Home > Articles > Networking > Network Administration & Management

Network Administration & Management

RSS Feed Subscribe to this topic  RSS details

74 Items

Sort by Date | Title

Using 802.3af (Power Over Ethernet) as a Sysadmin Tool
By Daniel P. Dern
Apr 2, 2004
By using Power over Ethernet (802.3af) to provide power for devices such as WiFi Access Points, VoIP desktop phones, and webcams, companies can save on A/C wiring costs and UPS provisioning. Daniel P. Dern tells you how you can gain additional sysadmin capabilities, including remote off/on/reboot and power provisioning management.
Planning, Implementing, and Maintaining a Network Infrastructure for MCSE Exam 70-293
By Jason Zandri
Feb 20, 2004
Jason Zandri describes the key techniques you'll need to master for MCSE Exam 70-293.
Network Management and MPLS
By Stephen B. Morris
Nov 13, 2003
Stephen Morris shows you some basics of MPLS network management, including the major functional areas of FCAPS: fault, configuration, accounting, performance, and security.
Managing Disk Partitions Over the Network with Ghost Corporate Edition
By Daniel P. Dern
Oct 31, 2003
System administrators often need to deploy images to multiple machines, or they want to make and send images (including system images) to machines over a network. Daniel Dern explains the process using Symantec Ghost Corporate Edition as a solution.
Relocation Challenges of the IT Department, Part 7: Installing an Audiovisual System
By Greg Kirkland
Oct 31, 2003
Presentations for clients and staff should have a professional look and sound. In Part 7 of his series on IT relocation strategies, Greg Kirkland describes his company's experience when selecting and installing a new audiovisual system to gain those professional results.
Managing Large Networks: Problems and Solutions
By Stephen B. Morris
Oct 17, 2003
This chapter focuses on major issues of managing large networks, including bringing the managed data to the code, scalability, the shortage of development skills for creating management systems, and the shortage of operational skills for running networks.
Samba Team Co-Founder John Terpstra Talks About Samba 3
By John Terpstra, Jelmer R. Vernooij
Oct 17, 2003
Samba co-founder John Terpstra talks about Samba 3: what it is, why it is needed, and how it's better than Windows 2000.
Diary of a Network Administrator: Planning for Success
By Joseph Phillips
Feb 28, 2003
In this diary entry, Joseph Phillips details his planning process for his client's network, servers, and rats.
Diary of a Network Administrator: Mean People Suck
By Joseph Phillips
Nov 15, 2002
In this diary entry, Joseph Phillips lists characteristics of good (and bad) network administrators.
The Delta Method: Identifying Network Change
By Jonathan Feldman
Nov 15, 2002
This lesson discusses some sources of network change and how to identify them. It also discusses how to objectively weigh the benefits versus the risks of making changes to your networked systems.
Diary of a Network Administrator: Project Management
By Joseph Phillips
Oct 18, 2002
Far too often, projects spin out of control due to a lack of vision, planning, and technical leadership. In this network administrator diary entry, Joseph Phillips discusses the importance of project management.
Diary of a Network Administrator: The Project Launch
By Joseph Phillips
Sep 20, 2002
In this series, Joseph Phillips opens his diary for look into the life of network administrator. In this article covering the project launch, he shares his nightmare experience while creating a network plan for a new client.
Make the Right Call: Cisco's AVVID
By Robert Richardson
Jun 21, 2002
Robert Richardson discusses the pros and cons of Cisco's AVVID — what the industry's been talking about all along for pure IP convergence: smart IP phones plugged into an Ethernet network full of conventional switches and routers. Plenty of issues need to be ironed out, though.
"Open Sesame" or Not? Use the Right Access Controls
By Julia H. Allen
Apr 12, 2002
"Open Sesame" or Not? Administrators must use the correct access controls to ensure a secure system.
Data Communications: Use the Right Medium for your Message
By Gilbert Held
Apr 12, 2002
Learn when to use twisted pair cable, satellites, or fiber-optics to get your message across. From economic considerations to bandwidth limitations, here's a guide to your options.
The Wireless Network Evolution
By C.-K. Toh
Apr 12, 2002
Wireless networks include local, metropolitan, wide, and global areas. This excerpt explains the evolution of such networks, their basic principles of operation, and their architectures.
Learn Host-Based Intrusion Detection
By Eric Cole, John M. Millican, Matthew Newfield
Apr 5, 2002
Follow the step-by-step examples to learn how to use five major host-based intrusion detection tools: TCP Wrappers, xinetd, Tripwire, Swatch, and PortSentry.
Night of the Living Wi-Fi's (A Security Parable for Our Times)
By Ed Skoudis
Apr 5, 2002
Ed Skoudis' true-to-life scenario sends chills up the spine of any business with employees using unsecured wireless access.
See What Your Attacker Sees with Scanning Tools
By Eric Cole, John M. Millican, Matthew Newfield
Apr 5, 2002
Defend against attacks by examining your systems from the viewpoint of the attacker. You can use the same tools to protect your systems that attackers use to break in to your systems. Learn how here.
IP Routing: From Basic Principles to Link State Protocols
By Heather Osterloh
Mar 29, 2002
Control network traffic by learning the routing protocols and mechanisms that build and maintain route information.

<< < Prev Page 1 2 3 4 Next >