Network Administration (18)

Cipher

A Practical Guide to IPv6

IPv6 has been around for decades now. The reasons for it are well known; IPv4 simply does not have enough address space to accommodate the modern internet. A quick recap - an IPv4 address is 32 bits, which equates to roughly 4.3 billion unique addresses.

Continue reading...
Cipher

Routing Protocols

Routing is the key to moving data between networks in the most efficient way. For it to be successful, routers need to know how to get to multiple destinations, so they can send a packet down the correct path. If you think of a data…

Continue reading...
Cipher

Spanning Tree Protocol (STP)

Redundancy is the key to a happy life. Never put all your eggs in one basket, relying on a single piece of equipment to keep users online. This includes network cables and switches. If all the traffic has to get back to the core of…

Continue reading...
Cipher

Quality of Service (QoS)

Picture a four lane motorway, but one lane has been cordoned off and marked β€˜emergency services only’. The remaining three lanes can have a traffic jam, but ambulances and fire trucks will always get through. That’s Quality of Service, or QoS. Traffic is prioritised and…

Continue reading...
Cipher

The OSI Model

The Open Systems Interconnect (OSI) Model dates back to 1984, and was the first introduction of a cross-vendor standard method of network communications. Before that, every vendor had their own ways of shifting data, and troubleshooting was complicated. With the introduction of layers, errors could…

Continue reading...