Enterprise networking

McLean, Heather
June 2003
IT Training;Jun2003, p47
Trade Publication
With the constant threat posed by hackers, and the pace of development in technologies and protocols, anyone involved in networking needs to keep bang up-to-date. So learning is a day-to-day activity for network administrators and managers, system architects and security experts. The most infamous is the Internet, through which users communicate via local area networks, wide area networks, virtual private networks, and now the increasingly popular mobile and wireless networks. Finally, while asynchronous transfer mode networks are common in business, transmission control protocol/Internet protocol networks are moving on up the chain. So network administrators and managers, technicians and architects must take the time to learn how these technologies work together, in order to understand how to plan a perfect network that is scaleable and secure.


Related Articles

  • Security has gaps in awareness. Bingham, James; Yeates, Bradley // InTech;Nov2005, Vol. 52 Issue 11, p69 

    This article presents information on the levels of security that protect computer networks. The Internet is a worldwide connectivity with no protection. The corporate wide area network represents connectivity between all corporate assets. It may have extensions across several states, the...

  • Firewall Control.  // Management Services;Oct97, Vol. 41 Issue 10, p35 

    Ascend Communications Corp. has introduced Firewall Control Manager, a server that guarantees use of software firewalls with easy access for authorized users. It allows network managers to implement customized security policies for a LAN or a wall between LAN, Intranet, WAN, Web or Internet. The...

  • LAN switch security: what the hackers know.  // Network World;11/19/2007, Vol. 24 Issue 45, p8 

    The article discusses issues and topics related to local area network (LAN) switch security. Christopher Paggen stated that LAN-borne attacks are always performed locally by someone hooked up to a local network port. He added that the people performing the LAN attacks ranges from adventurous...

  • RITAS: Services for Randomized Intrusion Tolerance. Moniz, Henrique; Neves, Nuno Ferreria; Correia, Miguel; Verissimo, Paulo // IEEE Transactions on Dependable & Secure Computing;Jan/Feb2011, Vol. 8 Issue 1, p122 

    Randomized agreement protocols have been around for more than two decades. Often assumed to be inefficient due to their high expected communication and computation complexities, they have remained overlooked by the community-at-large as a valid solution for the deployment of fault-tolerant...

  • The Intranet Solution. Nansen, Craig // Tech & Learning;Nov2000, Vol. 21 Issue 4, p38 

    Discusses the use of intranets to make school districts' local-area networks and wide-area networks accessible and secure. Intranet software; Setting up the intranet; Intranet communications.

  • Wi-Fi security: Leverage what you know. Wexler, Joanie // Network World;6/13/2005, Vol. 22 Issue 23, p71 

    This article focuses on best practices for the wireless network for local area network security, according to Lisa Phifer, vice president at network consultancy Core Competence. She says it's easy to get focused on selected technologies and lose sight of the big picture. She suggests that...

  • Raritan Dominion KSX. Parsons, Ian // SC Magazine: For IT Security Professionals;Mar2004, p68 

    This article evaluates the Raritan Dominion KSX remote administration tool. The product has eight keyboard, video, mouse ports and eight serial connections, providing remote administration of up to eight servers and eight network appliance over a transmission control protocol/Internet protocol...

  • A New Internet Service Provider Billing System. Al-Saedi, Firas Abdullah Thweny; Bahaaldin, Shaima' Safaaldin // International Journal of Computer Science Engineering & Technolo;Nov2011, Vol. 1 Issue 10, p641 

    This paper presents an Internet Service Provider Billing System with unique characteristics and rich feature content, enabling significant cost reduction. The main mechanism of this system is controlling the Online Charging System (OCS). The support for high user load capacity, traffic...

  • Accelerating Safely: Balancing WAN Optimization with Network Security. Loh, Marcus // NetworkWorld Asia;Apr2008, Vol. 4 Issue 3, p17 

    The article highlights several approaches for a fast and secure access to computer applications, balancing wide area network (WAN) optimization with network security. The Server Message Block (SMB) signing acceleration helps prevent man-in-the-middle-attacks, by ensuring data packets have not...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics