Menu
Computer Networking Protocols and Standards

Network Cabling and Components
Although the power and sophistication of networking protocols and software is impressive, a network could not operate without physical cable and components. Even a wireless network needs physical components such as access points. More ...

Basic TCP/IP Networking
In this article, I'm going to describe how a network works. I am NOT not going to load you down with details. Instead, I'm just going to describe what happens when you start your client computer. How it gets access to the network. More ...

Video - Network Layer (Layer 3) of OSI Networking Model
In this video by Kevin Wallace you learn about the Network Layer of the OSI networking model. More ...

SYN-ACK Handshake to Establish a TCP Connection
TCP uses a SYN-ACK handshake to establish a connection. Three messages are required to establish a TCP connection between two hosts. More ...

Wireless Standards - 802.11a 802.11b 802.11g 802.11n 802.11i Explained
The IEEE 802.11 family of standards which provides for Wireless Ethernet or (Wi-Fi) has evolved over the years. This article explains the differences between 802.11a 802.11b 802.11g 802.11n and 802.11i. More ...

The OSI Presentation Layer
At this layer applications communicate on a format for exchanging data. The Session layer provides character set conversion and formats the data. It performs encryption and decryption, compression and decompression. More ...

Kerberos Authentication Protocol
Kerberos is an authentication protocol which allows computers communicating over a non-secure network to prove their identity to one another. Windows 2000 and later use Kerberos as their default authentication method. More ...

TCP/IP Features
In just 24 sessions of one hour or less, using this book's straightforward, step-by-step approach, you'll discover how to implement, monitor, and manage a TCP/IP network?even the latest cloud-based and IPv6 networks. More ...

OSI Transport Layer
The Transport layer (OSI layer 4) uses connection-oriented protocols to provide a reliable end-to-end connection between the source computer and the destination computer. Transmission Control Protocol (TCP) is a transport layer protocol. More ...

Active Directory : How Objects Are Stored and Identified
Data stored in Active Directory is presented to the user in a hierarchical fashion. There are two types of objects: containers and non-containers. The most common type of container in Active Directory is an OU (Organizational Unit). Non-container objects are also known as leaf nodes. More ...

PoE (Power Over Ethernet)
Say you want to mount a wireless access point (AP) on the ceiling. Although no electrical outlet is available, a switch feature called Power over Ethernet (PoE) IEEE 802.3at standard offers as much as 32.4W of power over a UTP cable. More ...

IPv6 Prefix Length Notation
In IPv4, the prefix (or network portion) of the address can be identified by a dotted-decimal netmask, commonly referred to as a subnet mask. IPv6 address prefixes can be represented much the same way that IPv4 address prefixes are written in CIDR notation. More ...

The OSI Network Layer
The Network layer (OSI layer 3) uses routable protocols to deliver data packets to networks connected through routers. Routing is the process of moving data packets from one network or network segment to another. More ...

IP Addressing and Subnetting
Today, many different kinds of devices can communicate on a network. A network device might be a computer, a router, a printer, or any number of unusual devices. Every device on a network that uses the Internet protocol (IP) needs a unique IP address. More ...

Link Aggregation
If all ports on a switch are operating at the same speed, the ports most likely to experience congestion are ports connecting to another switch or router. To help alleviate congested links between switches, you can logically combine multiple physical connections into a single logical connection. More ...


Learn more at amazon.com

Custom Search