Skip to content

Asad Ijaz

Hey there, I'm Asad Ijaz Khattak, and I'm not your typical writer and blogger – I'm the voice behind the scenes at the renowned website, "" When it comes to the digital realm, I'm all about technology, networking, and cybersecurity. Picture this: I'm not just someone who writes about tech; I'm a certified expert in the field. I proudly hold the titles of Cisco Certified Network Professional (CCNP) and Cisco Certified Network Associate (CCNA). So, when I talk about networking, I'm not just whistling in the dark; I know my stuff! My website is like a treasure trove of knowledge. You'll find a plethora of articles and tutorials covering a wide range of topics related to networking and cybersecurity. It's not just a website; it's a learning hub for anyone who's eager to dive into the world of bits, bytes, and secure connections. And here's a fun fact: I'm not a lone wolf in this journey. I'm a proud member and Editor of Team NetworkUstad. Together, we're on a mission to empower people with the knowledge they need to navigate the digital landscape safely and effectively. So, if you're ready to embark on a tech-savvy adventure, stick around with me, Asad Ijaz Khattak. We're going to unravel the mysteries of technology, one article at a time!"


  1. Common Network Port Numbers - Networkustad
    May 26, 2019 @ 12:51 pm

    […] numbers 0 to 1023 has reserved for privileged services and designated as well-known ports number. TCP and UDP on the receiving host know which application to send the data to based on the port numbers received […]


  2. TCP/IP Protocol Suite and Communication Process - Networkustad
    May 27, 2019 @ 5:05 pm

    […] TCP/IP protocol Suite includes many protocols, as shown in Figure below. Each layer has own working protocol. […]


  3. Switch Fundamentals - Networkustad
    June 5, 2019 @ 11:43 am

    […] Layer 2 device, therefore switch uses MAC addresses for forwarding decisions. It is unaware of the protocol being carried in the data portion of the frame, such as an IPv4 packet. The Ethernet hub repeats […]


  4. Framing in Data Link Layer » Networkustad
    June 8, 2019 @ 3:24 pm

    […] data unit that is transmitted between network points. It contains complete addressing, necessary protocol, and control information. Before transmission of the frame, the data link layer protocol […]


  5. Characteristics of IP » Networkustad
    June 8, 2019 @ 5:07 pm

    […] IP address with the low overhead protocol is planned. It also provides the functions that required delivering a packet from a source to a […]


  6. Basic Cisco Router Configuration Step » Networkustad
    June 14, 2019 @ 6:33 pm

    […] with each other without a router. Routers do this job successfully by sending a packet from one IP network to another IP network using routing. Before using the router it would require some basic […]


  7. TCP/IP Model » Networkustad
    June 23, 2019 @ 6:46 am

    […] the higher-level protocols like DNS (Domain Naming System), HTTP (Hypertext Transfer Protocol), Telnet, SSH, FTP (File Transfer Protocol), TFTP (Trivial File Transfer Protocol), SNMP (Simple Network […]


  8. Internet Control Messaging Protocol (ICMP) » Networkustad
    July 12, 2019 @ 3:10 pm

    […] Internet Control Messaging Protocol (ICMP) is an important protocol of the network layer. ICMP implements the TCP/IP protocol suite. An Internet Protocol (IP) is not a reliable protocol, because it does provide messages to be sent in the event of certain errors. The Internet Control Message Protocol (ICMP) services send messages including information for a status of the network itself rather than the application data. […]


  9. mediajio
    June 1, 2020 @ 6:13 pm

    Here i learn DHCP and ICMP very well..thanks


  10. Secure Your Internet with iTop VPN » NetworkUstad
    June 6, 2021 @ 6:05 pm

    […] New network Protocols […]


Leave a Reply