<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//networkencyclopedia.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://networkencyclopedia.com/blog/</loc>
		<lastmod>2026-03-25T10:36:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/access-control/</loc>
		<lastmod>2019-08-15T19:07:54+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/access-control-policies.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/access-control-policies.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/access-control-card-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/dhcp-relay-agent/</loc>
		<lastmod>2019-08-19T17:28:29+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/dhcp-relay-agent.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/dhcp-relay-agent.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/microsoft-systems-management-server-sms/</loc>
		<lastmod>2019-08-23T14:37:22+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/microsoft-sms-server.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ntfs-special-permissions-windows-nt/</loc>
		<lastmod>2019-08-23T15:38:58+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ntfs-special-permissions-windows-nt.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ntfs-special-permissions-windows-nt.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/organizational-unit-ou/</loc>
		<lastmod>2019-08-23T18:26:57+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/organizational-unit-ou.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/organizational-unit-ou.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/out-of-band-management-obm/</loc>
		<lastmod>2019-08-23T18:38:47+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/out-of-band-management.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/out-of-band-management.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/quality-of-service-qos/</loc>
		<lastmod>2019-08-23T19:43:22+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/qos.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/qos.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/raid/</loc>
		<lastmod>2019-08-24T06:50:42+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/raid-redundant-array-of-independent-disks.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/raid-example.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/raid-redundant-array-of-independent-disks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/token-ring/</loc>
		<lastmod>2019-08-27T09:45:41+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/token-ring.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/token-ring.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/agent-snmp/</loc>
		<lastmod>2019-08-27T16:45:53+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/agent-snmp.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/agent-snmp.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/basic-volume/</loc>
		<lastmod>2019-08-28T05:27:51+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/basic-volume.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/batch-file/</loc>
		<lastmod>2019-08-28T05:38:58+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/batch-file.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/batch-file.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/daemon/</loc>
		<lastmod>2019-08-28T08:51:27+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/daemon-unix.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/daemon-unix.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/daemon-nfsd.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/gateway-service-for-netware-gsnw/</loc>
		<lastmod>2019-08-28T11:37:02+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/gsnw.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/gsnw.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/gateway-service-for-netware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/general-packet-radio-service-gprs/</loc>
		<lastmod>2019-08-28T13:17:39+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/GPRS.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/GPRS.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/g-lite/</loc>
		<lastmod>2019-08-28T13:32:07+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/adsl-vs-glite.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/adsl-vs-glite.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/global-asa/</loc>
		<lastmod>2019-08-28T13:44:35+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/global-asa-file-example.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/global-asa-file-example.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/global-load-balancer/</loc>
		<lastmod>2019-08-28T14:38:38+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/global-server-load-balancing-diagram.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/global-server-load-balancing-diagram.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ground-loop/</loc>
		<lastmod>2019-08-28T16:40:32+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ground-loop-network.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ground-loop-network.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/hardware-abstraction-layer-hal/</loc>
		<lastmod>2019-08-29T08:55:39+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/hardware-abstraction-layer-example.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/hardware-abstraction-layer-example.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/handheld-device-markup-language-hdml/</loc>
		<lastmod>2019-08-29T11:54:12+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/HDML-Handheld-Device-Markup-Language.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/HDML-Handheld-Device-Markup-Language.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/vcalendar/</loc>
		<lastmod>2019-08-31T16:23:30+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/vcalendar-file-download.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/vcalendar-file-download.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/microsoft-backoffice/</loc>
		<lastmod>2019-09-05T07:19:04+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/microsoft-backoffice-logo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/microsoft-backoffice-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/alpha-platform-dec/</loc>
		<lastmod>2019-09-05T07:34:44+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/DEC_Alpha_21164.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/DEC_Alpha_21164.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/anchor-text-html/</loc>
		<lastmod>2019-09-05T08:42:57+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/anchor-text-html.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/anchor-text-html.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ansi-character-set/</loc>
		<lastmod>2019-09-05T09:23:50+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ansi-character-set-table.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ansi-character-set-table.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/arcnet/</loc>
		<lastmod>2019-09-05T14:36:12+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/arcnet-adapter.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/arcnet-adapter.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/apple-open-transport/</loc>
		<lastmod>2019-09-05T16:02:17+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/apple-open-transport.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/apple-open-transport.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/applet/</loc>
		<lastmod>2019-09-05T16:30:02+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/applet-java.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/applet-java.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/application-service-provider-asp/</loc>
		<lastmod>2019-09-05T19:27:58+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/application-service-provider.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/application-service-provider.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/saas.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/boot-files/</loc>
		<lastmod>2019-09-06T06:23:35+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/boot-files.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/boot-files.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/netbios-over-tcp-ip-node-types/</loc>
		<lastmod>2019-09-06T18:02:17+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/NetBIOS-over-TCP-IP-node-types.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/NetBIOS-over-TCP-IP-node-types.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/wins-server/</loc>
		<lastmod>2019-09-06T19:23:41+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/wins-server.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/wins-server.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/wins-proxy-agent/</loc>
		<lastmod>2019-09-06T19:40:23+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/wins-proxy-agent.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/wins-proxy-agent.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/windows-script-host-wsh/</loc>
		<lastmod>2019-09-07T07:17:23+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/windows-script-host-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/windows-script-host-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/wsh-disabled.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/windows-scripting-host.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/windows-internet-name-service-wins/</loc>
		<lastmod>2019-09-07T09:23:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/wins-windows-internet-name-service.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/wins-windows-internet-name-service.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/windows-internet-name-service-wins.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/web-page/</loc>
		<lastmod>2019-09-08T16:26:44+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/web-page.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/web-page.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/attribute-property/</loc>
		<lastmod>2019-09-08T19:27:46+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/attribute-property-active-directory.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/attribute-property-active-directory.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/international-organization-for-standardization-iso/</loc>
		<lastmod>2019-09-08T19:42:06+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ISO-International-Organization-for-Standardization.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ISO-International-Organization-for-Standardization.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/iso-history.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/imt-2000/</loc>
		<lastmod>2019-09-08T20:09:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/imt-2000.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/imt-2000.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ieee-488/</loc>
		<lastmod>2019-09-09T13:54:17+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/hp-gpib-cable-ieee488.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ieee488-connector.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/hp-gpib-cable-ieee488.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/internet-architecture-board-iab/</loc>
		<lastmod>2019-09-09T15:57:22+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/internet-architecture-board-iab.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/internet-architecture-board-iab.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/icq/</loc>
		<lastmod>2019-09-10T08:17:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/icq-software.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/icq-software.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/local-address/</loc>
		<lastmod>2019-09-11T12:41:28+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/local-address.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/local-address.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/control-panel/</loc>
		<lastmod>2019-09-11T15:22:54+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/control-pannel.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/control-pannel.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/federal-communications-commission-fcc/</loc>
		<lastmod>2019-09-12T13:04:51+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Federal-Communications-Commission.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Federal-Communications-Commission.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/performance-monitor/</loc>
		<lastmod>2019-09-13T07:33:45+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/performance-monitor.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/performance-monitor.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/perfmon_add_counters.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/at-command/</loc>
		<lastmod>2019-09-14T14:27:50+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/at-command.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/at-command.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/automation-ole-automation/</loc>
		<lastmod>2019-09-15T08:36:22+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/automation-controller.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/automation-controller.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/remote-procedure-call-rpc/</loc>
		<lastmod>2019-09-15T10:06:10+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/remote-procedure-call.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/remote-procedure-call.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/network-interface-card-nic/</loc>
		<lastmod>2019-09-15T14:15:39+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/nic-network-interface-card.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/nic-network-interface-card.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/motherboard-2-network-interface-adapters.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/nic-rj45.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ipconfig/</loc>
		<lastmod>2019-09-15T15:08:58+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ipconfig-command.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ipconfig-command.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/storage-area-network-san/</loc>
		<lastmod>2019-09-15T16:03:55+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/storage-area-network-SAN.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/storage-area-network-SAN.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/digital-subscriber-line-dsl/</loc>
		<lastmod>2019-09-15T20:12:14+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/digital-subscriber-line.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/digital-subscriber-line.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/circuit-switched-services/</loc>
		<lastmod>2019-09-15T20:41:16+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/circuit-switched-service.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/circuit-switched-service.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/packet-switching-services/</loc>
		<lastmod>2019-09-15T20:49:12+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Packet-switching-Services.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Packet-switching-Services.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/asn-1-abstract-syntax-notation-one/</loc>
		<lastmod>2019-09-16T08:54:58+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/asn01.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/asn01.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/acceptable-use-policy/</loc>
		<lastmod>2019-09-16T08:56:27+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/aup-acceptable-use-policy.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/aup-acceptable-use-policy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/file-allocation-table-fat/</loc>
		<lastmod>2019-09-16T12:04:17+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/sample-of-fat-chain-fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/fat-structure.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/sample-of-fat-chain-fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/FAT-Directory-Entry-fig3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ms-dos/</loc>
		<lastmod>2019-09-16T15:03:43+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ms-dos.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ms-dos.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ms-dos-advertise.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/name-resolution/</loc>
		<lastmod>2019-09-17T17:49:39+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/name-resolution.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/name-resolution.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/account/</loc>
		<lastmod>2019-09-17T17:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/account-in-windows.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/account-in-windows.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/accessibility-options/</loc>
		<lastmod>2019-09-17T18:05:25+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/accessibility-options-windows-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/accessibility-options-windows-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/adaptive-differential-pulse-code-modulation-adpcm/</loc>
		<lastmod>2019-09-18T09:37:39+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ADPCM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ADPCM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/activex-data-objects-ado/</loc>
		<lastmod>2019-09-18T09:45:53+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ado-library.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ado-library.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/activex-control/</loc>
		<lastmod>2019-09-18T09:50:42+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/activex-control.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/activex-control.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/active-desktop/</loc>
		<lastmod>2019-09-18T10:07:48+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/active-desktop.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/active-desktop.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/active-scripting/</loc>
		<lastmod>2019-09-18T11:28:08+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/active-scripting.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/active-scripting.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/active-partition/</loc>
		<lastmod>2019-09-18T13:30:57+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Active-Partition-Windows.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Active-Partition-Windows.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/account-policy/</loc>
		<lastmod>2019-09-18T13:43:33+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/account-policy.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/account-policy-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/100baset4/</loc>
		<lastmod>2019-09-18T14:02:21+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/100base-t4-network.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/100base-t4-network.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/fast-ethernet/</loc>
		<lastmod>2019-09-18T14:05:32+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/fast-ethernet-network.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/fast-ethernet-network.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/fast-ethernet-ieee-802-3u.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/10base2/</loc>
		<lastmod>2019-09-18T14:15:21+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/10base2-network.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/10base2-network.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/bnc-plug-10bas-2-networks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/10basef/</loc>
		<lastmod>2019-09-18T14:31:14+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/10BASE-F-implementation.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/10BASE-F-implementation.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/add-printer/</loc>
		<lastmod>2019-09-18T14:36:18+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/add-printer-windows.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/add-printer-windows.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/backbone-in-networking/</loc>
		<lastmod>2019-09-18T14:54:17+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/backbone.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/backbone-in-networking.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/backbone-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/internet/</loc>
		<lastmod>2019-09-18T15:45:06+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/the-internet.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/the-internet.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/autoexec-bat/</loc>
		<lastmod>2019-09-19T07:10:48+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/autoexec-bat.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/autoexec-bat.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/rj-connectors/</loc>
		<lastmod>2019-09-19T14:51:02+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/rj-connector.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/rj-connector.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/effective-permissions/</loc>
		<lastmod>2019-09-20T07:47:48+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/efectice-permissions.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/efectice-permissions.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/frequency-division-multiple-access-fdma/</loc>
		<lastmod>2019-09-20T15:03:34+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/frequency-division-multiple-access.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/frequency-division-multiple-access.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/horizontal-cabling/</loc>
		<lastmod>2019-09-20T15:22:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/horizontal-cabling.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/horizontal-cabling.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/host-routing/</loc>
		<lastmod>2019-09-20T15:23:45+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/host-routing.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/host-routing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/management-information-base-mib/</loc>
		<lastmod>2019-09-20T17:27:23+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/management-informations-base.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/management-informations-base.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/carrier-sense-multiple-access-with-collision-detection-csma-cd/</loc>
		<lastmod>2019-09-20T17:33:25+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/csma-cd.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/csma-cd.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/multicast-dhcp-mdhcp/</loc>
		<lastmod>2019-09-20T17:56:44+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/multicast-dhcp.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/multicast-dhcp.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/near-end-crosstalk-next/</loc>
		<lastmod>2019-09-20T18:13:24+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/next-near-end-crosstalk.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/object-in-active-directory/</loc>
		<lastmod>2019-09-20T18:33:22+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/object-in-active-directory-users-and-computers.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/patch-cable/</loc>
		<lastmod>2019-09-22T12:18:30+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/patch-cable.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/19-inch-rackmount-patch-cable-patch-panel.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/server-service/</loc>
		<lastmod>2019-09-23T06:49:14+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/server-service.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/synchronous-data-link-control-sdlc/</loc>
		<lastmod>2019-09-23T08:54:28+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/sdlc-synchronous-data-link-control.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/sdlc-synchronous-data-link-control.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/t-carrier/</loc>
		<lastmod>2019-09-23T09:02:29+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/t-carrier.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/t-carrier.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/t1-channel-bank/</loc>
		<lastmod>2019-09-23T09:05:50+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/t1-channelbank.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/t1-channelbank.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/inverse-multiplexing/</loc>
		<lastmod>2019-09-23T14:01:27+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/imux-inverse-multiplexer.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/imux-inverse-multiplexer.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/code-division-multiple-access-cdma/</loc>
		<lastmod>2019-09-23T15:31:28+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/code-division-multiple-access-cdma.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/code-division-multiple-access-cdma.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/frame-relay-access-device-frad/</loc>
		<lastmod>2019-09-23T17:02:16+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/frad-frame-relay-access-device.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/frad-frame-relay-access-device.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/domain-controller/</loc>
		<lastmod>2019-09-24T06:46:25+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/domain-controller-security-policy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/lan-emulation-lane/</loc>
		<lastmod>2019-09-24T07:51:07+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/lane-lan-emulation.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/lane-lan-emulation.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/uniform-resource-locator-url/</loc>
		<lastmod>2019-09-24T09:03:21+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/uniform-resource-locator-url.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/uniform-resource-locator-url.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/primary-domain-controller-pdc/</loc>
		<lastmod>2019-09-25T07:01:19+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/primary-domain-controller.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/primary-domain-controller.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/packet-filtering/</loc>
		<lastmod>2019-09-25T17:03:40+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/packet-filtering-static-dynamic.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/packet-filtering-static-dynamic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/uninterruptible-power-supply-ups/</loc>
		<lastmod>2019-09-26T06:35:21+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/uninterruptible-power-supply.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/uninterruptible-power-supply.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Uninterruptible-Power-Supply-line-interactive.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/transmission-media/</loc>
		<lastmod>2019-09-26T08:27:32+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/transmission-media.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/transmission-media.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/network-file-system-nfs/</loc>
		<lastmod>2019-09-26T13:51:02+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/network-file-system.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/network-file-system.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/nslookup-command/</loc>
		<lastmod>2019-09-26T14:07:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/nslookup-command.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/nslookup-command.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/personal-communications-services-pcs/</loc>
		<lastmod>2019-09-26T16:48:24+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/personal-communication-service.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/synchronous-optical-network-sonet/</loc>
		<lastmod>2019-09-27T07:03:04+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/synchronous-optical-network-sonet.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/synchronous-optical-network-sonet.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/sonet-debugging.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/switched-multimegabit-data-services-smds/</loc>
		<lastmod>2019-09-27T07:40:20+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/smds-switched-multimegabit-data-services.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/smds-switched-multimegabit-data-services.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/central-office-co/</loc>
		<lastmod>2019-09-27T07:50:27+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/telco-central-office-co.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/telco-central-office-co.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/dynamic-routing/</loc>
		<lastmod>2019-09-27T09:07:28+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/dynamic-routing.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/dynamic-routing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/routing-and-remote-access-service-rras/</loc>
		<lastmod>2019-09-27T09:33:10+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/routing-and-remote-access-rras.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/routing-and-remote-access-rras.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/advanced-mobile-phone-service-amps/</loc>
		<lastmod>2019-09-27T18:19:53+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/amps-advanced-mobile-phone-service.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/amps-advanced-mobile-phone-service.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/cellular-phone-technology/</loc>
		<lastmod>2019-09-30T16:00:12+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/cellular-phone-technology.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/cellular-phone-technology.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/cell-in-atm/</loc>
		<lastmod>2019-10-01T06:58:51+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/atm-cell.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/atm-cell.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/file-system/</loc>
		<lastmod>2019-10-01T08:17:21+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/file-system.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/file-system.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/distributed-file-system-dfs/</loc>
		<lastmod>2019-10-03T09:03:27+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/dfs-distributed-file-system.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/dfs-distributed-file-system.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/microsoft-management-console-mmc/</loc>
		<lastmod>2019-10-03T13:06:36+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/microsoft-management-console-mmc.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/microsoft-management-console-mmc.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/event-viewer/</loc>
		<lastmod>2019-10-05T08:11:09+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/event-viewer-windows10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/event-viewer-windows10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/event-viewer.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/online-analytical-processing-olap/</loc>
		<lastmod>2019-10-07T06:47:25+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/OLAP.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/OLAP.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/sql-server-tools/</loc>
		<lastmod>2019-10-08T06:58:41+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/sql-server-tools.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/sql-server-tools.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/proxy-server/</loc>
		<lastmod>2019-10-11T07:59:36+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/proxy-server.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/proxy-server.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/caching-service-provider-csp/</loc>
		<lastmod>2019-10-11T13:18:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/cname-record/</loc>
		<lastmod>2019-10-11T13:48:37+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/cname-record.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/cname-record.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/hashing-algorithm/</loc>
		<lastmod>2019-10-11T15:55:57+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/hashing-algorithm.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/hashing-algorithm.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/sha1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/cryptography/</loc>
		<lastmod>2019-10-11T16:01:20+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/cryptography.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/cryptography.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/name-server/</loc>
		<lastmod>2019-10-14T10:08:47+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/name-server.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/name-server.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/digital-signature/</loc>
		<lastmod>2019-10-16T08:18:47+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/digital-signature.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/digital-signature.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/digital-signature-diagram.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/file-and-print-services-for-netware-fpnw/</loc>
		<lastmod>2019-10-21T06:46:08+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/fpnw-file-and-print-services-for-netware.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/fpnw-file-and-print-services-for-netware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/dual-boot/</loc>
		<lastmod>2019-10-25T08:05:06+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/dual-boot.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/dual-boot.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/directory-replication/</loc>
		<lastmod>2019-10-25T09:58:19+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/directory-replication.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/directory-replication.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/directory-replication-in-windows-nt/</loc>
		<lastmod>2019-10-25T10:08:42+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/directory-replication-windows-nt.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/directory-replication-windows-nt.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/classless-interdomain-routing-cidr/</loc>
		<lastmod>2019-10-28T07:46:46+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/cidr-classless-inter-domain-routing.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/cidr-classless-inter-domain-routing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/polyvinyl-chloride-pvc-cabling/</loc>
		<lastmod>2019-10-28T09:16:50+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/PVC-Cables.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/PVC-Cables.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/pvc-vs-plenum.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/short-message-service-sms/</loc>
		<lastmod>2019-10-28T09:36:29+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/short-message-service.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/short-message-service.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/microsoft-sna-server/</loc>
		<lastmod>2019-10-28T12:34:57+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/microsoft-sna-server.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/microsoft-sna-server.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/encrypting-file-system-efs/</loc>
		<lastmod>2019-10-29T09:14:54+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/encrypting-file-system-efs.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/encrypting-file-system-efs.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/terrestrial-trunked-radio-tetra/</loc>
		<lastmod>2019-10-29T09:47:11+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/tetra-terrestrial-trunked-radio.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/tetra-terrestrial-trunked-radio.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/mailbox-email/</loc>
		<lastmod>2019-10-30T09:39:54+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/mailbox-exchange-server.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/mailbox-exchange-server.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/systems-network-architecture-sna/</loc>
		<lastmod>2019-10-30T10:27:04+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/sna-system-network-architecture.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/sna-system-network-architecture.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/electronic-mail-email/</loc>
