Title: Network and Systems Management
January 05, 2005 Published by  TechTarget

Network and Systems Management

TechTarget
Issue Sponsored By:
  > ITKnowledge Exchange on SearchNetworking.com


IN THIS ISSUE:
  >  Choosing a wireless architecture, part 2: Authentication, VLANs and installation
  >  Three essential ingredients for network integrity
  >  Logical Fault Isolation in six steps
  >  Expert predictions for 2005: A look ahead
  >  Linux, security skills projected hot skills for 2005
  >  Chapter of the Week: Understanding high availability of IP and MPLS networks
  >  VoIP 2005: Better watch what you say


Network and Systems Management Tips

Choosing a wireless architecture, part 2: Authentication, VLANs and installation
[David Jacobs]
This article examines vendor design approaches to authentication, VLANs and network installation issues. These issues impact how your users connect to the network, their access to network resources and the overall cost of adding WLANs to your network.
Read Choosing a wireless architecture, part 1 here.

Three essential ingredients for network integrity
[Eric Ogren]
Businesses depend on their applications and their networks, so it's obvious that network security should be a high priority -- and it is. Over the past few years, enterprises have invested heavily in a complex battery of perimeter defense systems that are updated daily, if not hourly, with new signatures. But today's security practices, with their emphasis on defense, have two important shortcomings. Read about them here.

Logical Fault Isolation in six steps
[Barrie Sosinsky]
Complex problems often yield to a structured analytic approach. The idea is to create a logical step-by-step procedure that will accurately identify the cause of a network problem, a process that is also repeatable. The idea is to isolate a problem using Logical Fault Isolation, and to find the correct solution the first time. In order to isolate a problem, you should follow six basic steps described in this tip.


 
ITKnowledge Exchange on SearchNetworking.com
Join ITKnowledge Exchange (ITKE) -- an online community on SearchNetworking.com where you can exchange knowledge with IT pros from around the globe. This innovative feature is better than a list serv or discussion forum and allows you to choose the audience most qualified to answer your toughest IT questions. Create your ITKE profile today!
 


Essential Links

Expert predictions for 2005: A look ahead
We asked our site experts to give us their industry predictions for the New Year. What they share is an interesting mix of networking foretelling.

Linux, security skills projected hot skills for 2005
IT pros looking to improve their standing in the job market should look to open source, Web services and security-related skill and certification sets, according to new research.

Chapter of the Week: Understanding high availability of IP and MPLS networks
Chapter 1 of Fault-Tolerant IP and MPLS Networks by Iftekhar Hussain describes major sources of network failures and provides an overview of techniques that are commonly used to improve availability of IP/MPLS networks. In particular, this chapter outlines mechanisms for reducing network downtime due to controlplane failures. (Reproduced from the book Fault-Tolerant IP and MPLS Networks, ISBN 1587051265, Copyright 2005, Cisco Systems, Inc. Reproduced by permission of Pearson Education, Inc., 800 East 96th Street, Indianapolis, IN 46240. Written permission from Pearson Education, Inc. is required for all other uses.)

VoIP 2005: Better watch what you say
Voice over IP implementations will increase significantly in 2005, primarily as a cost-saving measure. However, keeping new voice systems secure could be a daunting challenge.




Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]

Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
Free E-Newsletters!
Select e-newsletters you would like to receive via e-mail!

SearchNetworking: Today's News


Not a Member? We'll activate your membership with your subscription.



ABOUT THIS E-NEWSLETTER
TechTarget This e-newsletter is published by TechTarget, the most targeted IT media and events company.
Copyright 2005 TechTarget. All rights reserved.

To unsubscribe from "Network and Systems Management Tip":
Go to unsubscribe: http://searchTechTarget.techtarget.com/u?cid=500530&lid=522392&track=NL-314

Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Contact Us:
TechTarget
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to