Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
New telecom industry trends require OSS/BSS systems changes
New telecom industry trends are driving OSS/BSS systems requirements, with new service layer architecture and customer experience management at the core, causing a move to automated systems and management-as-service logic. Continue Reading
Can I use MPLS Traffic Engineering with IPv6?
Wondering how to reap the benefits of MPLS Traffic Engineering features with IPv6? Expert Ivan Pepelnjak has your answer. Continue Reading
What's the difference between DWDM and CWDM?
Expert Ivan Pepelnjak explains the primary differences between dense wavelength division multiplexing and coarse wavelength division multiplexing (DWDM and CWDM). Continue Reading
-
Where do you think WiMAX technology will be used?
As major service providers tap Long-Term Evolution for 3G network upgrades, a question arises: What's next for WiMAX technology? Expert Ivan Pepelnjak looks at the future of WiMAX. Continue Reading
How does traffic grooming for optical networks work?
Wondering how traffic grooming for optical networks works? Learn the ins and outs from our expert, Ivan Pepelnjak. Continue Reading
Five key Evolved Packet Core issues face 4G LTE network planners
Wireless operators deploying Evolved Packet Core technology in 4G Long-Term Evolution (LTE) networks agree on five key issues to address in this unique transition from 3G to 4G networking. Learn from their experience on everything from fiber ...Continue Reading
Integrating the Evolved Packet Core for seamless 3G/4G mobile backhaul
When transitioning from 3G to 4G networks, wireless operators must plan carefully to migrate and integrate mobile backhaul so it accommodates both the new Evolved Packet Core for LTE and traditional TDM-based backhaul solutions.Continue Reading
Choosing a provider for WAN managed services for your enterprise
How do you find the right provider for your business's WAN managed services? Ask the right questions. To get a managed service provider (MSP) at the right price with the right offerings and service-level agreements (SLAs), view these tips.Continue Reading
Seven IPv6 networking myths that don't match reality
IPv4 addresses are running out, and the change to IPv6 networking is imperative, yet the myths surrounding what the protocol can and cannot do are becoming the stuff of legend. Our IP expert looks at IPv6 reality instead.Continue Reading
LAN edge switch security functions: Switch ACLs; filtering port traffic
LAN edge switch security functions enable network administrators to use switch access control lists (ACLs) to filter incoming and outgoing traffic, as well as port-level traffic filtering and VLAN management for a more in-depth approach to LAN ...Continue Reading
-
Mobile WAN routers: Comparison and considerations for your enterprise
If you have road warriors in your enterprise wide area network (WAN) workforce, you're probably worrying about exorbitant mobile broadband fees. Mobile WAN routers are a cost-effective alternative. Read this tip to learn when to use them in your ...Continue Reading
Improving network troubleshooting methodology, IP address management
A growing airport reinvented its network troubleshooting methodology and approach to IP address management by scrapping a network management product that wasn't working out and replacing it with SolarWinds' Orion product suite.Continue Reading
WAN video conferencing network design requirements for QoS
To ensure high-quality video conferencing over your enterprise wide area network (WAN), you need to make sure you have enough bandwidth, among other things. Check out these WAN video conferencing network design configuration requirements before you ...Continue Reading
What network troubleshooting tools can I use to determine the cause of slow web page access?
How does Active Directory for Cisco ACS work?
Benchmarking core switches: Modeling techniques for switch testing
When it comes to benchmarking core switches, network managers find that testing tools are costly, so it may be worth using switch traffic modeling for testing core switch performance.Continue Reading
Integrated wireless network management systems work across infrastructures
Enterprises must implement integrated wireless network management systems that are user-aware and offer end-to-end visibility but also provide the drill-down capabilities of wired network management systems.Continue Reading
Cloud networking: Inter-networking data centers and connecting users
Cloud networks have a mission: connect a pool of resources that any user, anywhere can access without fail.Continue Reading
Five telecom provider benefits of offering cloud computing services
Cloud computing services, platforms and infrastructure can benefit telecom service providers and provide Web-based applications to enterprise customers if carriers address challenges like security and performance to differentiate themselves and cut ...Continue Reading
Preparing your wired network for wireless network integration
Wireless LAN integration means upgrading wired networks with new equipment and traffic prioritization to avoid bottlenecks between the networks and provide QoS for wireless multimedia applications, including WLAN voice and video.Continue Reading
IPsec VPN with Cisco router: Configuration and implementation
The Cisco IOS implementation of the IPsec suite is an open-standards based framework that provides network engineers with a variety of options to deliver secure VPN communications. This series of articles explains Cisco IPsec VPN configuration ...Continue Reading
What is the difference between IP address and machine address?
