-
How is wireless access point (AP) coverage affected by frequency?
Wireless access point (AP) coverage can be affected by channel frequency, distance, environment and data rate. Our site wireless networking expert explains.08 Jun 2009
-
Wireless AP SSID and channel configuration for a distribution network
Multiple access points (AP) on a wireless network require careful configuration. Learn how channel frequency and Service Set Identifiers (SSID) should be set up for seamless transition between APs.08 Jun 2009
-
Enterprise wireless LAN security: 802.11 and seamless wireless roaming
Learn how to secure your enterprise wireless local area network (LAN) in this guide of industry best practices. Wireless networking expert Lisa Phifer explains how network security is improved by t...05 Jun 2009
-
How does the CCNP compare to a master's degree
The Cisco Certified Network Professional (CCNP) certification reflects proficiency in routing and switching. How does it compare to a master's degree? Our Cisco Certification expert explains.05 Jun 2009
-
Data center virtualization can cut network costs but adds complexity
Virtualization is coming to a network near you, but what do networking professionals really need to know about data center virtualization and virtual server networks? With budgets tight all around,...04 Jun 2009
-
Cloud computing networks: Preparing for the future
Despite all the hype, enterprises are adopting cloud computing today. Network administrators must strategize differently and make certain changes in order to deliver the cloud computing networks th...03 Jun 2009
-
Where can I find a sample security audit report? How can I run my own?
IT organization security audit reports aren't for circulation. Our network enterprise security expert explains how professionals can sample a technical report by running their own.02 Jun 2009
-
Are you on a domain name system (DNS) blacklist database?
Many domain name system (DNS) blacklist databases exist. If your mail server or IP address has been misused you may be on them. Our networking enterprise security expert explains.02 Jun 2009
-
How to translate network usage to cost
Converting network usage data into monetary terms will help network professionals prove their worth to an organization. This article is the third in a series that explores ways in which network pro...02 Jun 2009
-
Ethical hacking and countermeasures: Network penetration testing intro
Have you ethically hacked your business network? SearchNetworking.com asked this question of our readers and found shocking results: More than half had not conducted a network penetration test -- a...02 Jun 2009
Network Management Strategies for the CIO