What is the subnet mask used for? It determines which part of the IP address identifies the network (the ones)
Continue readingCategory: Networking
VM network – NAT vs. Bridge
NAT: Your guests will be hidden in a subnet behind your host. Network Host (192.168.1.1) Guest 1 (192.168.2.1) |-> Guest
Continue readingPolicy-based routing (Linux)
Classic routing – Happens based on the destination address of the ip packet Classic routing tables $ ip rule list
Continue readingLoad balancing (based on NAPT)
A common way to realise a Load balancing is happening based on NAPT (Network Address Port Translation). Client 1 Client
Continue readingNAPT (Network Address Port Translation)
What’s that? It translates private IPs and Ports to a public IP and port. What’s the reason? There are not
Continue readingWhat a wireless router really is
The name lets suggest the following functionality: – Access point: provides a connection for wireless devices to the LAN –
Continue readingMobile network infrastructure (Cellular)
The exact infrastructure differentiates between the generations. Let’s begin with a general overview. Mobile Device Access Network Core Network PSTN/Internet
Continue readingVPN – Full vs. Split Tunnel
Full Tunnel All your traffic get send to the VPN server and if you aren’t requesting a server in its
Continue readingProxy vs. VPN (HTTP(S))
The Proxy and the VPN-Server are both a node in the communication between the client and the server. Both ways
Continue readingNetwork components (Selection)
Repeater A repeater just repeats the signals it receives. They can be wired (with 2 ports) or wireless. Therfore it
Continue reading