Video - Introducing the OSI Model
This video by Kevin Wallace introduces the OSI networking model. More ...
Kerberos Authentication Protocol
Kerberos is an authentication protocol which allows computers communicating over a non-secure network to prove their identity to one another. Windows 2000 and later use Kerberos as their default authentication method. More ...
VTP (VLAN Trunking Protocol)
A VLAN (Virtual LAN) allows a network administrator to partition a LAN to conform to the business functions of the organization without physically modifying the network. VTP (VLAN Trunking Protocol) is a Cisco proprietary protocol that allows an administrator to configure VLANs on a single VTP server, easing the administration of a network. More ...
IPv4 to IPv6 Transition With the Dual-Stack Technique
Transition from IPv4 to IPv6 has been slow. If you can't immediately convert all your network hardware to IPv6, the dual-stack technique allows the easiest operation of IPv4 and IPv6 devices on the same network. More ...
IPv4 Datagram Fields
If you are pursuing CompTIA Network+ certification, of if you're involved in network troubleshooting, it's important to understand the construction of an IP datagram. More ...
Routing Datagrams
Systems can deliver packets only to other devices attached to the same physical network. A gateway is a network point, referred to as a router, that acts as an entrance to another network. More ...
Network Switches
A bridge or router may be referred to as a switch because it uses information in the data packet to choose a path from one network segment to another. A bridge may be referred to as a layer 2 switch because it uses information from layer 2, the Data Link layer of the OSI model. More ...
Internet Protocol versions IPv4, IPv5 and IPv6
Internet Protocol is the part of the TCP/IP protocol that is responsible for addressing packets. IPv4 uses a 32-bit address IPv6 uses a 128-bit address. This article describes how IPv4 are converted to IPv6 addresses. More ...
Network Routing Protocols - IGRP, EIGRP, OSPF, ISIS, BGP
The purpose of routing protocols is to learn of available routes on the network and make routing decisions. There are two primary routing protocol types; link state and distance vector. Some of the most common routing protocols include RIP, IGRP, EIGRP, OSPF, IS-IS and BGP. More ...
IPv6 Global Unicast Addresses
Global unicast addresses (GUAs) are globally routable and reachable in the IPv6 Internet; they are equivalent to public IPv4 addresses. GUA addresses are also known as aggregatable global unicast addresses. More ...
Wireless Standards - 802.11a 802.11b 802.11g 802.11n 802.11i Explained
The IEEE 802.11 family of standards which provides for Wireless Ethernet or (Wi-Fi) has evolved over the years. This article explains the differences between 802.11a 802.11b 802.11g 802.11n and 802.11i. More ...
RIP (Routing Information Protocol)
RIP is an Interior Gateway Protocol (IGP) that uses hop count as a metric. RIP comes in versions 1, 2, and RIPng (RIP next generation) an extension of RIPv2 for support of IPv6. More ...
Session Border Controllers - More Than Just a Voice Firewall
The migration from Time-Division Multiplexing to the more flexible IP based SIP networks brought an unexpected security challenge. Session Border Controllers focused primarily on SIP and H.323 session security. More ...
Virtual Local Area Networks (VLANs)
A Virtual LAN (VLAN) is a subgroup within a local network. VLANs make it easy for network administrators to separate a single switched network into subnetworks to match the functional and security requirements of their network without having to make major changes in the existing network infrastructure. More ...
Neighbor Discovery Protocol (NDP)
Neighbor Discovery Protocol is part of the new version of the Internet Protocol (IPv6). Its function is to resolve IPv6 addresses into valid MAC addresses. All addresses discovered by NDR are stored in a buffer known as the neighbor cache. More ...
