TCP/IP Protocol Suite
A good portion of the knowledge required to be a network technician relates to the TCP/IP protocol suite. This article describes the most important protocols in the TCP/IP protocol suite. Many other less frequently used protocols exist. More ...
Remote Control Protocols
Remote control protocols like Remote Desktop Protocol (RDP), Secure Shell (SSH), and Citrix Independent Computing Architecture (ICA), allow a system to access another system and transfer the user interface, keystrokes, and mouse movements between syatems as if you were actually sitting at the other syatem. More ...
RADIUS Protocol
RADIUS (Remote Authentication Dial-In User Service) is an application layer protocol that provides centralized Authorization, Authentication, and Accounting management for users who connect and use a network service. More ...
IEEE 802 Standards Specify the Basics of Physical and Logical Networking
The (IEEE) Institute of Electrical and Electronics Engineers is an organization that defines standards for networking. The 802 Standards Specify the Basics of physical and logical networking. More ...
Basic TCP/IP Networking
In this article, I'm going to describe how a network works. I am NOT not going to load you down with details. Instead, I'm just going to describe what happens when you start your client computer. How it gets access to the network. More ...
Dynamic Host Configuration Protocol (DHCP) Explained
In the early days of TCP/IP each device on a network had stored on its hard disk a configuration file that an administrator used to manually assign a static IP address. Today a network administrator is no longer required to maintain an IP and MAC address configuration file a server. Every device on a network is automatically assigned a unique IP address by Dynamic Host Configuration Protocol (DHCP). More ...
TCP/IP Features
In just 24 sessions of one hour or less, using this book's straightforward, step-by-step approach, you'll discover how to implement, monitor, and manage a TCP/IP network?even the latest cloud-based and IPv6 networks. More ...
Network Routing Protocols - IGRP, EIGRP, OSPF, ISIS, BGP
The purpose of routing protocols is to learn of available routes on the network and make routing decisions. There are two primary routing protocol types; link state and distance vector. Some of the most common routing protocols include RIP, IGRP, EIGRP, OSPF, IS-IS and BGP. More ...
VTP (VLAN Trunking Protocol)
A VLAN (Virtual LAN) allows a network administrator to partition a LAN to conform to the business functions of the organization without physically modifying the network. VTP (VLAN Trunking Protocol) is a Cisco proprietary protocol that allows an administrator to configure VLANs on a single VTP server, easing the administration of a network. More ...
Network Operating Systems
The purpose of a network is to permit users share resources located on other computers and to share peripheral devices such as printers. A network operating system (NOS) is specialized systems software designed to provide networking functionality. More ...
TCP Windowing
It would be inefficient to return an ACK message as each segment is received. The number of segments received before an ACK message is returned is called the TCP receive window size. More ...
IPv6 Address Auto Configuration
When an IPv6 device first connects to a network, it can configure its own IPv6 address. It does this using a mechanism called MAC-to-EU164. More ...
Free eBook: Introduction to 802.11 Wireless
The growth of wireless mobile devices is incredible. If you're an IT professional you'll need to understand wireless technology. This free ebook by Aaron Balchunas explains everything from radio frequency to wireless authentication protocols. More ...
IPv4 Datagram Fields
If you are pursuing CompTIA Network+ certification, of if you're involved in network troubleshooting, it's important to understand the construction of an IP datagram. More ...
The OSI Data Link Layer
The Data Link layer uses MAC addresses is to pass data frames from the Physical layer to the Network layer and vice versa. The use of MAC addresses permits the direction of data within the same network, but not across routers. More ...
