, IP Address
, Transport Layer Security
, Routing Table
, IP Assignment
, Network Hops
, Web Security
, DNS Lookup
, Network Permissions
, Web Vulnerabilities
, Intranet Access
, Load Distribution
Network administration is the process of managing and maintaining the infrastructure of computer networks. These tasks are usually done by a network administrator/network engineer. Software-network interactions as well as network integrity and resilience are the key areas of focus.
The application layer (Layer 7) is one of the seven layers of the Open Systems Interconnection model (OSI model). It is closest to the end user, which means both the OSI application layer and the user interact directly with the software application.
The Domain Name System is a hierarchical decentralized naming system for computers, services, or other network-connected devices. As an important feature of the internet, it's important for all engineers to have a solid understanding of this.
The Internet Protocol is the principal communications protocol used by the Internet. IP provides the mechanism for delivering packets from source to host computers based on their IP addresses. As the dominant communication protocol used by the internet, it's important for all developers to have a solid understanding of its features.
The network layer (Layer 3) is one of the seven layers of the Open Systems Interconnection model (OSI model). It provides the functional and procedural means of transferring variable length data sequences (called packets) from one node to another.
A protocol defines a set of rules which allows communication between entities. Communication between devices on the Internet is based on multiple protocols. It's an important theoretical topic for all engineers, particularly those involved in communication protocols.
Everyone who works with web should know essential topics of network security to prevent unauthorized access or misuse of network-accessible resources.
The presentation layer (Layer 6) is one of the seven layers of the Open Systems Interconnection model (OSI model). This layer provides independence from data representation by translating between application and network formats.
Routing is the process of selecting a path for traffic in a network, or between or across multiple networks. Knowledge of routing and related protocols is essential for Network Engineers.
Access Control List
In computer networking a routing table, or routing information base (RIB), is a data table stored in a router or a network host that lists the routes to particular network destinations, and in some cases, metrics (distances) associated with those routes. Knowledge of routing tables is important for Network Engineers.
Access Control List
An Access Control List defines filtering and routing rules for incoming and outgoing network packets. Knowledge of Access Control Lists is important for Network Engineers.
Subnetting is the practice of dividing a network into two or more networks. Knowing how to divide large networks into smaller ones is an essential skill when creating any large network.
In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Knowledge of firewalls is important for system administrators.
Multi-factor authentication is an authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence to an authentication mechanism. It can be knowledge-based (something the user and only the user knows), possession-based (something the user and only the user has), and inherence-based (something the user and only the user is).
A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
In computing, load balancing improves the distribution of workloads across multiple computing resources, such as computers, or a computer cluster. Load balancing aims to optimize resource use, maximize throughput, minimize response time, and avoid overloading any single resource.