Protocols

HTTP 408: How to fix the “Request Timeout” error

HTTP 408: how to fix the timeout error

Permanent availability is one of the most important things when it comes to a website. However, even the best technical conditions do not offer a 100% guarantee that a website will constantly run smoothly. Connection errors like HTTP error 408 regularly present websites with minor and major difficulties, especially since the causes are often found on the client side. Our guide looks at the causes...

PHP 5.6 Support

PHP 5.6: Support stops at the end of 2018

Security support for PHP 5.6 ceases at the end of the year. Although developers had already postponed the end date by a year, many website operators still seem to be unprepared. A large number of websites still run on PHP 5.6. From January onwards, these websites will be at risk. However, many are dreading the update. How can you protect your website?

What is ARP? – Address resolution in networks

What is ARP (Address Resolution Protocol)?

When computer information is sent in TCP/IP networks, it is first decompressed into individual data frames. In this way, you can transfer data of nearly unlimited size. The frames also contain the target system’s MAC address, without which a transmission would not be possible. If the physical address is not known, the sender must first be determined using the ARP Address Resolution Protocol. Here,...

DHCP: An overview of the Client/Server protocol

DHCP: What’s behind the Dynamic Host Configuration Protocol

If you’re connected to an internet router and power on your computer, it automatically obtains the necessary network parameters, such as the IP address, subnet mask, or DNS server. This is made possible by the Dynamic Host Configuration Protocol (DHCP), which simplifies address assignment when connecting to the internet and makes setting up local networks easy as pie.

IGMP - Internet Group Management Protocol

IGMP: what is behind the Internet Group Management Protocol

Using multicast connections, data streams can be transferred to a large number of clients easily and in such a way that saves resources – provided that the accessing systems are part of the same multicast group. In IPv4 networks, the organization and management of these groups is based on the Internet Group Management Protocol (IGMP), which was published as early as 1989. What exactly this...

IGMP snooping

IGMP snooping: eavesdropping for multicast traffic

If a system in IP networks is to send data packets to different target hosts as efficiently as possible, an IP multicasting connection is the perfect solution. When it comes to multipoint transmission, the data packets are able to reach all interested parties thanks to various protocols such as GMP, for example. Switches and internet routers can also use the communication protocol for IGMP...

SNMP: Simple Network Management Protocol

SNMP (Simple Network Management Protocol): the protocol for network management

The communication protocol SNMP (Simple Network Management Protocol) is an elementary component of many network management applications. It defines a number of message types that greatly simplify the monitoring and administration of individual network participants such as PCs, routers, servers, switches, firewalls, or printers. How exactly the SNMP protocol works and what fundamental adjustments...

What is ICMP protocol and how does it work?

What is the ICMP?

In the background, numerous protocols ensure that communication and data transmission work in computer networks. As the most prominent representative, the Internet Protocol plays a fundamental role. Without its’ various extensions and additions they would be nowhere near as versatile, as is the case in the current protocol. Thanks to the possibilities offered by ICMP protocol error messages and...

MPLS:  What is Multiprotocol label switching?

MPLS: What’s behind the network technology

Speed and reliability play an important role for data transfer in networks. They reflect the quality of the connection, which is why providers do everything they can to guarantee the agreed services. A method primarily used in virtual private networks is the so-called multiprotocol label switching (MPLS).

MAC address

MAC address (media access control)

Without a MAC address, nothing in a network will work on your device. Just as your postman needs a valid address to reliably deliver the mail, the transmission of data packets in computer networks is only possible with the unique hardware address of the target device. When it comes to a MAC address, at least there is one address available on each network-compatible device. But what is the MAC...