Tips
Tips
-
The benefits of machine learning in network management
Enterprises and vendors alike are now undertaking machine learning deployment strategies. What are the benefits of machine learning in networking related to analysis and management tools? Continue Reading
-
How to plan for network disaggregation with APIs
Network disaggregation is a lot of work for engineers, and it's fraught with potential hurdles posed by sourcing hardware, a control plane, network operating system and how you manage necessary APIs. Continue Reading
-
Network subscription packages gain steam among enterprises
Networking suppliers are increasingly offering network subscription packages, as enterprises have become more familiar with paying for services with monthly subscriptions. Continue Reading
-
SD-WAN vs. MPLS: The quality-of-service comparison
Quality of service is often top of mind for IT leaders when debating SD-WAN vs. MPLS -- especially when it comes to using internet links for SD-WAN connectivity. Continue Reading
-
DNS functions remain vital, but must adapt as demands shift
The domain name system's tasks are simple, but essential, and the service faces challenges with the proliferation of devices that operate within IPv6 networks. Continue Reading
-
How IPv6 networks create DNS configuration problems
DNS data is among the most basic and crucial information required for network connectivity, but configuring DNS recursive servers in IPv6-only networks can pose challenges. Continue Reading
-
OK of 400 Gigabit Ethernet adds horsepower to data centers
Final approval of the 400 Gigabit Ethernet standard will provide data centers and cloud providers with the extra capacity they need to meet ever-rising data demands. Continue Reading
-
Three-step network strategy sells big changes as more doable
A three-pronged network strategy takes an evolutionary approach to selling revolutionary technology changes internally, with a bigger chance of success. Continue Reading
-
Existing branch routers could be replaced as SD-WAN matures
Enterprises are moving away from traditional branch routers, as SD-WAN capabilities mature and offer consolidated network functionality on a single device. Continue Reading
-
How networking can prepare for 5G mobile technology
An 'average Joe' engineer discusses the impact 5G mobile technology may bring to his operation as developments around the standard heat up. Continue Reading
-
How to make machine learning systems work in the network
Machine learning systems in networks are gaining acceptance, but our expert cautions that humans and APIs are still needed to keep complexity at bay. Continue Reading
-
Software-defined branch networks: Why and how to do them
Software networking virtualization has reached branch networks. Learn the whys and hows of creating the software-defined branch using the latest software networking technologies. Continue Reading
-
How your SD-WAN appliance can consolidate the branch stack
The latest SD-WAN appliance technology promises expanded and accelerated consolidation of branch stacks. Learn how it works and how to make it work for you. Continue Reading
-
Fog computing architecture posing challenges for IT
Fog computing architecture designs are gaining traction, as users demand accessibility to apps and services. But the approach can cause challenges for IT. Continue Reading
-
5G wireless technology influences telecommunication's future
The capabilities of 5G wireless technology and event-driven networking hold the promise for telecommunication's future, but solving the remaining challenges will determine the outcome. Continue Reading
-
Take network configuration management tools to the next level
Script management systems and intent-based networking are driving the future of network configuration management tools, shifting the paradigm of how networking systems are managed. Continue Reading
-
NFV disaggregates firewall appliance to increase scalability
A traditional firewall appliance can incorporate many services, but NFV can virtualize firewalls to offer individual services that scale for application requirements. Continue Reading
-
Looking ahead to the biggest 2018 tech trends in networking
The year ahead will force IT professionals to break out of their comfort zones and embrace 2018 tech trends that are reshaping the enterprise networking field. Continue Reading
-
Four telecom infrastructure trends driving network of the future
Four telecom infrastructure trends -- SDN, NFV, IoT and 5G -- are driving the network of the future, but telecom networks are more likely to transform in 2020, not 2018. Continue Reading
-
Automated networks mean clearing some key hurdles first
Obstacles facing IT adoption of automation in the network including training and trust. Now's the time to clear these hurdles and reap the benefits of an automated future. Continue Reading
-
Hyper-convergence gives new choice in network system management
Hyper-convergence is driving network evolution, but engineers need to consider the flexibility of network system management software and performance to ensure best results. Continue Reading
