Menu
Computer Networking Protocols and Standards

The OSI Network Layer
The Network layer (OSI layer 3) uses routable protocols to deliver data packets to networks connected through routers. Routing is the process of moving data packets from one network or network segment to another. More ...

Wireless Standards - 802.11a 802.11b 802.11g 802.11n 802.11i Explained
The IEEE 802.11 family of standards which provides for Wireless Ethernet or (Wi-Fi) has evolved over the years. This article explains the differences between 802.11a 802.11b 802.11g 802.11n and 802.11i. More ...

IEEE 802 Standards Specify the Basics of Physical and Logical Networking
The (IEEE) Institute of Electrical and Electronics Engineers is an organization that defines standards for networking. The 802 Standards Specify the Basics of physical and logical networking. More ...

Wireless Network Standards - 80211a, 80211b, 80211g, 80211n, 80216
This article describes the 80211a, 80211b, 80211g, 80211n, 80216, the current IEEE defined wireless protocol standards in use today, their bandwidth, maximum data rate, and coverage area. More ...

Evolution of the Microsoft NOS (Active Directory)
A Network operating system (NOS0) is a networked environment in which resources, such as users, groups, and computers are stored in a central repository. Microsoft's first integrated NOS environment became available in 1990 with the release of Windows NT 3.0. More ...

Network Gateways
When networks with different protocols, such as Ethernet and Token Ring need to be connected together, this requires reconstruction of the data packets. To do this, information from above the network layer is required. A gateway is a device that can function at all seven layers of the OSI model. More ...

OSPF (Open Shortest Path First) Protocol
OSPF (Open Shortest Path First) protocol is a protocol that handles routing for IP traffic. Because it is based on an open standard, OSPF is very popular in many corporate networks today and has many advantages. More ...

An Introduction to the Types of VPNs
There are three types of VPNs that provide users with the functionality described above and these fall within the two categories: computer-to-network VPNs and network-to-network VPNs. More ...

IP Addressing and Subnetting
Today, many different kinds of devices can communicate on a network. A network device might be a computer, a router, a printer, or any number of unusual devices. Every device on a network that uses the Internet protocol (IP) needs a unique IP address. More ...

RADIUS Protocol
RADIUS (Remote Authentication Dial-In User Service) is an application layer protocol that provides centralized Authorization, Authentication, and Accounting management for users who connect and use a network service. More ...

TCP Windowing
It would be inefficient to return an ACK message as each segment is received. The number of segments received before an ACK message is returned is called the TCP receive window size. More ...

NTP Server Systems - The Network Time Protocol
The Network Time Protocol (NTP) is utilized by NTP Server systems to distribute accurate time information to network time clients. The NTP protocol is widely used throughout the Internet to provide synchronization of computers and processes. This article discusses how NTP server systems utilize the Network Time Protocol to provide networks with an accurate reference of time. More ...

Routing Information Protocol (RIP), Open Shortest Path First (OSPF), and Routing Convergence
A routing protocol advertises route information between routers. Dynamic routing protocols are available that allow a router's routing table to be updated as network conditions change. More ...

RIP (Routing Information Protocol)
RIP is an Interior Gateway Protocol (IGP) that uses hop count as a metric. RIP comes in versions 1, 2, and RIPng (RIP next generation) an extension of RIPv2 for support of IPv6. More ...

IGRP (Interior Gateway Routing Protocol)
IGRP (Interior Gateway Routing Protocol) is a routing protocol like RIP, however, it scales better than RIP because it uses a sophisticated metric based on bandwidth and delay, and has other advantages. More ...


Learn more at amazon.com

Custom Search