Do you know the difference between an IP address and a machine address? Find out in this Ask the Expert response.Continue Reading
Testing 10 gigabit Ethernet switch latency: What to look for
Testing 10 Gigabit Ethernet switches means going beyond just speed to examine potential latency. Testing 10 gigabit Ethernet switch latency requires choosing the right switches and testing tools and recreating your track flow in just the right way.Continue Reading
Demystifying the evolved packet core for 4G LTE networks
Designing 4G LTE network evolved packet core technology to ensure maximum resource efficiency and high-quality user experience calls for increased focus on metro "middle-mile" networks and analysis of expected traffic handoff patterns.Continue Reading
Unified fabric: Data center bridging and FCoE implementation
IT organizations planning to deploy a unified storage and network fabric through data center bridging and FCoE implementation must consider a host of components, such as adapters, and configuration plans.Continue Reading
Frame relay vs. ATM networks: What's the difference?
Want to know the difference between frame relay and ATM networks? Find out in this expert response.Continue Reading
How to reach maximum 802.11n speed and throughput
Vendors promise 802.11n WLAN speed of 600 Mbps, but users find they can realistically reach about 300 Mbps. In order to maximize 802.11n speed and throughput, users find they must have just the right AP configuration and use of antennas.Continue Reading
IP over dense wave division multiplexing (DWDM): Metro and core issues
Providers pressured to increase network throughput while reducing costs can look to IP over DWDM in some metro network situations, such as saving money on residential Internet backhaul. IP expert Ivan Pepelnjak also walks you through the ...Continue Reading
Wireless or Ethernet LAN? An apples-to-apples cost comparison
Now that 802.11n has made wireless LAN faster and more reliable, network administrators are wondering: Wireless or Ethernet LAN? Until now Ethernet replacement hasn't been feasible, but 802.11n WLAN benefits are much more tangible now.Continue Reading
Top five telecom industry trends for 2010: Market transformation ahead
Five telecom industry trends for 2010 show clear signs that the coming year may well bring a market transformation unlike any the telecom industry has seen in quite some time.Continue Reading
Deep packet inspection: Who needs it for network traffic management?
Using deep packet inspection (DPI) is a great way to analyze Internet traffic and bandwidth use beyond the TCP headers, when its use doesn't violate network traffic management regulations. Carriers may find that if they don't embrace DPI, their ...Continue Reading
How does rain affect wireless network data transfer?
In one of the wireless data acquisition installations, there is no data transfer during rain and mist. The wireless system works in 2.4 GHz frequency. What could be the cause of this?Continue Reading
How can I increase throughput on my wireless mesh network?
We have installed a wireless mesh network that connects two access points (APs) to mesh nodes that are mounted at 25 meters high on 23 light poles. Poles are distributed around a container yard that measures 650 meters by 1,000 meters. There are six...Continue Reading
Integrating wired and wireless LANs: Making the business case
With improved 802.11n performance, wireless LAN ports are overtaking Ethernet in the enterprise, and networking teams are pressed to find solutions for integrated wired and wireless network management.Continue Reading
Why is the 802.11g Wi-Fi throughput speed on my smartphone slow?
I recently purchased a smartphone with Wi-Fi (802.11g) but found video over Wi-Fi to be pretty choppy. I checked SpeedTest and I don't get anywhere near 54 Mbps when connected to Wi-Fi. Why not?Continue Reading
How do I set the Web page default on a network of computers without setting them all individually?
Learn how to set a default for a network of computers if a group policy isn't working. Instead of setting each machine manually, learn what else you can do.Continue Reading
Three major issues face telecom on cloud computing services adoption
Service providers must address three important cloud computing services issues – security, reliability and portability – if enterprise customers are going to adopt the new model, and the TM Forum is aiming to take a key role in the ...Continue Reading
How do I change my security setting to allow ActiveX?
Learn how to change your security settings to allow ActiveX in Internet Explorer 6 or later, from our enterprise security expert Michael Gregg.Continue Reading
How to test LAN switch energy efficiency
Vendors promise energy-efficient networks, but they often can't provide actual measurements for LAN switch power consumption. In this best practices guide, learn methods for measuring LAN switch energy efficiency.Continue Reading
Testing LAN switch power consumption: A best practices guide
LAN switch power consumption testing is as crucial as benchmarking speeds and feeds on switches. Enterprises that develop a set of best practices for testing network power consumption will save millions in op-ex annually.Continue Reading
Telecom network test equipment takes on strategic role
Telecom network test equipment is becoming a strategic necessity for operators, who want to integrate the NOC with lab- and field-testing equipment to get a handle on network performance and stability issues.Continue Reading
Desktop virtualization network requirements
CIOs have fallen in love with virtual desktop infrastructure, so networking teams must meet desktop virtualization network requirements that include network bandwidth management and traffic prioritization for real-time communications.Continue Reading
How many wireless base stations can connect to 802.11g access points?
Our wireless networking expert, Lisa Phifer, talks about the information you need in order to support additional clients on 802.11g access points (APs), in this advice.Continue Reading
What is wireless networking?
Are you looking for resources on wireless networking and a definition to define this concept? Then view this expert answer.Continue Reading
How can I calculate perimeter firewall throughput?
Learn how to use a capture filter in Wireshark, to determine network throughput on a firewall by monitoring incoming packets and using a simple equation to find a baseline throughput, from our expert Michael Gregg.Continue Reading
Why is access denied to my Active Directory (AD) users and computers?
Learn how to troubleshoot administrative domain access errors on your network in your Active Directory user list from our expert, Lindi Horton.Continue Reading
Is the future of 4G LTE wireless networks in cloud computing?
4G LTE wireless networking will drive low-revenue data business to carriers, so the key to making a profit is to bundle cloud-enabled managed services with basic communications.Continue Reading
Selecting a WAN service provider: Keep an eye on SLAs
Adding new layers on your WAN for application monitoring and optimization can easily increase costs and complexity, which can take a toll on organizations struggling with limited budgets and short staff. The solution may be a managed service ...Continue Reading
APs drop connection in WLAN configured as a wireless mesh network
Learn how to network troubleshoot a Colubris MSC 3200 access point/controller in a 16-access-point networking environment, each with unique static IPs that drop the Internet connection, from our expert Lisa Phifer.Continue Reading
Procurement zones become telecom network infrastructure strategy
Telecom carriers are changing their traditional network technology procurement procedures and looking at vendor-led "procurement zones" to ensure equipment and solutions interoperability and get around delayed standards issues in an increasingly ...Continue Reading
What is network infrastructure and what is a hybrid network?
Learn specific networking terms to help setup and choose a specific type of network infrastructure from a single proprietary company or a hybrid of vendors, from our expert Tessa Parmenter.Continue Reading
Launching a network operations outsourcing project
Outsourcing telecom network operations is becoming more common as next-generation network increase in complexity and IT focus, but a successful launch should include specific planning steps.Continue Reading
Telecom outsourcing: Network Planning and operations guidelines
Next-generation networks are increasingly complex, and the number of telecom infrastructure devices to manage is increasing pressure in the network operations center. Outsourcing network operations may be the answer, but first network operators must...Continue Reading
Telecom network operations and infrastructure planning: Outsourcing the challenge
Next-generation network complexity is causing heavy increases in telecom network operations costs, and finding the skill set needed to integrate and maintain network infrastructure are is increasingly difficult. Telecom carriers are exploring new ...Continue Reading
What preventative maintenance procedures for network equipment exist?
Learn the best practices for monitoring and maintaining your Cisco IP equipment based on potential fault and performance management best practices, from our expert Lindi Horton.Continue Reading
Supply chain revolutionary: AT&T leads procurement zone adoption
Changing the telecom procurement processes to make equipment vendors more responsible for integration and network operations has been discussed for months, and now it's a reality, with AT&T leading the way with its Domain Supplier program.Continue Reading
Do I have to disable DHCP on my router to create a DHCP server?
Learn how to turn off DHCP properly in order to use a DHCP server that is configured on a Windows server, and ensure that your routers are not acting as DHCP servers, from our expert Lindi Horton.Continue Reading
How to plan for 802.11n wireless LAN upgrades
802.11n WLAN upgrades mean more than just implementing new antennas and access points. 802.11n network requirements include the need for more power and controller capacity, as well as complex management and monitoring tools.Continue Reading
Distributed network management means no more hard NOCs
Distributed network management with out-of-band networks enables enterprises to move away from network operations centers, becoming eco-friendly and spending less.Continue Reading
FTP accelerator may be more of a quick than long-term fix
One of the top challenges for many companies is transferring large files between network locations, so they are looking for ways to simply speed up the transfer of files from one point to another. FTP or file acceleration alternatives not only solve...Continue Reading
Will using a VPN protect me against fake wireless hotspots?
Learn how to avoid data theft from phishing or connecting to a fake hotspot, by using a VPN, and various other secure browsing techniques, from our expert Lisa Phifer.Continue Reading
Is there VLAN software recommend for Realtek NICs?
Find out which VLAN (virtual local area network) software recommendations and device drivers are the best solutions for your Realtek NIC, from our expert, Lindi Horton.Continue Reading
Top 10 reasons why computers do not have network access to each other
Learn 10 useful tips from our expert on how to troubleshoot a network in which one computer will not allow password permissions or access because of several common network environmental issues.Continue Reading
How can I replicate the services of Active Directory (AD) in ADC?
Learn how to replicate AD services in ADC (Active Directory Controller) by creating policy replication agreements between two or more servers, from our expert.Continue Reading
Effective service delivery platforms: Are we there yet?
Service delivery platforms (SDPs) can play an essential role in making sure telecom carriers aren't relegated to transport-only status and instead can increase revenue by serving customers and over-the-top (OTT) partners using flexible multimedia ...Continue Reading
Preparing metro networks for 4G LTE backhaul
Wireless operators must ensure their metro network infrastructure is optimized to handle 4G wireless broadband LTE voice and data, because the backhaul capabilities determine how much data the cell can support.Continue Reading
4G LTE wireless transition: Examining the services advantages
In the transition to 4G wireless broadband networks, mobile operators need to analyze the business opportunities and customer drivers of 4G LTE networks. For providing revenue-generating services, LTE has three main advantages over 3G, including ...Continue Reading
Deploying 802.11n access points: Best practices
802.11n access points offer greater speed, footprint and ability to support demanding applications than their 802.11a/b/g counterparts, but they require different configuration, monitoring and management. Learn strategies for 802.11n deployment.Continue Reading
Telecom industry trends hint at big changes to come
Telecom industry changes stemming from network convergence and interest in driving IT-oriented service-level architecture could cause upheaval in the equipment-buying and management process, vendor professional services requirements and CIO/CTO ...Continue Reading
Service delivery platforms enable service differentiators
Deploying software-based service delivery platforms (SDPs) can allow network operators speedy service deployment and validation and offer differentiated services that increase revenue and customer value.Continue Reading
Deep packet inspection: Controversial but valuable traffic management tool
Deep packet inspection (DPI) may be controversial from a customer privacy and net neutrality standpoint, but the technology has valuable Internet traffic management capabilities to help service providers prioritize and deliver types of traffic, and ...Continue Reading
Which Q&A brain dump sites will help me prepare for the CCNA exam?
Becoming a Cisco Certified Network Associates (CCNA) takes much more than memorizing brain dumps or taking short cuts to pass the exam. Get advice on the best way to approach CCNA certification from our expert David Minutella.Continue Reading
WLAN QoS and SLA monitoring with 7/24 Wireless Quality Assurance costs
Learn how 7/24 Wireless Quality Assurance compares to traditional network monitoring methods in terms of cost effectiveness, in this expert response from Lisa Phifer.Continue Reading
How can I hide my WLAN's SSID in an Aruba AP-61?
Learn the pros and cons of hiding your access point (AP) service set identifiers (SSIDs) on an Aruba AP-61, from our wireless network expert, Lisa Phifer.Continue Reading
New managed network services can increase service providers' revenue
Thanks to their economies of scale and changes in enterprise networking needs, telecom service providers have an enormous opportunity to grow their managed services revenue with new cloud-based, WAN, IT and security services at effective price ...Continue Reading
Self-organizing networks could be next-gen OSS model
The concept of self-organizing networks emerging from LTE and IMS technology may offer service providers a new telecom OSS model for broad service operations management that automates processes and enables lower operations costs for high-volume, ...Continue Reading
Windows Server 2008 IP routing configuration: Static and dynamic RIPv2
With the removal of OSPF in Microsoft Windows Server 2008, your IP routing options are static routing or dynamic routing with RIPv2. In this tip, learn whether you should use static or dynamic routing, and see the IP routing configuration of each.Continue Reading
How server virtualization improves efficiency in a client-server model
How can server virtualization benefit a business in a client-server model? Our network administration expert explains how virtualization can optimize productivity in this expert response.Continue Reading
Remote, branch office VPN access with DSL
Connecting multiple branch or remote offices to the main office can be done easily over DSL with a typical IPsec VPN solution; explore the options, including using a Cisco router.Continue Reading
How radio frequency (RF) of microwaves alter wireless signal strength
Microwaves are a part of the radio frequency (RF) spectrum. Our wireless networking expert explains the difference and how RF affects wireless signal strength in this expert response.Continue Reading
Stolen laptop recovery using remote access and wireless network SSIDs
Remote access can allow users to locate lost or stolen laptops and devices. Learn how to leverage connectivity in order to find missing hardware in this advice from our wireless networking expert.Continue Reading
VPN, remote access security best practices
Keeping workers connected to the corporate network increasingly requires greater reliance on virtual private networks. Find out more about site-to-site VPN and connecting mobile and remote workers, as well as what protocols are used.Continue Reading
Is CCNA mandatory for CCIE certification?
