IPv6 Address Auto Configuration
When an IPv6 device first connects to a network, it can configure its own IPv6 address. It does this using a mechanism called MAC-to-EU164. More ...
Protocol Suites
Network protocols define rules for handling data and communicating in a particular networking environment. Individual protocols operate at specific layers in the OSI reference model. A protocol suite is a group of protocols designed to work together. More ...
IPv6 Neighbor Discovery Protocol (NDP)
Neighbor Discovery Protocol (NDP) is used by IPv6 hosts for Router Discovery, Neighbor Discovery and Duplicate Address Discovery. More ...
Video - Transport Layer (Layer 4) of OSI Networking Model
In this video by Kevin Wallace you learn about the Transport Layer of the OSI networking model. More ...
NTP Server Systems - The Network Time Protocol
The Network Time Protocol (NTP) is utilized by NTP Server systems to distribute accurate time information to network time clients. The NTP protocol is widely used throughout the Internet to provide synchronization of computers and processes. This article discusses how NTP server systems utilize the Network Time Protocol to provide networks with an accurate reference of time. More ...
Introducing OpenStack
OpenStack is one of the most popular cloud computing management packages. OpenStack provides a common platform for controlling clouds of servers, storage, network, and even application resources. OpenStack is managed through a web-based interface, a command-line interface (CLI), and an application programming interface (API). More ...
Internet Protocol versions IPv4, IPv5 and IPv6
Internet Protocol is the part of the TCP/IP protocol that is responsible for addressing packets. IPv4 uses a 32-bit address IPv6 uses a 128-bit address. This article describes how IPv4 are converted to IPv6 addresses. More ...
Kerberos Authentication Protocol
Kerberos is an authentication protocol which allows computers communicating over a non-secure network to prove their identity to one another. Windows 2000 and later use Kerberos as their default authentication method. More ...
DSL (Digital Subscriber Line)
DSL (Digital Subscriber Line) is a technology used to transmit digital data over telephone lines. DSL service can be transmitted simultaneously with voice band telephone service on the same line because DSL uses a much higher frequency that rides on top of the low 3400 Hz voiceband. More ...
IPv6 Multicast Addresses
An IPv6 multicast address defines a group of devices known as a multicast group. Unlike IPv4, there is no broadcast address in IPv6. Instead, IPv6 uses multicast. A packet sent to a multicast group always has a unicast source address. More ...
TCP/IP Features
In just 24 sessions of one hour or less, using this book's straightforward, step-by-step approach, you'll discover how to implement, monitor, and manage a TCP/IP network?even the latest cloud-based and IPv6 networks. More ...
IEEE 802.11 Wireless Modulation Methods
IEEE 802.11 Wireless Modulation Methods More ...
What Is Fabric Networking?
The networking industry came up with the term 'Fabric' to describe networking technologies that allow switches to connect in a way to achieve a mesh topology. More ...
Integration of IPv6 with IPv4
Almost all networks use IPv4. The question is how to move them over to IPv6 while allowing them to keep the networks they currently have operating. There are three methods. More ...
The OSI Presentation Layer
At this layer applications communicate on a format for exchanging data. The Session layer provides character set conversion and formats the data. It performs encryption and decryption, compression and decompression. More ...
