Network Administration and Resources

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • data link layer

    The Data-Link Layer is the protocol layer in a program that handles the moving of data in and out across a physical link in a network.

  • The answer to the top 5 virtualization problems

    Transitioning to a virtualized network can be challenging for network engineers, despite the advantages. Understand these top five virtualization problems and how to handle them.

  • vCloud and VEPA: Neither answer is a winner

    vCloud and VEPA fail to address the virtualization networking problem, as both are deemed proprietary and don’t enable networking functions within the vSphere environment.

  • When physical security breaches are the problem

    Network engineers are so busy dealing with intrusion prevention and firewalling that they forget about physical security breaches. Blogger Ethan Banks has some advice.

  • Cisco upgrades the Catalyst 6500…but some wonder why

    The Cisco Catalyst 6500 upgrade announced this year didn't excite everyone as expected. Blogger Greg Ferro wonders why Cisco didn't stay focused on the Nexus line instead.

  • Need 10 GbE optimization? Hardware is not the solution

    10 GbE brings speed, but network latency is still an issue. The answer to 10 GbE optimization can't be found in increasing hardware. Our blogger says it's about the application.

  • Cius vs. the iPad: Why bother comparing?

    Cisco launched its Cius tablet this year, which focuses on enterprise apps, desktop virtualization and network management, but one blogger says he'd rather have an iPad.

  • Can Virtual Extensible LAN solve the VLAN problem?

    The Virtual Extensible LAN (VXLAN) protocol could mean the ability to spin off many more VLANs across dispersed data centers. So why does blogger Ivan Pepelnjak take issue?

  • OpenFlow controllers will only take shape if vendors play nice

    OpenFlow controllers can result in a new level of granular network management and network virtualization on top of commodity hardware, but vendors will have to step out of the way.

  • Network fabrics may not be the end-all

    Feature-rich network fabrics have been all the rage, but one blogger says the technology is only for creating more bandwidth. Other features should be left to edge software.

  • VIEW MORE ON : The OSI Model
  • Enterprise network testing: Best practices for developing a test lab

    Enterprise network testing can minimize IT service outages, yet developing a test lab can bring up various issues. Knowing best practices for running a test facility is imperative.

  • Networking material on the ‘CompTIA A+ 220-701 and 220-702 Exam Cram’

    Access your complimentary PDF download of Networking, Chapter 14 of the book 'CompTIA A+ 220-701 and 220-702 Exam Cram,' which contains networking material and fundamentals for beginners or soon-to-be IT professionals. It includes information on IP addressing, troubleshooting connectivity and installing networks.

  • NAC integration at the endpoint

    NAC integration with endpoint software enables more than just access control. NAC solutions can be used at endpoints to scan for operating system patches, monitor use of virtual sandboxes, control external drives and more.

  • Extending NAC enforcement to network security devices

    NAC enforcement tools can be extended to network security and management devices -- and in return user and machine identity can be integrated into firewalling, VPN, application access, intrusion prevention and detection and anti-virus control.

  • Integrating NAC with network security tools

    Integrating network access control solutions with other network security tools and network inventory applications can produce a more complete user and machine identity to strengthen every policy across the network.

  • Troubleshooting -- 'Network Know-How' Chapter 17

    Troubleshooting, Chapter 17 of the book 'Network Know-How,' shows you tools and methods that identify and solve network problems. Consider using the techniques in this chapter as a guide to fixing computer connection problems in all operating system as well as on the network itself.

  • NagVis -- 'Nagios: System and Network Monitoring, Second Edition,' Chapter 18

    Open source network monitoring tool, Nagios, catches problems to help you spend less time troubleshooting. To read about the Nagios add-on, NagVis1, see this chapter download of the book "Nagios: System and Network Monitoring, Second Edition." You will learn how to perform initial NagVis configuration and how to edit it in text form; learn how to install NagVis and its source code; and learn to create NagVis maps and add them to the Nagios Web interface for effective network management.

  • Securing Wireless Systems -- 'Build Your Own Security Lab: A Field Guide for Network Testing,' Chapt

    In order to secure your wireless network you must learn some wireless basics and know how to attack your system. In Securing Wireless Systems, Chapter 9 of 'Build Your Own Security Lab: A Field Guide for Network Testing,' author Michael Gregg discusses the various methods used to attack and secure wireless systems.

  • Troubleshooting IP Routing -- 'CCNA Official Exam Certification Library, 3rd Edition,' Chapter 7

    This chapter from 'CCNA Official Exam Certification Library, 3rd Edition' focuses on troubleshooting the IP routing process. To that end, it begins with a section about two important troubleshooting tools: ping and traceroute. Following that, the chapter examines the IP routing process from a troubleshooting perspective, particularly focusing on how to isolate routing problems to identify the root cause of the problem. The final section covers a wide variety of small topics, all of which can be useful when you're troubleshooting IP routing problems. The chapter also includes a helpful "do I know this already" quiz, to determine whether you need to read the full chapter or can move ahead to the exam preparation section.

  • Wireless LANs -- 'CCNA Official Exam Certification Library, Third Edition,' Chapter 11

    This chapter examines the basics of WLANs to help you prepare for the CCNA exam. In particular, the first section introduces the concepts, protocols, and standards used by many of the most common WLAN installations today. The chapter then examines some basic installation steps. The last major section looks at WLAN security, which is particularly important because the WLAN signals are much more susceptible to being intercepted by an attacker than Ethernet LANs. The chapter also includes a helpful "do I know this already" quiz, to determine whether you need to read the full chapter or can move ahead to the exam preparation section.

  • VIEW MORE ON : Networking Book Excerpts