Tips

  • Wireless Internet access -- 3G vs. Wi-Fi

    Most road warriors have just two truly viable alternatives for wireless Internet access: 3G and Wi-Fi. In this tip, Lisa Phifer covers the pros and cons of 3G and Wi-Fi for coverage, convenience, c...

  • Troubleshoot routing tables

    Learn how routing tables work and how to troubleshoot routing problems in Windows-based networks in this tip courtesy of WindowsNetworking.com.

  • Troubleshooting a DHCP server

    Learn how to troubleshoot a DHCP server to discover why it might fail to lease IP addresses and the solutions to those problems in this tip.

  • Understanding wireless antennas

    Upgraded antennas can improve wireless LAN performance, reach and security.

  • Anti-spam protocols help reduce spam

    Spam is not just annoying; it clogs networks and, at worst, can point to larger network security problems. Anti-spam protocols are useful in helping network administrators block spam. This tip cove...

  • How routers work

    Routers are essential to carrying network traffic, but how do they work? In this tip, you'll get perspective on how routing fits into the OSI model. You'll also learn how routers use routing tables...

  • Server and storage virtualization end network managemen

    In the past, system management and network management were separate disciplines. Recent advances in network-wide server and storage virtualization blur the boundaries and require an integrated view...

  • Network summarization -- Supernetting and wildcard mask

    Supernetting allows one routing table entry to represent an aggregation of networks. Network engineers need to understand supernetting, how to read routes received from other providers and how to c...

  • VLANs -- Controlling wired and wireless traffic

    Today, most business networks rely on virtual LANs (VLANs) to partition Ethernets and control the destinations reached by each worker. As users begin to shift between Ethernet and Wi-Fi throughout ...

  • The Tao of automated network management

    Integration of network management tools is the first step toward an automated future and requires a proactive approach with service providers.

  • New gigabit standard

    Last June, the 10GBASE-T standard was published promising 10 Gbit operations on copper cabling. This standard was originally targeted toward data centers, but the Ethernet Alliance and IEEE are wor...

  • Understanding wireless antennas

    Types of wireless LAN antennas, including omni-directional monopole and dipole antennas, are explained in this tip.

  • OSI: Securing the Stack, Layer 7 -- Applications

    Domain Name System (DNS) wasn't designed to handle today's security threats, making it a prime target at Layer 7 -- the application layer -- of the OSI model. In this tip, learn how DNS works and s...

  • Prepare your networks for the Daylight Saving Time (DST

    The Daylight Saving Time shift on March 11 will require preparation to keep your networks running smoothly. Are you ready? In this tip, Tom Lancaster reminds you how Daylight Saving Time works and ...

  • TCP/IP troubleshooting: A structured approach -- Introd

    This tip from WindowsNetworking.com describes a structured approach for troubleshooting connectivity problems with TCP/IP networks. This is the first of a series of articles on TCP/IP troubleshooting

  • Cisco wireless access point configuration from scratch

    Learn what the Cisco 1242 wireless access point can do for you and how to configure one from scratch. This tip covers basic security settings, enabling the wireless radios, and how to make a succes...

  • Vista's Network Diagnostics Framework: Good idea, less-

    Connectivity problems frustrate both users and help desk staff. In order to help expedite the diagnostic and repair process, Microsoft has created a new component called the Network Diagnostics Fra...

  • WLAN test tools, expertise, turn theoretical network in

    Specialized WLAN testing tools are needed to deploy and maintain an IEEE 802.11 wireless network.

  • OSI: Securing the Stack, Layer 6 -- Encryption

    SSL or TLS encryption takes place at the presentation layer, Layer 6 of the OSI model. In this tip, learn why encryption is so important and how certain hacker attacks can still circumvent SSL or T...

  • Content filtering -- Taming the wild Web

    Delivering safe, fast, transparent Web access that meets workforce needs has never been more challenging. Nearly four out of five FBI-surveyed companies report that employees abuse Internet privile...