Home > Articles > Networking > Network Design & Architecture

Network Design & Architecture

78 Items

Sort by Date | Title

ISA Security Concepts - Part I
Feb 22, 2002
This sample chapter focuses on topics such as the ISA Server Security Configuration wizard. This wizard enables you to tighten your security considerably. Read on to explore site and content rules in detail.
Linux VPN Fundamentals
Mar 15, 2002
This sample chapter covers the important issues you need to be aware of before choosing and deploying a VPN solution. It describes various related concepts in the context of VPNs, such as firewalls, routing, and netmasks.
Living Networks: Changing Your Business and Your Life
Dec 27, 2002
Welcome to the world of living networks! Digital connectivity is dramatically changing the way people do business and live their lives. That, in turn, is transforming the flow of information and ideas. Strategist Ross Dawson discusses the limits and the promises of global networks.
Make the Right Call: Cisco's AVVID
Jun 21, 2002
Robert Richardson discusses the pros and cons of Cisco's AVVID — what the industry's been talking about all along for pure IP convergence: smart IP phones plugged into an Ethernet network full of conventional switches and routers. Plenty of issues need to be ironed out, though.
Making Free-Space Optics Work
Mar 29, 2002
This sample chapter looks at a number of the issues influencing the real-world performance of Free-Space Optics, including: weather, link distance, scattering, absorption, turbulence, misaiming, laser wavelength, and data rates.
MPLS Architecture
Jul 30, 2001
In this chapter from MPLS: Implementing the Technology, learn about MPLS system components, system functions, and operating modes.
N1 Grid Architecture Realized: Strategic Flexibility
Jul 16, 2004
Architectural solutions must solve the problems of cost and complexity and then strive to develop the business and IT linkage to its fullest extent. That is the central theme of the Sun N1 Grid architectural solution, explained here.
Network Design Strategies
Aug 18, 2006
This chapter, from Upgrading and Repairing Networks, 5e, looks at the network's logical and physical design to assist your planning when creating a new network.
Network Design Strategies
Nov 13, 2003
Scott Mueller and Terry Ogletree talk about your network's logical and physical design, including planning and components of a logical network design, the physical network, and planning resources.
Network Management and MPLS
Nov 13, 2003
Stephen Morris shows you some basics of MPLS network management, including the major functional areas of FCAPS: fault, configuration, accounting, performance, and security.
Network Operating Systems for IT Consultants
Jul 30, 2001
This sample chapter introduces you to Windows NT/2000 as an operating system for a newly designed Ethernet network. It also covers operating in a mixed environment with Novell NetWare.
Night of the Living Wi-Fi's (A Security Parable for Our Times)
Apr 5, 2002
Ed Skoudis' true-to-life scenario sends chills up the spine of any business with employees using unsecured wireless access.
Offloading Traditional Mobile Networks with IP
Jun 23, 2009
This chapter discusses pseudowire transport mechanisms used to provide a bridge between the legacy TDM systems and All IP systems on mobile networks.
Patterns in Network Architecture: Naming and Addressing
Feb 29, 2008
If you get it right, many things become easier, and you scarcely realize it's there.
Protocol Negotiation in CIFS
Dec 23, 2003
Christopher Hertel provides an overview of the available SMB dialects and takes a preliminary peek at some of advanced concepts like virtual circuits and authentication.
QP: Message Transfer Mechanism
Feb 21, 2003
Explore Queue Pair (QP), the message transfer engine that lies at the heart of InfiniBand Architecture (IBA). Learn about the request and response packets, Packet Sequence Numbers (PSNs), the Verb Layer, and the four types of QP.
RSS Clustering: A Unique Approach for Managing Your RSS Feeds
Jul 8, 2005
Content syndicated via RDF site summary (RSS) feeds is a great feature of the Net, with one big drawback: WTMI (way too much information). Jose Nazario discusses a custom RSS aggregation approach that allows the user to handle large volumes of RSS data, as well as find interesting trends within the flood.
Securing the Corporate Network
Dec 21, 2001
Authenticate your dial-in users using your local database, and make sure your AAA is in place-- that's authentication, authorization, and accounting.
Security Through Penetration Testing: Internet Penetration
Mar 15, 2002
The overall methodology for penetration testing includes discovering as much as possible about the target, identifying all potential avenues of attack, and attempting to compromise the network by leveraging the results of the vulnerability analysis and following as many avenues identified as time allows.
Security Through Penetration Testing: Wrap Up
Mar 22, 2002
This sample chapter describes some ways to keep current on the latest tools and techniques in security.

<< < Prev Page 1 2 3 4 Next >