Menu
Computer Networking Protocols and Standards

Neighbor Discovery Protocol (NDP)
Neighbor Discovery Protocol is part of the new version of the Internet Protocol (IPv6). Its function is to resolve IPv6 addresses into valid MAC addresses. All addresses discovered by NDR are stored in a buffer known as the neighbor cache. More ...

IPv6 Neighbor Discovery Protocol (NDP)
Neighbor Discovery Protocol (NDP) is used by IPv6 hosts for Router Discovery, Neighbor Discovery and Duplicate Address Discovery. More ...

Dynamic Host Configuration Protocol (DHCP) Explained
In the early days of TCP/IP each device on a network had stored on its hard disk a configuration file that an administrator used to manually assign a static IP address. Today a network administrator is no longer required to maintain an IP and MAC address configuration file a server. Every device on a network is automatically assigned a unique IP address by Dynamic Host Configuration Protocol (DHCP). More ...

The OSI Network Layer
The Network layer (OSI layer 3) uses routable protocols to deliver data packets to networks connected through routers. Routing is the process of moving data packets from one network or network segment to another. More ...

TCP/IP Utilities
TCP/IP comes with a set of command line utilities that a network technician can use to manage and troubleshoot a network. PING is used to test the ability of two hosts on a network to communicate. More ...

TCP/IP Features
In just 24 sessions of one hour or less, using this book's straightforward, step-by-step approach, you'll discover how to implement, monitor, and manage a TCP/IP network?even the latest cloud-based and IPv6 networks. More ...

IPv6 Address Types and Scopes
An IPv6 addresses have a size of 128 bits have three types, unicast, multicast, and anycast. Unicast addresses are for a one-to-one communication. Multicast addresses are for a one-to-many communication. Anycast addresses are for one node to nearest node of multiple nodes communication. More ...

Session Border Controllers - More Than Just a Voice Firewall
The migration from Time-Division Multiplexing to the more flexible IP based SIP networks brought an unexpected security challenge. Session Border Controllers focused primarily on SIP and H.323 session security. More ...

Looking at the OSI 7 Layer Reference Model
The OSI (Open Systems Interconnection) model is a 7 layer reference model for how applications can communicate over a network. Don't confuse The OSI model with TCP/IP Protocol which has 4 layers and is the actual architecture used for networking. More ...

Ports and Sockets
Data transmitted over the Internet carries a 32-bit IP address that identifies its destination computer and a 16-bit number that identifies a port on that computer. The combination of the IP address and the port number is called a socket. A pair of sockets, one on the sending computer and one on the receiving computer uniquely identifies a specific connection on the Internet. More ...

TCP/IP Protocol Suite
A good portion of the knowledge required to be a network technician relates to the TCP/IP protocol suite. This article describes the most important protocols in the TCP/IP protocol suite. Many other less frequently used protocols exist. More ...

Integration of IPv6 with IPv4
Almost all networks use IPv4. The question is how to move them over to IPv6 while allowing them to keep the networks they currently have operating. There are three methods. More ...

VTP (VLAN Trunking Protocol)
A VLAN (Virtual LAN) allows a network administrator to partition a LAN to conform to the business functions of the organization without physically modifying the network. VTP (VLAN Trunking Protocol) is a Cisco proprietary protocol that allows an administrator to configure VLANs on a single VTP server, easing the administration of a network. More ...