Tips
Tips
-
Identifying flexible cloud technology models: A primer
Until the perfect cloud technology model is identified, providers are building services using servers, storage, software and networking tools that give them the most flexibility. Continue Reading
-
Cloud infrastructure services: Balancing high availability and cost
Building cloud infrastructure services to high-availability (five 9s) standards will make them too complex and expensive. Ivan Pepelnjak looks for a reliable compromise. Continue Reading
-
Virtual desktop infrastructure (VDI) challenges over the WAN
Many virtual desktop infrastructure (VDI) challenges present themselves over wide area networks (WANs). Here is how you can prepare your WAN for VDI while the technology matures. Continue Reading
-
vSwitch architecture best practices
vSwitch architecture varies depending on the type of traffic being managed and how many physical NICs are connected. Learn these best practices. Continue Reading
-
vSphere vSwitch primer: Design considerations
It takes the right kind of vSphere vSwitch design to implement segmentation for traffic manageability, security, redundancy and failover in a virtual environment. Continue Reading
-
Network energy efficiency starts in the LAN closet
Many look to data center servers and storage to cut power use, but network energy efficiency can start inside the LAN closet with switches, routers and security devices. Continue Reading
-
Virtualization security challenges are plentiful: What's the answer?
The network plays a role in addressing virtualization security challenges, but typical firewalls are not necessarily part of the solution. Continue Reading
-
Best practices for connecting virtualization hosts to DMZ networks
DMZ networks can be used to protect virtualization hosts, but best practices must be considered, including combing virtual and physical firewalls and locking down virtual switches. Continue Reading
-
How to connect virtual environments to DMZ network architecture
Connecting virtualized environments to DMZ network architecture creates new challenges. Network managers must learn new design methodologies to protect virtual traffic in the DMZ. Continue Reading
-
Mobile Wi-Fi hotspots for the enterprise
Businesses have taken notice of the mobile Wi-Fi hotspots trend and have invested in mobile hotspot devices. Question is, which of several options is most suitable for business? Continue Reading
-
Enterprise energy management: IT and building management systems meet
As IP-based building management systems emerge, networking teams will control integrated IT and building resources as part of an overall enterprise energy management strategy. Continue Reading
-
New service needs drive changes to telecom data center architecture
The need to deliver content, mobile and cloud services and compete with OTT providers is driving a three-phase change to telecom data center architecture for network operators. Continue Reading
-
How does your WAN intersect cloud services?
Where is the line between cloud service and the wide area network? In this tip, Tom Nolle breaks down information flows to recommend the best WAN connectivity for cloud computing. Continue Reading
-
How to integrate your WAN with Internet cloud services
Learn what issues are involved with integrating your wide area network (WAN) with Internet cloud services and how to solve problems around Internet-based cloud services. Continue Reading
-
Three business drivers promote operator cloud/network integration
Three technology and business drivers provide the impetus for network operators to work toward tight cloud and network integration to monetize expensive and valuable network assets. Continue Reading
-
Understanding gigabit Wireless LAN: 802.11ac and 802.11ad
Just when enterprises are getting comfortable with 802.11n technology, enter gigabit wireless LAN standards 802.11ad and 802.11ac, which could produce draft products in a year. Continue Reading
-
How to build a scalable IaaS cloud network infrastructure
Attempts to scale Infrastructure as a Service cloud network infrastructure often involves workarounds, but providers should look to IP-over-IP transport and invest in design. Continue Reading
-
