Major Protocols in the TCP/IP Suite
This is a chart of the layers of the TCP/IP Suite and the major protocols in each layer. As you move your mouse pointer over each protocol acronym, a brief description of the protocol appears. This is not a comprehensive list. More ...
SYN-ACK Handshake to Establish a TCP Connection
TCP uses a SYN-ACK handshake to establish a connection. Three messages are required to establish a TCP connection between two hosts. More ...
Internet Security and VPN Network Design
This article discusses some essential technical concepts associated with a VPN. A Virtual Private Network (VPN) integrates remote employees, company offices, and business partners using the Internet and secures encrypted tunnels between locations. More ...
Active Directory : How Objects Are Stored and Identified
Data stored in Active Directory is presented to the user in a hierarchical fashion. There are two types of objects: containers and non-containers. The most common type of container in Active Directory is an OU (Organizational Unit). Non-container objects are also known as leaf nodes. More ...
How to Set Up FTP (File Transfer Protocol)
FTP (File Transfer Protocol) is used to transfer computer files between a client and server on a network. This article explains how to set up FTP on IIS and that FTP is not a secure protocol and some secure file transfer alternatives. More ...
IPv6 Flow Label Field
The IPv6 Flow Label field is used to help identify all the packets within the same flow to ensure that all the packets receive the same type of handling by the IPv6 routers. More ...
DSL (Digital Subscriber Line)
DSL (Digital Subscriber Line) is a technology used to transmit digital data over telephone lines. DSL service can be transmitted simultaneously with voice band telephone service on the same line because DSL uses a much higher frequency that rides on top of the low 3400 Hz voiceband. More ...
Video - Transport Layer (Layer 4) of OSI Networking Model
In this video by Kevin Wallace you learn about the Transport Layer of the OSI networking model. More ...
IPv6 Packet Fragmentation
Unlike in IPv4, an IPv6 router does not fragment a packet unless it is the source of the packet. The fields used in the IPv4 header for fragmentation do not exist in the IPv6 header. More ...
What Is Fabric Networking?
The networking industry came up with the term 'Fabric' to describe networking technologies that allow switches to connect in a way to achieve a mesh topology. More ...
Session Border Controllers - More Than Just a Voice Firewall
The migration from Time-Division Multiplexing to the more flexible IP based SIP networks brought an unexpected security challenge. Session Border Controllers focused primarily on SIP and H.323 session security. More ...
TCP/IP Utilities
TCP/IP comes with a set of command line utilities that a network technician can use to manage and troubleshoot a network. PING is used to test the ability of two hosts on a network to communicate. More ...
Video - The Upper Layers 5 Through 7 of the OSI Networking Model
In this video by Kevin Wallace you learn about Layers 5 Through 7 of the OSI networking model. More ...
T-Carrier - A Complete and Comprehensive Guide
T-carrier was introduced in 1962 by AT&T Bell Laboratories. A T1 line has the capacity of transmitting 1.544 Mbps and it can also be used to send 24 digitized voice channels. Dispite its age, because of its reliability, T-carrier is the most commonly used digital transmission service in the US, Canada, and Japan. More ...
IPv6 Address Format
IPv4 is running out of addresses. IPv6 was designed to solve this problem therefore it is important
to understand the format of an IPv6 address. More ...
