Комментарии:
Awesome content as always 😊
ОтветитьI watched it full video atleast give small certificate please
Ответитьhi sir does this videos help even if you are doing comptia network +?
ОтветитьHw Can i be a member???
Ответитьsuper duper helpful danish and team !
ОтветитьHi Danish, thank you for uploading the video, Waiting for the next one, the previous video cleared all the confusing concepts for me regarding networking.
ОтветитьThis is gold and I have learned a lot from this lecture. Keep it up KamranMahmood and Danish . I hope you are going to upload another session. With this lecture am ready to become a jnr network engineer
ОтветитьI just watch the 1st video in full, Wow such great stuff. Keep it going very inspiring. Loved it!!!!!! I leaned so much. Thank you !!!!!!!
ОтветитьOK. That was weird.
I was talking with my friend yesterday about your channel. And we were saying that it would be nice if you started doing some entry-level networking content.
and now youve released this...
are you on my phone or something?
What is Cisco MDIX?
With auto-MDIX enabled, you can use either type of cable to connect to other devices, and the interface automatically corrects for any incorrect cabling.
Content Addressable Memory (CAM) table is a system memory construct used by Ethernet switch logic which stores information such as MAC addresses available on physical ports with their associated VLAN Parameters. The CAM table, or content addressable memory table, is present in all switches for layer 2 switching.
ОтветитьChecksum
A checksum is a small-sized block of data derived from another block of digital data for the purpose of detecting errors that may have been introduced during its transmission or storage. By themselves, checksums are often used to verify data integrity but are not relied upon to verify data authenticity.
Difference between DOS and DDOS attack
Last Updated : 20 May, 2020
1. DOS Attack :
A DOS attack is a denial of service attack, in this attack a computer sends massive amount of traffic to a victims computer and shuts it down.Dos attack is a online attack which is used to make the website unavailable for its users when done on a website. This attack make the server of a website down which is connected to internet by sending a large number of traffic to it.
2. DDOS Attack :
In ddos attack means distributed denial of service in this attack dos attacks are done from many different locations using many systems.
There are two general methods of DoS attacks: flooding services or crashing services. Flood attacks occur when the system receives too much traffic for the server to buffer, causing them to slow down and eventually stop. Popular flood attacks include:
Buffer overflow attacks – the most common DoS attack. The concept is to send more traffic to a network address than the programmers have built the system to handle. It includes the attacks listed below, in addition to others that are designed to exploit bugs specific to certain applications or networks
ICMP flood – leverages misconfigured network devices by sending spoofed packets that ping every computer on the targeted network, instead of just one specific machine. The network is then triggered to amplify the traffic. This attack is also known as the smurf attack or ping of death.
SYN flood – sends a request to connect to a server, but never completes the handshake. Continues until all open ports are saturated with requests and none are available for legitimate users to connect to.
Distributed denial of service attack (DDoS) definition
A distributed denial of service (DDoS) attack is a malicious attempt to make an online service unavailable to users, usually by temporarily interrupting or suspending the services of its hosting server.
A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash.
ОтветитьLive IP is a IP address that is used to access the machine via the internet. These machine can be server or clients. These servers can be Windows Base or CentOS Base. A static IP means that this IP will never change. Thus a live IP is provided by the ISP Internet Service Provider. I Never Heard of this before :)
ОтветитьWhat is span CCNA?
Cisco SPAN (Switched Port Analyzer) is a port mirroring feature where you can send all traffic from one interface or VLAN to another interface. This is useful when you want to inspect certain traffic with Wireshark or want to forward it to an IDS / IPS.
Positive Acknowledgement with Retransmission (PAR) is a group of error – control protocols for transmission of data over noisy or unreliable communication network. These protocols reside in the Data Link Layer and in the Transport Layer of the OSI (Open Systems Interconnection) reference model. They provide for automatic retransmission of frames that are corrupted or lost during transit. PAR is also called Automatic Repeat ReQuest (ARQ).
PARs are used to provide reliable transmissions over unreliable upper layer services. They are often used in Global System for Mobile (GSM) communication.
Working Principle
In these protocols, the receiver sends an acknowledgement message back to the sender if it receives a frame correctly. If the sender does not receive the acknowledgement of a transmitted frame before a specified period of time, i.e. a timeout occurs, the sender understands that the frame has been corrupted or lost during transit. So, the sender retransmits the frame. This process is repeated until the correct frame is transmitted.
What is TCP windowing concept?
"TCP windowing" is what we call it when the Transmission Control Protocol (TCP) uses a sliding window protocol to mitigate problems with clients and servers trying to share segments of data that are too large or small, and therefore cannot transmit effectively.
Just as I am studying networking, nice, keep it up!
ОтветитьWhat do you think of the ccna?
ОтветитьWhat is encapsulation and Decapsulation in OSI model?
The data which should be transmitted to a new location should go through each layer. When reaching each layer, the information is added to the data. It is called encapsulation. When the data reaches the destination, in each layer the added information is unpacked. That process is known as decapsulation.
Hey danish nice effort. make all ur courses available to everyone, then ur subscribers will increase. Mark my words. I'm hoping that u will upload ur remaining courses .
ОтветитьNice Video, Go Heyfa Go!!!!!!!!!!!!
Ответить