Tag Archives: network

Fast Ethernet Specification – IEEE 802.3u

By | February 1, 2018

Fast Ethernet Specification – IEEE 802.3u 802.3, commonly known as Ethernet for Local Arena Network (LAN) operation, is a specification for speeds ranging from 1Mb/s to 100 Gb’s / sec using common Media Access Control specifications. IEEE 802.3u Fast Ethernet in the form of 100Base-T is one of the most widely used forms of Ethernet.… Read More »

Compression of Network Data and Performance Issues

By | January 31, 2018

Network-Compression. Today’s networks will always have data limitations. Data sets continue to grow on pace with increasing bandwidth availability making network-compression an important service in improving network performance. The network-compression used is actually a combination of compression and caching. It has been found that TCP rate control combined with network-compression provides the best value in… Read More »

Virtual Private Network (VPN) Security and Monitoring Controls

By | January 24, 2018

A Virtual Private Network (VPN) is a group of network hosts that can transfer encrypted data between themselves on a Virtual Private Network. The technology creates a safe encrypted connection, usually over public networks such as the internet, that allows remote users and locations such as branch offices, to securely access and share resources. The… Read More »

Routing Protocols. RIP, EIGRP, OSPF, IS-IS

By | April 3, 2017

Routing protocols are used to establish a path between routers. The most common routing protocols used are: Routing Information Protocol (RIP), Enhanced Interior Gateway Routing Protocol (EIGRP), Open Shortest Path First (OSPF), and Intermediate System to Intermediate System (IS-IS). Which protocol to use with a Local Area Network (LAN) depends on the following Factors: Administrative cost… Read More »

Bastion Host Overview

By | April 3, 2017

A Bastion Host (BH) is a computer on a network perimeter which is running a hardened Operating System (OS). This protection includes patches, authentication, encryption, and eliminates unnecessary software and services  (Weaver, Weaver, Farwood, & Weaver, 2012). Weaver et al.’s (2012) provides the following list of BH characteristics: A machine with adequate memory and processor… Read More »