-
Linking PKI and PMK infrastructures
In this Q&A, Mike Puglia explains how to link PKI and PMK infrastructures.17 Oct 2006
-
Microsoft RADIUS authentication
Read this Q&A to see how Microsoft RADIUS authentication works in Microsoft/Cisco PEAP 802.11 implementation.17 Oct 2006
-
Designing a WLAN for a high school using 802.11g
Understand AP planning after our WLAN expert, Mike Puglia, walks you through some steps in his response to how you can design a WLAN using 802.11g.17 Oct 2006
-
How many wireless devices can connect to an 802.11b?
In this response, our WLAN expert, Mike Puglia, answers "How many wireless devices can connect to an 802.11b access point if the maximum capacity needed by each device is 2 MB?"17 Oct 2006
-
V.90
V.90 is a A Tour of the Internet, Who Runs It, Standards Org, approved by the International Telecommunications Union (ITU-TS), for transmitting data downstream to modems at 56 Kbps (thousand bits p...16 Oct 2006
-
wavelength
Wavelength is the distancebetween identical points in the adjacent cycles of a waveform signal propogated in space or along a wire, as shown in the illustration.16 Oct 2006
-
spread spectrum
Spread spectrum is a form of wireless communications in which the frequency of the transmitted signal is deliberately varied.16 Oct 2006
-
Staging labs for network engineering
Making changes to your network is less scary with adequate planning and staging, and go even more smoothly if you have a staging lab. In this tip, Tom Lancaster explains how and why such labs can b...16 Oct 2006
-
How does IPv6 compare to IPv4 in its configuration?
Silvia Hagen, our IPv6 expert, talks about the IPv6 address and subnetting, in this Q&A.16 Oct 2006
-
What is the possible impact of switching 64 subnets to 70?
In this response, our IPv6 expert, Silvia Hagen, answers what the impact is of using 70 subnets instead of 64.16 Oct 2006
-
Nessus
Nessus is an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools.12 Oct 2006
-
Getting WEP association
In this Q&A, Lisa Phifer explains why association may not happen when trying to connect a smart bridge with an Atheros radio and Monowall to a Tranzeo TR 6000.12 Oct 2006
-
Voice over wireless gets easier with Trapeze architecture
Wireless networks can have the best of both architectures with Trapeze Networks' centralized/decentralized intelligent wireless switching system.12 Oct 2006
-
High-gain antennas and the near field effect
In this response, Lisa Phifer explains the use of a high-gain antenna and what the near field effect is.12 Oct 2006
-
Creating a WPA2 compliant network
Our expert, Lisa Phifer, goes through the basic principles of creating a WPA2 compliant network, in this Q&A.12 Oct 2006
-
Wireless connection in the wilderness
Lisa Phifer explains how to connect office buildings wirelessly where laying cable is not an option due to trees and rocky terrain.12 Oct 2006
-
What to do when your server goes down
When a server goes down at a particular time every night without the prompt of a virus, our expert, Puneet Mehta, can tell you what the problem is and what you can do to avoid it.11 Oct 2006
-
Host-based firewall for servers
Puneet Mehta, our expert, talks about the use of having a host-based firewall for W2K3 servers, and, if they are needed, where you can go for resources.11 Oct 2006
-
The difference between IPsec and SSL
In this Q&A, our expert, Puneet Mehta, offers a valuable resource on the difference between IPsec and SSL.11 Oct 2006
-
A remote worker can threaten network security
Remote workers are wreaking havoc on their networks. A recent study commissioned by Cisco found that teleworkers are putting security at risk.11 Oct 2006
Network Management Strategies for the CIO