post

Host to Host Communication

After discussing the makeup of the OSI Model and some of the Key Players involved in moving a packet from one host to another, we can finally discuss the specific functions which occur in allowing Host to Host communication. At the very core of the Internet is this idea that two computers can communicate with […]

post

Key Players

The Internet is a fascinating blend of many different elements that all work together to create a world wide network of networks which allow billions of different devices to communicate. In this article, we will look at some of the key players of the Internet and the role each fulfills in order to achieve network communication. This list is far from […]

post

OSI Model

The Open Systems Interconnect model (OSI model) is the reason why the Internet is not owned by one company. It is the reason your Dell PC can speak to your Apple phone and your HP server and your Cisco router. In the early days of the Internet, when the idea of a computer communicating with another […]

post

Ethernet Wiring

Ethernet is a family of specifications that governs a few different things: It covers all the different wiring specifications (10BASE-T, 100BASE-TX, 1000BASE-T, etc…). It describes how to send bits (1s and 0s) across each wire. It also determines how to interpret those bits into meaningful frames. Initially, this article was meant to just cover the […]

post

Cryptography

Do you do online banking? Do you work from home? Do you use VPNs to access company resources? All these would not be possible without Cryptography. Cryptography is the art of keeping secrets, specifically through any form of communication. Cryptography has existed for thousands of years, but has become increasingly more important in recent history due […]