• Main Menu
  • Microsoft Networking

    • How to Remove IPv6 in Windows

      How to Remove IPv6 in Windows

      IPv6 stands for Internet Protocol version 6. IPv6 is the latest version of the network-layer protocol for packet-switched networks. The version that is generally used is IPv4. One of the reasons for the upgrade to IPv6 is that it allows greater space and flexibility in assigning IP addresses. For instance, IPv4 is based on a

    • NetBIOS Node Types

      NetBIOS Node Types

      A NetBIOS node type is a method that a computer uses to resolve a NetBIOS name into an IP address. A NetBIOS node type allows an administrator to configure the order and method that a client uses when resolving NetBIOS names to IP addresses. Understanding how the various node types function will help users to

    • Understanding Internet Connections

      Understanding Internet Connections

      Internet Connectivity Introduction  In most organizations and networks today, Internet connectivity is no longer an additional option, but a necessity. Most organizations that have a networking environment need to provide its employees or users with some form of connectivity to the Internet. E-mail and Web sites have evolved into being important mechanisms for a vast

    • Understanding Ethernet LAN Segmentation

      Understanding Ethernet LAN Segmentation

      LAN Segmentation Overview Network segmentation is the terminology used to describe the process of dividing single Ethernet segments into multiple segments. Network segmentation has the following main advantages: Network performance of the LAN is improved. Network congestion issues can be resolved. Available bandwidth is maximized. A few technologies which you can use to perform network

    • How to Open TCP Ports in Windows

      How to Open TCP Ports in Windows

      Opening TCP ports in Windows may be necessary for certain applications to run correctly. Each application may require a specific port to operate on. While a computer can and does open ports on its own, it may have to be done manually in certain situations. Here is a simple procedure. Step 1. Launch Windows and

    • The Windows Routing Table

      The Windows Routing Table

      When routers need to forward packets, they interpret the packets’ addresses then use the information in the routing tables to pass the packet on. Data packets contain both source and destination addresses in their packet headers. This is the information that is used when routing decisions need to be made. The destination address is compared

    • Understanding IPv6

      Understanding IPv6

      Understanding the Limitations of IPv4 Before moving on the to an in-depth discussion of IPv6, lets first look at the limitations of IPv4: The IPv4 addresses are somewhat scarce, even though it allows for 4,294,967,296 possible addresses. Because of this limitation, organizations are forced to utilize Network Address Translator (NAT) to map a public IP

    • Troubleshooting VPNs

      Troubleshooting VPNs

      Troubleshooting VPN Services Overview Troubleshooting VPNs typically encompass troubleshooting of the following configuration settings, or aspects of your remote access strategy: IP connectivity. Setting up of remote access connections IPSec IP routing To create VPN connections, there are a few requirements that have to be met: VPN services need to be enabled on the server.

    • TCP/IP

      TCP/IP

      Understanding the Function of Protocols Protocols are rules, standards and procedures that enable information to be communicated in the network environment. The rules and standards that control the way in which computers communicate are referred to as protocols. A few relevant factors to consider when discussing protocols and the network environment are: There are numerous

    • SSL (Secure Sockets Layer)

      SSL (Secure Sockets Layer)

      An Overview on Secure Sockets Layer (SSL) The Secure Sockets Layer (SSL) protocol was developed by Netscape Communications, and enables secure communication over the Internet. SSL works at the transport layer of Transmission Control Protocol/Internet Protocol (TCP/IP), which makes the protocol independent of the application layer protocol functioning on top of it. SSL is an

    131 queries in 0.372 seconds.