© 2022 Hashnode
#network
What is a Network? In information technology, a network is defined as the connection of at least two computer systems. The computers on a network may be linked through cables, telephone lines, radio w…
I hate to accept but rejections are a great teacher once you move on from feeling like a failure. Each one of us goes through a setback at least once in our career and it does feel like the end of th…
In the first part of this series, we discussed the meaning, types, and various arrangements of computer networks. You can access it here. In this writeup, we delve into the technology that makes possible, the communication between devices …
Network Protocols Network protocols are rules that determine how professionals share data between devices in the same network. As technology in the workplace increases, these protocols are essential f…
Load balancing is the even distribution of load across a group of back-end resources or servers. The Azure Load Balancer works with Layer 4 of the Open Systems Interconnection (OSI) model. The load ba…
Networking models are needed, especially if you want to learn DevOps. However, the fundamentals of networking are always skipped for the reason that they are going straight towards DevOps tools like D…
What is IT Infrastructure IT infrastructure is a group of IT components—hardware, software, networks and resources—that work together to help develop, test, deliver, monitor, control and sustain an or…
Network Layer This layer is the third layer of the OSI model from the bottom and the fifth layer from the top. It has the capacity to handle the service request which is from the transport layer and i…
What is Nginx It is a free and open source web server publicly release in 2004, Nginx can also be used as reverse proxy, load balancer, mail proxy and HTTP Cache. Nginx was created by Igor Sysoev, as …
Why Is Address Resolution Protocol Poisoning Possible? ARP poisoning is possible because ARP, as a protocol, does not have any type of security. It is simply not designed to be secure. Devices on the …