Network Design
Top Stories
-
Feature
31 May 2022
Understand the basics of 5G wireless networks
To build a 5G network, the deployment mode, spectrum band and services are all important factors to understand and consider. Here's what you should know about the basics of 5G. Continue Reading
-
Tip
11 Nov 2021
4 ideas for network cable management best practices
When organizing cable clutter, network engineers should follow some common best practices, including the use of cable labels, cable ties and proper documentation. Continue Reading
-
Answer
28 Aug 2005
How to protect your network from broadcast and multicast storms
What methods are available to protect a network from broadcast and multicast storms? Continue Reading
-
Answer
28 Aug 2005
Security of each level of the OSI model
What kind of security is associated with each level of the OSI model? Continue Reading
-
Tutorial
26 Aug 2005
Guide to network performance management
This guide introduces you to network management best practices and pitfalls to avoid, and provides troubleshooting help and advice for monitoring and maintaining your network for best performance. Continue Reading
-
Tip
23 Aug 2005
Hardening your router in 9 easy steps
For most enterprise LANs, the router has become one of the most critical security appliances in use. Configured properly, it can keep all but the most determined bad guys out, and if you want, it can even keep the good guys in. But an improperly configured router is only marginally better than having no security in place at all. This expert tip presents nine easy steps that you can take to ensure that your router is adequately protected. Continue Reading
-
Tip
19 Aug 2005
Router Expert: Standard interface configuration for a WLAN proxy server
Our router expert continues his series on building a secure WLAN with a Linux base. This article covers standard interface configuration of the http proxy server. Continue Reading
-
Tip
17 Aug 2005
Troubleshooting Windows VPN servers
There are several aspects of the Windows remote access server that can create issues when a VPN client connects. This article focuses on some common trouble spots on the server side and offers steps to help pinpoint the problem. Continue Reading
- Answer 08 Aug 2005
- Answer 03 Aug 2005
- Answer 03 Aug 2005
- Answer 20 Jul 2005
- Answer 19 Jul 2005
- Answer 11 Jul 2005
-
Tip
27 Jun 2005
Wireless LAN deployment and federal regulations
A look at the bare minimum requirements to keep your WLAN compliant with federal regulations. Continue Reading
-
Feature
22 Jun 2005
Router and firewall configuration
ITKnowledge Exchange member "stephang" had a question about the balance between blocking packets and enabling NAT on his router and on his firewall. Fellow forum members chipped in with their advice; check out what they had to say. Continue Reading
-
Tip
16 Jun 2005
Secure WLAN best practices and topology
Expert Michael Martin provides a list of wireless security "dos and don'ts" and a sample topology for a secure WLAN. Continue Reading
- Answer 31 May 2005
-
Feature
18 May 2005
Commonly overlooked security hazards
Security expert Dave Piscitello covers the ten most commonly overlooked security hazards and easy ways to prevent them from placing your network at risk. Continue Reading
- Answer 06 May 2005
- Answer 06 May 2005
- Answer 19 Apr 2005
- Answer 12 Apr 2005
-
Tip
07 Apr 2005
Seven steps to ensure project success
The Value Manager recently had a project fall well below expectations. He reviewed what happened and came up with seven key steps for managing technical risk and one golden rule. Continue Reading
- Answer 28 Mar 2005
-
Feature
21 Mar 2005
The network administrator's survival guide
This piece from contributor Douglas Chick presents a humorous look at surviving in your role as a network administrator. Continue Reading
-
Tip
18 Mar 2005
Router Expert: Filtering with MAC addresses
This month our router expert discuss some strategies for controlling host network access using MAC address filtering. Continue Reading
-
Tip
17 Mar 2005
Focus Windows port scanning with the netscan command
How to use the netscan command to focus Windows port scanning. Continue Reading
- Answer 17 Mar 2005
-
Answer
07 Mar 2005
Can I connect two computers through Ethernet on a WAN?
Can I connect two computers through Ethernet on a WAN? Continue Reading
- Answer 03 Mar 2005
- Answer 24 Feb 2005
- Answer 24 Feb 2005
- Answer 16 Feb 2005
- Answer 16 Feb 2005
- Answer 15 Feb 2005
- Answer 15 Feb 2005
-
Feature
14 Feb 2005
Most popular viruses and hacking tools
Here are 2004's most popular hacker tools, viruses, remote tools, adware, spyware, Trojans and worms. Continue Reading
- Answer 10 Feb 2005
- Answer 01 Feb 2005
- Answer 31 Jan 2005
-
Tip
27 Jan 2005
Network administrator security policies
Some security policy elements that are specific to network administrators. Continue Reading
-
Answer
19 Jan 2005
What are the advantages of 10 Gigabit Ethernet?
Learn about the advantages of using 10 Gigabit Ethernet for your corporate network, in this Ask the Expert response. Continue Reading
-
Answer
11 Jan 2005
Can you assign an IP address ending in .0 or .255?
Learn how to assign an IP address ending in .0 or .255 from networking fundamentals expert Chris Partsenidis in this Q&A. Continue Reading
- Answer 11 Jan 2005
-
Tip
03 Jan 2005
Minimizing Layer 2 problems
Understanding the fundamentals of Spanning Tree Protocol. Continue Reading
- Tip 16 Dec 2004
-
Tip
30 Nov 2004
MPLS: Experimental bits and QoS
MPLS experimental bits are used to provide QoS capabilities by utilizing the bits set in the MPLS labels. Continue Reading
- Answer 22 Nov 2004
-
Answer
22 Nov 2004
How do I connect to the console and AUX port of my router?
How do I connect to the console and AUX port of my router? Continue Reading
- Answer 22 Nov 2004
- Answer 09 Nov 2004
- Answer 09 Nov 2004
- Answer 09 Nov 2004
- Answer 01 Nov 2004
-
Tip
26 Oct 2004
VPLS, a new Layer 2 MPLS VPN technology
A new Layer 2 MPLS VPN technology that provides similar reliablity and QoS as MPLS VPN, but in a more simplified way. But beware, it does have it's limitations. Continue Reading
-
Tutorial
18 Oct 2004
Guide to Internet Protocol
In networking and communications, a protocol is the formal specification that defines the procedures that must be followed when transmitting or receiving data. Protocols define the format, timing, sequence, and error checking used on the network. There are hundreds of protocols out there, and it is impossible to list them all here. Instead, this 10-part series includes information on the most common TCP/IP networking protocols and will follow up with more specialized protocols in future articles. Continue Reading
-
Tutorial
16 Oct 2004
Protocols, Lesson 3: The Internet Protocol header
This article gives you a straight-to-the-point lesson on the IP header. Continue Reading
- Answer 14 Oct 2004
-
Tutorial
14 Oct 2004
Protocols, Lesson 5: Introduction to subnetting
We explain subnetting as simply as possible. Continue Reading
-
Tutorial
14 Oct 2004
Routing First-Step: Classless Internet addressing
Routing and Internet addressing are two important concepts involved in networking. Routing First-Step covers the basics of routing in clear, easy-to-understand language. Continue Reading
-
Tutorial
13 Oct 2004
Protocols, Lesson 6: IP subnetting - The basic concepts
Learn the basics of IP subnetting. Continue Reading
-
Tip
12 Oct 2004
Protocols, Lesson 7: Subnet masks and their effect
Understand the different effects a subnet mask can have. Continue Reading
- Answer 12 Oct 2004
-
Tutorial
11 Oct 2004
Protocols, Lesson 8: Subnetting analysis
We explain the available subnet masks and analyze a class C network using a specific subnet mask. Continue Reading
-
Tip
10 Oct 2004
Protocols, Lesson 9: Subnet routing and communications
Lesson 9 in our protocol series covers the communications side of subnetting. Continue Reading
-
Tutorial
07 Oct 2004
Routing First-Step: IP header format
Routing and Internet addressing are two important concepts involved in networking. Routing First-Step covers the basics of routing in clear, easy-to-understand language. Continue Reading
-
Tip
28 Sep 2004
MPLS - Preparing an RFP (Dos and Don'ts)
A look at the things to include in an RFP, a request for proposal for VPN service. Continue Reading
-
Answer
27 Sep 2004
Connecting two hosts with the same IP address but different subnet masks
Is it possible to communicate two hosts with the same IP address but different subnet mask without adding a router? Continue Reading
- Answer 27 Sep 2004
-
Tip
24 Sep 2004
Preventing Layer 2 security threats
Layer 2 switched environments, typically found in enterprise customer wiring closets, can be easy targets for network security attacks. Continue Reading
- Answer 22 Sep 2004
- Answer 21 Sep 2004
- Answer 21 Sep 2004
- Answer 21 Sep 2004
- Answer 09 Sep 2004
- Answer 31 Aug 2004
-
Answer
10 Aug 2004
What are the main challenges facing DNS management today?
