-
To practice for my CCNP, what's the best simulator?
What should you use to practice on for your CCNP exam? Find out the best simulator from our Cisco certifications expert.28 Feb 2008
-
Wireless security -- How WEP encryption works
Inadequate wireless security can jeopardize critical company information. Encryption is an important part of wireless security -- but how does it work? In this tip, first in a two-part series on 80...28 Feb 2008
-
Networking pros can avoid outsourcing with soft skills
As more networking jobs are outsourced either to domestic or overseas specialists, following the right career track and developing the right skill sets can mean the difference between a fast-track...28 Feb 2008
-
A basic virtualized enterprise -- from 'Network Virtualization'
In this chapter from "Network virtualization," authors Victor Moreno and Kumar Reddy explain why and how to virtualize the network. They define technical requirements posed by the need to virtualiz...28 Feb 2008
-
flow routing
Flow routing is a network routing technology that takes variations in the flow of data into account to increase routing efficiency... (Continued)27 Feb 2008
-
Troubleshooting remote scripting using Network Monitor 3.0 -- Managing Windows networks using script
Learn how to use Network Monitor 3.0 for troubleshooting a remote scripting error in this tip originally published on WindowsNetworking.com.27 Feb 2008
-
Cisco Certified Internetwork Expert (CCIE) prerequisites and average earnings
Our Cisco certification expert, David Minutella, explains what the Cisco Certified Internetwork Expert (CCIE) requires of you and what the average earnings are, in this Ask the Expert response.27 Feb 2008
-
pseudowire
Pseudowire ( sometimes spelled as pseudo wire or abbreviated as PW) is a mechanism for emulating various networking or telecommunications services across packet-switched networks using Ethernet, IP...24 Feb 2008
-
Wireless networking heads into fourth generation -- but should you follow?
For enterprises seeking to move their Wi-Fi access from best-effort to mission-critical, so-called fourth-generation implementations, from such companies as Meru and Extricom, have been making inro...21 Feb 2008
-
Does WAN optimization work when compression's enabled on host devices?
Will WAN optimization work when compression is enabled on host devices? Our expert explains how WAN optimization can be combined to deliver significant performance improvements on pre-compressed tr...21 Feb 2008
-
How to calculate network bandwidth requirements
Bandwidth requirements vary from one network to another. Determining how many bits per second travel across the network and the amount of bandwidth each application uses is vital to building and ma...20 Feb 2008
-
AlterPoint launches ZipForge, a repository for open source network configuration platform
AlterPoint has launched ZipForge, an online repository of components for its open source network configuration platform.19 Feb 2008
-
Structuring and modularizing the network -- from 'Designing for Cisco Internetwork Solutions (DESGN)
Structuring and modularizing the network, Chapter 3 of "Designing for Cisco Internetwork Solutions (DESGN), Second Edition" introduces a modular hierarchical approach to network design, the Cisco E...19 Feb 2008
-
Can 802.11 protocols be used with GPRS connectivity?
Can 802.11 protocols be used with GPRS connectivity? Find out from our wireless networking expert, Lisa Phifer.18 Feb 2008
-
Next generation wireless local area networks'(WLANs) important features
What are the most important features to look for in a next generation wireless local area network (WLAN)? Lisa Phifer explains in this expert response.18 Feb 2008
-
My wireless laptop connectivity disconnected once I downgraded my OS
Lisa Phifer shows you how to regain wireless laptop connectivity after switching operating systems (OS) in this step-by-step expert response.18 Feb 2008
-
Introduction to wireless networks -- from 'The book of wireless'
When you're designing and building a new wireless network, or when you want to improve the performance of an existing network, it's important to understand what's going on inside the box (or in thi...14 Feb 2008
-
Remote access security management software is a time saver for network administrators
Many IT administrators have been able to save time and boost productivity by using VanDyke Software's security management products.14 Feb 2008
-
Deploying Microsoft Live Communications Server in a production environment: Prepare your network for
Microsoft Live Communications Server is just one approach to unified communications (UC), but as with any UC deployment, you must be prepared for the demands it will place on your network. In this ...13 Feb 2008
-
What is NAT, and how do I know if it's taking place on my network?
In this Q&A, our expert explains the basics of NAT (Network Address Translation), where it occurs, and what it does.11 Feb 2008
Network Management Strategies for the CIO