Home > Articles > Networking > Network Administration & Management

Network Administration & Management

74 Items

Sort by Date | Title

Diary of a Network Administrator: Planning for Success
Feb 28, 2003
In this diary entry, Joseph Phillips details his planning process for his client's network, servers, and rats.
Diary of a Network Administrator: Project Management
Oct 18, 2002
Far too often, projects spin out of control due to a lack of vision, planning, and technical leadership. In this network administrator diary entry, Joseph Phillips discusses the importance of project management.
Diary of a Network Administrator: The Project Launch
Sep 20, 2002
In this series, Joseph Phillips opens his diary for look into the life of network administrator. In this article covering the project launch, he shares his nightmare experience while creating a network plan for a new client.
Forming and Managing an Incident Response Team
Mar 22, 2002
This sample chapter delves into forming and managing an incident response team - what a response team is, the rationale for forming an incident response team, major issues that must be addressed, and special management considerations.
Getting Data from Here to There: How Computers Share Data
Jul 16, 2004
Matt Hayden and Joe Habraken provide a brief run-down of the four most common types of network topologies: Ethernet, Token Ring, FDDI, and ATM. A Q&A section at the end provides answers to common questions about these topologies.
Host Intrusion Prevention Systems: Defense-in-Depth's Best Friend
Jul 1, 2005
Chad Sullivan takes a look at common security issues and how host Intrusion Prevention Systems (IPS) can become the most crucial piece of your corporate layered security plan.
Imaging for Intel Macs Part 1: Why Intel Macs Increase an Administrator's Workload and How Best to Manage Their Deployment
Jul 28, 2006
Deploying Intel Macs can add extra work for administrators because they require completely different Mac OS X releases and system images than Power PC Macs. Although it is possible to cobble a universal Mac OS X image together, is doing so really the best choice? In this first article in a two-part series, Ryan Faas looks at some of the specific challenges that relate to developing deployment strategies for Intel Macs and some of the ongoing issues if you opt to deploy a dual-platform environment using Mac workstations.
Importing and Exporting Windows Network Settings
Jun 14, 2010
Need to back up or distribute your network settings? Eric Geier shows how to work with your wireless profiles, TCP/IP configuration, and 802.1X authentication settings.
Interconnecting Data Centers Using VPLS: Data Center Layer 2 Interconnect
Jun 24, 2009
This chapter provides an overview of high availability (HA) clusters, legacy deployment models for interconnecting data centers, and problems related to extending Layer 2 networks.
Introduction to Networking, Network Administration, and NetWare 6.5
Apr 15, 2005
The first thing you need to do as you begin your NetWare 6.5 journey is to briefly look at the historical roots of NetWare 6.5. This chapter looks at some of the new features of NetWare 6.5 and how Novell has classified some of these features and services. It also examines how NetWare 6.5 interacts with other operating systems.
IP Routing: From Basic Principles to Link State Protocols
Mar 29, 2002
Control network traffic by learning the routing protocols and mechanisms that build and maintain route information.
Is it Geek City Yet? Philadelphia, City-Wide Wi-Fi, and the Digital Inclusion Project
Jul 8, 2005
When "no child left behind" becomes "no household without Internet access," how will cities be affected? Who foots the bill? And how does the mechanism of government keep from hopeless entanglement with the objectives of the telecom industry? Sheryl Simons presents a fascinating tale of one big city's quest for the future: Wireless Philadelphia.
J2EE Naming and Directory Services
Aug 6, 2004
Java Naming and Directory Interface (JNDI) can be used for much more than simply finding resources stored by your J2EE server. Find out how much more in this sample chapter on JNDI in Java 2, Enterprise Edition.
Learn Host-Based Intrusion Detection
Apr 5, 2002
Follow the step-by-step examples to learn how to use five major host-based intrusion detection tools: TCP Wrappers, xinetd, Tripwire, Swatch, and PortSentry.
Logs and Monitoring in Apache
Aug 4, 2006
Apache provides extensive facilities for recording information about every aspect of a request. This chapter covers the most common issues found when logging requests, such as conditional logging, log rotation, resolution of IP addresses, and piped logging. It also covers a number of bundled and third-party modules and utilities for monitoring the status of your Apache server and to analyze its logs.
Make the Right Call: Cisco's AVVID
Jun 21, 2002
Robert Richardson discusses the pros and cons of Cisco's AVVID — what the industry's been talking about all along for pure IP convergence: smart IP phones plugged into an Ethernet network full of conventional switches and routers. Plenty of issues need to be ironed out, though.
Managing Disk Partitions Over the Network with Ghost Corporate Edition
Oct 31, 2003
System administrators often need to deploy images to multiple machines, or they want to make and send images (including system images) to machines over a network. Daniel Dern explains the process using Symantec Ghost Corporate Edition as a solution.
Managing Large Networks: Problems and Solutions
Oct 17, 2003
This chapter focuses on major issues of managing large networks, including bringing the managed data to the code, scalability, the shortage of development skills for creating management systems, and the shortage of operational skills for running networks.
Monitoring Tools
Jul 13, 2001
Pat Eyler covers two of the best free tools for monitoring your Linux network[md]Ethereal and mon.
NASCAR Tech Habits Stress Data Sharing And Security Best Practices
Jul 21, 2006
Have you dreamed of getting behind the wheel of a 750-horsepower stock car and taking charge of the race? If you're responsible for protecting and maintaining the data-sharing capabilities of your organization, you're already in the driver's seat. Erik Eckel explains how we can learn some lessons from the speedy racers of the NASCAR set.

< Prev Page 1 2 3 4 Next >