• Calculate a subnet mask using the subnet's formula

    IP addressing and subnetting are an important part of networks. Learn how the subnet's formula works and why it's important to know how to calculate the subnet mask "longhand."

  • Security Spotlight: SSL VPN appliances simplify secure

    By leveraging the ubiquitous Web browser as a client platform, SSL VPN appliances represent a promising alternative for delivering simple-but-secure off-site access to private business services and...

  • Stop dropped connections

    What happens when you try implementing wireless 802.11g in a place with no open spaces? You probably get unreliable service. Lisa Phifer takes the mystery out of dropped connections in this tip.

  • IP addressing and subnetting: Calculate a subnet mask u

    IP addressing and subnetting are an important if basic part of networks. Network administators will learn how to calculate a subnet mask using the host's formula.

  • Performance management -- making it relevant

    Network engineers struggle with data overload. So much so that it's impossible to analyze the avalanche of available network data to provide meaningful information for business management. In this ...

  • Better management = increased value

    As our networks become more complex and network traffic continues to increase, network professionals need comprehensive data analytics, management and reporting skills. This column explores three c...

  • OSI: Securing the Stack, Layer 3 -- The role of ICMP

    Michael Gregg examines the security vulnerabilities of Internet Control Message Protocol (ICMP) and how to help secure OSI Layer 3, the network layer.

  • Network test plan: Checklist for architecture changes

    For every change you make to your network architecture, you should have a test plan and a backout plan. In this tip, learn how to build a test plan and review a sample checklist of things to include.

  • WAN acceleration scalability: Part 2

    Dr. David Hughes continues his discussion of the top considerations for scaling a WAN acceleration appliance. Here are numbers three through six: performance under load, hardware acceleration for e...

  • Building a WLAN proxy server, DHCP services: Part 2

    Router expert Michael Martin continues his discussion of building a WLAN proxy server and implementing the dhcpd.conf file. In this tip, he provides a second dhcpd.conf example that shows both the ...

  • Network Behavior Analysis goes long and wide

    Need to bulk up your network's backcourt defense? Network Behavior Analysis (NBA) is a new approach to network security that passively monitors your traffic patterns to prevent zero-day exploits, w...

  • Measuring network hardware utilization

    Monitoring your network goes beyond just keeping tabs on your servers. You also need to monitor your hardware, such as routers and switches, to tell not only that these types of devices are functio...

  • Building a WLAN proxy server, DHCP services

    Router expert Michael Martin discusses DHCP implementation options and provides sample configurations to support various SSID network models in this continuation of his series on building a WLAN pr...

  • Staging labs for network engineering

    Making changes to your network is less scary with adequate planning and staging, and go even more smoothly if you have a staging lab. In this tip, Tom Lancaster explains how and why such labs can b...

  • IP addressing and subnetting: What network administrato

    IP addressing and subnetting are an important part of networks. Learn about how IP addresses work, subnet masks, classful vs. classless IP addresses, default gateways and more.

  • Network cabling documentation

    Network cabling documentation with dedicated documenation software can keep your cables from becoming a big mess.

  • Convincing management to approve your networking projec

    Network pros must have great technology know-how, coupled with major league pitching abilities. This list of project dos and don'ts can help you over your managers.

  • OSI: Securing the stack, Layer 2

    Security expert Michael Gregg continues his layer-by-layer discussion of OSI model network security with this tip on the vulnerabilities present in Layer 2, the Data Link Layer, and specifically ad...

  • Network engineering overview: Detailed design considera

    Implementing architectural concepts and dealing with detailed network designs must be second nature to the network engineer. In the conclusion of our tip series on things network engineers need to ...

  • WAN acceleration scalability: Part 1

    As WAN acceleration becomes more critical to business operations, the average size and scope of deployment is steadily increasing. This creates a variety of questions pertaining to product scalabil...