Menu
Computer Networking Protocols and Standards

The OSI Presentation Layer
At this layer applications communicate on a format for exchanging data. The Session layer provides character set conversion and formats the data. It performs encryption and decryption, compression and decompression. More ...

Network Routing Protocols - IGRP, EIGRP, OSPF, ISIS, BGP
The purpose of routing protocols is to learn of available routes on the network and make routing decisions. There are two primary routing protocol types; link state and distance vector. Some of the most common routing protocols include RIP, IGRP, EIGRP, OSPF, IS-IS and BGP. More ...

IP Addressing
The IP protocol uses a 32-bit address to define the network segment address and the node address. If the device is to be connected to the Internet, the address needs to be unique among all other devices connected to the Internet. More ...

Integration of IPv6 with IPv4
Almost all networks use IPv4. The question is how to move them over to IPv6 while allowing them to keep the networks they currently have operating. There are three methods. More ...

Free eBook: Introduction to 802.11 Wireless
The growth of wireless mobile devices is incredible. If you're an IT professional you'll need to understand wireless technology. This free ebook by Aaron Balchunas explains everything from radio frequency to wireless authentication protocols. More ...

IPv6 Address Types and Scopes
An IPv6 addresses have a size of 128 bits have three types, unicast, multicast, and anycast. Unicast addresses are for a one-to-one communication. Multicast addresses are for a one-to-many communication. Anycast addresses are for one node to nearest node of multiple nodes communication. More ...

Comparing IPv4 and IPv6 at a Glance
When examining the details of the IPv4 and IPv6 headers, there are some important differences between the two protocols. This article summarizes some of the differences. More ...

IEEE 802.11 Wireless Modulation Methods
IEEE 802.11 Wireless Modulation Methods More ...

Session Border Controllers - More Than Just a Voice Firewall
The migration from Time-Division Multiplexing to the more flexible IP based SIP networks brought an unexpected security challenge. Session Border Controllers focused primarily on SIP and H.323 session security. More ...

Representation of IPv6 Addresses
IPv6 addresses are 128 bits in length and written as a string of hexadecimal digits. At first glance, these addresses can look overwhelming. RFC 2373 and RFC 5952 provide two helpful rules for reducing the notation involved in the standard format. More ...

Video - Transport Layer (Layer 4) of OSI Networking Model
In this video by Kevin Wallace you learn about the Transport Layer of the OSI networking model. More ...

T-Carrier
T-carrier is a time-division multiplexed (TDM) digital signal that has been used by the telephone companies for many decades. 24 8-bit signals are time-division multiplexed into a 1.544 Mbps t-carrier signal. More ...

PoE (Power Over Ethernet)
Say you want to mount a wireless access point (AP) on the ceiling. Although no electrical outlet is available, a switch feature called Power over Ethernet (PoE) IEEE 802.3at standard offers as much as 32.4W of power over a UTP cable. More ...

TCP/IP Protocol Suite
A good portion of the knowledge required to be a network technician relates to the TCP/IP protocol suite. This article describes the most important protocols in the TCP/IP protocol suite. Many other less frequently used protocols exist. More ...

Routing Datagrams
Systems can deliver packets only to other devices attached to the same physical network. A gateway is a network point, referred to as a router, that acts as an entrance to another network. More ...


Learn more at amazon.com

Custom Search