Menu
Computer Networking Protocols and Standards

OSI Transport Layer
The Transport layer (OSI layer 4) uses connection-oriented protocols to provide a reliable end-to-end connection between the source computer and the destination computer. Transmission Control Protocol (TCP) is a transport layer protocol. More ...

Representation of IPv6 Addresses
IPv6 addresses are 128 bits in length and written as a string of hexadecimal digits. At first glance, these addresses can look overwhelming. RFC 2373 and RFC 5952 provide two helpful rules for reducing the notation involved in the standard format. More ...

The OSI Data Link Layer
The Data Link layer uses MAC addresses is to pass data frames from the Physical layer to the Network layer and vice versa. The use of MAC addresses permits the direction of data within the same network, but not across routers. More ...

SYN-ACK Handshake to Establish a TCP Connection
TCP uses a SYN-ACK handshake to establish a connection. Three messages are required to establish a TCP connection between two hosts. More ...

RADIUS Protocol
RADIUS (Remote Authentication Dial-In User Service) is an application layer protocol that provides centralized Authorization, Authentication, and Accounting management for users who connect and use a network service. More ...

Pv6 Myths
There are several misperceptions or myths regarding IPv6. IPv6 has been around quite some time, initially introduced in 1995 with RFC 1883 and later obsoleted with RFC 2460 in 1998. Over the years, as IPv6 evolved and as people discussed the merits of the new protocol, certain misconceptions ensued. More ...

Active Directory : How Objects Are Stored and Identified
Data stored in Active Directory is presented to the user in a hierarchical fashion. There are two types of objects: containers and non-containers. The most common type of container in Active Directory is an OU (Organizational Unit). Non-container objects are also known as leaf nodes. More ...

NTP Server Systems - The Network Time Protocol
The Network Time Protocol (NTP) is utilized by NTP Server systems to distribute accurate time information to network time clients. The NTP protocol is widely used throughout the Internet to provide synchronization of computers and processes. This article discusses how NTP server systems utilize the Network Time Protocol to provide networks with an accurate reference of time. More ...

Kerberos Authentication Protocol
Kerberos is an authentication protocol which allows computers communicating over a non-secure network to prove their identity to one another. Windows 2000 and later use Kerberos as their default authentication method. More ...

Internet Protocol versions IPv4, IPv5 and IPv6
Internet Protocol is the part of the TCP/IP protocol that is responsible for addressing packets. IPv4 uses a 32-bit address IPv6 uses a 128-bit address. This article describes how IPv4 are converted to IPv6 addresses. More ...

Network Operating Systems
The purpose of a network is to permit users share resources located on other computers and to share peripheral devices such as printers. A network operating system (NOS) is specialized systems software designed to provide networking functionality. More ...

Free eBook: Introduction to 802.11 Wireless
The growth of wireless mobile devices is incredible. If you're an IT professional you'll need to understand wireless technology. This free ebook by Aaron Balchunas explains everything from radio frequency to wireless authentication protocols. More ...

TCP/IP Features
In just 24 sessions of one hour or less, using this book's straightforward, step-by-step approach, you'll discover how to implement, monitor, and manage a TCP/IP network?even the latest cloud-based and IPv6 networks. More ...

IP version 6 (IPv6) Advantages and Implementation
The Internet has, to all intents and purposes, run out of public IP version 4 addresses. The solution to this issue is new IP version 6. This would require a parallel IPv6 based Internet to be running until all IPv4 connections have been converted. More ...

IPv6 Payload Length Field and Jumbograms
The IPv6 Payload Length field is a 16-bit field that indicates the length in bytes of just the payload following the main IPv6 header, it does not include the main IPv6 header. If the IPv6 packet has one or more extension headers, they are included in the number of bytes contained in the Payload Length field. More ...


Learn more at amazon.com

Custom Search