Menu
Computer Networking Protocols and Standards

Kerberos Authentication Protocol
Kerberos is an authentication protocol which allows computers communicating over a non-secure network to prove their identity to one another. Windows 2000 and later use Kerberos as their default authentication method. More ...

X.25 and Frame Relay Overview
Frame Relay originated as an extension of integrated services digital network (ISDN). Its designers aimed to enable a packet-switched network to transport over circuit-switched technology. The technology has become a stand-alone and cost-effective means of creating a WAN. More ...

OSI Network Model
The OSI model was developed years ago as a reference for network protocol and application designers to build their products with an open standard. That would promote a standard for developing network devices, interfaces, applications and services that would work together. It is a model rather than a specification since it defines layers and services for those layers and how each layer works with the layer above and below it. More ...

14 Common Network Ports You Should Know
Ports are virtual software-based and are managed by a computer's operating system. Different types of data flow to and from a computer over the same network connection. The use of ports informs computers what to do with the data they receive. Each port is assigned a number, and each is associated with a specific process or service. Port numbers are standardized, most reserved for certain protocols, for example, all HTTP messages go to port 80. More ...

Understanding IP Routing
The Transmission Control Protocol/Internet Protocol TCP/IP suite of protocols is the underlying technology for information exchange on the Internet. This essential reference shows you how to isolate and resolve common network failures and to sustain optimal network operation. More ...

Internet Protocol versions IPv4, IPv5 and IPv6
Internet Protocol is the part of the TCP/IP protocol that is responsible for addressing packets. IPv4 uses a 32-bit address IPv6 uses a 128-bit address. This article describes how IPv4 are converted to IPv6 addresses. More ...

Virtual Local Area Networks (VLANs)
A Virtual LAN (VLAN) is a subgroup within a local network. VLANs make it easy for network administrators to separate a single switched network into subnetworks to match the functional and security requirements of their network without having to make major changes in the existing network infrastructure. More ...

The OSI Application Layer
This layer provides the interface between applications and the Network Operating System (NOS). The Application layer provides network services and applications such as HTTP, FTP, TELNET and SMP. More ...

Basic TCP/IP Networking
In this article, I'm going to describe how a network works. I am NOT not going to load you down with details. Instead, I'm just going to describe what happens when you start your client computer. How it gets access to the network. More ...

Internet Security and VPN Network Design
This article discusses some essential technical concepts associated with a VPN. A Virtual Private Network (VPN) integrates remote employees, company offices, and business partners using the Internet and secures encrypted tunnels between locations. More ...

RADIUS Protocol
RADIUS (Remote Authentication Dial-In User Service) is an application layer protocol that provides centralized Authorization, Authentication, and Accounting management for users who connect and use a network service. More ...

Shortest Path Bridging (SPB) Protocol
Shortest Path Bridging (SPB) protocol is a computer networking technology intended to simplify the creation and configuration of networks, while enabling multipath routing. It is the replacement for the older spanning tree protocols. More ...

Network Operating Systems
The purpose of a network is to permit users share resources located on other computers and to share peripheral devices such as printers. A network operating system (NOS) is specialized systems software designed to provide networking functionality. More ...

The OSI Session Layer
The Session layer, layer seven of the OSI model, establishes, synchronizes, maintains and terminates sessions between computers on a network. It establishes a connection ID and authenticates security. More ...

A Simple Description of the IPv6 Header and Datagram
This article provides a simple description of the IPv6 header and datagram without a lot referring back to IPv4. More ...


Learn more at amazon.com

Custom Search