-
Can Network Address Translation work without static IP addresses?
Find out how Network Address Translation (NAT) works with static and dynamic IP addresses and what the most common type of NAT is from our networking fundamentals expert.
-
Troubleshooting networks: Can vendor software self-install firewalls?
Can firewalls block the use of a shared folder after the installation of a router? Our network security expert troubleshoots this wireless connection problem using these steps.
-
Why are TCP/IP networks considered unsecured?
Learn why TCP/IP networks are considered unsecured from our networking security expert, Michael Gregg.
-
VLANs versus IP subnets: Why use a VLAN over IP subnetting?
A virtual local area network (VLAN) is better than IP subnetting because its advantage is security. Learn what a VLAN is and how it differs from creating IP subnets, in this expert response from ou...
-
Difference between circuit-switching and packet-switching in examples
What is the difference between a circuit switching and packet switching? Our networking fundamentals expert gives examples of packet switching and circuit switching in this response.
-
How to link wired LANs using wireless network bridges and APs
Our wireless networking expert aids an administrator deploy a WLAN in this response to the question "How can I link my wired LANs using ZyXEL's B-3000 access point (AP) and B-420 wireless bridges?"
-
Bandwidth allocation: How can I give a download limit for each user?
To manage bandwidth, learn how to allocate download limits for each user in your network with policy settings on devices, our administration expert advises.
-
How wireless network encryption affects signal strength, connectivity
Our wireless networking expert explains how Wi-Fi encryption could affect signal strength and therefore connection loss, in this expert explanation.
-
Why error reporting ICMP messages include IP headers and datagram data
Learn why Internet Control Message Protocol (ICMP) error reports include IP headers and the first 8 bytes of datagram data in this response from our network administration expert.
-
CCVP certification: Job market availability for unified communications
Are there opportunities in the job market for Cisco Certified Voice Professionals (CCVP)? Our certification expert explains where you can apply this voice specialty and what your salary increases t...
-
Can neighboring 802.11n and 802.11g networks avoid coexistence problems?
After an 802.11n migration, our wireless networking expert explains how to avoid coexistence problems with neighboring businesses that still use 802.11g.
-
Creating a wireless bridge to connect clients distant from APs
Learn how to use one Wi-Fi module for creating a wireless bridge in order to connect clients that are distant from your access points (APs), in this expert response.
-
What is a GRE tunnel and how does it differ from an IPsec tunnel?
Learn the difference between a GRE tunnel and IPsec tunnel in this Ask the Expert response.
-
Can 802.11n clients turn off radios to conserve battery life?
Learn about the wireless 802.11n standard's power save features that can manage your Wi-Fi clients to conserve batteries.
-
How do VPN concentrators and network access servers (NAS) differ?
Find out if there's a difference between a virtual private network (VPN) concentrator and a network access server (NAS) in this explanation from our network security expert, Puneet Mehta.
-
What keeps unauthorized users from accessing my IP address/Internet?
Our network security expert explains how to keep unauthorized users from accessing your router's IP address for Internet access in this advice explaining how proxy servers can solve client control ...
-
Troubleshooting VLANs: How to monitor 802.1q tagged traffic
When troubleshooting a virtual LAN (VLAN), learn how to monitor 802.1q tagged traffic within a network in this advice from our routing and switching expert.
-
What is the difference between packet fragmentation in IPv4 and IPv6?
In this Q&A, our IPv6 expert explains how packet fragmentation differs in IPv6 compared to IPv4.
-
Which OSI layers are network managers responsible for?
Learn which layers of the OSI model network managers should be responsible for. Our expert, Lindi Horton, explains where to focus your manual operations, especially regarding automated operation ta...
-
What VLAN management software supports multiple vendor platforms?
Our network administration expert shows you which VLAN network management configuration and automation software supports multiple vendors and platforms, in this expert response.
-
BYOD security: Which VPN is best for you, IPsec or SSL?
By 2016, 40% of the workforce will be mobile. IPsec VPNs are being widely discussed for BYOD security. But should we also be talking about SSL VPNs?
-
Why should you care about SDN?
Expert Jim Damoulakis weighs in on the potential of software-defined networking, or SDN, and why you should care.
-
Can you really have security, convenience and BYOD?
Employee-owned devices can seriously undermine security. But bring your own device is probably here to stay. So what should IT do?
Network Management Strategies for the CIO