-
How do I get a proper load-share on this router running no routing protocols?
Sudhanshu Gupta explains how to get a proper load-share on a router running no routing protocols that achieves a 90% reception and 80% transmission, in this Q&A.26 Mar 2007
-
What is the step-by-step process to ping a host on two hosts using a router?
Learn how to ping a host on two hosts using a router in this expert response by Sudhanshu Gupta.26 Mar 2007
-
802.11n will require upgrades
802.11n, the new Wi-Fi standard on the cusp of being ratified by the IEEE, offers greater throughput and better range than other standards but may require companies to upgrade their wireless networ...22 Mar 2007
-
subnet (subnetwork)
A subnet (short for "subnetwork") is an identifiably separate part of an organization's network.21 Mar 2007
-
32-bit IP addressing
32-bit IP addressing is the
IP address scheme used in Internet Protocol 4 (IPv6 uses a 128-bit system)... (Continued)21 Mar 2007 -
subnet mask
A subnet mask is a screen of numbers used for routing traffic within a subnetwork.21 Mar 2007
-
The IT Guy: IP addressing
In this episode of "The IT Guy," Dave's co-workers have trouble with IP addresses -- but not the kind you would expect.21 Mar 2007
-
Frame relay as a networking option
If you need to share data between business locations but wince at the cost of full time dedicated trunk lines, consider frame relay as a viable cost saving alternative.21 Mar 2007
-
Wireless LAN market strengthened by enterprise-level sales
The wireless LAN market is being driven by a recent increase in equipment sales as more enterprises deploy full-scale wireless LANs.21 Mar 2007
-
Network summarization -- Supernetting and wildcard masks
Supernetting allows one routing table entry to represent an aggregation of networks. Network engineers need to understand supernetting, how to read routes received from other providers and how to c...20 Mar 2007
-
5-Step Plan for Securing Your Enterprise WLAN
This white paper is sponsored by AirTight Networks. This paper details the five essential steps to securing an enterprise wireless LAN (WLAN). From safeguarding wireless clients and data to auditing...20 Mar 2007
-
Choosing a network access control (NAC) solution that is right for your network
This white paper is sponsored by ForeScout.This white paper examines three key functionality criteria a NAC solution must deliver in order to effectively operate in complex and diverse real-world...19 Mar 2007
-
Networking trends for 2007: Predictions from networking professionals
In the network, the basic plumbing -- your routers, switches and cabling -- may stay more or less the same, at least for a few years. But the way you think about and manage that plumbing changes fr...15 Mar 2007
-
How are IP addresses and subnet masks calculated?
Learn how to calculate IP addresses and subnet masks in this Q&A with Chris Partsenidis.15 Mar 2007
-
VLANs -- Controlling wired and wireless traffic
Today, most business networks rely on virtual LANs (VLANs) to partition Ethernets and control the destinations reached by each worker. As users begin to shift between Ethernet and Wi-Fi throughout ...15 Mar 2007
-
graceful degradation
Graceful degradation is the ability of a computer, machine, electronic system or network to maintain limited functionality even when a large portion of it has been destroyed or rendered inoperative...14 Mar 2007
-
Membership Required for this Content
Membership Required for this Content14 Mar 2007
-
Network downtime from security attacks proves costly
Network downtime resulting from security attacks is costing companies a bundle, but steps can be taken to prevent the added expense.14 Mar 2007
-
The Tao of automated network management
Integration of network management tools is the first step toward an automated future and requires a proactive approach with service providers.14 Mar 2007
-
Wireless FAQs
The SearchNetworking.com Ask the Expert team receives dozens of wireless questions every week, and sometimes it may take longer than you'd like to get a reply. Save yourself some time and review this
...13 Mar 2007
Network Management Strategies for the CIO