Tips
Tips
-
ICYMI: Cisco teams up with SpiderCloud for USC offering
ICYMI: Cisco and SpiderCloud target the enterprise with their jointly developed mobile offering; Kemp introduces a free version of its virtual ADC. Continue Reading
-
Advent of 2.5, 5 Gigabit Ethernet switches roiling market
Faster wireless has opened the market for a new breed of switches. Expert Craig Mathias will tell you what you need to know. Continue Reading
-
SDN load balancer debate: Controller or ADC?
Expert David Jacobs discusses whether software-defined networking will render application delivery controllers obsolete or complement evolving SDN. Continue Reading
-
Wi-Fi heat map: Secret weapon for wireless network admins
Using heat map technology to pinpoint network activity saves time instead of sending a senior admin to do a site test survey across the entire campus. Continue Reading
-
Virtual network function development: Ecosystem or silo?
The future of virtual network functions depends on how easily they can be deployed. Consensus is still a ways off. Continue Reading
-
Ten recommendations to improve your NFV network evolution
As providers move into network functions virtualization, these 10 recommendations can help guarantee a successful NFV network transition. Continue Reading
-
With wave 2 Wi-Fi on the horizon, is your network ready?
Wave 2 Gigabit Wi-Fi will usher in speeds of up to 7 Gbps. Expert Lisa Phifer explains what you need to do to get ready. Continue Reading
-
How to buy: What IT needs to look for in data center switches
IT needs to know what to look for when buying data center switches that support high speeds and lower latencies to pave the way for agile data center network consolidation. Continue Reading
-
Seven wireless networking trends to remember
Wireless networking is empowering, but it comes with a fair amount of complexity. Stay clear-headed and understand your own needs and constraints, even as the fog gathers around you. Continue Reading
-
Opportunistic encryption: The IETF's 50 shades of protection
The IETF is asking for help as it defines the opportunistic security standard. What does this mean to the enterprise? Continue Reading
-
Open NFV toolkit Snabb Switch offers virtual Ethernet programming
Snabb Switch, an emerging open NFV toolkit, enables Ethernet function programming in a software switch. Could it leave vendor-developed hardware in its wake? Continue Reading
-
IPv6 attack attempts and how to mitigate them
Compartmentalizing traffic and employing static entries can help enterprises block neighbor discovery-based attacks in their IPv6 networks. Continue Reading
-
Mitigating IPv6 neighbor discovery attacks
You might be vulnerable to IPv6 neighbor discovery attacks. But there are tools you can use to counter those threats. Continue Reading
-
REST APIs in SDN: An introduction for network engineers
REST APIs play a vital role in SDN controllers and applications. This will be new territory for many network engineers, but it doesn't have to be overwhelming. Continue Reading
-
Five SDN starter kit options you should know
SDN starter kits are designed to help enterprises evaluate the technology before they begin transitioning their networks to the new architecture. What should you look for? Continue Reading
-
How to make legacy and emerging network technologies work together
Emerging network technologies like SDN and NFV have to interwork with legacy equipment and be managed as one. Find out what it will take to get there. Continue Reading
-
How to protect your IPv6 address management
Expert Fernando Gont explains how to probe whether your IPv6 address components are vulnerable to attack. Continue Reading
-
IT network management and SMBs: What to look for
Resource-challenged small, medium-sized businesses need special tools to help them oversee their networks. What to look for. Continue Reading
-
Avoiding the pitfalls of virtual network functions takes planning
Building a network functions virtualization framework means understanding which features, or functions, are most important. Tread carefully. Continue Reading
-
The journey to next-generation networks begins now
Network operators will see real change in their next-generation networks in 2015, moving SDN and NFV from science project status to serious trials, while mobile networks get the lion's share of investment, and new regulations affect all of it. Continue Reading
-
How to avoid IPv6 neighbor discovery threats
If you're ready to deploy IPv6, get ready to understand neighbor discovery and its vulnerabilities. Continue Reading
-
Managing mobility means understanding EMM
As enterprises become more mobile, enterprises need to understand the tools available to help them manage that growth. Continue Reading
-
VWAN threatens traditional three-tiered WAN design
With vWAN providers changing the traditional three-legged WAN structure, carriers need to develop new WAN plans and services using SDN and NFV to keep enterprises on their networks. Continue Reading
-
Network management, next-gen firewall tools take center stage
A recap of SearchNetworking's How to Buy series, which teaches IT professionals what to keep an eye on when buying new products for their networks. Continue Reading
-
Three VoIP quality killers
Managing VoIP quality is a constant headache for engineers. Here are some ways to avoid some common problems. Continue Reading
-
How to plot SIP services to a WAN foundation
What you need to measure when evaluating SIP services from your WAN services provider. Continue Reading
-
Virtual network functions bring potential with some risk
Virtual network functions are the magic behind NFV. They bring software capability to routing, mobile core, security and more. But they're not without implementation challenges. Continue Reading
-
What's the holdup on enterprise network software adoption?