		<lastmod>2019-10-30T10:28:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/email-diagram.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/email-diagram.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/thinnet/</loc>
		<lastmod>2019-10-30T14:15:51+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/thinnet-rg58.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/thinnet-rg58.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/terminator/</loc>
		<lastmod>2019-10-30T15:37:48+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/terminator-bnc.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/terminator-bnc.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/terminator-test.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/data-service-unit-dsu/</loc>
		<lastmod>2019-10-30T18:04:32+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/data-service-unit-dsu.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/data-service-unit-dsu.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/demand-priority/</loc>
		<lastmod>2019-10-30T18:19:45+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/demand-priority.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/demand-priority.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/documents-documentation-tutorial/</loc>
		<lastmod>2019-10-30T18:52:58+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/networking-tutorials.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/networking-tutorials.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/fallback-switch/</loc>
		<lastmod>2019-10-30T19:50:07+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Fallback-Switch.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Fallback-Switch.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/desktop-management-interface-dmi/</loc>
		<lastmod>2019-11-05T15:50:48+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/desktop-management-interface-dmi.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/desktop-management-interface-dmi.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/briefcase-microsoft-windows/</loc>
		<lastmod>2019-11-12T16:35:46+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/briefcase.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/briefcase.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/trunking-computer-networking/</loc>
		<lastmod>2019-11-12T16:48:18+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/trunking-switches.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/trunking-switches.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/trunking-network.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ftp-service/</loc>
		<lastmod>2019-12-18T16:53:48+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/12/ftp-service-on-iis.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/12/ftp-service-on-iis.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/12/ftp-service-add-feature.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/modem/</loc>
		<lastmod>2019-12-19T14:47:52+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/modem-v90-56k.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/analog-modem-external.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/task-manager/</loc>
		<lastmod>2020-01-07T15:37:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/01/task-manager.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/01/task-manager.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/01/task-manager-windows-10.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/windows-management-instrumentation-wmi/</loc>
		<lastmod>2020-01-09T19:03:05+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/01/wmi-windows-management-instrumentation.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/01/wmi-windows-management-instrumentation.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/wow/</loc>
		<lastmod>2020-01-10T10:24:25+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/01/wow-win16-on-win32.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/01/wow-win16-on-win32.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/vcard/</loc>
		<lastmod>2020-03-19T16:03:04+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/vCard-export.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/vCard-export.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/vcard-file.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/virtualization/</loc>
		<lastmod>2020-03-19T16:04:18+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/virtualization.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/virtualization.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/virtual-directory/</loc>
		<lastmod>2020-03-19T16:05:27+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/virtual-directory-iis.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/virtual-directory-iis.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/virtual-directory-how-to-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/dynamic-html/</loc>
		<lastmod>2020-03-19T16:06:44+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/dynamic-html.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/dynamic-html.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/xhtml/</loc>
		<lastmod>2020-03-19T16:17:24+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/xhtml.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/xhtml.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/american-registry-for-internet-numbers-arin/</loc>
		<lastmod>2020-03-19T16:29:24+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/arin-american-registry-for-internet-numbers.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/arin-american-registry-for-internet-numbers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/internet-assigned-numbers-authority-iana/</loc>
		<lastmod>2020-03-19T16:30:05+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Internet-Assigned-Numbers-Authority.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Internet-Assigned-Numbers-Authority.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/international-telecommunication-union-itu/</loc>
		<lastmod>2020-03-19T16:34:40+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ITU-Logo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ITU-Logo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/International-Telecommunication-Union-Geneva-Switzerland.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/hostname/</loc>
		<lastmod>2020-03-19T16:40:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/hostname.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/hostname.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/hostname-command.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/hypertext-markup-language-html/</loc>
		<lastmod>2020-03-19T16:50:45+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/hypertext-markup-language.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/hypertext-markup-language.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/jitter/</loc>
		<lastmod>2020-03-19T16:54:38+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/jitter.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/jitter.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/jbod/</loc>
		<lastmod>2020-03-19T16:56:54+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/JBOD.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/JBOD.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/high-performance-file-system-hpfs/</loc>
		<lastmod>2020-03-19T17:00:06+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/HPFS.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/HPFS.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/hidden-share/</loc>
		<lastmod>2020-03-19T17:05:48+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/hidden-share.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/hidden-share.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/heterogeneous-network/</loc>
		<lastmod>2020-03-19T17:06:45+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/heterogeneous-network.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/heterogeneous-network.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/quorum-resource/</loc>
		<lastmod>2020-04-11T08:49:23+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/quorum-resource.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/quorum-resource.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/connection-pooling/</loc>
		<lastmod>2020-04-14T09:34:39+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/connection-pooling.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/connection-pooling.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/computer-management/</loc>
		<lastmod>2020-04-14T18:55:22+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/computer-management.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/computer-management.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/compmgmt._run.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/terminal-server/</loc>
		<lastmod>2020-04-17T08:43:16+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/terminal-server.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/terminal-server.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/terminal-services/</loc>
		<lastmod>2020-04-17T16:43:14+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/windows-terminal-services.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/windows-terminal-services.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/flow-control/</loc>
		<lastmod>2020-04-18T08:42:42+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/flow-control-software-hardware.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/flow-control-software-hardware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/network-monitor/</loc>
		<lastmod>2020-04-19T09:08:06+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/network-monitor.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/network-monitor.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/network-monitor-version-3-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/kernel/</loc>
		<lastmod>2020-04-19T09:19:48+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/kernel-computers.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/kernel-computers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/firewire-ieee-1394/</loc>
		<lastmod>2020-04-22T16:43:32+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/firewire-ieee-1394-port.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/firewire-ieee-1394-port.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/firewire.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/server-management-tools/</loc>
		<lastmod>2020-04-29T09:16:32+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/server-management-tools.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/server-management-tools.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/firewall-rules-in-smt.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/windows-power-shell-script-editor.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/file-explorer-system-management-tools.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/storage-information-system-management-tools.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/cabinet-files/</loc>
		<lastmod>2020-04-29T15:48:09+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/cabinet-files.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/cabinet-files.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/recreational-software-advisory-council-rsac/</loc>
		<lastmod>2020-04-30T09:22:36+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/rsac-recreational-software-advisory-council.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/rsac-recreational-software-advisory-council.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/voip-gateway/</loc>
		<lastmod>2020-05-01T13:22:42+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/voip-gateway.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/voip-gateway.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/voip-gateway-network-example.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/virtual-memory/</loc>
		<lastmod>2020-05-01T13:28:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/virtual-memory-windows-7.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/virtual-memory-windows-7.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/web-based-enterprise-management-wbem/</loc>
		<lastmod>2020-05-01T13:41:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/wbem-wbe-based-enterprise-management.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/wbem-wbe-based-enterprise-management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/backup-domain-controller-bdc/</loc>
		<lastmod>2020-05-01T13:53:27+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/backup-domain-controller.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/backup-domain-controller.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/premise-cabling/</loc>
		<lastmod>2020-05-01T14:04:34+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/premise-cabling.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/premise-cabling.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/secondary-ring/</loc>
		<lastmod>2020-05-03T17:56:15+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/fddi-primary-and-secondary-ring.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/fddi-primary-and-secondary-ring.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/mainframe/</loc>
		<lastmod>2020-05-03T18:04:31+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/mainframe-facility.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/mainframe-facility.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/mainframe-1960-359x283.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/isdn-terminal-adapter/</loc>
		<lastmod>2020-05-03T18:31:49+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ISDN-terminal-adapter.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ISDN-terminal-adapter.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/net-library-sql-server/</loc>
		<lastmod>2020-08-25T09:15:17+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/configuring-net-libraries.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/configuring-net-libraries.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/windows-update/</loc>
		<lastmod>2020-08-25T09:35:20+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/windows-update-working.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/windows-update-working.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/microsoft-update.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/awg-american-wire-gauge/</loc>
		<lastmod>2020-08-25T10:43:34+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/American-Wire-Guage-AWG-Wire-Sizes.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/American-Wire-Guage-AWG-Wire-Sizes.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/comp-command/</loc>
		<lastmod>2020-08-25T11:16:21+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/comp-command.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/comp-command.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/directory-service/</loc>
		<lastmod>2020-08-25T11:32:10+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/directory-service.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/directory-service.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/emergency-repair-disk-erd/</loc>
		<lastmod>2020-08-26T10:51:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/recovery-drive-windows-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/recovery-drive-windows-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ftp-utility/</loc>
		<lastmod>2020-08-26T11:21:19+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/ftp-utility.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/ftp-utility.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/interface-converter/</loc>
		<lastmod>2020-08-26T14:10:33+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/interface-converter.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/interface-converter.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/active-directory/</loc>
		<lastmod>2020-08-27T19:44:16+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/active-directory.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/active-directory.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/drain-wire/</loc>
		<lastmod>2020-09-05T09:34:55+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/12/drain-wire.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/12/drain-wire.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/wireless-datagram-protocol-wdp/</loc>
		<lastmod>2020-09-21T12:01:41+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/09/wireless-datagram-protocol-wdp.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/09/wireless-datagram-protocol-wdp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/10baset/</loc>
		<lastmod>2020-09-22T16:35:42+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/10base-T-network.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/10base-T-network.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/mac-address/</loc>
		<lastmod>2020-09-22T17:08:15+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/mac-address.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/mac-address.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/hive-registry/</loc>
		<lastmod>2020-10-03T16:26:52+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/hive-registry.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/hive-registry.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/packet-assembler-disassembler-pad/</loc>
		<lastmod>2020-10-03T16:37:02+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/pad-packet-assembler-disassembler.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/pad-packet-assembler-disassembler.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/fat32/</loc>
		<lastmod>2020-10-09T18:23:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/unshielded-twisted-pair-utp-cabling/</loc>
		<lastmod>2020-10-17T07:47:28+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/utp-cable.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/utp-cable.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/private-branch-exchange-pbx/</loc>
		<lastmod>2020-11-02T16:44:25+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/pbx-ip.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/pbx-ip.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/pbx-private-branch-exchange.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/satellite-communication-basics/</loc>
		<lastmod>2020-11-02T17:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/satellite-communication.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/satellite-communication.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/satellite-communication-scientific-diagram.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/satellite-communication-basics.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/internet-group-management-protocol-igmp/</loc>
		<lastmod>2020-11-22T12:28:37+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/IGMP-basic-architecture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/11/IGMP-message-format.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/11/IGMPv3-membership-query-message.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/11/IGMPv3-membership-report-message.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/11/IGMPv3-group-record.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/11/IGMPv3-list-changes-using-group-record-types.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/multicast-forwarding-algorithms/</loc>
		<lastmod>2020-11-27T13:40:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/11/Reverse-Path-Forwarding.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/11/Reverse-Path-Forwarding.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/how-to-automatically-login-into-windows-operating-systems/</loc>
		<lastmod>2020-11-29T15:16:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/11/How-to-automatic-logon-in-Windows-Operating-Systems.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/11/How-to-automatic-logon-in-Windows-Operating-Systems.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/11/registry-default-userName.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/frequency-hopping-spread-spectrum/</loc>
		<lastmod>2020-12-02T17:16:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/11/how-frequency-hopping-works.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/11/FHSS-Frequency-hopping-Spread-Spectrum.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/11/how-frequency-hopping-works.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/11/frequency-hooping-spread-spectrum.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/carrier-signal/</loc>
		<lastmod>2020-12-09T18:12:43+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/carrier-signal.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/carrier-signal.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/carrier-signal-modulation.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/12/amplitude-modulation.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/12/frequency-modulation.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/lmhosts-file-windows-os/</loc>
		<lastmod>2021-01-05T12:42:09+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/01/LMHOSTS-FILE.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/01/LMHOSTS-FILE.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/01/enable-lmhosts-on-registry.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/01/testing-lmhosts-entry-with-ping-command.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/01/Difference-between-Lmhosts-and-host-files.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/multiprotocol-label-switching-mpls/</loc>
		<lastmod>2021-05-19T10:21:45+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/multiprotocol-label-switching-mpls.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/multiprotocol-label-switching-mpls.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/image-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/electromagnetic-waves/</loc>
		<lastmod>2021-05-20T09:14:15+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/electromagnetic-waves.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/electromagnetic-waves.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/first-transatlantic-telephone-service.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/electric-field-800x600-compressed.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/how-computer-viruses-spread-and-how-to-keep-them-away/</loc>
		<lastmod>2021-06-19T22:16:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/Computer-virus-illustration-500.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/Computer-virus-illustration-500.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/640px-Tech_Support_Scammer_Fake_BSOD_Virus_Popup.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/caching-array-routing-protocol-carp/</loc>
		<lastmod>2021-06-22T09:54:28+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/caching-array-routing-protocol.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/caching-array-routing-protocol.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/network-news-transfer-protocol-nntp/</loc>
		<lastmod>2021-06-22T09:54:58+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/nntp-network-news-transfer-protocol.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/nntp-network-news-transfer-protocol.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/file-transfer-protocol-ftp/</loc>
		<lastmod>2021-06-22T09:55:10+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/file-transfer-protocol.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/file-transfer-protocol.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/internet-cache-protocol-icp/</loc>
		<lastmod>2021-06-22T09:56:30+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/internet-cache-protocol-icp.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/internet-cache-protocol-icp.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/routing-protocol/</loc>
		<lastmod>2021-06-22T09:58:53+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Routing-Protocol.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Routing-Protocol.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/open-shortest-path-first-ospf-protocol/</loc>
		<lastmod>2021-06-22T10:00:05+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/open-shortest-path-first-protocol.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/open-shortest-path-first-protocol.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/kerberos-v5-security-protocol/</loc>
		<lastmod>2021-06-22T10:01:07+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/kerberos-protocol.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/kerberos-protocol.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/simple-mail-transfer-protocol-smtp/</loc>
		<lastmod>2021-06-22T10:08:56+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/simple-mail-transfer-protocol.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/simple-mail-transfer-protocol.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/bsd-unix/</loc>
		<lastmod>2021-06-22T13:38:07+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/bsd-unix.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/bsd-unix.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/windows-98/</loc>
		<lastmod>2021-06-22T13:40:10+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/windows-98.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/windows-98.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/windows-98-desktop.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/windows-ce/</loc>
		<lastmod>2021-06-22T13:41:39+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/windows-ce.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/windows-ce.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/windows-for-workgroups-3-11/</loc>
		<lastmod>2021-06-22T13:50:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/windows-311-for-workgroups-logo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/windows-311-for-workgroups-logo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/windows-311-for-workgroups-architecture.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/windows-3-1/</loc>
		<lastmod>2021-06-22T13:50:12+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/windows-3-1-logo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/windows-3-1-logo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/windows-31-user-interface.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/windows-3-1-core.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/windows-3-1-virtual-memory.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/networking-basics-what-is-a-proxy-server-and-their-benefits/</loc>
		<lastmod>2021-06-22T14:13:05+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/proxy-main-pic.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/proxy-main-pic.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/proxy-several-types.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/proxy-several-benefits.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/point-to-point-tunneling-protocol-pptp/</loc>
		<lastmod>2021-06-22T14:17:16+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/pptp-vs-l2tp.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/point-to-point-tunneling-protocol-pptp.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/pptp-vs-l2tp.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/multilink-point-to-point-protocol-mppp/</loc>
		<lastmod>2021-06-22T16:15:34+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/11/MPPP.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/11/MPPP.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/windows-clustering/</loc>
		<lastmod>2021-06-22T16:16:34+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/failover-cluster.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/failover-cluster.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/microsoft-cluster-server-mscs/</loc>
		<lastmod>2021-06-22T16:17:35+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/failover-cluster.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/failover-cluster.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/windows-2000/</loc>
		<lastmod>2021-06-22T16:33:02+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/Windows-2000.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/Windows-2000.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/how-to-pin-an-app-to-windows-10-start-menu/</loc>
		<lastmod>2021-06-26T16:50:47+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/pin-to-start-menu.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/pin-to-start-menu.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/resize-the-start-menu-tile.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/personal-digital-assistant-pda/</loc>
		<lastmod>2021-07-02T17:01:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/pda-personal-digital-assistant.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/pda-personal-digital-assistant.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/windows-ce.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/personal-digital-assistant-pen-stylus.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/e-carrier/</loc>
		<lastmod>2021-07-03T13:13:13+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/e-carrier.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/e-carrier.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/internet-mail-access-protocol-version-4-imap4/</loc>
		<lastmod>2021-07-03T13:33:27+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/imap4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/imap4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/mesh-topology/</loc>
		<lastmod>2021-07-03T14:37:48+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/mesh-topology.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/mesh-topology.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/v-90/</loc>
		<lastmod>2021-07-03T14:41:57+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/modem-v90-56k.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/modem-v90-56k.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/v90-serial-modem.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/socks-v5/</loc>
		<lastmod>2021-07-03T14:47:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/socks-v5.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/socks-v5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/trust-relationship/</loc>
		<lastmod>2021-07-03T17:04:16+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/trust-relationship.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/trust-relationship.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/windows-registry/</loc>
		<lastmod>2021-07-03T17:59:22+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/value-entry-regstry-editor.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/value-entry-regstry-editor.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/safe-mode/</loc>
		<lastmod>2021-07-03T18:04:11+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/01/safe-mode.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/01/safe-mode.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/taking-ownership/</loc>
		<lastmod>2021-07-03T18:10:52+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/01/take-ownership.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/01/take-ownership.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/local-exchange-carrier-lec/</loc>
		<lastmod>2021-07-03T18:20:59+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/local-exchange-carrier.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/local-exchange-carrier.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/late-collision/</loc>
		<lastmod>2021-07-05T10:50:42+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Late-Collision-reported.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Late-Collision-reported.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/raid-5/</loc>
		<lastmod>2021-07-05T10:54:04+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/raid5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/raid5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/voice-profile-for-internet-mail-vpim/</loc>
		<lastmod>2021-07-05T11:03:16+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/vpim-examples.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/vpim-examples.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/web-hosting/</loc>
		<lastmod>2021-07-05T11:08:35+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/what-is-web-hosting.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/what-is-web-hosting.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/web-hosting-data-center.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/appleshare/</loc>
		<lastmod>2021-07-05T11:11:05+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/appleshare.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/appleshare.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/common-gateway-interface-cgi/</loc>
		<lastmod>2021-07-05T11:31:34+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Common-Gateway-Interface.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Common-Gateway-Interface.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/cascading-style-sheets-css/</loc>
		<lastmod>2021-07-05T12:04:20+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/cascading-style-sheets.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/cascading-style-sheets.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/css-selector.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/integrated-communications-provider-icp/</loc>
		<lastmod>2021-07-05T14:47:16+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/integrated-communications-provider-ICP.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/integrated-communications-provider-ICP.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/internet-engineering-task-force-ietf/</loc>
		<lastmod>2021-07-05T14:56:19+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ietf-logo.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ietf-logo.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/internet-authentication-service-ias/</loc>
		<lastmod>2021-07-06T10:09:53+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ias-internet-authentication-service.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ias-internet-authentication-service.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/microsoft-internet-explorer/</loc>
		<lastmod>2021-07-06T10:10:39+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/microsoft-internet-explorer.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/microsoft-internet-explorer.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/microsoft-iInternet-explorer-v1-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/namespace/</loc>
		<lastmod>2021-07-06T11:05:36+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/namespace.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/namespace.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/hub/</loc>
		<lastmod>2021-07-06T16:58:08+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/old-ethernet-hub.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/old-ethernet-hub.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/hubs.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/stackable-hubs.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/cable-modem/</loc>
		<lastmod>2021-07-06T16:58:32+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/12/cable-modem.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/12/cable-modem.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/switch/</loc>
		<lastmod>2021-07-06T16:59:10+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/network-switch.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/network-switch.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/patch-panel/</loc>
		<lastmod>2021-07-06T16:59:25+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/patch-panel.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/patch-panel.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/wifi-range-extender/</loc>
		<lastmod>2021-07-06T17:02:38+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/wifi-range-extender.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/wifi-range-extender.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/operating-system-os/</loc>
		<lastmod>2021-07-06T17:04:09+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/operating-system-5603909_1280.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/operating-system-5603909_1280.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/BIOS.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/bandwidth-throttling/</loc>
		<lastmod>2021-07-06T17:14:39+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/bandwidth-throttling.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/bandwidth-throttling.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/jscript/</loc>
