240 Results for:udp

  • Sort by: 

Security and the TCP/IP stack

By Michael Gregg 22 Jun 2006

Each layer of TCP/IP has security mechanisms, protocols, and applications. This tip describes the more popular ones that are associated with each layer of TCP/IP. Read More

IP network design, part 3: Designing the WAN

06 Feb 2006

The wide area network (WAN) is the single biggest contributor to a corporate network's cost of ownership. Therefore, this is the area where the cost-versus-performance tradeoff is most pronounced and most critical.... Read More

Securing VoIP: Keeping Your VoIP Networks Safe

01 Apr 2016

In this excerpt of Securing VoIP: Keeping your VoIP Network Safe, author Regis (Bud) Bates outlines different approaches to VoIP security and offers best practices to ensure infrastructure security is intact. Read More

NAS gateway specifications

14 Dec 2006

A NAS gateway offers file-based accesses to external storage on a disk array -- or a SAN, where users can take advantage of superior performance and reliability while maintaining a level of simplicity. Since ... Read More

Linux clusters vs. grids

09 Apr 2007

Can Linux clusters outperform grid computing? Expert Ken Milberg compares them -- covering Beowulf, HPC, Linux Virtual Server and the Globus Toolkit for grids -- and chooses a winner. Read More

VoIP security - problems inherited from data networking

By Gary Audin 05 Mar 2007

VoIP security problems present a challenge for voice and network staff because IP telephony brings with it not only the security problems of data networks but also new, added threats specific to VoIP. In this tip, ... Read More

VoIP security fundamentals

17 May 2007

VoIP security is a challenge for IT staff because IP telephony brings with it not only the security problems of data networks but also new threats specific to VoIP. In this fundamentals guide, learn about network ... Read More

VPNs for disaster recovery: IPsec vs. SSL

03 Aug 2006

Using a VPN as a failover mechanism when a primary communications link may be unavailable due to a disaster can be a smart move -- as well as an easy one to implement. In this tip, learn about the pros and cons of ... Read More

How is SIP winning favor over H.323?

16 Apr 2007

What are the similarities, differences and major reasons between SIP and H.323. And why is one winning? Read More

VoIP's inherited data security problems

By Gary Audin 27 Mar 2007

VoIP security problems present a challenge for voice and network staff. This article explains how to secure both your call servers and endpoints, and how best to divide this work between voice and data personnel. Read More