Tips

  • Network engineering overview: Detailed design considera

    Implementing architectural concepts and dealing with detailed network designs must be second nature to the network engineer. In the conclusion of our tip series on things network engineers need to ...

  • WAN acceleration scalability: Part 1

    As WAN acceleration becomes more critical to business operations, the average size and scope of deployment is steadily increasing. This creates a variety of questions pertaining to product scalabil...

  • Network engineering overview: Policy and process

    Policy and process may seem like dull and superfluous activities, but they exist to improve communication between different departments of your company. In the third installment of his series on th...

  • Set up an ad hoc WiFi network

    What if you wanted to do pretty much everything you can do on a network, but didn't have a router? You can set up an ad hoc network, in which you can connect on a peer-to-peer basis with other comp...

  • Troubleshoot networks with the pathping command

    You can troubleshoot networks with the pathping command, which works like a combination of ping and tracert.

  • VoWLAN: Preparing your network for a voice over wireles

    If you are considering a voice over wireless LAN (VoWLAN) deployment, you must plan ahead to ensure the high call quality your users expect. In this tip, David Jacobs explains the three steps to a ...

  • OSI: Securing the stack, Layer 1

    Security expert Michael Gregg kicks off his layer-by-layer discussion of OSI model network security with this tip on securing Layer 1 against physical security threats.

  • Change your network adapter's IP information

    To change a machine's TCP/IP settings, you can use a VBScript to modify the network adapter information on a computer.

  • BackTrack: Free security testing suite

    Get the power of Linux-based security tools on Windows with this free suite of open source security tools. Contributor and vulnerability assessment expert Kevin Beaver introduces BackTrack and expl...

  • Data destruction

    How often do we hear about sensitive data falling into the wrong hands? And that data is usually on laptops, imagine the embarrassment if that data was found on something that was thrown away? Cont...

  • Duplex mismatch

    What is duplex, and what is the difference between half and full duplex? What is a duplex mismatch? How can autonegotiation help or hurt your network? How can you resolve duplex conflicts? In this ...

  • Network intrusion prevention: An allegory

    Security expert Rich Loeber discusses the importance of computer intrusion prevention and provides steps for protecting your network -- as well as keeping geese off your beach.

  • Duplex mismatch: Stop the conflicts, part 2

    Today, the majority of modern cabling supports full-duplex, and there is a significantly diminished need for half-duplex -- or at least, that is what one would like to think. In this column, Loki J...

  • Network engineering overview: Techniques for making cha

    Network engineers are often faced with the task of making changes to the network with minimal downtime. Whether you are upgrading an Ethernet switch or adding a whole new building to your network, ...

  • Cellular data convergence: An introduction to wireless

    The world of wireless data capabilities on the carrier networks is seeing a tremendous amount of growth as it relates to standards and service offerings. In this tip, Robbie Harrell sorts out the a...

  • Network engineering overview: Technology

    Network engineering requires a firm grasp of technology. This overview covers frameworks, standards and products. This tip is the first in a four-part series on things network engineers need to kno...

  • Remote disaster recovery and prevention

    This tip discusses the two most basic ways you can recover from, and fend off, disasters that can overtake a remotely-hosted system: backup and redundancy.

  • Three ways to improve wireless network access for your

    Here are three things an administrator can do to improve your company's wireless strategy on the client side.

  • Planning Network Load Balancing clusters

    Servers that use Windows Network Load Balancing can benefit from optimization. Servers should be optimized for their role, the types of applications they will run, and the anticipated local storage...

  • Network Access Quarantine Control vs. Network Access Pr

    With the number of mobile devices and remote workers growing, network quarantining has been a popular topic lately. Contributor and NAQC expert Jonathan Hassell compares the features of NAQC with t...