		<lastmod>2021-07-06T17:14:44+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/jscript.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/jscript.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/microsoft-personal-web-server-pws/</loc>
		<lastmod>2021-07-06T17:14:48+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/microsoft-personal-web-server.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/microsoft-personal-web-server.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/knowledge-manager-site-server/</loc>
		<lastmod>2021-07-06T17:14:54+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/microsoft-site-server.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/microsoft-site-server.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/site-server-commerce-edition.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/archiving-networking/</loc>
		<lastmod>2021-07-06T17:15:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/archiving-data-networking.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/archiving-data-networking.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/indexing-service/</loc>
		<lastmod>2021-07-06T17:15:06+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/indexing-service.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/indexing-service.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/internet-database-connector-idc/</loc>
		<lastmod>2021-07-06T17:15:08+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/internet-database-connector.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/internet-database-connector.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/windows-nt/</loc>
		<lastmod>2021-07-06T17:15:30+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/windows-nt-workspace.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/windows-nt-workspace.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/windows-nt4-architecture.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/usenet/</loc>
		<lastmod>2021-07-06T17:16:40+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/nntp-network-news-transfer-protocol.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/nntp-network-news-transfer-protocol.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/internet-control-message-protocol-icmp/</loc>
		<lastmod>2021-07-06T17:29:09+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/icmp_encaps.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/icmp_encaps.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/icmp-types.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/hardware-profile/</loc>
		<lastmod>2021-07-06T17:30:25+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/hardware-profile.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/hardware-profile.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/windows-nt-command/</loc>
		<lastmod>2021-07-06T17:42:04+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/windows-nt-command.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/windows-nt-command.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/built-in-local-group/</loc>
		<lastmod>2021-07-06T17:45:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/group/</loc>
		<lastmod>2021-07-06T17:48:58+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/group-in-networking.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/time-to-live-ttl/</loc>
		<lastmod>2021-07-06T17:50:35+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/time-to-live.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/time-to-live.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/secure-multipurpose-internet-mail-extensions-s-mime/</loc>
		<lastmod>2021-07-06T17:51:16+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/smime-structure.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/smime-structure.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/common-information-model-cim/</loc>
		<lastmod>2021-07-06T17:58:32+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/common-information-model-cim.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/common-information-model-cim.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/wideband-code-division-multiple-access-w-cdma/</loc>
		<lastmod>2021-07-06T18:00:05+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/w-cdma-wideband.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/w-cdma-wideband.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/certificate-services-windows-server/</loc>
		<lastmod>2021-07-06T18:01:16+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/certificate-services-windows-server.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/certificate-services-windows-server.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/installing-active-directory-certificate-services-ad-cs.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/defense-messaging-system-dms/</loc>
		<lastmod>2021-07-06T18:04:42+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/defense-message-system-dms.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/defense-message-system-dms.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/raid-1/</loc>
		<lastmod>2021-07-07T06:28:51+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/raid1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/raid1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/raid1-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/dynamic-volume/</loc>
		<lastmod>2021-07-07T10:24:29+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/07/dynamic-volume.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/07/dynamic-volume.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/group-policy-tool/</loc>
		<lastmod>2021-07-07T10:32:58+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/group-policy-tool.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/group-policy-tool.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/home-folder/</loc>
		<lastmod>2021-07-07T10:35:58+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/home-folder.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/home-folder.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/remote-access-to-a-network/</loc>
		<lastmod>2021-07-07T10:46:12+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/remote-access-to-a-network.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/remote-access-to-a-network.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/shut-down/</loc>
		<lastmod>2021-07-07T10:49:30+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/shutdown-windows.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/shutdown-windows.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/orange-book/</loc>
		<lastmod>2021-07-07T11:01:31+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/07/the-orange-book.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/07/the-orange-book.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/certificate-authority-ca/</loc>
		<lastmod>2021-07-07T11:03:19+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/certificate-authority.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/certificate-authority.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/distinguished-name/</loc>
		<lastmod>2021-07-07T11:05:17+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/distinguished-name-microsoft-exchange.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/distinguished-name-microsoft-exchange.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/regional-bell-operating-company-rboc/</loc>
		<lastmod>2021-07-07T11:09:49+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/regional-bell-operating-company.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/regional-bell-operating-company.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/web-mapping/</loc>
		<lastmod>2021-07-07T11:16:35+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/web-mapping-web-gis.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/web-mapping-web-gis.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/client-access-license-cal/</loc>
		<lastmod>2021-07-07T11:20:09+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/client-access-license-windows-nt-2000.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/client-access-license-windows-nt-2000.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/registration-authority-ra/</loc>
		<lastmod>2021-07-07T11:22:47+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/registration-authority-ra.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/registration-authority-ra.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/start-of-authority-soa-record/</loc>
		<lastmod>2021-07-07T11:24:15+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/start-of-authority-record.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/start-of-authority-record.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/active-directory-schema/</loc>
		<lastmod>2021-07-08T10:58:03+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/active-directory-schema.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/active-directory-schema.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/100basefx/</loc>
		<lastmod>2021-07-08T11:02:22+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/100base-fx-module-for-switch.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/100base-fx-module-for-switch.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/categories-of-fast-ethernet.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ntfs-permissions-windows-2000/</loc>
		<lastmod>2021-07-08T11:04:09+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ntfs-permissions-w2000.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ntfs-permissions-w2000.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ntfs-permissions-windows-nt/</loc>
		<lastmod>2021-07-08T11:04:40+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ntfs-permissions-windows-nt.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ntfs-permissions-windows-nt.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/shared-folder-permissions/</loc>
		<lastmod>2021-07-08T11:05:18+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/set-permission-windows-2000.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/shared-folders.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/share-permissions-windows-nt.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/set-permission-windows-2000.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/password-in-networking/</loc>
		<lastmod>2021-07-08T11:05:37+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/password-networking.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/password-networking.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/host-name-resolution/</loc>
		<lastmod>2021-07-08T11:09:08+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/host-name-resolution.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/host-name-resolution.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/dns-zone/</loc>
		<lastmod>2021-07-08T11:09:15+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/zone-dns-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/zones-dns.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/zone-dns.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/raid-0/</loc>
		<lastmod>2021-07-08T11:12:57+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/raid-0-disk-striping.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/raid-0-disk-striping.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/group-policy/</loc>
		<lastmod>2021-07-08T11:20:55+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/group-policy.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/group-policy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/header/</loc>
		<lastmod>2021-07-08T11:21:58+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/header-packet.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/header-packet.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/virtual-private-network-vpn/</loc>
		<lastmod>2021-07-08T11:24:03+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/vpn-diagram.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/vpn-diagram.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/tn3270/</loc>
		<lastmod>2021-07-08T11:24:49+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/tn3270-mocha.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/tn3270-mocha.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/windows-workgroup/</loc>
		<lastmod>2021-07-08T11:25:20+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/01/windows-workgroup.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/01/windows-workgroup.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/secondary-name-server/</loc>
		<lastmod>2021-07-08T11:25:38+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/secondary-name-server.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/secondary-name-server.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/web-server/</loc>
		<lastmod>2021-07-08T11:28:17+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/web-server.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/web-server.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/joint-photographic-experts-group-jpeg/</loc>
		<lastmod>2021-07-08T14:46:59+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/joint-photographic-experts-group.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/jpeg-sunset.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/infrared-data-association-irda/</loc>
		<lastmod>2021-07-08T14:47:57+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/05/infrared-data-association-IrDA.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/05/infrared-data-association-IrDA.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/telnet/</loc>
		<lastmod>2021-07-08T14:49:21+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/telnet.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/telnet.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/plain-old-telephone-service-pots/</loc>
		<lastmod>2021-07-08T14:51:23+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/plain-old-telephone-service-pots.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/plain-old-telephone-service-pots.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/v-series/</loc>
		<lastmod>2021-07-08T14:52:06+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/v-series-data-communication-modems.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/v-series-data-communication-modems.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/x-500/</loc>
		<lastmod>2021-07-08T14:52:54+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/x500.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/x500.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/x500-directory-service.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/x-window-system/</loc>
		<lastmod>2021-07-08T14:54:48+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/X-window-system.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/X-window-system.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/networking-history-1990/</loc>
		<lastmod>2021-07-08T14:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/network-1990-510x367.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/full-duplex-ethernet-911x452.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/atm-virtual-circuits-589x393.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/voip-497x434.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/cable-modem-769x437.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/wifi-symbol-min-465x268.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/windows-nt-logo-608x466.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/public-key-infrastructure-pki/</loc>
		<lastmod>2021-07-08T14:55:51+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/public-key-infrastructure.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/public-key-infrastructure.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/what-is-java/</loc>
		<lastmod>2021-07-08T15:06:42+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/what-is-java.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/what-is-java.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/java-generic-interface.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/java-green-team.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/xml/</loc>
		<lastmod>2021-07-08T15:08:53+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/XML-example.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/XML-example.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/zone-file/</loc>
		<lastmod>2021-07-08T15:14:17+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/zone-file.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/zone-file.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/transmission-modes-in-data-transmission/</loc>
		<lastmod>2021-07-08T15:15:06+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/image-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/image-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/image-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/image-11.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/x86-platform/</loc>
		<lastmod>2021-07-08T15:16:03+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/x86-platform-processors-list.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/x86-platform-processors-list.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/gigabit-ethernet/</loc>
		<lastmod>2021-07-08T15:16:23+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/gigabit-ethernet.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/gigabit-ethernet.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/backboning/</loc>
		<lastmod>2021-07-08T15:51:57+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/backboning.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/backboning.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/line-driver/</loc>
		<lastmod>2021-07-08T15:59:42+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/line-driver.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/line-driver.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/remote-access-service-ras/</loc>
		<lastmod>2021-07-08T16:02:07+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/routing-and-remote-access-service.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/remote-access.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ole/</loc>
		<lastmod>2021-07-08T16:09:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/zero-administration-kit-zak/</loc>
		<lastmod>2021-07-08T16:16:29+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/zak-zero-administration-kit.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/zak-zero-administration-kit.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/broadcast-storm/</loc>
		<lastmod>2021-07-08T16:16:53+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/broadcast-storm.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/broadcast-storm.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/microsoft-netshow/</loc>
		<lastmod>2021-07-08T16:16:59+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/announcement-microsoft-netshow-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/announcement-microsoft-netshow-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/zone-transfer/</loc>
		<lastmod>2021-07-08T16:17:29+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/zone-transfer.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/zone-transfer.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/zone-transfer-in-standard-dns.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/vbscript/</loc>
		<lastmod>2021-07-08T16:18:45+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/vbscript-example.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/vbscript-example.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/web-application/</loc>
		<lastmod>2021-07-08T16:23:10+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/web-application-architecture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/web-application-architecture.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/website-vs-web-application.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/hosts-file/</loc>
		<lastmod>2021-07-08T16:24:41+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/hosts-file.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/hosts-file.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/message-transfer-agent-mta/</loc>
		<lastmod>2021-07-08T16:25:37+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/message-transfer-agent.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/message-transfer-agent.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/java-database-connectivity-jdbc/</loc>
		<lastmod>2021-07-08T16:26:17+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/java-database-connectivity-jdbc.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/java-database-connectivity-jdbc.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/cd-file-system-cdfs/</loc>
		<lastmod>2021-07-08T16:50:39+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/cd-file-system-iso-9660.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/cd-file-system-iso-9660.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/microsoft-exchange-server/</loc>
		<lastmod>2021-07-08T16:53:41+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/exchange-server.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/exchange-server.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/types-of-optic-fiber-the-lost-factors-and-fiber-filter-technology/</loc>
		<lastmod>2021-08-16T14:50:23+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/08/optic-fiber-geometry-problems.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/fiber-optic-cabling.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/single-mode-fiber-optic.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/08/optic-fiber-geometry-problems.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/08/fiber-optics-lost-factors.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/08/more-light-loss-wider-gap.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/08/optical-fiber-macrobending.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/08/microbending.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/08/fiber-optics-attenuation.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/08/attenuation-1310-windows-1550-windows.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/08/spectral-attenuation-optic-fibers.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/08/dispersion-modal-chromatic-polarization.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/08/wavelength-dispersion.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/08/chromatic-dispersion-reduction.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/08/fiber-bragg-grating.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/unix/</loc>
		<lastmod>2021-08-16T15:17:45+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/unix.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/unix.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/fiber-distributed-data-interface-fddi/</loc>
		<lastmod>2021-08-16T15:19:54+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/fddi-fiber-distributed-data-interface.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/fddi-fiber-distributed-data-interface.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/point-to-point-protocol-ppp/</loc>
		<lastmod>2021-08-16T15:58:53+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/point-to-point-protocol-ppp.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/point-to-point-protocol-ppp.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/access-mode/</loc>
		<lastmod>2021-08-16T16:03:59+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/access-mode.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/access-mode.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/osi-model/</loc>
		<lastmod>2021-08-16T16:14:12+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/osi-model-1080x589.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/osi-model-450x326.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/osi-protocols-193x292.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/open-systems-interconnection-osi-reference-model/</loc>
		<lastmod>2021-08-16T16:20:12+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/osi-model-450x326.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/osi-model-450x326.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/osi-protocols-193x292.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/7-layers-osi-model/</loc>
		<lastmod>2021-08-16T17:31:29+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/08/7-layers-osi-reference-model-featured.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/08/7-layers-osi-model.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/08/7-layers-osi-reference-model-featured.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/osi-protocols-193x292.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/presentation-layer/</loc>
		<lastmod>2021-08-16T18:01:44+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/presentation-layer-osi-model.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/presentation-layer-osi-model.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ipx-spx-compatible-protocol/</loc>
		<lastmod>2021-08-16T18:08:03+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ipx-spx-compatible-protocol.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ipx-spx-compatible-protocol.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/data-link-layer/</loc>
		<lastmod>2021-08-16T18:46:43+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/data-link-layer.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/data-link-layer.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/cellular-digital-packet-data-cdpd/</loc>
		<lastmod>2021-08-16T18:48:20+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Cellular-Digital-Packet-Data-network-architecture.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Cellular-Digital-Packet-Data-network-architecture.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/t-120-standard/</loc>
		<lastmod>2021-08-16T18:51:50+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/t-120-standard.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/t-120-standard.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/banyan-vines/</loc>
		<lastmod>2021-08-16T18:58:57+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/banyan-vines.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/banyan-vines.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/netbeui/</loc>
		<lastmod>2021-08-16T20:25:09+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/NetBEUI-protocol.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/NetBEUI-protocol.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/x-400/</loc>
		<lastmod>2021-08-16T21:05:19+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/x400-message-handling-system.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/x400-message-handling-system.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/virtual-lan-vlan/</loc>
		<lastmod>2021-08-16T21:11:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/vlan.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/vlan.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/high-level-data-link-control-hdlc/</loc>
		<lastmod>2021-08-16T21:15:19+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/high-level-data-link-control.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/high-level-data-link-control.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/wireless-application-protocol-wap/</loc>
		<lastmod>2021-08-16T21:24:50+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/wap-wireless-application-protocol.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/wap-wireless-application-protocol.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/internetwork-packet-exchange-ipx/</loc>
		<lastmod>2021-08-16T21:30:09+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ipx-internetwork-packet-exchange.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ipx-internetwork-packet-exchange.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/logical-link-control-llc-layer/</loc>
		<lastmod>2021-08-16T21:34:13+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/logical-link-control-layer.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/logical-link-control-layer.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/multimode-fiber-optic-cabling/</loc>
		<lastmod>2021-08-16T21:37:19+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/multimode-fiber-optic-cabling.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/multimode-fiber-optic-cabling.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/attrib-command/</loc>
		<lastmod>2021-08-17T10:34:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/attrib-command.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/attrib-command.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/nbtstat/</loc>
		<lastmod>2021-08-17T10:59:51+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/nbtstat.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/nbtstat.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/web-browser/</loc>
		<lastmod>2021-08-18T17:35:44+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/web-browsers-500px-min.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/web-browsers-500px-min.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/web-browser-privacy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/customer-experience-cx/</loc>
		<lastmod>2021-08-19T18:14:45+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/customer-experience.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/customer-xp.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/crm-process.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/x-25/</loc>
		<lastmod>2021-08-20T10:06:51+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/x25-protocol.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/x25-protocol.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/x25.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/dense-wavelength-division-multiplexing-dwdm/</loc>
		<lastmod>2021-09-14T11:11:50+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/dwdm-dense-wavelength-division-multiplexing.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/dwdm-dense-wavelength-division-multiplexing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/the-dark-side-of-the-network/</loc>
		<lastmod>2021-09-17T17:11:38+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/dark-web-510x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/deep-web.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/basic-programming-language/</loc>
		<lastmod>2021-09-17T18:28:03+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/09/microsoft-basic-programing-language.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/09/microsoft-basic-programing-language.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/networking-history-1970/</loc>
		<lastmod>2021-09-17T18:29:22+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/network-1970-510x377.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/t1-line-627x463.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/arpanet-1970-500x240.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/world-wide-web-300x199.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/altair-8800-computer-734x458.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/parallel-transmission/</loc>
		<lastmod>2021-09-17T18:38:54+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/image-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/image-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/IEEE1284-centronics-printer-cable.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/cache-server/</loc>
		<lastmod>2021-12-08T07:41:17+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/cache-server.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/cache-server.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.thenetworkencyclopedia.com/imagens/c4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/internet-corporation-for-assigned-names-and-numbers-icann/</loc>
		<lastmod>2021-12-08T07:45:14+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/icann.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/icann.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/institute-of-electrical-and-electronics-engineers-ieee/</loc>
		<lastmod>2021-12-08T07:56:46+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ieee-institute-of-electrical-and-electronics-emgineers.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ieee-institute-of-electrical-and-electronics-emgineers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/layer-2-tunneling-protocol-l2tp/</loc>
		<lastmod>2021-12-08T07:59:54+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/07/layer2-tunneling-protocol-min.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/07/layer2-tunneling-protocol-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/what-is-a-modern-data-stack-and-why-you-should-consider-it/</loc>
		<lastmod>2021-12-09T09:37:29+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/12/modern-data-stack.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/12/modern-data-stack.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/history-of-ipv6/</loc>
		<lastmod>2022-01-02T19:04:15+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/01/history-of-ipv6-1200x675-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/01/history-of-ipv6-1200x675-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/open-network-environment/</loc>
		<lastmod>2022-01-05T10:34:25+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/open-network-environment-cisco.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/open-network-environment-cisco.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/open-network-environment-flow.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/physical-layer/</loc>
		<lastmod>2022-01-05T10:39:15+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/physical-layer-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/physical-layer-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/leased-line/</loc>
		<lastmod>2022-01-05T10:40:05+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/leased-line-500x500.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/leased-line-500x500.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/leased-line.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/frame-relay/</loc>
		<lastmod>2022-01-05T10:40:55+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/frame-relay.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/frame-relay.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ipv6-cisco-vision/</loc>
		<lastmod>2022-01-05T10:45:39+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ipv6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/internet-information-services-iis/</loc>
		<lastmod>2022-01-05T10:54:10+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Internet-Information-Services-IIS.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Internet-Information-Services-IIS.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/tcp-ip/</loc>
		<lastmod>2022-01-05T10:55:57+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/tcp-ip-protocol.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/tcp-ip-protocol.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/hyperterminal/</loc>
		<lastmod>2022-01-05T10:56:52+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/12/hyperterminal.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/12/hyperterminal.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/network-topology/</loc>
		<lastmod>2022-01-05T11:02:32+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Network-Topologies-The-Advantages-and-Disadvantages-of-Each.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Network-Topology.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/disruptive-innovation/</loc>
		<lastmod>2022-01-06T19:28:44+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/01/disruptive-innovation.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/01/disruptive-innovation.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/10-skills-you-need-to-be-a-developer/</loc>
		<lastmod>2022-01-10T09:04:17+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/01/10-skills-you-need-to-be-a-developer.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/01/10-skills-you-need-to-be-a-developer.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/what-is-the-role-of-dynamic-address-assignment/</loc>
		<lastmod>2022-03-04T12:34:31+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/02/the-role-of-dynamic-address-assignment.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/02/the-role-of-dynamic-address-assignment.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/tcpdump-guide/</loc>
		<lastmod>2022-03-05T14:42:12+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/what-is-tcpdump.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/what-is-tcpdump.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/sample-tcp-packet.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/tcpdump-for-windows.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/the-first-request-for-comments-or-rfc-1/</loc>
