The OSI Data Link Layer
The Data Link layer uses MAC addresses is to pass data frames from the Physical layer to the Network layer and vice versa. The use of MAC addresses permits the direction of data within the same network, but not across routers. More ...
Introducing OpenStack
OpenStack is one of the most popular cloud computing management packages. OpenStack provides a common platform for controlling clouds of servers, storage, network, and even application resources. OpenStack is managed through a web-based interface, a command-line interface (CLI), and an application programming interface (API). More ...
RIP (Routing Information Protocol)
RIP is an Interior Gateway Protocol (IGP) that uses hop count as a metric. RIP comes in versions 1, 2, and RIPng (RIP next generation) an extension of RIPv2 for support of IPv6. More ...
IPv6 Payload Length Field and Jumbograms
The IPv6 Payload Length field is a 16-bit field that indicates the length in bytes of just the payload following the main IPv6 header, it does not include the main IPv6 header. If the IPv6 packet has one or more extension headers, they are included in the number of bytes contained in the Payload Length field. More ...
PoE (Power Over Ethernet)
Say you want to mount a wireless access point (AP) on the ceiling. Although no electrical outlet is available, a switch feature called Power over Ethernet (PoE) IEEE 802.3at standard offers as much as 32.4W of power over a UTP cable. More ...
Internet Protocol versions IPv4, IPv5 and IPv6
Internet Protocol is the part of the TCP/IP protocol that is responsible for addressing packets. IPv4 uses a 32-bit address IPv6 uses a 128-bit address. This article describes how IPv4 are converted to IPv6 addresses. More ...
IP version 6 (IPv6) Advantages and Implementation
The Internet has, to all intents and purposes, run out of public IP version 4 addresses. The solution to this issue is new IP version 6. This would require a parallel IPv6 based Internet to be running until all IPv4 connections have been converted. More ...
The OSI Reference Model
No real world network operating systems conform exactly to the OSI model, but it is useful as a reference when describing existing systems. It is difficult to study network devices such as routers, switches, and gateways without using the model. More ...
SYN-ACK Handshake to Establish a TCP Connection
TCP uses a SYN-ACK handshake to establish a connection. Three messages are required to establish a TCP connection between two hosts. More ...
IPv6 Anycast Addresses
An IPv6 anycast address can be assigned to more than one interface. In other words, multiple devices can have the same anycast address. A packet sent to an anycast address is routed to the nearest interface having that address, according to the routers routing table. More ...
IPv6 Neighbor Discovery Protocol (NDP)
Neighbor Discovery Protocol (NDP) is used by IPv6 hosts for Router Discovery, Neighbor Discovery and Duplicate Address Discovery. More ...
RADIUS Protocol
RADIUS (Remote Authentication Dial-In User Service) is an application layer protocol that provides centralized Authorization, Authentication, and Accounting management for users who connect and use a network service. More ...
The OSI Session Layer
The Session layer, layer seven of the OSI model, establishes, synchronizes, maintains and terminates sessions between computers on a network. It establishes a connection ID and authenticates security. More ...
IEEE 802.11.x Wireless Standards
The 802.11 standard, approved in 1997, applies to wireless LANs with a 1 or 2 Mbps transmission rate in the 2.4 GHz band. Sometimes the term 802.11 is used to refer to the 802.11x family of specifications. More ...
Kerberos Authentication Protocol
Kerberos is an authentication protocol which allows computers communicating over a non-secure network to prove their identity to one another. Windows 2000 and later use Kerberos as their default authentication method. More ...
