What Are Private IP Addresses?
Normally you have to be assigned an IP address, or a group of IP addresses by a Regional Internet Registry. However, if you just need IP addresses for an internal network that will not be routed to the Internet, you can select from blocks of IP addresses reserved as Private IP addresses. More ...
IPv6 Anycast Addresses
An IPv6 anycast address can be assigned to more than one interface. In other words, multiple devices can have the same anycast address. A packet sent to an anycast address is routed to the nearest interface having that address, according to the routers routing table. More ...
How to Set Up FTP (File Transfer Protocol)
FTP (File Transfer Protocol) is used to transfer computer files between a client and server on a network. This article explains how to set up FTP on IIS and that FTP is not a secure protocol and some secure file transfer alternatives. More ...
Video - Data Link Layer of OSI Networking Model
In this video by Kevin Wallace you learn about the Data Link Layer of the OSI networking model. More ...
RIP (Routing Information Protocol)
RIP is an Interior Gateway Protocol (IGP) that uses hop count as a metric. RIP comes in versions 1, 2, and RIPng (RIP next generation) an extension of RIPv2 for support of IPv6. More ...
NTP Server Systems - The Network Time Protocol
The Network Time Protocol (NTP) is utilized by NTP Server systems to distribute accurate time information to network time clients. The NTP protocol is widely used throughout the Internet to provide synchronization of computers and processes. This article discusses how NTP server systems utilize the Network Time Protocol to provide networks with an accurate reference of time. More ...
Remote Control Protocols
Remote control protocols like Remote Desktop Protocol (RDP), Secure Shell (SSH), and Citrix Independent Computing Architecture (ICA), allow a system to access another system and transfer the user interface, keystrokes, and mouse movements between syatems as if you were actually sitting at the other syatem. More ...
Video Streaming Protocols
Video surveillance systems currently are undergoing a transition where more and more traditional analog solutions are being replaced by digital solutions. Here, some of the network protocols used in video streaming are described. More ...
Major Protocols in the TCP/IP Suite
This is a chart of the layers of the TCP/IP Suite and the major protocols in each layer. As you move your mouse pointer over each protocol acronym, a brief description of the protocol appears. This is not a comprehensive list. More ...
Network Operating Systems
The purpose of a network is to permit users share resources located on other computers and to share peripheral devices such as printers. A network operating system (NOS) is specialized systems software designed to provide networking functionality. More ...
Wireless Network Standards - 80211a, 80211b, 80211g, 80211n, 80216
This article describes the 80211a, 80211b, 80211g, 80211n, 80216, the current IEEE defined wireless protocol standards in use today, their bandwidth, maximum data rate, and coverage area. More ...
TCP/IP Utilities
TCP/IP comes with a set of command line utilities that a network technician can use to manage and troubleshoot a network. PING is used to test the ability of two hosts on a network to communicate. More ...
IEEE 802.11.x Wireless Standards
The 802.11 standard, approved in 1997, applies to wireless LANs with a 1 or 2 Mbps transmission rate in the 2.4 GHz band. Sometimes the term 802.11 is used to refer to the 802.11x family of specifications. More ...
What's the Difference Between a Packet and a Frame?
When speaking of the data in a network, people often call everything a packet. A more proper generic term would be protocol data unit or PDU. The specific name for a PDU depends on at what layer the data unit is in the OSI model. More ...
Virtual Local Area Networks (VLANs)
A Virtual LAN (VLAN) is a subgroup within a local network. VLANs make it easy for network administrators to separate a single switched network into subnetworks to match the functional and security requirements of their network without having to make major changes in the existing network infrastructure. More ...
