Blog


What is a VPN?

VPN
A Virtual Private Network (VPN) is a network technology which extends private network (such as LAN) over a public network such as the Internet. A VPN allows a computer (or a network) to be connected securely as if they are physically wired together. Corporations use VPN to allow remote workers to connect securely to their private network. A VPN is also used to interconnect remote offices with a head office as if they are physically connected.

Find IP addresses of a private network

Find IP address of a private network
You have a private or public network with servers and workstations that are assigned static and dynamic IP addresses (either private or public IPs). You assigned them the static IP addresses due to NAT (Network Address Translation) or for public access, and dynamic IP addresses via the DHCP. Even if you kept a good record of those assigned IPs, there are times when you want to find all IP addresses of networked devices. The following procedure may be used to determine IP addresses of networked devices that are connected to your network.

What is WAP?

WAP
WAP stands for Wireless Application Protocol. This is a well-known and commonly used standardized protocol which defines how wireless communication can take place between mobile devices and a wireless network. This could include devices such as radio transceivers, cell phones, world wide web, newsgroup, instant messaging and any device that can be used for Internet access. Devices which are based on WAP can interoperate as technology advancement happens over time.


What is Wi-Fi?

Wi-Fi
A Wi-Fi (also known as WiFi) is a wireless network technology which allows WiFi enabled devices to communicate with each other, and also share the Internet without wired connectivity. Wi-Fi is based on 802.11 IEEE network standard which uses radio frequency signals to transmit data. The distance supported by Wi-Fi network depends on the type of Wi-Fi radio and antenna in use, and whether the environment is open or enclosed within walls and bricks. As the distance between the Wireless Access Point (WAP) and mobile device move farther away, the radio signal weakens and the transmission data rate slows down until the signal is not strong enough to be usable. The performance of Wi-Fi network also varies depending on the type of standard employed by the Wi-Fi devices, namely 802.11 (a), (b), (g), (n) and (ac).

Find IP address of a network printer

Find IP Address of a network printer
Often times we see a networked printer suddenly stop working and you need to find a static (private) ip address of the printer to diagnose further. How do we find IP address of a networked printer? There are a few different ways to go about finding it.

RJ45 Cable Wiring: T-568-B Straight-through & Crossover RJ-45 cabling

RJ45 Wiring
RJ-45 conductor data cable contains 4 pairs of wires each consists of a solid colored wire and a strip of the same color. There are two wiring standards for RJ-45 wiring: T-568A and T-568B. Although there are 4 pairs of wires, 10BaseT/100BaseT Ethernet uses only 2 pairs: Orange and Green. The other two colors (blue and brown) may be used for a second Ethernet line or for phone connections. The two wiring standards are used to create a cross-over cable (T-568A on one end, and T-568B on the other end), or a straight-through cable (T-568B or T-568A on both ends).


Traffic Shaping, Bandwidth Shaping, Packet Shaping with Linux tc htb

Traffic Control
Denial of service attacks are major nuisance for web hosts, and as a web host you'll have to take every measure to protect your resources from DoS attacks. Our APF, BFD, DDoS and RootKit article describes Linux utilities available to protect from DDoS attack, and also explains installation procedures. This article supplements above article by providing means to control traffic (bandwidth shaping) with Linux "tc" command so that no single machine can waste the entire network bandwidth.


Denial of Service (DoS) and DDoS Attacks

DDoS
DoS attack, denial-of-service attack, is an explicit attempt to make a computer resource unavailable by either injecting a computer virus or flooding the network with useless traffic. In simple words, it is similar to thousands of people trying to enter a room from a single entrance, ultimately causing havoc. This not only disturbs the normal operations of the network but also results in poor performance and system breakdown due to overwhelming requests. A large-scale DDoS attack (ranges up to 400 GBps) can affect the internet connectivity of an entire geographical region. There are two types of DoS attacks: computer attack and network attack. Common forms of denial of services attacks are: