-
How does any certification expire if a degree never does?
Why does a certification expire? View this Q&A debating the reasons for network certification expirations.
-
What are the routing differences between IPv4 and IPv6?
Between IPv4 and IPv6, find out how routing differs, in this Q&A with Silvia Hagen.
-
In IP, could we eliminate the need for ARP?
Could ARP be eliminated from IP? Silvia Hagen explains in this Q&A.
-
Can I connect WLAN and LAN clients using 802.1x and EAP?
Learn how to connect wireless and wired LAN clients using 802.1x and EAP with a workgroup instead of an Active Directory Domain in this Q&A with Lisa Phifer.
-
Can computers talk to a wireless AP using ad hoc?
Wireless expert Lisa Phifer explains how to use ad hoc to get computers to talk to one another, in this response.
-
Why can't my phone connect to the wired LAN?
Learn why your 802.11g-enabled phone can connect to the Internet through a Lynksys router but not to your wired LAN, in this Q&A with Lisa Phifer.
-
How do I block MAC addresses from my DHCP server?
Learn how to block MAC addresses on your network from getting any IP addresses off your DHCP server, in this expert response with security expert Puneet Mehta.
-
Is my hotspot provider vulnerable to MAC address spoofing?
In this Q&A with wireless networking expert Lisa Phifer, see if your hotspot provider is vulnerable to MAC address spoofing when it uses Web portal to charge customers for wireless access.
-
How can I tell when packet loss is affecting application behavior?
Learn how to determine whether your application behavior is being affected by packet loss in this Q&A.
-
What causes packet loss across the WAN?
Learn what causes packet loss across the WAN in this expert response.
-
What causes packet loss across the WAN, and how can I tell when it affects application behavior?
Learn what causes packet loss across a WAN, plus how you might be able to tell when packet loss is affecting your network's application behavior, in this Q&A with Dr. Hughes.
-
How do I connect my VLANs to the Internet using NAT and the appropriately configured ACL?
Confused about using NAT and configuring ACL? Learn how to connect your VLANs to the Internet over a router with sub-interfaces already defined.
-
How does a Layer 3 switch work in a network?
Learn how a Layer 3 switch works in a network, in this Q&A with routing and switching expert Sudhanshu Gupta.
-
In a CSMA/CD environment, how many repeaters may be used between end systems?
Learn how to extend the range of your signal with a repeater in this Q&A with Lindi Horton.
-
What is the advantage of frame relay over leased lines?
Learn about data transmission over leased lines in this expert response about frame relay.
-
Can you hook a Cisco IP phone to a wireless access point connection?
Find out if you can hook a Cisco IP phone to a wireless access point connection in this Q&A with Carrie Higbie.
-
What is the relationship between cable frequency and bandwidth?
How does bandwidth relate to cable frequency? Find out from infrastructure expert Carrie Higbie, in this response.
-
Can I take the CCNA as a first step towards my networking career?
David Minutella suggests how to break into the networking field in this Q&A.
-
For the CCNA exam, do I need to know about LANs?
Find out what material is on the CCNA before you take it in this expert response with Cisco certifications expert David Minutella.
-
Does IPv6 support encryption in the IP stack?
Does IPv6 support encryption in the IP stack? Learn from Silvia Hagen in this expert response.
-
BYOD security: Which VPN is best for you, IPsec or SSL?
By 2016, 40% of the workforce will be mobile. IPsec VPNs are being widely discussed for BYOD security. But should we also be talking about SSL VPNs?
-
Why should you care about SDN?
Expert Jim Damoulakis weighs in on the potential of software-defined networking, or SDN, and why you should care.
-
Can you really have security, convenience and BYOD?
Employee-owned devices can seriously undermine security. But bring your own device is probably here to stay. So what should IT do?
Network Management Strategies for the CIO