Home > Articles > Networking > Network Administration & Management

Network Administration & Management

RSS Feed Subscribe to this topic  RSS details

74 Items

Sort by Date | Title

Logs and Monitoring in Apache
By Daniel Lopez, Jesus Blanco
Aug 4, 2006
Apache provides extensive facilities for recording information about every aspect of a request. This chapter covers the most common issues found when logging requests, such as conditional logging, log rotation, resolution of IP addresses, and piped logging. It also covers a number of bundled and third-party modules and utilities for monitoring the status of your Apache server and to analyze its logs.
Imaging for Intel Macs Part 1: Why Intel Macs Increase an Administrator's Workload and How Best to Manage Their Deployment
By Ryan Faas
Jul 28, 2006
Deploying Intel Macs can add extra work for administrators because they require completely different Mac OS X releases and system images than Power PC Macs. Although it is possible to cobble a universal Mac OS X image together, is doing so really the best choice? In this first article in a two-part series, Ryan Faas looks at some of the specific challenges that relate to developing deployment strategies for Intel Macs and some of the ongoing issues if you opt to deploy a dual-platform environment using Mac workstations.
NASCAR Tech Habits Stress Data Sharing And Security Best Practices
By Erik Eckel
Jul 21, 2006
Have you dreamed of getting behind the wheel of a 750-horsepower stock car and taking charge of the race? If you're responsible for protecting and maintaining the data-sharing capabilities of your organization, you're already in the driver's seat. Erik Eckel explains how we can learn some lessons from the speedy racers of the NASCAR set.
Backup Basics Part 3: General Tips for a Backup Strategy
By Ryan Faas
Jul 14, 2006
Knowing how to configure backup applications and select backup media is half the battle of designing a successful backup strategy. The other half is choosing how and when to back up the specific pieces of data that are stored on your servers, share points, and workstations. In this final article of his series on backup basics for new technicians and administrators, Ryan Faas offers some suggestions to help you make these important decisions.
Backup Basics Part 2: Demystifying Backup Media
By Ryan Faas
Jun 30, 2006
In part two of a three-part series on backup basics, Ryan Faas continues to demystify backup options for new technicians and server/systems administrators. This time, the topic is choosing the media in which to store your backups. Find out the pros and cons of tape, hard drives, and RAID arrays; using network storage; and archiving using CDs or DVDs.
Backup Basics Part 1: Demystifying Server and Workstation Backup Methods
By Ryan Faas
Jun 16, 2006
Understanding the options for backing up servers and workstations is important for any technician or system/server administrator. But for new IT staff, all the details about how backups work and how to configure them can be confusing. In this first article in a three-part series, Ryan Faas demystifies the various types of backups that can be performed on servers and workstations using most backup applications.
A Network Administrator's View of Multiservice Networks
By Robert Wood
Dec 9, 2005
Multiservice networks provide more than one distinct communications service type over the same physical infrastructure. Multiservice implies not only the existence of multiple traffic types within the network, but also the ability of a single network to support all of these applications without compromising quality of service (QoS) for any of them. This chapter covers multiservice networks in detail from the network administrator's viewpoint.
An Overview of the syslog Protocol
By Anand Deveriya
Dec 1, 2005
This chapter presents an overview of the syslog protocol and shows you how to deploy an end-to-end syslog system. You'll learn about the syslog architecture as well as the issues in deploying syslog servers in Linux and Windows OSs with a focus on their relevance in a Cisco environment.
Authentication Auditing in Windows 2000
By Rick Cook
Jul 29, 2005
Authentication auditing is an essential part of protecting your Windows computers from intrusion. The big problem in Windows auditing is trying to understand what's going on, without drowning in a flood of irrelevant or useless information. If you let it do so, Windows will bury you in event notifications. Figuring out what's going on from those notifications can be a real chore. Rick Cook provides specific suggestions to start making your auditing process more informative.
Understanding Networking Components and Devices for the Network+ Exam
By Mike Harwood
Jul 29, 2005
This chapter covers the various networking devices used in modern networks with an eye toward passing the Network+ Exam. Sample questions with detailed answers are included to help you practice.
Is it Geek City Yet? Philadelphia, City-Wide Wi-Fi, and the Digital Inclusion Project
By Sheryl P. Simons
Jul 8, 2005
When "no child left behind" becomes "no household without Internet access," how will cities be affected? Who foots the bill? And how does the mechanism of government keep from hopeless entanglement with the objectives of the telecom industry? Sheryl Simons presents a fascinating tale of one big city's quest for the future: Wireless Philadelphia.
Host Intrusion Prevention Systems: Defense-in-Depth's Best Friend
By Chad Sullivan
Jul 1, 2005
Chad Sullivan takes a look at common security issues and how host Intrusion Prevention Systems (IPS) can become the most crucial piece of your corporate layered security plan.
Introduction to Networking, Network Administration, and NetWare 6.5
By Warren E. Wyrostek
Apr 15, 2005
The first thing you need to do as you begin your NetWare 6.5 journey is to briefly look at the historical roots of NetWare 6.5. This chapter looks at some of the new features of NetWare 6.5 and how Novell has classified some of these features and services. It also examines how NetWare 6.5 interacts with other operating systems.
Creating a Fault-Tolerant Environment in Windows Server 2003
By Ed Roberts, Andrew Abbate, Eric Kovach, Rand Morimoto
Aug 6, 2004
There are many ways to add fault tolerance to network services and resources running on Windows Server 2003 servers, and all without the hassle of third-party software. Find out how to use them in this chapter from Microsoft Windows Server 2003 Insider Solutions.
J2EE Naming and Directory Services
By Andy Longshaw, Martin Bond, Dan Haywood, Debbie Law, Peter Roxburgh
Aug 6, 2004
Java Naming and Directory Interface (JNDI) can be used for much more than simply finding resources stored by your J2EE server. Find out how much more in this sample chapter on JNDI in Java 2, Enterprise Edition.
Setting up a Software Restriction and Wireless Network Policy with Windows 2003 Group Policy
By Jesse Smith
Aug 6, 2004
Keep those unwanted applications from running on client machines and set the rules for how wireless clients operate in your Windows 2003 domain. Jesse Smith shows you how to set up a GPO with software restriction and wireless network policies for a network operating with a Windows Server 2003 server as the primary domain controller.
Administering Windows Server 2003 Remotely
By Ed Roberts, Andrew Abbate, Eric Kovach, Rand Morimoto
Jul 30, 2004
This chapter covers the wealth of tools and options available to administrators in Windows Server 2003, including many enhancements to tools that existed in previous versions of the system.
Workflow-Based Network Management
By Stephen B. Morris
Jul 30, 2004
Network management specialist Stephen Morris discusses the benefits of modeling network management operations in advance of MIB design. This is a contrarian approach to the way network management is traditionally developed.
Getting Data from Here to There: How Computers Share Data
By Matt Hayden, Joe Habraken
Jul 16, 2004
Matt Hayden and Joe Habraken provide a brief run-down of the four most common types of network topologies: Ethernet, Token Ring, FDDI, and ATM. A Q&A section at the end provides answers to common questions about these topologies.
The Scope of Network Distributed Computing
By Max K. Goff
May 28, 2004
The scope of Network Distributed Computing (NDC) is quite impressive. This chapter presents an overview of some of the many relevant areas of NDC research and development today. If you're looking for a solid overview of all things NDC — from the Semantic Web, P2P, and Pervasive Computing to Distributed Databases, Filesystems, Media, and Storage — you've come to the right place.

< Prev Page 1 2 3 4 Next >