-
VLANs -- Controlling wired and wireless traffic
Today, most business networks rely on virtual LANs (VLANs) to partition Ethernets and control the destinations reached by each worker. As users begin to shift between Ethernet and Wi-Fi throughout ...
-
The Tao of automated network management
Integration of network management tools is the first step toward an automated future and requires a proactive approach with service providers.
-
New gigabit standard
Last June, the 10GBASE-T standard was published promising 10 Gbit operations on copper cabling. This standard was originally targeted toward data centers, but the Ethernet Alliance and IEEE are wor...
-
Understanding wireless antennas
Types of wireless LAN antennas, including omni-directional monopole and dipole antennas, are explained in this tip.
-
OSI: Securing the Stack, Layer 7 -- Applications
Domain Name System (DNS) wasn't designed to handle today's security threats, making it a prime target at Layer 7 -- the application layer -- of the OSI model. In this tip, learn how DNS works and s...
-
Prepare your networks for the Daylight Saving Time (DST
The Daylight Saving Time shift on March 11 will require preparation to keep your networks running smoothly. Are you ready? In this tip, Tom Lancaster reminds you how Daylight Saving Time works and ...
-
TCP/IP troubleshooting: A structured approach -- Introd
This tip from WindowsNetworking.com describes a structured approach for troubleshooting connectivity problems with TCP/IP networks. This is the first of a series of articles on TCP/IP troubleshooting
-
Cisco wireless access point configuration from scratch
Learn what the Cisco 1242 wireless access point can do for you and how to configure one from scratch. This tip covers basic security settings, enabling the wireless radios, and how to make a succes...
-
Vista's Network Diagnostics Framework: Good idea, less-
Connectivity problems frustrate both users and help desk staff. In order to help expedite the diagnostic and repair process, Microsoft has created a new component called the Network Diagnostics Fra...
-
WLAN test tools, expertise, turn theoretical network in
Specialized WLAN testing tools are needed to deploy and maintain an IEEE 802.11 wireless network.
-
OSI: Securing the Stack, Layer 6 -- Encryption
SSL or TLS encryption takes place at the presentation layer, Layer 6 of the OSI model. In this tip, learn why encryption is so important and how certain hacker attacks can still circumvent SSL or T...
-
Content filtering -- Taming the wild Web
Delivering safe, fast, transparent Web access that meets workforce needs has never been more challenging. Nearly four out of five FBI-surveyed companies report that employees abuse Internet privile...
-
Certifications for networking professionals
Networking certification is an important part of a networking career, as discussed in this tip on four certifications for networking professionals. Despite ups and downs in the economy, the job mar...
-
Network visualization, automation: At odds?
Visualization is a powerful tool. But in the context of network management, the prevalence of graphs may indicate that your network management system (NMS) is not ready to meet the requirements of ...
-
Five common routing errors you can avoid
Router configuration errors don't have to take down your network. Learn five common routing mistakes -- and how to avoid them -- in this tip.
-
IP addressing
Learn about IP addresses with this tutorial.
-
Router Expert: Building a WLAN proxy server, implementi
Using application service redirection (ASR) in the wireless LAN environment provides guest users enough information to be able to get access without the need for direct support.
-
IEEE 802.11n: Looking ahead to the next wireless standa
The upcoming IEEE 802.11n wireless standard will enable high-bandwidth applications such as streaming video to coexist with wireless VoIP. This tip is the first of two that describe the 802.11n wir...
-
IEEE 802.11n: Research carefully before deploying
Before deploying the IEEE 802.11n wireless standard, consider how the new Wi-Fi technology will affect your entire network.
-
Router Expert: Building a WLAN proxy server, implementi
Router expert Michael Martin continues his discussion of building a WLAN proxy server by explaining how to implement Web Proxy Auto Discovery Protocol (WPAD), which will allow guest users to automa...
-
Premises- or provider-based network management?
IT expert David Davis outlines the pros and cons of premises- versus provider-based network management.
-
Networking blogs: Reevaluating the optical market
This week, networking bloggers discuss a potential sea change for the optical market, and reveal some key tips for using custom config builders.
-
Data center spaghetti: Trials, tribulations of cabling
Switching out servers at a data center can go from ho-hum to disaster unless you have a tested cable management plan in place.
-
Networking blogs: Wi-Fi Certified 802.11ac is here
In this week's blog roundup, get expert insight on preparing for 802.11ac and solutions to CDN bandwidth issues.
Network Management Strategies for the CIO