Standards  >   Network Protocols  >   LAN Protocols  >  

Internet Packet Exchange Protocol

RSS Feed    Add to Google    Add to My Yahoo!
Internet Packet Exchange Protocol White Papers (View All Report Types)
 
LAN Fundamentals: Logical Addresses vs. Physical Addresses
sponsored by Global Knowledge
WHITE PAPER: There are two basic types of addresses used in Local Area Networking (LAN): logical addresses and physical addresses. Ethernet is the most common LAN and is the example used in this document. Understanding the differences of how the two addresses are used is the focus of this discussion.
Posted: 14 Jun 2013 | Published: 20 May 2013

Global Knowledge

Extreme Networks Solution with NEC
sponsored by Extreme Networks
WHITE PAPER: Explore how using a 1 GbE, 10 GbE, or 40 GbE hardware plane is critical to achieving the interoperability and multi-site capabilities needed for a successful software-defined networking (SDN) initiative.
Posted: 29 Aug 2013 | Published: 30 Apr 2013

Extreme Networks

Savvy Network Architects Are Boosting Performance and Lowering the TCO of Campus LANs
sponsored by Brocade
WHITE PAPER: Campus networks are vital to many top initiatives of the modern enterprise. However, to deliver the performance requirements of a campus LAN, new, cost-effective, efficient solutions are needed. In this resource, uncover how a multivendor approach can help you increase network performance while lowering the TCO of campus LANs.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

Brocade

Closing the IT Process Automation Gap
sponsored by Opalis Software, Inc.
WHITE PAPER: Many organizations are in the midst of implementing ITIL. But are they putting the appropriate operational processes into place? Learn how automating operational processes with run book automation software can help organizations better benefit from ITIL.
Posted: 28 Aug 2007 | Published: 01 Aug 2007

Opalis Software, Inc.

Emerging Multicast VPN Applications
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper provides background information on MVPNs, as well as describes emerging MVPN applications.
Posted: 25 Nov 2008 | Published: 25 Nov 2008

Juniper Networks, Inc.

Choose Your Next SOA Implementation Step Carefully
sponsored by Seros
WHITE PAPER: This white paper discusses the critical role of an ESB and an open standards-based reference architecture in a successful SOA initiative.
Posted: 25 Jun 2008 | Published: 25 Jun 2008

Seros

Adaptive Packet Filtering
sponsored by Gigamon
WHITE PAPER: This white paper explores many technical processes of adaptive packet filtering, including filtering on FCoE traffic, mutli-encap filtering, and much more.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

Gigamon

IFRS in the Life Sciences: Broad implications
sponsored by Deloitte
WHITE PAPER: This paper provides practical industry insights on IFRS for life science executives and includes useful sections on: IFRS challenges and opportunities in life sciences; Implications of IFRS for financial reporting, tax, human resources, mergers and acquisitions, IT, and treasury and much more.
Posted: 04 Sep 2009 | Published: 03 Sep 2009

Deloitte

RFID Basics for Retailers
sponsored by Intermec
WHITE PAPER: This white paper illuminates RFID by providing an overview of RFID technology; describing the current status of relevant RFID standards initiatives; illustrating how RFID can be integrated to enhance existing wireless LAN, bar code and mobile computing systems; and providing guidance for selecting and planning RFID pilots and implementations.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

The Packet Delivery Process: Locally Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are locally connected, containing definitions of key terms and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

The Packet Delivery Process: Remotely Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are remotely connected, including key definitions and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

WAN Speak Musings – Volume I
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.
Posted: 02 May 2013 | Published: 02 May 2013

ComputerWeekly.com

Presentation: The BBC’s Unified Communications Strategy
sponsored by ComputerWeekly.com
PRESENTATION: Steve Shepherd, head of IT and business alignment at the BBC, explains how unified communications technology is transforming the BBC.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

ComputerWeekly.com

Critical Concepts of the 200-120 CCNA Routing and Switching Exam
sponsored by Global Knowledge
WHITE PAPER: This paper reviews the major concepts covered on the Cisco Certified Network Associate Routing and Switching exam as of spring 2013.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

The Four Elements of IS-IS
sponsored by Global Knowledge
WHITE PAPER: This informative guide discusses 4 key elements for the implementation of Intermediate System - Intermediate System (IS-IS).
Posted: 02 Apr 2014 | Published: 02 Apr 2014

Global Knowledge

The Four Elements of OSPF
sponsored by Global Knowledge
WHITE PAPER: This whitepaper explores 4 key elements for the implementation of open shortest path first (OSPF).
Posted: 02 Apr 2014 | Published: 02 Apr 2014

Global Knowledge

New UC Threats Leaving Your UC Platform Vulnerable
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide from SearchUnifiedCommunications.com explores three emerging security threats that can leave your UC platform extremely vulnerability to security issues.
Posted: 21 May 2012 | Published: 18 May 2012

