General Networking

All General Networking Articles

Showing 221-240 of 329

Sort by Date | Title

221.
Network Security Basics
May 7, 2004
Robyn Aber help us to explore how routers and switches are the keys to a strong network foundation.Together they enable the intelligent, end-to-end movement of converged data, voice, and video information within or outside the business.
222.
Network Security First-Step: Firewalls
Feb 8, 2012
This chapter dissects a firewall’s duties to understand what makes a firewall operate and how it does its job.
223.
Network Security Inside and Out: An Interview with Arvind Durai and Ray Blair
Jul 1, 2009
Arvind Durai and Ray Blair talk about the current landscape for enterprise security.
224.
Network Switching Methods: Store-and-Forward Versus Cut-Through
Jul 28, 2015
Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, believes every network engineer should understand the differences between the two major switching methods employed in computer networks. This overview discusses the two methods from their initial deployments to modern usage.
225.
Network Virtualization: A Basic Virtualized Enterprise
Oct 6, 2006
The authors of Network Virtualization define the technical requirements posed by the need to virtualize the network. Based on these requirements, they propose an architectural framework comprised of the functional areas necessary to successfully support concurrent virtual networks (VNs) over a shared enterprise physical network.
226.
Networking First-Step: How to Build a Local (Network) Roadway
Jun 4, 2004
Wendell Odom covers networking basics such as how they work, what they're made of, and the benefits of using a structured cabling system.
227.
Nine Switch Commands Every Cisco Network Engineer Needs to Know
Aug 4, 2015
Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, provides a quick overview of nine commands that are essential for working with Cisco networks, whether or not your goal is certification.
228.
Offering Bundled Voice and Data Services
Oct 11, 2002
229.
Offloading Traditional Mobile Networks with IP
Jun 23, 2009
This chapter discusses pseudowire transport mechanisms used to provide a bridge between the legacy TDM systems and All IP systems on mobile networks.
230.
On the Job with a Network Manager
Jan 12, 2007
Alexander Clemm presents a number of scenarios to give an impression of the types of activities that are performed by people who run networks for a living. He also provides an overview of some of the tools network managers have at their disposal to help them do their jobs.
231.
Online Security: A Quest to Be One Step Ahead of the Bad Guys
May 29, 2009
Linda Leung interviews security expert Jamey Heary about network security and the world of "white hats" versus "black hats."
232.
Overcoming Transport and Link Capacity Limitations Through WAN Optimization
Jun 19, 2008
This chapter examines how WAN optimization capabilities overcome performance barriers created by WAN conditions.
233.
Overview of Modern SCSI Networking Protocols
Aug 4, 2006
The goal of this chapter is to quickly acclimate readers to the standard upper-layer storage protocols currently being deployed. To that end, it provides a conceptual description and brief procedural overview for each ULP.
234.
Packet over SONET
Nov 7, 2003
This sample chapter covers Packet over SONET (PoS) operation, encapsulation, protection, and convergence.
235.
Packet Switching Methods on Cisco Networks
Jul 14, 2015
Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, teaches new networking students the basics they need to know about packet switching on Cisco networks. Experienced network engineers will find this article a useful refresher course on Cisco technology.
236.
Paint Your Data Center Green: An Interview with Douglas Alger
Jul 1, 2009
Douglas Alger explains what it takes for businesses to green their data centers.
237.
Penetration Testing and Network Defense: Performing Host Reconnaissance
Jun 2, 2006
Malicious hackers also value reconnaissance as the first step in an effective attack. For them, seeing what is on the "other side of the hill" is crucial to knowing what type of attack to launch. Although penetration testers might not always have the luxury of time that a malicious hacker might have, they do recognize the value of reconnaissance. This chapter will help you develop network reconnaissance skills to help you protect your network from intrusion.
238.
Performing a Great Screen Play: The Many Routes to Remote Computing
Apr 12, 2002
Symantec's pcAnywhere is no longer the de facto program for remote access. Ross Scott Rubin demonstrates how cross-platform options, hosted services, and two new options built into Windows XP can bridge the distance between you and another computer.
239.
PKI Processes and Procedures
Apr 1, 2011
Several processes need to occur in a PKI network for a deployment to function smoothly. To address these processes, this chapter covers enrollment, Certificate Expiration and Renewal, Certificate Verification and Enforcement, and PKI Resiliency.
240.
Planning for Cisco IP Telephony
May 6, 2005
This chapter provides the tasks and best practices involved in the planning phase of the IPT deployment, using an imaginary company "XYZ, Inc." to demonstrate how this planning can be tailored to the unique needs of your business.