Enterprise network software uptake is lagging due to a wide range of adoption barriers. The good news is that these challenges shouldn't be difficult to overcome. Continue Reading
-
Faster wireless means wireless security policies need an update
Faster wireless technology is now widely available, but are your network's security policies up to the task? Continue Reading
-
How to build a network for Open vSwitch testing
Setting up an Open vSwitch test network can be as simple as downloading code, deploying it on x86 servers and attaching storage disks. Here's how to get started. Continue Reading
-
Common DNS record types: What they mean
The domain name resolution process has many steps. Our expert walks you through some of the most common. Continue Reading
-
NFV Infrastructure: What really lies beneath?
Vendors have differing ideas on what constitutes an NFV Infrastructure, which makes it difficult to know how to invest. However, there are a few key elements every portfolio should include. Continue Reading
-
5 network performance features in VMware NSX 6.1
VMware NSX 6.1 brings new optimization, management and security features to virtual network environments. Continue Reading
-
Three ways to measure wireless network performance
Trying to find ways to assess your wireless network performance? Here are some tools that can help. Continue Reading
-
What you need to know about the DNS system
The domain name system is a fundamental building block of the Internet. Our expert explains the details of what makes it work. Continue Reading
-
Mininet creates OpenFlow test networks on the cheap
With Mininet emulation software, you can create OpenFlow test networks that let you experiment with programmable networking and flexible control planes without investing in costly switches. Continue Reading
-
With MPLS-TP and SDN, a simpler dynamic control plane
MPLS-TP transforms carrier networks for packet switching, but SDN could take it a step further. Combining the technologies, engineers could reduce complexity in the dynamic control plane and gain flexible service creation. Continue Reading
-
Network as a service: The core of cloud connectivity
Public, private and hybrid clouds have one common requirement: networking. Discover how network as a service enables cloud connectivity. Continue Reading
-
Why you need software-defined security for your SDN
The network architecture shift to software-defined networking requires software-defined security, not a hard-wired security approach. Continue Reading
-
Network micro-segmentation brings security to NSX and ACI
VMware and Cisco are depending on network micro-segmentation to bring a new level of virtualization security with east-west firewall capabilities. Continue Reading
-
Six considerations for big data networks
Big data networks must be built to handle distributed resources that are simultaneously working on a single task. That'll require network resiliency, consistency and application awareness. Continue Reading
-
Network timing: Everything you need to know about NTP
As more applications use IP networks, reliable distribution of authoritative timing information is becoming critical. Continue Reading
-
How to describe technology in business terms to win board approval
Networking professionals have to be able to explain the value of technology in business terms to win board approval. Find out how to talk business-speak. Continue Reading
-
Seven steps to a Microsoft Hyper-V test network
Networking pros can use Microsoft Hyper-V networks for multi-tenant cloud environments, but first they'll have to learn the ropes in testing environments. Here are simple steps to building a Hyper-V test network. Continue Reading
-
What do we need from NFV orchestration?
NFV orchestration is about much more than just provisioning and managing virtual features, such as firewalls or load balancers. Instead, NFV orchestration must address the entire service-chaining process. Continue Reading
-
Using the Link Layer Discovery Protocol to reveal disparate devices
The Link Layer Discovery Protocol is a helpful tool when you need to know what's connected in your network -- regardless of vendor. Continue Reading
-
Juniper OpenContrail vs. Cisco ACI: Making an SDN decision
Juniper and Cisco have radically different SDN strategies. Here's some crucial information about the Cisco ACI vs. Juniper OpenContrail decision. Continue Reading
-
Options abound for OpenStack implementation
Integrating OpenStack within your existing data network takes some careful planning, but there are plenty of tools to help. Continue Reading
-
What to look for when gauging MPLS performance
Quality of service and service-level agreements are just a few of the considerations enterprises must keep in mind when assessing global MPLS providers. Continue Reading
-
GENEVE primer: The answer to network virtualization interoperability?
