IP Addressing
The IP protocol uses a 32-bit address to define the network segment address and the node address. If the device is to be connected to the Internet, the address needs to be unique among all other devices connected to the Internet. More ...
Active Directory : How Objects Are Stored and Identified
Data stored in Active Directory is presented to the user in a hierarchical fashion. There are two types of objects: containers and non-containers. The most common type of container in Active Directory is an OU (Organizational Unit). Non-container objects are also known as leaf nodes. More ...
The OSI Reference Model
No real world network operating systems conform exactly to the OSI model, but it is useful as a reference when describing existing systems. It is difficult to study network devices such as routers, switches, and gateways without using the model. More ...
OSI Network Model
The OSI model was developed years ago as a reference for network protocol and application designers to build their products with an open standard. That would promote a standard for developing network devices, interfaces, applications and services that would work together. It is a model rather than a specification since it defines layers and services for those layers and how each layer works with the layer above and below it. More ...
Kerberos Authentication Protocol
Kerberos is an authentication protocol which allows computers communicating over a non-secure network to prove their identity to one another. Windows 2000 and later use Kerberos as their default authentication method. More ...
Understanding IP Routing
The Transmission Control Protocol/Internet Protocol TCP/IP suite of protocols is the underlying technology for information exchange on the Internet. This essential reference shows you how to isolate and resolve common network failures and to sustain optimal network operation. More ...
The OSI Network Layer
The Network layer (OSI layer 3) uses routable protocols to deliver data packets to networks connected through routers. Routing is the process of moving data packets from one network or network segment to another. More ...
Video - Network Layer (Layer 3) of OSI Networking Model
In this video by Kevin Wallace you learn about the Network Layer of the OSI networking model. More ...
TCP/IP Protocol Suite
A good portion of the knowledge required to be a network technician relates to the TCP/IP protocol suite. This article describes the most important protocols in the TCP/IP protocol suite. Many other less frequently used protocols exist. More ...
Routing Datagrams
Systems can deliver packets only to other devices attached to the same physical network. A gateway is a network point, referred to as a router, that acts as an entrance to another network. More ...
IEEE 802.11.x Wireless Standards
The 802.11 standard, approved in 1997, applies to wireless LANs with a 1 or 2 Mbps transmission rate in the 2.4 GHz band. Sometimes the term 802.11 is used to refer to the 802.11x family of specifications. More ...
Looking at the OSI 7 Layer Reference Model
The OSI (Open Systems Interconnection) model is a 7 layer reference model for how applications can communicate over a network. Don't confuse The OSI model with TCP/IP Protocol which has 4 layers and is the actual architecture used for networking. More ...
Network Gateways
When networks with different protocols, such as Ethernet and Token Ring need to be connected together, this requires reconstruction of the data packets. To do this, information from above the network layer is required. A gateway is a device that can function at all seven layers of the OSI model. More ...
IP Addressing and Subnetting
Today, many different kinds of devices can communicate on a network. A network device might be a computer, a router, a printer, or any number of unusual devices. Every device on a network that uses the Internet protocol (IP) needs a unique IP address. More ...
Integration of IPv6 with IPv4
Almost all networks use IPv4. The question is how to move them over to IPv6 while allowing them to keep the networks they currently have operating. There are three methods. More ...
