Tips
Tips
Network infrastructure
-
Three advances making NFV deployments better for the business
NFV deployments made progress this year, thanks to three significant developments, but will they be enough to make NFV's business case more compelling among other industry changes? Continue Reading
-
WAN access options multiply when buying network services
A new menu of WAN access options means companies have a wide variety of means to reach cloud and network services. But more choice also means more potential pitfalls. Continue Reading
-
The white box switching market gets a closer look
Following years of development, is the potential of the white box switching market finally being realized? Continue Reading
-
IP subnetting: How to calculate subnet masks
Check out IP subnetting shortcuts on how to do subnet mask calculations and break down IP address classes to route traffic within your network. Continue Reading
-
Comparing cable types: Fiber vs. copper twisted pair
What's the difference in fiber vs. copper cables? Key differences include cost, speed and more when it comes to fiber optic and copper twisted-pair cabling options. Continue Reading
-
IPv6 connectivity: Ignore at your own peril
Gathering knowledge on IPv6 connectivity and implementation is critical to success in modern IP networking. Continue Reading
-
Predictions for SDN development in 2016
This promises to be an exciting year for software-defined networking enthusiasts, with SDN development poised for explosive growth. Analyst John Burke shares his predictions. Continue Reading
-
Common network errors and their causes
Network not behaving? Learn how to identify the most common network errors -- like discards and collisions -- and how to implement solutions to get your network humming again. Continue Reading
-
Are you ready for an SDN deployment?
The principal motivation behind SDN deployments is the need for a responsive and nimble IT organization. While the network architecture is definitely in the future, not all are ready for it. Continue Reading
-
Persuading management to support the IT buying process
What steps should you take to get your network buying needs approved by top management? One piece of advice: Learn what your manager needs. Continue Reading
-
Three ways to measure wireless network performance
Trying to find ways to assess your wireless network performance? Here are some tools that can help. Continue Reading
-
With MPLS-TP and SDN, a simpler dynamic control plane
MPLS-TP transforms carrier networks for packet switching, but SDN could take it a step further. Combining the technologies, engineers could reduce complexity in the dynamic control plane and gain flexible service creation. Continue Reading
-
GENEVE primer: The answer to network virtualization interoperability?
The GENEVE network encapsulation protocol is more flexible than VXLAN and NVGRE. Will it bring interoperability to network virtualization overlays? Continue Reading
-
Don't ignore this great wireless training resource
Online wireless support communities are a great resource for IT professionals who need their questions answered quickly. Continue Reading
-
Hyper-V networking: The three virtual switches that fuel connectivity
In this Hyper-V networking primer, learn about the three virtual switches behind Microsoft virtualization connectivity. Continue Reading
-
Centralized vs. decentralized SDN architecture: Which works for you?
Two SDN architecture models -- centralized and decentralized -- have much in common, but key differences center on the use of the OpenFlow protocol. Continue Reading
-
Using virtual appliances and desktop virtualization
IT organizations are implementing desktop virtualization and virtual appliances for virtual WAN optimization and virtual application delivery, but there are challenges to overcome along the way. Continue Reading
-
Optical networks: Core network design best practices
Core optical network design must take into consideration network requirements specific to the core, including a high degree of aggregation, low reconfigurability, and large geographic scope, while confronting such challenges as router adjacency, ... Continue Reading
-
Cisco wireless access point configuration from scratch
Learn what the Cisco 1242 wireless access point can do for you and how to configure one from scratch. This tip covers basic security settings, enabling the wireless radios, and how to make a successful connection. The 1242AG is a powerful ... Continue Reading
-
Cisco WLAN design best practices
Wireless LAN (WLAN) technology has built-in security features, but a one-size-fits-all approach won't ensure adequate security for your organization. This tip provides best practices for designing your security architecture, including user community... Continue Reading
-
MPLS load sharing and high availability, Part 2: IP routing
MPLS has become a trusted transport option for convergent networks that require guaranteed levels of service, but successful implementation can require increased levels of redundancy to support failover. Robbie Harrell discusses how to enable high ... Continue Reading
