Menu
Computer Networking Protocols and Standards

T-Carrier - A Complete and Comprehensive Guide
T-carrier was introduced in 1962 by AT&T Bell Laboratories. A T1 line has the capacity of transmitting 1.544 Mbps and it can also be used to send 24 digitized voice channels. Dispite its age, because of its reliability, T-carrier is the most commonly used digital transmission service in the US, Canada, and Japan. More ...

Kerberos Authentication Protocol
Kerberos is an authentication protocol which allows computers communicating over a non-secure network to prove their identity to one another. Windows 2000 and later use Kerberos as their default authentication method. More ...

RIP (Routing Information Protocol)
RIP is an Interior Gateway Protocol (IGP) that uses hop count as a metric. RIP comes in versions 1, 2, and RIPng (RIP next generation) an extension of RIPv2 for support of IPv6. More ...

Free eBook: IPv6 Addressing
All the IPv4 addresses are quickly being used up. The conversion to IPv6 is now underway. In this free eBook, Aaron Balchunas describes IPv6 and how to configure it to work along side IPv4. Learn which protocols will need to be updated to work with IPv6. Learn how to configure IPv6. More ...

IEEE 802.11.x Wireless Standards
The 802.11 standard, approved in 1997, applies to wireless LANs with a 1 or 2 Mbps transmission rate in the 2.4 GHz band. Sometimes the term 802.11 is used to refer to the 802.11x family of specifications. More ...

IP Addressing
The IP protocol uses a 32-bit address to define the network segment address and the node address. If the device is to be connected to the Internet, the address needs to be unique among all other devices connected to the Internet. More ...

IPv4 Address Classes
Originally, IP network numbers were defined with rigid boundaries and grouped into address classes. Even though address classes was created to facilitate efficient use of the IPv4 address space, because of its rigidity it has been abandoned for more flexible classless addressing. More ...

Routing Datagrams
Systems can deliver packets only to other devices attached to the same physical network. A gateway is a network point, referred to as a router, that acts as an entrance to another network. More ...

IP version 6 (IPv6) Advantages and Implementation
The Internet has, to all intents and purposes, run out of public IP version 4 addresses. The solution to this issue is new IP version 6. This would require a parallel IPv6 based Internet to be running until all IPv4 connections have been converted. More ...

X.25 and Frame Relay Overview
Frame Relay originated as an extension of integrated services digital network (ISDN). Its designers aimed to enable a packet-switched network to transport over circuit-switched technology. The technology has become a stand-alone and cost-effective means of creating a WAN. More ...

An Introduction to the Types of VPNs
There are three types of VPNs that provide users with the functionality described above and these fall within the two categories: computer-to-network VPNs and network-to-network VPNs. More ...

IPv6 Packet Fragmentation
Unlike in IPv4, an IPv6 router does not fragment a packet unless it is the source of the packet. The fields used in the IPv4 header for fragmentation do not exist in the IPv6 header. More ...

IPv6 Unicast Addresses
The 3 categories of IPv6 addresses are:Unicast identifies a single interface. A packet sent to a unicast address is delivered to the interface identified by that address. Multicast identifies a group of interfaces. A packet sent to a multicast address is delivered to all interfaces identified by that address. Anycast identifies a group of interfaces. A packet sent to an anycast address is delivered to the closest member of a group. More ...

SYN-ACK Handshake to Establish a TCP Connection
TCP uses a SYN-ACK handshake to establish a connection. Three messages are required to establish a TCP connection between two hosts. More ...

The TCP/IP protocol Datagram Format
A datagram is the packet format defined by the Internet Protocol. A pictorial representation of an IP datagram shows the first five or six 32-bit words of the datagram are control information called the header. More ...


Learn more at amazon.com

Custom Search