Syslog is a standardized way of producing log information. This is really popular in Linux computers or UNIX computers, while Windows does a similar thing with the Event Log. Pretty much all routers, switches, firewalls, wireless controllers, and all sorts of other devices out there can produce syslog data. As your network grows you’ll find … Read more What is syslog
SMTP is similar to a mailman. The mailman picks up the mail from your mailbox at your home, finds the correct route and then delivers it to the destination mailbox.
Learn the main differences between the two email protocols commonly used today, POP3 and IMAP.
This article is about a series of network troubleshooting tools that you can use in command prompt to troubleshoot and gather information about your network. We’re going to go over four commands: “ipconfig”, “nslookup”, “ping”, and “tracert”. ipconfig The “ipconfig” displays the current information about your network such as your your IP and MAC address, … Read more Network Troubleshooting using PING, TRACERT, IPCONFIG, NSLOOKUP commands
HTTP stands for Hypertext Transfer Protocol and this is probably the most widely used protocol in the world today. HTTP is the protocol that is used for viewing web pages on the Internet. When you type in a web address, like google.com, you’ll notice that HTTP is automatically added at the beginning of the web … Read more HTTP, HTTPS, SSL and TLS Explained
We’re going to talk about the difference between a hub, a switch and a router. All three of these devices are similar, but there is a difference in the way they handle data. Hub The purpose of a hub is to connect all of your network devices together on an internal network. It’s a device … Read more Difference between Hub, Switch, & Router Explained
We can use iSCSI to create a Storage Area Network (SAN). iSCSI is a network protocol that encapsulates storage device communication data into IP packets for transmission over an Ethernet connection. This allows IP-connected hosts to access a Storage Area Network (SAN). Traditional Storage Area Networks are based on Fiber Channel. Fiber Channel SANs are very fast … Read more What is iSCSI
Before you start Objectives: Learn what is Remote Access, Remote Access Server, and how it is typically used and configured. Prerequisites: no prerequisites. Key terms: remote access, server, configuration, RAS, protocols, PPPoE What is Remote Access Remote Access allows a host to connect to a server or a private network, and access resources on the server or network … Read more Introduction to Remote Access
Before you start Objectives: Learn about different technologies that can be used to connecto to the Internet. Prerequisites: no prerequisites. Key terms: Internet, connection, technology, Dial-up, ISDN, DSL, Cable, Satellite, Wireless Public Switched Telephone Network (PSTN) The first method to connect to the Internet is using was PSTN. With PSTN we use a modem device, which takes a … Read more Connecting to the Internet
Before you start Objectives: Learn about different technologies and services which can be utilized to connect to the WAN. Prerequisites: You have to know what a WAN is, and why it is used. Key terms: WAN, PSTN, ISDN, ATM, Frame Relay, SONET, MPLS Public Switched Telephone Network (PSTN) To connect one site (location) to another, over WAN, we … Read more Overview of WAN Access Technologies