Menu
Computer Networking Protocols and Standards

Free eBook: Introduction to 802.11 Wireless
The growth of wireless mobile devices is incredible. If you're an IT professional you'll need to understand wireless technology. This free ebook by Aaron Balchunas explains everything from radio frequency to wireless authentication protocols. More ...

IEEE 802 Standards Specify the Basics of Physical and Logical Networking
The (IEEE) Institute of Electrical and Electronics Engineers is an organization that defines standards for networking. The 802 Standards Specify the Basics of physical and logical networking. More ...

What Is Fabric Networking?
The networking industry came up with the term 'Fabric' to describe networking technologies that allow switches to connect in a way to achieve a mesh topology. More ...

T-Carrier
T-carrier is a time-division multiplexed (TDM) digital signal that has been used by the telephone companies for many decades. 24 8-bit signals are time-division multiplexed into a 1.544 Mbps t-carrier signal. More ...

TCP Windowing
It would be inefficient to return an ACK message as each segment is received. The number of segments received before an ACK message is returned is called the TCP receive window size. More ...

IPv6 Global Unicast Addresses
Global unicast addresses (GUAs) are globally routable and reachable in the IPv6 Internet; they are equivalent to public IPv4 addresses. GUA addresses are also known as aggregatable global unicast addresses. More ...

Link Aggregation
If all ports on a switch are operating at the same speed, the ports most likely to experience congestion are ports connecting to another switch or router. To help alleviate congested links between switches, you can logically combine multiple physical connections into a single logical connection. More ...

OSPF (Open Shortest Path First) Protocol
OSPF (Open Shortest Path First) protocol is a protocol that handles routing for IP traffic. Because it is based on an open standard, OSPF is very popular in many corporate networks today and has many advantages. More ...

14 Common Network Ports You Should Know
Ports are virtual software-based and are managed by a computer's operating system. Different types of data flow to and from a computer over the same network connection. The use of ports informs computers what to do with the data they receive. Each port is assigned a number, and each is associated with a specific process or service. Port numbers are standardized, most reserved for certain protocols, for example, all HTTP messages go to port 80. More ...

Looking at the OSI 7 Layer Reference Model
The OSI (Open Systems Interconnection) model is a 7 layer reference model for how applications can communicate over a network. Don't confuse The OSI model with TCP/IP Protocol which has 4 layers and is the actual architecture used for networking. More ...

X.25 and Frame Relay Overview
Frame Relay originated as an extension of integrated services digital network (ISDN). Its designers aimed to enable a packet-switched network to transport over circuit-switched technology. The technology has become a stand-alone and cost-effective means of creating a WAN. More ...

Session Border Controllers - More Than Just a Voice Firewall
The migration from Time-Division Multiplexing to the more flexible IP based SIP networks brought an unexpected security challenge. Session Border Controllers focused primarily on SIP and H.323 session security. More ...

Network Switches
A bridge or router may be referred to as a switch because it uses information in the data packet to choose a path from one network segment to another. A bridge may be referred to as a layer 2 switch because it uses information from layer 2, the Data Link layer of the OSI model. More ...

PoE (Power Over Ethernet)
Say you want to mount a wireless access point (AP) on the ceiling. Although no electrical outlet is available, a switch feature called Power over Ethernet (PoE) IEEE 802.3at standard offers as much as 32.4W of power over a UTP cable. More ...

Remote Control Protocols
Remote control protocols like Remote Desktop Protocol (RDP), Secure Shell (SSH), and Citrix Independent Computing Architecture (ICA), allow a system to access another system and transfer the user interface, keystrokes, and mouse movements between syatems as if you were actually sitting at the other syatem. More ...


Learn more at amazon.com

Custom Search