-
LAN administration guide
LAN administration is an arduous task and your responsibilities often involve many different aspects and may include many tasks. This guide will help you with each step and task. Continue Reading
-
IP addressing and subnetting: Calculate a subnet mask using the subnet's formula
IP addressing and subnetting are an important part of networks. Learn how the subnet's formula works and why it's important to know how to calculate the subnet mask "longhand." Continue Reading
-
Network test plan: Checklist for architecture changes
For every change you make to your network architecture, you should have a test plan and a backout plan. In this tip, learn how to build a test plan and review a sample checklist of things to include. Continue Reading
-
Router Expert: Building a WLAN proxy server, DHCP services: Part 1
Router expert Michael Martin discusses DHCP implementation options and provides sample configurations to support various SSID network models in this continuation of his series on building a WLAN proxy server. Continue Reading
-
OSI: Securing the stack, Layer 2 -- Understanding the role of ARP
Security expert Michael Gregg continues his layer-by-layer discussion of OSI model network security with this tip on the vulnerabilities present in Layer 2, the Data Link Layer, and specifically addresses the Address Resolution Protocol. Continue Reading
-
OSI: Securing the stack, Layer 1 -- Physical security threats
Security expert Michael Gregg kicks off his layer-by-layer discussion of OSI model network security with this tip on securing Layer 1 against physical security threats. Continue Reading
-
Duplex mismatch
What is duplex, and what is the difference between half and full duplex? What is a duplex mismatch? How can autonegotiation help or hurt your network? How can you resolve duplex conflicts? In this tip, David Davis helps networking engineers and ... Continue Reading
-
Troubleshooting wireless networks: A systematic approach
Troubleshooting wireless networks can take up a lot of time for network operations staff with a wireless LAN (WLAN) environment. Wireless guru Lisa Phifer discusses the tools and processes involved and breaks down how to approach and resolve ... Continue Reading
-
DNS for a wireless network: Router Expert
DNS services are essential for building a secure wireless LAN. Our Router Expert provides complete instructions for setting up a DNS server, including implementing BIND, configuring a non-authoritative server and creating zone files. Continue Reading
-
Security and the TCP/IP stack
Each layer of TCP/IP has security mechanisms, protocols, and applications. This tip describes the more popular ones that are associated with each layer of TCP/IP. Continue Reading
-
IEEE 802.3at: Power over Ethernet plus
802.3af Power over Ethernet (PoE) has been widely adopted for powering VoIP phones, wireless access points and a number of other network-connected products. But it provides a limited amount of power. In this tip, David Jacobs investigates the latest... Continue Reading
-
Content Delivery Networking: an introduction
Doug Downer gives an overview of Content Delivery Network (CDN) technology and its components, which bring together the functionality of file access, caching, multimedia delivery and application processing. Continue Reading
-
Configuring and troubleshooting wireless LAN clients
An understanding of wireless LAN (WLAN) client and WLAN access point communication mechanisms is critical to anyone attempting to initially connect or troubleshoot a WLAN connection. In this tip, Robbie Harrell discusses some of the issues that can ... Continue Reading
-
Securing your Layer 2 network: Don't overlook the basics
Before dropping substantial cash on a fancy surveillance system, most sensible home owners would ensure that their doors and windows were locked. Similarly, there are simple security measures you can take to configure your systems for Layer 2 ... Continue Reading
-
IP network design, part 4: LAN design
This final section of the IP network design series relates to the issues encountered with campus LAN design. The benefits of Ethernet switching over a traditional hub environment are first explained. The motivation behind the deployment of virtual ... Continue Reading
-
Implementing software restriction policies
This tip explains how you can use software restriction policies to keep your workstations in pristine shape and cut down on help desk calls at the same time. Continue Reading
-
Router Expert: Initial configuration of a Cisco 1200 802.11g WLAN access point
Our router expert continues his series on building a secure wireless LAN with a Linux base. This article explains how to utilize a single Cisco 1200 series access point to provide access to three different IP network segments using VLANs and ... Continue Reading
-
LAN connectivity problem: Blame DNS, NIC or firewall?
