IPv6 Prefix Length Notation
In IPv4, the prefix (or network portion) of the address can be identified by a dotted-decimal netmask, commonly referred to as a subnet mask. IPv6 address prefixes can be represented much the same way that IPv4 address prefixes are written in CIDR notation. More ...
The OSI Network Layer
The Network layer (OSI layer 3) uses routable protocols to deliver data packets to networks connected through routers. Routing is the process of moving data packets from one network or network segment to another. More ...
Remote Control Protocols
Remote control protocols like Remote Desktop Protocol (RDP), Secure Shell (SSH), and Citrix Independent Computing Architecture (ICA), allow a system to access another system and transfer the user interface, keystrokes, and mouse movements between syatems as if you were actually sitting at the other syatem. More ...
Basic TCP/IP Networking
In this article, I'm going to describe how a network works. I am NOT not going to load you down with details. Instead, I'm just going to describe what happens when you start your client computer. How it gets access to the network. More ...
Networking Routing Believability and Administrative Distance
If a network is running more than one routing protocol and a router receives two route advertisements from different routing protocols, which route advertisement does the router believe?. More ...
The OSI Physical Layer
The Physical layer (OSI layer 1) deals with the mechanical and electrical specifications of the network hardware. Layer 1 specifications define connectors, pin-outs, signal voltages, and related software. More ...
RADIUS Protocol
RADIUS (Remote Authentication Dial-In User Service) is an application layer protocol that provides centralized Authorization, Authentication, and Accounting management for users who connect and use a network service. More ...
IPv4 Address Classes
Originally, IP network numbers were defined with rigid boundaries and grouped into address classes. Even though address classes was created to facilitate efficient use of the IPv4 address space, because of its rigidity it has been abandoned for more flexible classless addressing. More ...
OSI Transport Layer
The Transport layer (OSI layer 4) uses connection-oriented protocols to provide a reliable end-to-end connection between the source computer and the destination computer. Transmission Control Protocol (TCP) is a transport layer protocol. More ...
SYN-ACK Handshake to Establish a TCP Connection
TCP uses a SYN-ACK handshake to establish a connection. Three messages are required to establish a TCP connection between two hosts. More ...
Link Aggregation
If all ports on a switch are operating at the same speed, the ports most likely to experience congestion are ports connecting to another switch or router. To help alleviate congested links between switches, you can logically combine multiple physical connections into a single logical connection. More ...
IEEE 802.11 Wireless Modulation Methods
IEEE 802.11 Wireless Modulation Methods More ...
IPv6 Neighbor Discovery Protocol (NDP)
Neighbor Discovery Protocol (NDP) is used by IPv6 hosts for Router Discovery, Neighbor Discovery and Duplicate Address Discovery. More ...
An Introduction to the Types of VPNs
There are three types of VPNs that provide users with the functionality described above and these fall within the two categories: computer-to-network VPNs and network-to-network VPNs. More ...
NTP Server Systems - The Network Time Protocol
The Network Time Protocol (NTP) is utilized by NTP Server systems to distribute accurate time information to network time clients. The NTP protocol is widely used throughout the Internet to provide synchronization of computers and processes. This article discusses how NTP server systems utilize the Network Time Protocol to provide networks with an accurate reference of time. More ...