Managing virtual desktop infrastructure (VDI) traffic over the WAN
Organizations must understand how virtual desktop infrastructure (VDI) traffic behaves over the WAN before deploying VDI to ensure an optimal end-user experience. Continue Reading
-
Controlling embedded Wi-Fi device access
Enterprise IT shops are finding themselves using WPA2-Personal and other authentication methods to manage embedded Wi-Fi devices on the WLAN. Continue Reading
-
Virtual branch office in a box (vBOB) devices may replace hardware
As you introduce your enterprise WAN to virtualization, a virtual branch office in a box (vBOB) may take shape in remote offices. Learn in this tip how BOBs are being reinvented. Continue Reading
-
Wireless LAN access control: Managing users and their devices
Wireless LAN access control may not be as simple as 802.1X authentication. Network managers will have to shoot for policy creation, device fingerprinting and network integration. Continue Reading
-
Planning a virtualization firewall strategy
Creating a virtualization firewall strategy entails determining exactly how you want to protect your virtual environments and then implementing firewall segmentation for security. Continue Reading
-
Virtual network appliances: Benefits and drawbacks
There's lots of talk about network virtualization benefits, but are virtual network appliances all they're cracked up to be? Only in some scenarios. Continue Reading
-
Unified threat management (UTM) features needed for Internet security
In order to deliver the best and broadest Internet security and WAN access to your users, you must evaluate UTM features, or unified threat management appliance features -- like the ones discussed in this tip -- to evaluate which product is best for... Continue Reading
-
Securing the wireless guest network: Authentication and management
If you're implementing an enterprise-class wireless guest network, tighter security is crucial. A guest wireless LAN must support better visibility and user control. Continue Reading
-
Firewall change management and automation can curb human error
Firewall change management can enable firewall management automation so that human errors will be less likely to destroy performance and network admins will know the status of their firewall configuration. Continue Reading
-
Cloud Security: Ensuring multi-tenant security in cloud services
Cloud security isn’t one size fits all for a range of cloud computing services, so we break down securing cloud services with multi-tenant cloud security options, from how to secure simple SaaS to complex virtual appliances with click-to-deploy ... Continue Reading
-
AT&T 4G network architecture and the LTE wars
Frost & Sullivan analyst Mike Jude looks at how changes in the AT&T 4G network architecture deployment is upping the ante among 4G LTE wireless operators, particularly as smartphone and tablet use increases and spurs faster deployment. Continue Reading
-
Live migration networking: Enter long-distance data center bridging
Live migration networking poses all sorts of challenges, including the potential need for long-distance data center bridging that results in traffic trombones. When it comes to server virtualization networking, is it possible to avoid the pitfalls? Continue Reading
-
4G network offload: Radio access network and mobile backhaul solutions
Wireless operators looking at 4G network offload to cope with growing mobile traffic have two options for relief – radio access network (RAN) offload using mobile hotspots and femtocells, and mobile backhaul solutions to move wireless traffic to the... Continue Reading
-
How to ensure WLAN performance optimization
To ensure wireless LAN performance optimization, you’ll need to implement new WLAN measurement and testing tools and conduct WLAN performance testing periodically even after network implementation. Continue Reading
-
Mobile backhaul offload could affect Evolved Packet Core design
Part two of our analysis of 4G network offload strategies looks at the implications of moving mobile backhaul traffic to the metro network, and how it could affect the design of LTE’s Evolved Packet Core. Continue Reading
-
Do Web application firewalls complicate enterprise security strategy?