-
Need help making Wi-Fi secure? Consider some 'classic' approaches
Keeping your Wi-Fi secure is a challenge, to say the least. Security hasn't kept up with Wi-Fi advances, but there are steps you can take to keep your Wi-Fi network protected. Continue Reading
-
Network validation a first step to intent-based architecture
Network validation is an important first step for enterprises evaluating intent-based networking. Unless you know how things really work, you won't succeed. Continue Reading
-
Carrier cloud could create bigger roles in future for SDN and NFV
Increasing carrier cloud deployment could be the key that drives SDN and NFV technologies forward in the future of virtual networking -- not the other way around. Continue Reading
-
Comparison of popular technical SD-WAN service models
Two main SD-WAN service model options exist for users to choose from, but more could be on the way due to regulatory and industry development efforts. Find out what works for you in this comparison. Continue Reading
-
How to use traceroute to troubleshoot network problems
Traceroute is a tool that can provide more insight than you might think. Learn how to use traceroute to troubleshoot network issues. Continue Reading
-
Visions of software-defined branch begin to take hold
Software-based technologies can apply to the vision of a software-defined branch that converges network elements and centralizes management. But getting there will take time. Continue Reading
-
The story of SDN: Control planes, OpenFlow protocol and disaggregation
When discussing SDN, control planes and programmability are often lumped into the conversation -- along with a dose of OpenFlow protocol and disaggregation. Continue Reading
-
Open source network tools compete with shrinking vendor equipment
Vendor equipment consolidation could limit network operator service automation efforts, but new open source network tools offer options and prevent lock-in. Continue Reading
-
New options for managed network service providers benefit enterprises
SDN, NFV and SD-WAN are creating a new set of software-based offerings that managed network service providers can roll out to enterprises faster and at lower cost. Continue Reading
-
How to move to a network hybrid cloud architecture
Learn how to avoid network hybrid cloud architecture problems before a migration, and why uniformity and consistent performance are essential for success. Continue Reading
-
Telecom vendors feel the pressure of operator transformation plans
Changes in network operators' buying trends have rocked the status quo for telecom vendors, with pricing pressure, software and chants of 'no more lock-in' driving it home. Continue Reading
-
Open source network software matures, but needs incentives for use
Open source network software is maturing, but the networking industry needs to create compelling economic incentives for large suppliers and buyers to contribute, as well. Continue Reading
-
Why SDN, DevOps don't share automated network missions
SDN and DevOps may both have a role in automated network device management, but compared to SDN, DevOps has a completely different mission, our expert explains. Continue Reading
-
Layer 3 switches explained
Layer 3 switches are important in enterprise networks -- particularly in designs with many subnets and virtual LANs. What is a Layer 3 switch, what can it do for you, and how does it differ from a regular switch or router? Continue Reading
-
Managing apps essential in realizing their business value
Apps have taken center stage, but in order to exploit their value, enterprises have to find a way of managing apps that works best for them. Continue Reading
-
Status report 2017: NFV deployments grow; standards issues remain
Large service providers are continuing their NFV deployments, which will enable 5G wireless and IoT. But management, orchestration and standards questions remain. Continue Reading
-
How types of noise in data communication systems affect the network
Learn about the different types of noise in data communication -- including thermal, intermodulation, cross-talk, impulse and shot noise -- and how they can affect your network. Continue Reading
-
Software networking supports wide range of deployment use cases
Software networking includes elements of SDN, NFV and network virtualization, which have taken the industry by storm; it also supports advances like 5G wireless and hybrid cloud. Continue Reading
-
Cloud security tips to consider when mulling external data centers
The old security rules don't apply when moving workloads to the cloud. These cloud security tips will help you make the right decision. Continue Reading
-
New telecom transformation goals require service automation
Restarting a telecom transformation means putting business goals first and technology choices second, and making the service process more efficient through automation. Continue Reading
-
API growth forcing vendors to take notice or risk losing out
