IPv6 Unicast Addresses
The 3 categories of IPv6 addresses are:Unicast identifies a single interface. A packet sent to a unicast address is delivered to the interface identified by that address. Multicast identifies a group of interfaces. A packet sent to a multicast address is delivered to all interfaces identified by that address. Anycast identifies a group of interfaces. A packet sent to an anycast address is delivered to the closest member of a group. More ...
Free eBook: IPv6 Addressing
All the IPv4 addresses are quickly being used up. The conversion to IPv6 is now underway. In this free eBook, Aaron Balchunas describes IPv6 and how to configure it to work along side IPv4. Learn which protocols will need to be updated to work with IPv6. Learn how to configure IPv6. More ...
RADIUS Protocol
RADIUS (Remote Authentication Dial-In User Service) is an application layer protocol that provides centralized Authorization, Authentication, and Accounting management for users who connect and use a network service. More ...
Protocol Suites
Network protocols define rules for handling data and communicating in a particular networking environment. Individual protocols operate at specific layers in the OSI reference model. A protocol suite is a group of protocols designed to work together. More ...
VTP (VLAN Trunking Protocol)
A VLAN (Virtual LAN) allows a network administrator to partition a LAN to conform to the business functions of the organization without physically modifying the network. VTP (VLAN Trunking Protocol) is a Cisco proprietary protocol that allows an administrator to configure VLANs on a single VTP server, easing the administration of a network. More ...
NTP Server Systems - The Network Time Protocol
The Network Time Protocol (NTP) is utilized by NTP Server systems to distribute accurate time information to network time clients. The NTP protocol is widely used throughout the Internet to provide synchronization of computers and processes. This article discusses how NTP server systems utilize the Network Time Protocol to provide networks with an accurate reference of time. More ...
Free eBook: Introduction to 802.11 Wireless
The growth of wireless mobile devices is incredible. If you're an IT professional you'll need to understand wireless technology. This free ebook by Aaron Balchunas explains everything from radio frequency to wireless authentication protocols. More ...
Video - Data Link Layer of OSI Networking Model
In this video by Kevin Wallace you learn about the Data Link Layer of the OSI networking model. More ...
Network Gateways
When networks with different protocols, such as Ethernet and Token Ring need to be connected together, this requires reconstruction of the data packets. To do this, information from above the network layer is required. A gateway is a device that can function at all seven layers of the OSI model. More ...
Link Aggregation
If all ports on a switch are operating at the same speed, the ports most likely to experience congestion are ports connecting to another switch or router. To help alleviate congested links between switches, you can logically combine multiple physical connections into a single logical connection. More ...
Network Operating Systems
The purpose of a network is to permit users share resources located on other computers and to share peripheral devices such as printers. A network operating system (NOS) is specialized systems software designed to provide networking functionality. More ...
IP Addressing and Subnetting
Today, many different kinds of devices can communicate on a network. A network device might be a computer, a router, a printer, or any number of unusual devices. Every device on a network that uses the Internet protocol (IP) needs a unique IP address. More ...
Kerberos Authentication Protocol
Kerberos is an authentication protocol which allows computers communicating over a non-secure network to prove their identity to one another. Windows 2000 and later use Kerberos as their default authentication method. More ...
Neighbor Discovery Protocol (NDP)
Neighbor Discovery Protocol is part of the new version of the Internet Protocol (IPv6). Its function is to resolve IPv6 addresses into valid MAC addresses. All addresses discovered by NDR are stored in a buffer known as the neighbor cache. More ...
Routing Information Protocol (RIP), Open Shortest Path First (OSPF), and Routing Convergence
A routing protocol advertises route information between routers. Dynamic routing protocols are available that allow a router's routing table to be updated as network conditions change. More ...
