Security can be enforced with scalable network design and cryptography. Cryptography, and more precisely cipher suites, help achieve the three pillars of computer and network…
Thoughts of a Network Engineer
Security can be enforced with scalable network design and cryptography. Cryptography, and more precisely cipher suites, help achieve the three pillars of computer and network…
The following are some of the most important OSPF knowledge gems, which I’ve condensed in a single tutorial. Let us start first with looking into…
We’ve seen in a previous post that IEEE ratified wireless networks as 802.11 standards. They are commonly known as WiFi by the general public (for…
This post is an overview of the most popular LAN technology: Ethernet. A bit of History At first, the DIX group developed Ethernet II, then…
In this post we will cover the recovery procedure steps of a Cisco ACS aka Secure Access Server. I assume you have the ACS Recovery…
We will talk about MAC protocols, Ethernet technology and CSMA/CD, all operating at the lowest two layers of the OSI model, which corresponds to the…