The API is fast becoming a must-have in modern networking. But API growth is forcing vendors to rethink how they want their devices to be configured and managed. Continue Reading
-
Mobile edge computing promises wide variety of uses
Mobile edge computing can bring applications and data closer to the end user, resulting in lower latency and better data analytics for network virtualization and IoT. Continue Reading
-
Network engineering tools changing as cloud shift pressures profession
As more companies examine the cloud, network engineering tools are changing, requiring engineers to rethink and recraft their job descriptions. Continue Reading
-
Four top products leading the way in multicloud management
In this multicloud review, see the top multicloud management products. How do they approach different cloud environments, and what separates them from each other? Continue Reading
-
Three advances making NFV deployments better for the business
NFV deployments made progress this year, thanks to three significant developments, but will they be enough to make NFV's business case more compelling among other industry changes? Continue Reading
-
Intent-driven networking reshaping network service delivery
When configuring a network, engineers often focus on individual tasks to enable network service delivery. Intent-driven networking transfers the focus to the overall network. Continue Reading
-
WAN access options multiply when buying network services
A new menu of WAN access options means companies have a wide variety of means to reach cloud and network services. But more choice also means more potential pitfalls. Continue Reading
-
The white box switching market gets a closer look
Following years of development, is the potential of the white box switching market finally being realized? Continue Reading
-
IP subnetting: How to calculate subnet masks
Check out IP subnetting shortcuts on how to do subnet mask calculations and break down IP address classes to route traffic within your network. Continue Reading
-
Comparing cable types: Fiber vs. copper twisted pair
What's the difference in fiber vs. copper cables? Key differences include cost, speed and more when it comes to fiber optic and copper twisted-pair cabling options. Continue Reading
-
WAN-cloud eXchange extends the private WAN to the cloud
Enterprises can reap cloud benefits while relieving concerns about security and reliability with a WAN-cloud eXchange, or WAN-CX. Continue Reading
-
When will SD-WANs 'cross the chasm'?
It can be difficult to separate hype from reality, especially when it comes to SDN technology. Here, analyst Jim Metzler explores when software-defined WANs might go mainstream. Continue Reading
-
Business is 'destroying' the application delivery process
Business has changed, and so must the application delivery process. It's time for IT to go from being provider of services to a broker between clouds and end users. Here's how. Continue Reading
-
Discover three ways to get your WAN software defined
There are three ways to get your WAN software defined: overlay, replace and as a service. Learn what these entail and how they can reduce costs and improve WAN performance. Continue Reading
-
How to troubleshoot iPhone and iPad connection problems
As iPhone and iPad Wi-Fi clients proliferate in the enterprise, IT must troubleshoot Wi-Fi connection problems. Here's how to solve basic iPhone and iPad connection problems. Continue Reading
-
IPv6 connectivity: Ignore at your own peril
Gathering knowledge on IPv6 connectivity and implementation is critical to success in modern IP networking. Continue Reading
-
Predictions for SDN development in 2016
This promises to be an exciting year for software-defined networking enthusiasts, with SDN development poised for explosive growth. Analyst John Burke shares his predictions. Continue Reading
-
Common network errors and their causes
Network not behaving? Learn how to identify the most common network errors -- like discards and collisions -- and how to implement solutions to get your network humming again. Continue Reading
-
Are you ready for an SDN deployment?
The principal motivation behind SDN deployments is the need for a responsive and nimble IT organization. While the network architecture is definitely in the future, not all are ready for it. Continue Reading
-
How to troubleshoot Android Wi-Fi connection problems
Android smartphone and tablet users now abound in the enterprise, making Android Wi-Fi connection troubleshooting a key element of enterprise wireless network connection management. Continue Reading
-
Persuading management to support the IT buying process
What steps should you take to get your network buying needs approved by top management? One piece of advice: Learn what your manager needs. Continue Reading
-
Time to get your cloud network architecture ready
Enterprises need to ensure their cloud network architecture is ready for the future. Here are some concepts network managers should think about. Continue Reading
-
Is a hybrid WAN architecture right for you?
