What Are Private IP Addresses?
Normally you have to be assigned an IP address, or a group of IP addresses by a Regional Internet Registry. However, if you just need IP addresses for an internal network that will not be routed to the Internet, you can select from blocks of IP addresses reserved as Private IP addresses. More ...
Remote Control Protocols
Remote control protocols like Remote Desktop Protocol (RDP), Secure Shell (SSH), and Citrix Independent Computing Architecture (ICA), allow a system to access another system and transfer the user interface, keystrokes, and mouse movements between syatems as if you were actually sitting at the other syatem. More ...
Wireless Standards - 802.11a 802.11b 802.11g 802.11n 802.11i Explained
The IEEE 802.11 family of standards which provides for Wireless Ethernet or (Wi-Fi) has evolved over the years. This article explains the differences between 802.11a 802.11b 802.11g 802.11n and 802.11i. More ...
TCP/IP Utilities
TCP/IP comes with a set of command line utilities that a network technician can use to manage and troubleshoot a network. PING is used to test the ability of two hosts on a network to communicate. More ...
IPv6 Flow Label Field
The IPv6 Flow Label field is used to help identify all the packets within the same flow to ensure that all the packets receive the same type of handling by the IPv6 routers. More ...
The OSI Presentation Layer
At this layer applications communicate on a format for exchanging data. The Session layer provides character set conversion and formats the data. It performs encryption and decryption, compression and decompression. More ...
Video - The Upper Layers 5 Through 7 of the OSI Networking Model
In this video by Kevin Wallace you learn about Layers 5 Through 7 of the OSI networking model. More ...
IPv6 Prefix Length Notation
In IPv4, the prefix (or network portion) of the address can be identified by a dotted-decimal netmask, commonly referred to as a subnet mask. IPv6 address prefixes can be represented much the same way that IPv4 address prefixes are written in CIDR notation. More ...
Video - Introducing the OSI Model
This video by Kevin Wallace introduces the OSI networking model. More ...
The OSI Reference Model
No real world network operating systems conform exactly to the OSI model, but it is useful as a reference when describing existing systems. It is difficult to study network devices such as routers, switches, and gateways without using the model. More ...
What is PPP, PPPoA and PPPoE?
PPP was designed to provide a connection between two devices. PPP comes with options including encryption, authentication and data compression. PPPoA is the standard for connection over an ADSL network. PPPoE is the standard for connection over an Ethernet network. More ...
PoE (Power Over Ethernet)
Say you want to mount a wireless access point (AP) on the ceiling. Although no electrical outlet is available, a switch feature called Power over Ethernet (PoE) IEEE 802.3at standard offers as much as 32.4W of power over a UTP cable. More ...
Session Border Controllers - More Than Just a Voice Firewall
The migration from Time-Division Multiplexing to the more flexible IP based SIP networks brought an unexpected security challenge. Session Border Controllers focused primarily on SIP and H.323 session security. More ...
Free eBook: IPv6 Addressing
All the IPv4 addresses are quickly being used up. The conversion to IPv6 is now underway. In this free eBook, Aaron Balchunas describes IPv6 and how to configure it to work along side IPv4. Learn which protocols will need to be updated to work with IPv6. Learn how to configure IPv6. More ...
OSPF (Open Shortest Path First) Protocol
OSPF (Open Shortest Path First) protocol is a protocol that handles routing for IP traffic. Because it is based on an open standard, OSPF is very popular in many corporate networks today and has many advantages. More ...
