Let us learn some of the basic information about the time-division multiplexing and different types of multiplexing in it. The time-division multiplexing can be of two types. It can be statistical time division multiplexing and frequency division multiplexing. Before we ...
Snabay Networking Latest Articles
Phishing and Pharming Spoof Attacks
Phishing Attack Phishing and Pharming Spoof Attacks: The phishing attack is a cyber-attack in which a user is redirected to an illegitimate and unauthorized website which is disguised as a legitimate one. The purpose of this attack is to extract ...
What is a Network Switch | Types | Working and Specifications
A Network Switch is a networking device helpful to connect multiple devices. Like if we have 10 computers then we can connect computers to the ports of the Network switch for the local communication and it works on the second ...
Function of OSI Model Layer
Let us know about Function of OSI Model Layer OSI model: Open System Interconnection Model: OSI model defines and is used to understand how data is moved from one computer to another in a computer network in the most basic ...
Pipelining in Computer Architecture
Let us understand the concept of python in a simple way. A pipelining is usually a process of arrangement. It arranges the elements of the central processing unit to increase the performance. The pipelining concept can increase the overall performance ...
Types of Transmission mode – Simplex, Half duplex and Full duplex
These three are the channels of signal transmission mode between two connected devices. Simplex – It is more of like a one-way street, the signal travels only in one direction. The sender can say anything they want and the receiver ...
How to Configure EIGRP Routing Protocol | Basic Eigrp Configuration Example
This chapter describes how to configure enhanced interior gateway routing protocol (EIGRP). It is the improved version founded by Cisco. The feature which is different from IGRP and RIP is, they do not send updates of the periodic route. The ...
Named Access List Configuration (Named ACL) | Cisco Named ACL
This section, briefly explains the creation and configuration of the extended named access control list. Based on the source address and the destination address traffics can be denied or can be permitted in extended named access control lists. All the ...
Per-VLAN Spanning Tree (PVST), Per-VLAN Spanning Tree Plus (PVST+)
The functioning of spanning tree protocol with virtual local area networks should collaborate because spanning tree protocol makes or designs the network topology to avoid loops in the bridged or switch topologies to expel the propagation of broadcast in the ...
What is Rapid Spanning Tree Protocol
Rapid spanning tree protocol is an extension of the original spanning tree protocol. The reason behind the expansion is to speed up the process and configurations remain the same. STP (802.1D) which is having five different port states called disabled, ...