SYN-ACK Handshake to Establish a TCP Connection
TCP uses a SYN-ACK handshake to establish a connection. Three messages are required to establish a TCP connection between two hosts. More ...
IPv6 Dynamic Address Allocation
As with IPv4, IPv6 addresses can be statically assigned. However, when it comes to dynamic addressing, IPv6 has a different approach. IPv6 uses the ICMPv6 Router Advertisement message to suggest to devices how to obtain their IPv6 addressing information. More ...
Networking Routing Believability and Administrative Distance
If a network is running more than one routing protocol and a router receives two route advertisements from different routing protocols, which route advertisement does the router believe?. More ...
TCP Windowing
It would be inefficient to return an ACK message as each segment is received. The number of segments received before an ACK message is returned is called the TCP receive window size. More ...
IPv6 Neighbor Discovery Protocol (NDP)
Neighbor Discovery Protocol (NDP) is used by IPv6 hosts for Router Discovery, Neighbor Discovery and Duplicate Address Discovery. More ...
T-Carrier - A Complete and Comprehensive Guide
T-carrier was introduced in 1962 by AT&T Bell Laboratories. A T1 line has the capacity of transmitting 1.544 Mbps and it can also be used to send 24 digitized voice channels. Dispite its age, because of its reliability, T-carrier is the most commonly used digital transmission service in the US, Canada, and Japan. More ...
What Are Private IP Addresses?
Normally you have to be assigned an IP address, or a group of IP addresses by a Regional Internet Registry. However, if you just need IP addresses for an internal network that will not be routed to the Internet, you can select from blocks of IP addresses reserved as Private IP addresses. More ...
Kerberos Authentication Protocol
Kerberos is an authentication protocol which allows computers communicating over a non-secure network to prove their identity to one another. Windows 2000 and later use Kerberos as their default authentication method. More ...
Network Routing Protocols - IGRP, EIGRP, OSPF, ISIS, BGP
The purpose of routing protocols is to learn of available routes on the network and make routing decisions. There are two primary routing protocol types; link state and distance vector. Some of the most common routing protocols include RIP, IGRP, EIGRP, OSPF, IS-IS and BGP. More ...
IGRP (Interior Gateway Routing Protocol)
IGRP (Interior Gateway Routing Protocol) is a routing protocol like RIP, however, it scales better than RIP because it uses a sophisticated metric based on bandwidth and delay, and has other advantages. More ...
IPv6 Address Format
IPv4 is running out of addresses. IPv6 was designed to solve this problem therefore it is important
to understand the format of an IPv6 address. More ...
A Simple Description of the IPv6 Header and Datagram
This article provides a simple description of the IPv6 header and datagram without a lot referring back to IPv4. More ...
Introducing OpenStack
OpenStack is one of the most popular cloud computing management packages. OpenStack provides a common platform for controlling clouds of servers, storage, network, and even application resources. OpenStack is managed through a web-based interface, a command-line interface (CLI), and an application programming interface (API). More ...
RIP (Routing Information Protocol)
RIP is an Interior Gateway Protocol (IGP) that uses hop count as a metric. RIP comes in versions 1, 2, and RIPng (RIP next generation) an extension of RIPv2 for support of IPv6. More ...
Free eBook: IPv6 Addressing
All the IPv4 addresses are quickly being used up. The conversion to IPv6 is now underway. In this free eBook, Aaron Balchunas describes IPv6 and how to configure it to work along side IPv4. Learn which protocols will need to be updated to work with IPv6. Learn how to configure IPv6. More ...
