-
TCP/IP troubleshooting: A structured approach -- Using
Limitations of the Repair feature of Windows network connections can be overcome by using Netdiag.exe, a network connectivity troubleshooting tool that is part of the Windows Support Tools. Netdiag...
-
Network auditing and incident management: Pre-plan your
Network auditing and incident management can prevent unplanned nework meltdowns and outages, and help make your life easier. Five useful building blocks can help you to construct a successful incid...
-
Network monitoring best practices
Network monitoring best practices are outlined by expert Loki Jorgenson.
-
Wireless security -- Defending Wi-Fi clients
When it comes to wireless security, considerable attention has been paid to encrypting data, authenticating users, restricting access, and detecting rogue access points. As these network and link d...
-
Managing Windows networks using scripts -- The basics
Learning to use scripts can make the life of a network administrator a lot easier by allowing you to automate daily administration tasks. This tip begins a series on using scripts to manage Windows...
-
Selling network certification: How to talk up your cred
Network certification has its benefits, but certification alone no longer guarantees employment. In this tip, learn how to justify your credentials' value.
-
Choosing WAN providers: Key questions to ask
When evaluating carrier services for the WAN, it's imperative to ask some key questions regarding customer service, service-level agreements, global coverage, management and monitoring capabilities...
-
Configure Cisco wireless bridges for point-to-point net
Point-to-point wireless bridging is ideal for many business networks. In this tip, learn how point-to-point wireless bridging can help you, the pros and cons of using it, and the configuration of t...
-
Repairing network connections
Learn how the Repair feature works for repairing network connections on Windows platforms in this tip from the WindowsNetworking.com series on TCP/IP troubleshooting.
-
Cisco interface addressing
A look at the various commands that can be used to address Cisco router interfaces on the WAN and LAN and when to use each.
-
OSI: Securing the Stack, Layer 8 -- Social engineering,
Network security is essential at every layer of the OSI model, including the mythical eighth layer, where users interact with technology. Since hackers can use social engineering to exploit people,...
-
Reduce branch office threats in 10 steps
Many organizations host business-critical applications in branch offices, but doing so exposes them to many new threats. Here we examine the potential threats to your branch offices and discuss 10 ...
-
Wireless Internet access -- 3G vs. Wi-Fi
Most road warriors have just two truly viable alternatives for wireless Internet access: 3G and Wi-Fi. In this tip, Lisa Phifer covers the pros and cons of 3G and Wi-Fi for coverage, convenience, c...
-
Troubleshoot routing tables
Learn how routing tables work and how to troubleshoot routing problems in Windows-based networks in this tip courtesy of WindowsNetworking.com.
-
Troubleshooting a DHCP server
Learn how to troubleshoot a DHCP server to discover why it might fail to lease IP addresses and the solutions to those problems in this tip.
-
Understanding wireless antennas
Upgraded antennas can improve wireless LAN performance, reach and security.
-
Anti-spam protocols help reduce spam
Spam is not just annoying; it clogs networks and, at worst, can point to larger network security problems. Anti-spam protocols are useful in helping network administrators block spam. This tip cove...
-
How routers work
Routers are essential to carrying network traffic, but how do they work? In this tip, you'll get perspective on how routing fits into the OSI model. You'll also learn how routers use routing tables...
-
Server and storage virtualization end network managemen
In the past, system management and network management were separate disciplines. Recent advances in network-wide server and storage virtualization blur the boundaries and require an integrated view...
-
Network summarization -- Supernetting and wildcard mask
Supernetting allows one routing table entry to represent an aggregation of networks. Network engineers need to understand supernetting, how to read routes received from other providers and how to c...
-
Premises- or provider-based network management?
IT expert David Davis outlines the pros and cons of premises- versus provider-based network management.
-
Networking blogs: Reevaluating the optical market
This week, networking bloggers discuss a potential sea change for the optical market, and reveal some key tips for using custom config builders.
-
Data center spaghetti: Trials, tribulations of cabling
Switching out servers at a data center can go from ho-hum to disaster unless you have a tested cable management plan in place.
-
Networking blogs: Wi-Fi Certified 802.11ac is here
In this week's blog roundup, get expert insight on preparing for 802.11ac and solutions to CDN bandwidth issues.
Network Management Strategies for the CIO