IP Networking

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Connecting ISDN PRI to a VPN via a Cisco AS5350

    Sudhanshu Gupta examines how to connect an ISDN PRI to a VPN using a Cisco AS5350. 

  • Optimize network space for IP addresses

    Sudhanshu Gupta explains how to use a Cisco 2600 Router to get networks to talk to each other. 

  • Change your network adapter's IP information

    To change a machine's TCP/IP settings, you can use a VBScript to modify the network adapter information on a computer. 

  • jabber (in networks)

    In networks, a jabber is any device that is handling electrical signals improperly, usually with negative results for the rest of the network. 

  • forest-and-tree model

    The forest-and-tree model is a logical structure for interconnecting multiple network domains in Windows 2000 and later operating systems. 

  • port number

    A port number is a way to identify a specific process to which an Internet or other network message is to be forwarded when it arrives at a server. 

  • DNS for a wireless network: Router Expert

    DNS services are essential for building a secure wireless LAN. Our Router Expert provides complete instructions for setting up a DNS server, including implementing BIND, configuring a non-authoritative server and creating zone files. 

  • Blocking IPs

    I have a T1 connection to my Cisco 2620, along with a public IP block of 255 IP's. I want to block some selected IP's from accessing the outside world 

  • Bandwidth for video over IP may skyrocket

    Video was a hot topic of conversation at the Cisco Networkers annual customer conference, with the uses for it as varied as the attendees. Several network architects and engineers are already experimenting with video and factoring it into their futur... 

  • Security and the TCP/IP stack

    Each layer of TCP/IP has security mechanisms, protocols, and applications. This tip describes the more popular ones that are associated with each layer of TCP/IP.