-
What does a subnet do?
Learn about the role of the subnet in a network, including switching and packet recognition.
-
What's the difference between VPN pass-through and multi-tunneling?
Learn why multi-tunneling is better than VPN pass-through and how IPsec plays a role from an expert.
-
What is a genetic algorithm and where can I learn more about them online?
Learn about genetic algorithms as well as where to find online resources for understanding them.
-
Minimum and maximum Ethernet frame sizes
In this Q&A, our network administration expert addresses Ethernet frame sizes, as well as minimum and maximum sizes of Ethernet frames that carry IP and ICMP.
-
Will 25b army school help me get a job or CCNA certified?
Find out if 25b army school will prepare you for the CCNA exam or help you get a career.
-
How does IPv6 subnetting work in LAN and VLAN network design?
Learn the differences between IPv4 and IPv6 addressing and subnetting for local area network (LAN) and virtual LAN (VLAN) design in this expert advice.
-
When preparing for the CCNA exam, are print or online study sources best?
Learn what sources to look at when preparing for CCNA certification in this expert response.
-
What's the difference between the two CCNA certification tracks?
Find out which test track you should take when getting CCNA certification in this expert response.
-
Problem connecting to virtual private network (VPN) through Linksys router
When your remote worker has problems connecting to your virtual private network (VPN) only when they go through a Linksys router, use these steps to resolve the connection issue.
-
Why wireless network cards show activity when no one uses the computer
Your wireless network card shows activity when you're not using it. Is someone hacking your unit? See what's using your connection in this explanation from our expert.
-
Wireless networking problems combining 802.11n and 802.11g APs cause
Will using both 802.11g and 802.11n access points cause problems with your wireless network? Learn from Wi-Fi expert Lisa Phifer how to ensure peaceful coexistence between old and new clients shari...
-
What's the best way to prepare for the CCNA exam alone?
Find out what resources you'll need to pass the CCNA exam without taking any classes.
-
Why haven't I received my CCNA certification? I passed the test.
Find out who to contact when your CCNA certification hasn't arrived from Cisco.
-
Can a Layer 3 switch replace a router for WAN connections?
Learn how to use a Layer 3 switch in place of a router for WANs from a routing expert.
-
How to set up a VLAN on multiple switches
Learn how to establish a VLAN over multiple routers in this response from a networking expert.
-
How can I implement MAC address binding between switches?
Learn what configuration you need to implement MAC binding across switches in this expert response.
-
Where is Ed Tittel's most recent network training and certification advice?
To view network training and certification expert Ed Tittel's latest advice, see his Public Profile on the IT Knowledge Exchange.
-
Why isn't CCNA certification enough to get me hired?
Learn why CCNA certification won't guarantee you a job and what you can do to secure a position.
-
Where is Carrie Higbie's most recent advice?
To view networking infrastructure and project management expert Carrie Higbie's latest advice, see her Public Profile on the IT Knowledge Exchange.
-
What is the difference between a managed and unmanaged switch?
Our routing and switching expert explains the difference between a managed and unmanaged switch, pointing out that although a managed switch is more complex and requires skill to maintain, it offer...
-
BYOD security: Which VPN is best for you, IPsec or SSL?
By 2016, 40% of the workforce will be mobile. IPsec VPNs are being widely discussed for BYOD security. But should we also be talking about SSL VPNs?
-
Why should you care about SDN?
Expert Jim Damoulakis weighs in on the potential of software-defined networking, or SDN, and why you should care.
-
Can you really have security, convenience and BYOD?
Employee-owned devices can seriously undermine security. But bring your own device is probably here to stay. So what should IT do?
Network Management Strategies for the CIO