• Main Menu
  • Network Layer

    • DHCP Scope

      DHCP Scope

      A DHCP scope is a valid range of IP addresses that are available for assignment or lease to client computers on a particular subnet. In a DHCP server, a scope is configured to determine the address pool of IPs that the server can provide to DHCP clients. Scopes determine which IP addresses are provided to

    • Routing Tables

      Routing Tables

      A routing table is a grouping of information stored on a networked computer or network router that includes a list of routes to various network destinations. The data is normally stored in a database table and in more advanced configurations includes performance metrics associated with the routes stored in the table. Additional information stored in

    • Routing Protocols

      Routing Protocols

      A routing protocol is the implementation of a routing algorithm in software or hardware. A routing protocol uses metrics to determine which path to utilize to transmit a packet across an internetwork. The metrics that routing protocols use include: Number of network layer devices along the path (hop count) Bandwidth Delay Load MTU Cost Routing

    • BOOTP

      BOOTP

      BOOTP is the Bootstrap Protocol. The BOOTP protocol is utilized by diskless workstations to gather configuration information from a network server. The information provided by the BOOTP protocol is: The IP address which should be utilized by the diskless workstation The IP address of a server which will provide an Operating System image for the

    • 192.168.1.245

      192.168.1.245

      Cisco is a leading manufacturer of networking devices such as modems, wireless routers, and network storage devices. Cisco products are sold worldwide to millions of consumers for both residential and commercial purposes. Cisco also markets a number of data plans for some of the largest Internet Service Providers in the world. What is 192.168.1.245? 192.168.1.245

    • How Unix and Windows traceroutes differ

      How Unix and Windows traceroutes differ

      The Unix/Linux `traceroute` command and the Microsoft Windows `tracert` commands both accomplish the task of tracing network paths, but they do it in slightly different ways. Both of these tools for tracing network routes send out a packet wth TTL (Time To Live) set to 1 and report it’s destnation. Then, they send out a

    • 127.0.0.1 – What Are its Uses and Why is it Important?

      127.0.0.1 – What Are its Uses and Why is it Important?

      127.0.0.1 is the loopback Internet protocol (IP) address also referred to as the “localhost.” The address is used to establish an IP connection to the same machine or computer being used by the end-user. The same convention is defined for computer’s that support IPv6 addressing using the connotation of ::1. Establishing a connection using the

    • What is NetBEUI?

      What is NetBEUI?

      NetBEUI (NetBIOS Extended User Interface) is an extended version of NetBIOS, the primary software that allows individual computers to communicate within a given local area network. While NetBIOS itself is most often used to transfer pictures, documents, videos, or other files from one computer to another, NetBEUI is responsible for arranging the actual information in

    • How to Use Ping to Test a Network

      How to Use Ping to Test a Network

      The following steps elaborate on how to use the Ping utility to perform progressively more distant tests on network connectivity. Ping the Loopback Address – Type Ping 127.0.0.1 Successfully pinging the loopback address verifies that TCP/IP is both installed and configured correctly on the local client. If the loopback test fails, it means IP stack

    • 192.168

      192.168

      The Internet Assigned Numbers Authority (IANA) has allocated three IP address ranges that are to be exclusively used for private Internet networks: 10.0.0.0 – 10.255.255.255 (10/8 prefix) 172.16.0.0 – 172.31.255.255 (172.16/12 prefix) 192.168.0.0 – 192.168.255.255 (192.168/16 prefix) The first block “10.0.0.0 – 10.255.255.255” is referred to as the 24-bit block, the second “172.16.0.0 – 172.31.255.255”

    122 queries in 0.390 seconds.