• Main Menu
  • Microsoft Networking

    • Installing and Configuring TCP/IP

      Installing and Configuring TCP/IP

      Installing TCP/IP TCP/IP is installed automatically when the Windows Server 2003 setup process runs. It is not usually necessary to install TCP/IP after the Windows Server 2003 setup process completed. The instances when you might need to manually install TCP/IP are listed below: TCP/IP was disabled when the Windows Server 2003 setup process executed. TCP/IP

    • How to Open TCP Ports in Windows

      How to Open TCP Ports in Windows

      Opening TCP ports in Windows may be necessary for certain applications to run correctly. Each application may require a specific port to operate on. While a computer can and does open ports on its own, it may have to be done manually in certain situations. Here is a simple procedure. Step 1. Launch Windows and

    • TCP/IP


      Understanding the Function of Protocols Protocols are rules, standards and procedures that enable information to be communicated in the network environment. The rules and standards that control the way in which computers communicate are referred to as protocols. A few relevant factors to consider when discussing protocols and the network environment are: There are numerous

    • Understanding the Microsoft Model

      Understanding the Microsoft Model

      Microsoft Model Overview Before Windows NT 3.1 was released, users had to obtain the TCP/IP protocol suite from a third party, and then install it. This was necessary for users to connect to the network, which in turn usually resulted in a number of issues. When it came to network communication, the TCP/IP software which

    • The Certificate Enrollment Process

      The Certificate Enrollment Process

      While encryption can be a robust security technology, users have to implement a public key infrastructure (PKI) to make it beneficial and trusted within an organization. The Windows 2000 and Windows Server 2003 PKI implementation resides in Certificate Services. A public key infrastructure is the collection of technology, protocols, services, standards, and policies that control

    • The VPN Gateway

      The VPN Gateway

      Virtual Private Networks (VPNs) enable users to connect to a remote private network through the Internet. Virtual private networks therefore span the Internet because the user connects over the Internet to the remote VPN server. With a VPN, data is first encrypted and encapsulated before it is sent to the remote VPN server. When the

    • Understanding Network Protocols

      Understanding Network Protocols

      A protocol is a collection of specifications or rules for data packets that enable information to be sent over the network. Network protocols are designed for network communication. In order to understand the different protocols available and their efficiencies, lets first look at the Open Systems Interconnection (OSI) reference model. This is the standard model

    • Understanding NetBIOS Name Resolution

      Understanding NetBIOS Name Resolution

      NetBIOS, broadcasts names to listening nodes on the network. NetBIOS utilizes a User Datagram Protocol (UDP) query to broadcast names. NetBIOS names identified computers on the network before the introduction of Windows 2000. The NetBIOS name is resolved to an IP address through Windows Internet Name Service (WINS), broadcasting, or the LMHOSTS file. If the

    • Understanding Ethernet LAN Segmentation

      Understanding Ethernet LAN Segmentation

      LAN Segmentation Overview Network segmentation is the terminology used to describe the process of dividing single Ethernet segments into multiple segments. Network segmentation has the following main advantages: Network performance of the LAN is improved. Network congestion issues can be resolved. Available bandwidth is maximized. A few technologies which you can use to perform network

    • DFS (Distributed File System)

      DFS (Distributed File System)

      DFS (Distributed File System) provides a mechanism for administrators to create logical views of folders and files, regardless of where those files are physically located on the network. DFS also allows administrators to distribute shared folders and work loads across several servers for more efficient network and server resources use. Fault tolerance network storage resources

    } 193 queries in 0.393 seconds.