Bipin

Bipin is a freelance Network and System Engineer with expertise on Cisco, Juniper, Microsoft, VMware, and other technologies. You can hire him on UpWork. Bipin enjoys writing articles and tutorials related to Network technologies. Some of his certifications are, MCSE:Messaging, JNCIP-SEC, JNCIS-ENT, and others.

Ping.png

Network Latency and Throughput

Network latency and Throughput are terms used in computer networks to define the state of connection between two end points. There are significant differences between these two terms. Network Latency and Throughput Network Latency In data network, latency means time when a particular packet takes to reach the destination from source. The term delay is […]

ActivePassiveT.jpg

SRX HA Modes

Juniper SRX series device supports HA mode for redundancy. When it comes to serious networking, failure is not an option. So to get the devices working you can configure pair of SRX devices in High Availability mode. Before getting to know about differences of HA modes you should first have little knowledge of JunOS HA […]

Types of Router Attacks

Router is a device that operates in layer 3 of OSI model which main function is path selection and packet forwarding. Routers can be core network equipment in any organization so the security of router is major concern. However there are different types of router attacks that network professionals must be aware of. Types of […]

ethical-hacking-256x300.jpg

Ethical Hacking

Ethical hacking is the methodology that the organization uses to find weakness in their network or system. An organization usually employs or contracts the hacker to perform the ethical hacking activity. Foot printing, scanning and enumeration are the very first steps that the hacker goes through. Credit: USR-LIB Foot Printing This is the first step […]

dcpromo.png

Install Active Directory Domain Controller in Windows Server 2008 R2

Active Directory Domain Controller is a critical part of Microsoft Server infrastructure. Active Directory is a directory which stores all the information about resources of a domain in a database. The Active Directory database is NTDS.dit and is stored in server with Active Directory Domain Services server role installed. Resources can be objects like users, computers, groups, printers […]

Manually Failover Database in Exchange 2010 DAG

Database Availability Groups(DAGs) in Exchange 2010 is data redundancy, high availability and disaster recovery feature. Adding Multiple mailbox servers to the DAG and replicating all mailbox databases with other member servers provides automatic failover recovery at the database level. You will need just two Mailbox Server to start with the high-availability features of Exchange 2010. […]

View Mailbox Database Replication Progress in Exchange 2010 DAG

Database Availability Groups(DAGs) in Exchange 2010 is data redundancy, high availability and disaster recovery feature. Adding Multiple mailbox servers to the DAG and replicating all mailbox databases with other member servers provides automatic failover recovery at the database level. You will need just two Mailbox Server to start with the high-availability features of Exchange 2010. […]