-
Benchmarking core switches without extensive testing to
When it comes to benchmarking core switches, network managers find that testing tools are costly, so it may be worth using switch traffic modeling for testing core switch performance.
-
Integrated wireless NMSs work across infrastructures
Enterprises must implement integrated wireless network management systems that are user-aware and offer end-to-end visibility but also provide the drill-down capabilities of wired network managemen...
-
Cloud computing networks: Any application, any time, an
Cloud networks have a mission: connect a pool of resources that any user, anywhere can access without fail.
-
Who controls unified networking and storage fabric?
When it comes to managing unified fabric, the jury is out on who's in charge. FCoE switches and adapters have LAN and SAN elements and can be managed by existing network or storage interfaces. But ...
-
Is your wired network ready for WLAN integration?
Wireless LAN integration means upgrading wired networks with new equipment and traffic prioritization to avoid bottlenecks between the networks and provide QoS for wireless multimedia applications,...
-
Testing 10 gigabit Ethernet switch latency
Testing 10 Gigabit Ethernet switches means going beyond just speed to examine potential latency. Testing 10 gigabit Ethernet switch latency requires choosing the right switches and testing tools an...
-
Steps to a unified storage and network fabric
IT organizations planning to deploy a unified storage and network fabric through data center bridging and FCoE implementation must consider a host of components, such as adapters, and configuration...
-
802.11n WLAN speed: Just how fast is fast?
Vendors promise 802.11n WLAN speed of 600 Mbps, but users find they can realistically reach about 300 Mbps. In order to maximize 802.11n speed and throughput, users find they must have just the rig...
-
Unified fabric primer: FCoE and data center bridging
Unified data center fabrics combine FCoE and data center bridging to enable SAN and LAN traffic to run on the same physical network, simplifying network architecture and resulting in savings. This ...
-
Wireless or Ethernet LAN? Comparing costs
Now that 802.11n has made wireless LAN faster and more reliable, network administrators are wondering: Wireless or Ethernet LAN? Until now Ethernet replacement hasn't been feasible, but 802.11n WLA...
-
Why you should integrate wired and wireless LANs
With improved 802.11n performance, wireless LAN ports are overtaking Ethernet in the enterprise, and networking teams are pressed to find solutions for integrated wired and wireless network managem...
-
Desktop virtualization storage strategies
Without the right desktop virtualization storage strategies, implementing the technology could mean a great strain on storage area networks and the core. But with the right approach, enterprises co...
-
Virtualization planning tips for network managers
Network managers need to consider more than server CPU utilization when planning for virtualization. These common misconceptions and tips show what project managers need to know before implementing...
-
How to test LAN switch energy efficiency
Vendors promise energy-efficient networks, but they often can't provide actual measurements for LAN switch power consumption. In this best practices guide, learn methods for measuring LAN switch en...
-
Testing LAN switch power consumption
LAN switch power consumption testing is as crucial as benchmarking speeds and feeds on switches. Enterprises that develop a set of best practices for testing network power consumption will save mil...
-
Is your network ready for desktop virtualization?
CIOs have fallen in love with virtual desktop infrastructure, so networking teams must meet desktop virtualization network requirements that include network bandwidth management and traffic prioritization...
-
Application-specific intrusion detection systems emerge
Integrating network intrusion detection systems can mean using both anomaly and signature-based detection in application-specific tools.
-
Installing anomaly-based intrusion detection
Network behavior analysis may be the answer to preventing zero-day attacks. You must install an anomaly-based intrusion protection system (IPS) or intrusion detection system (IDS). This article exp...
-
It takes two to defend a network
Deter enterprise network attacks by learning how network behavior analysis can be used to protect data. Understand the advantages and disadvantages of anomaly-based and signature-based protection a...
-
Three network investments for the green enterprise
Building green enterprise IT systems can mean making networking investments that support unified communications through network quality of service, traffic monitoring and mobility.
-
Troubleshooting network routing issues
Expert Patrick Hubbard shares how you can make your life easier by alleviating some annoying network routing issues.
-
Resource pools for hybrid cloud management
Working with individual applications in hybrid cloud management can be complex, but Quality of Experience can be ensured.
-
What to know about implementing Security as a Service
Implementing cloud-based security services has rewards, but network pros must evaluate the cloud provider's architecture for security and reliability.
-
Enterprise wireless standards: The basics
Glen Kemp discusses the standards and protocols that support enterprise-class wireless deployments and how they differ from consumer configurations.
Network Management Strategies for the CIO