Skip to main content

Network Fundamentals: Top Picks

Network Fundamentals

Controlling Broadcasts and Multicasts

The first step in controlling broadcast and multicast traffic is to identify which devices are involved in a broadcast or multicast storm. The foll...
Network Fundamentals

The Importance of a Network Analyzer – Packet S...

Network Analyzers, also known as Packet Sniffers, are amongst the most popular network tools found inside any Network Engineer’s toolkit. A Network...
Network Fundamentals

Introduction to Content Switching - Application...

Content switches (also sometimes called application switches) is a class of network device that is becoming increasingly common in medium to large ...
Network Fundamentals

Network Unicast - Its role and Importance

Unicast is a communication method used in computer networking where data is sent from a single sender to a specific destination device. In th...

Featured Subcategories:

Netflow Articles:

Netflow

Netflow: Monitor Bandwidth & Network Utilizatio...

Monitoring network traffic & bandwidth usage via Netflow is mandatory for any type and size network. Gaining visibility into user traffic, appl...
Netflow

Complete Guide to Netflow: How Netflow & its Co...

This article will cover the basics of Netflow, including its use cases, Netflow supported devices, Netflow history, and variants. We’ll also dive i...
Netflow

NetFlow Analyzer: Free Download, Step-by-Step I...

In our previous article we explained how a Netflow Analyzer can help you gain visibility into your user traffic, application traffic and data flows...
Netflow

Netflow vs SNMP. Two Different Approaches to Ne...

SNMP (Simple Network Management Protocol) and Netflow are both popular protocols with admins, prized for their ability to give visibility over the ...

Network Protocols:

TCP - UDP Protocol Analysis

Transmission Control Protocol - Part 3: The TCP...

This article shows the TCP Header and Segment. We explain where the TCP Header and Segment are located in an Ethernet frame and also briefly view t...
TCP - UDP Protocol Analysis

TCP Header Anaylsis - Section 4: TCP Flag Options

As we have seen in the previous pages, some TCP segments carry data while others are simple acknowledgements for previously received data. The popu...
Subnetting

IP Subnet Calculator

This free online Subnet Calculator provides a fast and easy way to calculate all aspects of any IP Address and Subnet Mask. Simply enter your des...
Domain Name System (DNS)

The DNS Protocol - Part 2: DNS Queries & Resolu...

This section will help you understand how the DNS queries work on the Internet and your home network. There are two ways to use the domain name sys...
Domain Name System (DNS)

The DNS Protocol - Part 1: Introduction

If you ever wondered where DNS came from, this is your chance to find out ! The quick summary on DNS's history will also help you understand why DN...
Supernetting & CIDR

What is Supernetting (Route Summarization) & Ho...

Supernetting is the opposite of of subnetting, and is also known as route aggregation or CIDR (Classless Inter-Domain Routing). Supernetting is a t...
TCP - UDP Protocol Analysis

TCP Header Anaylsis - Section 7: TCP Data Paylo...

Finally, the last page of our incredible TCP Analysis. As most of you would expect, this section is dedicated to the DATA section that follows the ...
IP Protocol

IP Protocol - Part 1: Binary & The Internet Pro...

To understand the Internet Protocol, we need to learn and understand Binary. It is very important to know and understand Binary because part of the...

STP/ICMP Protocols:

ICMP Protocol

ICMP Protocol - Part 7: Time Exceeded Message A...

The ICMP - Time Exceeded message is one which is usually created by gateways or routers. In order to fully understand this ICMP message, you must b...
ICMP Protocol

ICMP Protocol - Part 4: Destination Unreachable...

The 'ICMP Destination unreachable' message is quite interesting, because it doesn't actually contain one message, but infact six! This means that t...
ICMP Protocol

ICMP Protocol - Part 6: Redirect Messages

The ICMP - Redirect Message is always sent from a gateway to the host and the example below will illustrate when this is used. Putting it simply (...
ICMP Protocol

ICMP Protocol - Part 2: Echo / Echo Reply (Ping...

As mentioned in the previous page, an Echo is simply what we networking engineers call a 'ping'. The Echo Reply is, as most would guess,  the ...

Your IP address:

3.134.102.182

All-in-one protection for Microsoft 365

All-in-one protection for Microsoft 365

FREE Hyper-V & VMware Backup

FREE Hyper-V & VMware Backup

Wi-Fi Key Generator

Generate/Crack any
WEP, WPA, WPA2 Key!

Follow Firewall.cx

Network and Server Monitoring

Network and Server Monitoring

Cisco Password Crack

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!

Bandwidth Monitor

Bandwidth Monitor

Free PatchManager

Free PatchManager

EventLog Analyzer

ManageEngine Eventlog Analyzer

Firewall Analyzer

zoho firewall analyzer

Security Podcast

Hornet-Security-The-Swarm-Podcast


VLAN Networks

InterVLAN Routing - Routing between VLAN Networks

This article deals with the popular topic of InterVLAN routing, which is used to allow routing & communication between VLAN networks. Our article an...
VLAN Networks

VLAN Tagging - Understanding VLANs Ethernet Frames

We mentioned that Trunk Links are designed to pass frames (packets) from all VLANs, allowing us to connect multiple switches together and independently ...
VLAN Networks

VLANs - IEEE 802.1q Trunk Link Protocol Analysis

While the VLAN Tagging article briefly covered the IEEE 802.1q protocol this article will continue building upon it by further analyzing the IEEE 802.1q...
VLAN Networks

VLANs - Access & Trunk Links

If you've read our previous article The VLAN Concept - Introduction to VLANs  then you should feel comfortable with terms such as 'VLAN', 'Sta...

Routing

Hybrid Routing Protocols - Advantages and Disadvanta...

Hybrid routing protocols are a combination of distance-vector and link-state routing protocols, and are used to provide a more efficient and scala...
Routing

OSPF - Part 2: How OSPF Protocol Works & Basic Conce...

This article covers basic OSPF concepts and operation. We explain how OSPF works, how OSPF tables are built on an OSPF-enabled router and their purpose ...
Routing

Distance Vector Routing Protocols

Distance Vector routing protocols use frequent broadcasts (255.255.255.255 or FF:FF:FF:FF) of their entire routing table every 30 sec. on all their inte...
Routing

OSPF - Part 5: Analysis of OSPF Link State Update (L...

This article explains how OSPF uses Link State Advertisement (LSA) to exchange information about the network topology between routers. When a router rec...

Network Address Translation - NAT

The Network Address Translation Table

After that simple and informative introduction to the NAT concept, it's time to find out more about how it works and this is where the NAT table comes i...
Network Address Translation - NAT

Dynamic NAT - Part 2

Our previous article, Dynamic NAT - Part 1, covered the basic idea of Dynamic Network Address Translation. We are now going to take a closer look at the...
Network Address Translation - NAT

Dynamic NAT - Part 1

Dynamic NAT is the second NAT mode we're going to talk about. Dynamic NAT, like Static NAT, is not that common in smaller networks but you'll find it us...
Network Address Translation - NAT

Network Address Translation (NAT) Overload - Part 2

In our previous article, Network Address Translation (NAT) Overload - Part 1, we explained what NAT Overload is and how it works. This page deals with t...