Computer Networking Protocols and Standards
Kerberos Authentication Protocol
Kerberos is an authentication protocol which allows computers communicating over a
non-secure network to prove their identity to one another. Windows 2000 and later
use Kerberos as their default authentication method. More ...
Network Cabling and Components
Although the power and sophistication of networking protocols and software is
impressive, a network could not operate without physical cable and components. Even
a wireless network needs physical components such as access points. More ...
A Simple Description of the IPv6 Header and Datagram
This article provides a simple description of the IPv6 header and datagram without a lot referring back to IPv4. More ...
RADIUS (Remote Authentication Dial-In User Service) is an application layer protocol that provides centralized Authorization, Authentication, and Accounting management for users who connect and use a network service. More ...
Integration of IPv6 with IPv4
Almost all networks use IPv4. The question is how to move them over to IPv6 while allowing them to keep the networks
they currently have operating. There are three methods. More ...
How to Set Up FTP (File Transfer Protocol)
FTP (File Transfer Protocol) is used to transfer computer files between a client and server on a network.
This article explains how to set up FTP on IIS and that FTP is not a secure protocol and some secure file transfer alternatives. More ...
The OSI Physical Layer
The Physical layer (OSI layer 1) deals with the mechanical and electrical specifications
of the network hardware. Layer 1 specifications define connectors, pin-outs, signal
voltages, and related software. More ...
Video - The Upper Layers 5 Through 7 of the OSI Networking Model
In this video by Kevin Wallace you learn about Layers 5 Through 7 of the OSI networking model. More ...
An Introduction to the Types of VPNs
There are three types of VPNs that provide users with the functionality described above and these
fall within the two categories: computer-to-network VPNs and network-to-network VPNs. More ...
OSI Network Model
The OSI model was developed years ago as a reference for network protocol and application
designers to build their products with an open standard. That would promote a standard
for developing network devices, interfaces, applications and services that would work
together. It is a model rather than a specification since it defines layers and services
for those layers and how each layer works with the layer above and below it. More ...
Video - Data Link Layer of OSI Networking Model
In this video by Kevin Wallace you learn about the Data Link Layer of the OSI networking model. More ...
Video - Network Layer (Layer 3) of OSI Networking Model
In this video by Kevin Wallace you learn about the Network Layer of the OSI networking model. More ...
Dynamic Host Configuration Protocol (DHCP) Explained
In the early days of TCP/IP each device on a network had stored on its hard disk a
configuration file that an administrator used to manually assign a static IP address.
Today a network administrator is no longer required to maintain an IP and MAC address
configuration file a server. Every device on a network is automatically assigned a
unique IP address by Dynamic Host Configuration Protocol (DHCP). More ...