-
LAN connectivity problem: Blame DNS, NIC or firewall?
ITKnowledge Exchange member "BinooDas1234" had connectivity issues with a troublesome LAN, and fellow techies jumped in to help out. But does the answer lie in the DNS configuration, the NIC driver...31 Jan 2006
-
Router Expert: Initial configuration of a Cisco 1200 802.11g WLAN access point
Our router expert continues his series on building a secure wireless LAN with a Linux base. This article explains how to utilize a single Cisco 1200 series access point to provide access to three d...31 Jan 2006
-
Using Netsh with Windows Firewall
This tip examines how to configure and troubleshoot Windows Firewall using the Netsh command-line utility. The procedures covered apply to both the Windows XP Service Pack 2 and Windows Server 2003...31 Jan 2006
-
Crash Course: Protocol analysis
Analyzing your network is essential to keep it running smoothly and safely. This collection of articles, many contributed by our friend Laura Chappell, shows you the ins and outs.31 Jan 2006
-
Understanding the NNTP protocol
Everyone knows about peer-to-peer programs such as Napster, Kazaa, amongst others. How many people though know about binary newsgroups? Probably not many. These binary newsgroups are based on the N...31 Jan 2006
-
The truth about network diagnostics
We often say "diagnostics" but we don't really mean it -- at least not in the context of networks. In this featured column, Loki Jorgenson explains why the burden of analysis that leads to identify...31 Jan 2006
-
Purchasing a new router: How, why and which one to buy
Ken Milberg discusses reasons for buying a new router, and looks at the options available from the big-name vendors.31 Jan 2006
-
Property management company beefs up network security
Enterprises could learn a lesson from Managed Services Inc., which rolled out wired and wireless network access to dozens of its properties nationwide, but in doing so found security could suffer.30 Jan 2006
-
Implementing QoS as part of a complete application acceleration solution
Despite reports to the contrary, QoS is still essential for guaranteeing the quality of application delivery and ensuring predictable behavior across an optimized WAN. In this tip, Dr. David Hughes...30 Jan 2006
-
home server
A home server is a computer that functions as a server in a client-server home network.27 Jan 2006
-
IP network design, part 2: The IP addressing plan
The IP addressing plan is the foundation upon which a successful logical design is built. Part two of this tip explains how to formulate a scalable IP addressing plan that can support the network a...27 Jan 2006
-
Network certification: What's new?
Ed Tittel provides an update on the latest in networking certifications and lists handy resources for finding out more information.27 Jan 2006
-
The importance of IP address management
IP addresses are an integral part of any corporate network, and companies large and small are consuming them faster with more applications and devices than ever before. Overlooking the importance o...26 Jan 2006
-
Networking certification tables
Look-up points for certification programs from vendor and non-vendor organizations (the latter are a mix of training companies and industry associations of various kinds).26 Jan 2006
-
Tick, tick, boom: NAC market ready to explode
By 2008, the market for NAC enforcement tools will see astonishing growth, hitting $3.9 billion, suggests an Infonetics study.25 Jan 2006
-
What is the relationship between application errors and network performance?
Have you done any analysis of the relationship between application errors and network performance and, if so, what are your conclusions? When setting threshold condition traps, it's important to kn...25 Jan 2006
-
Change can be a good thing according to configuration management vendors
A facelift for AlterPoint's change and configuration management tool gives users more control of network-level compliance.25 Jan 2006
-
What effects will IPv6 have on managing network applications?
What effects will IPv6 have on managing network applications?25 Jan 2006
-
Firm has NAC for network protection
A financial information and research firm locks down their network from remote threats with help from a NAC tool by InfoExpress.24 Jan 2006
-
Five common insider threats and how to mitigate them
Users can be an enterprise's best defense or its worst enemy. They have access to valuable network resources and information that can be used for ill-gain, be it accidentally or intentionally. This...23 Jan 2006
Network Management Strategies for the CIO