Tips
Tips
-
Building revenue-increasing telecom services for the future
Telecom service providers are facing a decline of 50% or more in the revenue they make per bit, which means they have to unlock the value of the network using IMS and SOA to expand into new and profitable services. Continue Reading
-
Compliance in a virtualized world: Server virtualization and NAC security
Network security, especially NAC, is the Achilles' heel of server virtualization. With virtual servers moving around the data center, traditional access control is difficult to apply. This can be particularly challenging when organizations need to ... Continue Reading
-
Limit network energy consumption with computer cooling technologies
The more heat generated by a piece of equipment, the more electricity is being wasted. For many networks, as in the data center, reducing the amount of heat generated, and therefore the amount of electricity wasted, can lead to significant monetary ... Continue Reading
-
Securing the new network architecture: Security for distributed, dynamic networks
A security perimeter alone can no longer secure the network in an era of distributed architectures. Learn what tools and techniques you need now to supplement network security. Continue Reading
-
Understanding remote scripting -- Managing Windows networks using scripts, part 9
It's all well and good to jump in and try things -- such as managing Windows networks using scripts -- but sometimes we hit a wall when we do this. Learning the fundamentals can often help us avoid the wall. In this tip from his series on managing ... Continue Reading
-
Network planning, monitoring and management using modeling
Networked services have become the most popular architecture for delivering enterprise services today. New demands placed on the network are forcing a change to traditional network planning, monitoring and management techniques. Network modeling or ... Continue Reading
-
Configure WAN interfaces on a Layer 3 switch
Is it possible to configure WAN protocols on Layer 3 (L3) switches? Learn about L3 switching and how it reacts in a WAN environment in this tip by expert Puneet Mehta and Dr. David Hughes. Continue Reading
-
How to configure Windows Server 2008 advanced firewall MMC snap-in
Find out new features of the Windows Server 2008 Advanced Firewall -- and how to configure this powerful host-based firewall using the new MMC snap-in -- in this tip. Continue Reading
-
Recovering domain controllers after a server disk failure
When recovering domain controllers after a system volume failure, it is important to remember that each domain controller in the domain shares a replicated copy of the Active Directory database. When you restore a backup of a domain controller, ... Continue Reading
-
MPLS solutions: Gathering customer requirements is job 1
Telecom service providers need to focus in on customer requirements when planning MPLS implementations to successfully decrease point-to-point connections. Continue Reading
-
Network modernization in an optically dominated era
Network planning and design needs to factor in changes in optical technology as a driver to equipment change, as well as changes in optical technology that facilitate new applications and traffic. Continue Reading
-
Server virtualization and the network: Site consolidation's impact on latency
Server virtualization is nearly synonymous with site consolidation -- bringing concerns about whether performance and throughput will suffer over the WAN as application servers' physical locations change. Continue Reading
-
Wireless security protocols -- How WPA and WPA2 work
WPA and WPA2 improve upon WEP's encryption methods for better 802.11 wireless security. WPA was carefully designed so that hardware upgrades would not be needed. The processing power of many early access points (APs) was quite limited. The RC4 ... Continue Reading
-
Upgrade your network: Network evolution and roadmap
Network infrastructure upgrades are essential to provide availability, reliability and security when you run voice and video on your data network. This tip provides an overview of trends currently affecting the network and the key infrastructure ... Continue Reading
-
Wireless security -- How WEP encryption works
Inadequate wireless security can jeopardize critical company information. Encryption is an important part of wireless security -- but how does it work? In this tip, first in a two-part series on 802.11 wireless security protocols, learn how WEP or ... Continue Reading
-
Troubleshooting remote scripting using Network Monitor 3.0 -- Managing Windows networks using script
