Home
 > search for

Featured Documents related to »  network protocol

Retrospective Network Analysis
While network complexity and bandwidth demands continue to increase, applications such as voice over Internet protocol (VoIP) increase performance requirements.

network protocol  Network Analysis While network complexity and bandwidth demands continue to increase, applications such as voice over Internet protocol (VoIP) increase performance requirements. Today’s network administrators need versatile monitoring and analysis tools to quickly troubleshoot and monitor security and compliance. Retrospective network analysis (RNA) tools let you go “back in time” to reconstruct failure or attack. Discover the benefits. Read More...
Outsourcing, IT Infrastructure
The IT Infrastructure Outsourcing knowledge base focuses on the selection of companies who provide outsource services in the areas of information technology (IT) infrastructure. The typical type...
Start evaluating software now
Country:

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » network protocol


Customer Relationship Management and the Next Generation Network
Next generation networks may eventually allow us to interact with the world in a way compatible with how we live. This would have the greatest impact on our

network protocol  where we're accessing the network to provide services based on our location, in addition to providing services based on the device we are using at the time. One of the keys to IMS is its reliance on the Session Initiation Protocol (SIP). SIP is an IP-based standard protocol for creating and terminating a user session that could involve multimedia elements such as video, voice, data, instant messaging, and even online gaming. SIP is a key element in allowing IP-based services like voice and video over IP Read More...
Your Guide to Troubleshooting Voice over Internet Protocol
The sensitivity of voice over Internet protocol (VoIP) to delay and packet loss, compared with other network applications such as e-mail services, presents a

network protocol  loss, compared with other network applications such as e-mail services, presents a big challenge. But if you have a basic understanding of VoIP traffic and of the quality metrics that VoIP monitoring tools can provide, you increase your ability to run your network smoothly. Learn about the statistics and metrics you need to maximize your VoIP use. Read More...
Who Else is Using Your Wireless Network?
Information technology (IT) security industry experts continue to warn us that wireless networks have significant vulnerabilities. Taking precautions is a smart

network protocol  be using your wireless network (or you might be using theirs) and not even realize it. Cryptography experts have lambasted wireless networks as being easy to exploit. While wired equivalent privacy (WEP), Wi-Fi protected access (WPA), and temporal key integrity protocol (TKIP) all add layers of security to wireless networks, it is a well-established fact that cracking WEP encryption keys is not that hard to do. Most people who use computers at home, whether the computer is their own personal system, or a Read More...
Network Associates Hopes to Rekindle the Flame
Though the security market has been exploding, Network Associates, Inc. (NAI) will likely post a loss for FY'99. However, don't expect the security monolith to

network protocol  reputation among security and network engineers for its Protocol Analyzer product suite. In fact, its Sniffer products have been such a success, that the industry often uses the term Sniffer for Protocol Analyzers as a generic term, much the same way that consumers use the word Kleenex for all tissue brands. After being acquired by Network Associates, the Sniffer product suite continues to lead the market for Protocol Analyzers. In the underground, hackers world-over use the term sniffer Read More...
Network Polymers and IQMS: A Mixture for Success


network protocol  Polymers and IQMS: A Mixture for Success Read More...
Power and Thermal Management Considerations for Network Telecom Solutions
As telecommunications networks grow in size and complexity, enterprises and service providers are faced with an increasing burden on operating expenses. In

network protocol  Thermal Management Considerations for Network Telecom Solutions As telecommunications networks grow in size and complexity, enterprises and service providers are faced with an increasing burden on operating expenses. In particular, the amount of power consumed and heat dissipated within even a single rack of communications servers is now a very real budget consideration. Clearly, lowering these numbers is the concern of all communication platform designers. Read More...
Network Engineering to Support the Bandwidth Manager Architecture
Network-level behaviors can impact the determinism of call admission control decisions for a particular bandwidth management deployment. However, different

network protocol  management deployment. However, different network routing and forwarding models can have different impacts when used in conjunction with the bandwidth manager. We examine these models, considering their ability to provide the deterministic admission control capabilities available within the public switched telephone network (PSTN). Read More...
Network Engines, Inc. - Double the CPUs for Web Serving
Network Engines, Inc. is a leading vendor of extremely thin rackmount servers used in the rapidly growing area of web serving. In this note, we examine the

network protocol  Web Serving Vendor Genesis Network Engines, Inc. (NEI) was formed in 1997 as an IP content delivery-focused vendor. The founder was Lawrence Genovesi, who continues to run the company as President. The original product was a multi-processor server targeted at streaming media providers. In 1998, the company shifted its focus to clustered server products, based on the belief that Internet growth would lead to the need for scalable, cost-effective servers. NEI's revenues come almost exclusively (95%) from Read More...
Reduce the Risk of Network and Application Performance Issues
More than ever before, the IT network is a strategic asset to a business, and any downtime or degradation in network or application performance can directly

network protocol  the Risk of Network and Application Performance Issues More than ever before, the IT network is a strategic asset to a business, and any downtime or degradation in network or application performance can directly impact an organization’s bottom line. This white paper looks at a methodology for solving network and application performance issues and outlines a new approach to getting to their root causes more quickly. Read More...
Top 7 Considerations for Your Wireless Network
Learn the right way to install or upgrade a WLAN in Top 7 Considerations for Your Wireless Network.

network protocol  Considerations for Your Wireless Network Are you looking to install a wireless local area network (WLAN)—or upgrade your existing one? In one practical document, you'll get information on Did you know that placing access points close to a window is a bandwidth waster? Or that something as simple as a poorly placed filing cabinet can block your network connection? Or that employees can easily defeat your network security by setting up rogue connections? Learn the right way to install or upgrade a WLAN Read More...
Network Insight


network protocol  Insight Read More...
Network Access Control (NAC): Planning a Successful Rollout and Implementation
With the emergence of network access control (NAC) technologies, network administrators now have tools to gain critical network understanding. NAC solutions can

network protocol  With the emergence of network access control (NAC) technologies, network administrators now have tools to gain critical network understanding. NAC solutions can contribute significantly to an organization’s business objectives by automatically enforcing network and security policies, preventing network downtimes, maintaining network integrity, and meeting compliance regulations. With this in mind, it’s important to look at what NAC implementations actually require. Read More...
Fundamental Principles of Network Security
As the complexity of security threats increases, so do the security measures needed to protect networks. Data center operators, network administrators, and

network protocol  Principles of Network Security As the complexity of security threats increases, so do the security measures needed to protect networks. Data center operators, network administrators, and other data center professionals need to comprehend the basics of security to safely deploy and manage networks today. Find out what you need to know about the fundamentals of secure networking systems, including firewalls, network topology, and secure protocols. Read More...
Defense in Depth: Comprehensive Security with Authenticated Network Access Control
The greatest threat to the security of the modern network is complexity. Threats to network security almost always play on missed details in the design of a

network protocol  Comprehensive Security with Authenticated Network Access Control The greatest threat to the security of the modern network is complexity. Threats to network security almost always play on missed details in the design of a network or a piece of software. These overlooked details enable much larger and potentially devastating security breaches to occur. However, this threat can be countered with a well designed network and vigilant safeguards. Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others