Menu
Computer Networking Protocols and Standards

Kerberos Authentication Protocol
Kerberos is an authentication protocol which allows computers communicating over a non-secure network to prove their identity to one another. Windows 2000 and later use Kerberos as their default authentication method. More ...

The TCP/IP protocol Datagram Format
A datagram is the packet format defined by the Internet Protocol. A pictorial representation of an IP datagram shows the first five or six 32-bit words of the datagram are control information called the header. More ...

IPv4 Datagram Fields
If you are pursuing CompTIA Network+ certification, of if you're involved in network troubleshooting, it's important to understand the construction of an IP datagram. More ...

Free eBook: Introduction to 802.11 Wireless
The growth of wireless mobile devices is incredible. If you're an IT professional you'll need to understand wireless technology. This free ebook by Aaron Balchunas explains everything from radio frequency to wireless authentication protocols. More ...

Video - The Upper Layers 5 Through 7 of the OSI Networking Model
In this video by Kevin Wallace you learn about Layers 5 Through 7 of the OSI networking model. More ...

Internet Security and VPN Network Design
This article discusses some essential technical concepts associated with a VPN. A Virtual Private Network (VPN) integrates remote employees, company offices, and business partners using the Internet and secures encrypted tunnels between locations. More ...

The OSI Data Link Layer
The Data Link layer uses MAC addresses is to pass data frames from the Physical layer to the Network layer and vice versa. The use of MAC addresses permits the direction of data within the same network, but not across routers. More ...

Session Border Controllers - More Than Just a Voice Firewall
The migration from Time-Division Multiplexing to the more flexible IP based SIP networks brought an unexpected security challenge. Session Border Controllers focused primarily on SIP and H.323 session security. More ...

Network Gateways
When networks with different protocols, such as Ethernet and Token Ring need to be connected together, this requires reconstruction of the data packets. To do this, information from above the network layer is required. A gateway is a device that can function at all seven layers of the OSI model. More ...

TCP Windowing
It would be inefficient to return an ACK message as each segment is received. The number of segments received before an ACK message is returned is called the TCP receive window size. More ...

Remote Control Protocols
Remote control protocols like Remote Desktop Protocol (RDP), Secure Shell (SSH), and Citrix Independent Computing Architecture (ICA), allow a system to access another system and transfer the user interface, keystrokes, and mouse movements between syatems as if you were actually sitting at the other syatem. More ...

IGRP (Interior Gateway Routing Protocol)
IGRP (Interior Gateway Routing Protocol) is a routing protocol like RIP, however, it scales better than RIP because it uses a sophisticated metric based on bandwidth and delay, and has other advantages. More ...

IEEE 802.11.x Wireless Standards
The 802.11 standard, approved in 1997, applies to wireless LANs with a 1 or 2 Mbps transmission rate in the 2.4 GHz band. Sometimes the term 802.11 is used to refer to the 802.11x family of specifications. More ...

What Are Private IP Addresses?
Normally you have to be assigned an IP address, or a group of IP addresses by a Regional Internet Registry. However, if you just need IP addresses for an internal network that will not be routed to the Internet, you can select from blocks of IP addresses reserved as Private IP addresses. More ...

Ports and Sockets
Data transmitted over the Internet carries a 32-bit IP address that identifies its destination computer and a 16-bit number that identifies a port on that computer. The combination of the IP address and the port number is called a socket. A pair of sockets, one on the sending computer and one on the receiving computer uniquely identifies a specific connection on the Internet. More ...


Learn more at amazon.com

Custom Search