-
How a Switch Works -- Chapter 6 of 'LAN Switching First-Step'
How a Switch Works explains how to differentiate among unicast, multicast, and broadcast transmission methods; store-and-forward, cut-through, and fragment-free switching mechanisms and then descri...22 Nov 2006
-
How to Build a Local (Network) Roadway -- Chapter 4 of 'Computer Networking First-Step'
How to Build a Local (Network) Roadway covers basics on how networks work, what they're made of, and the benefits of using a structured cabling system. You will learn how computers can communicate ...22 Nov 2006
-
General Design Considerations -- Chapter 6 of 'Network Security Architectures'
Whether your background is security or networking, you can use Chapter 6 of 'Network Security Architectures' to learn how to bridge the gap between a highly available, efficient network and one tha...22 Nov 2006
-
Introduction -- Chapter 1 of 'Network Analysis, Architecture and Design'
This chapter introduces the analysis, architecture, and design processes. Described are the fundamental concepts of the processes of network analysis, architecture, and design; systems and services...22 Nov 2006
-
Cisco IOS IP routing: Static routes
Whether you are a network engineer or a student preparing for Cisco certification, it's important to understand how routers work. In this series on Cisco IOS IP routing, David Davis explains the di...21 Nov 2006
-
Wireless connections with ad hoc networks
Ad hoc wireless networking in Windows Vista with the IPv6 protocol has its risks, but it also has several built-in security mechanisms. In this tip, Brien Posey explains how these security features...21 Nov 2006
-
IP addressing and subnetting: Calculate a subnet mask using the subnet's formula
IP addressing and subnetting are an important part of networks. Learn how the subnet's formula works and why it's important to know how to calculate the subnet mask "longhand."20 Nov 2006
-
Seven networking mistakes to avoid
A bunch of network no-nos could sabotage everything. At Gartner's Enterprise Networking Summit 2006, one research vice president shared a list of seven things NOT to do.16 Nov 2006
-
"Network Security: The Complete Reference," Chapter 10: Network device security
Chapter 10 focuses on using routers and switches to increase the security of the network as well as providing appropriate configuration steps for protecting the devices themselves against attacks.16 Nov 2006
-
Implementing 802.11g: Stop dropped connections
What happens when you try implementing wireless 802.11g in a place with no open spaces? You probably get unreliable service. Lisa Phifer takes the mystery out of dropped connections in this tip.14 Nov 2006
-
Security Spotlight: SSL VPN appliances simplify secure access
By leveraging the ubiquitous Web browser as a client platform, SSL VPN appliances represent a promising alternative for delivering simple-but-secure off-site access to private business services and...14 Nov 2006
-
Juniper rounds out Unified Access Control
Juniper Networks this week bolstered its network access control (NAC) offering by rolling out the latest version of its Unified Access Control (UAC) solution.14 Nov 2006
-
Extending OSI to Network Security -- Chapter 1 of 'Hack the Stack'
Extending OSI to Network Security covers topics such as common stack attacks, mapping the OSI model to the TCP/IP model, and talks about the current state of IT security. The goal of this chapter ...14 Nov 2006
-
IP addressing and subnetting: Calculate a subnet mask using the host's formula
IP addressing and subnetting are an important if basic part of networks. Network administators will learn how to calculate a subnet mask using the host's formula.13 Nov 2006
-
Performance management -- making it relevant
Network engineers struggle with data overload. So much so that it's impossible to analyze the avalanche of available network data to provide meaningful information for business management. In this ...08 Nov 2006
-
Wireless technology: Five myths debunked
Cisco, along with Forrester Research, recently issued a report calling most wireless LAN fears mere myths, and a campus-wide, all-wireless deployment appears to prove that theory.08 Nov 2006
-
Peer-to-peer wireless file transfers over VPN
Lisa Phifer, expert in VPN and wireless connections, answers the question "How can we establish peer-to-peer wireless file transfers over an office VPN?"08 Nov 2006
-
Better management = increased value
As our networks become more complex and network traffic continues to increase, network professionals need comprehensive data analytics, management and reporting skills. This column explores three c...08 Nov 2006
-
Why can't I print wirelessly?
In this response, our wireless networking expert, Lisa Phifer, explains why you can't print over a wireless connection.08 Nov 2006
-
Dropped connections when clients switch APs
Lisa Phifer takes the mystery out of dropped connections in a medical office building using 802.11g where clients are unable to roam.08 Nov 2006
Network Management Strategies for the CIO