik provided RADIUS Server packages. It can be used to manage users for small or medium level business. User Manger is not a default RouterOS packages. So, we have to install user manager as an extra package in RouterOS 7. RouterOS 7 has brought a massive change on User Manager package. The most important change is managing User Manager from Winbox while in RouterOS 6 the User Manager package can only be managed from Web [...]

    READ MORE »

  • »

    Install MikroTik RouterOS on PC |   June 13, 2016

    MikroTik is a popular and mostly used router worldwide because of having a lot of networking functionalities and its cheap price. If we buy a MikroTik Routerboard (like MikroTik Routerboard 450G, MikroTik Routerboard 1100 AH etc.), we will find a machine where MikroTik RouterOS is prebuilt but the machine contains limited processing resources such as limited RAM and limited processor core. So, our network could be slow if you use a MikroTik RouterBoard for maintaining a large network. On the [...]

    READ MORE »

  • »

    HTTP vs. HTTPS: The Impact Of Using SSL Certificates |   November 29, 2021

    Google and cybersecurity experts continue to make clarion calls to web admins and website owners to switch from HTTP to HTTPS. But is there any difference between the two other than the extra ā€œSā€ at the end of HTTPS? Not everyone understands the differences between HTTP and HTTPS and why the difference is so significant. In this post, we will discuss the differences between HTTP and HTTPS, the reasons why you need to switch from HTTP to HTTPS, and the [...]

    READ MORE »

  • »

    How to Secure MikroTik RouterOS Login Users |   February 19, 2021

    MikroTik RouterOS is a bridge between WAN and LAN. So, it is mandatory to apply RouterOS login user security policy. Otherwise, RouterOS may so insecure.

    READ MORE »

  • »

    MikroTik Site to Site OpenVPN Server Setup (RouterOS Client) |   April 9, 2018

    VPN (Virtual Private Network) technology provides a secure and encrypted tunnel across a public network. So, a private network user can send and receive data to any remote private network through VPN tunnel as if his/her network device was directly connected to that private network. MikroTik OpenVPN Server provides a secure and encrypted tunnel across public network for transporting IP traffic using PPP. OpenVPN Server uses SSL Certificates. So, OpenVPN Tunnel is a trusted tunnel to send and receive data [...]

    READ MORE »

  • »

    How to Recover MikroTik User Password |   August 9, 2018

    MikroTik Wiki and Forum say that there is no way to recover MikroTik user password without losing MikroTik configuration. But if you have an unencrypted configuration file backup taken before, you will be able to recover your user password using MikroTik password recovery tools. How to Backup and Restore MikroTik configuration file manually was discussed in my previous article. I also discussed how to backup MikroTik configuration file automatically via Mail in another article and in this article I will [...]

    READ MORE »