Skip to content

Asad Ijaz

Hey there, I'm Asad Ijaz Khattak, and I'm not your typical writer and blogger – I'm the voice behind the scenes at the renowned website, "networkustad.com." When it comes to the digital realm, I'm all about technology, networking, and cybersecurity. Picture this: I'm not just someone who writes about tech; I'm a certified expert in the field. I proudly hold the titles of Cisco Certified Network Professional (CCNP) and Cisco Certified Network Associate (CCNA). So, when I talk about networking, I'm not just whistling in the dark; I know my stuff! My website is like a treasure trove of knowledge. You'll find a plethora of articles and tutorials covering a wide range of topics related to networking and cybersecurity. It's not just a website; it's a learning hub for anyone who's eager to dive into the world of bits, bytes, and secure connections. And here's a fun fact: I'm not a lone wolf in this journey. I'm a proud member and Editor of Team NetworkUstad. Together, we're on a mission to empower people with the knowledge they need to navigate the digital landscape safely and effectively. So, if you're ready to embark on a tech-savvy adventure, stick around with me, Asad Ijaz Khattak. We're going to unravel the mysteries of technology, one article at a time!"

12 Comments

  1. Characteristics of Copper Media - Networkustad
    May 28, 2019 @ 3:54 pm

    […] network uses Copper media because of its advantages however it has also some disadvantages. In this […]

    Reply

  2. Framing in Data Link Layer - Networkustad
    June 2, 2019 @ 3:52 pm

    […] layer framing in important subject in network. Data-link layer takes the packets from the Network Layer and encapsulates them into frames. If the […]

    Reply

  3. Network Interface Card (NIC) and Ethernet Protocol - Networkustad
    June 2, 2019 @ 5:25 pm

    […] Ethernet protocol standards describe many aspects of network communication as well as frame format, frame size, timing, and encoding. It’s telling, how […]

    Reply

  4. Most Destructive Viruses History » Networkustad
    June 23, 2019 @ 7:42 am

    […] “Mydom” was a line of text in the program’s code (my domain) and sensing this was going to be big, added ‘doom’ into it. The worm spreads itself by appearing as an email transmission error and contains an attachment of itself. Once executed, it will send itself to email addresses that are in a user’s address book and copies itself to any P2P program’s folder to propagate itself through that network. […]

    Reply

  5. Unicast, Multicast and Broadcast Communication » Networkustad
    June 27, 2019 @ 5:20 pm

    […] in the network can send data over the network using some communication techniques known as Unicast, Multicast and […]

    Reply

  6. Cisco IOS Common Show Commands » Networkustad
    August 12, 2019 @ 9:47 am

    […] as well as the operation of the device in the Cisco IOs Command Line Interface (CLI) mode. Network administrators can use different show commands to check device status; interfaces, process and […]

    Reply

  7. Function of the Routers » Networkustad
    August 18, 2019 @ 2:41 pm

    […] are many devices and technologies working together to enable a network. The primary device for networking is the router. The routers connect multiple networks together. […]

    Reply

  8. Administrative Distance » Networkustad
    August 23, 2019 @ 6:46 pm

    […] and static routes. If the routing table has more than one route source for the same destination network. For example, if both Enhance Interior Routing Gateway Protocol (EIGRP); and Routing Information […]

    Reply

  9. Classful Network Addressing » Networkustad
    August 27, 2019 @ 11:17 am

    […] classful network is a network addressing architecture used in the networks since 1981.The RFC 790 and 791 released […]

    Reply

  10. Configuring standard ACLs » Networkustad
    September 9, 2019 @ 12:53 pm

    […] ACLs permits or denies traffic based on source addresses. It differentiates routes on a network using the IP address. The port and destination of the packet not evaluated.  Standard ACLs only […]

    Reply

  11. Types of Threats » Networkustad
    September 12, 2019 @ 2:36 am

    […] to network security are an emergent problem for the individual as well as organizations in the whole world, […]

    Reply

  12. Types of Vulnerabilities » Networkustad
    September 12, 2019 @ 9:59 am

    […] of the network which is intrinsic in every network and its device which included routers, switches, servers, […]

    Reply

Leave a Reply