Learn how to use Network Monitor 3.0 for troubleshooting a remote scripting error in this tip originally published on WindowsNetworking.com. Continue Reading
-
Short-circuiting hackers' SIP-based VoIP attacks
Hacker attacks against SIP-based VoIP may have been rare so far, but as VoIP use grows, service providers need to be ready to secure their voice networks as they route traffic without using the public switched telephone network. Continue Reading
-
Scale your backbone with core MPLS, BGP on the edge
Using MPLS in the core network, service providers can run Border Gateway Protocol (BGP) only on the network edge to reduce memory requirements and CPU load, without compromising stability. Continue Reading
-
Troubleshooting the Remote Desktop feature for Windows
Remote Desktop is a Windows feature that allows you to connect to your computer remotely by using the RDP protocol, but it can sometimes be difficult to establish a Remote Desktop session. Learn troubleshooting techniques and workarounds for ... Continue Reading
-
Designing large-scale BGP networks
If you're running a large-scale IP network, you're going to need Border Gateway Protocol (BGP), but not for a fast-converging protocol to implement modern IP-based services. You need to know where and how to deploy BGP, and when to bring in help. Continue Reading
-
How asset management can benefit your network
Asset management combines and impacts network operations that touch every part of the organization. Auto-discovery of infrastructure inventory provides an accurate accounting of what's there, frequently uncovering "lost," underutilized and phantom ... Continue Reading
-
Troubleshooting the mystery error -- Managing Windows networks using scripts, part 7
Learn how to troubleshoot a mysterious "remote procedure call failed" error received when the ChangeIPAddress.vbs script developed earlier was used to change the IP address on a remote computer. This tip is part of a series on managing Windows ... Continue Reading
-
Understanding 802.11n wireless antennas
Learn how 802.11n wireless antennas have been improved to increase network footprint, available bandwidth and resilience to problems that crippled older 802.11a/b/g access points, and how improved speed and capacity is made possible using techniques... Continue Reading
-
5 essential reasons for BGP in your IP network
The Border Gateway Protocol (BGP) is considered the hardest routing protocol to design, configure and maintain, but there are the 5 major reasons you need all of that difficulty in your network. Continue Reading
-
Open source network monitoring: Monitor your routers with Cacti
Learn how to configure the open source network monitoring tool Cacti to poll your routers, gather network data, and provide graphs based on what you configured. Cacti is a free open source tool with a Web interface. Cacti can be used to complement ... Continue Reading
-
Prevent unauthorized USB devices with software restriction policies, third-party apps
In the conclusion of his series on preventing unauthorized USB device use on your network, Brien Posey discusses the pros and cons of using software restriction policies such as certificate rules, hash rules, Internet zone rules, and path rules to ... Continue Reading
-
Remote scripting first steps -- Managing Windows networks using scripts, Part 6
Learn how to run your Windows script remotely against a remote Windows XP computer, in the interest of managing your Windows network using scripts. Continue Reading
-
Network management: Three drivers for radical change
Traditional network management is in for vast changes due to three major drivers changing the network landscape, which can be managed if approached correctly. Continue Reading
-
Making the case for Layer 2 and Layer 3 VPNs
Offering VPN services isn't a simple Layer 2 or Layer 3 choice. If you want to implement true convergence onto a single core infrastructure, your core network should support the transport of public IP and private IP (VPN), as well as a number of ... Continue Reading
-
ITIL -- What network managers need to know
IT Infrastructure Library (ITIL) is an IT service management framework surrounded by industry best practices. This tip answers questions that network managers may have about implementing ITIL and explains how it can be beneficial to networking. Continue Reading
-
An insider's primer: Wireless WAN technology
Wireless WAN technologies are changing so quickly that even telecom industry pros need some help keeping the three major technology groupings straight. This tip offers a quick reference guide for wireless protocols and radio technologies on the ... Continue Reading
-
