Network Internet Protocol (IPv6)
By Brett Sheleski, Terry Bartelt
In this learning activity you'll explore the IPv4 IP address scheme and the planned conversion to IPv6.
Twisted Pair Cable Noise Immunity
By Terry Bartelt
In this learning activity you'll explore how to reduce electromagnetic interference (EMI) and crosstalk between adjacent wires.
In this learning activity you'll explore the physical construction and operation of single-mode and multi-mode fiber-optic cables used in networking.
Peer-to-Peer Operating Systems
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
An Algorithm for Converting a Decimal Number to a Binary Number
By Kevin Ritzman
In this learning activity you'll examine a systematic method for converting a decimal number (base 10) into a binary number (base 2).
By Dennis Fontaine, Terry Bartelt
In this learning activity you'll explore bandwidth.
Firewalls: Relationships Among Firewall Perimeters
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine how firewalls block viruses by discussing trusted, semi-trusted, and untrusted networks.
Bandwidth Capacity Techniques
In this learning activity you'll follow the process of converting digital data into a series of analog signals.
In this learning activity you'll examine the RG ratings, networking applications, and types of connections for various coaxial cables.
Unshielded Twisted Pair Cables
In this learning activity you'll identify various types of unshielded twisted pair cables and their networking connectors.
FTP - What You Need to Know
By Joseph Wetzel
In this learning activity you'll explore why the FTP protocol is often used to transfer data across the network and more importantly, why it should not be.
Data Flow on the Internet
By Mark Puig
In this learning activity you'll examine how a data file is broken into packets and transmitted over the Internet.
By Dawn Rohm
In this learning activity, you’ll explore how routers use routing tables to move data packets from their origin to their destination.
SSH - Secure Shell
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
High Speed Ethernet
Learners identify the advantages and disadvantages of four versions of high speed Ethernet. A short quiz completes the activity.
How Switches Increase Speed
In this learning activity you'll observe how switches are used in local area networks to increase data transmission speeds.
IP Addressing and Subnetting
In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.
In this learning activity you'll identify TCP and UDP port states and how they behave during interaction.
Fibre Channel Storage Area Networks
By Steve Ebben
Fibre Channel storage area networks can play a pivotal role in the performance of cloud computing. This learning activity
will explain the benefits, components, and some basic configurations of fibre channel networks.
STP - The Spanning Tree Protocol
In this learning activity you'll use the Spanning Tree Protocol to correctly set up a loop-free Ethernet local area network.
Setting Up Your Virtual Private Network (VPN)
The learner will understand how to set up a Virtual Private Network (VPN) using a home computer network.
Understanding Cloud Service Types
By Jeff Sonnleitner
You'll explore the three main services of cloud computing: Software as a service, Platform as a Service, and Infrastructure as a Service.
The Ethernet Frame
Learners view the seven segments of an Ethernet frame and the types of information each represents.
The IP Address Format
In this learning activity you'll examine the format of an IP address and interpret the octet by converting between decimal and binary numbers.
Port Scanning - Common Network Protocols
In this learning activity you'll explore three common network protocols that computers use to communicate in a network.