Menu
Computer Networking Protocols and Standards

Networking Routing Believability and Administrative Distance
If a network is running more than one routing protocol and a router receives two route advertisements from different routing protocols, which route advertisement does the router believe?. More ...

Video Streaming Protocols
Video surveillance systems currently are undergoing a transition where more and more traditional analog solutions are being replaced by digital solutions. Here, some of the network protocols used in video streaming are described. More ...

Comparing IPv4 and IPv6 at a Glance
When examining the details of the IPv4 and IPv6 headers, there are some important differences between the two protocols. This article summarizes some of the differences. More ...

PoE (Power Over Ethernet)
Say you want to mount a wireless access point (AP) on the ceiling. Although no electrical outlet is available, a switch feature called Power over Ethernet (PoE) IEEE 802.3at standard offers as much as 32.4W of power over a UTP cable. More ...

The OSI Session Layer
The Session layer, layer seven of the OSI model, establishes, synchronizes, maintains and terminates sessions between computers on a network. It establishes a connection ID and authenticates security. More ...

14 Common Network Ports You Should Know
Ports are virtual software-based and are managed by a computer's operating system. Different types of data flow to and from a computer over the same network connection. The use of ports informs computers what to do with the data they receive. Each port is assigned a number, and each is associated with a specific process or service. Port numbers are standardized, most reserved for certain protocols, for example, all HTTP messages go to port 80. More ...

Neighbor Discovery Protocol (NDP)
Neighbor Discovery Protocol is part of the new version of the Internet Protocol (IPv6). Its function is to resolve IPv6 addresses into valid MAC addresses. All addresses discovered by NDR are stored in a buffer known as the neighbor cache. More ...

TCP Windowing
It would be inefficient to return an ACK message as each segment is received. The number of segments received before an ACK message is returned is called the TCP receive window size. More ...

IPv4 Datagram Fields
If you are pursuing CompTIA Network+ certification, of if you're involved in network troubleshooting, it's important to understand the construction of an IP datagram. More ...

Looking at the OSI 7 Layer Reference Model
The OSI (Open Systems Interconnection) model is a 7 layer reference model for how applications can communicate over a network. Don't confuse The OSI model with TCP/IP Protocol which has 4 layers and is the actual architecture used for networking. More ...

Dynamic Host Configuration Protocol (DHCP) Explained
In the early days of TCP/IP each device on a network had stored on its hard disk a configuration file that an administrator used to manually assign a static IP address. Today a network administrator is no longer required to maintain an IP and MAC address configuration file a server. Every device on a network is automatically assigned a unique IP address by Dynamic Host Configuration Protocol (DHCP). More ...

How to Set Up FTP (File Transfer Protocol)
FTP (File Transfer Protocol) is used to transfer computer files between a client and server on a network. This article explains how to set up FTP on IIS and that FTP is not a secure protocol and some secure file transfer alternatives. More ...

IEEE 802.11.x Wireless Standards
The 802.11 standard, approved in 1997, applies to wireless LANs with a 1 or 2 Mbps transmission rate in the 2.4 GHz band. Sometimes the term 802.11 is used to refer to the 802.11x family of specifications. More ...

IPv6 Global Unicast Addresses
Global unicast addresses (GUAs) are globally routable and reachable in the IPv6 Internet; they are equivalent to public IPv4 addresses. GUA addresses are also known as aggregatable global unicast addresses. More ...

IEEE 802.11 Wireless Modulation Methods
IEEE 802.11 Wireless Modulation Methods More ...


Learn more at amazon.com

Custom Search