-
Wireless Internet access -- 3G vs. Wi-Fi
Most road warriors have just two truly viable alternatives for wireless Internet access: 3G and Wi-Fi. In this tip, Lisa Phifer covers the pros and cons of 3G and Wi-Fi for coverage, convenience, c...
-
Troubleshoot routing tables
Learn how routing tables work and how to troubleshoot routing problems in Windows-based networks in this tip courtesy of WindowsNetworking.com.
-
Troubleshooting a DHCP server
Learn how to troubleshoot a DHCP server to discover why it might fail to lease IP addresses and the solutions to those problems in this tip.
-
Understanding wireless antennas
Upgraded antennas can improve wireless LAN performance, reach and security.
-
Anti-spam protocols help reduce spam
Spam is not just annoying; it clogs networks and, at worst, can point to larger network security problems. Anti-spam protocols are useful in helping network administrators block spam. This tip cove...
-
How routers work
Routers are essential to carrying network traffic, but how do they work? In this tip, you'll get perspective on how routing fits into the OSI model. You'll also learn how routers use routing tables...
-
Server and storage virtualization end network managemen
In the past, system management and network management were separate disciplines. Recent advances in network-wide server and storage virtualization blur the boundaries and require an integrated view...
-
Network summarization -- Supernetting and wildcard mask
Supernetting allows one routing table entry to represent an aggregation of networks. Network engineers need to understand supernetting, how to read routes received from other providers and how to c...
-
VLANs -- Controlling wired and wireless traffic
Today, most business networks rely on virtual LANs (VLANs) to partition Ethernets and control the destinations reached by each worker. As users begin to shift between Ethernet and Wi-Fi throughout ...
-
The Tao of automated network management
Integration of network management tools is the first step toward an automated future and requires a proactive approach with service providers.
-
New gigabit standard
Last June, the 10GBASE-T standard was published promising 10 Gbit operations on copper cabling. This standard was originally targeted toward data centers, but the Ethernet Alliance and IEEE are wor...
-
Understanding wireless antennas
Types of wireless LAN antennas, including omni-directional monopole and dipole antennas, are explained in this tip.
-
OSI: Securing the Stack, Layer 7 -- Applications
Domain Name System (DNS) wasn't designed to handle today's security threats, making it a prime target at Layer 7 -- the application layer -- of the OSI model. In this tip, learn how DNS works and s...
-
Prepare your networks for the Daylight Saving Time (DST
The Daylight Saving Time shift on March 11 will require preparation to keep your networks running smoothly. Are you ready? In this tip, Tom Lancaster reminds you how Daylight Saving Time works and ...
-
TCP/IP troubleshooting: A structured approach -- Introd
This tip from WindowsNetworking.com describes a structured approach for troubleshooting connectivity problems with TCP/IP networks. This is the first of a series of articles on TCP/IP troubleshooting
-
Cisco wireless access point configuration from scratch
Learn what the Cisco 1242 wireless access point can do for you and how to configure one from scratch. This tip covers basic security settings, enabling the wireless radios, and how to make a succes...
-
Vista's Network Diagnostics Framework: Good idea, less-
Connectivity problems frustrate both users and help desk staff. In order to help expedite the diagnostic and repair process, Microsoft has created a new component called the Network Diagnostics Fra...
-
WLAN test tools, expertise, turn theoretical network in
Specialized WLAN testing tools are needed to deploy and maintain an IEEE 802.11 wireless network.
-
OSI: Securing the Stack, Layer 6 -- Encryption
SSL or TLS encryption takes place at the presentation layer, Layer 6 of the OSI model. In this tip, learn why encryption is so important and how certain hacker attacks can still circumvent SSL or T...
-
Content filtering -- Taming the wild Web
Delivering safe, fast, transparent Web access that meets workforce needs has never been more challenging. Nearly four out of five FBI-surveyed companies report that employees abuse Internet privile...
-
Troubleshooting network routing issues
Expert Patrick Hubbard shares how you can make your life easier by alleviating some annoying network routing issues.
-
Resource pools for hybrid cloud management
Working with individual applications in hybrid cloud management can be complex, but Quality of Experience can be ensured.
-
What to know about implementing Security as a Service
Implementing cloud-based security services has rewards, but network pros must evaluate the cloud provider's architecture for security and reliability.
-
Enterprise wireless standards: The basics
Glen Kemp discusses the standards and protocols that support enterprise-class wireless deployments and how they differ from consumer configurations.
Network Management Strategies for the CIO