ITKnowledge Exchange member "BinooDas1234" had connectivity issues with a troublesome LAN, and fellow techies jumped in to help out. But does the answer lie in the DNS configuration, the NIC drivers or elsewhere? Here is a portion of the ... Continue Reading
-
IP network design, part 2: The IP addressing plan
The IP addressing plan is the foundation upon which a successful logical design is built. Part two of this tip explains how to formulate a scalable IP addressing plan that can support the network as it grows. Continue Reading
-
IP network design, part 1: Fundamental principles
A competent network design is the foundation upon which all successful network implementations are built. This is the first of four articles that focus on the design of IP-based networks, due to the prevalence of IP as the de-facto standard desktop ... Continue Reading
-
Making sense of Windows routing tables
When routing packets across a network, things do occasionally go wrong. In these situations, it is helpful to be familiar with the Windows routing tables. Routing tables dictate the flow of packets from the machine in question. This tip will show ... Continue Reading
-
Router numbers
Many of the routing protocols implemented in Cisco's IOS require a number to follow the command that enables the routing protocol in question. If you're new to routing, these numbers can be a little confusing, as they mean something different to ... Continue Reading
-
Wireless LAN security: 802.11i
What is 802.11i, and is it really practical for you to implement in your organization? Robbie Harrell explores how the new wireless standard can improve security -- and reasons why you may want to switch to 802.11i or stick with WPA. Continue Reading
-
Router Expert: Building VLAN interfaces in Linux and IOS
Segmenting a wireless LAN with VLANs can increase security. Find out from our router expert how to support VLAN interfaces in Linux and Cisco IOS. Continue Reading
-
Router Expert: Building 802.11Q VLANs
Network segmentation can be a great way to increase security. This article covers segmenting with VLANs and the 802.1Q standard. Continue Reading
-
The network administrator's guide to forensic first response
The time between discovery of an incident and the handover of digital evidence is critical for the possibility of successful evidence retrieval. Mishandled evidence, whether to be used in court or solely in house, can damage the integrity of the ... Continue Reading
-
Router Expert: Standard interface configuration for a WLAN proxy server
Our router expert continues his series on building a secure WLAN with a Linux base. This article covers standard interface configuration of the http proxy server. Continue Reading
-
Wireless LAN deployment and federal regulations
A look at the bare minimum requirements to keep your WLAN compliant with federal regulations. Continue Reading
-
Secure WLAN best practices and topology
Expert Michael Martin provides a list of wireless security "dos and don'ts" and a sample topology for a secure WLAN. Continue Reading
-
Router Expert: Filtering with MAC addresses
This month our router expert discuss some strategies for controlling host network access using MAC address filtering. Continue Reading
-
Focus Windows port scanning with the netscan command
How to use the netscan command to focus Windows port scanning. Continue Reading
-
Minimizing Layer 2 problems
Understanding the fundamentals of Spanning Tree Protocol. Continue Reading
-
Auto-MDIX
How Auto-MDIX can solve the cross-over cable conundrum. Continue Reading
-
Protocols, Lesson 7: Subnet masks and their effect
Understand the different effects a subnet mask can have. Continue Reading
-
Protocols, Lesson 9: Subnet routing and communications
Lesson 9 in our protocol series covers the communications side of subnetting. Continue Reading
-
Preventing Layer 2 security threats
Layer 2 switched environments, typically found in enterprise customer wiring closets, can be easy targets for network security attacks. Continue Reading
-
Top 10 'show' commands
A list of the top ten 'show' commands. Continue Reading
-
Top 10 things to know about network administration
A list of the most important things network administrators should know. Continue Reading
-
Router Expert: Understanding reverse telnet and IOS terminal lines
Learn how users interact with the terminal server and its connected devices through the use of reverse telnet, line and group rotaries, and terminal line interfaces. Continue Reading
-
Deploying both a private and public WLAN
Lisa Phifer answers a reader's request for information about planning and deploying a wireless LAN -- one private and one public. Continue Reading
-
WLAN implementation tutorial -- Capacity planning: Step 1
For WLAN implementation, make sure you have Step 1 down -- capacity planning, not just coverage. Continue Reading
-
Router Expert: Implementing router interface redundancy
While redundancy is simple as a concept, it becomes quite problematic in practice. This tip offers the basic options for router interface redundancy. Continue Reading
-
OSPF configuration
Nuances of OSPF configuration could impact your network more than you expect. Continue Reading
-
Learning Guide: Voice over IP basics
This guide contains all the VoIP basics and essentials you will need when implementing an IP telephony network. Continue Reading
-
Router Expert: Cisco asynchronous serial support
Cisco IOS-based routers support three asynchronous serial interface types: Console, Auxiliary, and asynchronous port modules. This tip compares them. Continue Reading
-
Tips on working with VLSM
Variable Length Subnet Masks (VLSM) can require some serious number crunching but there are many ways to help make the process simpler. Continue Reading
-
WLAN security checklist
WLAN security checklist Continue Reading
-
Should you use a voice VLAN
Advantages and disadvantages of using a voice VLAN. Continue Reading
-
LAN addressing
LAN addressing Continue Reading
-
Wireless LAN requirements
Thinking of going wireless? Find out what you need to consider in planning for a wireless network. Continue Reading
-
The importance of the subnet mask