Search Results | Protocols
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...104 NEXT
Sort by:  Most Relevant  |  Date
CCNA, Administrative Distance for the Dynamic Routing Protocols

Blog  If you are preparing for your CCNA then its better to know about the dynamic routing protocols. Cisco Routers support many dynamic routing protocols for learning routes in a complex network topology. The routing protocols supported are the following: RIP OSPF ...

Last updated: Feb 19, 2009   2:03 PM GMT  |  Blog: Network technologies and trends
Meaning: DHCP using UDP as Transport Layer

Answer  Hi, I am learning DHCP protocols and in fact a beginner to network domain. I have a very basic question. Qn : What is the meaning of "DHCP uses UDP as transport protocol" ? ( or to be generic, what does it mean that x protocol is sent over y protocol) Appreciate your valuable time. thanks Sandee...

Last updated: Oct 1, 2008   11:47 AM GMT   |    DHCP, Network protocols, UDP
Four Routing Protocols that you should know

Blog  BGP: Border Gateway Protocol As defined in RFC 1771, BGP is an interdomain routing protocol. You would use BGP to exchange routing information between autonomous systems. Its usually configured between two directly connected routers that belong to different autonomous systems and the router...

Last updated: Sep 5, 2008   5:02 AM GMT  |  Blog: David’s Cisco Networking Blog
Protocol ARP //#

Answer  Does anyone know what this is, and what programming language ? Protocol ARP = ARPDescriptionTable(OpCode, ARPSrcHardAddress, ARPSrcAddress, ARPDstHardAddress, ARPDestAddress,SourceIPv4Alias,DestinationIPv4Alias) { UINT16 HardwareType = HardwareTypeTable(this); UINT16 ProtocolType = ProtocolTable(th...

Last updated: Jan 6, 2013   0:12 AM GMT   |    Arp, IP address, Programming
What are key features and benefits NX-OS offers Series 2

Blog   In my previous post I did discussed about some of the key features of NX-OS lets see what else it offer Base services: The default license that ships with NX-OS covers Layer 2 protocols including such features such as Spanning Tree, virtual LANs (VLAN), Private VLANS, and Unidir...

Last updated: Dec 30, 2010   8:38 PM GMT  |  Blog: Network technologies and trends
Seven Acronyms that will come in handy for CCNA certification

Blog  ABR Area Border Router: A router that has interfaces in many OSPF areas. For more information on ABR, visit: Managing Routers. ARP Address Resolution Protocol: ARP finds a hardware address, also known as Media Access Control (MAC) address, of a host from its known IP address. It maintains...

Last updated: Aug 23, 2008   9:08 PM GMT  |  Blog: David’s Cisco Networking Blog
Wi-Fi Protected Access (WPA)

Blog  Wi-Fi Protected Access (WPA) is a security standard for wireless internet connections. It improved upon and replaced the original Wi-Fi security standard, Wired Equivalent Privacy (WEP). Continued Quote of the Day "The most common protocol used to connect IoT devices via Wi-Fi is WPA2 -- also kn...

Last updated: May 10, 2018   6:34 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com
TCP/IP protocol suite Ebook

Answer  Hello sir, I want to know each & everything abt TCP/IP protocols. e.g security problem with TCP/IP protocol.etc. Please suggest me any good ebook/pdf base on TCP/IP protocol suite. Thanks you sir for provide me CCNA security information. Thanks.

Last updated: Jul 26, 2009   6:35 PM GMT   |    TCP/IP
What is GLBP and how it can be configured in Cisco Devices? - Series 1

Blog   GLBP better known as Gateway Load Balancing Protocol (GBLP) is a Cisco proprietary protocol especially designed overcome the limitations of Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP). The added feature to Gateway Load Balancing Protocol (GLBP) is it can loa...

