• Main Menu
  • Microsoft Networking

    • The Windows Routing Table

      The Windows Routing Table

      When routers need to forward packets, they interpret the packets’ addresses then use the information in the routing tables to pass the packet on. Data packets contain both source and destination addresses in their packet headers. This is the information that is used when routing decisions need to be made. The destination address is compared

    • Understanding Network Protocols

      Understanding Network Protocols

      A protocol is a collection of specifications or rules for data packets that enable information to be sent over the network. Network protocols are designed for network communication. In order to understand the different protocols available and their efficiencies, lets first look at the Open Systems Interconnection (OSI) reference model. This is the standard model

    • Developing a Test Network

      Developing a Test Network

      Planning the Test Network Environment Any successful network design deployment includes a testing strategy, and the execution of the testing plan. To test the network design, you have to plan the test network or environment, and then create the test network. A testing environment can contain one lab or multiple labs. You can build various

    • Understanding NetBIOS Name Resolution

      Understanding NetBIOS Name Resolution

      NetBIOS, broadcasts names to listening nodes on the network. NetBIOS utilizes a User Datagram Protocol (UDP) query to broadcast names. NetBIOS names identified computers on the network before the introduction of Windows 2000. The NetBIOS name is resolved to an IP address through Windows Internet Name Service (WINS), broadcasting, or the LMHOSTS file. If the

    • Understanding IPv6

      Understanding IPv6

      Understanding the Limitations of IPv4 Before moving on the to an in-depth discussion of IPv6, lets first look at the limitations of IPv4: The IPv4 addresses are somewhat scarce, even though it allows for 4,294,967,296 possible addresses. Because of this limitation, organizations are forced to utilize Network Address Translator (NAT) to map a public IP

    • Understanding the Department of Defense Network Model

      Understanding the Department of Defense Network Model

      Department of Defense Network (DoD) Network Model Introduction Back in 1960, systems were primarily made up of mainframe computers, and were typically owned by fairly large companies and government institutions. Because mainframe computers run different proprietary software, and due to mainframes not being able to communicate between each other, special code (interface) had to be

    • Analyzing Organizational Requirements for Network Infrastructure Planning

      Analyzing Organizational Requirements for Network Infrastructure Planning

      Determining Information Flow Requirements To determine the information flow of the organization, you need to include a number of factors, of which the main ones are listed below. Accessing data or information should be one of the main concerns when planning the network design: The data that needs to be accessed by users. The location

    • How to Remove IPv6 in Windows

      How to Remove IPv6 in Windows

      IPv6 stands for Internet Protocol version 6. IPv6 is the latest version of the network-layer protocol for packet-switched networks. The version that is generally used is IPv4. One of the reasons for the upgrade to IPv6 is that it allows greater space and flexibility in assigning IP addresses. For instance, IPv4 is based on a

    • Installing and Configuring TCP/IP

      Installing and Configuring TCP/IP

      Installing TCP/IP TCP/IP is installed automatically when the Windows Server 2003 setup process runs. It is not usually necessary to install TCP/IP after the Windows Server 2003 setup process completed. The instances when you might need to manually install TCP/IP are listed below: TCP/IP was disabled when the Windows Server 2003 setup process executed. TCP/IP

    • Monitoring Network Activity

      Monitoring Network Activity

      Monitoring Network Activity with Network Monitor The tool which you can utilize to both monitor and log network activity as it occurs on the network is the Network Monitor. You can use the information obtained from Network Monitor to optimize network traffic as well. Network Monitor stems directly from the Windows NT Network Monitor. Network

    microsoft-networking
    197 queries in 0.506 seconds.