October 2006

  • ARCNET

    ARCNET is a widely-installed local area network (LAN) technology that uses a token-bus scheme for managing line sharing among the workstations and other devices connected on the LAN.

  • How to automatically download configurations on routers/switches

    Sudhanshu Gupta offers the best way to automatically download configurations on routers and switches in this expert response.

  • What is a seamless router?

    In this expert response, Sudhanshu Gupta gives us a quick history lesson in routing when he answers the question "what is meant by the term 'seamless router'?"

  • STUN (Simple Traversal of UDP through NAT)

    Simple Traversal of UDP through NAT (STUN) is a protocol that governs the exchange of data over a User Datagram Protocol (UDP) connection by communications devices operating behind a Network Addres...

  • Network test plan: Checklist for architecture changes

    For every change you make to your network architecture, you should have a test plan and a backout plan. In this tip, learn how to build a test plan and review a sample checklist of things to include.

  • Making servers on a Layer 3 switch members of VLANS

    In this response, our routing and switch expert, Sudhanshu Gupta, explains how to make servers on a Layer 3 switch members of VLANS on stacked Layer 2 switches.

  • Is it possible to use a Cisco 2950 switch as a DHCP relay?

    In this response, our routing and switching expert, Sudhanshu Gupta, provides a table of commands to enable a Cisco 2950 switch DHCP functionality.

  • Defending an expansive definition of NAC

    There is a good bit of controversy about what constitutes a complete NAC solution. Broadening our definition and expectations will enable networking pros to tightly integrate NAC into the IT infras...

  • Video, audio are network drains

    Network misuse is rampant, according to a recent survey. Employees using the corporate network for recreation or high-bandwidth business can put a strain on network resources, but network engineers...

  • WAN acceleration scalability: Part 2

    Dr. David Hughes continues his discussion of the top considerations for scaling a WAN acceleration appliance. Here are numbers three through six: performance under load, hardware acceleration for e...

  • Mobility -- Chapter 5 of 802.11 Wireless LAN Fundamentals

    Mobility, Chapter 5 of 802.11 Wireless LAN Fundamentals, covers the characteristics of roaming, Layer 2 roaming, Layer 3 roaming and an introduction to mobile IP.

  • Router Expert: Building a WLAN proxy server, DHCP services: Part 2

    Router expert Michael Martin continues his discussion of building a WLAN proxy server and implementing the dhcpd.conf file. In this tip, he provides a second dhcpd.conf example that shows both the ...

  • Security Spotlight: Network Behavior Analysis goes long and wide

    Need to bulk up your network's backcourt defense? Network Behavior Analysis (NBA) is a new approach to network security that passively monitors your traffic patterns to prevent zero-day exploits, w...

  • CCNA exam preparation guide

    A learning guide for CCNA exam preparation with book chapters, expert advice and quiz.

  • Data leakage protection: Where does it fit in the network?

    Network-based antivirus and antispam products are getting a face-lift with next-generation content filtering, but is data leakage protection best served in the network or at the endpoint?

  • Measuring network hardware utilization

    Monitoring your network goes beyond just keeping tabs on your servers. You also need to monitor your hardware, such as routers and switches, to tell not only that these types of devices are functio...

  • predictive dialer

    A predictive dialer is a telephone control system that automatically calls a list of telephone numbers in sequence, screening out no-answers, busy signals, answering machines and disconnected numbe...

  • How many wireless devices can connect to an 802.11b?

    In this response, our WLAN expert, Mike Puglia, answers "How many wireless devices can connect to an 802.11b access point if the maximum capacity needed by each device is 2 MB?"

  • Microsoft RADIUS authentication

    Read this Q&A to see how Microsoft RADIUS authentication works in Microsoft/Cisco PEAP 802.11 implementation.

  • Designing a WLAN for a high school using 802.11g

    Understand AP planning after our WLAN expert, Mike Puglia, walks you through some steps in his response to how you can design a WLAN using 802.11g.