• Main Menu
  • Microsoft Networking

    • TCP/IP

      TCP/IP

      Understanding the Function of Protocols Protocols are rules, standards and procedures that enable information to be communicated in the network environment. The rules and standards that control the way in which computers communicate are referred to as protocols. A few relevant factors to consider when discussing protocols and the network environment are: There are numerous

    • The VPN Gateway

      The VPN Gateway

      Virtual Private Networks (VPNs) enable users to connect to a remote private network through the Internet. Virtual private networks therefore span the Internet because the user connects over the Internet to the remote VPN server. With a VPN, data is first encrypted and encapsulated before it is sent to the remote VPN server. When the

    • DFS (Distributed File System)

      DFS (Distributed File System)

      DFS (Distributed File System) provides a mechanism for administrators to create logical views of folders and files, regardless of where those files are physically located on the network. DFS also allows administrators to distribute shared folders and work loads across several servers for more efficient network and server resources use. Fault tolerance network storage resources

    • The Windows Routing Table

      The Windows Routing Table

      When routers need to forward packets, they interpret the packets’ addresses then use the information in the routing tables to pass the packet on. Data packets contain both source and destination addresses in their packet headers. This is the information that is used when routing decisions need to be made. The destination address is compared

    • SSL (Secure Sockets Layer)

      SSL (Secure Sockets Layer)

      An Overview on Secure Sockets Layer (SSL) The Secure Sockets Layer (SSL) protocol was developed by Netscape Communications, and enables secure communication over the Internet. SSL works at the transport layer of Transmission Control Protocol/Internet Protocol (TCP/IP), which makes the protocol independent of the application layer protocol functioning on top of it. SSL is an

    • Understanding the Department of Defense Network Model

      Understanding the Department of Defense Network Model

      Department of Defense Network (DoD) Network Model Introduction Back in 1960, systems were primarily made up of mainframe computers, and were typically owned by fairly large companies and government institutions. Because mainframe computers run different proprietary software, and due to mainframes not being able to communicate between each other, special code (interface) had to be

    • Developing a Test Network

      Developing a Test Network

      Planning the Test Network Environment Any successful network design deployment includes a testing strategy, and the execution of the testing plan. To test the network design, you have to plan the test network or environment, and then create the test network. A testing environment can contain one lab or multiple labs. You can build various

    • APIPA

      APIPA

      Automatic Private IP Addressing (APIPA) Overview DHCP is a service that functions at the application layer of the TCP/IP protocol stack. One of the primary tasks of the DHCP service is to automatically assign IP addresses to DHCP clients. A server running the DHCP service is called a DHCP server. The DHCP service automates the

    • Understanding Ethernet LAN Segmentation

      Understanding Ethernet LAN Segmentation

      LAN Segmentation Overview Network segmentation is the terminology used to describe the process of dividing single Ethernet segments into multiple segments. Network segmentation has the following main advantages: Network performance of the LAN is improved. Network congestion issues can be resolved. Available bandwidth is maximized. A few technologies which you can use to perform network

    • Monitoring Network Activity

      Monitoring Network Activity

      Monitoring Network Activity with Network Monitor The tool which you can utilize to both monitor and log network activity as it occurs on the network is the Network Monitor. You can use the information obtained from Network Monitor to optimize network traffic as well. Network Monitor stems directly from the Windows NT Network Monitor. Network

    microsoft-networking
    190 queries in 0.609 seconds.