Using Web application firewalls should only be one slice of your overall enterprise network security strategy. Even then, users must be aware that application firewalls can leave behind vulnerabilities. Continue Reading
-
Why IPv6 won't rid the Internet of Network Address Translation
One of the most common myths about IPv6 is that it will restore the so-called end-to-end principle of the Internet. This article explains how today's network needs for Network Address Translation (NAT) will make this very unlikely to happen. Continue Reading
-
IPv6 security issues: Fixing implementation problems
Find out how to work around the implementation-specific IPv6 security challenges that will surface until equipment vendors close the gaps between their IPv4 and IPv6 releases. Continue Reading
-
End-to-end network application performance monitoring
Network application performance monitoring inevitably leads to the use of multiple monitoring tools at once. That doesn’t have to be a management nightmare. Continue Reading
-
How to set up WAN simulators to test branch application performance
A wide area network (WAN) simulator is necessary for enterprise IT architects and engineers to ensure acceptable application performance to end users at branch offices. In this tip, learn how to set up any generic WAN simulator to conduct network ... Continue Reading
-
Wireless LAN troubleshooting: How to get proactive
Wireless LAN troubleshooting and WLAN diagnostics can be done proactively with a new set of tools, including WLAN managers and distributed sensor platforms that track and problem solve on complex networks. Continue Reading
-
How remote users change WAN connection and bandwidth requirements
The growth of remote users entering an increasingly virtual workplace is putting stress on WAN connections and bandwidth. How should network technology evolve to meet the demands of teleworkers? Find out in this article. Continue Reading
-
Integrating public and private cloud services
Network managers must support integrated public and private cloud services because users will go under the radar to use public cloud services that help them get their work done more easily. Continue Reading
-
WLAN testing: Wireless intrusion prevention systems and centralized testing tools
WLAN testing has grown to accommodate the full-time surveillance necessary for super-speed 802.11n technology and mobile applications. Now WLAN testing can be done with AP-based wireless intrusion prevention systems and more. Continue Reading
-
Troubleshooting MPLS WAN services: VPLS, pseudowires, and Layer-3 VPNs
Troubleshooting MPLS WAN services, like pseudowires, virtual private LAN services (VPLS) and Layer-3 VPNs (virtual private networks), can be trickier than traditional provider offerings. Learn how to fix Multiprotocol Label Switching wide area ... Continue Reading
-
How to use an edge firewall for network bandwidth management
These five tips will help your organization apply quality-of-service controls on a network perimeter firewall. Continue Reading
-
How to prepare enterprise WANs for MPLS/VPN integration
How should IT professionals prepare their enterprise WANs (wide area networks) for an MPLS VPN integration? Find out using the steps described in this tip. Continue Reading
-
When should companies consider building MPLS networks into their WANs?
Learn when corporations should consider building Multiprotocol Label Switching (MPLS) networks into their enterprise wide area networks (WANs) in this tip. Continue Reading
-
How is MPLS different from SONET and ATM networks?
WAN managers face an array of technology possibilities, like SONET, ATM and MPLS, being pitched to them by every service provider. Making sense of these terms, and the differences between the technologies, will enable organizations to make an ... Continue Reading
-
MPLS and MPLS Transport Profile (MPLS-TP): The technology differences
Carriers hope MPLS Transport Profile, or MPLS-TP, will reduce transport network complexity by providing a packet switching technology that works across different types of transport networks but offers unified network management and provisioning. ... Continue Reading
-
Dynamic core network services: DNS and DHCP for virtualization
Without dynamic core network services, virtualization will be stalled. Dynamic DNS and DHCP, as well as IPAM, are necessary to manage the constantly changing addresses and configuration in a virtualized environment. Continue Reading
-
Negotiating network service contracts with WAN carriers
Here are 10 tips that describe how to negotiate network service contracts with potential carriers that provide wide area network (WAN) services. To find the best provider for your network and get the most out of your service-level agreement (SLA) ... Continue Reading
-
Choosing the right technology for fiber to the home (FTTH) deployments
When deploying fiber to the home, FTTH network technology choices should be tied to both current and future network requirements. Accommodating both within project cost constraints means comparing active and passive optical networks (PONs) and the ... Continue Reading
-
Using NetStat commands and Microsoft Port Reporter tool to find network connections
Expert Tom Chmielarski answers a reader's question about how to determine what programs are making connections to the Internet or other network systems. Continue Reading
-
Internet routing table's best hope: Locator/ID Separation Protocol
Internet routing tables are still exploding as the IPv6 migration begins in earnest, and most technical solutions are unworkable. Locator/ID Separation Protocol (LISP), which addresses multihoming and Internet traffic engineering issues, is the ... Continue Reading
