Rapid spanning tree protocol is an extension of the original spanning tree protocol. The reason behind the expansion is to speed up the process and configurations remain the same. STP (802.1D) which is having five different port states called disabled, ...
Snabay Networking Latest Articles
Crossover Cable and Straight Through Cable

Crossover Cable is simply related to the connection of two devices of the same technology or systems like DCE-DCE or DTE-DTE, basically connecting asymmetrical devices like DTE-DCE cables are known as cross-link cables. IBM (International Business Machines Corporation) introduced such ...
What is Ethernet and Types of Ethernet

Ethernet is an arrangement of technologies of networking and structure used in LAN (Local Area Networking), where computer systems are connected within a locality. Ethernet uses a Communication system that split data in different packets, which are known as frames. ...
What is Email Security, Data Protection

Perhaps the most sophisticated form of communication in today’s world is the e-mail which also seems to a legitimate successor to the letters. Based on the same format and writing style, email is not more than an electronic form. For ...
What is Wired Equivalent Privacy (WEP)

As a part of IEEE 802.11, Wired Equivalent Privacy (WEP) has been specified as one of the security protocols and a part of the algorithm to provide the customers with as much data confidentiality as the wired technology, devices, and ...
Institute of Electrical and Electronics Engineers (IEEE) 802.11 Wireless Standard

IEEE 802.11 Wireless Standard: The Institute of Electrical and Electronics Engineers or the IEEE is a New York-based international professional association of electrical engineers and electronic engineering formed in 1963. IEEE 802.11 is a part of a LAN Protocol standard ...
What is Symmetric Encryption Algorithms

Encryption is as essential for your data as a key is essential for a lock that protects your house. Symmetric Encryption uses the Symmetric Key to encrypt and decrypt information and Algorithms are a part of this whole process that ...
What is Asymmetric Encryption, Cyphertext

When we talk about encrypted communication, we have to keep in mind two parties primarily; the sender and the receiver. The former encrypts and the latter decrypts. Described as the foundation of Public Key Infrastructure (PKI), Asymmetric Encryption key provides ...
What is a Honeypots in Network Security

If you look up the history of cyber crimes(honeypots), there you can find a lot of creative and unique ways that attackers use to victimize their targets. With the possibility of different types of attacks targeting different functions and trying ...
Enterprise Non Public Network (Private Network)

Enterprise Non-Public Network (Private Network): In this age of the internet, all users connected to the internet can send and receive data publicly. But in its primitive form, computer networks were formed by organizations such as universities, military, and research ...