What are the main challenges facing DNS management today? Continue Reading
-
Tip
10 Aug 2004
Run your VoIP calls over a VPN for enhanced security
A look at using a VPN to enhance VoIP security. Continue Reading
-
Answer
09 Aug 2004
Can you please explain how a DHCP server allocates IP addresses dynamically?
Learn how DHCP works in this Ask the Expert response from our networking fundamentals expert, Chris Partsenidis. Continue Reading
- Tip 06 Aug 2004
- Answer 05 Aug 2004
-
Answer
04 Aug 2004
Where to connect a switch -- Patch panel versus ports around the office
Is it possible to connect my switch directly to my patch panel rather than connecting the switch to the various ports around my office? Continue Reading
- Answer 04 Aug 2004
-
Tip
31 Jul 2004
MPLS - Label Switched Paths
A look at some of the details of working with Label Switched Paths (LSPs). Continue Reading
-
Tip
28 Jul 2004
Top 10 things to know about network administration
A list of the most important things network administrators should know. Continue Reading
-
Tip
26 Jul 2004
Router Expert: Understanding reverse telnet and IOS terminal lines
Learn how users interact with the terminal server and its connected devices through the use of reverse telnet, line and group rotaries, and terminal line interfaces. Continue Reading
-
Tutorial
26 Jul 2004
Five critical planning steps for wireless LANs, Step 5: Manageability -- Switching to WLAN switches
This article explains how WLAN switches will help to alleviate manageability issues. Continue Reading
- Answer 20 Jul 2004
- Answer 19 Jul 2004
- Answer 15 Jul 2004
-
Tip
09 Jul 2004
Deploying both a private and public WLAN
Lisa Phifer answers a reader's request for information about planning and deploying a wireless LAN -- one private and one public. Continue Reading
- Answer 06 Jul 2004
- Answer 30 Jun 2004
- Answer 25 Jun 2004
-
Tip
18 Jun 2004
Monitor your traffic with MRTG
The Multi Router Traffic Grapher is a free tool that can help you monitor the traffic on your network. Learn more here. Continue Reading
-
Tip
17 Jun 2004
WLAN implementation tutorial -- Capacity planning: Step 1
For WLAN implementation, make sure you have Step 1 down -- capacity planning, not just coverage. Continue Reading
-
Answer
15 Jun 2004
How can we increase our VPN connection speed?
We recently purchased a new software R&D system to allow our offices in New Jersey and Canada to link up. In order to secure the data we setup VPN's for every computer connecting to the server at the main office. Everyone who connects using a VPN is complaining that the connection is very sluggish even though they all use DSL or a cable modem. Can you please give me some insight into how I can help these users connect faster? Continue Reading
-
Tip
02 Jun 2004
The Network Life Cycle
Each phase of the NLC has its own requirements that can typically be met with a judicious selection of tools and assessment solutions. Continue Reading
- Tip 24 May 2004
-
Tip
23 May 2004
Router Expert: Implementing router interface redundancy
While redundancy is simple as a concept, it becomes quite problematic in practice. This tip offers the basic options for router interface redundancy. Continue Reading
- Answer 12 May 2004