SearchSecurity.com

Designing IP Addresses for Large Networks
sponsored by Global Knowledge
WHITE PAPER: Complex subnetting, VLSM, and IP address summarization can be implemented simply and efficiently with proper planning. Click through to explore why great care must be taken to complete the IP address planning process accurately to accommodate current needs and growth.
Posted: 31 Oct 2013 | Published: 31 Oct 2013

Global Knowledge

The Basics of Configuring and Using Cisco Network Address Translation
sponsored by Global Knowledge
WHITE PAPER: This white paper describes the process of changing the identity of a private host to a legal public host, known as Network Address Translation (NAT), and provides network engineers with a foundational understanding of how to design, implement, and troubleshoot NAT.
Posted: 28 Aug 2014 | Published: 31 Jul 2014

Global Knowledge

Simplify Your Route to the Internet: Three Advantages of Using LISP
sponsored by Global Knowledge
WHITE PAPER: Uncover the ins and outs of the Location ID separation protocol (LISP): what it is, how it works, how it compares to BGP, and the top three advantages it provides. View now to get help deciding if this protocol can truly help simplify the route to the internet in your organization.
Posted: 29 Jan 2013 | Published: 29 Jan 2013

Global Knowledge

Threat Management: Devising a new strategy to tackle today's cyberattacks
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
Posted: 31 May 2012 | Published: 31 May 2012

SearchSecurity.com

Unified Communication Manager - Class of Service
sponsored by Global Knowledge
WHITE PAPER: This whitepaper unveils how Class of Service within Cisco's Unified Communication Manager can help you control which phone numbers can be called by particular devices. View now to learn how this simple, flexible solution can be effective in numerous situations.
Posted: 14 Feb 2013 | Published: 14 Feb 2013

Global Knowledge

SIP and the Art of Converged Communications
sponsored by Global Knowledge
WHITE PAPER: Session Initiation Protocol (SIP) is an internet signaling protocol, developed by the IETF (starting in 1996), for establishing, maintaining, and tearing down sessions between a variety of real-time media, including voice, video, and chat. This white paper is going to look at the way SIP is used in the converged Unified Communications environment.
Posted: 25 Jul 2013 | Published: 18 Jun 2013

Global Knowledge

Cisco Telepresence Zones
sponsored by Global Knowledge
WHITE PAPER: The concept of zones in Cisco TelePresence products is confusing to many people; but this white paper should clear up some of the confusion.
Posted: 01 Apr 2013 | Published: 01 Apr 2013

Global Knowledge

CW Buyer's Guide: IPV6 Migration
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This Computer Weekly Buyer's guide takes you through the steps you need to take to migrate to IPv6 and explains the potential impact on your business.
Posted: 26 Jul 2012 | Published: 05 Feb 2012

ComputerWeekly.com

IP telephony trends: Migrating from PSTN to SIP trunking
sponsored by SearchSecurity.com
EGUIDE: Uncover the top five trends in enterprise IP telephony and learn the benefits and challenges of replacing PSTN with SIP-based services.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

SearchSecurity.com

SIP contact centers: Key benefits and potential challenges
sponsored by SearchSecurity.com
EGUIDE: Learn how Session Initiation Protocol (SIP), unified communications (UC) and contact centers fit hand in hand in this e-guide from SearchUnifiedCommunications.com.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

SearchSecurity.com

Top 3 Drivers for Flexible UC Reference Architecture
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchUnifiedCommunications.com offers insight into creating a unified communications architecture that fulfills today's requirements and is flexible enough to adapt to the needs of tomorrow.
Posted: 11 Sep 2012 | Published: 11 Sep 2012

SearchSecurity.com

Types of DNS Attacks Reveal DNS Defense Tactics
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com details different types of common domain name system (DNS) attacks, the unusual behaviors they invoke, and which defense tactics work best in the given scenario. View now to learn more!
Posted: 21 Mar 2013 | Published: 21 Mar 2013

SearchSecurity.com

Coming at You: How to Deal with the Latest DDoS Attacks
sponsored by SearchSecurity.com
EBOOK: Access this TechGuide to learn more about DDoS threats and how to protect your systems—while shape-shifting cyberattackers are tough to stay ahead of, they're too destructive to ignore.
Posted: 14 May 2014 | Published: 15 May 2014

SearchSecurity.com

Malware Attacks Demand a New Malware Defense Approach
sponsored by SearchSecurity.com
EGUIDE: Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!
Posted: 19 Jun 2013 | Published: 19 Jun 2013

SearchSecurity.com

Cybercrime and warfare: All that matters
sponsored by ComputerWeekly.com
BOOK: Peter Warren and Michael Streeter assess  the history, scale and importance of cyber crime this chapter from their book, Cybercrime and warfare: All That Matters.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

ComputerWeekly.com

The 2014 Global Cost of Cybercrime Study
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative report distills interviews with senior-level IT personnel about the impact of cybercrime on their organizations in 2014 into trends that apply to every enterprise around the world.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement