Posts

Showing posts from November, 2022

VLANS

Image
 Introduction To VLAN One or more local area networks can be combined to form a bespoke network called a VLAN. It makes it possible to combine a collection of devices that are spread across several logical networks. As a result, a virtual LAN that is managed similarly to a physical LAN is created. Virtual Local Area Network is the term used to refer to VLAN in its entirety. A broadcast sent from a host can easily reach all network devices without VLANs. Every single device will process the frames that were broadcast. It may lower overall network security and raise CPU overhead on each device. A broadcast from host A can only reach devices that are present in the same VLAN if you segregate the interfaces on both switches into distinct VLANs. VLAN hosts won't even be aware that communication occurred. A virtual LAN extension is known as VLAN in networking. A local area network, or LAN, is a collection of computers and related peripherals that are linked together in a specific locatio...

Cloud Security

Image
Introduction  The transmission of hosted services, such as software, hardware, and storage, through the Internet, is known as cloud computing. The advantages of rapid deployment, flexibility, low initial costs, and scalability have practically forced enterprises of all sizes to use cloud computing, frequently as a component of a hybrid/multi-cloud infrastructure architecture. The technology, regulations, guidelines, and services known as "cloud security" guard against attacks on cloud data, applications, and infrastructure. Security in the Cloud is a Shared Responsibility Both the cloud service provider and the client are accountable for cloud security. In the Shared Responsibility Model, responsibilities fall into three general categories: those that are always the provider's, those that are always the customer's, and those that change depending on the service model: Cloud email is an example of Infrastructure as a Service (IaaS), Platform as a Service (PaaS), or Sof...

Cloud Computing: Resource Pooling

Image
  Introduction In cloud computing environments, the term "resource pooling" is used to describe a situation in which service providers offer temporary and scalable services to a number of clients, customers, or "tenants." Without the client or end-user being aware of any changes, these services can be modified to meet the demands of each client. Platforms for cloud computing can be accessed online. Additionally, it might be developed, controlled, or shared platforms that offer specialized services. These advanced technologies also enable clients to benefit from flexibility and scalability. A number of clients are served concurrently by the service provider under the cloud computing resource pooling model. They deal with such clients using a multi-tenant concept. As a result, this model includes computing resources like cores, storage, and RAM. In order to enable flexibility in service provision, all of these devices are handled as a single entity. These systems offe...

Subnetting

Image
Introduction The technique known as subnetting is used to divide a single physical network into multiple smaller logical sub-networks (subnets). A network segment and a host segment are both parts of an IP address. When creating a subnet, bits from the host portion of an IP address are accepted, and these bits are then used to allocate a number of smaller sub-networks inside the main network. Subnetting enables an organization to add sub-networks without having to contact the Internet service provider to obtain a new network number (ISP). Subnetting hides network complexity and aids in reducing network traffic. When a single network number must be distributed across multiple local area network segments, subnetting is crucial (LAN) A subnet mask is a component of every IP address. The default subnet mask is present in all class types, including Class A, Class B, and Class C. The purpose of the subnet mask is to identify the kind and quantity of IP addresses needed for a specific local n...

What Is TCP?

Image
  A network communication between applications is established and maintained according to the Transmission Control Protocol (TCP) standard. Transmission Control Protocol, or TCP, is a communications standard that enables computer hardware and software to exchange messages over a network. It is made to send packets across the internet and make sure that data and messages are successfully sent through networks. TCP is one of the fundamental standards that the Internet Engineering Task Force (IETF) has specified as the guidelines for the internet (IETF). It provides end-to-end data delivery and is one of the most widely utilized protocols in digital network communications. Layers of the TCP/IP model 1. DataLink Layer Data transmission between applications or devices on a network is handled by the datalink layer, which also manages the actual sending and receiving of data. This includes specifying how hardware and other transmission devices, such as a computer's device driver, an ...

Cloud Computing

Image
  Different services are delivered via the Internet through cloud computing. These tools and programs comprise software, servers, databases, networking, and data storage, among other things. Cloud-based storage enables you to save files to a remote database rather than a proprietary hard disk or local storage device. An electronic gadget has access to the data and the software applications needed to run it as long as it has internet access. For a variety of reasons, including cost savings, enhanced productivity, speed and efficiency, performance, and security, cloud computing is a popular choice for both individuals and corporations. Cloud Computing Models Like a chip or a phone, cloud computing is not a standalone piece of technology. Instead, it is a system made up largely of three services: platform-as-a-service, infrastructure-as-a-service, and software-as-a-service (SaaS) (PaaS).  Infrastructure-As-A-Service The fundamental components of cloud computing, also known as Iaa...

OSI Model

Image
 OSI model  The International Organization for Standardization (IOS) developed the open systems interconnection (OSI) model, a conceptual framework that enables various communication systems to exchange data via agreed-upon protocols. The OSI, or Open Systems Interconnection, offers a standard for various computer systems to be able to communicate with one another. One could think of the OSI Model as a common language for computer networking. Its foundation is the idea that a communication system may be broken down into seven abstract levels, each one built on top of the previous. Relevance Of The OSI Model The OSI Model is still very helpful for diagnosing network issues even though the modern Internet doesn't precisely adhere to it (rather, it closely follows the less complex Internet protocol suite). The OSI Model can assist in deconstructing the issue and identifying the troubleshooting step, whether it concerns one person who is unable to connect their laptop to the ...

SSH In Networking

Image
 What is SSH      Comparable to HTTP, or hypertext transfer protocol, which is the protocol used to send hypertext like web pages, SSH, or Secure Shell, is a network communication protocol that enables two computers to communicate and share data. SSH is suited for usage over insecure networks due to an inherent feature that encrypts communication between the two computers.      SSH uses the normal TCP port 22, which is. SSH certificates are beneficial because they use strong encryption, are simple to set up and maintain, offer role-based access, and guarantee certificate validity. How SSH Certificates Make Access Simple and Secure     U sing a password for authentication     Each user establishes a username and password combination. When logging into the server, the username and password combination is used. The combination is verified by the server, and if it is accurate, access is granted.      Using public key...