Menu
Computer Networking Protocols and Standards

Kerberos Authentication Protocol
Kerberos is an authentication protocol which allows computers communicating over a non-secure network to prove their identity to one another. Windows 2000 and later use Kerberos as their default authentication method. More ...

IGRP (Interior Gateway Routing Protocol)
IGRP (Interior Gateway Routing Protocol) is a routing protocol like RIP, however, it scales better than RIP because it uses a sophisticated metric based on bandwidth and delay, and has other advantages. More ...

IPv6 Global Unicast Addresses
Global unicast addresses (GUAs) are globally routable and reachable in the IPv6 Internet; they are equivalent to public IPv4 addresses. GUA addresses are also known as aggregatable global unicast addresses. More ...

Video - Network Layer (Layer 3) of OSI Networking Model
In this video by Kevin Wallace you learn about the Network Layer of the OSI networking model. More ...

T-Carrier - A Complete and Comprehensive Guide
T-carrier was introduced in 1962 by AT&T Bell Laboratories. A T1 line has the capacity of transmitting 1.544 Mbps and it can also be used to send 24 digitized voice channels. Dispite its age, because of its reliability, T-carrier is the most commonly used digital transmission service in the US, Canada, and Japan. More ...

Comparison of the Layers of the OSI and TCP/IP Models
The TCP/IP protocol suite was developed by DARPA in the early 1970s. The OSI networking model was developed in Europe in 1986. This article compares the two networking standards. More ...

The OSI Physical Layer
The Physical layer (OSI layer 1) deals with the mechanical and electrical specifications of the network hardware. Layer 1 specifications define connectors, pin-outs, signal voltages, and related software. More ...

IPv6 Neighbor Discovery Protocol (NDP)
Neighbor Discovery Protocol (NDP) is used by IPv6 hosts for Router Discovery, Neighbor Discovery and Duplicate Address Discovery. More ...

T-Carrier
T-carrier is a time-division multiplexed (TDM) digital signal that has been used by the telephone companies for many decades. 24 8-bit signals are time-division multiplexed into a 1.544 Mbps t-carrier signal. More ...

An Introduction to the Types of VPNs
There are three types of VPNs that provide users with the functionality described above and these fall within the two categories: computer-to-network VPNs and network-to-network VPNs. More ...

Free eBook: IPv6 Addressing
All the IPv4 addresses are quickly being used up. The conversion to IPv6 is now underway. In this free eBook, Aaron Balchunas describes IPv6 and how to configure it to work along side IPv4. Learn which protocols will need to be updated to work with IPv6. Learn how to configure IPv6. More ...

Free eBook: Introduction to 802.11 Wireless
The growth of wireless mobile devices is incredible. If you're an IT professional you'll need to understand wireless technology. This free ebook by Aaron Balchunas explains everything from radio frequency to wireless authentication protocols. More ...

WAN Network Protocols - DSL, SONET, HDLC, DWDM, DLSW+
This article discusses some of the most implemented Wide Area Networking (WAN) protocols in enterprise networking environments today including HDLC, DSL, SONET, DWDM, and DLSW+. HDLC is a Cisco proprietary protocol for designed for sending data across serial links. More ...

Remote Control Protocols
Remote control protocols like Remote Desktop Protocol (RDP), Secure Shell (SSH), and Citrix Independent Computing Architecture (ICA), allow a system to access another system and transfer the user interface, keystrokes, and mouse movements between syatems as if you were actually sitting at the other syatem. More ...

What Is Fabric Networking?
The networking industry came up with the term 'Fabric' to describe networking technologies that allow switches to connect in a way to achieve a mesh topology. More ...


Learn more at amazon.com

Custom Search