IP Networking

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • How do you check if TCP/IP is installed on the system?

    Understand the TCP/IP stack and how to check if it is installed on your system in this networking fundamentals expert response. 

  • What protocol works on all layers of OSI?

    Learn what protocol, if any, works on all layers of OSI in this expert answer. 

  • IP address depletion hastens IPv6 adoption

    IPv4 IP address depletion is hastening the need to switch from IPv4 to IPv6. In this column, Loki Jorgenson explains where we are now in terms of IPv6 readiness and provides some insight on how much work network operators will face. 

  • IP Accounting -- from Network Management: Accounting and Performance Strategies

    IP Accounting, Chapter 6 of "Network Management: Accounting and Performance Strategies," describes the IP Accounting features in Cisco IOS and teaches you the different IP Accounting functions and SNMP MIB. Learn about IP Accounting Access Control Li... 

  • TCP/IP troubleshooting: A structured approach -- Using Netdiag.exe

    Limitations of the Repair feature of Windows network connections can be overcome by using Netdiag.exe, a network connectivity troubleshooting tool that is part of the Windows Support Tools. Netdiag runs a more extensive series of tests than the Repai... 

  • Which routers won't assign IP addresses to other subnets?

    If you have a large network and want to segment it with routers, find out which kind of routers you need to use so that your server doesn't assign IP addresses to other subnets, in this expert response with router expert Sudhanshu Gupta. 

  • How can I define the layered approach to protocols?

    Learn what the network security advantages are in the layered approach to protocols and how to define the layered approach protocol, in this Q&A with Michael Gregg. 

  • flooding

    In a network, flooding is the forwarding by a router of a packet from any node to every other node attached to the router except the node from which the packet arrived. 

  • automatic repeat request (ARQ)

    Automatic repeat request (ARQ) is a protocol for error control in data transmission. 

  • variable-length subnet mask (VLSM)

    A variable-length subnet mask (VLSM) is a sequence of numbers of variable length that streamlines packet routing within the subnets of a proprietary network... (Continued)