Hybrid WANs have a lot of benefits, but make sure you understand how they can work in your organization. Continue Reading
-
Do managed software-defined WAN services make sense?
By offering managed software-defined WAN services -- and potentially hastening MPLS' demise -- are providers sabotaging themselves? Our expert says no. Continue Reading
-
OPM hack two months later: What was learned?
Network security expert Michele Chubirka shares her thoughts about June's OPM hack and what steps IT should take to fend off future attacks. Continue Reading
-
Three ways to measure wireless network performance
Trying to find ways to assess your wireless network performance? Here are some tools that can help. Continue Reading
-
With MPLS-TP and SDN, a simpler dynamic control plane
MPLS-TP transforms carrier networks for packet switching, but SDN could take it a step further. Combining the technologies, engineers could reduce complexity in the dynamic control plane and gain flexible service creation. Continue Reading
-
Network timing: Everything you need to know about NTP
As more applications use IP networks, reliable distribution of authoritative timing information is becoming critical. Continue Reading
-
GENEVE primer: The answer to network virtualization interoperability?
The GENEVE network encapsulation protocol is more flexible than VXLAN and NVGRE. Will it bring interoperability to network virtualization overlays? Continue Reading
-
How to buy: Assessing next-gen firewalls
Is there a next-gen firewall in your future? Our How to Buy guide offers advice you need to ensure you purchase the best platform to meet your needs. Continue Reading
-
Don't ignore this great wireless training resource
Online wireless support communities are a great resource for IT professionals who need their questions answered quickly. Continue Reading
-
Hyper-V networking: The three virtual switches that fuel connectivity
In this Hyper-V networking primer, learn about the three virtual switches behind Microsoft virtualization connectivity. Continue Reading
-
Centralized vs. decentralized SDN architecture: Which works for you?
Two SDN architecture models -- centralized and decentralized -- have much in common, but key differences center on the use of the OpenFlow protocol. Continue Reading
-
Using virtual appliances and desktop virtualization
IT organizations are implementing desktop virtualization and virtual appliances for virtual WAN optimization and virtual application delivery, but there are challenges to overcome along the way. Continue Reading
-
Troubleshooting remote scripting using Network Monitor 3.0 -- Managing Windows networks using script
Learn how to use Network Monitor 3.0 for troubleshooting a remote scripting error in this tip originally published on WindowsNetworking.com. Continue Reading
-
Optical networks: Core network design best practices
Core optical network design must take into consideration network requirements specific to the core, including a high degree of aggregation, low reconfigurability, and large geographic scope, while confronting such challenges as router adjacency, ... Continue Reading
-
Cisco wireless access point configuration from scratch
Learn what the Cisco 1242 wireless access point can do for you and how to configure one from scratch. This tip covers basic security settings, enabling the wireless radios, and how to make a successful connection. The 1242AG is a powerful ... Continue Reading
-
Cisco WLAN design best practices
Wireless LAN (WLAN) technology has built-in security features, but a one-size-fits-all approach won't ensure adequate security for your organization. This tip provides best practices for designing your security architecture, including user community... Continue Reading
-
MPLS load sharing and high availability, Part 2: IP routing
MPLS has become a trusted transport option for convergent networks that require guaranteed levels of service, but successful implementation can require increased levels of redundancy to support failover. Robbie Harrell discusses how to enable high ... Continue Reading
-
LAN administration guide
LAN administration is an arduous task and your responsibilities often involve many different aspects and may include many tasks. This guide will help you with each step and task. Continue Reading
-
IP addressing and subnetting: Calculate a subnet mask using the subnet's formula
IP addressing and subnetting are an important part of networks. Learn how the subnet's formula works and why it's important to know how to calculate the subnet mask "longhand." Continue Reading
-
How IPsec provides secure communications
IPsec provides secure site-to-site VPNs, remote access and host-to-host communication. In this tip, we peek inside the tunnel and examine how IPsec works. Continue Reading
