IGRP (Interior Gateway Routing Protocol)
IGRP (Interior Gateway Routing Protocol) is a routing protocol like RIP, however, it scales better than RIP because it uses a sophisticated metric based on bandwidth and delay, and has other advantages. More ...
T-Carrier - A Complete and Comprehensive Guide
T-carrier was introduced in 1962 by AT&T Bell Laboratories. A T1 line has the capacity of transmitting 1.544 Mbps and it can also be used to send 24 digitized voice channels. Dispite its age, because of its reliability, T-carrier is the most commonly used digital transmission service in the US, Canada, and Japan. More ...
A Simple Description of the IPv6 Header and Datagram
This article provides a simple description of the IPv6 header and datagram without a lot referring back to IPv4. More ...
IPv6 Unicast Addresses
The 3 categories of IPv6 addresses are:Unicast identifies a single interface. A packet sent to a unicast address is delivered to the interface identified by that address. Multicast identifies a group of interfaces. A packet sent to a multicast address is delivered to all interfaces identified by that address. Anycast identifies a group of interfaces. A packet sent to an anycast address is delivered to the closest member of a group. More ...
Wireless Network Standards - 80211a, 80211b, 80211g, 80211n, 80216
This article describes the 80211a, 80211b, 80211g, 80211n, 80216, the current IEEE defined wireless protocol standards in use today, their bandwidth, maximum data rate, and coverage area. More ...
Session Border Controllers - More Than Just a Voice Firewall
The migration from Time-Division Multiplexing to the more flexible IP based SIP networks brought an unexpected security challenge. Session Border Controllers focused primarily on SIP and H.323 session security. More ...
Network Switches
A bridge or router may be referred to as a switch because it uses information in the data packet to choose a path from one network segment to another. A bridge may be referred to as a layer 2 switch because it uses information from layer 2, the Data Link layer of the OSI model. More ...
Video - The Upper Layers 5 Through 7 of the OSI Networking Model
In this video by Kevin Wallace you learn about Layers 5 Through 7 of the OSI networking model. More ...
TCP Windowing
It would be inefficient to return an ACK message as each segment is received. The number of segments received before an ACK message is returned is called the TCP receive window size. More ...
What is PPP, PPPoA and PPPoE?
PPP was designed to provide a connection between two devices. PPP comes with options including encryption, authentication and data compression. PPPoA is the standard for connection over an ADSL network. PPPoE is the standard for connection over an Ethernet network. More ...
TCP/IP Protocol Suite
A good portion of the knowledge required to be a network technician relates to the TCP/IP protocol suite. This article describes the most important protocols in the TCP/IP protocol suite. Many other less frequently used protocols exist. More ...
IPv4 Datagram Fields
If you are pursuing CompTIA Network+ certification, of if you're involved in network troubleshooting, it's important to understand the construction of an IP datagram. More ...
Virtual Local Area Networks (VLANs)
A Virtual LAN (VLAN) is a subgroup within a local network. VLANs make it easy for network administrators to separate a single switched network into subnetworks to match the functional and security requirements of their network without having to make major changes in the existing network infrastructure. More ...
Internet Security and VPN Network Design
This article discusses some essential technical concepts associated with a VPN. A Virtual Private Network (VPN) integrates remote employees, company offices, and business partners using the Internet and secures encrypted tunnels between locations. More ...
Comparison of the Layers of the OSI and TCP/IP Models
The TCP/IP protocol suite was developed by DARPA in the early 1970s. The OSI networking model was developed in Europe in 1986. This article compares the two networking standards. More ...
