Tips

  • Integrated wireless NMSs work across infrastructures

    Enterprises must implement integrated wireless network management systems that are user-aware and offer end-to-end visibility but also provide the drill-down capabilities of wired network managemen...

  • Cloud computing networks: Any application, any time, an

    Cloud networks have a mission: connect a pool of resources that any user, anywhere can access without fail.

  • Who controls unified networking and storage fabric?

    When it comes to managing unified fabric, the jury is out on who's in charge. FCoE switches and adapters have LAN and SAN elements and can be managed by existing network or storage interfaces. But ...

  • Is your wired network ready for WLAN integration?

    Wireless LAN integration means upgrading wired networks with new equipment and traffic prioritization to avoid bottlenecks between the networks and provide QoS for wireless multimedia applications,...

  • Testing 10 gigabit Ethernet switch latency

    Testing 10 Gigabit Ethernet switches means going beyond just speed to examine potential latency. Testing 10 gigabit Ethernet switch latency requires choosing the right switches and testing tools an...

  • Steps to a unified storage and network fabric

    IT organizations planning to deploy a unified storage and network fabric through data center bridging and FCoE implementation must consider a host of components, such as adapters, and configuration...

  • 802.11n WLAN speed: Just how fast is fast?

    Vendors promise 802.11n WLAN speed of 600 Mbps, but users find they can realistically reach about 300 Mbps. In order to maximize 802.11n speed and throughput, users find they must have just the rig...

  • Unified fabric primer: FCoE and data center bridging

    Unified data center fabrics combine FCoE and data center bridging to enable SAN and LAN traffic to run on the same physical network, simplifying network architecture and resulting in savings. This ...

  • Wireless or Ethernet LAN? Comparing costs

    Now that 802.11n has made wireless LAN faster and more reliable, network administrators are wondering: Wireless or Ethernet LAN? Until now Ethernet replacement hasn't been feasible, but 802.11n WLA...

  • Why you should integrate wired and wireless LANs

    With improved 802.11n performance, wireless LAN ports are overtaking Ethernet in the enterprise, and networking teams are pressed to find solutions for integrated wired and wireless network managem...

  • Desktop virtualization storage strategies

    Without the right desktop virtualization storage strategies, implementing the technology could mean a great strain on storage area networks and the core. But with the right approach, enterprises co...

  • Virtualization planning tips for network managers

    Network managers need to consider more than server CPU utilization when planning for virtualization. These common misconceptions and tips show what project managers need to know before implementing...

  • How to test LAN switch energy efficiency

    Vendors promise energy-efficient networks, but they often can't provide actual measurements for LAN switch power consumption. In this best practices guide, learn methods for measuring LAN switch en...

  • Testing LAN switch power consumption

    LAN switch power consumption testing is as crucial as benchmarking speeds and feeds on switches. Enterprises that develop a set of best practices for testing network power consumption will save mil...

  • Is your network ready for desktop virtualization?

    CIOs have fallen in love with virtual desktop infrastructure, so networking teams must meet desktop virtualization network requirements that include network bandwidth management and traffic prioritization...

  • Application-specific intrusion detection systems emerge

    Integrating network intrusion detection systems can mean using both anomaly and signature-based detection in application-specific tools.

  • Installing anomaly-based intrusion detection

    Network behavior analysis may be the answer to preventing zero-day attacks. You must install an anomaly-based intrusion protection system (IPS) or intrusion detection system (IDS). This article exp...

  • It takes two to defend a network

    Deter enterprise network attacks by learning how network behavior analysis can be used to protect data. Understand the advantages and disadvantages of anomaly-based and signature-based protection a...

  • Three network investments for the green enterprise

    Building green enterprise IT systems can mean making networking investments that support unified communications through network quality of service, traffic monitoring and mobility.

  • How to plan for 802.11n WLAN upgrades

    802.11n WLAN upgrades mean more than just implementing new antennas and access points. 802.11n network requirements include the need for more power and controller capacity, as well as complex manag...