Network Routing Protocols - IGRP, EIGRP, OSPF, ISIS, BGP
The purpose of routing protocols is to learn of available routes on the network and make routing decisions. There are two primary routing protocol types; link state and distance vector. Some of the most common routing protocols include RIP, IGRP, EIGRP, OSPF, IS-IS and BGP. More ...
The OSI Physical Layer
The Physical layer (OSI layer 1) deals with the mechanical and electrical specifications of the network hardware. Layer 1 specifications define connectors, pin-outs, signal voltages, and related software. More ...
Ports and Sockets
Data transmitted over the Internet carries a 32-bit IP address that identifies its destination computer and a 16-bit number that identifies a port on that computer. The combination of the IP address and the port number is called a socket. A pair of sockets, one on the sending computer and one on the receiving computer uniquely identifies a specific connection on the Internet. More ...
Integration of IPv6 with IPv4
Almost all networks use IPv4. The question is how to move them over to IPv6 while allowing them to keep the networks they currently have operating. There are three methods. More ...
TCP/IP Protocol Suite
A good portion of the knowledge required to be a network technician relates to the TCP/IP protocol suite. This article describes the most important protocols in the TCP/IP protocol suite. Many other less frequently used protocols exist. More ...
Routing Information Protocol (RIP), Open Shortest Path First (OSPF), and Routing Convergence
A routing protocol advertises route information between routers. Dynamic routing protocols are available that allow a router's routing table to be updated as network conditions change. More ...
Introducing OpenStack
OpenStack is one of the most popular cloud computing management packages. OpenStack provides a common platform for controlling clouds of servers, storage, network, and even application resources. OpenStack is managed through a web-based interface, a command-line interface (CLI), and an application programming interface (API). More ...
Kerberos Authentication Protocol
Kerberos is an authentication protocol which allows computers communicating over a non-secure network to prove their identity to one another. Windows 2000 and later use Kerberos as their default authentication method. More ...
Internet Security and VPN Network Design
This article discusses some essential technical concepts associated with a VPN. A Virtual Private Network (VPN) integrates remote employees, company offices, and business partners using the Internet and secures encrypted tunnels between locations. More ...
Network Cabling and Components
Although the power and sophistication of networking protocols and software is impressive, a network could not operate without physical cable and components. Even a wireless network needs physical components such as access points. More ...
IPv6 Neighbor Discovery Protocol (NDP)
Neighbor Discovery Protocol (NDP) is used by IPv6 hosts for Router Discovery, Neighbor Discovery and Duplicate Address Discovery. More ...
IEEE 802 Standards Specify the Basics of Physical and Logical Networking
The (IEEE) Institute of Electrical and Electronics Engineers is an organization that defines standards for networking. The 802 Standards Specify the Basics of physical and logical networking. More ...
IGRP (Interior Gateway Routing Protocol)
IGRP (Interior Gateway Routing Protocol) is a routing protocol like RIP, however, it scales better than RIP because it uses a sophisticated metric based on bandwidth and delay, and has other advantages. More ...
Evolution of the Microsoft NOS (Active Directory)
A Network operating system (NOS0) is a networked environment in which resources, such as users, groups, and computers are stored in a central repository. Microsoft's first integrated NOS environment became available in 1990 with the release of Windows NT 3.0. More ...
What Are Private IP Addresses?
Normally you have to be assigned an IP address, or a group of IP addresses by a Regional Internet Registry. However, if you just need IP addresses for an internal network that will not be routed to the Internet, you can select from blocks of IP addresses reserved as Private IP addresses. More ...