Last updated: Dec 8, 2010   7:59 AM GMT  |  Blog: Network technologies and trends
2016 Encryption Protocols and the OSI Model

Answer  There are many encryption protocols in use in today's networks. Both symmetric and asymmetric encryption protocols are used for various purposes (IPsec, SSL/TLS, SSH, S/MIME, OpenPGP/GnuPG/PGP, Kerberos, etc.) and then there are protocols like RPC that use some sort of encryption to protect email co...

Last updated: Jul 20, 2016   11:42 AM GMT   |    Encryption, IPsec, Kerberos
VMware develops rival protocol to ICA to compete in the VDI market space

Blog  One of the exciting (and long overdue) announcements from VMware is there development of a new PCoIP protocol for use in the VMware View product. This protocol will be replacing their use of RDP. One of Citrix's big claims to fame in this market space with it's Xendesktop product is it's use of the ...

Last updated: Apr 29, 2009   3:08 AM GMT  |  Blog: The ranting of an IT Professional
Word of the Day - remote display protocol

Blog   "A new generation of remote display protocols, including Microsoft RemoteFX, Citrix HDX and VMware PC over IP, is capable of providing a PC-like experience over the wire. Still, these protocols may run into trouble when delivering rich media to virtual desktops." -- Mike Laverick Today's WhatIs.c...

Last updated: Jan 7, 2013   5:07 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com
How to manipulate BGP Routes

Blog  Border Gateway Protocol (BGP) is the back bone protocol that connects the internet. It falls under the External Gateway Protocols (EGP), interestingly it is the only routing protocols used in the external networks. BGP is a robustprotocolthat can handle 100k routes, which are increasing. That a...

Last updated: Jul 3, 2011   7:39 AM GMT  |  Blog: The Journey of a Network Engineer
VLAN Trunking Protocol (VTP) Overview Series 1

Blog  What is a VLAN Trunking Protocol (VTP)? VLAN Trunking Protocol (VTP) is a Cisco proprietary Layer 2 messaging protocol that manages the addition, deletion, and renaming of VLANs for the Cisco Catalyst Switches in the same VLAN Trunking Protocol (VTP) domain. VLAN Trunking Protocol (VTP) enables C...

Last updated: Feb 21, 2009   6:21 AM GMT  |  Blog: Network technologies and trends
ARP as a network auditing tool

Blog  ARP - or Address Resolution Protocol is a necessary element for network traffic. Per Wikipedia: "In computer networking, the Address Resolution Protocol (ARP) is the method for finding a host's link layer (hardware) address when only its Internet Layer (IP) or some other Network Layer address is kno...

Last updated: Feb 2, 2009   5:15 PM GMT  |  Blog: IT Trenches
Disable Cisco Discovery Protocol on unused interfaces

Blog   We all know how important a Cisco Discovery Protocol (CDP) to troubleshoot the network, but sometimes this may leads to a problem. These days lot of free CDP discovery utilities is available. Anyone can download the CDP utility and start gathering info about your network. Its always recommended ...

Last updated: Jan 20, 2010   7:29 AM GMT  |  Blog: Network technologies and trends
ROUTING INFORMATION PROTOCOL

Answer  why routing information protocol employ user datagrame protcol over transmission control protocol

Last updated: Mar 31, 2008   5:59 PM GMT   |    Datagram protocol, Network protocols, TCP/IP
TCP/IP and UDP protocols

Answer  What are TCP/IP and UDP protocols and how many protocols are they?

Last updated: Jul 29, 2008   12:29 AM GMT   |    TCP/IP, UDP
Official TLS 1.3 release date: Still waiting, and that's OK

Blog  "Measure twice, cut once," is a good way to approach new protocols, and TLS 1.3 is no exception. When it comes to approving updates to key security protocols, the Internet Engineering Task Force may seem to move slowly as it measures the impact of changes to important protocols. In the case of the ...

Last updated: Dec 29, 2017   6:58 PM GMT  |  Blog: Security Bytes
Differences of IP and IPX

Answer  What is the difference between IP and IPX routed protocols? Particularly in their protocol stack and addressing scheme?

Last updated: Oct 12, 2008   7:27 AM GMT   |    IP, IPX, Networks
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...104 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: