Ask the Experts
Ask the Experts
-
Which is better for WLAN support: Mac or Windows?
Choosing the right laptop for WLAN support usually boils down to Macintosh versus Windows. But of the two, there is only one OS clearly up to the task, our expert maintains. Continue Reading
-
Where do mobile users fit in with SD-WAN as a service?
SD-WAN as a service can act as a bridge between mobile users who want to access business apps on the go and network managers who want to manage and secure those users. Continue Reading
-
What exactly is a digital business transformation strategy?
What do you need for a digital business transformation strategy that will actually work to boost business value and change the enterprise operations model? Continue Reading
-
Can cable be reused when upgrading 802.11ac wireless LAN?
Is it better to repurpose legacy cabling when planning an 802.11ac wireless LAN upgrade, or does it make sense to buy new? Like many things networking, it depends. Continue Reading
-
What security is needed for digital assistant devices?
How should cybersecurity-enforcement efforts adapt as digital assistant devices become more pervasive in business enterprise networking to safeguard corporate data? Continue Reading
-
How do IoT sensors intersect with SD-WAN?
Most traditional WANs can't handle the increasing number of IoT sensors -- and the data they collect. But SD-WAN can help improve IoT performance and analysis. Continue Reading
-
How can IT asset management tools aid in virtualization era?
IT asset management tools allow businesses to track resources effectively. Platform organization is increasingly necessary in a virtualized enterprise. Continue Reading
-
What's automation's role in network provisioning resources?
IT is embracing network automation, but complications with integration disrupt the process. Using automation for provisioning resources can improve efficiency, but reduce the need for IT personnel. Continue Reading
-
How can cloud management apps organize data across clouds?
If you need to pull together different data sets, cloud management apps can track information workloads across multiple clouds and present the data in a simplified way. Continue Reading
-
How can you use perfect forward secrecy for mobile security?
How can companies increase data protection in mobile communications environments and enhance perfect forward secrecy to safeguard user activity? Continue Reading
-
IBN: Enablement for a configuration management process?
How realistic are claims about intent-based networking helping organizations to enhance the network configuration management process? Continue Reading
-
How does SD-WAN manage real-time network traffic performance?
Most people have experienced poor quality when it comes to real-time network traffic, like VoIP and video. But SD-WAN can help prioritize traffic and improve reliability. Continue Reading
-
How can network management systems boost troubleshooting?
What can IT teams do to combine network management systems and application performance management tools to boost troubleshooting in enterprise infrastructure? Continue Reading
-
How should IT manage connected devices?
As IT teams become tasked to manage connected devices more often, what steps need to be taken to avoid performance and security-related problems? Continue Reading
-
Why some Wi-Fi jobs are best for WLAN professionals to avoid
Some Wi-Fi jobs can become nearly impossible to complete. When engineers contend with inflated expectations or bad designs, it may be best to walk away. Continue Reading
-
How to cut false security, malware alerts in hybrid cloud
The bad news: IT teams are deluged by false security and malware alerts with their hybrid clouds. The good news: New tools are here to help. Continue Reading
-
How will virtual router software benefit the networking industry?
Although virtual router software has been around for more than a decade, 2017 could be the year vRouting experiences greater adoption due to its available use cases. Continue Reading
-
Will NFV standards address orchestration in the near future?
NFV standards for orchestration are affected by the number of standards groups and service providers' individual approaches, says SDN expert Lee Doyle. Continue Reading
-
What do I need to do to create successful hybrid WANs?
The market for hybrid network services is growing, and with it comes the challenge of successfully creating hybrid WANs. Continue Reading
-
What is the difference between bit rate and baud rate?
Learn how to understand the difference between bit rate and baud rate in this expert answer. Continue Reading
-
How can my company reap the advantages of SDN if its culture is risk-averse?
SDN expert Will Murrell discusses how the advantages of SDN will speak to cautious companies only when network engineers can make a case for SDN's lower cost and high functionality. Continue Reading
-
My MPLS service contract expires soon -- should I renew?
The rise of SD-WAN has many asking: Do we really need MPLS connectivity? Expert John Burke explains what factors to consider before renewing your existing contract. Continue Reading
-
How can enterprises manage the cybersecurity skills gap?
Due to the demand for professionals with backgrounds in both computer science and networking, filling cybersecurity jobs is difficult. Technology will have to play a bigger role. Continue Reading
-
What's the best way to handle end-of-sale devices on your network?
A majority of organizations have end-of-sale and end-of-life devices on their networks. What's the best way to ensure your equipment is up to date? Continue Reading
-
How will software-defined WANs impact the enterprise?
SD-WAN has a lot of potential for enterprises, especially as developers cobble together custom services and capabilities. Continue Reading
-
Will MPLS traffic engineering technology help you?
MPLS traffic engineering can improve VPN performance to ensure data travels the most efficient path. Continue Reading
-
Are there alternatives to the OpenFlow protocol?
Jason Edelman explains OpenFlow protocol alternatives and what's important in determining which southbound protocol will work for you. Continue Reading
-
How do I disable VPN passthrough? What are the pros and cons to disabling it?
In this Ask the Expert response, Rainer Enders explains how to disable VPN passthrough and what the benefits and drawbacks are. Continue Reading
-
Difference between circuit-switching and packet-switching in examples
What is the difference between a circuit switching and packet switching? Our networking fundamentals expert gives examples of packet switching and circuit switching in this response. Continue Reading
-
VLANs versus IP subnets: Why use a VLAN over IP subnetting?
A virtual local area network (VLAN) is better than IP subnetting because its advantage is security. Learn what a VLAN is and how it differs from creating IP subnets, in this expert response from our networking fundamentals expert. Continue Reading
-
What equipment do I use to connect two LANs in different cities? What are the steps?
How do you connect two LANS from different cities? VPN expert Sampath Ramaswami notes the steps to be taken, in this Q&A. Continue Reading
-
Half duplex vs. full duplex Ethernet 10BASE-T topologies
Ever wonder why half duplex Ethernet 10BASE-T topologies have a slower data transmission rate than full duplex Ethernet 10BASE-Ttopologies? Find out in this expert response by Lindi Horton. Continue Reading
-
What are the fundamental principles of CDMA?
In this Q&A, our expert, Lindi Horton gives us an explanation of what CDMA is and what some of its fundamental principles are. Continue Reading
-
Why do we need the MAC address if all Ethernet connections are done via IP address?
-
What is difference between a WINS server and a DNS server?
-
How do I open port 177 on my router so that other clients can get a GUI display of my server remotel
-
How do I set up two or more wireless adapters on the same computer to work together?
-
What is a collision domain? How does replacing a hub with a switch affect collision?
-
Since DNS uses UDP instead of TCP, if a packet is lost, there is no automatic recovery?
-
Can I connect two networks, one wired, one wireless, so that I can access the Internet through the s
-
I need help adding a central MAC address authentication server to our current WLAN.
-
What are the basic features of CIDR and what are its advantages and disadvantages compared to IPv6?
-
What costs I can expect when designing A LAN? How can I keep costs to a minimum?
-
What is a LAN and how does it work?
-
Why can't I access my folders on the server through the VPN?
-
I need a very basic VPN solution to connect two offices to allow two servers to talk to one another.
-
What are the differences between PVC, riser and plenum rated cables?
-
Can you explain the ICMP ping test?
-
How can we say TCP is a reliable protocol?
-
How can I find a good job if I have my CCNA but now experience with Cisco routers?
-
Can you assign an IP address ending in .0 or .255?
Learn how to assign an IP address ending in .0 or .255 from networking fundamentals expert Chris Partsenidis in this Q&A. Continue Reading
-
What is a network segment? Is a network segment the same as an Ethernet segment?
-
When I use the Microsoft Windows VPN Client, what kind of VPN tunnel is created?
-
What are the minimum and maximum sizes of an ICMP packet?
-
What is the difference between an IPsec tunnel and a normal tunnel, and what is the bandwidth of eac
-
Can features such as VPN pass-through on routers be abused to dump traffic onto a NAT'd LAN?
-
How do the clients in a WLAN communicate with the AP (Access Point) based on IP in the Network Layer
-
What are the top five companies that are providing enterprise level WLAN products and solutions?
-
How does the sender of a data packet know the IP address of the receiver? Part 1
-
What is required to implement SSL with encryption for TN3270 session on CS for OS/390 V2R10?
-
What determines the speed of a LAN that consists of 10 Mbps and 100 Mbps devices?