Menu
Computer Networking Protocols and Standards

Internet Protocol versions IPv4, IPv5 and IPv6
Internet Protocol is the part of the TCP/IP protocol that is responsible for addressing packets. IPv4 uses a 32-bit address IPv6 uses a 128-bit address. This article describes how IPv4 are converted to IPv6 addresses. More ...

How to Set Up FTP (File Transfer Protocol)
FTP (File Transfer Protocol) is used to transfer computer files between a client and server on a network. This article explains how to set up FTP on IIS and that FTP is not a secure protocol and some secure file transfer alternatives. More ...

IEEE 802.11 Wireless Modulation Methods
IEEE 802.11 Wireless Modulation Methods More ...

Network Cabling and Components
Although the power and sophistication of networking protocols and software is impressive, a network could not operate without physical cable and components. Even a wireless network needs physical components such as access points. More ...

Major Protocols in the TCP/IP Suite
This is a chart of the layers of the TCP/IP Suite and the major protocols in each layer. As you move your mouse pointer over each protocol acronym, a brief description of the protocol appears. This is not a comprehensive list. More ...

The OSI Network Layer
The Network layer (OSI layer 3) uses routable protocols to deliver data packets to networks connected through routers. Routing is the process of moving data packets from one network or network segment to another. More ...

Comparison of the Layers of the OSI and TCP/IP Models
The TCP/IP protocol suite was developed by DARPA in the early 1970s. The OSI networking model was developed in Europe in 1986. This article compares the two networking standards. More ...

IPv6 Neighbor Discovery Protocol (NDP)
Neighbor Discovery Protocol (NDP) is used by IPv6 hosts for Router Discovery, Neighbor Discovery and Duplicate Address Discovery. More ...

Kerberos Authentication Protocol
Kerberos is an authentication protocol which allows computers communicating over a non-secure network to prove their identity to one another. Windows 2000 and later use Kerberos as their default authentication method. More ...

Session Border Controllers - More Than Just a Voice Firewall
The migration from Time-Division Multiplexing to the more flexible IP based SIP networks brought an unexpected security challenge. Session Border Controllers focused primarily on SIP and H.323 session security. More ...

Wireless Network Standards - 80211a, 80211b, 80211g, 80211n, 80216
This article describes the 80211a, 80211b, 80211g, 80211n, 80216, the current IEEE defined wireless protocol standards in use today, their bandwidth, maximum data rate, and coverage area. More ...

The OSI Presentation Layer
At this layer applications communicate on a format for exchanging data. The Session layer provides character set conversion and formats the data. It performs encryption and decryption, compression and decompression. More ...

Video - The Upper Layers 5 Through 7 of the OSI Networking Model
In this video by Kevin Wallace you learn about Layers 5 Through 7 of the OSI networking model. More ...

PoE (Power Over Ethernet)
Say you want to mount a wireless access point (AP) on the ceiling. Although no electrical outlet is available, a switch feature called Power over Ethernet (PoE) IEEE 802.3at standard offers as much as 32.4W of power over a UTP cable. More ...

Comparing IPv4 and IPv6 at a Glance
When examining the details of the IPv4 and IPv6 headers, there are some important differences between the two protocols. This article summarizes some of the differences. More ...


Learn more at amazon.com

Custom Search