-
Using virtual appliances and desktop virtualization
IT organizations are implementing desktop virtualization and virtual appliances for virtual WAN optimization and virtual application delivery, but there are challenges to overcome along the way. Continue Reading
-
vSphere networking features: distributed vSwitches; private VLANs; IPv6
VMware's release of vSphere 4 brings to the table a host of enhanced vSphere networking features that give network managers enhanced control over VM traffic with distributed vSwitches, as well as IPv6 support and the ability to build private VLANs. Continue Reading
-
How to plan an out-of-band network management system
To design out-of-band network management systems that are both cost efficient and effective, networking teams must consider which assets are crucial for visibility and just how much information they need to see. Continue Reading
-
Virtual aggregation: Lifeline for exploding Internet routing tables
Virtual Aggregation offers carriers steps to reduce the impact of the Internet routing table explosion on their networks and extend the life span of routers for up to 10 years, especially with the IPv4 address shortage, IPv6 deployment and fast BGP ... Continue Reading
-
Using WAN performance optimization for cloud computing environments
While cloud computing poses significant wide area network (WAN) challenges, network managers can significantly improve the chances of success by looking at advanced WAN services and thinking strategically about which network operator to use in order... Continue Reading
-
Windows Server 2008 R2 Enterprise Certificate Authority setup
If you are deploying an SSTP VPN to secure the remote users on your enterprise wide area network (WAN), then your VPN server must be provisioned with an X.509 certificate. Use these steps to learn how to configure Microsoft Windows Server 2008 R2 to... Continue Reading
-
How to set up an SSTP VPN to secure your enterprise network
Learn how to set up an SSTP VPN (Secure Socket Tunneling Protocol Virtual Private Network) connection in order to secure the remote users on your enterprise wide area network (WAN). These instructions explain step-by-step what is required to create ... Continue Reading
-
IPv4 address exhaustion: Making the IPv6 transition work
This two-part article by IP expert Ivan Pepelnjak first digs into IPv4 address exhaustion and attempts to speed the IPv6 transition. Then, he analyzes several semi-workable solutions that might help network operators manage the Internet routing ... Continue Reading
-
IPv4 to IPv6 translation: Comparing network-ready routing solutions
IPv4 to IPv6 translation has been a problem for more than a decade, and several solutions that attempt to solve IPv4 address exhaustion are network ready, according to IP expert Ivan Pepelnjak, who gives his recommendations. Continue Reading
-
How to configure Virtual Switch Tagging for vSphere VLANs
Virtual Switch Tagging is the most commonly used method of 802.1Q VLAN tagging for VLANs for vSphere. In this tip, learn how to configure a switch for VLAN Switch Tagging. Continue Reading
-
Service layer architecture: 4 main network operator requirements
A recent survey revealed service layer architectures will have to meet four main network operator requirements to enable carriers to differentiate themselves effectively from over-the-top (OTT) services and act on new market opportunities. Continue Reading
-
vSphere VLAN: Understanding 802.1Q VLAN tagging
vSphere VLANs have requirements different from those of VLANs in physical environments because VMs are fluid and can't be assigned to one physical NIC. So 802.1Q VLAN tagging offers a new approach to configuring and managing VLANs in vSphere. Continue Reading
-
How to choose ITIL monitoring tools
ITIL network monitoring requires ITIL monitoring tools that scan network function as well as application performance and have the ability to continually update information in a series of ITIL v3 databases. Continue Reading
-
Networking for virtualization: Virtual network switch problems abound
When it comes to networking for virtualization, every hypervisor comes with built-in switching, but virtual network switch problems abound, including the lack of traffic visibility and manageability. Continue Reading
-
Edge virtualization technologies solve virtual network switch woes
Virtual network switches have posed serious problems for networking pros, but network edge virtualization technologies, including distributed virtual switches, may be what makes manageability possible in networking for virtualization. Continue Reading
-
Smart pipe strategy puts new telecom services in business value chain
New TM Forum initiatives focus on new telecom services that bring in revenue while making 'smart pipe' networks essential to value chain partners. Whether through cloud computing services or network outsourcing, it is ushering in a new -- possibly ... Continue Reading
-
Financing FTTH deployment: Show us the ROI for Fiber to the Home
The cost of FTTH deployment is high and demands heavy upfront equipment costs, yet competition keeps profit margins low. Find out how carriers are trying to improve the network ROI and reinvent the fiber to the home business model to help mitigate ... Continue Reading
-
Managing virtualization networking: Virtual network switch challenges
Managing virtualization networking is a real challenge for network admins since they often don't have control of virtual network switches and the traffic that runs inside servers. But there are some solutions by way of virtualization networking ... Continue Reading
-
What is a WAN manager's role in storage?