		<lastmod>2022-03-07T13:21:23+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/the-first-rfc.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/the-first-rfc.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/steve-crocker-photo.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/A-before-link-establishment.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/B-after-link-establishment.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/C-after-receipt-and-compilation-of-the-DEL-program.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/bios-basic-input-output-system/</loc>
		<lastmod>2022-03-09T09:29:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/bios-setup.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/bios-setup.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/computer-motherboard-circuit-jumper-bios-config-center_266732-26363.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/UEFI.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/basic-configuration-of-a-juniper-router/</loc>
		<lastmod>2022-03-28T15:44:40+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/juniper-router-basic-configuration.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/juniper-router-basic-configuration.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/juniper-router-list-of-the-available-commands.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/junos-command-show-interfaces.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/junos-show-command.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/junos-show-version.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/junos-show-configuration.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/juniper-router-physical-interfaces.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/junos-show-intrfaces-brief.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/junos-primary-ip-address-configuration.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/layer-3-switch/</loc>
		<lastmod>2022-03-29T07:28:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/layer3-switch.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/layer3-switch.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/service-advertising-protocol-sap/</loc>
		<lastmod>2022-03-29T07:47:14+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/service-advertising-protocol-sap.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/service-advertising-protocol-sap.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/fiber-optic-cabling/</loc>
		<lastmod>2022-07-05T08:15:58+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/fiber-optic-cabling.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/fiber-optic-cabling.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/lan-with-fiber-optic-cabling.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/history-of-fiber-optics/</loc>
		<lastmod>2022-08-17T17:17:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/07/history-of-fiber-optics.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/07/Evolution-of-Light-in-Communication.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/layer-2-switch/</loc>
		<lastmod>2022-08-20T07:57:14+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/network-switch.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/network-switch.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/access-point/</loc>
		<lastmod>2022-08-20T08:02:15+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/access-point.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/access-point.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/poe-vendor-extensions-to-the-standard/</loc>
		<lastmod>2022-08-26T17:38:39+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/poe-vendor-extension-to-the-standard.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/poe-vendor-extension-to-the-standard.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/power-over-ethernet-poe/</loc>
		<lastmod>2022-08-26T18:00:18+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/power-over-ethernet-poe.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/power-over-ethernet-poe.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/poe-access-point.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/poe-port-management/</loc>
		<lastmod>2022-08-26T18:01:08+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/power-of-ethernet-port-management.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/power-of-ethernet-port-management.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/poe-and-cable-pairs/</loc>
		<lastmod>2022-08-26T18:01:55+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/poe-and-cable-pairs.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/poe-and-cable-pairs.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/Alternatives-A-and-B-for-10BASE-T-and-100BASE-T.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/Alternatives-A-and-B-for-1000BASE-T.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/how-power-over-ethernet-works-poe-operations/</loc>
		<lastmod>2022-08-26T18:02:40+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/3-How-PoE-works.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/3-How-PoE-works.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/physical-layer-power-classifications.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/poe-device-roles-and-type-parameters/</loc>
		<lastmod>2022-08-26T18:03:35+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/2-power-over-ethernet-device-roles.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/2-PoE-connections.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/2-poe-splitter.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/2-table-poe-type-1-2-parameters.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/asymmetric-encryption/</loc>
		<lastmod>2022-08-29T11:24:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/Asymmetric-Encryption.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/Asymmetric-Encryption.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/digital-signature-of-hash.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/starting-to-understand-encryption/</loc>
		<lastmod>2022-08-29T11:31:25+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/understanding-encryption.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/understanding-encryption.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/image-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/image-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/incremental-zone-transfer/</loc>
		<lastmod>2022-09-05T15:22:14+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ixfr-incremental-zone-transfer.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ixfr-incremental-zone-transfer.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/virus/</loc>
		<lastmod>2022-09-09T09:19:22+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/virus-in-computer-systems.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/virus-in-computer-systems.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/web-3-0/</loc>
		<lastmod>2022-09-25T11:39:50+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/09/what-is-web-3-0.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/09/what-is-web-3-0.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/world-wide-web-www/</loc>
		<lastmod>2022-09-25T11:42:47+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/world-wide-web-map.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/world-wide-web-map.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/line-mode-browser.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/world-wide-web-consortium-w3c/</loc>
		<lastmod>2022-09-25T11:59:20+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/w3c-consortium.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/w3c-consortium.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/bitcoin-a-peer-to-peer-electronic-cash-system/</loc>
		<lastmod>2022-10-03T15:58:12+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/10/bitcoin-paper-A-Peer-to-Peer-Electronic-Cash-System.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/10/bitcoin-paper-A-Peer-to-Peer-Electronic-Cash-System-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/10/bitcoin-paper-transactions.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/10/timestamp-server.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/10/proof-of-work.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/10/reclaiming-disk-space.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/10/simplified-payment-verification-bitcoin-paper.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/10/combining-and-splitting-value.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/10/privacy-bitcoin-paper.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/10/calculations-probability-the-attacker-catch-up.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/10/bitcoin-calculations-poisson-distribution.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/10/bitcoin-calculation-formula-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/10/bitcoin-calculation-formula-rearranged.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/10/running-some-results-bitcoin-calculations.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/10/bitcoin-calculation-solving-P.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/brave-browser/</loc>
		<lastmod>2022-10-03T16:53:52+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/12/brave-browser.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/12/brave-browser.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/01/bat-basic-attention-token.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/webcasting/</loc>
		<lastmod>2022-10-20T06:41:55+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/webcasting.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/webcasting.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/wan-link/</loc>
		<lastmod>2022-12-13T14:20:22+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/wan-link.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/wan-link.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/what-is-quadrature-amplitude-modulation/</loc>
		<lastmod>2022-12-18T08:20:42+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/What-is-Quadrature-amplitude-modulation.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/What-is-Quadrature-amplitude-modulation.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/QAM-Mathematical-model.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/carrierless-amplitude-and-phase-modulation-cap/</loc>
		<lastmod>2022-12-18T08:22:59+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/cap-carrierless-amplitude-and-phase-modulation.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/modulation/</loc>
		<lastmod>2022-12-18T08:25:19+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/modulation.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/modulation.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/digital-to-analog-conversion/</loc>
		<lastmod>2022-12-18T08:31:34+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/image-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/image-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/image-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/image-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/image-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/image-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/image-12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/optical-burst-switching-obs/</loc>
		<lastmod>2022-12-20T15:59:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/Optical-Burst-Switching.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/Optical-Burst-Switching.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/end-user-license-agreement-eula/</loc>
		<lastmod>2022-12-18T09:45:03+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/eula-example.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/eula-example.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/eula-windows-10-about.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/packet-forwarding/</loc>
		<lastmod>2022-12-18T10:05:30+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/packet-forwarding.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/packet-forwarding.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/what-is-an-ip-spoofing-attack/</loc>
		<lastmod>2022-12-18T12:48:48+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/12/IP-Spoofing.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/12/IP-Spoofing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/axfr-request/</loc>
		<lastmod>2022-12-18T12:58:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ixfr-incremental-zone-transfer.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ixfr-incremental-zone-transfer.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/internet-of-things-iot/</loc>
		<lastmod>2022-12-23T15:35:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/Internet-of-Things-IoT.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/Internet-of-Things-IoT.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/IoT-in-transportation.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/opendoc/</loc>
		<lastmod>2022-12-21T08:21:20+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/OpenDoc.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/OpenDoc.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/object-linking-and-embedding-ole/</loc>
		<lastmod>2022-12-21T08:22:27+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/OLE-object-linking-and-embedding.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/OLE-object-linking-and-embedding.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/border-gateway-protocol-bgp/</loc>
		<lastmod>2022-12-21T17:04:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/border-gateway-protocol-bgp-optimal.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/border-gateway-protocol-bgp-optimal.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/payload-type-indicator-pti/</loc>
		<lastmod>2022-12-28T12:14:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/payload-type-indicator-pti.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/payload-type-indicator-pti.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/difference-between-utp-cable-cat5-and-cat6/</loc>
		<lastmod>2022-12-30T15:56:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/Difference-betweenUTP-cable-CAT5-and-CAT6.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/Difference-betweenUTP-cable-CAT5-and-CAT6.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/difference-between-a-public-ip-address-and-a-private-ip-address/</loc>
		<lastmod>2023-01-05T09:23:23+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/01/Difference-Between-Public-IP-Address-and-Private-IP-Address.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/01/Difference-Between-Public-IP-Address-and-Private-IP-Address.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/starting-to-understand-quantum-computing-in-a-simple-way/</loc>
		<lastmod>2023-01-07T08:17:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/01/Starting-to-understand-quantum-computing-in-a-simple-way.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/01/Starting-to-understand-quantum-computing-in-a-simple-way.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/quantum-processor-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/national-institute-of-standards-and-technology-nist-cybersecurity-framework-csf/</loc>
		<lastmod>2023-01-09T18:44:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/nist-csf.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/nist-csf.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/difference-between-port-80-and-port-443/</loc>
		<lastmod>2023-01-11T10:13:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/01/Difference-between-port-80-and-port-443.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/01/Difference-between-port-80-and-port-443.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/opening-ports-in-a-firewall.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/edge-traversal/</loc>
		<lastmod>2023-01-01T11:09:58+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/01/edge-traversal-windows-defender.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/01/edge-traversal-windows-defender.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/firewall/</loc>
		<lastmod>2023-01-01T11:17:07+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/network-level-firewall.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/network-level-firewall.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/enhanced-category-5-cabling/</loc>
		<lastmod>2023-01-01T11:21:40+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/cat5e-cable.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/cat5e-cable.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/category-5-cabling/</loc>
		<lastmod>2023-01-01T11:27:03+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/cat5-cable.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/cat5-cable.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/what-is-networking/</loc>
		<lastmod>2023-01-01T12:17:53+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/computer-networking-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/computer-networking-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/lan-and-wan.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/osi-model.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/secure-sockets-layer-ssl/</loc>
		<lastmod>2023-01-26T09:47:38+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/secure-sockets-layer-ssl.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/secure-sockets-layer-ssl.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/public-key-cryptography/</loc>
		<lastmod>2023-01-26T09:51:56+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/public-key-cryptography.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/public-key-cryptography.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/microsoft-proxy-server/</loc>
		<lastmod>2023-01-26T09:58:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/cloud-computing/</loc>
		<lastmod>2023-01-26T10:05:09+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/cloud-computing.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/cloud-computing.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/cloud-computing-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/codec/</loc>
		<lastmod>2023-01-26T10:08:59+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/codec.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/codec.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/symmetric-encryption/</loc>
		<lastmod>2023-01-26T10:12:13+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/symmetric-encryption.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/symmetric-encryption.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/stream-cipher.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/block-cipher.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/08/man-in-the-middle-atack.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/data-link-control-dlc/</loc>
		<lastmod>2023-02-19T18:14:11+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/data-link-control-protocol.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/data-link-control-protocol.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/netstat-command/</loc>
		<lastmod>2023-02-28T17:17:38+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/11/netstat-command.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/02/netstat-command.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/routing-information-protocol-rip/</loc>
		<lastmod>2023-03-03T18:17:36+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/rip-overview.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/rip-overview.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ddr-ram/</loc>
		<lastmod>2023-05-17T11:06:56+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/03/ddr-ram.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/03/ddr-ram.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/computer-networking-acronyms/</loc>
		<lastmod>2023-05-18T09:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/computer-networking-acronyms.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/computer-networking-acronyms-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/local-area-network-lan/</loc>
		<lastmod>2023-05-18T09:04:20+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/local-area-network-LAN.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/local-area-network-LAN.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/internet-standard-management-framework/</loc>
		<lastmod>2023-05-18T11:17:12+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/03/the-first-rfc.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/rfc-how-internet-works.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/request-for-comments-rfc/</loc>
		<lastmod>2023-05-18T11:28:57+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/request-for-comments.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/request-for-comments.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/rfc-how-internet-works.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/unleashing-nostalgia-the-zx-spectrum/</loc>
		<lastmod>2023-05-18T15:31:21+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/zx-spectrum-48k-sinclair-research.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/zx-spectrum-48k-sinclair-research.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/zolog-z80-zx-spectrum-cpu.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/tape-recorder-for-zx-spectrum.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/zx-spectrum-coding-basic-print-screen.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/parity-bit/</loc>
		<lastmod>2023-05-18T19:01:37+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/parity-bit.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/parity-bit.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/data-encryption-standard-des/</loc>
		<lastmod>2023-05-18T19:04:52+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/data-encription-standard-flow-diagram.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/data-encription-standard-flow-diagram.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/network-packet/</loc>
		<lastmod>2023-05-18T19:06:05+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/network-packet.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/network-packet.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/synchronous-transmission/</loc>
		<lastmod>2023-05-18T19:10:24+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/synchronous-transmission.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/synchronous-transmission.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/understanding-critical-applications/</loc>
		<lastmod>2023-05-19T14:49:13+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/critical-applications.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/critical-applications.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/bidirectional-path-switched-ring-bpsr/</loc>
		<lastmod>2023-05-19T14:51:36+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/bidirectional-path-switched-ring.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/bidirectional-path-switched-ring.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ecc-ram/</loc>
		<lastmod>2023-05-19T14:52:59+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/ecc-ram.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/ecc-ram.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/dns-query/</loc>
		<lastmod>2023-05-24T09:05:53+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/dns-query.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/dns-query.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/name-lookup/</loc>
		<lastmod>2023-05-24T09:46:29+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/name-server-nslookup.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/name-server-nslookup.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/local-address-table-lat/</loc>
		<lastmod>2023-05-24T10:33:05+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/local-address-table-proxy-server.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/local-address-table-proxy-server.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/security-assertion-markup-language-saml/</loc>
		<lastmod>2023-05-24T14:40:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/Security-Assertion-Markup-Language-SAML.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/Security-Assertion-Markup-Language-SAML.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/microsoft-sql-server/</loc>
		<lastmod>2023-05-26T08:36:51+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/microsoft-sql-server-logo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/microsoft-sql-server-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/transact-sql-t-sql/</loc>
		<lastmod>2023-05-26T08:39:07+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/transact-sql.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/transact-sql.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/structured-query-language-sql/</loc>
		<lastmod>2023-05-26T08:42:25+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/structured-query-language-sql.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/structured-query-language-sql.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/nosql-database-concepts/</loc>
		<lastmod>2023-05-30T10:28:59+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/nosql-database-concepts.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/nosql-database-concepts.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/Scalability-of-NoSQL.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/flexibility-in-nosql.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/parent-domain/</loc>
		<lastmod>2023-06-03T17:18:33+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/parent-domain.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/parent-domain.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/msconfig-windows-system-configuration-utility/</loc>
		<lastmod>2023-06-03T18:01:07+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/06/msconfig.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/06/msconfig.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/boot-ini/</loc>
		<lastmod>2023-06-03T18:02:30+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/boot-ini-example.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/active-volume/</loc>
		<lastmod>2023-06-03T18:03:31+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/active-volume.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/active-volume.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/microsoft-official-curriculum-moc/</loc>
		<lastmod>2023-06-03T18:20:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/service-level-agreement-sla/</loc>
		<lastmod>2023-06-03T18:36:40+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/service-level-agreement-sla.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/service-level-agreement-sla.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/small-form-factor-pluggable-sfp/</loc>
		<lastmod>2023-06-03T19:05:34+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/06/Small-Form-Factor-Pluggable.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/06/Small-Form-Factor-Pluggable.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/1000baset/</loc>
		<lastmod>2023-06-03T20:42:48+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/1000base-t-network.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/1000base-t-network.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/what-is-a-transceiver/</loc>
		<lastmod>2023-06-03T20:44:15+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/07/transceiver-nic.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/07/transceiver-nic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/attenuation/</loc>
		<lastmod>2023-06-10T08:22:31+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/attenuation.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/attenuation.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/attenuation-to-crosstalk-ratio-acr/</loc>
		<lastmod>2023-06-10T08:27:11+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/attenuation-to-crosstalk-ratio-acr.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/attenuation-to-crosstalk-ratio-acr.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/data-cabling-how-to-plan-ahead/</loc>
		<lastmod>2023-06-10T08:30:53+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/07/data-communications-panel-min.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/07/data-communications-panel-min.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/shielded-twisted-pair-cable-stp.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/07/wire-gauge-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/cable-tester/</loc>
		<lastmod>2023-06-10T08:35:22+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/cable-tester.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/cable-tester.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/tcp-window-optimizing-data-flow-in-network-communication/</loc>
		<lastmod>2023-06-10T08:58:41+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/06/tcp-window.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/06/tcp-window.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/content-delivery-networks-unleashing-the-power-of-cdns/</loc>
		<lastmod>2023-06-12T09:13:55+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/06/content-delivery-networks.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/06/content-delivery-networks.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/peer-to-peer-network-p2p/</loc>
		<lastmod>2023-06-12T09:21:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/peer-to-peer-laptops-e1694249734230.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/peer-to-peer-network.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/unstructured-peer-to-peer-network-diagram.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/structured-DHT-peer-to-peer-network-diagram.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/fibre-channel/</loc>
		<lastmod>2023-06-12T10:18:41+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/fibre-channel.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/fibre-channel.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/demystifying-storage-area-network-san/</loc>
		<lastmod>2023-06-12T10:20:36+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/storage-area-network-san.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/storage-area-network-san.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/storage-area-network-SAN.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/what-is-SAN.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/relational-database-a-comprehensive-guide/</loc>
		<lastmod>2023-06-12T10:21:34+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/relational-database.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/relational-database.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/postgreSQL.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/IBM-Db2.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/graph-database.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/data-normalization.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/05/big-data-systems.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/network-overhead-optimizing-efficiency-in-networking/</loc>
		<lastmod>2023-06-12T10:23:02+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/06/network-overhead.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/06/network-overhead.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/round-trip-time-rtt/</loc>
		<lastmod>2023-06-12T10:44:29+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/06/round-trip-time-rtt.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/06/round-trip-time-rtt.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/the-evolution-of-wi-fi-technology-and-its-impact-on-modern-networks/</loc>
		<lastmod>2023-06-12T14:45:19+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/02/evolution-of-wi-fi-technology.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/02/evolution-of-wi-fi-technology.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/06/hot-desking.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/06/wi-fi-6-E.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/06/li-fi-technology.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/understanding-the-relationship-between-bits-and-bytes/</loc>
		<lastmod>2023-06-13T08:37:57+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/06/Relationship-between-Bits-and-Bytes.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/06/Relationship-between-Bits-and-Bytes.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/06/Origin-of-bit-and-Byte.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/the-world-of-networking-an-in-depth-conversation-with-cisco-veteran-john/</loc>
		<lastmod>2023-06-13T09:28:21+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/06/interview-with-john.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/06/interview-with-john.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/windows-1-0-microsofts-bold-leap-into-guis-1985/</loc>
		<lastmod>2023-06-13T15:58:11+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/06/windows-1-0.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/06/windows-1-0.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/microsoft-windows/</loc>
		<lastmod>2023-06-13T16:10:30+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/microsoft-windows-os-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/microsoft-windows-os-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ip-address/</loc>
		<lastmod>2023-06-14T10:56:45+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Ip-address-ipv4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Ip-address-ipv4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/internet-protocol-ip/</loc>
		<lastmod>2023-06-14T10:57:16+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/internet-protocol-in-tcp-ip.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/internet-protocol-in-tcp-ip.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/internet-protocol-packets-structure.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/IP-Frame.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/network-protocol/</loc>
		<lastmod>2023-06-14T10:58:40+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/osi-model.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/osi-protocols-193x292.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/router/</loc>
		<lastmod>2023-06-14T10:59:58+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/router.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/router.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/router-on-a-network.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/serial-transmission/</loc>
		<lastmod>2023-06-14T11:01:25+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/12/serial-transmission.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/12/serial-transmission.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/routing-table/</loc>
		<lastmod>2023-06-14T11:03:02+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/routing-table.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/routing-table.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ethernet-switch/</loc>
		<lastmod>2023-06-14T11:03:20+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/network-switch.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/network-switch.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ethernet-switch.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/crosstalk/</loc>
		<lastmod>2023-06-14T11:26:42+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/crosstalk.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/crosstalk.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/harnessing-cloud-networking-a-boon-for-small-businesses/</loc>
		<lastmod>2023-07-29T11:55:56+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/images/cloud-networking.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/images/understanding-cloud-networking-dCG.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/images/cloud-networking-small-businesses-2Ix.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/images/cloud-networking-r96.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/images/cloud_networking_benefits-3Vx.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/images/cloud_networking-YwP.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/bandwidth/</loc>
		<lastmod>2023-07-29T17:41:21+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/bandwidth-explained.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/bandwidth-explained.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/bandwidth.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/mastering-the-summit-exploring-the-7th-layer-of-the-osi-model/</loc>
		<lastmod>2023-07-29T19:35:58+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/07/7th-layer-of-osi-model.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/07/7th-layer-of-osi-model.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/unraveling-the-threads-of-rtsp-the-pulse-of-live-streaming/</loc>
