Menu
Computer Networking Protocols and Standards

Networking Routing Believability and Administrative Distance
If a network is running more than one routing protocol and a router receives two route advertisements from different routing protocols, which route advertisement does the router believe?. More ...

Networking Protocols, Ports, Standards, and Organizations What Does it All Mean?
A protocol is a set of rules that devices agree to. A port is specific electronic connection, or software interface a protocol uses. A standard is a specification that the characteristics of the protocol's signal and the design of the interface. Networking standards are developed by networking standards organizations. More ...

Routing Datagrams
Systems can deliver packets only to other devices attached to the same physical network. A gateway is a network point, referred to as a router, that acts as an entrance to another network. More ...

Wireless Standards - 802.11a 802.11b 802.11g 802.11n 802.11i Explained
The IEEE 802.11 family of standards which provides for Wireless Ethernet or (Wi-Fi) has evolved over the years. This article explains the differences between 802.11a 802.11b 802.11g 802.11n and 802.11i. More ...

The OSI Data Link Layer
The Data Link layer uses MAC addresses is to pass data frames from the Physical layer to the Network layer and vice versa. The use of MAC addresses permits the direction of data within the same network, but not across routers. More ...

Network Operating Systems
The purpose of a network is to permit users share resources located on other computers and to share peripheral devices such as printers. A network operating system (NOS) is specialized systems software designed to provide networking functionality. More ...

Routing Information Protocol (RIP), Open Shortest Path First (OSPF), and Routing Convergence
A routing protocol advertises route information between routers. Dynamic routing protocols are available that allow a router's routing table to be updated as network conditions change. More ...

The OSI Session Layer
The Session layer, layer seven of the OSI model, establishes, synchronizes, maintains and terminates sessions between computers on a network. It establishes a connection ID and authenticates security. More ...

Wireless Network Standards - 80211a, 80211b, 80211g, 80211n, 80216
This article describes the 80211a, 80211b, 80211g, 80211n, 80216, the current IEEE defined wireless protocol standards in use today, their bandwidth, maximum data rate, and coverage area. More ...

Active Directory : How Objects Are Stored and Identified
Data stored in Active Directory is presented to the user in a hierarchical fashion. There are two types of objects: containers and non-containers. The most common type of container in Active Directory is an OU (Organizational Unit). Non-container objects are also known as leaf nodes. More ...

How to Set Up FTP (File Transfer Protocol)
FTP (File Transfer Protocol) is used to transfer computer files between a client and server on a network. This article explains how to set up FTP on IIS and that FTP is not a secure protocol and some secure file transfer alternatives. More ...

Virtual Local Area Networks (VLANs)
A Virtual LAN (VLAN) is a subgroup within a local network. VLANs make it easy for network administrators to separate a single switched network into subnetworks to match the functional and security requirements of their network without having to make major changes in the existing network infrastructure. More ...

The TCP/IP protocol Datagram Format
A datagram is the packet format defined by the Internet Protocol. A pictorial representation of an IP datagram shows the first five or six 32-bit words of the datagram are control information called the header. More ...

Video - Network Layer (Layer 3) of OSI Networking Model
In this video by Kevin Wallace you learn about the Network Layer of the OSI networking model. More ...

Kerberos Authentication Protocol
Kerberos is an authentication protocol which allows computers communicating over a non-secure network to prove their identity to one another. Windows 2000 and later use Kerberos as their default authentication method. More ...


Learn more at amazon.com

Custom Search