Menu
Computer Networking Protocols and Standards

X.25 and Frame Relay Overview
Frame Relay originated as an extension of integrated services digital network (ISDN). Its designers aimed to enable a packet-switched network to transport over circuit-switched technology. The technology has become a stand-alone and cost-effective means of creating a WAN. More ...

Classless IP Addressing
In the beginning, classful addressing was a great idea for keeping IP addresses organized. But as the Internet grew, and IP addresses became scarce, classful addressing was found to be too limiting. Classless IP addressing, known as Inter-Domain Routing (CIDR) was released in September 1993. More ...

Network Operating Systems
The purpose of a network is to permit users share resources located on other computers and to share peripheral devices such as printers. A network operating system (NOS) is specialized systems software designed to provide networking functionality. More ...

Wireless Standards - 802.11a 802.11b 802.11g 802.11n 802.11i Explained
The IEEE 802.11 family of standards which provides for Wireless Ethernet or (Wi-Fi) has evolved over the years. This article explains the differences between 802.11a 802.11b 802.11g 802.11n and 802.11i. More ...

Remote Control Protocols
Remote control protocols like Remote Desktop Protocol (RDP), Secure Shell (SSH), and Citrix Independent Computing Architecture (ICA), allow a system to access another system and transfer the user interface, keystrokes, and mouse movements between syatems as if you were actually sitting at the other syatem. More ...

An Introduction to the Types of VPNs
There are three types of VPNs that provide users with the functionality described above and these fall within the two categories: computer-to-network VPNs and network-to-network VPNs. More ...

Protocol Suites
Network protocols define rules for handling data and communicating in a particular networking environment. Individual protocols operate at specific layers in the OSI reference model. A protocol suite is a group of protocols designed to work together. More ...

IPv6 Unicast Addresses
The 3 categories of IPv6 addresses are:Unicast identifies a single interface. A packet sent to a unicast address is delivered to the interface identified by that address. Multicast identifies a group of interfaces. A packet sent to a multicast address is delivered to all interfaces identified by that address. Anycast identifies a group of interfaces. A packet sent to an anycast address is delivered to the closest member of a group. More ...

The OSI Presentation Layer
At this layer applications communicate on a format for exchanging data. The Session layer provides character set conversion and formats the data. It performs encryption and decryption, compression and decompression. More ...

VTP (VLAN Trunking Protocol)
A VLAN (Virtual LAN) allows a network administrator to partition a LAN to conform to the business functions of the organization without physically modifying the network. VTP (VLAN Trunking Protocol) is a Cisco proprietary protocol that allows an administrator to configure VLANs on a single VTP server, easing the administration of a network. More ...

Session Border Controllers - More Than Just a Voice Firewall
The migration from Time-Division Multiplexing to the more flexible IP based SIP networks brought an unexpected security challenge. Session Border Controllers focused primarily on SIP and H.323 session security. More ...

What Is Fabric Networking?
The networking industry came up with the term 'Fabric' to describe networking technologies that allow switches to connect in a way to achieve a mesh topology. More ...

T-Carrier
T-carrier is a time-division multiplexed (TDM) digital signal that has been used by the telephone companies for many decades. 24 8-bit signals are time-division multiplexed into a 1.544 Mbps t-carrier signal. More ...

Pv6 Myths
There are several misperceptions or myths regarding IPv6. IPv6 has been around quite some time, initially introduced in 1995 with RFC 1883 and later obsoleted with RFC 2460 in 1998. Over the years, as IPv6 evolved and as people discussed the merits of the new protocol, certain misconceptions ensued. More ...

IEEE 802.11 Wireless Modulation Methods
IEEE 802.11 Wireless Modulation Methods More ...


Learn more at amazon.com

Custom Search