Protocols

What is ICMP protocol and how does it work?

What is the ICMP?

In the background, numerous protocols ensure that communication and data transmission work in computer networks. As the most prominent representative, the Internet Protocol plays a fundamental role. Without its’ various extensions and additions they would be nowhere near as versatile, as is the case in the current protocol. Thanks to the possibilities offered by ICMP protocol error messages and...

Advanced Message Queuing Protocol (AMQP)

AMQP: Introducing the Advanced Message Queuing Protocol

Many IT departments need communication between various applications to work swiftly and without errors. For example, lost messages or a bottleneck of messages can lead to expensive problems in the financial industry. With the AMQP protocol, problems like these don't occur. How does the Advanced Message Queuing Protocol work?

UTF-8: encoding global digital communication

UTF-8: the network standard

UTF-8 is method of Unicode character encoding, which claims to cover all modern languages for data processing. The format has significantly influenced international digital communication. But what exactly does “UTF-8” mean? And what is special about UTF-8 in the Unicode character set? Here you can find out which structure the coding is based on, and which bytes are permitted in the standard...

550 requested action not taken: possible solutions

SMTP error 550: how to fix “Requested action not taken: mailbox unavailable” and other SMTP 550 error messages

If you want to send a message with your e-mail client and the sending fails, you’ll receive a corresponding error message from the server, including an SMTP status code. For example, the message “550 Requested action not taken: mailbox unavailable” means that the targeted address couldn’t be reached. Since this problem can have various causes, even more possible solutions exist, some of which you...

PHP 5.6 Support

PHP 5.6: Support stops at the end of 2018

Security support for PHP 5.6 ceases at the end of the year. Although developers had already postponed the end date by a year, many website operators still seem to be unprepared. A large number of websites still run on PHP 5.6. From January onwards, these websites will be at risk. However, many are dreading the update. How can you protect your website?

The OSI model: a reference for standards and protocols

What’s the OSI model?

Those working with network technology are bound to encounter the ISO-OSI model sooner or later. This system subdivides communication between computer systems into seven different layers. Each of these layers is assigned a certain task. With the help of this layer model, subareas of abstract processes are able to be descriptively explained.

MAC address

MAC address (media access control)

Without a MAC address, nothing in a network will work on your device. Just as your postman needs a valid address to reliably deliver the mail, the transmission of data packets in computer networks is only possible with the unique hardware address of the target device. When it comes to a MAC address, at least there is one address available on each network-compatible device. But what is the MAC...

Bootp protocol

BOOTP: All information on the DHCP forerunner

If you want to connect a computer, smartphone, etc. to a network (LAN or WiFi), you can either assign the IP address manually or get it automatically. The latter is possible thanks to the DHCP (dynamic host configuration protocol) communication protocol, which has established itself as the cross-platform standard solution for address management. The forerunner was the BOOTP bootstrap protocol that...

IGMP snooping

IGMP snooping: eavesdropping for multicast traffic

If a system in IP networks is to send data packets to different target hosts as efficiently as possible, an IP multicasting connection is the perfect solution. When it comes to multipoint transmission, the data packets are able to reach all interested parties thanks to various protocols such as GMP, for example. Switches and internet routers can also use the communication protocol for IGMP...

Network protocol: Standards for data exchange

Network protocol: The basis of electronic data exchange

For computer systems to be able to communicate with each other and exchange information, they need common ground, just like humans must share a common language. But computers don’t rely on foreign language lessons, and instead only need the appropriate network protocol to successfully communicate. This provides guidelines and structures for the data transfer, and so plays a decisive role in the...


Get your own .US domain now, the first year is free!



Limited time offer*





Enter the web address of your choice in the search bar to check its availability.
* Offer valid for customers with a bona fide US presence. Promotion ends on August 31, 2019.