Does the Cisco Certified Internetwork Expert (CCIE) certification require prior Cisco Certified Network Associate (CCNA) certification? Find out in this expert response.Continue Reading
What is IP?
Learn fundamental networking basics in this expert response defining the acronym 'IP.'Continue Reading
Wireless AP SSID and channel configuration for a distribution network
Multiple access points (AP) on a wireless network require careful configuration. Learn how channel frequency and Service Set Identifiers (SSID) should be set up for seamless transition between APs.Continue Reading
Cisco Unified Computing System vs. VMware vSphere 4
In the Cisco Unified Computing System vs. VMware vSphere 4 battle, find out which company is more likely to be the first to bring private clouds to data centers.Continue Reading
How is wireless access point (AP) coverage affected by frequency?
Wireless access point (AP) coverage can be affected by channel frequency, distance, environment and data rate. Our site wireless networking expert explains.Continue Reading
How does the CCNP compare to a master's degree
The Cisco Certified Network Professional (CCNP) certification reflects proficiency in routing and switching. How does it compare to a master's degree? Our Cisco Certification expert explains.Continue Reading
Where can I find a sample security audit report? How can I run my own?
IT organization security audit reports aren't for circulation. Our network enterprise security expert explains how professionals can sample a technical report by running their own.Continue Reading
Why would a computer show drive letters for discs that don't exist?
If a computer shows drive letters for removable discs that aren't physically connected to it when no hard disk partitioning has been done, could a virus be responsible? Our network administration expert explains.Continue Reading
Formula for proper bandwidth utilization on a T1 line
Utilize bandwidth efficiently to prevent dropped packets over a T1 line. Our site network administration expert provides best methods in this expert response.Continue Reading
Determining IPsec tunneling, bandwidth capacity
VPN router tunnels, including IPsec tunnels, are demystified in this tip as well as bandwidth management and determining bandwidth capacity for router tunnels.Continue Reading
Reduce TCP congestion, packet loss on the WAN with SACK and FACK
TCP robustness and packet loss can be reduced with the use of the SACK and FACK algorithms on the WAN. Find out how these algorithms can help reduce congestion on the network.Continue Reading
GRE tunnel vs. IPsec tunnel: What is the difference?
Encapsulating a packet for secure transportation on the network can be done using either GRE or IPsec protocols. This tip explains under what circumstances each protocol works best.Continue Reading
Interpreting bandwidth utilization graphs
Network bandwidth utilization graphs can help determine if an enterprise has the right amount of bandwidth. Find out more about interpreting the graphs and finding the solution the fits the best.Continue Reading
Router virtualization: Developing effective networking strategies
As new router and network virtualization technologies become a reality, telecom carriers need to weigh lower capital costs against realistic operations costs to see whether it's worth replacing parallel networks.Continue Reading
Networking vs. network security: How to choose the right certification
Network professionals have several career paths. Our site Cisco certification expert explains the appropriate certifications for networking and network security pros in this expert response.Continue Reading
VPLS: A secure LAN cloud solution for some, not all
VPLS can be the right solution for enterprise customers using non-IP protocols and for disaster recovery scenarios, as long as service providers and customers understand the security implications and don't get swept away with the hype.Continue Reading
Satisfying the need for WAN speed
Improving the performance and throughput of a WAN usually starts with a basic understanding of speed limitations and capacity. While the common view is faster is better, in the land of WANs and other areas of networking, it is all about distance, ...Continue Reading
Converged Enhanced Ethernet: New protocols enhance data center Ethernet
10 Gigabit Ethernet performance in the data center is improving. Network traffic and packet loss issues are being solved with new, more efficient protocols.Continue Reading