-
Wireless LAN management: Managing security compliance
Find out the security threats that need to be addressed to make your network compliant with security regulations.
-
802.11 a and g bring more sweet spots for wireless acce
An often-overlooked factor in placing wireless access points, the difference between the 802.11a, b and g specifications can mean substantial differences in both data rates and available channels. ...
-
IP network design, part 4: LAN design
This final section of the IP network design series relates to the issues encountered with campus LAN design. The benefits of Ethernet switching over a traditional hub environment are first explaine...
-
Certifications that will earn you the most money
Ed Tittel takes a look at the five network certifications that earned the most money in 2005.
-
Wireless access points: Placement checklist
When planning to deploy wireless or tweak your existing deployment, the conventional wisdom is that you need a "site survey." If you're trying to locate the best places to put your wireless access ...
-
Protecting your network against spoofed IP packets
These days, the vast majority of administrators go to great lengths to protect the files on their network. Typically, elaborate firewalls are used to keep outsiders away from file servers. The file...
-
Intrusion prevention devices
Hackers are constantly at work developing new ways to attack your network, so guarding against these attacks requires eternal vigilance. Intrusion prevention devices are one essential element of de...
-
IP network design, part 3: Designing the WAN
The wide area network (WAN) is the single biggest contributor to a corporate network's cost of ownership. Therefore, this is the area where the cost-versus-performance tradeoff is most pronounced a...
-
Implementing software restriction policies
This tip explains how you can use software restriction policies to keep your workstations in pristine shape and cut down on help desk calls at the same time.
-
LAN connectivity problem
ITKnowledge Exchange member "BinooDas1234" had connectivity issues with a troublesome LAN, and fellow techies jumped in to help out. But does the answer lie in the DNS configuration, the NIC driver...
-
Configuring a Cisco 1200 802.11g WLAN access point
Our router expert continues his series on building a secure wireless LAN with a Linux base. This article explains how to utilize a single Cisco 1200 series access point to provide access to three d...
-
Using Netsh with Windows Firewall
This tip examines how to configure and troubleshoot Windows Firewall using the Netsh command-line utility. The procedures covered apply to both the Windows XP Service Pack 2 and Windows Server 2003...
-
Understanding the NNTP protocol
Everyone knows about peer-to-peer programs such as Napster, Kazaa, amongst others. How many people though know about binary newsgroups? Probably not many. These binary newsgroups are based on the N...
-
The truth about diagnostics
We often say "diagnostics" but we don't really mean it -- at least not in the context of networks. In this featured column, Loki Jorgenson explains why the burden of analysis that leads to identify...
-
Purchasing a new router: How, why and which one to buy
Ken Milberg discusses reasons for buying a new router, and looks at the options available from the big-name vendors.
-
Implementing QoS
Despite reports to the contrary, QoS is still essential for guaranteeing the quality of application delivery and ensuring predictable behavior across an optimized WAN. In this tip, Dr. David Hughes...
-
IP network design, part 2: The IP addressing plan
The IP addressing plan is the foundation upon which a successful logical design is built. Part two of this tip explains how to formulate a scalable IP addressing plan that can support the network a...
-
What's new in network certification?
Ed Tittel provides an update on the latest in networking certifications and lists handy resources for finding out more information.
-
Networking certification tables
Look-up points for certification programs from vendor and non-vendor organizations (the latter are a mix of training companies and industry associations of various kinds).
-
Five common insider threats and how to mitigate them
Users can be an enterprise's best defense or its worst enemy. They have access to valuable network resources and information that can be used for ill-gain, be it accidentally or intentionally. This...
-
Premises- or provider-based network management?
IT expert David Davis outlines the pros and cons of premises- versus provider-based network management.
-
Networking blogs: Reevaluating the optical market
This week, networking bloggers discuss a potential sea change for the optical market, and reveal some key tips for using custom config builders.
-
Data center spaghetti: Trials, tribulations of cabling
Switching out servers at a data center can go from ho-hum to disaster unless you have a tested cable management plan in place.
-
Networking blogs: Wi-Fi Certified 802.11ac is here
In this week's blog roundup, get expert insight on preparing for 802.11ac and solutions to CDN bandwidth issues.
Network Management Strategies for the CIO