Menu
Computer Networking Protocols and Standards

IPv6 Address Types and Scopes
An IPv6 addresses have a size of 128 bits have three types, unicast, multicast, and anycast. Unicast addresses are for a one-to-one communication. Multicast addresses are for a one-to-many communication. Anycast addresses are for one node to nearest node of multiple nodes communication. More ...

Protocol Suites
Network protocols define rules for handling data and communicating in a particular networking environment. Individual protocols operate at specific layers in the OSI reference model. A protocol suite is a group of protocols designed to work together. More ...

T-Carrier - A Complete and Comprehensive Guide
T-carrier was introduced in 1962 by AT&T Bell Laboratories. A T1 line has the capacity of transmitting 1.544 Mbps and it can also be used to send 24 digitized voice channels. Dispite its age, because of its reliability, T-carrier is the most commonly used digital transmission service in the US, Canada, and Japan. More ...

Active Directory : How Objects Are Stored and Identified
Data stored in Active Directory is presented to the user in a hierarchical fashion. There are two types of objects: containers and non-containers. The most common type of container in Active Directory is an OU (Organizational Unit). Non-container objects are also known as leaf nodes. More ...

How to Set Up FTP (File Transfer Protocol)
FTP (File Transfer Protocol) is used to transfer computer files between a client and server on a network. This article explains how to set up FTP on IIS and that FTP is not a secure protocol and some secure file transfer alternatives. More ...

IPv6 Payload Length Field and Jumbograms
The IPv6 Payload Length field is a 16-bit field that indicates the length in bytes of just the payload following the main IPv6 header, it does not include the main IPv6 header. If the IPv6 packet has one or more extension headers, they are included in the number of bytes contained in the Payload Length field. More ...

IEEE 802.11.x Wireless Standards
The 802.11 standard, approved in 1997, applies to wireless LANs with a 1 or 2 Mbps transmission rate in the 2.4 GHz band. Sometimes the term 802.11 is used to refer to the 802.11x family of specifications. More ...

IPv4 Address Classes
Originally, IP network numbers were defined with rigid boundaries and grouped into address classes. Even though address classes was created to facilitate efficient use of the IPv4 address space, because of its rigidity it has been abandoned for more flexible classless addressing. More ...

Looking at the OSI 7 Layer Reference Model
The OSI (Open Systems Interconnection) model is a 7 layer reference model for how applications can communicate over a network. Don't confuse The OSI model with TCP/IP Protocol which has 4 layers and is the actual architecture used for networking. More ...

WAN Network Protocols - DSL, SONET, HDLC, DWDM, DLSW+
This article discusses some of the most implemented Wide Area Networking (WAN) protocols in enterprise networking environments today including HDLC, DSL, SONET, DWDM, and DLSW+. HDLC is a Cisco proprietary protocol for designed for sending data across serial links. More ...

Internet Protocol versions IPv4, IPv5 and IPv6
Internet Protocol is the part of the TCP/IP protocol that is responsible for addressing packets. IPv4 uses a 32-bit address IPv6 uses a 128-bit address. This article describes how IPv4 are converted to IPv6 addresses. More ...

IP version 6 (IPv6) Advantages and Implementation
The Internet has, to all intents and purposes, run out of public IP version 4 addresses. The solution to this issue is new IP version 6. This would require a parallel IPv6 based Internet to be running until all IPv4 connections have been converted. More ...

Network Gateways
When networks with different protocols, such as Ethernet and Token Ring need to be connected together, this requires reconstruction of the data packets. To do this, information from above the network layer is required. A gateway is a device that can function at all seven layers of the OSI model. More ...

Internet Security and VPN Network Design
This article discusses some essential technical concepts associated with a VPN. A Virtual Private Network (VPN) integrates remote employees, company offices, and business partners using the Internet and secures encrypted tunnels between locations. More ...

IPv6 Neighbor Discovery Protocol (NDP)
Neighbor Discovery Protocol (NDP) is used by IPv6 hosts for Router Discovery, Neighbor Discovery and Duplicate Address Discovery. More ...


Learn more at amazon.com

Custom Search