Menu
Computer Networking Protocols and Standards

A Simple Description of the IPv6 Header and Datagram
This article provides a simple description of the IPv6 header and datagram without a lot referring back to IPv4. More ...

Internet Security and VPN Network Design
This article discusses some essential technical concepts associated with a VPN. A Virtual Private Network (VPN) integrates remote employees, company offices, and business partners using the Internet and secures encrypted tunnels between locations. More ...

OSI Network Model
The OSI model was developed years ago as a reference for network protocol and application designers to build their products with an open standard. That would promote a standard for developing network devices, interfaces, applications and services that would work together. It is a model rather than a specification since it defines layers and services for those layers and how each layer works with the layer above and below it. More ...

Neighbor Discovery Protocol (NDP)
Neighbor Discovery Protocol is part of the new version of the Internet Protocol (IPv6). Its function is to resolve IPv6 addresses into valid MAC addresses. All addresses discovered by NDR are stored in a buffer known as the neighbor cache. More ...

IEEE 802 Standards Specify the Basics of Physical and Logical Networking
The (IEEE) Institute of Electrical and Electronics Engineers is an organization that defines standards for networking. The 802 Standards Specify the Basics of physical and logical networking. More ...

Protocol Suites
Network protocols define rules for handling data and communicating in a particular networking environment. Individual protocols operate at specific layers in the OSI reference model. A protocol suite is a group of protocols designed to work together. More ...

What is PPP, PPPoA and PPPoE?
PPP was designed to provide a connection between two devices. PPP comes with options including encryption, authentication and data compression. PPPoA is the standard for connection over an ADSL network. PPPoE is the standard for connection over an Ethernet network. More ...

IPv6 Address Types and Scopes
An IPv6 addresses have a size of 128 bits have three types, unicast, multicast, and anycast. Unicast addresses are for a one-to-one communication. Multicast addresses are for a one-to-many communication. Anycast addresses are for one node to nearest node of multiple nodes communication. More ...

Routing Information Protocol (RIP), Open Shortest Path First (OSPF), and Routing Convergence
A routing protocol advertises route information between routers. Dynamic routing protocols are available that allow a router's routing table to be updated as network conditions change. More ...

Network Gateways
When networks with different protocols, such as Ethernet and Token Ring need to be connected together, this requires reconstruction of the data packets. To do this, information from above the network layer is required. A gateway is a device that can function at all seven layers of the OSI model. More ...

WAN Network Protocols - DSL, SONET, HDLC, DWDM, DLSW+
This article discusses some of the most implemented Wide Area Networking (WAN) protocols in enterprise networking environments today including HDLC, DSL, SONET, DWDM, and DLSW+. HDLC is a Cisco proprietary protocol for designed for sending data across serial links. More ...

Pv6 Myths
There are several misperceptions or myths regarding IPv6. IPv6 has been around quite some time, initially introduced in 1995 with RFC 1883 and later obsoleted with RFC 2460 in 1998. Over the years, as IPv6 evolved and as people discussed the merits of the new protocol, certain misconceptions ensued. More ...

TCP/IP Protocol Suite
A good portion of the knowledge required to be a network technician relates to the TCP/IP protocol suite. This article describes the most important protocols in the TCP/IP protocol suite. Many other less frequently used protocols exist. More ...

Kerberos Authentication Protocol
Kerberos is an authentication protocol which allows computers communicating over a non-secure network to prove their identity to one another. Windows 2000 and later use Kerberos as their default authentication method. More ...

Major Protocols in the TCP/IP Suite
This is a chart of the layers of the TCP/IP Suite and the major protocols in each layer. As you move your mouse pointer over each protocol acronym, a brief description of the protocol appears. This is not a comprehensive list. More ...


Learn more at amazon.com

Custom Search