- Networking fundamentals with Chris Partsenidis
- Network administration with Lindi Horton
- Routing and switching with Sudhanshu Gupta
- Network security with Puneet Mehta
- Enterprise security with Michael Gregg
- Wireless networking with Lisa Phifer
- IPv4 and IPv6 with Silvia Hagen
- Infrastructure and project management with Carrie Higbie
- Cisco certifications with David Minutella
- Training and certifications with Ed Tittel
- WAN optimization with David Hughes
- Network management, monitoring and analysis with Craig Thomas
- VPNs with Sampath Ramaswami
Networking fundamentals with Chris Partsenidis
![]() |
|
2. Frame relay, ATM, and Gigabit Ethernet pros and cons
3. How are IP addresses and subnet masks calculated?
4. Is it possible to convert a Layer 2 switch to a Layer 3 switch?
5. Should I add a T3 link or a T1 to my LAN?
(Ask Chris a question, View more Q&As, View Chris' bio)
Network administration with Lindi Horton
![]() |
|
2. Does intermittent connectivity mean my switch is going?
3. Is there a command in a Cisco Catalyst that will tell me the IP address of a PC hanging off a port?
4. How can I limit the number of MBs each user downloads?
5. What is the difference between circuit switching and packet switching?
(Ask Lindi a question,View more Q&As, View Lindi's bio)
Routing and switching with Sudhanshu Gupta
![]() |
|
2. How do I check if the switches on my network support IGMP?
3. What are the commands for checking a switch?
4. What is the difference between a managed and unmanaged switch?
5. What is interVLAN routing?
(Ask Sudhanshu a question,View more Q&As, View Sudhanshu's bio)
![]() |
|
2. What are TCP wrappers? How do they work?
3. How do I block MAC addresses from my DHCP server?
4. Who is the target market for IPS and what are the big players doing to gain market share?
5. Can you suggest a free vulnerability assessment tool to identify vulnerabilities in a campus network?
(Ask Puneet a question, View more Q&As, View Puneet's bio)
Enterprise security with Michael Gregg
![]() |
|
2. What core network security items are needed to secure networks?
3. Are open source tools safe to use?
4. After a server outage what emergency steps should you take to secure your network?
5. Do social networking products (blogs) pose network security threats?
(Ask Michael a question, View more Q&As, View Michael's bio)
![]() |
|
2. How do we add wireless printer servers to our network?
3. How do we stop simultaneous connections to corporate LANs and external Wi-Fi networks?
4. Could you give me a list of emerging wireless access technologies?
5. What are the criteria for evaluating a wireless network?
(Ask Lisa a question, View more Q&As, View Lisa's bio)
IPv4 and IPv6 with Silvia Hagen
![]() |
|
2. What real benefits can IPv6 bring to end users?
3. Does IPv6 support encryption in the IP stack?
4. Why was IPv6 developed, and what issues does IPv4 have?
5. Why wasn't there an IPv5?
(Ask Silvia a question, View more Q&As, View Silvia's bio)
Infrastructure and project management with Carrie Higbie
![]() |
|
2. When do you use a straight-through patch cable, and when do you use a crossover cable?
3. Why do vendors say ANEXT and Shannon's capacity are the problems for passive connectivity?
4. What is the length of a ScUTP and TERA cable run?
5. What are the industry best practices for cabling high-density production server cabinets without patch panels?
(Ask Carrie a question, View more Q&As, View Carrie's bio)
Cisco certifications with David Minutella
![]() |
|
2. Is there any Web site to help me stay current with CCNA?
3. To renew my CCNP, which exam should I take?
4. Is taking the CCNA course more beneficial through a university or through a private institute?
5. To practice for my CCNA, what equipment do I need?
(Ask David a question, View more Q&As, View David's bio)
Training and certification with Ed Tittel
![]() |
|
2. Are there non-vendor specific certifications for VoIP?
3. Are Linux Professional Institute (LPI) certifications good for a networking career?
4. Should you certify before getting a Masters degree?
5. How valuable is a CWNA?
(Visit the IT Knowledge Exchange, where you can ask Ed a question or view more Q&As, View Ed's bio)
WAN optimization with David Hughes
![]() |
|
2. Are there circuit utilization benchmarks recommending when to increase bandwidth?
3. How do I calculate the time taken for a file to be transferred over a WAN link?
4. Should I construct a WAN using Internet protocol?
5. Is there a general rule of thumb to apply when capacity planning a remote site?
(Ask David a question, View more Q&As, View David's bio)
Network management, monitoring and analysis with Craig Thomas
![]() |
|
2. What network monitoring tools monitor all OSI layers?
3. Is there Cisco router documentation for proactive and reactive checklists?
(Ask Craig a question, View more Q&As, View Craig's bio)
![]() |
|
2. What causes my overseas VPN connection to slow during the day?
3. Are there any architectures of IPsec VPN apart from lookaside and flow-through?
4. Can I set up a VPN on my wireless router?
5. What equipment do I use to connect two LANs in different cities? What are the steps?
(Ask Sampath a question, View more Q&As, View Sampath 's bio)
This was first published in December 2007
Network Management Strategies for the CIO













Join the conversationComment
Share
Comments
Results
Contribute to the conversation