-
How do you design networks to allow for future growth?
Use these steps to allow for enough future growth in your network design.29 Nov 2007
-
Voice over wireless LAN deployment requires constant maintenance
Voice over wireless LAN (VoWLAN) deployment, unlike wired networks, is susceptible to changes external to the network itself -- which may affect coverage and call quality -- and therefore requires ...29 Nov 2007
-
Applications, convergence to boost network spending
Network spending will increase next year for many respondents to a recent SearchNetworking.com survey. Applications, remote offices and bandwidth will fuel the increase.29 Nov 2007
-
How do IP addresses work on Layer 2 switches?
Learn how IP addresses work on Layer 2 switches from our networking fundamentals expert.29 Nov 2007
-
What is the procedure for assigning network addresses?
Learn how to assign network addresses, and understand the difference between assigning IP addresses and assigning network addresses in this response.28 Nov 2007
-
Convergence, need for next-generation networks drive router sales growth
As service providers seek to upgrade their networks to deliver more multimedia and integrated services, router manufacturers continue to see increased sales.28 Nov 2007
-
availability
1) In a telephone circuit, availability is the ratio between the time during which the circuit is operational and elapsed time. 2) In a network switching system, availability is the accessibilit...27 Nov 2007
-
Network management best practices: Collecting essential data to optimize network performance
Network performance management best practices don't have to be unrealistic for network managers -- or unaffordable for enterprises. When network performance and accounting technologies overwhelm bo...27 Nov 2007
-
Getting over the hump -- Managing Windows networks using scripts, Part 5
When learning to script for managing Windows networks, you need to be aware of a bump in the road Mitch Tulloch calls "the hump." Learn how to get over the hump in this tip.21 Nov 2007
-
bit stuffing
Bit stuffing is the insertion of one or more bits into a transmission unit as a way to provide signaling information to a receiver... (Continued)20 Nov 2007
-
Using Windows Vista group policy to prevent unauthorized USB device use
One of the largest internal threats to network security, and a major source of worry for network administrators, is the use of USB storage devices. USB storage devices can be used to steal large qu...20 Nov 2007
-
What is the document flow of enterprise-level network consulting?
Find out what paperwork you'll have to wade through as an enterprise-level network consultant in this expert response from Carrie Higbie.20 Nov 2007
-
Endpoint security locks down law firm's network
Network security is top priority for one of the world's largest law firms, which recently deployed endpoint security tools to help enforce its strict security policies.20 Nov 2007
-
Without an application-layer firewall, do I run network security risks?
Are you leaving yourself wide open by not using an application-layer firewall? Find out in this expert response with network security expert Puneet Mehta.19 Nov 2007
-
How to compare router performance between vendors
Learn how to compare router performance between different vendors in this expert response.17 Nov 2007
-
Will IPv6 stop network management complications presented in IPv4?
See how IPv6 helps solve network management issues in this response from IPv4 and IPv6 expert Silvia Hagen.16 Nov 2007
-
Network device and local and remote server monitoring software
Find recommended network monitoring software for local servers, network devices and remote services in this Ask the Expert with Lindi Horton.15 Nov 2007
-
For Cisco 640-801 CCNA exam studying what router can I practice on?
Learn what router to use to study for the Cisco 640-801 CCNA exam in this expert response with Cisco certification expert David Minutella.15 Nov 2007
-
ITIL -- What network managers need to know
IT Infrastructure Library (ITIL) is an IT service management framework surrounded by industry best practices. This tip answers questions that network managers may have about implementing ITIL and e...14 Nov 2007
-
Network management suite eyes virtualization
Entuity has announced the newest iteration of its network management suite Eye of the Storm, dubbed EYE 2008. This announcement of the upgrade places a focus on Software as a Service and virtualiza...14 Nov 2007
Network Management Strategies for the CIO