• Main Menu
  • Microsoft Networking

    • Understanding Network Protocols

      Understanding Network Protocols

      A protocol is a collection of specifications or rules for data packets that enable information to be sent over the network. Network protocols are designed for network communication. In order to understand the different protocols available and their efficiencies, lets first look at the Open Systems Interconnection (OSI) reference model. This is the standard model

    • Understanding Internet Connections

      Understanding Internet Connections

      Internet Connectivity Introduction  In most organizations and networks today, Internet connectivity is no longer an additional option, but a necessity. Most organizations that have a networking environment need to provide its employees or users with some form of connectivity to the Internet. E-mail and Web sites have evolved into being important mechanisms for a vast

    • Understanding Ethernet LAN Segmentation

      Understanding Ethernet LAN Segmentation

      LAN Segmentation Overview Network segmentation is the terminology used to describe the process of dividing single Ethernet segments into multiple segments. Network segmentation has the following main advantages: Network performance of the LAN is improved. Network congestion issues can be resolved. Available bandwidth is maximized. A few technologies which you can use to perform network

    • How to Remove IPv6 in Windows

      How to Remove IPv6 in Windows

      IPv6 stands for Internet Protocol version 6. IPv6 is the latest version of the network-layer protocol for packet-switched networks. The version that is generally used is IPv4. One of the reasons for the upgrade to IPv6 is that it allows greater space and flexibility in assigning IP addresses. For instance, IPv4 is based on a

    • How to Open TCP Ports in Windows

      How to Open TCP Ports in Windows

      Opening TCP ports in Windows may be necessary for certain applications to run correctly. Each application may require a specific port to operate on. While a computer can and does open ports on its own, it may have to be done manually in certain situations. Here is a simple procedure. Step 1. Launch Windows and

    • The VPN Gateway

      The VPN Gateway

      Virtual Private Networks (VPNs) enable users to connect to a remote private network through the Internet. Virtual private networks therefore span the Internet because the user connects over the Internet to the remote VPN server. With a VPN, data is first encrypted and encapsulated before it is sent to the remote VPN server. When the

    • The Windows Routing Table

      The Windows Routing Table

      When routers need to forward packets, they interpret the packets’ addresses then use the information in the routing tables to pass the packet on. Data packets contain both source and destination addresses in their packet headers. This is the information that is used when routing decisions need to be made. The destination address is compared

    • Understanding IPv6

      Understanding IPv6

      Understanding the Limitations of IPv4 Before moving on the to an in-depth discussion of IPv6, lets first look at the limitations of IPv4: The IPv4 addresses are somewhat scarce, even though it allows for 4,294,967,296 possible addresses. Because of this limitation, organizations are forced to utilize Network Address Translator (NAT) to map a public IP

    • Troubleshooting VPNs

      Troubleshooting VPNs

      Troubleshooting VPN Services Overview Troubleshooting VPNs typically encompass troubleshooting of the following configuration settings, or aspects of your remote access strategy: IP connectivity. Setting up of remote access connections IPSec IP routing To create VPN connections, there are a few requirements that have to be met: VPN services need to be enabled on the server.

    • TCP/IP

      TCP/IP

      Understanding the Function of Protocols Protocols are rules, standards and procedures that enable information to be communicated in the network environment. The rules and standards that control the way in which computers communicate are referred to as protocols. A few relevant factors to consider when discussing protocols and the network environment are: There are numerous

    microsoft-networking
    199 queries in 0.587 seconds.