-
Users anticipate joint Cisco and Microsoft security
Users are keen on checking out Microsoft and Cisco's interoperable security architecture outlined this week by both companies. When it comes to enterprise security, however, Cisco still gets more r...11 Sep 2006
-
Voice over data: Many conversations, one network - from Switching to VoIP
This chapter from Switching to VoIP by Theodore Wallingford looks into the challenges faced by VoIP applications, especially the challenges of negotiating multiple standards. It explains how VoIP f...08 Sep 2006
-
Wireless network security testing
The abundance of wireless devices is making wireless networks -- both authorized and unauthorized -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers ...08 Sep 2006
-
Cisco, SAP team-up marries network with risk management
Cisco and SAP team up to market governance, risk and compliance (GRC) and networking combo. The application/networking vendor relationship highlights SONA's first major proof point to networking pr...07 Sep 2006
-
"Mike Meyers' Network+ Guide to Managing & Troubleshooting Networks," Chapter 20, Zen and the art of
With this chapter from the book Mike Meyers' Network+ Guide to Managing & Troubleshooting Networks, you will learn how to describe troubleshooting tools, explain the troubleshooting process and...06 Sep 2006
-
The official protocol of the Internet! -- Chapter 1 of "TCP/IP first-step"
Chapter 1 of TCP/IP first-step by Mark Sportack describes the basics of TCP/IP and illustrates how it relates to the Internet. Further, it explains the five critical communications functions that...06 Sep 2006
-
Cisco accelerates the branch
Cisco rolls WAN optimization, application acceleration and Wide Area File Services (WAFS) in a single branch box to complement its Application Control Engine (ACE) data center optimization product.06 Sep 2006
-
Cisco, Microsoft unveil NAC/NAP interoperability
Nearly two years into their partnership, Cisco and Microsoft yesterday announced a joint architecture combining their network access security solutions.06 Sep 2006
-
Introduction to Network Protection - Protect Your Windows Network from Perimeter to Data, Chapter 1
Introduction to Network Protection from 'Protect Your Windows Network from Perimeter to Data' by Jesper Johansson and Steve Riley explains how you can best protect your systems network by balancing...06 Sep 2006
-
Hacking Wireless Networks For Dummies, Chapter 10: Still at War
Chapter 10 from Hacking Wireless Networks For Dummies by Kevin Beaver and Peter Davis covers installing and using network discovery and wardriving tools Kismet and Wellenreiter and discusses wardri...06 Sep 2006
-
CCNA Command Quick Reference, Chapter 3: Configuring a router
Chapter 3 of CCNA Command Quick Reference by Scott Empson provides information and commands for configuring a router, specifically it covers names, passwords, interfaces, MOTD banners, IP host tabl...06 Sep 2006
-
maximum transmission unit (MTU)
A maximum transmission unit (MTU) is the largest size packet or frame, specified in octets (eight-bit bytes), that can be sent in a packet- or frame-based network such as the Internet.05 Sep 2006
-
maximum segment size (MSS)
The maximum segment size (MSS) is the largest amount of data, specified in bytes, that a computer or communications device can handle in a single, unfragmented piece.05 Sep 2006
-
master
A master, in a technological context, is a device that controls one or more other devices.05 Sep 2006
-
"LAN Switching First-Step," Chapter 6: How a switch works
Chapter 6 of "LAN Switching First-Step," by Matthew Castelli, explains how to differentiate among unicast, multicast, and broadcast transmission methods; store-and-forward, cut-through, and fragmen...05 Sep 2006
-
OSI: Securing the stack, Layer 1 -- Physical security threats
Security expert Michael Gregg kicks off his layer-by-layer discussion of OSI model network security with this tip on securing Layer 1 against physical security threats.04 Sep 2006
-
VoWLAN: Preparing your network for a voice over wireless LAN deployment
If you are considering a voice over wireless LAN (VoWLAN) deployment, you must plan ahead to ensure the high call quality your users expect. In this tip, David Jacobs explains the three steps to a ...04 Sep 2006
-
Understanding duplex conflicts
What is duplex, and what is the difference between half and full duplex? What is a duplex mismatch? How can auto-negotiation help or hurt your network? How can you resolve duplex conflicts? Here's ...01 Sep 2006
-
Connecting ISDN PRI to a VPN via a Cisco AS5350
Sudhanshu Gupta examines how to connect an ISDN PRI to a VPN using a Cisco AS5350.01 Sep 2006
-
Optimize network space for IP addresses
Sudhanshu Gupta explains how to use a Cisco 2600 Router to get networks to talk to each other.01 Sep 2006
Network Management Strategies for the CIO