-
In IPv4, do private address ranges have a default subnet mask?
In this expert response, Silvia Hagen explains the relationship between private IP address range and default subnet masks. She also informs us about new address types coming up in IPv6 that will ma...
-
How to implement VLAN switches across wireless LAN (WLAN) links
Learn different methods of creating virtual LANs (VLANs) on a wireless LAN (WLAN) in this expert response from Lisa Phifer.
-
How can I use a Layer 3 switch for voice routing?
Learn how to use a Layer 3 switch for voice routing in this expert response from a switch expert.
-
Are there 802.11n wireless antenna extenders to boost outdoor signal?
Learn how to increase Wi-Fi range when multipath reflections aren't enough in this advice from our wireless networking expert.
-
What does a QM FSM error signify on a VPN Concentrator?
Learn how to solve a QM FSM error when working on a LAN-to-LAN VPN from a network security expert.
-
How does WiMAX compare to other wireless broadband services?
Learn about WiMAX and similar WAN technologies, such as 3g, in an expert response from Lisa Phifer.
-
What training do I need for a career in network administration?
Find out what certifications you'll need for a job as a network administrator.
-
How to block porn with ISA-server firewalls
Learn how to block unwanted content, including dangerous messengers and porn, from your server.
-
How many more users will 802.11n wireless access points support?
Learn about the upgrades in 802.11n wireless access points; including speed, data rates, and bandwidth from wireless networking expert Lisa Phifer.
-
What security measures are recommended for each level of the TCP/IP model?
Find out where to put security measures and what options are available in the TCP/IP model in this expert response from Michael Gregg.
-
Why implementing adequate security challenges LAN administration
Learn why proper security implementation challenges LAN administration, in this response from enterprise network security expert Michael Gregg, and how to lessen security incidents.
-
Accessing printers on a LAN while connected to a WLAN
Learn how to connect printers on a LAN to users on a WLAN and IP address assignment problems between networks from wireless expert Lisa Phifer.
-
What is the Free Public WiFi network I keep seeing in public places?
If you've tried connecting to Free Public WiFi without success, this expert response explains what the network is and why it doesn't work.
-
How to maintain corporate VPN connection while printing to a private network
In this advice from our wireless networking expert, learn how to maintain a corporate VPN connection while printing to a private network.
-
How to connect wireless networks for printing capabilities
Get step-by-step instructions on how to connect wireless routers so that you can print wirelessly and stay connected to the Internet in this expert response from Lisa Phifer.
-
Inter-VLAN routing with a LAN and WAN on a single router
Find out how to have VLAN and LAN/WAN networks on a single router from industry expert Sudhanshu Gupta.
-
What do routers use MAC addresses for?
Find out what routers do with MAC addresses and why they're needed in this response from routing and switching expert Sudhanshu Gupta.
-
Do multiple router interfaces affect the amount of IP addresses?
Learn about router interfaces and the assignment of IP addresses in this response from networking expert Chris Partsenidis.
-
How can I prevent collisions on my network?
Learn about network collisions and how to prevent them with networking expert Chris Partsenidis.
-
Who is responsible for updating network firewalls?
Find out who is responsible for the installing and maintaining firewalls and other network devices in this response from network security expert Puneet Mehta.
-
BYOD security: Which VPN is best for you, IPsec or SSL?
By 2016, 40% of the workforce will be mobile. IPsec VPNs are being widely discussed for BYOD security. But should we also be talking about SSL VPNs?
-
Why should you care about SDN?
Expert Jim Damoulakis weighs in on the potential of software-defined networking, or SDN, and why you should care.
-
Can you really have security, convenience and BYOD?
Employee-owned devices can seriously undermine security. But bring your own device is probably here to stay. So what should IT do?
Network Management Strategies for the CIO