Title: Network and Systems Management
October 27, 2004 Published by  TechTarget

Network and Systems Management

TechTarget
IN THIS ISSUE:
  >  IM service blockers
  >  Perimeter networks
  >  Guide to Internet Protocol
  >  Featured Topic: Outsourcing update
  >  Experts: Vendors 'lying' about VoIP cost savings
  >  Size matters: Using jumbo packets on Gigabit Ethernet
SPONSORED BY:  SearchCIO.com Product and Vendor Guide

If you would like to research the latest information and vendor listings about systems management including availability, performance, problem management and more, look no further. SearchCIO.com has condensed this information and enables you to research and communicate with vendors all in one easy to browse location, visit today!

Click Here


Network and Systems Management Tips

IM service blockers
[Barrie Sosinsky]
Instant messaging can be a useful business tool when used for business purposes. However, many businesses don't use IM as part of their communications portfolio and IM traffic is a diversion from their employees' work time. Find out how to monitor and block this traffic.

Perimeter networks
[Barrie Sosinsky]
A perimeter network is the network closest to a router that is not under your control. Usually a perimeter network is the final step a packet takes traversing one of your networks on its way to the Internet; and conversely the first network encountered by incoming traffic from the Internet. Most administrators create perimeter networks in order to place their firewall in between them and the outside world so that they can filter packet traffic. Most perimeter networks are part of the DMZ (Demilitarized Zone) if they exist at all. However, perimeter networks have some additional utilities that you might want to consider when deciding where to place systems and services.

Guide to Internet Protocol
[Firewall.cx]
Perhaps one of the most important and well known protocols is the Internet Protocol (IP). We can't overemphasize the importance of fully understanding IP if you really want to know how network communications work. DNS, FTP, SNMP, SMTP, HTTP and a lot of other protocols and services rely heavily on IP in order to function correctly.

Because IP is a huge subject, and impossible to cover in one or two pages, we've divided it into several lessons:

  • Binary and the Internet Protocol: Here we cover a few basic binary concepts and get to see how binary and IP fit together.
  • Internet Protocol Header: Find out how IP fits in the OSI Model.
  • Internet Protocol Classes: We explain the five different IP classes and analyze them in binary. You'll also learn about the network ID and host ID in an IP address.
  • Subnetting: Here we offer a detailed explanation of how subnetting works.

    So, what are you waiting for? Learn all about one of the most important protocols in the networking world!


    Essential Links

    Featured Topic: Outsourcing update
    In the heat of the current U.S. presidential election debate, outsourcing is no doubt a key political issue. CNN and its star correspondent, Lou Dobbs, discuss it nightly. But what does outsourcing mean to you? Could your job be heading overseas? Check out our collection of resources and see if the hype is worth your concern.

    Experts: Vendors 'lying' about VoIP cost savings
    Though vendors often promise that VoIP will lead to immediate and drastic cost savings, analysts at last week's VON Conference & Expo said, in reality, the short-term costs can be enormous.

    MORE INFO:
    > Learn about the other perks of VoIP
    > Read our exclusive: IT pros share VoIP success stories

    Size matters: Using jumbo packets on Gigabit Ethernet
    Learn about network idiosyncrasies and degradations as Dr. Jorgenson discusses both the benefits and hidden perils of using jumbo packets on Gigabit Ethernet.




  • Contact Us
    Sales
    For sales inquiries, please contact us at:
    [EMAIL PROTECTED]

    Editorial
    For feedback about any of our articles or to send us your article ideas, please contact us at:
    [EMAIL PROTECTED]



    ABOUT THIS E-NEWSLETTER
    TechTarget This e-newsletter is published by TechTarget, the most targeted IT media and events company.
    Copyright 2004 TechTarget. All rights reserved.

    To unsubscribe from "Network and Systems Management Tip":
    Go to unsubscribe: http://searchTechTarget.techtarget.com/u?track=NL-314

    Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

    Contact Us:
    TechTarget
    Member Services
    117 Kendrick Street, Suite 800
    Needham, MA 02494

    Reply via email to