Networking notes

Active FTP: A Client connects from a random unprivileged port to the FTP server port 21, using Active FTP......
Maximum Transmission Unit is the size of a layer of communication protocols of the largest protocol data unit which it can pass onwards........
Ethernet is a LAN architecture, which was developed by Xerox Corporation in cooperation with DEC and Intel.......
Ethernet Access Scheme is called Carrier Sense Multiple Access with Collision Detect (CSMA/CD).......
Token ring is a LAN technology that resides at the Data Link Layer of the OSI model. Special three-byte frame is used to travels around the ring.......
Network segment is a portion in a computer network where communication among every device is done using the same physical layer........
Hub: Hub is a device in a network, Data packet from one port is sent to all other ports in a network........
A packet is like a device or in some cases, a software. A router determines the next network point to which the data packet should be sent towards its destination........
A set of data rates are advertised by any gateway server. Some streams can be blocked by a gateway server from reaching the SP, in case the SP is opted for this service.......
A Media Access Control address is a unique identifier that is assigned to the network adapters or NICs by the manufacturers.......
Spanning Trees are a standard technique implemented in LAN connections. On a mesh topology, a set of spanning tree algorithms were developed for prevention of redundant transmission of data along intermediate hops between a source and a destination host.......
Ethernet technology: - Delivers high bandwidth to high-speed server connections. - Familiar technology and relatively inexpensive........
A Virtual Private Network is a private data network which is used for public telecommunication infrastructure.......
Private IP Address: An IP address is private if the number is within a specific range which is reserved for private uses by Internet Standards group......
MAC Address: A MAC address is a digital name of interface. Each and every network interface has a unique MAC address with unique ones.......
Address Resolution Protocol is used for networks that support hardware broadcast. An ARP will not work on x.25 network.......
Reverse Address Resolution Protocol (RARP) is a link layer networking protocol that is used by a host computer system which obtain its IP address......
TTL is a value in data packet of Internet Protocol. It communicates to the network router whether or not the packet should be in the network for too long or discarded.......
Internet Control Message Protocol is one of the important protocols in the Internet Protocol suite. It is mainly used in operating system of networked computers.......
Addressing: For the purpose of delivering datagram packets, IP needs to know about the address of the destination. By including the host addressing, this task is carried out by IP.....
IP addresses are organized into classes. For convenience of humans, IP addresses are expressed in the decimal format.......
Unicast: A term used in communication to describe a piece of information to send from one point to another........
A network mask is used for determination of what subnet an IP address belongs to. An IP address has network address and the host address.....
A subnet describes a set of networked computers which have common IP address routing prefix.........
User datagram protocol allows computer applications to send messages as datagram packets from source to destination on an Internet Protocol........
TCP Windowing is a concept that is used for avoiding congestion in the network traffic......
A hierarchical naming system for computer systems, services or for that matter any resource participating in the internet.......
Data Encoding: A technique that requires the polar change in the line level after each bit. To gain the control circuitry that ensures consistent level discrimination.......
Packet Switching: A method of transmitting data group with the concern of content, type or structure into suitably-sized blocks.......
POP3 is a protocol that is used for downloading email from an ISP to the recipient mail program.......
IP address is a logical address of a computer system, where as MAC address is the physical address of a computer system that is usually persisted in network card........
A hardware loopback pug is a simple device for redirecting the outgoing transmissions from a system directly back into it........
Pulse Code Modulation: A digital representation of an analog signal. Signal sampling is done with the magnitude of the signal regularly at uniform intervals.......
Subnet mask is utilized for isolating the network id and host ids. This is to reduce the broadcast domain or to reduce heavy network traffic.......
A twisted pair is a cable in which the cables are twisted at regular distances. Twisted pairs are used for transferring signals with high frequency........
Kerberos is an authentication protocol in a compute network that makes the nodes communicates over a non-secure network for providing their identification to one another in most secure manner......
ISDN uses circuit switching where as ATM uses packet switching communication.......