Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
What layer of the OSI model does a hub operate at?
How do I control Internet bandwidth per IP on my LAN?
Tips on working with VLSM
Variable Length Subnet Masks (VLSM) can require some serious number crunching but there are many ways to help make the process simpler. Continue Reading
-
Can features such as VPN pass-through on routers be abused to dump traffic onto a NAT'd LAN?
MPLS Versus IPSEC VPNs: Which one is right for you
An examination of the similarities and differences between IPSEC and MPLS and some insight as to when one should be used over the other. Continue Reading
How do the clients in a WLAN communicate with the AP (Access Point) based on IP in the Network Layer
Combining VPN and WLAN technologies
WLAN security: Beyond the VPN
Wired networks have used virtual private networks (VPNs) to secure transactions across this edge, but this approach has its limitations.Continue Reading
How do I evaluate the performance of a LAN setup?
Restricting access between two LANs
-
What are the top five companies that are providing enterprise level WLAN products and solutions?
What does the twist in the Cat5 cable do?
How does the sender of a data packet know the IP address of the receiver? Part 1
How many different kinds of LAN cards are there?
What is required to implement SSL with encryption for TN3270 session on CS for OS/390 V2R10?
What determines the speed of a LAN that consists of 10 Mbps and 100 Mbps devices?
Guidelines for designing a LAN
Before you start designing a network, you must identify what the company needs are. This guide will help you through the process and make sure you don't overlook any important details.Continue Reading
What is the maximum length of a cable in a local LAN set up?
Is there a minimum length for a CAT5 patch cable?
Preventive maintenance' procedures for WANs
What is dual band in WLAN?
Using SSL to secure wireless LAN traffic
Can I route between two subnets using a layer 3 switch?
WLAN security checklist
WLAN security checklistContinue Reading
Standard for bandwidth utilization over WAN circuit
Interframe spacing in wireless network
Should you use a voice VLAN
Advantages and disadvantages of using a voice VLAN.Continue Reading
The VPN Expert: VPN client alternatives, part 4 -- IPsec
Here's a list of IPsec clients that run on many systems. See what they have to offer and what they are often missing.Continue Reading
LAN addressing
LAN addressingContinue Reading
Best topology for LAN
Conflict between LAN and WAN on home network
Features and benefits of the VLAN
LAN design process?
Wireless LAN requirements
Thinking of going wireless? Find out what you need to consider in planning for a wireless network.Continue Reading
Protecting the LAN from lightning strikes
The importance of the subnet mask