Skip to content

Category Archives: Computer Networks

Firewire was one of the connectors used in digital devices especially in printers and digital Cameras. It was introduced by Apple. It came with some… Read More
Maximum Segment Size refers to size of the largest segment that local host accepts within a single packet. It denotes largest amount of data that… Read More
Switch is a network device that is used to segment the networks into different subnetworks called subnets or LAN segments. It is responsible for filtering… Read More
Same origin policy is a browser security feature that restricts a document or script loaded by one origin, to access or interact with documents or… Read More
EIGRP stands for Enhanced Interior Gateway Routing Protocol. The Protocol was designed by Cisco and is only available on Cisco routers. EIGRP helps in computer… Read More
Cisco IOS (Internetwork Operating System) is a proprietary operating system that runs on Cisco Systems routers and switches. The core function of Cisco IOS is… Read More
Network devices connect to a switch through its switch ports. Switch Ports which are physical opening where data cables are plugged in to connect the… Read More
Before we discuss the memories that are used in a Cisco router, let’s understand what basically a Router is. When we want to connect two… Read More
Let us know what an IP address is first, if you already know, skip this section.  IP (Internet Protocol): It is one of the fundamental protocols… Read More
192.168.0.0 is the starting point of the reserved private network space that encompasses all IP addresses through the 192.168.0.0-192.168.255.255 range. It refers to the IPv4… Read More
The switch with the best path to the root switch is set to forwarding. That switch is referred to as the designated switch, and its… Read More
Root Port:  A Root Port is a single selected port that has the lowest Path Cost to the Root Bridge. The Root Port on the… Read More
In this article, we are going to understand the difference between 127.0.0.1 and 0.0.0.0 IP addresses. However, before trying to understand the difference of different… Read More
In this article, we will learn about Unified Threat Management (UTM) and how it protects our computer against external threats and malware. Unified Threat Management… Read More
File caching enhances I/O performance because previously read files are kept in the main memory. Because the files are available locally, the network transfer is… Read More