Menu
Computer Networking Protocols and Standards

Comparing IPv4 and IPv6 at a Glance
When examining the details of the IPv4 and IPv6 headers, there are some important differences between the two protocols. This article summarizes some of the differences. More ...

What Is Fabric Networking?
The networking industry came up with the term 'Fabric' to describe networking technologies that allow switches to connect in a way to achieve a mesh topology. More ...

Routing Information Protocol (RIP), Open Shortest Path First (OSPF), and Routing Convergence
A routing protocol advertises route information between routers. Dynamic routing protocols are available that allow a router's routing table to be updated as network conditions change. More ...

Networking Routing Believability and Administrative Distance
If a network is running more than one routing protocol and a router receives two route advertisements from different routing protocols, which route advertisement does the router believe?. More ...

Neighbor Discovery Protocol (NDP)
Neighbor Discovery Protocol is part of the new version of the Internet Protocol (IPv6). Its function is to resolve IPv6 addresses into valid MAC addresses. All addresses discovered by NDR are stored in a buffer known as the neighbor cache. More ...

Evolution of the Microsoft NOS (Active Directory)
A Network operating system (NOS0) is a networked environment in which resources, such as users, groups, and computers are stored in a central repository. Microsoft's first integrated NOS environment became available in 1990 with the release of Windows NT 3.0. More ...

IP Addressing and Subnetting
Today, many different kinds of devices can communicate on a network. A network device might be a computer, a router, a printer, or any number of unusual devices. Every device on a network that uses the Internet protocol (IP) needs a unique IP address. More ...

Networking Protocols, Ports, Standards, and Organizations What Does it All Mean?
A protocol is a set of rules that devices agree to. A port is specific electronic connection, or software interface a protocol uses. A standard is a specification that the characteristics of the protocol's signal and the design of the interface. Networking standards are developed by networking standards organizations. More ...

IPv6 Address Auto Configuration
When an IPv6 device first connects to a network, it can configure its own IPv6 address. It does this using a mechanism called MAC-to-EU164. More ...

IP version 6 (IPv6) Advantages and Implementation
The Internet has, to all intents and purposes, run out of public IP version 4 addresses. The solution to this issue is new IP version 6. This would require a parallel IPv6 based Internet to be running until all IPv4 connections have been converted. More ...

Network Gateways
When networks with different protocols, such as Ethernet and Token Ring need to be connected together, this requires reconstruction of the data packets. To do this, information from above the network layer is required. A gateway is a device that can function at all seven layers of the OSI model. More ...

IPv6 Prefix Length Notation
In IPv4, the prefix (or network portion) of the address can be identified by a dotted-decimal netmask, commonly referred to as a subnet mask. IPv6 address prefixes can be represented much the same way that IPv4 address prefixes are written in CIDR notation. More ...

The OSI Data Link Layer
The Data Link layer uses MAC addresses is to pass data frames from the Physical layer to the Network layer and vice versa. The use of MAC addresses permits the direction of data within the same network, but not across routers. More ...

Kerberos Authentication Protocol
Kerberos is an authentication protocol which allows computers communicating over a non-secure network to prove their identity to one another. Windows 2000 and later use Kerberos as their default authentication method. More ...

Internet Security and VPN Network Design
This article discusses some essential technical concepts associated with a VPN. A Virtual Private Network (VPN) integrates remote employees, company offices, and business partners using the Internet and secures encrypted tunnels between locations. More ...


Learn more at amazon.com

Custom Search