Get started
Bring yourself up to speed with our introductory content.
Ethernet
Why you need software-defined security for your SDN
The network architecture shift to software-defined networking requires software-defined security, not a hard-wired security approach. Continue Reading
What is 'open' SDN?
Author Chuck Black explains what 'open' means for SDN, and considers open SDN controllers, protocols and APIs. Continue Reading
Six considerations for big data networks
Big data networks must be built to handle distributed resources that are simultaneously working on a single task. That'll require network resiliency, consistency and application awareness. Continue Reading
-
Hardware open source key goal of OCP project
Open Compute Project garners this month's Network Innovation Award for its work in developing an OS-agnostic top-of-rack switch. Continue Reading
MPLS-TP (MPLS Transport Profile)
The Multiprotocol Label Switching Transport Profile (MPLS-TP) is a protocol extension of MPLS designed to speed up and shape network traffic in operator transport networks. Continue Reading
Network timing: Everything you need to know about NTP
As more applications use IP networks, reliable distribution of authoritative timing information is becoming critical.Continue Reading
NFV applications emerge from ISVs, but challenges loom
A new group of ISVs is producing exciting NFV applications that bring automation to a range of network services. But these developers face enormous challenges in establishing a new set of technologies.Continue Reading
How to reassert control in era of bring your own application
The growth of bring your own applications means IT has to find new ways to reassert control over software introduced into the workplace.Continue Reading
What does WebRTC video mean for the network?
WebRTC, an emerging standard for embedding voice and video-conferencing applications into Web browsers, is aimed at making real-time communications as simple as clicking a link. It eliminates the need to download and install any clients or plug-ins,...Continue Reading
Seven steps to a Microsoft Hyper-V test network
Networking pros can use Microsoft Hyper-V networks for multi-tenant cloud environments, but first they'll have to learn the ropes in testing environments. Here are simple steps to building a Hyper-V test network.Continue Reading
-
Basic elements of Microsoft network virtualization
Microsoft network virtualization may not get the same market mindshare as the competition, but you can pull off a software-driven, multi-tenant network for the cloud using Hyper-V and Systems Center 2012.Continue Reading
SDN's role in enhancing network security: What will it be?
SN blogs: How can SDN be used to fortify network security? And is it time to be worried about software libraries?Continue Reading
variable-length subnet mask (VLSM)
Definition: Learn what a variable-length subnet mask (VLSM) is and how it allows network engineers to reduce the number of wasted IP addresses in each subnet.Continue Reading
You may already own the best Internet security tool
You may not have to spend money to purchase more security tools; in fact, Michele Chubirka writes, you probably already own what you need.Continue Reading
Analyzing 4G and Wi-Fi options for spot-on wireless network planning
Three important questions can help you analyze your 4G and Wi-Fi assets and user expectations for wireless network planning now and in the future.Continue Reading