Skip to main content


Showing posts from November, 2006

Ethernet Hub - Physical Layer Device

Hub is a network device connects multiple devices and makes single network segment. Hub works in Physical layer of OSI Reference Model. Since it is a layer one device, it does not have the feature to read the signals it transmits. All the devices connected to the hub feel they are connected to the same physical wire. So we can say hub has single collision domain. In other words, a hub simply repeats the signal it receives. Let us check the working of hubs.

How Hubs work
When a computer connected to a hub sends packets, hub broadcast the packets to all the ports except the one it came from. Here we can see the difference between Switch and hub. Hub does not read the packets and it broadcast to all ports but Switch is intelligent device and read the packet and just unicast it. So Switch is more efficient compared to a hub. Another problem with the hub is the higher the chances of packet collisions. We know hub has single collision domain and the chances of a collision are very high.


Internet Control Message Protocol (ICMP)

One of the important parts we need to do while troubleshooting a network is to check the connectivity of two devices. We have many utilities to check the connectivity and availability of destination device. All these utilities are based on ICMP, defined in RFC 792. Internet Control Message Protocol (ICMP) is used to send error and control information between devices which support TCP/IP. Utilities like ping, tracert, pathping, etc work using ICMP. This tutorial explains the functions of Internet Control Message Protocol and the list of error messages generated by ICMP.

Important Functions of ICMP Send echo requests from a TCP/IP device to another

Responds to Echo request

Helps to find routing path issues

ICMP echo message verify the availability of the destination
List of Messages Generated by ICMP Address Request

Address reply

Destination unreachable

To learn more about the Destination unreachable message generated by Internet Control Message Protocol, visit the links below.

Destination Net Un…

DMZ In Network Security (Demilitarized Zone)

Now, most of the modern Small Office Home Office routers offer DMZ host feature. For those who don't know about the use of DMZ, this tutorial may give an overall idea about it. If you place a device in your network in DMZ, that device won't have much access to other devices connected to the network. A device placed in DMZ is more exposed to external threats as it is logically placed outside the network with limited security. Also, all ports of DMZ host are open and exposed to the external network. DMZ host has its own merits and demerits.

What is The Use of DMZ in a Network
If you are a hardcore online gamer, you know the hurdles created by the router firewall and NAT. In most cases simple port forwarding allows you to continue online gaming but rarely some users face issues. The ultimate solution for the firewall issues in online gaming is to place your gaming computer in DMZ. However, after this step, your gaming computer is no longer protected by router firewall. Also, your…