Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
How to simplify your overly complex networking design
If you flood your networking design with extraneous features and don't have a firm understanding of the overall system, you might fall into a complexity wormhole. Continue Reading
Cradlepoint router boosts network flexibility for dance group
Connecting an audience to the motion and music of a dance production takes more than dance and musical skills. For one professor, it required network flexibility and the Cradlepoint AER2100 router. Continue Reading
Network edge switch upgrades hinge on WLAN deployments
Network edge switch upgrades depend on a variety of factors, but one of the most critical is taking a look at your future WLAN deployment strategies. Continue Reading
-
How can network analytics tools be used to improve performance?
With pressure and expectations for network and enterprise performance rising, IT professionals are turning to network analytics tools that use machine learning to remain ahead of the game. Continue Reading
How can I prevent a DDoS attack program?
DDoS programs overwhelm networks with a torrent of requests. How can you prevent a DDoS attack, and what are the steps you can take to keep your networking environment secure? Continue Reading
How IPv6 networks create DNS configuration problems
DNS data is among the most basic and crucial information required for network connectivity, but configuring DNS recursive servers in IPv6-only networks can pose challenges.Continue Reading
What's automation's role in network provisioning resources?
IT is embracing network automation, but complications with integration disrupt the process. Using automation for provisioning resources can improve efficiency, but reduce the need for IT personnel.Continue Reading
How can you use perfect forward secrecy for mobile security?
How can companies increase data protection in mobile communications environments and enhance perfect forward secrecy to safeguard user activity?Continue Reading
IBN: Enablement for a configuration management process?
How realistic are claims about intent-based networking helping organizations to enhance the network configuration management process?Continue Reading
Users want hybrid cloud networking to be simple
As more services move to the cloud and become more mobile, if the network is invisible and performs well, IT pros are doing their jobs in users' eyes.Continue Reading
-
How to use traceroute to troubleshoot network problems
Traceroute is a tool that can provide more insight than you might think. Learn how to use traceroute to troubleshoot network issues.Continue Reading
How types of noise in data communication systems affect the network
Learn about the different types of noise in data communication -- including thermal, intermodulation, cross-talk, impulse and shot noise -- and how they can affect your network.Continue Reading
Networked cloud emerges to meet evolving infrastructure needs
Some enterprise network managers are beginning to move networking out to the cloud, as they sort out how to best meet their organizations' evolving infrastructure needs.Continue Reading
IP subnetting: How to calculate subnet masks
Check out IP subnetting shortcuts on how to do subnet mask calculations and break down IP address classes to route traffic within your network.Continue Reading
Comparing cable types: Fiber vs. copper twisted pair
What's the difference in fiber vs. copper cables? Key differences include cost, speed and more when it comes to fiber optic and copper twisted-pair cabling options.Continue Reading
What is the difference between bit rate and baud rate?
Learn how to understand the difference between bit rate and baud rate in this expert answer.Continue Reading
How can my company reap the advantages of SDN if its culture is risk-averse?
SDN expert Will Murrell discusses how the advantages of SDN will speak to cautious companies only when network engineers can make a case for SDN's lower cost and high functionality.Continue Reading
How to troubleshoot iPhone and iPad connection problems
As iPhone and iPad Wi-Fi clients proliferate in the enterprise, IT must troubleshoot Wi-Fi connection problems. Here's how to solve basic iPhone and iPad connection problems.Continue Reading
Common network errors and their causes
Network not behaving? Learn how to identify the most common network errors -- like discards and collisions -- and how to implement solutions to get your network humming again.Continue Reading
How to troubleshoot Android Wi-Fi connection problems
Android smartphone and tablet users now abound in the enterprise, making Android Wi-Fi connection troubleshooting a key element of enterprise wireless network connection management.Continue Reading
How can enterprises manage the cybersecurity skills gap?
Due to the demand for professionals with backgrounds in both computer science and networking, filling cybersecurity jobs is difficult. Technology will have to play a bigger role.Continue Reading
What's the best way to handle end-of-sale devices on your network?
A majority of organizations have end-of-sale and end-of-life devices on their networks. What's the best way to ensure your equipment is up to date?Continue Reading
OPM hack two months later: What was learned?
Network security expert Michele Chubirka shares her thoughts about June's OPM hack and what steps IT should take to fend off future attacks.Continue Reading
Hyper-V networking: The three virtual switches that fuel connectivity
In this Hyper-V networking primer, learn about the three virtual switches behind Microsoft virtualization connectivity.Continue Reading
Are there alternatives to the OpenFlow protocol?
Jason Edelman explains OpenFlow protocol alternatives and what's important in determining which southbound protocol will work for you.Continue Reading
Centralized vs. decentralized SDN architecture: Which works for you?
Two SDN architecture models -- centralized and decentralized -- have much in common, but key differences center on the use of the OpenFlow protocol.Continue Reading
How do I disable VPN passthrough? What are the pros and cons to disabling it?
In this Ask the Expert response, Rainer Enders explains how to disable VPN passthrough and what the benefits and drawbacks are.Continue Reading
Using virtual appliances and desktop virtualization
IT organizations are implementing desktop virtualization and virtual appliances for virtual WAN optimization and virtual application delivery, but there are challenges to overcome along the way.Continue Reading
Difference between circuit-switching and packet-switching in examples
What is the difference between a circuit switching and packet switching? Our networking fundamentals expert gives examples of packet switching and circuit switching in this response.Continue Reading
VLANs versus IP subnets: Why use a VLAN over IP subnetting?
A virtual local area network (VLAN) is better than IP subnetting because its advantage is security. Learn what a VLAN is and how it differs from creating IP subnets, in this expert response from our networking fundamentals expert.Continue Reading
Troubleshooting remote scripting using Network Monitor 3.0 -- Managing Windows networks using script
Learn how to use Network Monitor 3.0 for troubleshooting a remote scripting error in this tip originally published on WindowsNetworking.com.Continue Reading
Optical networks: Core network design best practices
Core optical network design must take into consideration network requirements specific to the core, including a high degree of aggregation, low reconfigurability, and large geographic scope, while confronting such challenges as router adjacency, ...Continue Reading
What equipment do I use to connect two LANs in different cities? What are the steps?
How do you connect two LANS from different cities? VPN expert Sampath Ramaswami notes the steps to be taken, in this Q&A.Continue Reading
Cisco wireless access point configuration from scratch
Learn what the Cisco 1242 wireless access point can do for you and how to configure one from scratch. This tip covers basic security settings, enabling the wireless radios, and how to make a successful connection. The 1242AG is a powerful ...Continue Reading
Half duplex vs. full duplex Ethernet 10BASE-T topologies
Ever wonder why half duplex Ethernet 10BASE-T topologies have a slower data transmission rate than full duplex Ethernet 10BASE-Ttopologies? Find out in this expert response by Lindi Horton.Continue Reading
What are the fundamental principles of CDMA?
In this Q&A, our expert, Lindi Horton gives us an explanation of what CDMA is and what some of its fundamental principles are.Continue Reading
IP addressing and subnetting: Calculate a subnet mask using the subnet's formula
IP addressing and subnetting are an important part of networks. Learn how the subnet's formula works and why it's important to know how to calculate the subnet mask "longhand."Continue Reading
Duplex mismatch
What is duplex, and what is the difference between half and full duplex? What is a duplex mismatch? How can autonegotiation help or hurt your network? How can you resolve duplex conflicts? In this tip, David Davis helps networking engineers and ...Continue Reading
Why do we need the MAC address if all Ethernet connections are done via IP address?
What is difference between a WINS server and a DNS server?
How do I open port 177 on my router so that other clients can get a GUI display of my server remotel
How do I set up two or more wireless adapters on the same computer to work together?
What is a collision domain? How does replacing a hub with a switch affect collision?
Since DNS uses UDP instead of TCP, if a packet is lost, there is no automatic recovery?
Can I connect two networks, one wired, one wireless, so that I can access the Internet through the s
I need help adding a central MAC address authentication server to our current WLAN.
Focus Windows port scanning with the netscan command
How to use the netscan command to focus Windows port scanning.Continue Reading
What are the basic features of CIDR and what are its advantages and disadvantages compared to IPv6?
What costs I can expect when designing A LAN? How can I keep costs to a minimum?
What is a LAN and how does it work?
Why can't I access my folders on the server through the VPN?
I need a very basic VPN solution to connect two offices to allow two servers to talk to one another.
What are the differences between PVC, riser and plenum rated cables?
Can you explain the ICMP ping test?
How can we say TCP is a reliable protocol?
How can I find a good job if I have my CCNA but now experience with Cisco routers?
Can you assign an IP address ending in .0 or .255?
Learn how to assign an IP address ending in .0 or .255 from networking fundamentals expert Chris Partsenidis in this Q&A.Continue Reading
What is a network segment? Is a network segment the same as an Ethernet segment?
When I use the Microsoft Windows VPN Client, what kind of VPN tunnel is created?
What are the minimum and maximum sizes of an ICMP packet?
What is the difference between an IPsec tunnel and a normal tunnel, and what is the bandwidth of eac
Can features such as VPN pass-through on routers be abused to dump traffic onto a NAT'd LAN?
How do the clients in a WLAN communicate with the AP (Access Point) based on IP in the Network Layer
What are the top five companies that are providing enterprise level WLAN products and solutions?
How does the sender of a data packet know the IP address of the receiver? Part 1
What is required to implement SSL with encryption for TN3270 session on CS for OS/390 V2R10?
What determines the speed of a LAN that consists of 10 Mbps and 100 Mbps devices?