Software-Defined Networking (SDN)
Virtualization Digitalization is no longer a choice for businesses in line with the demands of their customers and the experiences…
Virtualization Digitalization is no longer a choice for businesses in line with the demands of their customers and the experiences…
IDS IDS, Intrusion Detection System, recognizes threats and movements within the network that may be an attack. Recognized threats are…
The network work architecture is similar to an operating system in its working structure. For this reason, network devices use…
QoS is the services that will be applied to traffic in order to provide efficient, sufficient, and quality service in…
Layer 3 devices (Layer3 Switch or Router) do “Forwarding” for packet transmission. Forwarding refers to how the router device in…
STP (Spanning Tree Protocol) is the IEEE 802.1 standard. It is a protocol discovered to prevent loops that may occur…
In cases where a special connection is not established between the devices and there are common connections in communication, more…
In cases where a special connection is not established between the devices and there are common connections in communication, more…
Forward Error Correction is used in telecommunications to check for errors that occur in unreliable or noisy communication channels. These…
The material that transmits electric energy, that connects the circuit elements to each other via electrical current, also that is…
POINT-to-POINT – It is a data transfer method that provides point-to-point access and communication between two devices with one or…
HUB It is a simple and stupid device that can connect all devices in the same network. Although it does…
Wireshark is the most widely used, free, and open-source packet inspection tool in the world. It makes it easy to…
YOU CAN NOT COPY THAT TEXT !
COPYRIGHT TO EMRE CICEK.