Unicast, Multicast, Broadcast. What Does It Mean?
Unicast, Multicast, and Broadcast are different network transmission methods. Unicast is a transmission between a single sender and a single receiver, while Broadcast is a transmission from a single sender to all clients on the network. More ...
IGRP (Interior Gateway Routing Protocol)
IGRP (Interior Gateway Routing Protocol) is a routing protocol like RIP, however, it scales better than RIP because it uses a sophisticated metric based on bandwidth and delay, and has other advantages. More ...
IPv6 Multicast Addresses
An IPv6 multicast address defines a group of devices known as a multicast group. Unlike IPv4, there is no broadcast address in IPv6. Instead, IPv6 uses multicast. A packet sent to a multicast group always has a unicast source address. More ...
SYN-ACK Handshake to Establish a TCP Connection
TCP uses a SYN-ACK handshake to establish a connection. Three messages are required to establish a TCP connection between two hosts. More ...
OSI Transport Layer
The Transport layer (OSI layer 4) uses connection-oriented protocols to provide a reliable end-to-end connection between the source computer and the destination computer. Transmission Control Protocol (TCP) is a transport layer protocol. More ...
TCP/IP Features
In just 24 sessions of one hour or less, using this book's straightforward, step-by-step approach, you'll discover how to implement, monitor, and manage a TCP/IP network?even the latest cloud-based and IPv6 networks. More ...
Introducing OpenStack
OpenStack is one of the most popular cloud computing management packages. OpenStack provides a common platform for controlling clouds of servers, storage, network, and even application resources. OpenStack is managed through a web-based interface, a command-line interface (CLI), and an application programming interface (API). More ...
Video - Network Layer (Layer 3) of OSI Networking Model
In this video by Kevin Wallace you learn about the Network Layer of the OSI networking model. More ...
IPv4 to IPv6 Transition With the Dual-Stack Technique
Transition from IPv4 to IPv6 has been slow. If you can't immediately convert all your network hardware to IPv6, the dual-stack technique allows the easiest operation of IPv4 and IPv6 devices on the same network. More ...
RIP (Routing Information Protocol)
RIP is an Interior Gateway Protocol (IGP) that uses hop count as a metric. RIP comes in versions 1, 2, and RIPng (RIP next generation) an extension of RIPv2 for support of IPv6. More ...
Comparison of the Layers of the OSI and TCP/IP Models
The TCP/IP protocol suite was developed by DARPA in the early 1970s. The OSI networking model was developed in Europe in 1986. This article compares the two networking standards. More ...
The OSI Data Link Layer
The Data Link layer uses MAC addresses is to pass data frames from the Physical layer to the Network layer and vice versa. The use of MAC addresses permits the direction of data within the same network, but not across routers. More ...
IPv6 Payload Length Field and Jumbograms
The IPv6 Payload Length field is a 16-bit field that indicates the length in bytes of just the payload following the main IPv6 header, it does not include the main IPv6 header. If the IPv6 packet has one or more extension headers, they are included in the number of bytes contained in the Payload Length field. More ...
14 Common Network Ports You Should Know
Ports are virtual software-based and are managed by a computer's operating system. Different types of data flow to and from a computer over the same network connection. The use of ports informs computers what to do with the data they receive. Each port is assigned a number, and each is associated with a specific process or service. Port numbers are standardized, most reserved for certain protocols, for example, all HTTP messages go to port 80. More ...
Internet Security and VPN Network Design
This article discusses some essential technical concepts associated with a VPN. A Virtual Private Network (VPN) integrates remote employees, company offices, and business partners using the Internet and secures encrypted tunnels between locations. More ...
