Menu
Computer Networking Protocols and Standards

PoE (Power Over Ethernet)
Say you want to mount a wireless access point (AP) on the ceiling. Although no electrical outlet is available, a switch feature called Power over Ethernet (PoE) IEEE 802.3at standard offers as much as 32.4W of power over a UTP cable. More ...

IPv6 Multicast Addresses
An IPv6 multicast address defines a group of devices known as a multicast group. Unlike IPv4, there is no broadcast address in IPv6. Instead, IPv6 uses multicast. A packet sent to a multicast group always has a unicast source address. More ...

T-Carrier
T-carrier is a time-division multiplexed (TDM) digital signal that has been used by the telephone companies for many decades. 24 8-bit signals are time-division multiplexed into a 1.544 Mbps t-carrier signal. More ...

The OSI Data Link Layer
The Data Link layer uses MAC addresses is to pass data frames from the Physical layer to the Network layer and vice versa. The use of MAC addresses permits the direction of data within the same network, but not across routers. More ...

Internet Protocol versions IPv4, IPv5 and IPv6
Internet Protocol is the part of the TCP/IP protocol that is responsible for addressing packets. IPv4 uses a 32-bit address IPv6 uses a 128-bit address. This article describes how IPv4 are converted to IPv6 addresses. More ...

Wireless Standards - 802.11a 802.11b 802.11g 802.11n 802.11i Explained
The IEEE 802.11 family of standards which provides for Wireless Ethernet or (Wi-Fi) has evolved over the years. This article explains the differences between 802.11a 802.11b 802.11g 802.11n and 802.11i. More ...

VTP (VLAN Trunking Protocol)
A VLAN (Virtual LAN) allows a network administrator to partition a LAN to conform to the business functions of the organization without physically modifying the network. VTP (VLAN Trunking Protocol) is a Cisco proprietary protocol that allows an administrator to configure VLANs on a single VTP server, easing the administration of a network. More ...

Kerberos Authentication Protocol
Kerberos is an authentication protocol which allows computers communicating over a non-secure network to prove their identity to one another. Windows 2000 and later use Kerberos as their default authentication method. More ...

Remote Control Protocols
Remote control protocols like Remote Desktop Protocol (RDP), Secure Shell (SSH), and Citrix Independent Computing Architecture (ICA), allow a system to access another system and transfer the user interface, keystrokes, and mouse movements between syatems as if you were actually sitting at the other syatem. More ...

Video - Network Layer (Layer 3) of OSI Networking Model
In this video by Kevin Wallace you learn about the Network Layer of the OSI networking model. More ...

Video - Introducing the OSI Model
This video by Kevin Wallace introduces the OSI networking model. More ...

RADIUS Protocol
RADIUS (Remote Authentication Dial-In User Service) is an application layer protocol that provides centralized Authorization, Authentication, and Accounting management for users who connect and use a network service. More ...

Networking Protocols, Ports, Standards, and Organizations What Does it All Mean?
A protocol is a set of rules that devices agree to. A port is specific electronic connection, or software interface a protocol uses. A standard is a specification that the characteristics of the protocol's signal and the design of the interface. Networking standards are developed by networking standards organizations. More ...

Wireless Network Standards - 80211a, 80211b, 80211g, 80211n, 80216
This article describes the 80211a, 80211b, 80211g, 80211n, 80216, the current IEEE defined wireless protocol standards in use today, their bandwidth, maximum data rate, and coverage area. More ...

Integration of IPv6 with IPv4
Almost all networks use IPv4. The question is how to move them over to IPv6 while allowing them to keep the networks they currently have operating. There are three methods. More ...


Learn more at amazon.com

Custom Search