October 2006

  • Linking PKI and PMK infrastructures

    In this Q&A, Mike Puglia explains how to link PKI and PMK infrastructures.

  • Microsoft RADIUS authentication

    Read this Q&A to see how Microsoft RADIUS authentication works in Microsoft/Cisco PEAP 802.11 implementation.

  • Designing a WLAN for a high school using 802.11g

    Understand AP planning after our WLAN expert, Mike Puglia, walks you through some steps in his response to how you can design a WLAN using 802.11g.

  • How many wireless devices can connect to an 802.11b?

    In this response, our WLAN expert, Mike Puglia, answers "How many wireless devices can connect to an 802.11b access point if the maximum capacity needed by each device is 2 MB?"

  • V.90

    V.90 is a A Tour of the Internet, Who Runs It, Standards Org, approved by the International Telecommunications Union (ITU-TS), for transmitting data downstream to modems at 56 Kbps (thousand bits p...

  • wavelength

    Wavelength is the distancebetween identical points in the adjacent cycles of a waveform signal propogated in space or along a wire, as shown in the illustration.

  • spread spectrum

    Spread spectrum is a form of wireless communications in which the frequency of the transmitted signal is deliberately varied.

  • Staging labs for network engineering

    Making changes to your network is less scary with adequate planning and staging, and go even more smoothly if you have a staging lab. In this tip, Tom Lancaster explains how and why such labs can b...

  • How does IPv6 compare to IPv4 in its configuration?

    Silvia Hagen, our IPv6 expert, talks about the IPv6 address and subnetting, in this Q&A.

  • What is the possible impact of switching 64 subnets to 70?

    In this response, our IPv6 expert, Silvia Hagen, answers what the impact is of using 70 subnets instead of 64.

  • Nessus

    Nessus is an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools.

  • Getting WEP association

    In this Q&A, Lisa Phifer explains why association may not happen when trying to connect a smart bridge with an Atheros radio and Monowall to a Tranzeo TR 6000.

  • Voice over wireless gets easier with Trapeze architecture

    Wireless networks can have the best of both architectures with Trapeze Networks' centralized/decentralized intelligent wireless switching system.

  • High-gain antennas and the near field effect

    In this response, Lisa Phifer explains the use of a high-gain antenna and what the near field effect is.

  • Creating a WPA2 compliant network

    Our expert, Lisa Phifer, goes through the basic principles of creating a WPA2 compliant network, in this Q&A.

  • Wireless connection in the wilderness

    Lisa Phifer explains how to connect office buildings wirelessly where laying cable is not an option due to trees and rocky terrain.

  • What to do when your server goes down

    When a server goes down at a particular time every night without the prompt of a virus, our expert, Puneet Mehta, can tell you what the problem is and what you can do to avoid it.

  • Host-based firewall for servers

    Puneet Mehta, our expert, talks about the use of having a host-based firewall for W2K3 servers, and, if they are needed, where you can go for resources.

  • The difference between IPsec and SSL

    In this Q&A, our expert, Puneet Mehta, offers a valuable resource on the difference between IPsec and SSL.

  • A remote worker can threaten network security

    Remote workers are wreaking havoc on their networks. A recent study commissioned by Cisco found that teleworkers are putting security at risk.