		<lastmod>2023-07-29T19:40:34+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/07/what-is-RTSP-real-time-streaming-protocol.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/07/what-is-RTSP-real-time-streaming-protocol.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/netbios-name/</loc>
		<lastmod>2023-07-29T20:07:05+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/netBIOS-name.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/netBIOS-name.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/voice-over-ip-voip/</loc>
		<lastmod>2023-08-01T13:38:29+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/what-is-voip.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/what-is-voip.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/What-is-the-Difference-between-VoIP-and-Cellular-Phone.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/What-are-disadvantages-of-VoIP-zoom.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/voice-over-ip.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/quantum-computing-basics-unraveling-the-complexity-and-limitations/</loc>
		<lastmod>2023-08-03T11:21:45+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/Quantum-Computing-Basics.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/Quantum-Computing-Basics.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/closer-look-at-qubits.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/backbone-router/</loc>
		<lastmod>2023-08-03T14:59:56+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/backbone-router-connection-as.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/backbone-router-connection-as.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/backbone-router.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/mastering-the-art-of-crafting-a-request-for-proposal/</loc>
		<lastmod>2023-08-04T11:01:53+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/request-for-proposal-rfp.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/request-for-proposal-rfp.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/understanding-critical-data-essential-aspects-exploration/</loc>
		<lastmod>2023-08-04T15:41:39+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/images/concept-of-critical-data.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/images/concept-of-critical-data.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/images/critical-data-YLU.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/images/critical-data-n2p.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/images/Understanding-Critical-Data-Cdn.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/images/understanding-critical-data-gE1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/images/critical-data-understanding-WGS.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/1000basesx/</loc>
		<lastmod>2023-08-05T12:48:41+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/1000base-sx-adapter.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/1000base-sx-adapter.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/layer-4-switch/</loc>
		<lastmod>2023-08-05T13:08:47+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/layer4-switch.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/layer4-switch.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/layer-4-switch.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/nagles-algorithm/</loc>
		<lastmod>2023-08-05T13:35:39+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/nagle-and-non-nagle-comparative.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/nagle-and-non-nagle-comparative.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ntfs-file-system/</loc>
		<lastmod>2023-08-05T15:30:29+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ntfs-file-system.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ntfs-file-system.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ntfile-system.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/country-code/</loc>
		<lastmod>2023-08-07T16:13:14+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/07/coutry-codes-iso-3166.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/07/coutry-codes-iso-3166.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/demystifying-cleartype-microsofts-answer-to-crisp-and-clear-text/</loc>
		<lastmod>2023-08-07T16:40:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/cleartype-technology.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/cleartype-technology.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/network-level-authentication-nla-securing-connections/</loc>
		<lastmod>2023-08-07T17:43:47+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/network-level-authentication-nla.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/network-level-authentication-nla.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/windows-95/</loc>
		<lastmod>2023-08-07T20:31:59+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/microsoft-windows-95-os.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/microsoft-windows-95-os.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/windows-95.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/windows-95-architecture.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/windows-95-floppy-disk.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Windows-95-launch.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/unraveling-identity-provider-securing-digital-realms/</loc>
		<lastmod>2023-08-08T16:13:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/Identity-Provider-IdP.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/Identity-Provider-IdP.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ashton-tate-the-dbase-creators/</loc>
		<lastmod>2023-08-08T16:00:05+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/ashton-tate.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/ashton-tate.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/paradox-the-database-titan-of-yesteryears/</loc>
		<lastmod>2023-08-09T18:04:45+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/paradox-database.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/paradox-database.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/open-database-connectivity-odbc/</loc>
		<lastmod>2023-08-08T18:21:52+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/open-database-connectivity-ODBC.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/open-database-connectivity-ODBC.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ole-db/</loc>
		<lastmod>2023-08-08T18:23:06+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/ole-db.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/ole-db.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/microsoft-jet/</loc>
		<lastmod>2023-08-08T18:24:15+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/microsoft-jet-database-engine.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/microsoft-jet-database-engine.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/the-weasel-effect-solving-one-problem-only-to-create-a-bigger-one/</loc>
		<lastmod>2023-08-09T10:44:59+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/07/weasel-effect.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/07/weasel-effect.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/07/weasels-introduced-into-an-old-building-to-rid-it-of-a-rat-infestation.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/07/more-roads-more-cars.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/07/antibiotics-overuse-.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/07/ddt-mosquito-control.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/frequently-asked-questions-faq/</loc>
		<lastmod>2023-08-09T13:45:49+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/frequently-asked-question-faq.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/frequently-asked-question-faq.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/network-infrastructure-design/</loc>
		<lastmod>2023-08-09T13:50:05+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/01/network-infrastructure-design.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/01/network-infrastructure-design.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/01/layers-in-campus-network.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/01/image-2-home-computer-connecting-to-isp.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/01/image3-data-connection-originating-from-home.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/01/Image4-three-different-networks.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/01/192-168-0-0-255-255-254-0-23.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/01/192-168-0-0-second.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/01/image5-the-gateway-for-a-network.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/01/image6-three-floors-building.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/01/image7-grouping-for-port-base-vlan.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/01/image10-the-three-router-campus-LAN.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/01/image11-Network-settings-configuration-for-the-default-gateway.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/graphic-user-interface-gui/</loc>
		<lastmod>2023-08-14T16:40:51+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/graphic-user-interface-gui.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/graphic-user-interface-gui.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/xeroxs-palo-alto-research-center-parc/</loc>
		<lastmod>2023-08-16T17:51:30+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/parc-palo-alto-research-center-xerox.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/parc-palo-alto-research-center-xerox.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/aloha-network/</loc>
		<lastmod>2023-08-11T18:13:10+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/aloha-network.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/object-oriented-language-ool/</loc>
		<lastmod>2023-08-11T18:14:40+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/object-oriented-language.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/object-oriented-language.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ethernet/</loc>
		<lastmod>2023-08-11T18:16:23+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/what-is-ethernet.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/what-is-ethernet.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ethernet-full-duplex-frame-format.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/original-ethernet.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/modern-ethernet.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/xerox-network-systems-xns/</loc>
		<lastmod>2023-08-11T18:18:55+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/xns-xerox-network-systems.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/xns-xerox-network-systems.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/mastering-network-cabling-the-secrets-of-reliable-connections/</loc>
		<lastmod>2023-08-11T18:52:46+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/07/mastering-network-cabling-importance-of-reliable-cabling.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/07/mastering-network-cabling-importance-of-reliable-cabling.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/golden-rules-of-data-cabling.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/linux/</loc>
		<lastmod>2023-08-13T08:45:16+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/linux.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/linux.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/linux-lamp.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/common-security-threats-in-computer-networks/</loc>
		<lastmod>2023-08-16T15:14:22+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/09/Common-Security-Threats-in-Computer-Networks.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/09/Common-Security-Threats-in-Computer-Networks.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/guarding-the-fortress-understanding-sensitive-personal-information-spi/</loc>
		<lastmod>2023-08-16T15:16:31+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/sensitive-personal-information-spi.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/sensitive-personal-information-spi.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/SPI-Breaches-office-of-personnel-management.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/difference-between-http-and-https/</loc>
		<lastmod>2023-08-20T16:26:54+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/Difference-between-HTTP-and-HTTPS.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/Difference-between-HTTP-and-HTTPS.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/decoding-finite-state-machines-in-ai/</loc>
		<lastmod>2023-08-17T09:23:30+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/finite-state-machines-fsm.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/finite-state-machines-fsm.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/metcalfes-law-powering-the-networked-world/</loc>
		<lastmod>2023-08-22T16:22:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/metcalfes-law.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/metcalfes-law.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/deciphering-the-turing-test-ais-humanity-gauge/</loc>
		<lastmod>2023-08-19T15:58:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/turing-test.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/turing-test.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/chacha20-the-dance-of-cryptography/</loc>
		<lastmod>2023-08-24T17:56:42+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/chacha20.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/chacha20.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/https/</loc>
		<lastmod>2023-08-18T18:21:35+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/12/HTTPS.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/12/HTTPS.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/db-connector/</loc>
		<lastmod>2023-08-19T20:11:17+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/db-connector-definition.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/db-connector-definition.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/db-connector.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/cross-validation-and-knn-algorithm/</loc>
		<lastmod>2023-08-21T15:10:36+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/kNN-algorithm.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/kNN-algorithm-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/transformers-in-ai-decoding-the-revolution/</loc>
		<lastmod>2023-08-22T09:41:33+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/transformers-in-ai-artificial-intelligence.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/transformers-in-ai-artificial-intelligence.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/neuromorphic-design-bridging-brains-and-bytes/</loc>
		<lastmod>2023-08-22T09:43:52+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/neuromorphic-design.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/neuromorphic-design.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/jetpack-exe/</loc>
		<lastmod>2023-08-22T13:18:38+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/jetpack-tool.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/jetpack-tool.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/machine-learning-basics-start-here/</loc>
		<lastmod>2023-08-23T00:49:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/machine-learning-basics.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/machine-learning-basics.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/importance-of-cyber-security-in-the-digital-era/</loc>
		<lastmod>2023-08-23T11:32:11+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/01/Cyber-Security-in-the-Digital-Era.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/01/Cyber-Security-in-the-Digital-Era.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/sha-256-unmasked-deciphering-cryptographic-hash-functions/</loc>
		<lastmod>2023-08-24T10:06:33+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/sha256.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/sha256.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/sha-2-family.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/sha256-512bit-message-round.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/digital-signature.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/sha256-blockchain-technology.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/sha-3-algorithm.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/bayesian-network-deciphering-its-intricacies/</loc>
		<lastmod>2023-08-27T14:42:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/bayesian-network.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/bayesian-network.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/reverend-thomas-bayes.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/acyclic-graphs.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/Conditional-Probability-Tables-CPTs-in-bayesian-networks.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/computer-system-analyst-demystifying-the-role/</loc>
		<lastmod>2023-08-30T15:06:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/Computer-System-Analyst.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/Computer-System-Analyst.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/analyst-erp.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/iot-analyst.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/hackathon-innovating-solutions-at-lightning-speed/</loc>
		<lastmod>2023-08-28T20:48:16+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/openBSD-Hackathon.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/openBSD-Hackathon.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/game-jam.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/hackathon-in-singapore-carousell.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/8-3-filename/</loc>
		<lastmod>2023-08-31T18:26:57+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/8.3-filename-sm.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/8.3-filename-sm.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/the-role-of-ssl-in-todays-cybersecurity-landscape/</loc>
		<lastmod>2023-09-01T10:50:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/Role-of-SSL-in-Cybersecurity.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/Role-of-SSL-in-Cybersecurity.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/ssl-evolving-to-tls.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/understanding-large-language-models-behind-the-magic/</loc>
		<lastmod>2023-09-03T11:20:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/Large-Language-Models-LLMs.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/Large-Language-Models-LLMs.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/customer-premises/</loc>
		<lastmod>2023-09-05T17:59:55+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/customer-premises.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/customer-premises.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/why-does-my-company-need-a-firewall-right-away/</loc>
		<lastmod>2023-09-05T18:01:23+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/firewall-main.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/firewall-main.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/firewall-and-IDS.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/firewall-cisco-dmz.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/wifi-booster-boost-your-signal-today/</loc>
		<lastmod>2023-09-06T10:37:58+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/How-to-Get-Wi-Fi-signal-in-a-Distant-Room.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/How-to-Get-Wi-Fi-signal-in-a-Distant-Room.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/how-to-get-wi-fi-signal-in-a-distant-room/</loc>
		<lastmod>2023-09-06T10:39:54+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/How-to-Get-Wi-Fi-signal-in-a-Distant-Room.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/How-to-Get-Wi-Fi-signal-in-a-Distant-Room.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/wireless-networking/</loc>
		<lastmod>2023-09-06T10:47:43+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/wireless-networking-lan.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/wireless-networking-lan.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/wireless-networking.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/snmp-protocol-data-unit-the-heart-of-network-management/</loc>
		<lastmod>2023-09-06T14:55:45+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/protocol-data-unit-pdu.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/protocol-data-unit-pdu.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/simple-network-management-protocol-snmp/</loc>
		<lastmod>2023-09-06T15:04:38+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/SNMP.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/SNMP.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/introduction-to-problem-solving-in-ai/</loc>
		<lastmod>2023-09-17T15:48:54+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/Introduction-to-Problem-Solving-in-AI.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/Introduction-to-Problem-Solving-in-AI.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/securing-your-website-a-guide-to-http-header-vulnerabilities/</loc>
		<lastmod>2023-09-08T16:05:25+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/HTTP-Headers-Vulnerabilities.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/HTTP-Headers-Vulnerabilities.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/http-status-codes/</loc>
		<lastmod>2023-09-08T16:20:24+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/http-status-codes.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/http-status-codes.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/404-http-status-code.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/http-cookie/</loc>
		<lastmod>2023-09-08T16:29:54+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/http-cookies.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/http-cookies.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/hypertext-transfer-protocol-http/</loc>
		<lastmod>2023-09-08T16:36:07+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/http.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/http.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/http-header-example.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/HTTP-Request-methods.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/http-caching.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/HTTP-messages.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Tim-Berners-Lee.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/host-header-names/</loc>
		<lastmod>2023-09-08T16:39:11+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/host-header-name.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/host-header-name.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/url-switching/</loc>
		<lastmod>2023-09-08T19:07:27+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/02/url-switching.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/02/url-switching.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/mx-record/</loc>
		<lastmod>2023-09-08T19:54:36+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/mx-record.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/mx-record.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/dns-server/</loc>
		<lastmod>2023-09-08T19:57:46+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/dns-server.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/dns-server.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/network-address-translation-nat/</loc>
		<lastmod>2023-09-08T20:04:25+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/network-address-translation-nat.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/network-address-translation-nat.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/mastering-network-time-protocol-ntp-a-comprehensive-guide/</loc>
		<lastmod>2023-09-10T15:15:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/Network-Time-Protocol-NTP.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/Network-Time-Protocol-NTP.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/NTP-hierarchical-semi-layered-architecture.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/network-id/</loc>
		<lastmod>2023-09-09T10:14:42+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/network-id-class-A.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/network-id-class-A.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/real-time-transport-protocol-rtp/</loc>
		<lastmod>2023-09-09T17:46:04+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/12/4-1-rtp-Transport-sublayer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/12/4-1-rtp-Transport-sublayer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/12/4-2-socket-interface.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/12/4-3-RTP-Header-Fields.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/12/4-4-Audio-Payload.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/12/4-5-Video-Payload.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/12/4-6-Boths-sender-and-receivers.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/12/4-6-1-Bandwidth-Scaling-Senders.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/12/4-6-2-Bandwidth-Scaling-Receivers.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/12/4-7-H323-END-SYSTEMS.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/12/4-8-H323-PROTOCOL-ARCHITECTURE.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/12/4-9-H323-Channels.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/12/4-10-H323-Terminals-ans-Gatekeeper-same-lan.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/latency/</loc>
		<lastmod>2023-09-09T17:48:56+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/latency.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/latency.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ping-command.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/jabber/</loc>
		<lastmod>2023-09-09T17:52:29+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/jabber-long-frame.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/jabber-long-frame.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/decoding-solomonoffs-theory-of-inductive-inference/</loc>
		<lastmod>2023-09-11T15:31:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/inductive-inference-Solomonoff-Theory-AI.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/inductive-inference-Solomonoff-Theory-AI.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/Ray-Solomonoff.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/Occams-Razor-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/well-known-port-numbers/</loc>
		<lastmod>2023-09-10T16:21:06+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/well-known-ports.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/well-known-ports.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/how-to-improve-wi-fi-signal-8-objects-you-must-avoid/</loc>
		<lastmod>2023-09-12T16:52:28+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/How-to-Improve-Wi-Fi-Signal.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/microwave.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/The-Aquarium-Effect-on-Signal-Strength.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/books-with-hardcover-bad-for-wi-fi-signal.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/religious-objects-can-absorve-or-reflect-w-fi.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/edge-computing-the-frontier-of-modern-data-processing/</loc>
		<lastmod>2023-09-13T14:31:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/edge-computing.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/edge-computing.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/deep-learning-basics-first-lecture-video/</loc>
		<lastmod>2023-09-12T10:59:50+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/deep-learning-basics-first-lecture-mit-video.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/deep-learning-basics-first-lecture-mit-video.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/demystifying-the-round-robin-algorithm/</loc>
		<lastmod>2023-09-12T11:00:01+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/round-robin-algorithm.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/round-robin-algorithm.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/data-science-basics-deciphering-digital-data-deluge/</loc>
		<lastmod>2023-09-12T11:00:25+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/data-science-basics.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/data-science-basics.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/start-your-python-journey-project-minipass/</loc>
		<lastmod>2023-09-14T14:25:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/start-your-journey-with-python-project-minipass.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/start-your-journey-with-python-project-minipass.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/minipass-project-phython.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/post-office-protocol-version-3-pop3/</loc>
		<lastmod>2023-09-14T10:15:01+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/post-office-protocol-v3-pop3.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/post-office-protocol-v3-pop3.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/python-tic-tac-toe-game-fun-and-simple-project/</loc>
		<lastmod>2023-09-21T16:49:56+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/Python-Tic-Tac-Toe-Game.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/Python-Tic-Tac-Toe-Game.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/demystifying-sql-injection-types-threats-and-safeguards/</loc>
		<lastmod>2023-09-18T07:56:25+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/SQL-Injection-Types.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/SQL-Injection-Types.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/digital-communication-service-dcs-a-comprehensive-guide/</loc>
		<lastmod>2023-09-16T16:41:55+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/Digital-Communication-Service.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/Digital-Communication-Service.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/global-system-for-mobile-communications-gsm/</loc>
		<lastmod>2023-09-16T17:19:42+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/gsm.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/gsm.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/gsm-global-system-for-mobile-communication.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/subscriber-identity-module-sim-a-comprehensive-guide/</loc>
		<lastmod>2023-09-19T14:28:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/Subscriber-Identity-Module-SIM.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/Subscriber-Identity-Module-SIM.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/programming-languages-101-in-a-single-article/</loc>
		<lastmod>2023-09-20T14:32:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/programming-languages.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/programming-languages.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/implementing-dhcp-option-82-for-security/</loc>
		<lastmod>2023-09-22T14:06:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/implementing-dhcp-option-82-relay.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/implementing-dhcp-option-82-relay.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/what-are-symbolic-links-and-how-do-they-relate-to-relative-paths/</loc>
		<lastmod>2023-09-23T10:02:30+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/Symbolic-Links-and-Relative-Paths.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/Symbolic-Links-and-Relative-Paths.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/relative-path/</loc>
		<lastmod>2023-09-20T10:54:20+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/relative-path-windows.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/relative-path-windows.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/the-evolution-of-traditional-currency-to-cryptocurrency/</loc>
		<lastmod>2023-09-24T14:25:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/Evolution-of-Traditional-Currency-to-Cryptocurrency.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/Evolution-of-Traditional-Currency-to-Cryptocurrency.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/universal-serial-bus-usb/</loc>
		<lastmod>2023-09-25T11:29:29+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/Universal-Serial-Bus-USB.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/usb-universal-serial-bus.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/kernel-mode/</loc>
		<lastmod>2023-09-26T10:05:21+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/kernel-mode-windows-systems.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/kernel-mode-windows-systems.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/kernel-mode-windows-nt.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/windows-kernel-attacks-unveiling-the-shadowy-underbelly/</loc>
		<lastmod>2023-09-26T15:06:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/windows-kernel-attacks.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/windows-kernel-attacks.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/disposable-virtual-numbers-your-ultimate-guide-to-digital-privacy/</loc>
		<lastmod>2023-09-27T08:46:06+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/Disposable-Virtual-Numbers.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/Disposable-Virtual-Numbers.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/spam/</loc>
		<lastmod>2023-09-28T13:58:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/spam-emails.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/spam-emails.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/h-323/</loc>
		<lastmod>2023-09-27T18:41:19+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/h-323-explained.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/h-323-explained.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/h323.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/generative-adversarial-networks-a-comprehensive-guide-to-gans/</loc>
		<lastmod>2023-09-29T15:03:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/Generative-Adversarial-Networks-GANs.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/Generative-Adversarial-Networks-GANs.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/digital-certificate/</loc>
		<lastmod>2023-09-29T16:02:12+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/digital-certificate.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/digital-certificate.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/digital-certificate-private-public-key.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/what-to-do-when-your-firewall-fails/</loc>
		<lastmod>2023-10-02T13:32:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/What-To-Do-When-Your-Firewall-Fails.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/What-To-Do-When-Your-Firewall-Fails.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/botnet-herding-mastering-the-art-of-cyber-control/</loc>
		<lastmod>2023-10-03T14:18:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/botnet-hearding-mastering-the-art-of-cyber-control.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/botnet-hearding-mastering-the-art-of-cyber-control.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/internet-relay-chat-irc/</loc>
		<lastmod>2023-10-03T10:26:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/internet-relay-chat-irc.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/internet-relay-chat-irc.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/internet-relay-chat-mIRC.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/blockchain-technology-revolutionizing-trust-and-transactions/</loc>
		<lastmod>2023-10-05T14:07:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/blockchain-technology-what-is-it.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/blockchain-technology-what-is-it.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/DAO-vs-traditional-organizations.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/proof-of-work-vs-proof-of-stake.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/blockchain-healthcare-records.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/blockchain-enable-smart-cities.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/dhcp-scope/</loc>
		<lastmod>2023-10-04T11:18:46+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/dhcp-scope.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/dhcp-scope.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/multiplexing/</loc>
		<lastmod>2023-10-05T16:04:53+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/multiplexing-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/multiplexing-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/multiplexing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/routing-algorithm/</loc>
