Menu
Computer Networking Protocols and Standards

Session Border Controllers - More Than Just a Voice Firewall
The migration from Time-Division Multiplexing to the more flexible IP based SIP networks brought an unexpected security challenge. Session Border Controllers focused primarily on SIP and H.323 session security. More ...

DSL (Digital Subscriber Line)
DSL (Digital Subscriber Line) is a technology used to transmit digital data over telephone lines. DSL service can be transmitted simultaneously with voice band telephone service on the same line because DSL uses a much higher frequency that rides on top of the low 3400 Hz voiceband. More ...

Virtual Local Area Networks (VLANs)
A Virtual LAN (VLAN) is a subgroup within a local network. VLANs make it easy for network administrators to separate a single switched network into subnetworks to match the functional and security requirements of their network without having to make major changes in the existing network infrastructure. More ...

Networking Routing Believability and Administrative Distance
If a network is running more than one routing protocol and a router receives two route advertisements from different routing protocols, which route advertisement does the router believe?. More ...

IPv4 Address Classes
Originally, IP network numbers were defined with rigid boundaries and grouped into address classes. Even though address classes was created to facilitate efficient use of the IPv4 address space, because of its rigidity it has been abandoned for more flexible classless addressing. More ...

Link Aggregation
If all ports on a switch are operating at the same speed, the ports most likely to experience congestion are ports connecting to another switch or router. To help alleviate congested links between switches, you can logically combine multiple physical connections into a single logical connection. More ...

The OSI Physical Layer
The Physical layer (OSI layer 1) deals with the mechanical and electrical specifications of the network hardware. Layer 1 specifications define connectors, pin-outs, signal voltages, and related software. More ...

Pv6 Myths
There are several misperceptions or myths regarding IPv6. IPv6 has been around quite some time, initially introduced in 1995 with RFC 1883 and later obsoleted with RFC 2460 in 1998. Over the years, as IPv6 evolved and as people discussed the merits of the new protocol, certain misconceptions ensued. More ...

IPv6 Prefix Length Notation
In IPv4, the prefix (or network portion) of the address can be identified by a dotted-decimal netmask, commonly referred to as a subnet mask. IPv6 address prefixes can be represented much the same way that IPv4 address prefixes are written in CIDR notation. More ...

Network Switches
A bridge or router may be referred to as a switch because it uses information in the data packet to choose a path from one network segment to another. A bridge may be referred to as a layer 2 switch because it uses information from layer 2, the Data Link layer of the OSI model. More ...

IPv6 Payload Length Field and Jumbograms
The IPv6 Payload Length field is a 16-bit field that indicates the length in bytes of just the payload following the main IPv6 header, it does not include the main IPv6 header. If the IPv6 packet has one or more extension headers, they are included in the number of bytes contained in the Payload Length field. More ...

Neighbor Discovery Protocol (NDP)
Neighbor Discovery Protocol is part of the new version of the Internet Protocol (IPv6). Its function is to resolve IPv6 addresses into valid MAC addresses. All addresses discovered by NDR are stored in a buffer known as the neighbor cache. More ...

OSI Network Model
The OSI model was developed years ago as a reference for network protocol and application designers to build their products with an open standard. That would promote a standard for developing network devices, interfaces, applications and services that would work together. It is a model rather than a specification since it defines layers and services for those layers and how each layer works with the layer above and below it. More ...

PoE (Power Over Ethernet)
Say you want to mount a wireless access point (AP) on the ceiling. Although no electrical outlet is available, a switch feature called Power over Ethernet (PoE) IEEE 802.3at standard offers as much as 32.4W of power over a UTP cable. More ...

IPv6 Flow Label Field
The IPv6 Flow Label field is used to help identify all the packets within the same flow to ensure that all the packets receive the same type of handling by the IPv6 routers. More ...


Learn more at amazon.com

Custom Search