Menu
Computer Networking Protocols and Standards

IEEE 802 Standards Specify the Basics of Physical and Logical Networking
The (IEEE) Institute of Electrical and Electronics Engineers is an organization that defines standards for networking. The 802 Standards Specify the Basics of physical and logical networking. More ...

IPv4 Address Classes
Originally, IP network numbers were defined with rigid boundaries and grouped into address classes. Even though address classes was created to facilitate efficient use of the IPv4 address space, because of its rigidity it has been abandoned for more flexible classless addressing. More ...

The TCP/IP protocol Datagram Format
A datagram is the packet format defined by the Internet Protocol. A pictorial representation of an IP datagram shows the first five or six 32-bit words of the datagram are control information called the header. More ...

Understanding IP Routing
The Transmission Control Protocol/Internet Protocol TCP/IP suite of protocols is the underlying technology for information exchange on the Internet. This essential reference shows you how to isolate and resolve common network failures and to sustain optimal network operation. More ...

Video - The Upper Layers 5 Through 7 of the OSI Networking Model
In this video by Kevin Wallace you learn about Layers 5 Through 7 of the OSI networking model. More ...

Remote Control Protocols
Remote control protocols like Remote Desktop Protocol (RDP), Secure Shell (SSH), and Citrix Independent Computing Architecture (ICA), allow a system to access another system and transfer the user interface, keystrokes, and mouse movements between syatems as if you were actually sitting at the other syatem. More ...

VTP (VLAN Trunking Protocol)
A VLAN (Virtual LAN) allows a network administrator to partition a LAN to conform to the business functions of the organization without physically modifying the network. VTP (VLAN Trunking Protocol) is a Cisco proprietary protocol that allows an administrator to configure VLANs on a single VTP server, easing the administration of a network. More ...

Kerberos Authentication Protocol
Kerberos is an authentication protocol which allows computers communicating over a non-secure network to prove their identity to one another. Windows 2000 and later use Kerberos as their default authentication method. More ...

Active Directory : How Objects Are Stored and Identified
Data stored in Active Directory is presented to the user in a hierarchical fashion. There are two types of objects: containers and non-containers. The most common type of container in Active Directory is an OU (Organizational Unit). Non-container objects are also known as leaf nodes. More ...

IP version 6 (IPv6) Advantages and Implementation
The Internet has, to all intents and purposes, run out of public IP version 4 addresses. The solution to this issue is new IP version 6. This would require a parallel IPv6 based Internet to be running until all IPv4 connections have been converted. More ...

IPv6 Address Format
IPv4 is running out of addresses. IPv6 was designed to solve this problem therefore it is important to understand the format of an IPv6 address. More ...

Evolution of the Microsoft NOS (Active Directory)
A Network operating system (NOS0) is a networked environment in which resources, such as users, groups, and computers are stored in a central repository. Microsoft's first integrated NOS environment became available in 1990 with the release of Windows NT 3.0. More ...

T-Carrier - A Complete and Comprehensive Guide
T-carrier was introduced in 1962 by AT&T Bell Laboratories. A T1 line has the capacity of transmitting 1.544 Mbps and it can also be used to send 24 digitized voice channels. Dispite its age, because of its reliability, T-carrier is the most commonly used digital transmission service in the US, Canada, and Japan. More ...