		<lastmod>2023-10-06T09:41:56+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/routing-algorithm-explained.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/routing-algorithm-explained.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/routing-algorithm.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/distance-vector-routing-algorithm/</loc>
		<lastmod>2023-10-06T12:55:11+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Distance-Vector-Routing-Algorithm-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Distance-Vector-Routing-Algorithm-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/distance-vector-routing-algorithm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/load-balancing/</loc>
		<lastmod>2023-10-06T14:59:12+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/load-balancing.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/load-balancing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/internet-locator-service-ils/</loc>
		<lastmod>2023-10-07T10:11:46+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/internet-locator-service.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/internet-locator-service.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/perceptrons-in-ai-the-building-blocks-of-machine-learning/</loc>
		<lastmod>2023-10-08T10:19:17+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/what-is-a-perceptron-in-AI.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/what-is-a-perceptron-in-AI.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/perceptron-mathematical-representation.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/perceptron-weighted-sum.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/perceptron-activation.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/active-directory-sites-and-services/</loc>
		<lastmod>2023-10-09T10:04:16+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ad-sites-and-services.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ad-sites-and-services.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/active-directory-domains-and-trusts/</loc>
		<lastmod>2023-10-09T10:45:33+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Active-Directory-Domains-and-Trusts.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Active-Directory-Domains-and-Trusts.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/new-trust-wizard.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/active-directory-installation-wizard/</loc>
		<lastmod>2023-10-09T11:03:50+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/active-directory-instalation-wizard.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/active-directory-instalation-wizard.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/lightweight-directory-access-protocol-ldap/</loc>
		<lastmod>2023-10-09T13:28:52+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ldap-access.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ldap-access.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/g-703/</loc>
		<lastmod>2023-10-10T08:19:04+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/g-703.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/g-703.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/g703-at-2048-kbit-per-second.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/administrative-wizards/</loc>
		<lastmod>2023-10-10T08:32:37+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/administrative-wizards-windows-nt.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/administrative-wizards-windows-nt.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ppp-multilink/</loc>
		<lastmod>2023-10-10T09:21:23+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ppp-multilink.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ppp-multilink.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/drop/</loc>
		<lastmod>2023-10-10T09:52:58+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/drop-networking.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/drop-networking.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/duplex/</loc>
		<lastmod>2023-10-10T10:46:01+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/duplex-communication.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/duplex-communication.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/digital-modem/</loc>
		<lastmod>2023-10-10T13:35:19+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/12/digital-modem-definition.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/12/digital-modem-definition.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/american-national-standards-institute-ansi/</loc>
		<lastmod>2023-10-10T13:52:37+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ansi-logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ansi-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/global-catalog/</loc>
		<lastmod>2023-10-10T20:16:51+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/global-catalog-active-directory-infrastructure.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/global-catalog-active-directory-infrastructure.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/active-directory-service-interfaces-adsi/</loc>
		<lastmod>2023-10-11T07:27:05+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/adsi-provider.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/adsi-provider.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/bandwidth-allocation-protocol-bap/</loc>
		<lastmod>2023-10-11T08:08:40+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/bap-bandwidth-allocation-protocol.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/bap-bandwidth-allocation-protocol.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/terminal/</loc>
		<lastmod>2023-10-11T08:17:16+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/terminal-retro-green.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/terminal-retro-green.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/admin-admin/</loc>
		<lastmod>2023-10-11T08:50:11+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/admin-share.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/admin-share.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/brute-force-attack/</loc>
		<lastmod>2023-10-11T09:58:07+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/Brute-Force-Attack.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/Brute-Force-Attack.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/rockyou-logo.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/admin-admin.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/Multi-Factor-Authentication.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/Intrusion-Detection-Systems-lockout-policy.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/failover/</loc>
		<lastmod>2023-10-11T16:11:32+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/failover-computer-networking.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/failover-computer-networking.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/failover.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/load-balancing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/html-based-administration-htmla/</loc>
		<lastmod>2023-10-12T06:58:41+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/htmla-router-administration-browser-interface.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/htmla-router-administration-browser-interface.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/home-server/</loc>
		<lastmod>2023-10-12T09:16:29+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/home-server.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/vmware-workstation-16-player.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/home-server-exchange.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/telco/</loc>
		<lastmod>2023-10-12T09:58:25+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/01/telco-usa.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/01/telco-usa.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/transport-driver-interface-tdi/</loc>
		<lastmod>2023-10-12T10:20:44+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/transport-driver-interface.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/transport-driver-interface.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/backup-site-controller-bsc/</loc>
		<lastmod>2023-10-12T10:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Microsoft-Message-Queue-Server-MSMQ.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Microsoft-Message-Queue-Server-MSMQ.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/credentials/</loc>
		<lastmod>2023-10-12T13:36:35+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/07/what-is-Credentials-in-Computer-Networking.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/07/what-is-Credentials-in-Computer-Networking.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/07/credentials-computer-science.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/Credential-Stuffing.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/secure-vaults-for-credentials.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/global-address-list-gal/</loc>
		<lastmod>2023-10-12T15:11:37+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/global-address-list-gal.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/global-address-list-gal.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/global-address-list.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/in-band-signaling/</loc>
		<lastmod>2023-10-12T16:55:46+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/out-of-band-signaling.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/out-of-band-signaling.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/user-mode/</loc>
		<lastmod>2023-10-13T13:33:29+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/user-mode.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/user-mode.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/user-mode.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/volume-set/</loc>
		<lastmod>2023-10-13T15:20:32+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/volume-set-windows-NT-2000.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/volume-set-windows-NT-2000.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/helper-server/</loc>
		<lastmod>2023-10-13T16:38:50+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/helper-server-microsoft-SMS.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/helper-server-microsoft-SMS.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/dial-up-line/</loc>
		<lastmod>2023-10-14T08:27:01+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/dialup-line.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/dialup-line.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/x-series-protocols/</loc>
		<lastmod>2023-10-14T09:20:12+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/x-series-protocol.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/x-series-protocol.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/link-state-routing-algorithm/</loc>
		<lastmod>2023-10-14T18:12:15+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/link-state-algo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/link-state-algo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/what-is-the-slow-convergence-problem-in-routing-protocols/</loc>
		<lastmod>2023-10-15T07:17:31+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2022/12/the-slow-convergence-problem.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/account-operators-group/</loc>
		<lastmod>2023-10-15T07:56:11+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/account-operators-group.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/account-operators-group.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/host-networking/</loc>
		<lastmod>2023-10-15T11:03:07+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/host-in-networkin.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/host-in-networkin.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ms-dos-mode/</loc>
		<lastmod>2023-10-16T08:09:33+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ms-dos-mode.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ms-dos-mode.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/asymmetric-multiprocessing-amp/</loc>
		<lastmod>2023-10-16T10:03:07+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/asymmetric-multiprocessing-amp.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/asymmetric-multiprocessing-amp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/primary-ring/</loc>
		<lastmod>2023-10-16T10:23:49+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/fddi-primary-and-secondary-ring.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/fddi-primary-and-secondary-ring.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/anonymous-user/</loc>
		<lastmod>2023-10-16T11:20:08+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/anonymous-user.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/anonymous-user.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/child-domain/</loc>
		<lastmod>2023-10-16T15:49:43+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/child-domain-active-directory.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/child-domain-active-directory.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/intelligent-hub/</loc>
		<lastmod>2023-10-17T07:17:23+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/intelligent-hub.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/intelligent-hub.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/account-operator/</loc>
		<lastmod>2023-10-17T08:23:11+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/accountoperators.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/accountoperators.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/administrative-alert/</loc>
		<lastmod>2023-10-17T08:46:16+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/administrative-alert.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/administrative-alert.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ipv4/</loc>
		<lastmod>2023-10-17T14:05:44+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ipv4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ipv4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ping/</loc>
		<lastmod>2023-10-17T14:29:07+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ping-command.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/ping-command.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/star-bus-topology/</loc>
		<lastmod>2023-10-17T15:15:07+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/star-bus.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/star-bus.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ring-topology/</loc>
		<lastmod>2023-10-18T11:30:04+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/07/ring-topology-min.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/07/ring-topology-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/fiber-exhaust/</loc>
		<lastmod>2023-10-18T16:01:13+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/fiber-exhaust.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/fiber-exhaust.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/eseutil/</loc>
		<lastmod>2023-10-18T17:28:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/eseutil-exchange-server.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/eseutil-exchange-server.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/exchange-admin-center.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/net-watcher/</loc>
		<lastmod>2023-10-18T18:42:31+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/net-watcher.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/net-watcher.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/address-record/</loc>
		<lastmod>2023-10-18T20:46:56+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/dns-manager-address-record.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/dns-manager-address-record.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/full-duplex/</loc>
		<lastmod>2023-10-19T06:50:06+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/full-duplex.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/full-duplex.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/remote-desktop-protocol-rdp/</loc>
		<lastmod>2023-10-19T08:05:54+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/remote-desktop-protocol-rdp-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/remote-desktop-protocol-rdp-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/remote-desktop-protocol-rdp.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/remote-desktop-connection.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/archive-attribute/</loc>
		<lastmod>2023-10-19T08:14:32+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/archive-attribute.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/archive-attribute.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/pointer-ptr-record/</loc>
		<lastmod>2023-10-19T08:50:44+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ptr-pointer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ptr-pointer.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/public-switched-telephone-network-pstn/</loc>
		<lastmod>2023-10-19T09:19:48+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/public-switched-telephone-network.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/public-switched-telephone-network.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/breakout-box/</loc>
		<lastmod>2023-10-19T09:45:46+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/breakout-Box-RS-232.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/breakout-Box-RS-232.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/edbutil/</loc>
		<lastmod>2023-10-19T10:05:54+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/edbutil.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/edbutil.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/keyboard-emulator/</loc>
		<lastmod>2023-10-19T13:30:31+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/keyboard-emulator.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/keyboard-emulator.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/advanced-peer-to-peer-networking-appn/</loc>
		<lastmod>2023-10-19T14:00:39+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/appn.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/appn.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/bnc-connector/</loc>
		<lastmod>2023-10-19T14:58:02+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/bnc-connector.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/bnc-connector.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/direct-inward-dialing-did/</loc>
		<lastmod>2023-10-19T19:37:39+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/direct-inward-dialing.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/direct-inward-dialing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/host-id/</loc>
		<lastmod>2023-10-19T20:12:19+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/host-id.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/host-id.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/primary-site-controller-psc/</loc>
		<lastmod>2023-10-19T20:44:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/hacking/</loc>
		<lastmod>2023-10-19T20:59:28+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/02/hacking.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/02/hacking.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/administrators-group/</loc>
		<lastmod>2023-10-20T07:54:44+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/administrators-group-windows-server.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/administrators-group-windows-server.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/name-server-ns-record/</loc>
		<lastmod>2023-10-20T08:07:20+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/ns-record-dns-system.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/ns-record-dns-system.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/advanced-streaming-format-asf/</loc>
		<lastmod>2023-10-20T08:30:33+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/asf.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/asf.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/appc-file-transfer-protocol-aftp/</loc>
		<lastmod>2023-10-20T08:52:13+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/aftp-appc-file-transfer-potocol.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/aftp-appc-file-transfer-potocol.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/frequency-division-multiplexing-fdm/</loc>
		<lastmod>2023-10-20T09:47:59+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/FDM-frequency-division-multiplexing.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/FDM-frequency-division-multiplexing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/modem-eliminator/</loc>
		<lastmod>2023-10-20T12:03:52+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/modem-eliminator.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/modem-eliminator.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/diskperf-command/</loc>
		<lastmod>2023-10-21T08:17:23+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/diskperf.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/diskperf.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/tn5250/</loc>
		<lastmod>2023-10-21T08:32:17+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/tn5250.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/tn5250.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/volume-computers/</loc>
		<lastmod>2023-10-21T09:14:35+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/system-volume-information-folder.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/system-volume-information-folder.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/volume-computer.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/leaf-object/</loc>
		<lastmod>2023-10-21T09:49:51+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/leaf-object-example-mailbox.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/leaf-object-example-mailbox.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/wins-record/</loc>
		<lastmod>2023-10-21T10:11:39+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/wins-record.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/wins-record.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/category-2-cabling/</loc>
		<lastmod>2023-10-22T08:00:45+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/cat-2-pair-cables.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/cat-2-pair-cables.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/connection-point-services-cps/</loc>
		<lastmod>2023-10-22T09:02:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/rs-232/</loc>
		<lastmod>2023-10-23T06:59:36+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/12/rs-232-pinout.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/12/rs-232-pinout.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/group-policy-object-gpo/</loc>
		<lastmod>2023-10-23T07:09:15+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/group-policy-object-gpo.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/group-policy-object-gpo.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/networks-file/</loc>
		<lastmod>2023-10-23T08:16:17+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/networks-file.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/networks-file.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/telephony-application-programming-interface-tapi/</loc>
		<lastmod>2023-10-23T08:52:31+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/telephony-application-programming-interface.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/telephony-application-programming-interface.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/h-323-gateway/</loc>
		<lastmod>2023-10-23T10:15:07+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/h323-gateway.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/h323-gateway.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/simplex-communication/</loc>
		<lastmod>2023-10-23T10:53:55+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/simplex-communication.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/simplex-communication.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/application-log/</loc>
		<lastmod>2023-10-23T16:33:11+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/application-log.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/application-log.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/certified-technical-education-center-ctec/</loc>
		<lastmod>2023-10-24T06:29:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/internet-network-information-center-internic/</loc>
		<lastmod>2023-10-24T06:50:45+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/internic.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/internic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/heartbeat/</loc>
		<lastmod>2023-10-24T08:20:58+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/heartbeat-in-networking.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/heartbeat-in-networking.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/category-1-cabling/</loc>
		<lastmod>2023-10-24T14:36:11+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/cat1-cable.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/cat1-cable.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/add-remove-programs/</loc>
		<lastmod>2023-10-24T15:53:08+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/add-remove-programs-windows-xp.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/add-remove-programs-windows-xp.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/netbios-over-tcp-ip-netbt/</loc>
		<lastmod>2023-10-25T07:21:06+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/NetBIOS-over-TCP-IP.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/NetBIOS-over-TCP-IP.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/dhcp-options/</loc>
		<lastmod>2023-10-25T07:50:34+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/dhcp-option.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/dhcp-option.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/transmission-control-protocol-tcp/</loc>
		<lastmod>2023-10-25T11:06:38+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/transmission-control-protocol-tcp.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/transmission-control-protocol-tcp.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/transmission-control-protocol.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/tcp-segment.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/broadcast-frame/</loc>
		<lastmod>2023-10-25T12:19:42+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/broadcast-frame.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/broadcast-frame.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/b-channel/</loc>
		<lastmod>2023-10-25T14:04:12+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/b-channel-isdn.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/b-channel-isdn.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/collaboration-data-objects-cdo/</loc>
		<lastmod>2023-10-25T14:26:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/cdo-collaboration-data-objects.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/cdo-collaboration-data-objects.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/coupler/</loc>
		<lastmod>2023-10-25T14:57:16+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/couple-in-networking.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/couple-in-networking.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/file-and-printer-sharing-for-microsoft-networks/</loc>
		<lastmod>2023-10-26T08:12:04+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/file-and-printer-sharing-for-microsoft-networks.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/file-and-printer-sharing-for-microsoft-networks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/active-window/</loc>
		<lastmod>2023-10-26T08:43:39+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/active-window.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/active-window.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/attribute-marker/</loc>
		<lastmod>2023-10-26T09:14:17+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/attribute-marker-windows.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/attribute-marker-ms-dos.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/attribute-marker-windows.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/database-owner-dbo/</loc>
		<lastmod>2023-10-26T10:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/data-base-owner-dbo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/data-base-owner-dbo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/guests-group/</loc>
		<lastmod>2023-10-26T10:51:42+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/guest-group.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/guest-group.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/project-802/</loc>
		<lastmod>2023-10-26T16:52:04+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/project-802-standards.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/project-802-standards.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/y-connector/</loc>
		<lastmod>2023-10-26T17:16:56+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/y-connector-db25.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/y-connector-db25.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/arp-command/</loc>
		<lastmod>2023-10-26T18:14:18+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/arp-command.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/arp-command.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/network-layer/</loc>
		<lastmod>2023-10-26T19:06:55+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/network-layer-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/network-layer-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/desktop/</loc>
		<lastmod>2023-10-26T19:47:41+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/desktop-windows-10.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/windows-95-desktop.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/windows-xp-desktop.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/desktop-windows-10.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/bounce/</loc>
		<lastmod>2023-10-27T09:20:30+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/signal-bounce.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/signal-bounce.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/alias/</loc>
		<lastmod>2023-10-27T14:22:53+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/alias-in-networking.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/alias-in-networking.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/username-in-networking/</loc>
		<lastmod>2023-10-27T16:04:27+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/username-in-networking-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/username-in-networking-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/username-in-networking.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/application-layer-proxy/</loc>
		<lastmod>2023-10-27T17:34:48+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Application-Layer-Proxy-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Application-Layer-Proxy-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/application-layer-proxy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/difference-between-rs-232-and-usb/</loc>
		<lastmod>2023-10-28T09:05:49+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/difference-between-RS-232-and-USB.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/difference-between-RS-232-and-USB.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/media-access-control-method/</loc>
		<lastmod>2023-10-28T09:11:45+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/media-access-control-method.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/media-access-control-method.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/accessibility-wizard/</loc>
		<lastmod>2023-10-28T09:45:32+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/accessibility-wizard.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/accessibility-wizard.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/account-domain/</loc>
		<lastmod>2023-10-29T11:04:24+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/account-domain.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/account-domain.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/network-monitor-agent/</loc>
		<lastmod>2023-10-29T11:43:04+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/network-monitor-agent.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/network-monitor-agent.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/copper-distributed-data-interface-cddi/</loc>
		<lastmod>2023-10-30T10:56:05+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/fiber-optic-over-copper-cable.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/fiber-optic-over-copper-cable.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/access-control-entry-ace/</loc>
		<lastmod>2023-10-30T11:33:33+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ace.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ace.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/administrator/</loc>
		<lastmod>2023-10-31T09:35:36+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/administrator-networking.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/administrator-networking.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/linux-operating-system-unveiled-the-power-of-the-penguin/</loc>
		<lastmod>2023-10-31T09:42:19+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/linux-operating-system.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/linux-operating-system.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/open-source-culture-linux-os.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/config-sys/</loc>
		<lastmod>2023-10-31T09:56:10+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/config-sys-dos-editor.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/subnet-mask/</loc>
		<lastmod>2023-11-01T09:58:16+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/subnet-mask-representation.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/subnet-mask-representation.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/subnet-mask-cheat-sheet.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/basic-disk/</loc>
		<lastmod>2023-11-01T11:09:47+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/basic-disk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/basic-disk.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/failback/</loc>
		<lastmod>2023-11-01T11:55:30+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/failback-network.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/failback-network.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/network-access-server-nas/</loc>
		<lastmod>2023-11-02T09:41:44+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/network-access-server-nas.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/network-access-server-nas.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/network-access-server.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/network-and-dial-up-connections/</loc>
		<lastmod>2023-11-02T10:19:16+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/network-and-dial-up-connections.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/network-and-dial-up-connections.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/autodial/</loc>
		<lastmod>2023-11-02T10:48:23+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/autodial-configuration.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/autodial-configuration.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/logon-hours/</loc>
		<lastmod>2023-11-02T11:23:09+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/logon-hours-windows-server.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/logon-hours-windows-server.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/security-log/</loc>
		<lastmod>2023-11-02T14:04:08+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/security-log.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/security-log.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/windows-nt-directory-services-ntds/</loc>
		<lastmod>2023-11-02T19:09:52+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/windows-nt-directory-services.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/windows-nt-directory-services.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/advanced-infrared-air/</loc>
		<lastmod>2023-11-03T11:07:16+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/advanced-infrared.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/advanced-infrared.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/infrared-transmission/</loc>
		<lastmod>2023-11-03T17:34:35+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/infrared-transmission.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/infrared-transmission.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/infrared-spectrum.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/11/infrared-ir-wavelength.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/administrative-share/</loc>
