Subtracting Binary Numbers by Adding the 2's Complement
By Kevin Ritzman
In this learning activity you'll solve three binary subtraction problems using the 2's complement method.
An Algorithm for Converting a Binary Number to a Decimal Number
In this learning activity you'll examine two methods for converting a binary number to a decimal number.
By Terry Bartelt
In this learning activity you'll explore the process that servers follow to take a name entered on a computer browser and convert it to an IP address.
Firewall: Network Address Translation/Port Address Translation
By Joseph Wetzel, Douglas Tabbutt
In this learning activity you'll examine how network address translation works.
Firewall: Stateful Packet Inspection
In this learning activity you'll examine a stateful packet inspection firewall that keeps track of legitimate Internet service requests, also known as dynamic packet filtering.
In this learning activity you'll examine how routers transfer data between local area networks and the Internet.
By Dawn Rohm
In this learning activity, you’ll explore how routers use routing tables to move data packets from their origin to their destination.
Understanding Cloud Service Types
By Jeff Sonnleitner
You'll explore the three main services of cloud computing: Software as a service, Platform as a Service, and Infrastructure as a Service.
The IP Address Format
In this learning activity you'll examine the format of an IP address and interpret the octet by converting between decimal and binary numbers.
Components of a Data Center
In this learning activity you'll describe the typical components of a data center.
You'll be introduced to the Go-Back-N ARQ, learn what it is, and find out how it's used to keep track of data sent between networked computers.
In this learning activity, you'll examine the different ways in which computers and other equipment are physically connected in local area networks and the advantages and disadvantages of each topology.
CRC – Cyclic Redundancy Check
In this learning activity, you’ll be introduced to what the CRC is, the technology behind it, and how it’s performed.
In this learning activity you'll explore the physical construction and operation of single-mode and multi-mode fiber-optic cables used in networking.
IP Addressing and Subnetting
In this learning activity you'll review how a local area network computer uses a subnet mask to determine if its message is intended for a computer on the same network or on a remote network.
Firewalls: Relationships Among Firewall Perimeters
In this learning activity you'll examine how firewalls block viruses by discussing trusted, semi-trusted, and untrusted networks.
SSH - Secure Shell
By Joseph Wetzel
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
Twisted Pair Cable Noise Immunity
In this learning activity you'll explore how to reduce electromagnetic interference (EMI) and crosstalk between adjacent wires.
Fibre Channel Storage Area Networks
By Steve Ebben
Fibre Channel storage area networks can play a pivotal role in the performance of cloud computing. This learning activity
will explain the benefits, components, and some basic configurations of fibre channel networks.
Peer-to-Peer Operating Systems
In this learning activity you'll examine how computers operate in a peer-to-peer network operating system.
How the Ethernet Works
In this learning activity you'll explore how computers connected on a network use Ethernet technology.
Bandwidth Capacity Techniques
By Dennis Fontaine, Terry Bartelt
In this learning activity you'll follow the process of converting digital data into a series of analog signals.
In this learning activity you'll examine how a large computer network is configured.
Port Scanning - Common Network Protocols
In this learning activity you'll explore three common network protocols that computers use to communicate in a network.
STP - The Spanning Tree Protocol
In this learning activity you'll use the Spanning Tree Protocol to correctly set up a loop-free Ethernet local area network.