Menu
Computer Networking Protocols and Standards

WAN Network Protocols - DSL, SONET, HDLC, DWDM, DLSW+
This article discusses some of the most implemented Wide Area Networking (WAN) protocols in enterprise networking environments today including HDLC, DSL, SONET, DWDM, and DLSW+. HDLC is a Cisco proprietary protocol for designed for sending data across serial links. More ...

IPv6 Unicast Addresses
The 3 categories of IPv6 addresses are:Unicast identifies a single interface. A packet sent to a unicast address is delivered to the interface identified by that address. Multicast identifies a group of interfaces. A packet sent to a multicast address is delivered to all interfaces identified by that address. Anycast identifies a group of interfaces. A packet sent to an anycast address is delivered to the closest member of a group. More ...

IPv4 Datagram Fields
If you are pursuing CompTIA Network+ certification, of if you're involved in network troubleshooting, it's important to understand the construction of an IP datagram. More ...

Unicast, Multicast, Broadcast. What Does It Mean?
Unicast, Multicast, and Broadcast are different network transmission methods. Unicast is a transmission between a single sender and a single receiver, while Broadcast is a transmission from a single sender to all clients on the network. More ...

IPv6 Flow Label Field
The IPv6 Flow Label field is used to help identify all the packets within the same flow to ensure that all the packets receive the same type of handling by the IPv6 routers. More ...

IEEE 802 Standards Specify the Basics of Physical and Logical Networking
The (IEEE) Institute of Electrical and Electronics Engineers is an organization that defines standards for networking. The 802 Standards Specify the Basics of physical and logical networking. More ...

SYN-ACK Handshake to Establish a TCP Connection
TCP uses a SYN-ACK handshake to establish a connection. Three messages are required to establish a TCP connection between two hosts. More ...

14 Common Network Ports You Should Know
Ports are virtual software-based and are managed by a computer's operating system. Different types of data flow to and from a computer over the same network connection. The use of ports informs computers what to do with the data they receive. Each port is assigned a number, and each is associated with a specific process or service. Port numbers are standardized, most reserved for certain protocols, for example, all HTTP messages go to port 80. More ...

Network Switches
A bridge or router may be referred to as a switch because it uses information in the data packet to choose a path from one network segment to another. A bridge may be referred to as a layer 2 switch because it uses information from layer 2, the Data Link layer of the OSI model. More ...

Active Directory : How Objects Are Stored and Identified
Data stored in Active Directory is presented to the user in a hierarchical fashion. There are two types of objects: containers and non-containers. The most common type of container in Active Directory is an OU (Organizational Unit). Non-container objects are also known as leaf nodes. More ...

Remote Control Protocols
Remote control protocols like Remote Desktop Protocol (RDP), Secure Shell (SSH), and Citrix Independent Computing Architecture (ICA), allow a system to access another system and transfer the user interface, keystrokes, and mouse movements between syatems as if you were actually sitting at the other syatem. More ...

Network Operating Systems
The purpose of a network is to permit users share resources located on other computers and to share peripheral devices such as printers. A network operating system (NOS) is specialized systems software designed to provide networking functionality. More ...

IP Addressing
The IP protocol uses a 32-bit address to define the network segment address and the node address. If the device is to be connected to the Internet, the address needs to be unique among all other devices connected to the Internet. More ...

Basic TCP/IP Networking
In this article, I'm going to describe how a network works. I am NOT not going to load you down with details. Instead, I'm just going to describe what happens when you start your client computer. How it gets access to the network. More ...

Representation of IPv6 Addresses
IPv6 addresses are 128 bits in length and written as a string of hexadecimal digits. At first glance, these addresses can look overwhelming. RFC 2373 and RFC 5952 provide two helpful rules for reducing the notation involved in the standard format. More ...


Learn more at amazon.com

Custom Search