Bandwidth, data deduplication, disaster recovery (DR) and remote site acceleration and optimization are all areas where storage and WAN managers' job responsibilities overlap. This article explains how and answers the question, 'What is a wide area ... Continue Reading
-
Web SSL VPN introduction
This Web SSL VPN introduction answers the question "What is a Web SSL VPN?" and explains SSL VPN advantages in remote access environments. Understand how they evolved from their lesser IPsec VPN counterparts, how they protect against hackers, how ... Continue Reading
-
A history of VPN: Disadvantages of early virtual private networks
This history of VPN explains why early virtual private network solutions proved disadvantageous for businesses and how the advent of newer VPNs has created more secure and simpler-to-deploy solutions for wide area networks (WANs) and remote users. Continue Reading
-
Web SSL VPN advantages: Secure remote access
View this business case to understand Web SSL VPN advantages and how they compare with traditional IPsec virtual private networks. Learn in this tip how secure remote access can be easier, faster and cheaper for enterprise wide area networks (WANs). Continue Reading
-
How to optimize Ethernet for data center networks
It will take time for super-fast data center Ethernet technologies to evolve, so managers of data center networks must optimize existing Ethernet through a series of strategies that range from choosing very large switches to isolating storage ... Continue Reading
-
Traffic grooming in optical networks: Making real-world choices
Solutions for traffic grooming in optical networks haven't kept pace with all-optical network development and still work in the electrical domain. Telecom providers have to make hard, real-world choices about how to best transport their services ... Continue Reading
-
Telecom's three advantages in selling Everything as a Service
Cloud computing has ushered in the era of "Everything as a Service." Network operators need to exploit three advantages as they compete with other "X as a Service" providers selling software, infrastructure, platforms and more as a service. Continue Reading
-
Should you consider wireless WAN service for your enterprise?
Learn the advantages and disadvantages of using wireless in your enterprise wide area network (WAN). This article on wireless WAN service considerations explains how 3G and 4G technology developments Continue Reading
-
Integrating LAN edge switch security and network access control
The best form of network edge security is to integrate LAN edge switch security features with network access control devices so that networking teams can use VLANs, ACLs and health checks at the switch alongside NAC's behavior analysis. Continue Reading
-
Configuring LAN edge switches for network access authentication
Intelligent edge switches can play a role in network access authentication, but these functions are often overlooked. Continue Reading
-
New telecom industry trends require OSS/BSS systems changes
New telecom industry trends are driving OSS/BSS systems requirements, with new service layer architecture and customer experience management at the core, causing a move to automated systems and management-as-service logic. Continue Reading
-
Five key Evolved Packet Core issues face 4G LTE network planners
Wireless operators deploying Evolved Packet Core technology in 4G Long-Term Evolution (LTE) networks agree on five key issues to address in this unique transition from 3G to 4G networking. Learn from their experience on everything from fiber ... Continue Reading
-
Integrating the Evolved Packet Core for seamless 3G/4G mobile backhaul
When transitioning from 3G to 4G networks, wireless operators must plan carefully to migrate and integrate mobile backhaul so it accommodates both the new Evolved Packet Core for LTE and traditional TDM-based backhaul solutions. Continue Reading
-
Choosing a provider for WAN managed services for your enterprise
How do you find the right provider for your business's WAN managed services? Ask the right questions. To get a managed service provider (MSP) at the right price with the right offerings and service-level agreements (SLAs), view these tips. Continue Reading
-
Seven IPv6 networking myths that don't match reality
IPv4 addresses are running out, and the change to IPv6 networking is imperative, yet the myths surrounding what the protocol can and cannot do are becoming the stuff of legend. Our IP expert looks at IPv6 reality instead. Continue Reading
-