Top 3 value propositions for a winning RFP response
Telecom service providers often end up trying to win enterprise RFPs on cost alone. In this tip, find out how to get ahead of the pack by emphasizing backbone quality, SLAs, and architecture and integration expertise. Continue Reading
-
Network design: Five ways to lower your costs
Any modern company needs a fast and efficient network to support its communications and business systems, and superior technology can sometimes provide the upper hand in a competitive market. At the same time, IT budgets are limited, requiring smart... Continue Reading
-
Using Win32_NetworkAdapterConfiguration -- Managing Windows networks using scripts, part 4
Learn about uses of the Win32_NetworkAdapterConfiguration class in this tip from the WindowsNetworking.com series on managing Windows networks using scripts. Continue Reading
-
USB storage devices: Two ways to stop the threat to network security
USB storage devices pose a significant threat to network security. Disabling USB ports is an extremely effective way of preventing USB storage devices on your network; however, these sorts of techniques also prevent the use of authorized USB devices... Continue Reading
-
10 MPLS traffic engineering myths and half truths
To clear up misunderstandings about what MPLS traffic engineering can and can't do, this tip discusses MPLS TE myths and half-truths, addressing quality of service, network convergence and network congestion. Continue Reading
-
WLAN troubleshooting with spectrum analyzers
When users complain that the WLAN is slow, it's time to break out the Wi-Fi toolbox. Wireless protocol analyzers can diagnose some issues but spectrum analyzers go deeper. Continue Reading
-
Network security: Using unified threat management (UTM)
Network security products vary in use and protection. If you're looking at options to secure your network, use this introduction on Unified Threat Management (UTM) to learn about what UTM's advantages are compared to traditional security models. Continue Reading
-
How to serve the SMB converged services market
The converged communications services trend is taking off for SMBs, with VoIP leading the way, but service providers need to better understand what drives this market. Find out more from the results of AMI Partners' 2007 communications survey. Continue Reading
-
Understanding WMI -- Managing Windows networks using scripts, part 3
Learn how Windows Management Instrumentation (WMI) works and how it can be scripted using VBScript in this tip, originally published on WindowsNetworking.com Continue Reading
-
Remote office backup, archiving and disaster recovery for networking pros
This tip takes a look at various techniques and technologies to protect and maintain data accessibility and data consistency in remote office branch office (ROBO) environments. While disaster recovery (DR) and business continuance (BC) often get the... Continue Reading
-
Routing with NAT traversal and UPnP
Routers that rely on symmetric Network Address Translation (NAT) and Universal Plug and Play (UPnP) can be stumbling blocks to IPv6 migration, but these technologies have proven useful in the IPv4 world. Applications like peer-to-peer networking, ... Continue Reading
-
Cisco router ISDN configuration
Learn how to configure your Cisco router to work with Integrated Services Digital Network (ISDN). This tip teaches you Cisco routers' basic ISDN configuration, demand dial routing and demonstrates real-case scenarios for your routing connection. Continue Reading
-
Troubleshoot network problems with Network Monitor
Learn how Network Monitor can be used to troubleshoot various types of network problems in this tip from WindowsNetworking.com. Continue Reading
-
Secure Cisco routers against IOS flaw attack
Learn how to secure Cisco routers against the recently announced Cisco IOS flaw, which could be exploited by hackers. Find out how to determine which routers are affected and ways to protect yourself from this vulnerability, including steps to ... Continue Reading
-
Network analysis -- Enhancing security assessments
Network security assessment doesn't have to rely on expensive automated tools. In this tip, learn how to use data from freely available tools to produce a comprehensive view of network security. Continue Reading
-
Operations support systems: Fundamentals of working with OSS
Operations support systems (OSSs) are a stalwart of the telecom industry, but have been experiencing significant changes of late. Learn about the major types of OSSs and how technology and business changes are affecting them. Continue Reading
-
Fixed mobile convergence: Understanding the landscape
