• Main Menu
  • Microsoft Networking

    • How to Remove IPv6 in Windows

      How to Remove IPv6 in Windows

      IPv6 stands for Internet Protocol version 6. IPv6 is the latest version of the network-layer protocol for packet-switched networks. The version that is generally used is IPv4. One of the reasons for the upgrade to IPv6 is that it allows greater space and flexibility in assigning IP addresses. For instance, IPv4 is based on a

    • Considerations in Planning a Network Infrastructure

      Considerations in Planning a Network Infrastructure

      Defining Network Infrastructure A network can be defined as the grouping of hardware devices and software components which are necessary to connect devices within the organization, and to connect the organization to other organizations and the Internet. Typical hardware components utilized in a networking environment are network interface cards, computers, routers, hubs, switches, printers, and

    • Installing and Configuring TCP/IP

      Installing and Configuring TCP/IP

      Installing TCP/IP TCP/IP is installed automatically when the Windows Server 2003 setup process runs. It is not usually necessary to install TCP/IP after the Windows Server 2003 setup process completed. The instances when you might need to manually install TCP/IP are listed below: TCP/IP was disabled when the Windows Server 2003 setup process executed. TCP/IP

    • APIPA

      APIPA

      Automatic Private IP Addressing (APIPA) Overview DHCP is a service that functions at the application layer of the TCP/IP protocol stack. One of the primary tasks of the DHCP service is to automatically assign IP addresses to DHCP clients. A server running the DHCP service is called a DHCP server. The DHCP service automates the

    • SSL (Secure Sockets Layer)

      SSL (Secure Sockets Layer)

      An Overview on Secure Sockets Layer (SSL) The Secure Sockets Layer (SSL) protocol was developed by Netscape Communications, and enables secure communication over the Internet. SSL works at the transport layer of Transmission Control Protocol/Internet Protocol (TCP/IP), which makes the protocol independent of the application layer protocol functioning on top of it. SSL is an

    • NetBIOS Node Types

      NetBIOS Node Types

      A NetBIOS node type is a method that a computer uses to resolve a NetBIOS name into an IP address. A NetBIOS node type allows an administrator to configure the order and method that a client uses when resolving NetBIOS names to IP addresses. Understanding how the various node types function will help users to

    • Understanding the Department of Defense Network Model

      Understanding the Department of Defense Network Model

      Department of Defense Network (DoD) Network Model Introduction Back in 1960, systems were primarily made up of mainframe computers, and were typically owned by fairly large companies and government institutions. Because mainframe computers run different proprietary software, and due to mainframes not being able to communicate between each other, special code (interface) had to be

    • Understanding IPv6

      Understanding IPv6

      Understanding the Limitations of IPv4 Before moving on the to an in-depth discussion of IPv6, lets first look at the limitations of IPv4: The IPv4 addresses are somewhat scarce, even though it allows for 4,294,967,296 possible addresses. Because of this limitation, organizations are forced to utilize Network Address Translator (NAT) to map a public IP

    • Understanding Ethernet LAN Segmentation

      Understanding Ethernet LAN Segmentation

      LAN Segmentation Overview Network segmentation is the terminology used to describe the process of dividing single Ethernet segments into multiple segments. Network segmentation has the following main advantages: Network performance of the LAN is improved. Network congestion issues can be resolved. Available bandwidth is maximized. A few technologies which you can use to perform network

    • The Certificate Enrollment Process

      The Certificate Enrollment Process

      While encryption can be a robust security technology, users have to implement a public key infrastructure (PKI) to make it beneficial and trusted within an organization. The Windows 2000 and Windows Server 2003 PKI implementation resides in Certificate Services. A public key infrastructure is the collection of technology, protocols, services, standards, and policies that control

    126 queries in 0.403 seconds.