Menu
Computer Networking Protocols and Standards

RADIUS Protocol
RADIUS (Remote Authentication Dial-In User Service) is an application layer protocol that provides centralized Authorization, Authentication, and Accounting management for users who connect and use a network service. More ...

Video - Introducing the OSI Model
This video by Kevin Wallace introduces the OSI networking model. More ...

OSI Transport Layer
The Transport layer (OSI layer 4) uses connection-oriented protocols to provide a reliable end-to-end connection between the source computer and the destination computer. Transmission Control Protocol (TCP) is a transport layer protocol. More ...

Video - The Upper Layers 5 Through 7 of the OSI Networking Model
In this video by Kevin Wallace you learn about Layers 5 Through 7 of the OSI networking model. More ...

Network Gateways
When networks with different protocols, such as Ethernet and Token Ring need to be connected together, this requires reconstruction of the data packets. To do this, information from above the network layer is required. A gateway is a device that can function at all seven layers of the OSI model. More ...

Dynamic Host Configuration Protocol (DHCP) Explained
In the early days of TCP/IP each device on a network had stored on its hard disk a configuration file that an administrator used to manually assign a static IP address. Today a network administrator is no longer required to maintain an IP and MAC address configuration file a server. Every device on a network is automatically assigned a unique IP address by Dynamic Host Configuration Protocol (DHCP). More ...

Session Border Controllers - More Than Just a Voice Firewall
The migration from Time-Division Multiplexing to the more flexible IP based SIP networks brought an unexpected security challenge. Session Border Controllers focused primarily on SIP and H.323 session security. More ...

What Is Fabric Networking?
The networking industry came up with the term 'Fabric' to describe networking technologies that allow switches to connect in a way to achieve a mesh topology. More ...

Active Directory : How Objects Are Stored and Identified
Data stored in Active Directory is presented to the user in a hierarchical fashion. There are two types of objects: containers and non-containers. The most common type of container in Active Directory is an OU (Organizational Unit). Non-container objects are also known as leaf nodes. More ...

OSPF (Open Shortest Path First) Protocol
OSPF (Open Shortest Path First) protocol is a protocol that handles routing for IP traffic. Because it is based on an open standard, OSPF is very popular in many corporate networks today and has many advantages. More ...

IEEE 802 Standards Specify the Basics of Physical and Logical Networking
The (IEEE) Institute of Electrical and Electronics Engineers is an organization that defines standards for networking. The 802 Standards Specify the Basics of physical and logical networking. More ...

A Simple Description of the IPv6 Header and Datagram
This article provides a simple description of the IPv6 header and datagram without a lot referring back to IPv4. More ...

What is PPP, PPPoA and PPPoE?
PPP was designed to provide a connection between two devices. PPP comes with options including encryption, authentication and data compression. PPPoA is the standard for connection over an ADSL network. PPPoE is the standard for connection over an Ethernet network. More ...

SYN-ACK Handshake to Establish a TCP Connection
TCP uses a SYN-ACK handshake to establish a connection. Three messages are required to establish a TCP connection between two hosts. More ...

Pv6 Myths
There are several misperceptions or myths regarding IPv6. IPv6 has been around quite some time, initially introduced in 1995 with RFC 1883 and later obsoleted with RFC 2460 in 1998. Over the years, as IPv6 evolved and as people discussed the merits of the new protocol, certain misconceptions ensued. More ...


Learn more at amazon.com

Custom Search