Issue OverviewNetwork Evolution - June 2011 Vol. 2, No. 3
This Network Evolution E-Zine discusses the ins and outs of virtualization and provides insight into how today’s networks are adapting. Uncover information focusing on systems vs. networking at the virtual edge and network diagnostics that can see through the technology. Access >>>
Premium Content for Free.
Desktop virtualization network challenges: A primer
Virtual desktop infrastructure is seeing speedy uptake, but desktop virtualization network challenges mean investing in load balancing, traffic prioritization and even more bandwidth to support real-time applications to the desktop.
Network diagnostics that see through virtualization
by SearchNetworking Staff
Running network diagnostics for virtualization requires a new set of strategies that involve virtual switches, virtual network probes and rerouting traffic for analysis.
- Desktop virtualization network challenges: A primer
vSphere VLAN: Understanding 802.1Q VLAN tagging
by Eric Siebert
vSphere VLANs have requirements different from those of VLANs in physical environments because VMs are fluid and can't be assigned to one physical NIC. So 802.1Q VLAN tagging offers a new approach to configuring and managing VLANs in vSphere.
- vSphere VLAN: Understanding 802.1Q VLAN tagging by Eric Siebert
Virtualization demands a full IT infrastructure audit
by Michael J. Martin, Fast Packet Blogger
In order to implement virtualization, enterprises must go beyond old-school network documentation for a full IT infrastructure audit that shows resources across silos.
Why are network engineers so bitter about managing virtualization?
by Rivka Gewirtz Little
One virtualization architect explains the miscommunications between systems and network engineers and how his teams worked together toward managing virtualization more effectively.
- Virtualization demands a full IT infrastructure audit by Michael J. Martin, Fast Packet Blogger
More Premium Content Accessible For Free
Context makes network security policy smarter, but not easier
Traditional approaches to network security are no longer sufficient to combat today's advanced threats. Attacks now target users and applications, ...
As users carry more devices, wireless network design must evolve
The average person carries three mobile devices, according to an informal poll conducted last year by Sophos Labs. While Kindles and Fitbits probably...
Mobile devices are gobbling up your WLAN bandwidth: Here’s how to cope
More -- and more complex -- mobile devices are jumping on your enterprise network, gobbling up bandwidth from the WLAN infrastructure. This technical...