=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TechTarget | Network and Systems Management May 26, 2004 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= FROM OUR SPONSOR: Argent - Free Systems Management ROI White Paper http://ttarget.adbureau.net/adclick/CID=000050c20000000000000000 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= IN THIS ISSUE | Table of Contents
1. NETWORK AND SYSTEMS MANAGEMENT TIPS - Featured Tip: Perimeter networks - Monitoring IP telephony infrastructures - Snapfiles 2. ESSENTIAL LINKS - Featured Topic: Network monitoring - HP's quest for proactive management - Symbol CIO: Wireless isn't just a network tool - Chapter of the Week: 802.11 Wireless LAN fundamentals ___________________________________________________________________ ******************>> Sponsored by Argent Software <<*************** Free White Paper: Increase Systems Management ROI Can IT support new initiatives, increase productivity and maintain service levels with IT budgets expected to stay at minimum levels? The days of all-encompassing "framework" solutions are past. According to EMA, to effectively reduce cost and maximize ROI in this environment, organizations must implement low-cost systems management solutions that are fully scalable and provide rapid time-to-value. Learn more in this Free EMA White Paper from Argent: http://ttarget.adbureau.net/adclick/CID=000050c20000000000000000 ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TODAY'S FEATURED NETWORK AND SYSTEMS MANAGEMENT TIP PERIMETER NETWORKS Barrie Sosinsky A perimeter network is the network closest to a router that is not under your control. Usually a perimeter network is the final step a packet takes traversing one of your networks on its way to the Internet; and conversely the first network encountered by incoming traffic from the Internet. Most administrators create perimeter networks in order to place their firewall in between them and the outside world so that they can filter packet traffic. Most perimeter networks are part of the DMZ (Demilitarized Zone) if they exist at all. However, perimeter networks have some additional utilities that you might want to consider when deciding where to place systems and services. http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci966711,00.html?track=NL-314&ad=483595 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= MONITORING IP TELEPHONY INFRASTRUCTURES | Christine Washburn The promise of IP telephony (IPT) has suddenly morphed from a "what-if" to a "when." Organizations, including the small and midtier markets (SMB), are looking to IPT as a means of simplifying management while enhancing mobile connectivity. But if you're seriously considering integrating voice and data, how do you prepare for the transition? How do you successfully manage and measure the migration and ongoing success of your deployment? What are the "gotchas?" This article helps you address the management and security requirements that enable you to exceed the Day 2 expectations of users and senior management. http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci965060,00.html?track=NL-314&ad=483595 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= SNAPFILES | Barrie Sosinsky One very nice repository for freeware and shareware Web utilities is the Web site now called Snapfiles.com, found at: http://www.snapfiles.com (recently known as WebAttack.com). This Web site is a repository for a variety of what they term "Internet Tools" including pop-up blockers, spyware catchers, and the like; but it is also useful to network system managers because it offers you some of the better shareware tools for network diagnostics and management. Check out a sampling of some of these tools here: http://searchnetworking.techtarget.com/tip/0,289483,sid7_gci944302,00.html?track=NL-314&ad=483595 ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= :::::::::::::::::::::::: ESSENTIAL LINKS :::::::::::::::::::::::::: ___________________________________________________________________ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= NETWORK MONITORING| Featured Topic Keeping a close eye on your network performance and throughput is critical. But as network grows and becomes more complicated, monitoring it becomes all the more complex. Here's some help. http://searchnetworking.techtarget.com/featuredTopic/0,290042,sid7_gci965341,00.html?track=NL-314&ad=483595 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= HP'S QUEST FOR PROACTIVE MANAGEMENT | News Exclusive An industry analyst says that HP's new Adaptive Management strategy seeks to make IT infrastructure monitoring more proactive, but the technology can be challenging to learn and take years to implement. http://searchnetworking.techtarget.com/qna/0,289202,sid7_gci966583,00.html?track=NL-314&ad=483595 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= SYMBOL CIO: WIRELESS ISN'T JUST A NETWORK TOOL | News Exclusive Symbol Technologies' CIO explains why a successful mobile technology strategy should focus on enabling mobile applications, not simply extending the network. http://searchnetworking.techtarget.com/qna/0,289202,sid7_gci966568,00.html?track=NL-314&ad=483595 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 802.11 WIRELESS LAN FUNDAMENTALS | Chapter of the Week Mobility is the quality of being capable of movement or moving readily from place to place. 802.11 WLAN devices provide this kind of untethered freedom. But there's more to mobility than the lack of a network cable. Understanding how mobility is implemented in 802.11 arms you with the knowledge you need to support or facilitate mobile applications. This chapter specifically covers the characteristics of roaming, Layer 2 roaming, Layer 3 roaming and an introduction to mobile IP. http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci962097,00.html?track=NL-314&ad=483595 ___________________________________________________________________ **************** CONTACT SEARCHNETWORKING.COM ***************** E-mail us at mailto:[EMAIL PROTECTED] Click here for specific contact information and to meet our editorial team: http://searchnetworking.techtarget.com/meetEditorial/0,289131,sid7,00.html?track=NL-314&ad=483595 To sponsor this or any other TechTarget newsletter e-mail Gabrielle DeRussy, Director of Site Sales at mailto:[EMAIL PROTECTED] ::::::::::::::::::::: ABOUT THIS NEWSLETTER :::::::::::::::::::::: This e-newsletter is published by TechTarget, the most targeted IT media and events company. TechTarget offers magazines, Web sites, e-newsletters, Webcasts and conferences for enterprise IT professionals. Copyright 2004 TechTarget. All rights reserved. _____________________________________________________________________ To unsubscribe from "Network and Systems Management Tip": Go to unsubscribe: http://SearchTechTarget.com/u?cid=483595&lid=522392&track=NL-314 Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed. Contact us: TechTarget Member Services 117 Kendrick Street, Suite 800 Needham, MA 02494