This chapter describes how to configure enhanced interior gateway routing protocol (EIGRP). It is the improved version founded by Cisco. The feature which is different from IGRP and RIP is, they do not send updates of the periodic route. The ...
Snabay Networking Latest Articles
Named Access List Configuration (Named ACL) | Cisco Named ACL
This section, briefly explains the creation and configuration of the extended named access control list. Based on the source address and the destination address traffics can be denied or can be permitted in extended named access control lists. All the ...
Per-VLAN Spanning Tree (PVST), Per-VLAN Spanning Tree Plus (PVST+)
The functioning of spanning tree protocol with virtual local area networks should collaborate because spanning tree protocol makes or designs the network topology to avoid loops in the bridged or switch topologies to expel the propagation of broadcast in the ...
What is Rapid Spanning Tree Protocol
Rapid spanning tree protocol is an extension of the original spanning tree protocol. The reason behind the expansion is to speed up the process and configurations remain the same. STP (802.1D) which is having five different port states called disabled, ...
Crossover Cable and Straight Through Cable
Crossover Cable is simply related to the connection of two devices of the same technology or systems like DCE-DCE or DTE-DTE, basically connecting asymmetrical devices like DTE-DCE cables are known as cross-link cables. IBM (International Business Machines Corporation) introduced such ...
What is Ethernet and Types of Ethernet
Ethernet is an arrangement of technologies of networking and structure used in LAN (Local Area Networking), where computer systems are connected within a locality. Ethernet uses a Communication system that split data in different packets, which are known as frames. ...
What is Email Security, Data Protection
Perhaps the most sophisticated form of communication in today’s world is the e-mail which also seems to a legitimate successor to the letters. Based on the same format and writing style, email is not more than an electronic form. For ...
What is Wired Equivalent Privacy (WEP)
As a part of IEEE 802.11, Wired Equivalent Privacy (WEP) has been specified as one of the security protocols and a part of the algorithm to provide the customers with as much data confidentiality as the wired technology, devices, and ...
Institute of Electrical and Electronics Engineers (IEEE) 802.11 Wireless Standard
IEEE 802.11 Wireless Standard: The Institute of Electrical and Electronics Engineers or the IEEE is a New York-based international professional association of electrical engineers and electronic engineering formed in 1963. IEEE 802.11 is a part of a LAN Protocol standard ...
What is Symmetric Encryption Algorithms
Encryption is as essential for your data as a key is essential for a lock that protects your house. Symmetric Encryption uses the Symmetric Key to encrypt and decrypt information and Algorithms are a part of this whole process that ...