A diskless workstation is a workstation without disk drives that leverages network booting to load its operating system from a central server. It has a minimal memory for basic functions of a computing node. Diskless workstation has lower production and operational cost with less overhead.
Author: kingsanit.pvt.ltd@gmail.com
CAM (Content Addressable Memory) Table
The switch has a CAM (Content Addressable Memory) table which has mapping of the ports and MAC addresses of the computing node that is connected to each port. The switch learns the MAC address of the nodes initially when it is sending data on the port. The first frame from each node is always broadcasted…
MAC (Medium Access Control) Address
MAC (Medium Access Control) Address is unique identifier hardware address assigned to Network Interface Card (NIC) of any computing node. All computing nodes need a layer 2 hardware address for transmitting data which happens at Data Link Layer (Layer 2) and Physical Layer (Layer 1) of the OSI layer. When transmitting data on the LAN,…
IEEE 802
IEEE 802 is a networking standard developed and maintained by LAN/MAN Standards Committee (LMSC) for Local Area Network (LAN), Personal Area Network (PAN) and Metropolitan Area Network (MAN). IEEE 802 recommends best practices using an open and accredited process for Wired LAN, Wireless LAN, Wireless PAN, Wireless MAN.
Sniffing
Sniffing is the act of monitoring and capturing the network traffic. An attacker sniffs the network traffic by inserting a software or hardware into the network between the sender and receiver. Sniffing is also referred as Network Sniffing which is a type of Eavesdropping. Types of Sniffing Passive Sniffing is where the attacker passively listens…
Eavesdropping
Eavesdropping is the act of intercepting the conversation between two systems. A hacker intercepts the session between two machines. After interception, the attacker can gain access to data or modify the data or delete the data. The interception can be simple as like over hearing two people talking or sophisticated like intercepting an application session…
Promiscuous Mode
A Computer Network is collection of computing nodes connected through a switch or hub. Data is sent from a system (sender) to another system (receiver). At the layer 2 of the OSI layer, packet is converted into a frame which has the Source Hardware Address and Destination Hardware Address. In Ethernet based LAN, MAC address…
Switch
A switch is a network device that connects multiple computing nodes to form a LAN and does switching of data at the data link (layer 2) of the OSI Layers. The switch uses star network topology where it becomes the central component of the network of the connected computer nodes. The data transmitted from the…
Broadcast Domain
Broadcast Domain is the domain of a Network in which broadcasts can be sent by a node and received by all other nodes connected in that network domain. The broadcast is done at the Data Link Layer (Layer 2) of the OSI Layers. Special Layer 2 address is allocated for broadcast known as broadcast address….
Network Topology
Network Topology is the physical and logical arrangement of the nodes and links in a Computer Network. Nodes are the compute devices that connect to the network and links are the medium that connect the nodes. The network topology depicts that structure of the network along with the nodes and links. Network Topology application of…