Protocols

DHCP: An overview of the Client/Server protocol

DHCP: What’s behind the Dynamic Host Configuration Protocol

If you’re connected to an internet router and power on your computer, it automatically obtains the necessary network parameters, such as the IP address, subnet mask, or DNS server. This is made possible by the Dynamic Host Configuration Protocol (DHCP), which simplifies address assignment when connecting to the internet and makes setting up local networks easy as pie.

IGMP - Internet Group Management Protocol

IGMP: what is behind the Internet Group Management Protocol

Using multicast connections, data streams can be transferred to a large number of clients easily and in such a way that saves resources – provided that the accessing systems are part of the same multicast group. In IPv4 networks, the organisation and management of these groups is based on the Internet Group Management Protocol (IGMP), which was published as early as 1989. What exactly this...

SNMP: Simple Network Management Protocol

SNMP (Simple Network Management Protocol): the protocol for network management

The communication protocol SNMP (Simple Network Management Protocol) is an elementary component of many network management applications. It defines a number of message types that greatly simplify the monitoring and administration of individual network participants such as PCs, routers, servers, switches, firewalls, or printers. How exactly the SNMP protocol works and what fundamental adjustments...

MPLS:  What is Multiprotocol label switching?

MPLS: What’s behind the network technology

Speed and reliability play an important role for data transfer in networks. They reflect the quality of the connection, which is why providers do everything they can to guarantee the agreed services. A method primarily used in virtual private networks is the so-called multiprotocol label switching (MPLS).

SNTP: simple network time protocol

Simple network time protocol: the stripped-back protocol for time synchronization

An exact system time on a computer is especially important when devices need to exchange data. Cross-system processes quickly come to a standstill if the generated time stamps are very different from the time that applies to the system. Synchronisation methods that keep the clocks of the individual network participants in sync are utterly indispensable. One of the simplest methods to achieve time...

Trivial File Transfer Protocol

TFTP (Trivial File Transfer Protocol) – File Transfer Protocol made simple

The Trivial File Transfer Protocol (TFTP) is one of the oldest and simplest network protocols. It allows two systems to exchange files on the local area network without having to establish a connection beforehand. To do this, TFTP uses the connectionless transport protocol UDP, which serves as an alternative to the more common yet more complex TCP. What other features set the TFTP protocol apart,...

HTTP 503: how to fix website errors

HTTP 503 (Service Unavailable): meaning and troubleshooting

It’s very likely that you’ve stumbled on the 'HTTP Error 503 The service is unavailable' notification or something similar during your daily browsing. The error message appears whenever a web server can’t display the website that the user is trying to access. There are many reasons for these notifications, just as there are many solutions. It’s your responsibility as the website operator to...

Remote access for network storage

Remote access to the network storage

Are you using a NAS system as a home server and want to connect it to the internet? It’s simple to do. We explain how to assign a fixed LAN IP address to your network storage and open the corresponding ports for the desired service in the router firewall. You will also learn how to make your NAS system permanently available under a consistent address despite daily disconnections carried out by the...

UDP - User Datagram Protocol

UDP: What is the User Datagram Protocol?

The Internet protocol family – the cornerstone for communication on the Internet – has around 500 members who work on a wide variety of layers. For example, the connectionless User Datagram Protocol (UDP) is responsible on the transport layer for the transmission of packets that were previously addressed via the Internet Protocol (IP). In this guide, you can find out exactly what distinguishes...

What is MAC spoofing?

What is MAC spoofing?

MAC spoofing is a method by which unique hardware addresses are masked using a Locally Administered Address (LAA) in the software. MAC spoofing can offer protection for your privacy when using public LAN or WLAN networks, but can also be used for illegal network activities. We explain to you here how MAC spoofing works and which settings in Windows must be accessed in order to change your MAC...


Wait! We’ve got something for you!
Get your .co.uk domain now, the first year is free.

Enter the web address of your choice in the search bar to check its availability.
12 month for £0/year
then £10/year