Menu
Computer Networking Protocols and Standards

Network Cabling and Components
Although the power and sophistication of networking protocols and software is impressive, a network could not operate without physical cable and components. Even a wireless network needs physical components such as access points. More ...

Session Border Controllers - More Than Just a Voice Firewall
The migration from Time-Division Multiplexing to the more flexible IP based SIP networks brought an unexpected security challenge. Session Border Controllers focused primarily on SIP and H.323 session security. More ...

Internet Protocol versions IPv4, IPv5 and IPv6
Internet Protocol is the part of the TCP/IP protocol that is responsible for addressing packets. IPv4 uses a 32-bit address IPv6 uses a 128-bit address. This article describes how IPv4 are converted to IPv6 addresses. More ...

Pv6 Myths
There are several misperceptions or myths regarding IPv6. IPv6 has been around quite some time, initially introduced in 1995 with RFC 1883 and later obsoleted with RFC 2460 in 1998. Over the years, as IPv6 evolved and as people discussed the merits of the new protocol, certain misconceptions ensued. More ...

IPv6 Address Auto Configuration
When an IPv6 device first connects to a network, it can configure its own IPv6 address. It does this using a mechanism called MAC-to-EU164. More ...

IPv4 Datagram Fields
If you are pursuing CompTIA Network+ certification, of if you're involved in network troubleshooting, it's important to understand the construction of an IP datagram. More ...

The OSI Session Layer
The Session layer, layer seven of the OSI model, establishes, synchronizes, maintains and terminates sessions between computers on a network. It establishes a connection ID and authenticates security. More ...

Network Switches
A bridge or router may be referred to as a switch because it uses information in the data packet to choose a path from one network segment to another. A bridge may be referred to as a layer 2 switch because it uses information from layer 2, the Data Link layer of the OSI model. More ...

Video - Network Layer (Layer 3) of OSI Networking Model
In this video by Kevin Wallace you learn about the Network Layer of the OSI networking model. More ...

T-Carrier
T-carrier is a time-division multiplexed (TDM) digital signal that has been used by the telephone companies for many decades. 24 8-bit signals are time-division multiplexed into a 1.544 Mbps t-carrier signal. More ...

The OSI Presentation Layer
At this layer applications communicate on a format for exchanging data. The Session layer provides character set conversion and formats the data. It performs encryption and decryption, compression and decompression. More ...

14 Common Network Ports You Should Know
Ports are virtual software-based and are managed by a computer's operating system. Different types of data flow to and from a computer over the same network connection. The use of ports informs computers what to do with the data they receive. Each port is assigned a number, and each is associated with a specific process or service. Port numbers are standardized, most reserved for certain protocols, for example, all HTTP messages go to port 80. More ...

An Introduction to the Types of VPNs
There are three types of VPNs that provide users with the functionality described above and these fall within the two categories: computer-to-network VPNs and network-to-network VPNs. More ...

Neighbor Discovery Protocol (NDP)
Neighbor Discovery Protocol is part of the new version of the Internet Protocol (IPv6). Its function is to resolve IPv6 addresses into valid MAC addresses. All addresses discovered by NDR are stored in a buffer known as the neighbor cache. More ...

TCP/IP Protocol Suite
A good portion of the knowledge required to be a network technician relates to the TCP/IP protocol suite. This article describes the most important protocols in the TCP/IP protocol suite. Many other less frequently used protocols exist. More ...


Learn more at amazon.com

Custom Search