Fixed mobile convergence (FMC), the convergence of wired and wireless technologies into a single solution, is explained in this tip. Continue Reading
-
Implementing video on demand
Video on demand (VoD) implementation best practices are discussed, as well as VoD service, delivery and management models. Continue Reading
-
Ethernet as a service: Best practices for delivery
Ethernet services can offer providers many benefits as well as the opportunity to lead customers into the managed services space. This tip offers best practices for providing Ethernet as a service. Continue Reading
-
Using VRFs to provision customer traffic
A virtual routing and forwarding (VRF) instance can allow network paths to be segmented without using multiple devices. Learn simple VPF configuration in this article. Continue Reading
-
Cisco CCIP MPLS certification: Introduction
Learn skills required for the MPLS portion of the Cisco CCIP certification. These skills are tested in the CCIP 642-611 -- Implementing Cisco MPLS Exam. Continue Reading
-
Optical networks: Metro network design best practices
Optical networks in metro areas are being affected by many factors, including whether to use SONET, WDM or Ethernet, as well as the services, such as IPTV, that will be supported. Find out best practices for sifting through the complexity and ... Continue Reading
-
Fiber-optic networks: Access network design
Fiber-optic technology in access networks is expanding due to the demand for broadband in consumer environments. Learn about the pros and cons of FTTX and passive optical networking (PON) systems. Continue Reading
-
Point-to-multipoint MPLS
Learn how point-to-multipoint MPLS benefits video distribution and data that requires highly scalable and reliable transport. Continue Reading
-
Understanding MPLS network components
MPLS network components are explained from a service provider's viewpoint in this tip. Continue Reading
-
Best practices for flexible project plans
Flexible project plans for network service delivery are developed through proper planning, communication between the groups involved, and a well developed contingency plan. Continue Reading
-
Network management and troubleshooting in the multimedia network
Network management in a multimedia service provider network creates a stable framework for service delivery that will provide customers with good experiences for voice, data and video services under normal conditions. The main areas involve capacity... Continue Reading
-
Configuring MPLS and VRF -- Cisco CCIP MPLS certification: Lesson 6
Virtual Routing and Forwarding (VRF) is a key component of Layer 3 MPLS VPNs. It enables PE routers to appear to be many routers to the customer edge (CE) routers. The provider edge (PE) router will maintain separate and distinct routing tables for ... Continue Reading
-
Label imposition -- Cisco CCIP MPLS certification: Lesson 4
Label imposition, the process by which labels are assigned to packets, is examined in the fourth tip in a series that will help you learn skills required for the MPLS portion of the Cisco CCIP certification. These skills are tested in the CCIP 642-... Continue Reading
-
Configuring MPLS -- Cisco CCIP MPLS certification: Lesson 5
In addition to understanding MPLS theory, you must be able to configure routers for MPLS in order to pass the CCIP 642-611 - Implementing Cisco MPLS Exam. The configuration can apply to customer edge (CE) routers, provider edge (PE) routers or ... Continue Reading
-
Understanding IMS (IP Multimedia Subsystem)
IMS (IP Multimedia Subsystem) is an emerging architectural framework, based on SIP and IP, for offering multimedia and VoIP services, as well as fixed mobile convergence. Continue Reading
-
Optical networks: Core network design best practices
Core optical network design must take into consideration network requirements specific to the core, including a high degree of aggregation, low reconfigurability, and large geographic scope, while confronting such challenges as router adjacency, ... Continue Reading
-
Using Ethernet as carrier backbone transport
Carrier Ethernet is making progress as a backbone transport technology, but there are challenges that must be addressed. The main issues, including maintaining scalability in large Ethernet networks, providing QoS to applications, and improving ... Continue Reading
-
Understanding MPLS -- Cisco CCIP MPLS certification: Lesson 1
Learn skills required for the MPLS portion of the Cisco CCIP certification. These skills are tested in the CCIP 642-611 Implementing Cisco MPLS Exam. The first lesson in the series explains what you need to know to pass the Cisco CCIP certification ... Continue Reading
