Active FTP: A Client connects from a random unprivileged port to the FTP server port 21, using Active FTP......
|
Maximum Transmission Unit is the size of a layer of communication protocols of the largest protocol data unit which it can pass onwards........
|
Ethernet is a LAN architecture, which was developed by Xerox Corporation in cooperation with DEC and Intel.......
|
Ethernet Access Scheme is called Carrier Sense Multiple Access with Collision Detect (CSMA/CD).......
|
Token ring is a LAN technology that resides at the Data Link Layer of the OSI model. Special three-byte frame is used to travels around the ring.......
|
Network segment is a portion in a computer network where communication among every device is done using the same physical layer........
|
Hub: Hub is a device in a network, Data packet from one port is sent to all other ports in a network........
|
A packet is like a device or in some cases, a software. A router determines the next network point to which the data packet should be sent towards its destination........
|
A set of data rates are advertised by any gateway server. Some streams can be blocked by a gateway server from reaching the SP, in case the SP is opted for this service.......
|
A Media Access Control address is a unique identifier that is assigned to the network adapters or NICs by the manufacturers.......
|
Spanning Trees are a standard technique implemented in LAN connections. On a mesh topology, a set of spanning tree algorithms were developed for prevention of redundant transmission of data along intermediate hops between a source and a destination host.......
|
Ethernet technology: - Delivers high bandwidth to high-speed server connections. - Familiar technology and relatively inexpensive........
|
A Virtual Private Network is a private data network which is used for public telecommunication infrastructure.......
|
Private IP Address: An IP address is private if the number is within a specific range which is reserved for private uses by Internet Standards group......
|
MAC Address: A MAC address is a digital name of interface. Each and every network interface has a unique MAC address with unique ones.......
|
Address Resolution Protocol is used for networks that support hardware broadcast. An ARP will not work on x.25 network.......
|
Reverse Address Resolution Protocol (RARP) is a link layer networking protocol that is used by a host computer system which obtain its IP address......
|
TTL is a value in data packet of Internet Protocol. It communicates to the network router whether or not the packet should be in the network for too long or discarded.......
|
Internet Control Message Protocol is one of the important protocols in the Internet Protocol suite. It is mainly used in operating system of networked computers.......
|
Addressing: For the purpose of delivering datagram packets, IP needs to know about the address of the destination. By including the host addressing, this task is carried out by IP.....
|
IP addresses are organized into classes. For convenience of humans, IP addresses are expressed in the decimal format.......
|
Unicast: A term used in communication to describe a piece of information to send from one point to another........
|
A network mask is used for determination of what subnet an IP address belongs to. An IP address has network address and the host address.....
|
A subnet describes a set of networked computers which have common IP address routing prefix.........
|
User datagram protocol allows computer applications to send messages as datagram packets from source to destination on an Internet Protocol........
|
TCP Windowing is a concept that is used for avoiding congestion in the network traffic......
|
A hierarchical naming system for computer systems, services or for that matter any resource participating in the internet.......
|
Data Encoding: A technique that requires the polar change in the line level after each bit. To gain the control circuitry that ensures consistent level discrimination.......
|
Packet Switching: A method of transmitting data group with the concern of content, type or structure into suitably-sized blocks.......
|
POP3 is a protocol that is used for downloading email from an ISP to the recipient mail program.......
|
IP address is a logical address of a computer system, where as MAC address is the physical address of a computer system that is usually persisted in network card........
|
A hardware loopback pug is a simple device for redirecting the outgoing transmissions from a system directly back into it........
|
Pulse Code Modulation: A digital representation of an analog signal. Signal sampling is done with the magnitude of the signal regularly at uniform intervals.......
|
Subnet mask is utilized for isolating the network id and host ids. This is to reduce the broadcast domain or to reduce heavy network traffic.......
|
A twisted pair is a cable in which the cables are twisted at regular distances. Twisted pairs are used for transferring signals with high frequency........
|
Kerberos is an authentication protocol in a compute network that makes the nodes communicates over a non-secure network for providing their identification to one another in most secure manner......
|
ISDN uses circuit switching where as ATM uses packet switching communication.......
|