The Null interface Router is a “bit bucket” p or can be considered as a “black hole “interface where all unwanted traffic is sent to be discarded. It is mostly used for filtering unwanted traffic because traffic can be discarded ...
Snabay Networking Latest Articles
Manual EtherChannel Configuration in Cisco Switches Using Channel mode “on”

The concept Manual EtherChannel Configuration is arrived from Cisco as a LAN switch-to-switch technique, which is port link aggregation technology dispenses fault-tolerant speed links between the servers, switches, and routers. EthernetChannel is a one-one relationship that connects only two devices. ...
Difference between STP and RSTP Spanning Tree Protocol

Spanning tree protocol is a Layer 2 protocol that works on bridges and switches. The specification for spanning tree protocol is 802.1D and the main aim of this concept is when we have redundant paths in the network it avoids ...
What is Network Protocols

Network Protocols are collections of formed rules that dominate how to transmit, format and share data by which computer networks can communicate anyway to the differences in their different infrastructures, processors or standards. Both the side computers must follow protocols ...
What is Common Wireless Attack, Types of CWA

As the technology progresses, it is becoming hassle-free and the reason might be that it is going wireless and many businesses that depend on heavy use of technology is embracing this new change. The new startups that the millennial entrepreneurs ...
What is DMZ (Demilitarized Zone) ?

Just like military powers fear an invasion from the enemies outside their point of control, big organizations and companies also face similar kinds of challenges when it comes to cybersecurity. A demilitarized zone in a political and geographical scenario means ...
What is Digital Certificate, Digital Signature

The Digital Certificate is a part of Cryptography that establishes communication between an end-user and a website. It is given to the public key holders to keep the count of the public keys in Asymmetric Encryption Cryptography and to make ...
Unguided Transmission Media | Working, Advantages and Disadvatanges

A wireless medium that doesn’t have any physical path in between is also meant to be an unguided transmission media, where the transmission doesn’t need to be guided. This can also be called wireless transmission media. Generally, the waves get ...
Limitation of Wired Network Connection

Traditional Wired networks connection have been in use for decades now. Wired network evolution has taken years and recently they have developed exponentially. They have been made reliable, fast and secure over the years. To know more about Wired Network ...
What is SAN Storage Area Network and how it works

Storage Area Network (SAN): In a network, various devices and resources are shared. We have the Servers, which are not directly accessed by the end-user. These Servers provide the computational power, processing and other resources to the end-user terminal which ...