Clients and Servers
By Terry Bartelt
In this learning activity you'll observe how computers operate in a client-server network operating system and consider the advantages and disadvantages of such a system.
An Algorithm for Converting a Decimal Number to a Binary Number
By Kevin Ritzman
In this learning activity you'll examine a systematic method for converting a decimal number (base 10) into a binary number (base 2).
Twisted Pair Cable Noise Immunity
In this learning activity you'll explore how to reduce electromagnetic interference (EMI) and crosstalk between adjacent wires.
IP Routing
By Dawn Rohm
In this learning activity, you’ll explore how routers use routing tables to move data packets from their origin to their destination.
Virtual Private Networks (VPN)
By Joseph Wetzel
In this learning activity you'll explore how VPN is used to create a secure connection between two networks.
Firewalls: Relationships Among Firewall Perimeters
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine how firewalls block viruses by discussing trusted, semi-trusted, and untrusted networks.
FTP - What You Need to Know
In this learning activity you'll explore why the FTP protocol is often used to transfer data across the network and more importantly, why it should not be.
Fibre Channel Storage Area Networks
By Steve Ebben
Fibre Channel storage area networks can play a pivotal role in the performance of cloud computing. This learning activity
will explain the benefits, components, and some basic configurations of fibre channel networks.
Fiber-Optic Cables
In this learning activity you'll explore the physical construction and operation of single-mode and multi-mode fiber-optic cables used in networking.
SSH - Secure Shell
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
STP - The Spanning Tree Protocol
In this learning activity you'll use the Spanning Tree Protocol to correctly set up a loop-free Ethernet local area network.
Routers
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
Unshielded Twisted Pair Cables
In this learning activity you'll identify various types of unshielded twisted pair cables and their networking connectors.
Peer-to-Peer Operating Systems
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
Man in the Middle Attacks with ARP Poisoning
In this learning activity you'll identify Man-in-the-middle attacks and discuss how they affect network security.
Port Scanning
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
Coaxial Cables
In this learning activity you'll examine the RG ratings, networking applications, and types of connections for various coaxial cables.
Data Flow on the Internet
By Mark Puig
In this learning activity you'll examine how a data file is broken into packets and transmitted over the Internet.
Port States
By mkrzyszkowski
In this learning activity you'll identify TCP and UDP port states and how they behave during interaction.
Subtracting Binary Numbers by Adding the 2's Complement
In this learning activity you'll solve three binary subtraction problems using the 2's complement method.
Network Internet Protocol (IPv6)
By Brett Sheleski, Terry Bartelt
In this learning activity you'll explore the IPv4 IP address scheme and the planned conversion to IPv6.
Understanding Cloud Service Types
By Jeff Sonnleitner
You'll explore the three main services of cloud computing: Software as a service, Platform as a Service, and Infrastructure as a Service.
Port Scanning - Common Network Protocols
In this learning activity you'll explore three common network protocols that computers use to communicate in a network.
Dynamic Host Configuration Protocol
In this learning activity you'll examine the software operation Dynamic Host Configuration Protocol (DHCP), which automatically performs TCP/IP configurations.
Firewalls: Packet Filters
In this learning activity you'll create a packet filter.
How Switches Increase Speed
In this learning activity you'll observe how switches are used in local area networks to increase data transmission speeds.
Domain Model
In this learning activity you'll examine how a large computer network is configured.
Bandwidth Capacity Techniques
By Dennis Fontaine, Terry Bartelt
In this learning activity you'll follow the process of converting digital data into a series of analog signals.
Name Servers
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
CRC – Cyclic Redundancy Check
In this learning activity, you’ll be introduced to what the CRC is, the technology behind it, and how it’s performed.
Network Topologies
In this learning activity, you'll examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
IP Addressing and Subnetting
In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.
The IP Address Format
In this learning activity you'll examine the format of an IP address and interpret the octet by converting between decimal and binary numbers.
Go-Back-N ARQ
You'll be introduced to the Go-Back-N ARQ, learn what it is, and find out how it's used to keep track of data sent between networked computers.
An Algorithm for Converting a Binary Number to a Decimal Number
In this learning activity you'll examine two methods for converting a binary number to a decimal number.
Bandwidth
In this learning activity you'll explore bandwidth.
This game covers Windows 2012 Server: File and Share Access; Print and Document Services; and Remote Management.
You'll test your knowledge of some common TCP/IP protocols and numbers.
You'll test your familiarity of some commonplace Linux acronyms.
You'll build knowledge relating to basic routers.
You'll learn the different layers of the OSI model.
You'll focus on terms relating to standards used in telecommunication networks.
You'll become familiar with IEEE 802.11 wireless standards ranging 1997 to those released prior to 2009.
You'll become familiar with IEEE 802.11 wireless standards that were ratified between 2009 and 2013.
You'll become familiar with WLAN client hardware and software.
You'll become familiar with various access point devices.
You'll be introduced to the fundamental terms associated with radio frequencies.
You'll learn to identify types of electromagnetic waves and how they're used.
Test your knowledge of these common networking acronyms.
You'll learn to identify frequency bands of the electromagnetic spectrum licensed by the FCC.
You'll be introduced to concepts relating to radio frequency modulation.
You'll learn how radio frequencies spread under different circumstances.
You'll learn to identify antenna terms and concepts.
You'll learn different types of antennas and terms related to antenna configurations.
You'll identify common objects that can cause interference with wireless networks.
You'll focus on conducting a site survey to design a wireless network.
You'll learn about wireless network interference.
You'll learn to classify networks by size.
You'll be introduced to the networking devices and equipment powering computer networks.
You'll focus on terms related to Internet Infrastructure.