Session Border Controllers - More Than Just a Voice Firewall
The migration from Time-Division Multiplexing to the more flexible IP based SIP networks brought an unexpected security challenge. Session Border Controllers focused primarily on SIP and H.323 session security. More ...
IP version 6 (IPv6) Advantages and Implementation
The Internet has, to all intents and purposes, run out of public IP version 4 addresses. The solution to this issue is new IP version 6. This would require a parallel IPv6 based Internet to be running until all IPv4 connections have been converted. More ...
The OSI Application Layer
This layer provides the interface between applications and the Network Operating System (NOS). The Application layer provides network services and applications such as HTTP, FTP, TELNET and SMP. More ...
What Is Fabric Networking?
The networking industry came up with the term 'Fabric' to describe networking technologies that allow switches to connect in a way to achieve a mesh topology. More ...
Video - Network Layer (Layer 3) of OSI Networking Model
In this video by Kevin Wallace you learn about the Network Layer of the OSI networking model. More ...
IPv6 Payload Length Field and Jumbograms
The IPv6 Payload Length field is a 16-bit field that indicates the length in bytes of just the payload following the main IPv6 header, it does not include the main IPv6 header. If the IPv6 packet has one or more extension headers, they are included in the number of bytes contained in the Payload Length field. More ...
TCP/IP Utilities
TCP/IP comes with a set of command line utilities that a network technician can use to manage and troubleshoot a network. PING is used to test the ability of two hosts on a network to communicate. More ...
Network Routing Protocols - IGRP, EIGRP, OSPF, ISIS, BGP
The purpose of routing protocols is to learn of available routes on the network and make routing decisions. There are two primary routing protocol types; link state and distance vector. Some of the most common routing protocols include RIP, IGRP, EIGRP, OSPF, IS-IS and BGP. More ...
Kerberos Authentication Protocol
Kerberos is an authentication protocol which allows computers communicating over a non-secure network to prove their identity to one another. Windows 2000 and later use Kerberos as their default authentication method. More ...
IPv4 Datagram Fields
If you are pursuing CompTIA Network+ certification, of if you're involved in network troubleshooting, it's important to understand the construction of an IP datagram. More ...
Link Aggregation
If all ports on a switch are operating at the same speed, the ports most likely to experience congestion are ports connecting to another switch or router. To help alleviate congested links between switches, you can logically combine multiple physical connections into a single logical connection. More ...
Video - Introducing the OSI Model
This video by Kevin Wallace introduces the OSI networking model. More ...
IPv6 Neighbor Discovery Protocol (NDP)
Neighbor Discovery Protocol (NDP) is used by IPv6 hosts for Router Discovery, Neighbor Discovery and Duplicate Address Discovery. More ...
Basic TCP/IP Networking
In this article, I'm going to describe how a network works. I am NOT not going to load you down with details. Instead, I'm just going to describe what happens when you start your client computer. How it gets access to the network. More ...
Networking Routing Believability and Administrative Distance
If a network is running more than one routing protocol and a router receives two route advertisements from different routing protocols, which route advertisement does the router believe?. More ...