		<lastmod>2023-11-03T18:23:35+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/administrative-share-w2000.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/administrative-share-w2000.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/homogeneous-network/</loc>
		<lastmod>2023-11-04T10:28:58+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Homogeneous-Network-vsheterogeneous.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Homogeneous-Network-vsheterogeneous.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/working-set/</loc>
		<lastmod>2023-11-04T11:09:39+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/12/working-set.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/12/working-set.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/5-4-3-rule/</loc>
		<lastmod>2023-11-04T11:37:01+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/5-4-3-rule.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/5-4-3-rule.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/national-electrical-code-nec/</loc>
		<lastmod>2023-11-04T12:36:58+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/national-electrical-code-nec-nfpa.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/11/NEC-National-Electrical-Code.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/grep/</loc>
		<lastmod>2023-11-04T17:14:37+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/grep-example.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/grep-example.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/primary-rate-interface-isdn-pri-isdn/</loc>
		<lastmod>2023-11-05T10:01:51+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ISDN-BRI-vs-ISDN-PRI.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ISDN-BRI-vs-ISDN-PRI.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/11/pri-isdn-23B-1D.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/11/SIP-Trunking-vs-VoIP.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/lan-segment/</loc>
		<lastmod>2023-11-05T21:20:23+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/11/Lan-Segment.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/11/Lan-Segment.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/lan-segment.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/built-in-account/</loc>
		<lastmod>2023-11-06T08:39:41+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/built-in-account.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/built-in-account.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/11/infographic-password-policies.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/common-desktop-environment-cde/</loc>
		<lastmod>2023-11-06T09:09:05+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/common-desktop-environment-cde.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/common-desktop-environment-cde.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/11/IBM-AIX-CDE-desktop.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/inverse-multiplexer-imux/</loc>
		<lastmod>2023-11-06T11:21:01+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/imux-inverse-multiplexer.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/imux-inverse-multiplexer.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/bits-per-second-bps/</loc>
		<lastmod>2023-11-06T17:48:43+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/bits-per-second.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/bits-per-second.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/host-data-replicator/</loc>
		<lastmod>2023-11-07T15:56:24+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/host-data-replicator.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/host-data-replicator.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/html-extension-htx/</loc>
		<lastmod>2023-11-08T09:30:46+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/htx-index-server.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/htx-index-server.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/differential-backup/</loc>
		<lastmod>2023-11-08T10:14:11+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/differential-backup.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/differential-backup.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/11/add-windows-server-backup-role-win2019.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/global-catalog-server/</loc>
		<lastmod>2023-11-08T11:22:03+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/global-catalog-server.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/global-catalog-server.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/local-security-database/</loc>
		<lastmod>2023-11-08T15:03:10+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/11/local-security-database.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/11/local-security-database.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/plenum-cabling/</loc>
		<lastmod>2023-11-09T09:38:21+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/plenum-cabling.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/plenum-cabling.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/asymmetric-digital-subscriber-line-adsl/</loc>
		<lastmod>2023-11-11T11:50:55+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Asymmetric-Digital-Subscriber-Line.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Asymmetric-Digital-Subscriber-Line.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/adsl-modem-and-router.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/active-server-pages-asp/</loc>
		<lastmod>2023-11-11T11:51:16+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/active-server-pages.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/active-server-pages-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/dynamic-link-library-dll/</loc>
		<lastmod>2023-11-11T11:51:29+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/dll-Dynamic-Link-Library.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/dll-Dynamic-Link-Library.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/association-for-computing-machinery-acm/</loc>
		<lastmod>2023-11-11T11:52:01+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/acm.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/acm-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/access-control-list-acl/</loc>
		<lastmod>2023-11-11T11:52:39+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/sacl-access-list.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/sacl-access-list.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/remote-network-monitoring-rmon/</loc>
		<lastmod>2023-11-11T11:53:15+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/rmon1-rmon2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/rmon-monitoring.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/rmon1-rmon2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/domain-name-system-dns/</loc>
		<lastmod>2023-11-11T11:53:38+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/dns-domain-name-system.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/dns-domain-name-system.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/integrated-services-digital-network-isdn/</loc>
		<lastmod>2023-11-11T11:53:59+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/isdn.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/isdn.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/multistation-access-unit-mau/</loc>
		<lastmod>2023-11-11T11:54:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Multistation-Access-Unit-IBM-8228.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Multistation-Access-Unit-IBM-8228.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/mau.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/microsoft-challenge-handshake-authentication-protocol-ms-chap/</loc>
		<lastmod>2023-11-11T11:54:47+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ms-chap.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ms-chap.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/knowledge-consistency-checker-kcc/</loc>
		<lastmod>2023-11-11T11:55:09+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/kcc-error-example.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/kcc-error-example.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/internetwork-operating-system-ios/</loc>
		<lastmod>2023-11-11T11:55:31+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/internetwork-operating-system.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/internetwork-operating-system.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/high-bit-rate-digital-subscriber-line-hdsl/</loc>
		<lastmod>2023-11-11T11:55:57+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/hdsl.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/hdsl.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/electromagnetic-interference-emi/</loc>
		<lastmod>2023-11-11T11:56:51+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/electromagnetic-interference-emi.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/electromagnetic-interference-emi.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/dynamic-host-configuration-protocol-dhcp/</loc>
		<lastmod>2023-11-11T11:57:03+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/dhcp.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/dhcp.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/configuring-dhcp-scope.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/discretionary-access-control-list-dacl/</loc>
		<lastmod>2023-11-11T11:57:16+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/dacl.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/dacl.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/directory-access-protocol-dap/</loc>
		<lastmod>2023-11-11T11:57:24+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/dap-history.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/dap-history.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/digital-data-service-dds/</loc>
		<lastmod>2023-11-11T11:57:34+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/digital-data-service.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/digital-data-service.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/channel-service-unit-data-service-unit-csu-dsu/</loc>
		<lastmod>2023-11-11T11:58:11+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/csu-dsu.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/csu-dsu.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/bootstrap-protocol-bootp/</loc>
		<lastmod>2023-11-11T11:58:40+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/bootp-protocol.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/bootp-protocol.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/asynchronous-transfer-mode-atm/</loc>
		<lastmod>2023-11-11T11:59:09+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/atm-network.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/atm-network.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/the-future-of-hybrid-cloud-integrating-ai-for-optimized-networking/</loc>
		<lastmod>2023-11-13T11:35:02+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/the-future-of-hybrid-cloud.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/the-future-of-hybrid-cloud.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/administrative-tools/</loc>
		<lastmod>2023-11-19T11:54:35+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/administrative-tools.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/administrative-tools.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/11/icon-computer-management.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/11/icon-event-viewer.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/11/icon-firewall.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/11/icon-local-security-policy.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/software-defined-networking-sdn-the-future-of-networking/</loc>
		<lastmod>2023-11-19T12:02:49+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/01/sdn-software-defined-networking.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/01/sdn-software-defined-networking.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/powershell-basics-streamline-your-workflow-today/</loc>
		<lastmod>2023-11-19T13:11:21+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/11/windows-powershell-what-is-it.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/11/windows-powershell-what-is-it.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/cold-boot/</loc>
		<lastmod>2023-11-20T10:47:02+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/cold-boot.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/cold-boot.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/cold-boot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/data-communications-equipment-dce/</loc>
		<lastmod>2023-11-20T11:24:44+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/data-communications-equipment-dce.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/data-communications-equipment-dce.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/data-communications-equipment-dce.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ini-files/</loc>
		<lastmod>2023-11-21T11:21:48+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/ini-files-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/ini-files-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/desktop-ini.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/computer-telephony-integration-cti/</loc>
		<lastmod>2023-11-21T16:45:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Computer-Telephony-Integration-cti.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Computer-Telephony-Integration-cti.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/computer-telephony-integration-cti.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/gender-changer/</loc>
		<lastmod>2023-11-21T17:24:52+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/gender-changer-v35.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/gender-changer-v35.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/intellimirror/</loc>
		<lastmod>2023-11-22T08:54:52+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/intellimirror.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/intellimirror.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/basic-rate-interface-isdn-bri-isdn/</loc>
		<lastmod>2023-11-22T11:41:53+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ISDN-Basic-Rate-Interface.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ISDN-Basic-Rate-Interface.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/jam-signal/</loc>
		<lastmod>2023-11-22T15:11:17+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/signal_jam.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/signal_jam.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/remote-bridge/</loc>
		<lastmod>2023-11-22T16:10:16+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/remote-bridge.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/remote-bridge.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/fractional-t1/</loc>
		<lastmod>2023-11-23T09:22:45+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/fractional-t1-example-diagram.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/fractional-t1-example-diagram.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/domain-guests/</loc>
		<lastmod>2023-11-23T10:18:36+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/domain-guests-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/domain-guests-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/domain-guests.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/active-setup/</loc>
		<lastmod>2023-11-23T10:46:47+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Enable_Disable_ActiveX.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Enable_Disable_ActiveX.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/built-in-user-account/</loc>
		<lastmod>2023-11-23T11:59:01+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/built-in-user-account-in-windows-11.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/built-in-user-account-in-windows-11.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/buid-in-user-account.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/recursive-query/</loc>
		<lastmod>2023-11-23T14:51:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/recursive-query.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/recursive-query.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/v-35/</loc>
		<lastmod>2023-11-24T09:23:04+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/V35.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/V35.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/v-35-serial-connector.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/aix-unix/</loc>
		<lastmod>2023-11-24T09:52:47+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/aix-unix.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/aix-unix.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/authentication/</loc>
		<lastmod>2023-11-24T10:38:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/authentication-in-networking.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/authentication-in-networking.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/authentication.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/hot-spare/</loc>
		<lastmod>2023-11-25T07:27:43+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/hot-spare-technology.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/hot-spare-technology.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/hot-spare-and-raid5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ack/</loc>
		<lastmod>2023-11-25T08:49:03+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/what-is-ack.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/what-is-ack.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ack-networking.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/what-is-autochk-exe/</loc>
		<lastmod>2023-11-25T09:39:21+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/11/autochk-hard-drive.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/11/autochk-hard-drive.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/system-log/</loc>
		<lastmod>2023-11-25T11:06:02+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/system-log-comprehensive-guide.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/system-log-comprehensive-guide.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/system-log.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/11/error-type-event.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/warning-type-event.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/11/information-type.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/intelligent-input-output-i2o/</loc>
		<lastmod>2023-11-26T09:17:32+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/i2o.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/i2o.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/intelligent-input-output.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/secure-hypertext-transfer-protocol-s-http/</loc>
		<lastmod>2023-11-26T10:23:53+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/s-http-secure-Hypertext-Transfer-Protocol.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/s-http-secure-Hypertext-Transfer-Protocol.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/s-http.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/wins-client/</loc>
		<lastmod>2023-11-26T16:52:30+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/wins-client-forwarder.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/wins-client-forwarder.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/fully-qualified-domain-name-fqdn/</loc>
		<lastmod>2023-11-27T10:14:45+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/fqdn-fully-qualified-domain-name.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/fqdn-fully-qualified-domain-name.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/eia-tia-wiring-standards/</loc>
		<lastmod>2023-11-27T15:09:45+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/eia-tia-standards.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/eia-tia-standards.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/global-user-account/</loc>
		<lastmod>2023-11-27T17:04:14+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/global-user-account.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/global-user-account.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/os-2/</loc>
		<lastmod>2023-11-27T21:39:03+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/os-2-warp.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/os-2-warp.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/11/ibm-os-2-operating-system-desktop.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/primary-name-server/</loc>
		<lastmod>2023-11-28T08:08:04+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/primary-name-server-DNS.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/primary-name-server-DNS.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/primary-name-server.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/mac-layer/</loc>
		<lastmod>2023-11-28T14:28:34+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/11/mac-layer-representation.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/11/mac-layer-representation.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/network-neighborhood/</loc>
		<lastmod>2023-11-28T15:59:58+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/network-neighborhood.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Network-Neighborhood-windows-nt.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/network-neighborhood.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/x-400-connector/</loc>
		<lastmod>2023-11-28T16:55:35+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/x400-connector-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/x400-connector-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/x400-connector.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/unbalanced-line/</loc>
		<lastmod>2023-11-28T18:03:37+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/unbalanced-line.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/unbalanced-line.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/advanced-program-to-program-communications-appc-protocol/</loc>
		<lastmod>2023-11-29T07:39:44+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/appc-protocol-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/appc-protocol-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/APPC-protocol.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/netbios-name-server-nbns/</loc>
		<lastmod>2023-11-29T09:21:06+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/netbios-name-server.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/netbios-name-server.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/pulse-code-modulation-pcm/</loc>
		<lastmod>2023-11-29T19:36:04+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/pulse-code-modulation-pcm.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/pulse-code-modulation-pcm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/balanced-line/</loc>
		<lastmod>2023-11-29T20:19:08+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/balanced-line.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/balanced-line.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/digital-transmission/</loc>
		<lastmod>2023-11-29T21:54:59+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/digital-transmission-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/digital-transmission-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/digital-transmission.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/jack/</loc>
		<lastmod>2023-11-30T10:06:49+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/network-jack.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/network-jack.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/jack-networking.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/winnt-exe/</loc>
		<lastmod>2023-11-30T15:18:45+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/winnt-exe.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/winnt-exe.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/jini/</loc>
		<lastmod>2023-11-30T20:55:38+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/jini.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/jini.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/link-control-protocol-lcp/</loc>
		<lastmod>2023-11-30T21:55:22+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/link-control-protocol.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/link-control-protocol.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/master-name-server/</loc>
		<lastmod>2023-12-01T09:26:46+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/master-name-server-DNS.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/master-name-server-DNS.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/activex/</loc>
		<lastmod>2023-12-02T09:09:09+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/activex.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/activex.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/microsoft-connection-manager-cm/</loc>
		<lastmod>2023-12-02T09:39:51+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/microsoft-conection-manager.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/microsoft-conection-manager.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/connection-manager-administration-kit-cmak/</loc>
		<lastmod>2023-12-02T09:47:48+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/CMAK-connection-manager-administration-kit.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/CMAK-connection-manager-administration-kit.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/microsoft-outlook/</loc>
		<lastmod>2023-12-02T15:33:17+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/microsoft-outlook.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/microsoft-outlook.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/shielded-twisted-pair-stp-cabling/</loc>
		<lastmod>2023-12-04T10:47:20+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/stp-cable.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/stp-cable.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/shielded-twisted-pair-cable-stp.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/windows-nt-backup/</loc>
		<lastmod>2023-12-04T11:55:56+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/windows-nt-backup.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/windows-nt-backup.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/boot-loader-menu/</loc>
		<lastmod>2023-12-04T14:56:02+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/boot-loader-menu.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/boot-loader-menu.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/daily-copy-backup/</loc>
		<lastmod>2023-12-05T09:13:10+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/daily-copy-backup.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/daily-copy-backup.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/windows-fax/</loc>
		<lastmod>2023-12-05T10:14:34+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/windows-fax.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/windows-fax.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/windows-fax-icon.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/windows-fax-and-scan-step-by-step.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/internet-data-query-idq/</loc>
		<lastmod>2023-12-05T13:44:27+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/idq-file-example.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/index-server-search-results.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/idq-file-example.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/1000basecx/</loc>
		<lastmod>2023-12-05T16:10:58+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/1000basecx.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/1000basecx.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/1000Base-CX-Network-Adapter.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/background-program/</loc>
		<lastmod>2023-12-05T20:59:09+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/background-program.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/background-program.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/background-program-representation.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/guest-account/</loc>
		<lastmod>2023-12-06T11:10:42+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/guest-account.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/guest-account.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/guest-user.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/broadband-transmission/</loc>
		<lastmod>2023-12-07T14:39:50+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/broadband-transmission.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/broadband-transmission.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/baseband-broadband-transmission.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/h-channel/</loc>
		<lastmod>2023-12-08T09:22:42+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/h-channel-isdn.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/h-channel-isdn.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/b-channel-isdn.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/security-identifier-sid/</loc>
		<lastmod>2023-12-08T11:05:46+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Security-Identifier-SID.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Security-Identifier-SID.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/add-new-hardware/</loc>
		<lastmod>2023-12-09T09:49:45+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/add-new-hardware-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/add-new-hardware-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/add-new-hardware.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/add_hwardware_wizard.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/ds0/</loc>
		<lastmod>2023-12-09T11:26:10+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ds0-digital-signal-0.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ds0-digital-signal-0.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ds0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/local-loop/</loc>
		<lastmod>2023-12-09T13:42:25+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/local-loop.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/local-loop.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/next-generation-i-o-ngio/</loc>
		<lastmod>2023-12-10T09:17:19+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/05/pci-express-ngio.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/05/pci-express-ngio.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/intermediary-device/</loc>
		<lastmod>2023-12-10T10:33:36+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/intermediary-device-in-computer-networking.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/intermediary-device-in-computer-networking.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/intermediary-device.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/interprocess-communication-ipc/</loc>
		<lastmod>2023-12-10T11:48:11+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/interprocess-communication-IPC.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/interprocess-communication-IPC.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/inter-process-communications-models.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/account-lockout/</loc>
		<lastmod>2023-12-10T20:33:37+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/account-lockout-policy.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/account-lockout-policy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/batch-commands/</loc>
		<lastmod>2023-12-11T11:51:35+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/batch-commands.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/batch-commands.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/digital-advanced-mobile-phone-service-d-amps/</loc>
		<lastmod>2023-12-11T16:56:24+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/d-amps.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/d-amps.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/digital-advanced-wireless-system-daws/</loc>
		<lastmod>2023-12-11T17:03:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/automatic-skip-driver-agent-asd/</loc>
		<lastmod>2023-12-12T10:04:30+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/automatic-skip-driver-agent.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/automatic-skip-driver-agent.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/balun/</loc>
		<lastmod>2023-12-12T10:54:56+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/balun.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/balun.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/matrix-switch/</loc>
		<lastmod>2023-12-12T10:57:25+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/matrix-switch-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/matrix-switch-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/baseband-transmission/</loc>
		<lastmod>2023-12-12T11:07:15+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/baseband-transmission.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/baseband-transmission.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/baseband-broadband-examples.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/proxy-cache-server/</loc>
		<lastmod>2023-12-12T16:15:08+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/proxy-cache-server.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/proxy-cache-server.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/microsoft-developer-network-msdn/</loc>
		<lastmod>2023-12-13T17:29:43+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/MSDN-Conceptual-Representation.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/MSDN-Conceptual-Representation.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/msdn-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/offline-browsing/</loc>
		<lastmod>2023-12-14T10:56:22+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/offline-browsing.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/offline-browsing.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/adapter/</loc>
		<lastmod>2023-12-14T14:57:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/adapter.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/adapter.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/adapters-in-computers.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/client-for-microsoft-networks/</loc>
		<lastmod>2023-12-14T17:13:14+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/Client-for-Microsoft-Networks.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/Client-for-Microsoft-Networks.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/client-for-microsoft-networks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/system-access-control-list-sacl/</loc>
		<lastmod>2023-12-15T10:06:01+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/SACL-System-Access-Control-List.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/SACL-System-Access-Control-List.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/sacl-access-list-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/access-token/</loc>
		<lastmod>2023-12-15T13:50:49+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/access-token-windows-security.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/access-token-windows-security.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/access-token.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/logon/</loc>
		<lastmod>2023-12-15T13:54:07+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/logon.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/logon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/interior-gateway-protocol-igp/</loc>
		<lastmod>2023-12-16T09:22:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Interior-Gateway-Protocol-IGP.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Interior-Gateway-Protocol-IGP.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/igp-consulting-a-routing-table.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/igp.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/boot/</loc>
		<lastmod>2023-12-17T09:40:42+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/boot-process.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/boot-process.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/advanced-boot-options-windows-7.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/korn-shell/</loc>
		<lastmod>2023-12-17T13:20:27+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/kornshell.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/kornshell.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/korn-shell.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/access-mask/</loc>
		<lastmod>2023-12-17T20:17:28+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/access-mask.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/access-mask.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ace-mask.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/security-reference-monitor/</loc>
		<lastmod>2023-12-18T08:34:21+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Security-Architecture-of-Windows.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Security-Architecture-of-Windows.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/aglp/</loc>
