• Main Menu
  • Microsoft Networking

    • Understanding NetBIOS Name Resolution

      Understanding NetBIOS Name Resolution

      NetBIOS, broadcasts names to listening nodes on the network. NetBIOS utilizes a User Datagram Protocol (UDP) query to broadcast names. NetBIOS names identified computers on the network before the introduction of Windows 2000. The NetBIOS name is resolved to an IP address through Windows Internet Name Service (WINS), broadcasting, or the LMHOSTS file. If the

    • The VPN Gateway

      The VPN Gateway

      Virtual Private Networks (VPNs) enable users to connect to a remote private network through the Internet. Virtual private networks therefore span the Internet because the user connects over the Internet to the remote VPN server. With a VPN, data is first encrypted and encapsulated before it is sent to the remote VPN server. When the

    • Monitoring Network Activity

      Monitoring Network Activity

      Monitoring Network Activity with Network Monitor The tool which you can utilize to both monitor and log network activity as it occurs on the network is the Network Monitor. You can use the information obtained from Network Monitor to optimize network traffic as well. Network Monitor stems directly from the Windows NT Network Monitor. Network

    • DFS (Distributed File System)

      DFS (Distributed File System)

      DFS (Distributed File System) provides a mechanism for administrators to create logical views of folders and files, regardless of where those files are physically located on the network. DFS also allows administrators to distribute shared folders and work loads across several servers for more efficient network and server resources use. Fault tolerance network storage resources

    • Analyzing Organizational Requirements for Network Infrastructure Planning

      Analyzing Organizational Requirements for Network Infrastructure Planning

      Determining Information Flow Requirements To determine the information flow of the organization, you need to include a number of factors, of which the main ones are listed below. Accessing data or information should be one of the main concerns when planning the network design: The data that needs to be accessed by users. The location

    • Installing and Configuring NAT

      Installing and Configuring NAT

      In Routing and Remote Access Service (RRAS), NAT can be used to provide basic Internet connectivity for small offices or home offices. NAT translates IP addresses and associated TCP/UDP port numbers on the private network to public IP addresses which can be routed on the Internet. Through NAT, host computers are able to share a

    • The Windows Routing Table

      The Windows Routing Table

      When routers need to forward packets, they interpret the packets’ addresses then use the information in the routing tables to pass the packet on. Data packets contain both source and destination addresses in their packet headers. This is the information that is used when routing decisions need to be made. The destination address is compared

    • How to Open TCP Ports in Windows

      How to Open TCP Ports in Windows

      Opening TCP ports in Windows may be necessary for certain applications to run correctly. Each application may require a specific port to operate on. While a computer can and does open ports on its own, it may have to be done manually in certain situations. Here is a simple procedure. Step 1. Launch Windows and

    • The Certificate Enrollment Process

      The Certificate Enrollment Process

      While encryption can be a robust security technology, users have to implement a public key infrastructure (PKI) to make it beneficial and trusted within an organization. The Windows 2000 and Windows Server 2003 PKI implementation resides in Certificate Services. A public key infrastructure is the collection of technology, protocols, services, standards, and policies that control

    • Understanding the Department of Defense Network Model

      Understanding the Department of Defense Network Model

      Department of Defense Network (DoD) Network Model Introduction Back in 1960, systems were primarily made up of mainframe computers, and were typically owned by fairly large companies and government institutions. Because mainframe computers run different proprietary software, and due to mainframes not being able to communicate between each other, special code (interface) had to be

    microsoft-networking
    191 queries in 0.466 seconds.