Category: Networking

SIP – Session Initiation Protocol

Real-time voice along with video communication can be attained with the internet standard SIP (Session Initiation Protocol). That was initiated by the IETF (Internet Engineering Task Force) and you can find it in published form from RFC 3261. As for live communications, internet protocol “SIP” is used for establishing voice and video calls and within an IP network, one or more than one participant can whether create, alter, or end sessions with the help of this signaling protocol.Session Initiation Protocol - SIP It is very important in explanation of the functionality of the VoIP technology as one of the Voice over IP protocols. But at this point of learning about SIP, first you have to understand the term “session” within a communicating network. Actually, it is a clear-cut two-way phone call procedure. But in case of multi-media conference session, it can be consisted on loads of participating persons.

Dynamic Routing Protocols

Dynamic Routing ProtocolsIf we speak about what is networking and then try explain how does networking work or maybe how does internet work in some technical way, soon we will have to mention the routing protocols. We should mention routing protocols as the most important networking protocols when it comes to transfer packets from origin to destination points on the network. After all they are responsible for finding the best way across our multipath network.

Routing – Static and Dynamic routes – What is route?

What is Routing and what Static and Dynamic routes means?
Routing packetsIn the theory of networking, we must mention the concept of routing to help explain how networking works and what exactly is networking. Simply, the word “routing” is meant by map-reading or direction-finding. But in the computer’s world, it is a system for forwarding the information from some network node to another over an internetwork such as from a starting point (source) to its ending point (destination).

Using Port Security to Mitigate Layer 2 Attacks

Get rid of the MAC flooding attacks on your switch and all kinds of other attacks that will mitigate you network security by implementing switch port security.
All about the issues to consider when configuring port security on a switch will be written here. Also we will show you how to configure port security on the Cisco IOS. It will be configuration of both static and dynamic port security.