-
VPN client alternatives: Layer 2 Tunneling Protocol (L2TP) over IPsec
This month, Lisa Phifer discusses a robust VPN client alternative: Layer 2 Tunneling Protocol (L2TP) over IPsec. Continue Reading
-
Network test plan: Checklist for architecture changes
For every change you make to your network architecture, you should have a test plan and a backout plan. In this tip, learn how to build a test plan and review a sample checklist of things to include. Continue Reading
-
How SSL and TLS secure network transactions
SSL and TLS are protocols that were developed primarily to protect Web transactions, but they can be used to protect any type of network traffic that utilizes TCP at the transport layer, including the popular SSL VPN. In this tip, learn how SSL and ... Continue Reading
-
Router Expert: Building a WLAN proxy server, DHCP services: Part 1
Router expert Michael Martin discusses DHCP implementation options and provides sample configurations to support various SSID network models in this continuation of his series on building a WLAN proxy server. Continue Reading
-
OSI: Securing the stack, Layer 2 -- Understanding the role of ARP
Security expert Michael Gregg continues his layer-by-layer discussion of OSI model network security with this tip on the vulnerabilities present in Layer 2, the Data Link Layer, and specifically addresses the Address Resolution Protocol. Continue Reading
-
How round-trip time and limiting data rate impact network performance
This tip reviews how network parameters such as round-trip time and limiting data rate affect network performance. Continue Reading
-
OSI: Securing the stack, Layer 1 -- Physical security threats
Security expert Michael Gregg kicks off his layer-by-layer discussion of OSI model network security with this tip on securing Layer 1 against physical security threats. Continue Reading
-
Duplex mismatch
What is duplex, and what is the difference between half and full duplex? What is a duplex mismatch? How can autonegotiation help or hurt your network? How can you resolve duplex conflicts? In this tip, David Davis helps networking engineers and ... Continue Reading
-
IPSec and NAT incompatibility
Learn why Authentication Header (AH) doesn't work with Network Address Translation (NAT) or Port Address Translation (PAT) and that Encapsulating Security Payload (ESP) is also incompatible with PAT. Continue Reading
-
VPNs for disaster recovery: IPsec vs. SSL
Using a VPN as a failover mechanism when a primary communications link may be unavailable due to a disaster can be a smart move -- as well as an easy one to implement. In this tip, learn about the pros and cons of IPsec and SSL VPN options for ... Continue Reading
-
Troubleshooting wireless networks: A systematic approach
Troubleshooting wireless networks can take up a lot of time for network operations staff with a wireless LAN (WLAN) environment. Wireless guru Lisa Phifer discusses the tools and processes involved and breaks down how to approach and resolve ... Continue Reading
-
DNS for a wireless network: Router Expert
DNS services are essential for building a secure wireless LAN. Our Router Expert provides complete instructions for setting up a DNS server, including implementing BIND, configuring a non-authoritative server and creating zone files. Continue Reading
-
T1 vs. VoIP for branch office connectivity
Learn how to decide between a T1, fractional T1 and VoIP for connecting branch offices. Continue Reading
-
WAN optimization and bottlenecks: Is the WAN really the weakest link?
"How much traffic" is no longer a good enough measure of WAN bandwidth. In this tip, Carrie Higbie looks at how today's ever-increasing expectations for data transfer rates require increased attention to WAN optimization, and suggests how ... Continue Reading
-
Duplex mismatch: Why duplex conflicts plague the network, part 1
Duplex mismatch problems -- caused by two ends of the Ethernet attempting a full-duplex connection, resulting in packet loss -- simply will not go away. After a decade of plaguing IP networks, duplex conflicts still seem to be the single worst ... Continue Reading
-
Security and the TCP/IP stack
Each layer of TCP/IP has security mechanisms, protocols, and applications. This tip describes the more popular ones that are associated with each layer of TCP/IP. Continue Reading
-
How to move an SSL certificate between Exchange servers
SearchExchange.com contributor Serdar Yegulalp provides step-by-step instructions on how to move an SSL certificate from one Exchange server to another, and explains a couple of gotchas to watch out for during the process. Continue Reading