-
Network monitoring essentials for service provider networks
Network monitoring in service provider networks involves different tools, including systemic, end-to-end, device-level, and high- and low-level approaches. Learn about the pros and cons in this tip. Continue Reading
-
Service provider billing system fundamentals
Billing systems for service providers vary considerably in their focus and complexity. This tip looks at the fundamentals of working with billing systems. Continue Reading
-
Service provider network management systems essentials
Service provider network management systems are discussed, including their main goals: multi-vendor, multi-device access through a uniform interface, fault correlation and filtering, and end-to-end provisioning and management. Continue Reading
-
DNS monitoring: If it's slow, everything is slow
Techniques for monitoring DNS performance, and the impact on applications when it is not performing properly, are explored in this tip. Continue Reading
-
ISDN protocols, components and router options
Integrated Services Digital Network (ISDN) provides for digital transmission over ordinary telephone copper wire as well as over other media uses. In this continuation of his tip on ISDN implementation, Chris Partsenidis discusses the OSI Layers, ... Continue Reading
-
TCP/IP troubleshooting: A structured approach -- Using Netdiag.exe
Limitations of the Repair feature of Windows network connections can be overcome by using Netdiag.exe, a network connectivity troubleshooting tool that is part of the Windows Support Tools. Netdiag runs a more extensive series of tests than the ... Continue Reading
-
VPN security: Hiding in plain sight, using network encryption
Sensitive data in transit is subject to hacking attacks unless you protect it using some type of encryption. In this tip from Burton Group analyst Jeff Young, learn how network encryption using SSL, IPsec or other types of VPNs can keep your company... Continue Reading
-
Dynamic routing essentials
Learn how dynamic routing works and the most important routing protocols -- OSPF, EIGRP, RIP and BGP -- as well as how to configure them. Continue Reading
-
MPLS traffic engineering essentials
MPLS (Multi-protocol Label Switching) traffic engineering basics are presented in this tip. Continue Reading
-
Border Gateway Protocol (BGP) troubleshooting: Advanced approach
This tip on troubleshooting Border Gateway Protocol (BGP) takes an advanced approach and details how to work with Internet service provider (ISP) networks. Continue Reading
-
Border Gateway Protocol (BGP) troubleshooting: Simple approach
In BGP troubleshooting, a structured approach can quickly lead you from initial problem diagnosis to the solution. This article focuses on a simple scenario with a single BGP-speaking router in your network. Continue Reading
-
Introduction to Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP) is the routing protocol that makes the Internet work. This tip explains how BGP works. Continue Reading
-
Virtual routing and forwarding (VRF) extends virtual networks
Virtual networks are the backbone of virtual systems, linking the servers and storage that together constitute the virtual system. But virtual networks -- and therefore virtual systems -- are often limited to a single facility. Virtual routing and ... Continue Reading
-
Understanding the ISDN standard
Integrated Services Digital Network (ISDN) is a digital telephone standard designed to replace analogue connections by utilizing ordinary copper wires that are used in standard analogue telephone systems. Learn how Integrated Services Digital ... Continue Reading
-
Wireless security -- Defending Wi-Fi clients
When it comes to wireless security, considerable attention has been paid to encrypting data, authenticating users, restricting access, and detecting rogue access points. As these network and link defenses improve, however, attackers have started to ... Continue Reading
-
Managing Windows networks using scripts -- The basics
Learning to use scripts can make the life of a network administrator a lot easier by allowing you to automate daily administration tasks. This tip begins a series on using scripts to manage Windows networks. Continue Reading
-
Configure Cisco wireless bridges for point-to-point networking
Point-to-point wireless bridging is ideal for many business networks. In this tip, learn how point-to-point wireless bridging can help you, the pros and cons of using it, and the configuration of the Cisco wireless bridges that make it work. The ... Continue Reading
-
TCP/IP troubleshooting: A structured approach -- Repairing network connections
