IPv6 Neighbor Discovery Protocol (NDP)
Neighbor Discovery Protocol (NDP) is used by IPv6 hosts for Router Discovery, Neighbor Discovery and Duplicate Address Discovery. More ...
IP Addressing
The IP protocol uses a 32-bit address to define the network segment address and the node address. If the device is to be connected to the Internet, the address needs to be unique among all other devices connected to the Internet. More ...
TCP Windowing
It would be inefficient to return an ACK message as each segment is received. The number of segments received before an ACK message is returned is called the TCP receive window size. More ...
The TCP/IP protocol Datagram Format
A datagram is the packet format defined by the Internet Protocol. A pictorial representation of an IP datagram shows the first five or six 32-bit words of the datagram are control information called the header. More ...
Video - Data Link Layer of OSI Networking Model
In this video by Kevin Wallace you learn about the Data Link Layer of the OSI networking model. More ...
PoE (Power Over Ethernet)
Say you want to mount a wireless access point (AP) on the ceiling. Although no electrical outlet is available, a switch feature called Power over Ethernet (PoE) IEEE 802.3at standard offers as much as 32.4W of power over a UTP cable. More ...
OSPF (Open Shortest Path First) Protocol
OSPF (Open Shortest Path First) protocol is a protocol that handles routing for IP traffic. Because it is based on an open standard, OSPF is very popular in many corporate networks today and has many advantages. More ...
What Is Fabric Networking?
The networking industry came up with the term 'Fabric' to describe networking technologies that allow switches to connect in a way to achieve a mesh topology. More ...
How to Set Up FTP (File Transfer Protocol)
FTP (File Transfer Protocol) is used to transfer computer files between a client and server on a network. This article explains how to set up FTP on IIS and that FTP is not a secure protocol and some secure file transfer alternatives. More ...
IPv6 Address Types and Scopes
An IPv6 addresses have a size of 128 bits have three types, unicast, multicast, and anycast. Unicast addresses are for a one-to-one communication. Multicast addresses are for a one-to-many communication. Anycast addresses are for one node to nearest node of multiple nodes communication. More ...
Kerberos Authentication Protocol
Kerberos is an authentication protocol which allows computers communicating over a non-secure network to prove their identity to one another. Windows 2000 and later use Kerberos as their default authentication method. More ...
Network Cabling and Components
Although the power and sophistication of networking protocols and software is impressive, a network could not operate without physical cable and components. Even a wireless network needs physical components such as access points. More ...
TCP/IP Protocol Suite
A good portion of the knowledge required to be a network technician relates to the TCP/IP protocol suite. This article describes the most important protocols in the TCP/IP protocol suite. Many other less frequently used protocols exist. More ...
Looking at the OSI 7 Layer Reference Model
The OSI (Open Systems Interconnection) model is a 7 layer reference model for how applications can communicate over a network. Don't confuse The OSI model with TCP/IP Protocol which has 4 layers and is the actual architecture used for networking. More ...
NTP Server Systems - The Network Time Protocol
The Network Time Protocol (NTP) is utilized by NTP Server systems to distribute accurate time information to network time clients. The NTP protocol is widely used throughout the Internet to provide synchronization of computers and processes. This article discusses how NTP server systems utilize the Network Time Protocol to provide networks with an accurate reference of time. More ...