		<lastmod>2023-12-18T08:44:59+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/aglp.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/aglp.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/bridgehead-server/</loc>
		<lastmod>2023-12-18T10:39:32+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/bridgehead-server.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/bridgehead-server.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/network-frame/</loc>
		<lastmod>2023-12-18T11:25:55+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/network-frame-representation.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/network-frame-representation.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/network-frame.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/network-operating-system-nos/</loc>
		<lastmod>2023-12-18T11:27:05+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/network-operating-system-NOS.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/network-operating-system-NOS.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/network-operating-system-nos.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/line-printer-queue-lpq/</loc>
		<lastmod>2023-12-18T13:17:25+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/line-printer-daemon.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/line-printer-daemon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/session-layer/</loc>
		<lastmod>2023-12-18T20:58:50+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/Session-Layer-OSI-Model.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/Session-Layer-OSI-Model.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/SMB.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/10-computer-networking-concepts-you-should-master/</loc>
		<lastmod>2023-12-18T21:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/09/10-computer-networking-concepts.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/lan-and-wan.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/wireless-networking-lan.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/06/firewall-main.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/application-layer/</loc>
		<lastmod>2023-12-18T21:01:53+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Application-Layer-of-the-OSI-Model.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Application-Layer-of-the-OSI-Model.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/application-layer-7-osi-model.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/circuit-level-gateway/</loc>
		<lastmod>2023-12-18T21:03:19+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/circuit-level-gateway.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/circuit-level-gateway.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/circuit-level.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/arc-path/</loc>
		<lastmod>2023-12-19T09:28:32+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/advanced-RISC-computing-path.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/advanced-RISC-computing-path.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/common-internet-file-system-cifs/</loc>
		<lastmod>2023-12-19T16:08:48+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/Common-Internet-File-System-CIFS.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/Common-Internet-File-System-CIFS.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/common-internet-file-system-cifs.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/nwlink-ipx-spx-compatible-transport/</loc>
		<lastmod>2023-12-19T17:23:49+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/NWLink-ipx-spx-compatible-transport.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/NWLink-ipx-spx-compatible-transport.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/nwlink-ipx-spx.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/access/</loc>
		<lastmod>2023-12-20T11:02:11+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Network-Access-Control-System-NAC.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Network-Access-Control-System-NAC.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/Core-Functionalities-of-NAC-Systems.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/active-directory-users-and-computers/</loc>
		<lastmod>2023-12-20T11:04:03+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/active-directory-users-and-computers.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/active-directory-users-and-computers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/twisted-pair-cabling/</loc>
		<lastmod>2023-12-20T14:22:01+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Twisted-Pair-Cable.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Twisted-Pair-Cable.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/twisted-pair-cable-manufacturing.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/appletalk/</loc>
		<lastmod>2023-12-20T21:24:59+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/appletalk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/appletalk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/appletalk-osi-model-layer.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/carrier-sense-multiple-access-with-collision-avoidance-csma-ca/</loc>
		<lastmod>2023-12-21T08:54:35+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/csma-ca-Carrier-Sense-Multiple-Access-with-Collision-Avoidance.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/csma-ca-Carrier-Sense-Multiple-Access-with-Collision-Avoidance.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/csma-ca-procedure.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/long-filename-lfn/</loc>
		<lastmod>2023-12-22T10:25:11+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/long-filename.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/long-filename.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/active-hub/</loc>
		<lastmod>2023-12-22T13:32:56+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/active-hub.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/active-hub.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/sysvol-share/</loc>
		<lastmod>2023-12-22T14:03:33+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/sysvol-share.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/sysvol-share.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/udf-file-system/</loc>
		<lastmod>2023-12-23T09:44:23+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/UDF-File-System.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/UDF-File-System.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/image-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/basic-authentication/</loc>
		<lastmod>2023-12-23T18:07:25+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/basic-authentication-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/basic-authentication-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/basic-authentication.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/data-terminal-equipment-dte/</loc>
		<lastmod>2023-12-26T10:24:14+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Data-Terminal-Equipment-DTE-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Data-Terminal-Equipment-DTE-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/domain-user-account/</loc>
		<lastmod>2023-12-26T11:30:35+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/domain-user-accounts.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/domain-user-accounts.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/domain-user-account.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/gateway/</loc>
		<lastmod>2023-12-26T13:19:34+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/gateway-in-networking.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/gateway-in-networking.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/gateway-network.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/global-group/</loc>
		<lastmod>2023-12-26T17:02:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/global-groups-windows.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/global-groups-windows.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/global-group.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/application-programming-interface-api/</loc>
		<lastmod>2023-12-27T09:23:32+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Application-Programming-Interface-API.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Application-Programming-Interface-API.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/api-application-programming-interface.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/broadcast-packet/</loc>
		<lastmod>2023-12-27T10:05:41+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/broadcast-packet-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/broadcast-packet-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/broadcast-packet.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/y-splitter/</loc>
		<lastmod>2023-12-27T15:11:33+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/y-splitter-in-networking.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/y-splitter-in-networking.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/y-splitter.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/cabinet-network/</loc>
		<lastmod>2023-12-27T18:07:47+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/network-cabinet.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/cabinet.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/power-strip.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/collapsed-backbone/</loc>
		<lastmod>2023-12-28T11:36:16+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/collapsed-backbone.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/collapsed-backbone.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/collapsed-backbone.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/decnet/</loc>
		<lastmod>2023-12-28T12:19:24+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/decnet-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/decnet-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/telecommunications-industry-association-tia/</loc>
		<lastmod>2023-12-29T08:49:14+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/telecommunications-industry-association.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/telecommunications-industry-association.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/management-information-format-mif/</loc>
		<lastmod>2023-12-29T09:11:11+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/09/mif-database.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/09/mif-database.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/server-based-network/</loc>
		<lastmod>2023-12-29T10:06:28+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/server-based-network-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/server-based-network-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/server-based-network.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/top-level-domain/</loc>
		<lastmod>2023-12-29T10:48:39+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/top-level-domain-conceptual-representation.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/top-level-domain-conceptual-representation.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/top-level-domain.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/d-channel/</loc>
		<lastmod>2023-12-30T10:05:53+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/D-Channel-ISDN.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/D-Channel-ISDN.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/d-channel.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/password-authentication-protocol-pap/</loc>
		<lastmod>2023-12-30T16:59:30+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/02/password-authentication-protocol-PAP.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/02/password-authentication-protocol-PAP.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/02/pap-password-authentication-protocol.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/keepalives/</loc>
		<lastmod>2023-12-30T17:46:06+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/keepalives.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/keepalives.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/keep-alive-on-and-off.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/rs-422/</loc>
		<lastmod>2023-12-31T12:23:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/rs-422-pinout.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/rs-422-pinout.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/answer-file/</loc>
		<lastmod>2024-01-02T12:34:41+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ANSWER-FILE-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ANSWER-FILE-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/windows-image-manager.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/answer-file-generator.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/cabling/</loc>
		<lastmod>2024-01-02T21:07:52+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/cable-types-510x300.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/cat6_cat5e_network_cables.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/chat-windows-2000-nt/</loc>
		<lastmod>2024-01-03T07:37:37+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/chat-windows-nt.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/chat-windows-nt.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/connector-device/</loc>
		<lastmod>2024-01-03T09:23:51+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/network-connectors.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/network-connectors.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/connectors-networking.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/handshaking/</loc>
		<lastmod>2024-01-03T10:25:22+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Handshaking-Protocols.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Handshaking-Protocols.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/handshaking.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/high-speed-circuit-switched-data-hscsd/</loc>
		<lastmod>2024-01-03T13:16:52+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/High-Speed-Circuit-Switched-Data-HSCSD.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/High-Speed-Circuit-Switched-Data-HSCSD.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/hscsd.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/category-4-cabling/</loc>
		<lastmod>2024-01-03T17:35:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/cat-4-cable.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/cat-4-cable.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/category-3-cabling.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/channel-definition-format-cdf/</loc>
		<lastmod>2024-01-04T08:14:06+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/channel-definition-format-cdf.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/channel-definition-format-cdf.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/anonymous-access/</loc>
		<lastmod>2024-01-04T11:03:14+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Anonymous-Access-in-IIS.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Anonymous-Access-in-IIS.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/anonymous-access-iis.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/network-security-auditing-in-windows-environments/</loc>
		<lastmod>2024-01-04T15:36:44+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/network-security-auditing-in-Windows-environments.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/network-security-auditing-in-Windows-environments.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/windows-security-log-properties.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/auditing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/network-client/</loc>
		<lastmod>2024-01-04T15:44:58+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Network-Client.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Network-Client.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/network-client.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/wide-area-network-wan/</loc>
		<lastmod>2024-01-05T17:19:22+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Wide-Area-Network-WAN-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Wide-Area-Network-WAN-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/wide-area-network.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Wide-Area-Network-WAN.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/telegraph-system-representation.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/wan-key-components.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/wan-connection-wireless-networking.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/12/man-metropolitan-area-network.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/application-gateway/</loc>
		<lastmod>2024-01-05T21:20:13+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Application-Gateway-Firewall.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Application-Gateway-Firewall.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/application-gateway.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/kvm-switch/</loc>
		<lastmod>2024-01-06T10:35:59+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/what-is-a-kvm-switch.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/what-is-a-kvm-switch.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/kvm-switch.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/usb-kvm-switch.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/dvi-kvm-switch-4-pc-scaled.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/hdmi-kvm-switch.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/kvm-over-ip-switch.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/data-center-control.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/customer-premises-equipment-cpe/</loc>
		<lastmod>2024-01-06T11:41:12+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Customer-Premises-Equipment-CPE.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Customer-Premises-Equipment-CPE.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/customer-premises-equipment.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/transport-layer-security-tls-beyond-the-basics/</loc>
		<lastmod>2024-01-06T11:51:12+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/Transport-Layer-Security-TLS.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/09/Transport-Layer-Security-TLS.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/https-url-browser.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/messaging-application-programming-interface-mapi/</loc>
		<lastmod>2024-01-07T09:43:23+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/MAPI-Mastering-the-Messaging-Application-Programming-Interface.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/mapi.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/MAPI-Components-Diagram.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/network-access-point-nap/</loc>
		<lastmod>2024-01-08T10:30:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Network-Access-Point-NAP.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Network-Access-Point-NAP.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/network-access-point-nap.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/Diagram-of-ISP-Interconnection-at-NAPs.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/destination-address/</loc>
		<lastmod>2024-01-09T09:17:19+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Destination-address-an-essencial-guide.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Destination-address-an-essencial-guide.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/destination-address.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/macintosh/</loc>
		<lastmod>2024-01-09T11:24:03+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Macintosh-the-personal-computing-revolution.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Macintosh-the-personal-computing-revolution.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/first-macintosh-steve-jobs-macworld-cover.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/macintosh-user-interface.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/macwrite.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/macintosh-128K-desktop.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/apple-macintosh-128k.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/uefi-unified-extensible-firmware-interface/</loc>
		<lastmod>2024-01-09T17:11:08+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/UEFI-Unified-Extensible-Firmware-Interface.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/UEFI-Unified-Extensible-Firmware-Interface.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/10TB-Hard-drive.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/GIGABYTE-UEFI-DUAL-BIOS.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/power-on-self-test-post/</loc>
		<lastmod>2024-01-09T17:12:09+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/POST-Power-on-Self-Test.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/POST-Power-on-Self-Test.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/power-on-self-test-post.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/POST-Beep-codes-example.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/secure-attention-sequence-sas/</loc>
		<lastmod>2024-01-11T10:38:53+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/01/Secure-Attention-Sequence-SAS.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/01/Secure-Attention-Sequence-SAS.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/01/sas-security-attention-sequence.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/ctrl-alt-del-sequence-window.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/certificate-revocation-list-crl/</loc>
		<lastmod>2024-01-11T12:33:15+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Certificate-Revocation-List-CRL-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Certificate-Revocation-List-CRL-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/certificate-revocation-list-crl.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/encapsulation/</loc>
		<lastmod>2024-01-11T14:14:17+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/encapsulation.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/encapsulation.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/pass-through-authentication/</loc>
		<lastmod>2024-01-11T17:43:17+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Pass-Through-Authentication.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Pass-Through-Authentication.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/pass-through-authetication.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/terminal-emulator/</loc>
		<lastmod>2024-01-12T17:58:34+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/terminal-emulator.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/terminal-emulator.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/terminal-emulator.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/putty-terminal-configuration.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/fat32-conversion-utility/</loc>
		<lastmod>2024-01-13T10:20:10+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/fat32-conversion-utility.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/fat32-conversion-utility.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/named-pipe/</loc>
		<lastmod>2024-01-14T10:11:20+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/named-pipes.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/named-pipes.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/05/named-pipes.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/serial-line-internet-protocol-slip/</loc>
		<lastmod>2024-01-14T12:02:54+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/SLIP-Protocol.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/SLIP-Protocol.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/slip-serial-line-internet-protocol.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/collision-in-computer-networking/</loc>
		<lastmod>2024-01-14T19:02:07+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/network-collision.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/network-collision.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/collision-networking.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/distributed-component-object-model-dcom/</loc>
		<lastmod>2024-01-14T20:34:24+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/dcom.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/dcom.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/dcom-distributed-component-object-model.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/workstation-service/</loc>
		<lastmod>2024-01-15T09:12:14+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Workstation-services-windows.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Workstation-services-windows.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/dns-database/</loc>
		<lastmod>2024-01-15T09:59:23+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/DNS-Database-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/DNS-Database-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/dns-database.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/migration-wizard/</loc>
		<lastmod>2024-01-15T10:20:37+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/migration-wizard-exchange.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/migration-wizard-exchange.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/symmetric-digital-subscriber-line-sdsl/</loc>
		<lastmod>2024-01-15T11:24:36+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/SDSL-Symmetric-Digital-Subscriber-Line.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/SDSL-Symmetric-Digital-Subscriber-Line.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Symmetric-Digital-Subscriber-Line.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/my-network-places/</loc>
		<lastmod>2024-01-15T11:53:28+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/my-network-places.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/04/my-network-places.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/security-administrator-tool-for-analyzing-networks-satan/</loc>
		<lastmod>2024-01-15T17:43:59+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/SATAN-Security-Administrator-Tool-for-Analyzing-Networks.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/SATAN-Security-Administrator-Tool-for-Analyzing-Networks.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/satan-security-tool.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/star-topology/</loc>
		<lastmod>2024-01-15T20:58:58+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/star-topology-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/star-topology-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/star-topology.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/broadband-isdn-b-isdn/</loc>
		<lastmod>2024-01-16T15:54:30+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/broadband-ISDN.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/broadband-ISDN.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/b-isdn-broadband.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/domain-forest/</loc>
		<lastmod>2024-01-16T17:02:24+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/domain-forest-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/domain-forest-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/domain-forest.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/help-microsoft/</loc>
		<lastmod>2024-01-16T18:41:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/f1-key-contextual-help.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/f1-key-contextual-help.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/loopback-address/</loc>
		<lastmod>2024-01-17T08:16:33+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/loopback-address-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/loopback-address-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/loopback-address.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/physical-medium-dependent-pmd/</loc>
		<lastmod>2024-01-17T10:29:12+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/physical-medium-dependent-pmd.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/05/Physical-medium-dependent.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/active-platform/</loc>
		<lastmod>2024-01-17T10:52:46+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/active-platform.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/active-platform.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/file-transfer-access-and-management-ftam/</loc>
		<lastmod>2024-01-17T12:05:14+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ftam-protocol.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ftam-protocol.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/ftam-file-transfer-access-management.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/subnetting/</loc>
		<lastmod>2024-01-17T22:02:04+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/subnetting.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/subnetting.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/category-3-cabling/</loc>
		<lastmod>2024-01-18T10:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/category-3-cabling.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/cat-3-cable.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/category-3-cabling.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/interactive-logon/</loc>
		<lastmod>2024-01-18T11:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/interactive-logon-screen.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/interactive-logon-screen.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/interactive-windows-logon-options.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/owner-ntfs/</loc>
		<lastmod>2024-01-18T12:04:50+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/01/File-Ownership-in-NTFS.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/01/File-Ownership-in-NTFS.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/01/owner-creator-ntfs.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/security-account-manager-sam-database/</loc>
		<lastmod>2024-01-18T15:15:39+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/SAM-Database.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/SAM-Database.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/sam-database-explorer.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/windows-nt-3-5-login-windows.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/SAM-Architecture.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/yahoo-2006-breach.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/point-to-point/</loc>
		<lastmod>2024-01-18T20:01:23+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/point-to-point-network.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/point-to-point-network.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/point-to-point.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/bandwidth-on-demand/</loc>
		<lastmod>2024-01-19T09:07:56+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/bandwidth-on-demand.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/bandwidth-on-demand.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/BoD-comparison-chart.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/the-active-group/</loc>
		<lastmod>2024-01-19T11:13:29+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/the-active-group-microsoft.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/the-active-group-microsoft.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/aui-connector/</loc>
		<lastmod>2024-01-19T17:22:42+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/aui-connectors.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/11/aui-connectors.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/universal-naming-convention-unc/</loc>
		<lastmod>2024-01-19T17:57:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/universal-naming-convention-unc.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/universal-naming-convention-unc.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/microsoft-backup/</loc>
		<lastmod>2024-01-19T20:54:50+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Microsoft-backup.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/Microsoft-backup.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/copper-cabling/</loc>
		<lastmod>2024-01-19T21:16:09+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/copper-cabling.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/copper-cabling.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/fiber-optic-over-copper-cable.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/virtual-hosting-unveiled-revolutionizing-modern-networking/</loc>
		<lastmod>2024-01-19T21:21:04+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/virtual-hosting.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/virtual-hosting.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/virtual-private-server-vps.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/network-function-virtualization-nfv.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/Virtual-Hosting-for-Email-Servers.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2024/01/Environmental-Impact-Virtual-Hosting.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/i-o-manager/</loc>
		<lastmod>2024-01-19T21:28:31+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/io-manager.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/io-manager.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/cryptoapi/</loc>
		<lastmod>2024-01-20T10:27:55+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/CryptoAPI.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/CryptoAPI.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/10/cryptoapi.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/what-are-the-differences-between-the-turing-test-and-turing-machine/</loc>
		<lastmod>2024-01-20T10:31:23+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/difference-between-turing-test-and-turing-machine.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/08/difference-between-turing-test-and-turing-machine.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/line-printer-remote-lpr/</loc>
		<lastmod>2024-01-20T10:57:11+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/line-printer-remote-lpr.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/line-printer-remote-lpr.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/the-unrealized-potential-of-ai-what-lies-ahead/</loc>
		<lastmod>2024-01-21T11:53:03+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/The-Unrealized-Potential-of-AI.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2023/10/The-Unrealized-Potential-of-AI.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/time-division-multiple-access-tdma/</loc>
		<lastmod>2024-01-21T18:35:53+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/TDMA-Time-Division-Multiple-Access.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/TDMA-Time-Division-Multiple-Access.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/Tdma-frame-structure.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/value-entry/</loc>
		<lastmod>2024-01-22T07:55:45+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/value-entry-regstry-editor.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/value-entry-regstry-editor.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/caching-only-name-server/</loc>
		<lastmod>2024-01-22T08:59:00+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/caching-name-server.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/caching-name-server.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/09/dns-caching-server.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/jacket/</loc>
		<lastmod>2024-01-22T09:45:14+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/jacket-for-outdoor.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/jacket-for-outdoor.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/out-of-band-signaling/</loc>
		<lastmod>2024-01-22T13:29:54+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/out-of-band-signaling.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2020/08/out-of-band-signaling.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/hop-networking/</loc>
		<lastmod>2024-01-22T14:13:36+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/network-hop.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/network-hop.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2019/08/hop.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://networkencyclopedia.com/p-series-protocols/</loc>
		<lastmod>2024-01-22T16:59:26+00:00</lastmod>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/07/p-series-protocols.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/07/p-series-protocols.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://networkencyclopedia.com/wp-content/uploads/2021/07/p-protocol-series-min.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->