LAN edge switch security functions: Switch ACLs; filtering port traffic
LAN edge switch security functions enable network administrators to use switch access control lists (ACLs) to filter incoming and outgoing traffic, as well as port-level traffic filtering and VLAN management for a more in-depth approach to LAN ... Continue Reading
-
Mobile WAN routers: Comparison and considerations for your enterprise
If you have road warriors in your enterprise wide area network (WAN) workforce, you're probably worrying about exorbitant mobile broadband fees. Mobile WAN routers are a cost-effective alternative. Read this tip to learn when to use them in your ... Continue Reading
-
WAN video conferencing network design requirements for QoS
To ensure high-quality video conferencing over your enterprise wide area network (WAN), you need to make sure you have enough bandwidth, among other things. Check out these WAN video conferencing network design configuration requirements before you ... Continue Reading
-
Benchmarking core switches: Modeling techniques for switch testing
When it comes to benchmarking core switches, network managers find that testing tools are costly, so it may be worth using switch traffic modeling for testing core switch performance. Continue Reading
-
Integrated wireless network management systems work across infrastructures
Enterprises must implement integrated wireless network management systems that are user-aware and offer end-to-end visibility but also provide the drill-down capabilities of wired network management systems. Continue Reading
-
Cloud networking: Inter-networking data centers and connecting users
Cloud networks have a mission: connect a pool of resources that any user, anywhere can access without fail. Continue Reading
-
Five telecom provider benefits of offering cloud computing services
Cloud computing services, platforms and infrastructure can benefit telecom service providers and provide Web-based applications to enterprise customers if carriers address challenges like security and performance to differentiate themselves and cut ... Continue Reading
-
Preparing your wired network for wireless network integration
Wireless LAN integration means upgrading wired networks with new equipment and traffic prioritization to avoid bottlenecks between the networks and provide QoS for wireless multimedia applications, including WLAN voice and video. Continue Reading
-
Testing 10 gigabit Ethernet switch latency: What to look for
Testing 10 Gigabit Ethernet switches means going beyond just speed to examine potential latency. Testing 10 gigabit Ethernet switch latency requires choosing the right switches and testing tools and recreating your track flow in just the right way. Continue Reading
-
Demystifying the evolved packet core for 4G LTE networks
Designing 4G LTE network evolved packet core technology to ensure maximum resource efficiency and high-quality user experience calls for increased focus on metro "middle-mile" networks and analysis of expected traffic handoff patterns. Continue Reading
-
Unified fabric: Data center bridging and FCoE implementation
IT organizations planning to deploy a unified storage and network fabric through data center bridging and FCoE implementation must consider a host of components, such as adapters, and configuration plans. Continue Reading
-
How to reach maximum 802.11n speed and throughput
Vendors promise 802.11n WLAN speed of 600 Mbps, but users find they can realistically reach about 300 Mbps. In order to maximize 802.11n speed and throughput, users find they must have just the right AP configuration and use of antennas. Continue Reading
-
IP over dense wave division multiplexing (DWDM): Metro and core issues
Providers pressured to increase network throughput while reducing costs can look to IP over DWDM in some metro network situations, such as saving money on residential Internet backhaul. IP expert Ivan Pepelnjak also walks you through the ... Continue Reading
-
Wireless or Ethernet LAN? An apples-to-apples cost comparison
Now that 802.11n has made wireless LAN faster and more reliable, network administrators are wondering: Wireless or Ethernet LAN? Until now Ethernet replacement hasn't been feasible, but 802.11n WLAN benefits are much more tangible now. Continue Reading
-
Top five telecom industry trends for 2010: Market transformation ahead
Five telecom industry trends for 2010 show clear signs that the coming year may well bring a market transformation unlike any the telecom industry has seen in quite some time. Continue Reading