TCP 3-way Handshake Summary Cheatsheet

Cloud Computing

Cloud Computing is an approach to offer IT Services to customers remotely is called Cloud Computing. It is the practice of using IT & Network which are physically hosted in a remote location (mostly on the Internet) to store, manage and process data, rather than a local server or a personal computer. It is the […]

IP Address & its Types

“A unique identity number which is used to identify Network Devices & communication between these devices” IP Address is a logical numeric address that is assigned to every single computer, printer, switch, router or any other device that is part of a TCP/IP-based network. The IP address exists in every network, even only a pair […]

TCP 3-way Handshake Process

TCP (Transmission Control Protocol) is “a Connection Oriented Transport Layer (Layer4) protocol for reliable communication between network devices” TCPv4 was published in RFC-793 in 1981 and is still the current version. TCP is a connection oriented full-featured transport layer protocol that provides all the functions needed by a typical application for the reliable transportation of data […]

OSI Model Summary Cheatsheet

Wireshark Operators

Wireshark is the most useful & popular tool for packet Level deep Network Analysis & Troubleshooting. Most importantly, it is open source. It is like a measuring meter or device to find and examine what is going on inside a network cable or port just like a multimeter is used by an electrician to examine […]

OSPF Virtual Links

Virtual Link is a non-Physical connectivity or link. As we know OPSF must be connected with Backbone Area0 but sometime it becomes difficult due to some reasons. So there we required Virtual Links for logical connection to Backbone. Also known as logical link which uses in least cost path connectivity between routers or ABR or […]

OSPF Authentication

What is Authentication: Authentication is the mechanism of recognizing the identity of a user. Associating an incoming request with a set of identifying credentials is called Authentication.    The credentials provided are compared to those in the database of the authorized user’s information register on a local operating system or somewhere remote. If the user is […]