The GENEVE network encapsulation protocol is more flexible than VXLAN and NVGRE. Will it bring interoperability to network virtualization overlays? Continue Reading
-
GENEVE primer: A universal network encapsulation protocol?
The GENEVE network encapsulation protocol is more flexible than VXLAN, NVGRE and STT and does everything they can do. Will it replace them entirely? Continue Reading
-
How to buy: Assessing next-gen firewalls
Is there a next-gen firewall in your future? Our How to Buy guide offers advice you need to ensure you purchase the best platform to meet your needs. Continue Reading
-
Don't ignore this great wireless training resource
Online wireless support communities are a great resource for IT professionals who need their questions answered quickly. Continue Reading
-
Cisco iWAN marries MPLS and Internet for WAN aggregation
With Cisco iWAN, engineers optimize WAN performance by dynamically aggregating MPLS and Internet resources. Continue Reading
-
The simple facts behind antenna basics
No matter how expensive your wireless system may be, its performance depends on the strength of its antennas. Continue Reading
-
Content distribution network outdoes traditional cloud services
Content distribution network services facilitate content distribution at a lower cost and with higher performance than traditional cloud services. Continue Reading
-
Content distribution networks: Separating fact from hype
Content distribution networks can accelerate cloud applications and services, but only if companies know what they're looking for. Continue Reading
-
How wireless works: The tech behind the magic
Beginning with the electromagnetic spectrum, analyst Craig Mathias details the foundation supporting wireless communications. Continue Reading
-
WLAN AP reviews: Aruba instant access points
Aruba's series of IAP-225 access points promises quick provisioning and quick configuration, analyst Craig Mathias writes. Continue Reading
-
WLAN AP reviews: Meru access points
This 802.11ac product review of Meru Networks AP822 WLAN access points focuses on the advantages of high-capacity and plug-and-play capabilities. Continue Reading
-
How to buy: What to look for in 802.11ac access points
If you're in the market for 802.11ac access points for your wireless LAN, find out what features are essential when it's time to buy. Continue Reading
-
Building a hybrid network with SDN, network virtualization
SDN and network virtualization are new and still largely misunderstood technologies. Here's how they can combine to build a modern hybrid network. Continue Reading
-
Wireless expense management shouldn't spook employees
Tom Nolle discusses the dos and don'ts of wireless accounting and the steps enterprises must take to address BYOD expense management. Continue Reading
-
Good BYOD expense management hinges on clear telecom expense policies
A cohesive telecom expense management program must be based on clear policies governing how employees are reimbursed for using their own devices. Continue Reading
-
How to manage bandwidth hogs of the mobile device age
Personal mobile devices will hog your network resources unless you are prepared. Here is what network admins must do now. Continue Reading
-
PSTN-to-VoIP evolution poses identity, authentication challenges
Going from PSTN to VoIP services, this two-part series looks at the evolution of voice and its challenges, from enabling 911 to user identification. Continue Reading
-
Five software-defined data center tips to consider before investing
The software-defined data center combines programmable networks, servers and storage. But these SDDC tips show you what to look for beyond basic flexibility. Continue Reading
-
Software-based routers on x86 servers are becoming reality
With stronger processing power and advanced software features, software-based routers are becoming a reality -- but only in some cases. Continue Reading
-
Using dynamic ARP inspection to stop sniffing attacks
Expert Michael Gregg discusses how dynamic Address Resolution Protocol inspection helps prevent hackers from penetrating enterprise switches. Continue Reading
-
Expert discusses must-haves for secure VPN implementations
Expert lists strong encryption settings and security policies, among others, as ways to use security and design to strengthen VPNs. Continue Reading
-
In SDN optical networks, centralized control and scalability
Technology for SDN optical networks is emerging and with it comes centralized control and dynamic bandwidth provisioning in the WAN. Continue Reading
-
Hyper-V logical networks: The answer to scalability
When it comes time to scale Microsoft virtual environments, engineers must use Hyper-V logical networks, which enable wider connectivity. Continue Reading
-
Hyper-V networking: The three virtual switches that fuel connectivity
In this Hyper-V networking primer, learn about the three virtual switches behind Microsoft virtualization connectivity. Continue Reading
-
Brocade SDN certification: What to know about its product credentials
Brocade now offers two SDN certification credentials focused on its virtual router product platform. Here's what you need to know. Continue Reading
-
Next-stage high-density switch options: What's right for you?
All major switch vendors have rolled out new high-density, low-latency data center switches. Expert Glen Kemp looks at what makes them special. Continue Reading
-
White box switches: Understanding the basics
White box switches are finally emerging, offering a choice in network OS as well as flexibility. Are they poised to take over your network? Continue Reading
-
SDN essentials: Why network orchestration and virtualization?
