Articles Tagged ‘protocol’

ICMP Protocol

This section contains articles covering the ICMP Protocol. This popular protocol is used by network devices such as routers, servers, workstations to send error messages indicating that a requested service or host/router is not available or unreachable. 

Articles provided cover the introduction to the ICMP protocol, Echo (Ping) and Echo-Reply (Ping reply)messages, the popular Destination-Unreachable message, Source Quench message, Redirect message and Time Exceeded message.

Detailed diagrams and protocol structure graphs compliment our articles, making them easy to understand and follow.

Virtual Trunk Protocol (Cisco VTP)

Analysis of Virtual Trunk Protocol (VTP)This section introduces and analyses the Virtual Trunk Protocol (VTP), used to automatically update all switches in a VLAN network, with all new VLAN information, ensuring all switches are up to date and aware of the VLAN topology.

We start with the introduction of VTP where we analyse the different modes the VTP protocol operates on. Using detailed diagrams, we provide enough information to make the learning process easy and enjoyable.

Next we take a in-depth look at the VTP protocol by analysing its headers and available fields.  We lastly analyse VTP Pruning, explaining what exactly it is and how it can help conserve bandwidth and increase our network security.

All articles use our popular colourful diagrams that help dramatically make the learning process easy and clear.

Articles To Read Next:


Cisco Routers

  • SSL WebVPN
  • Securing Routers
  • Policy Based Routing
  • Router on-a-Stick

VPN Security

  • Understand DMVPN
  • GRE/IPSec Configuration
  • Site-to-Site IPSec VPN
  • IPSec Modes

Cisco Help

  • VPN Client Windows 8
  • VPN Client Windows 7
  • CCP Display Problem
  • Cisco Support App.

Windows 2012

  • New Features
  • Licensing
  • Hyper-V / VDI
  • Install Hyper-V


  • File Permissions
  • Webmin
  • Groups - Users
  • Samba Setup