• Main Menu
  • Network Layer

    • VRRP (Virtual Router Redundancy Protocol)

      VRRP (Virtual Router Redundancy Protocol)

      VRRP stands for Virtual Router Redundancy Protocol. The VRRP is a commonly used method to avoid network outages during important data transfers. Data transfer can be highly susceptible to failure when sent by a single router network. To combat this problem, VRRP creates a virtual connection between routers within the same network and ties them

    • How to Use Ping to Test a Network

      How to Use Ping to Test a Network

      The following steps elaborate on how to use the Ping utility to perform progressively more distant tests on network connectivity. Ping the Loopback Address – Type Ping 127.0.0.1 Successfully pinging the loopback address verifies that TCP/IP is both installed and configured correctly on the local client. If the loopback test fails, it means IP stack

    • IP (Internet Protocol)

      IP (Internet Protocol)

      The primary network communications protocol used on networks today is the IP (Internet Protocol). IP relays or transfers network packets, also known as datagrams, to destinations on local networks or across the public Internet. It defines the structures which encapsulate information as well as the legal addressing methods used to identify the source and destination

    • Routing Protocols

      Routing Protocols

      A routing protocol is the implementation of a routing algorithm in software or hardware. A routing protocol uses metrics to determine which path to utilize to transmit a packet across an internetwork. The metrics that routing protocols use include: Number of network layer devices along the path (hop count) Bandwidth Delay Load MTU Cost Routing

    • What is an L2TP?

      What is an L2TP?

      L2TP (Layer Two Tunneling Protocol) defines an extension to PPTP (Point-to-Point Tunneling Protocol) that an ISP (Internet Service Provider) uses to allow a VPN (Virtual Private Network) to operate. L2TP combines L2F from Cisco Systems’ optimum features and PPTP from Microsoft into a single protocol. L2TP’s two primary components are the LNS (L2TP Network Server)

    • NAT (Network Address Translation)

      NAT (Network Address Translation)

      NAT (Network Address Translation) is a technique for preserving scarce Internet IP addresses. Why NAT? The current Internet uses IP addresses in the form xxx.xxx.xxx.xxx. A sample IP address might be 202.187.4.212. Because of the way these IP addresses are allocated, there started to be a shortage of available IP addresses. The current IP (Internet

    • traceroute

      traceroute

      traceroute is a command which is used to trace the route of a packet through a TCP/IP network. traceroute is a Unix command. Under Microsoft Windows, the traceroute command has been renamed `tracert`. Unix `traceroute` and Microsoft Windows `tracert` are designed to accomplish the same task, but differ in the way they display output, in

    • 192.168

      192.168

      The Internet Assigned Numbers Authority (IANA) has allocated three IP address ranges that are to be exclusively used for private Internet networks: 10.0.0.0 – 10.255.255.255 (10/8 prefix) 172.16.0.0 – 172.31.255.255 (172.16/12 prefix) 192.168.0.0 – 192.168.255.255 (192.168/16 prefix) The first block “10.0.0.0 – 10.255.255.255” is referred to as the 24-bit block, the second “172.16.0.0 – 172.31.255.255”

    • Static Route

      Static Route

      A static route is one that a network administrator creates manually. The opposite of a static route is a dynamic route. Dynamic routes are created by routing protocols. Static routes have advantages and disadvantages when compared to dynamic routes. Advantages of Static Routes: Easy to configure No routing protocol overhead Disadvantages of Static Routes: Network

    • Network Routers

      Network Routers

      A network router is a network device with interfaces in multiple networks whose task is to copy packets from one network to another. Routers operate at Layer 3 of the OSI Model, the Network Layer. This is in contrast to switches, which operate at Layer 2 of the OSI Model, the Data-Link Layer. A network

    334 queries in 0.455 seconds.