Title: Network and Systems Management
July 14, 2004 Published by  TechTarget

Network and Systems Management

TechTarget
Issue Sponsored By:
  > Free XBOX or PS2 w/ training from Global Knowledge
  > SBC - Free Outsourced Hosting White Paper


IN THIS ISSUE:
  >  Testing: One, two, three
  >  WAN compression
  >  Biggest networking myth of 2004
  >  Featured Topic: Backup and recovery
  >  With 802.11i, new standard means new problems
  >  Guide to network performance management
  >  Chapter of the Week: Threats in an enterprise network


 
AD Receive Free XBOX or PS2 w/ Expert Cisco Training
Every year more people learn Cisco technologies from Global Knowledge than any other training provider in the world. To enhance your learning experience, our expert instructors add custom, hands-on exercises and labs to our Authorized Cisco curriculum. Join the ranks of IT professionals who have helped to make us the world's largest and most trusted Cisco Learning Solutions Partner. Purchase the best Cisco training in the industry and receive a Free XBOX, PS2, iRiver 256 MB MP3 Player or PalmOne Tungsten E Handheld.
 


Network and Systems Management Tips

Testing: One, two, three
[Carrie Higbie]
When there are problems on a network, one sure way to narrow them down is through sniffing and testing the network. There are several testers on the market that perform various functions and provide the network manager with data to help diagnose problems. In today's article, we will look at some of the most common types of testers and take a peek at some resources that should help you determine if your tester or sniffer is up to snuff.

WAN compression
[Tom Lancaster]
As the demand for network bandwidth grows and the prices of bandwidth come down, most network administrators are looking at upgrading the size of their circuits. Unfortunately for many of us, the prices of partial T3s are still a little high. Of course, multiple T1s are an option, but the key to remember there is that in most cases, traffic is split between parallel circuits on a flow basis, and not a packet basis. This means that any given session, no matter how important, is still limited to using a single T1, and cannot actually take advantage of both T1s. A third solution to this problem is compression. Read more about the benefits of compression.

Biggest networking myth of 2004
[Eric Lundbohm]
More bandwidth gives you better performance
This column dispels the notion that greater bandwith provides better performance. Get the truth about this networking myth.



 
AD Increase Efficiency with Outsourced Hosting
The broad range of business processes facilitated by today's Internet has made managing infrastructure behind Web-based initiatives increasingly complex and costly. Outsourced hosting provides a solution for managing e-business infrastructure that enables enterprises to effectively streamline costs and focus more resources on the business objectives the infrastructure supports. Download this Free White Paper to learn more about Outsourced Hosting
 

Essential Links

Featured Topic: Backup and recovery
We admit it, we're paranoid. With daily threats of worms, viruses and Trojans battering our networks, desktops and remote offices, we believe it's better to be prepared for data mishaps than to be blindsided by them. We've complied some of our exclusive resources offering you specific procedures for creating backups and planning for recovery. No doubt about it -- it could make the difference between survival or extinction for your enterprise.

With 802.11i, new standard means new problems
The new 802.11i standard is expected to make wireless LANs more secure, but authentication interoperability problems could make it harder to run multi-vendor systems.

Guide to network performance management
This guide introduces you to the best practices and pitfalls to avoid, and provides troubleshooting help and advice for monitoring and maintaining your network. You'll find articles, tutorials, tips, tools, white papers, expert advice and more to pump up your network monitoring and diagnostic know-how quickly.

Chapter of the Week: Threats in an enterprise network
Chapter 5 of Designing Network Security, 2nd Edition by Merike Kaeo helps you identify which areas of the network are more susceptible to network intruders and who is the common attacker. (Reproduced from the book Designing Network Security, 2nd Edition, ISBN 1587051176, Copyright 2004, Cisco Systems, Inc. Reproduced by permission of Pearson Education, Inc., 800 East 96th Street, Indianapolis, IN 46240. Written permission from Pearson Education, Inc. is required for all other uses. Visit www.ciscopress.com for a detailed description and to learn how to purchase this title.)



Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]

Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]



ABOUT THIS E-NEWSLETTER
TechTarget This e-newsletter is published by TechTarget, the most targeted IT media and events company.
Copyright 2004 TechTarget. All rights reserved.

To unsubscribe from "Network and Systems Management Tip":
Go to unsubscribe: http://searchTechTarget.techtarget.com/u?track=NL-314

Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Contact Us:
TechTarget
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to