The goal of SDN is dynamic networks, so it's crucial to understand the concepts of network orchestration and virtualization -- the keys to flexibility. Continue Reading
-
SDN basics: Understanding centralized control and programmability
Network engineers who want to learn about SDN basics must begin with the concepts of centralized control and network programmability. Continue Reading
-
How SDN and NFV simplify network service chain provisioning
SDN and NFV simplify service chain provisioning, making it easier and cheaper to spin up applications in enterprise and service provider networks. Continue Reading
-
Securing from anywhere: Your mobile device VPN strategy
Virtual private networks have long secured remote users. Learn how a mobile device VPN factors into your security strategy. Continue Reading
-
Network programming languages Frenetic and Pyretic simplify OpenFlow
OpenFlow can simplify networks, yet the protocol itself is complex. Network programming languages Frenetic and Pyretic streamline OpenFlow SDN. Continue Reading
-
Wireless security options don't have to break the bank
Security expert Michele Chubirka shares low-cost and free options available to help your company guard its wireless LANs against threats. Continue Reading
-
WAN aggregation: Why you should consider this application delivery optimization technique
What is WAN aggregation, and how does it work? Our expert explains why all companies should consider this type of application delivery optimization. Continue Reading
-
Mulling enterprise SDN deployment? Not so fast
Although SDN offers some compelling advantages, enterprises would be ill-advised to deploy the technology until it gets more mature and standardized. Continue Reading
-
Take steps to defend your network using DHCP snooping
Learn how to enable DHCP snooping to secure your network against common breaches including man in the middle attacks and ARP poisoning. Continue Reading
-
Getting cloud capacity planning right in the face of oncoming growth
Cloud capacity planning requires accurate knowledge of a cloud provider's existing infrastructure, future plans and the growth plans of its customers. Continue Reading
-
Identifying and mitigating cloud computing vulnerabilities
How successful a cloud provider is in growing its business depends on its ability to dispel customer concerns about data security and privacy. Continue Reading
-
Will the cloud exchange be the next big ecosystem player?
An emerging branch of the cloud ecosystem, the cloud exchange, has the potential to address many concerns about the cloud broker model. Continue Reading
-
Six ways hackers try to break Secure Sockets Layer-encrypted data
Security expert Michael Gregg discusses steps enterprises should take to ensure their SSL-encrypted data remains secure. Continue Reading
-
Overcoming network functions virtualization implementation challenges
Carriers need network functions virtualization implementation prespecification, so they'll look to TM Forum and cloud management models for help. Continue Reading
-
Selling SaaS: Operational requirements for consumers vs. businesses
The key to successfully selling SaaS across all market segments is addressing the different operational requirements among various buyer groups. Continue Reading
-
Where SDN and DPI technology meet: Centralized control and automation
When SDN and DPI technology meet, network engineers can apply monitoring and management policy to the whole network instead of individual components. Continue Reading
-
IETF SDN: I2RS uses traditional routing protocols in software networks
The IETF SDN strategy relies on centralized management and distributed decision making with traditional network protocols -- departing from OpenFlow. Continue Reading
-
Selling government cloud services: FedRAMP vs. FISMA
Even if a cloud provider isn't planning to sell government cloud services, it's still important to have a basic understanding of FedRAMP and FISMA. Continue Reading
-
Cloud bursting: How will it affect your billing requirements?
Cloud bursting attracts many customers to public cloud services, but tracking these dynamic resources for billing becomes problematic for providers. Continue Reading
-
Virtual overlay networks: Tunneling protocols enable multi-tenancy
Virtual overlay networks use tunneling protocols to extend isolated network segments between servers for multi-tenant data center networks. Continue Reading
-
Wide area network resiliency best practices
Learn about network resiliency best practices to keep your wide area network (WAN) services running during technical difficulties and outages. Continue Reading
-
Business continuation and disaster recovery tips for your WAN services
Understand the tools, technologies and strategies used to ensure business continuance (BC) and disaster recovery (DR) for your WAN services. Continue Reading
-
IT service-level agreements and SDN: Assuring virtualization performance
With SDN with network virtualization, service providers can improve server virtualization performance and offer improved service-level agreements. Continue Reading
-
Building cloud-ready applications: What changes?
To maximize profits, providers must understand cloud-ready applications, learn how to meet their unique requirements and offer facilitating services. Continue Reading