Menu
Computer Networking Protocols and Standards

IPv6 Address Auto Configuration
When an IPv6 device first connects to a network, it can configure its own IPv6 address. It does this using a mechanism called MAC-to-EU164. More ...

Looking at the OSI 7 Layer Reference Model
The OSI (Open Systems Interconnection) model is a 7 layer reference model for how applications can communicate over a network. Don't confuse The OSI model with TCP/IP Protocol which has 4 layers and is the actual architecture used for networking. More ...

IPv6 Flow Label Field
The IPv6 Flow Label field is used to help identify all the packets within the same flow to ensure that all the packets receive the same type of handling by the IPv6 routers. More ...

The OSI Reference Model
No real world network operating systems conform exactly to the OSI model, but it is useful as a reference when describing existing systems. It is difficult to study network devices such as routers, switches, and gateways without using the model. More ...

OSI Network Model
The OSI model was developed years ago as a reference for network protocol and application designers to build their products with an open standard. That would promote a standard for developing network devices, interfaces, applications and services that would work together. It is a model rather than a specification since it defines layers and services for those layers and how each layer works with the layer above and below it. More ...

Video - Data Link Layer of OSI Networking Model
In this video by Kevin Wallace you learn about the Data Link Layer of the OSI networking model. More ...

IPv6 Payload Length Field and Jumbograms
The IPv6 Payload Length field is a 16-bit field that indicates the length in bytes of just the payload following the main IPv6 header, it does not include the main IPv6 header. If the IPv6 packet has one or more extension headers, they are included in the number of bytes contained in the Payload Length field. More ...

An Introduction to the Types of VPNs
There are three types of VPNs that provide users with the functionality described above and these fall within the two categories: computer-to-network VPNs and network-to-network VPNs. More ...

Dynamic Host Configuration Protocol (DHCP) Explained
In the early days of TCP/IP each device on a network had stored on its hard disk a configuration file that an administrator used to manually assign a static IP address. Today a network administrator is no longer required to maintain an IP and MAC address configuration file a server. Every device on a network is automatically assigned a unique IP address by Dynamic Host Configuration Protocol (DHCP). More ...

Network Cabling and Components
Although the power and sophistication of networking protocols and software is impressive, a network could not operate without physical cable and components. Even a wireless network needs physical components such as access points. More ...

Networking Protocols, Ports, Standards, and Organizations What Does it All Mean?
A protocol is a set of rules that devices agree to. A port is specific electronic connection, or software interface a protocol uses. A standard is a specification that the characteristics of the protocol's signal and the design of the interface. Networking standards are developed by networking standards organizations. More ...

IPv6 Neighbor Discovery Protocol (NDP)
Neighbor Discovery Protocol (NDP) is used by IPv6 hosts for Router Discovery, Neighbor Discovery and Duplicate Address Discovery. More ...

Video - Network Layer (Layer 3) of OSI Networking Model
In this video by Kevin Wallace you learn about the Network Layer of the OSI networking model. More ...

IPv6 Dynamic Address Allocation
As with IPv4, IPv6 addresses can be statically assigned. However, when it comes to dynamic addressing, IPv6 has a different approach. IPv6 uses the ICMPv6 Router Advertisement message to suggest to devices how to obtain their IPv6 addressing information. More ...

Free eBook: Introduction to 802.11 Wireless
The growth of wireless mobile devices is incredible. If you're an IT professional you'll need to understand wireless technology. This free ebook by Aaron Balchunas explains everything from radio frequency to wireless authentication protocols. More ...


Learn more at amazon.com

Custom Search