When we talk about encrypted communication, we have to keep in mind two parties primarily; the sender and the receiver. The former encrypts and the latter decrypts. Described as the foundation of Public Key Infrastructure (PKI), Asymmetric Encryption key provides ...
Snabay Networking Latest Articles
Per-VLAN Spanning Tree (PVST), Per-VLAN Spanning Tree Plus (PVST+)
The functioning of spanning tree protocol with virtual local area networks should collaborate because spanning tree protocol makes or designs the network topology to avoid loops in the bridged or switch topologies to expel the propagation of broadcast in the ...
Named Access List Configuration (Named ACL) | Cisco Named ACL
This section, briefly explains the creation and configuration of the extended named access control list. Based on the source address and the destination address traffics can be denied or can be permitted in extended named access control lists. All the ...
What is Symmetric Encryption Algorithms
Encryption is as essential for your data as a key is essential for a lock that protects your house. Symmetric Encryption uses the Symmetric Key to encrypt and decrypt information and Algorithms are a part of this whole process that ...
What is a Honeypots in Network Security
If you look up the history of cyber crimes(honeypots), there you can find a lot of creative and unique ways that attackers use to victimize their targets. With the possibility of different types of attacks targeting different functions and trying ...
Institute of Electrical and Electronics Engineers (IEEE) 802.11 Wireless Standard
IEEE 802.11 Wireless Standard: The Institute of Electrical and Electronics Engineers or the IEEE is a New York-based international professional association of electrical engineers and electronic engineering formed in 1963. IEEE 802.11 is a part of a LAN Protocol standard ...
Difference Between Half Duplex and Full Duplex Switching Mode | Examples of Half and Full Duplex
The most incredible and effective function in machines is their ability to communicate and work with each other just like human beings despite not having an intellect and intelligence of their own. The communication between or over two devices is ...
How to Connect Cisco Router step by step
How to Connect Cisco Router step by step In this tutorial you able to learn how to connect and set up the Cisco router step by step so keep reading this article till the end, At the end of the ...
All Show Commands in Cisco Switch and Router
Cisco router runs on an operating system called the IOS (Internetwork Operating System).To enable the administrator to retrieve information and change the device’s settings. One of the most powerful command in IOS is Show. To know All Show Commands in ...
Collision Domain and Broadcast Domain
Collision Domain And Broadcast Domain plays an important role in networking when the device send and receive the data from each other. Collision Domain Collision Domain is a set of LAN devices whose frames could collide with one another. This ...