• Main Menu
  • Microsoft Networking

    • Considerations in Planning a Network Infrastructure

      Considerations in Planning a Network Infrastructure

      Defining Network Infrastructure A network can be defined as the grouping of hardware devices and software components which are necessary to connect devices within the organization, and to connect the organization to other organizations and the Internet. Typical hardware components utilized in a networking environment are network interface cards, computers, routers, hubs, switches, printers, and

    • Analyzing Organizational Requirements for Network Infrastructure Planning

      Analyzing Organizational Requirements for Network Infrastructure Planning

      Determining Information Flow Requirements To determine the information flow of the organization, you need to include a number of factors, of which the main ones are listed below. Accessing data or information should be one of the main concerns when planning the network design: The data that needs to be accessed by users. The location

    • Monitoring Network Activity

      Monitoring Network Activity

      Monitoring Network Activity with Network Monitor The tool which you can utilize to both monitor and log network activity as it occurs on the network is the Network Monitor. You can use the information obtained from Network Monitor to optimize network traffic as well. Network Monitor stems directly from the Windows NT Network Monitor. Network

    • Understanding the Department of Defense Network Model

      Understanding the Department of Defense Network Model

      Department of Defense Network (DoD) Network Model Introduction Back in 1960, systems were primarily made up of mainframe computers, and were typically owned by fairly large companies and government institutions. Because mainframe computers run different proprietary software, and due to mainframes not being able to communicate between each other, special code (interface) had to be

    • NetBIOS Names

      NetBIOS Names

      A NetBIOS name is an identifier that NetBIOS services running on a computer use. It is a combination of a 15 character (byte) name and a 16th character denoting the service. These names identify resources on the NetBIOS network. NetBIOS cannot do name resolution on the Internet because NetBIOS names are single part names and

    • Troubleshooting VPNs

      Troubleshooting VPNs

      Troubleshooting VPN Services Overview Troubleshooting VPNs typically encompass troubleshooting of the following configuration settings, or aspects of your remote access strategy: IP connectivity. Setting up of remote access connections IPSec IP routing To create VPN connections, there are a few requirements that have to be met: VPN services need to be enabled on the server.

    • How to Open TCP Ports in Windows

      How to Open TCP Ports in Windows

      Opening TCP ports in Windows may be necessary for certain applications to run correctly. Each application may require a specific port to operate on. While a computer can and does open ports on its own, it may have to be done manually in certain situations. Here is a simple procedure. Step 1. Launch Windows and

    • Developing a Test Network

      Developing a Test Network

      Planning the Test Network Environment Any successful network design deployment includes a testing strategy, and the execution of the testing plan. To test the network design, you have to plan the test network or environment, and then create the test network. A testing environment can contain one lab or multiple labs. You can build various

    • Installing and Configuring NAT

      Installing and Configuring NAT

      In Routing and Remote Access Service (RRAS), NAT can be used to provide basic Internet connectivity for small offices or home offices. NAT translates IP addresses and associated TCP/UDP port numbers on the private network to public IP addresses which can be routed on the Internet. Through NAT, host computers are able to share a

    • The Certificate Enrollment Process

      The Certificate Enrollment Process

      While encryption can be a robust security technology, users have to implement a public key infrastructure (PKI) to make it beneficial and trusted within an organization. The Windows 2000 and Windows Server 2003 PKI implementation resides in Certificate Services. A public key infrastructure is the collection of technology, protocols, services, standards, and policies that control

    microsoft-networking
    } 194 queries in 0.425 seconds.