-
permanent virtual circuit (PVC)
A permanent virtual circuit (PVC) is a software-defined logical connection in a network such as a frame relay network.22 Sep 2006
-
Network+ certification: Saving money with CompTIA vouchers, Part 5
Network+ certification: Saving money with CompTIA vouchers22 Sep 2006
-
Network+ certification: Exam strategies, Part 2
Before you begin to study specific components of exam, it is always good to get a general feel for the exam first. This tip provides some exam strategies to help with taking the CompTIA Network+ ce...22 Sep 2006
-
Network+ certification: Where does CompTIA Network+ take you? Part 3
Network+ certification: Where does CompTIA Network+ take you?22 Sep 2006
-
Network+ certification: The Lowdown on the CompTIA Network+ Certification, Part 4
Network+ certification: The Lowdown on the CompTIA Network+ Certification22 Sep 2006
-
Network+ certification: Review of exam specifics, Part 1
The CompTIA Network+ certification is an international, vendor-neutral industry credential that validates the knowledge of networking professionals with at least nine months of experience in networ...22 Sep 2006
-
Network+ certification: General certification exam taking tips, Part 7
Network+ certification: General certification exam taking tips22 Sep 2006
-
CompTIA Network+ certification
Networking operators or administrators wishing to undertake the ComTIA Network+ certification test should read through the following articles. They offer clarification on some commonly asked questi...22 Sep 2006
-
CompTIA Network+ exam FAQs, Part 6
If you have questions about the CompTIA Network+ exam, find answers in this FAQ provided by ProProfs.22 Sep 2006
-
WAN acceleration scalability: Part 1
As WAN acceleration becomes more critical to business operations, the average size and scope of deployment is steadily increasing. This creates a variety of questions pertaining to product scalabil...21 Sep 2006
-
Reporter's notebook: Hidden gems of Interop
The Interop conference in New York this week featured the usual suspects talking about their newest offerings and the industry at large21 Sep 2006
-
NAC, VPNs and behavior analysis in the Interop spotlight
Security for the enterprise network was emphasized at Interop New York as vendors rolled out and upgraded NAC, VPN, network behavior analysis, and other threat protection products.20 Sep 2006
-
Network engineering overview: Policy and process
Policy and process may seem like dull and superfluous activities, but they exist to improve communication between different departments of your company. In the third installment of his series on th...18 Sep 2006
-
TCP/Internet Protocol and OSI
This explains the layers in TCP/IP and the OSI model, and what the differences are.16 Sep 2006
-
Set up an ad hoc WiFi network
What if you wanted to do pretty much everything you can do on a network, but didn't have a router? You can set up an ad hoc network, in which you can connect on a peer-to-peer basis with other comp...15 Sep 2006
-
Troubleshoot networks with the pathping command
You can troubleshoot networks with the pathping command, which works like a combination of ping and tracert.15 Sep 2006
-
network access control (NAC)
Network access control (NAC), also called network admission control, is a method of bolstering the security of a proprietary network by restricting the availability of network resources to endpoint...14 Sep 2006
-
Application firewalls offer specialized protection
Network security's most dangerous attacks are aimed at specific application protocols, coding flaws, and configuration errors. Application firewall appliances can help network engineers defeat thes...14 Sep 2006
-
Converged voice and data network puts shirts on cowboys' backs
Extreme Networks provided the gear for a clothier's upgrade to a faster infrastructure for data applications and a reliable infrastructure for voice and video.13 Sep 2006
-
Secure network perimeter to result from Symantec-Juniper deal
Juniper and Symantec announced a deal to integrate Symantec's client security software with Juniper's security hardware. The result will allow endpoint compliance and access control platforms to se...13 Sep 2006
Network Management Strategies for the CIO