Learn how the Repair feature works for repairing network connections on Windows platforms in this tip from the WindowsNetworking.com series on TCP/IP troubleshooting. Continue Reading
-
OSI: Securing the Stack, Layer 8 -- Social engineering and security policy
Network security is essential at every layer of the OSI model, including the mythical eighth layer, where users interact with technology. Since hackers can use social engineering to exploit people, it is important to train your users and implement ... Continue Reading
-
Reduce branch office threats in 10 steps
Many organizations host business-critical applications in branch offices, but doing so exposes them to many new threats. Here we examine the potential threats to your branch offices and discuss 10 surefire ways to reduce or mitigate them. Continue Reading
-
4G wireless broadband will use many technologies
4G is pushing wireless into a new role as the default for broadband connectivity, encompassing technologies from Wi-Fi to WiMax, CDMA, UMTS and EV-DO. Continue Reading
-
Wireless Internet access -- 3G vs. Wi-Fi
Most road warriors have just two truly viable alternatives for wireless Internet access: 3G and Wi-Fi. In this tip, Lisa Phifer covers the pros and cons of 3G and Wi-Fi for coverage, convenience, capacity, control and cost. Continue Reading
-
TCP/IP troubleshooting: A structured approach -- Troubleshoot routing tables
Learn how routing tables work and how to troubleshoot routing problems in Windows-based networks in this tip courtesy of WindowsNetworking.com. Continue Reading
-
Troubleshooting a DHCP server
Learn how to troubleshoot a DHCP server to discover why it might fail to lease IP addresses and the solutions to those problems in this tip. Continue Reading
-
QoS classification and marking for VoIP infrastructures
QoS for VoIP requires classification and marking as an essential component for establishing a reliable infrastructure. Continue Reading
-
Understanding wireless antennas -- Part 2
Upgraded antennas can improve wireless LAN performance, reach and security. Continue Reading
-
How routers work
Routers are essential to carrying network traffic, but how do they work? In this tip, you'll get perspective on how routing fits into the OSI model. You'll also learn how routers use routing tables to direct IP packets, find the best route to a ... Continue Reading
-
QoS components: A closer look
A large component to a successful voice over IP (VoIP) infrastructure is effectively deploying a quality of service (QoS) model. QoS components entail classification and marking, congestion management, congestion avoidance, policing and shaping, and... Continue Reading
-
Network summarization -- Supernetting and wildcard masks
Supernetting allows one routing table entry to represent an aggregation of networks. Network engineers need to understand supernetting, how to read routes received from other providers and how to create an access list that references these multiple ... Continue Reading
-
NAC -- Strengthening your SSL VPN
Many companies have augmented or even replaced IPsec VPNs with secure remote access solutions based on SSL. Given that SSL VPNs can be used from unmanaged home or public PCs, it is critical to assess the remote endpoint's security when deciding ... Continue Reading
-
VLANs -- Controlling wired and wireless traffic
Today, most business networks rely on virtual LANs (VLANs) to partition Ethernets and control the destinations reached by each worker. As users begin to shift between Ethernet and Wi-Fi throughout the work day, it makes sense to apply VLANs to both ... Continue Reading
-
Understanding wireless antennas - part 1
Types of wireless LAN antennas, including omni-directional monopole and dipole antennas, are explained in this tip. Continue Reading
-
OSI: Securing the Stack, Layer 7 -- Applications
Domain Name System (DNS) wasn't designed to handle today's security threats, making it a prime target at Layer 7 -- the application layer -- of the OSI model. In this tip, learn how DNS works and some of the ways hackers attack it, including ... Continue Reading
-
Understanding the FTP PORT command
Port 20 is assigned to FTP data. Unfortunately, most FTP data sessions do not actually use port 20. Learn to decode port data and use the port command in this tip. Continue Reading
-
Prepare your networks for the Daylight Saving Time (DST) shift
The Daylight Saving Time shift on March 11 will require preparation to keep your networks running smoothly. Are you ready? In this tip, Tom Lancaster reminds you how Daylight Saving Time works and explains how to re-configure your Cisco routers and ... Continue Reading