Standards  >   Network Protocols  >   LAN Protocols  >  

Internetwork Packet Exchange

RSS Feed    Add to Google    Add to My Yahoo!
Internetwork Packet ExchangeWhite Papers (View All Report Types)
 
LAN Fundamentals: Logical Addresses vs. Physical Addresses
sponsored by Global Knowledge
WHITE PAPER: There are two basic types of addresses used in Local Area Networking (LAN): logical addresses and physical addresses. Ethernet is the most common LAN and is the example used in this document. Understanding the differences of how the two addresses are used is the focus of this discussion.
Posted: 14 Jun 2013 | Published: 20 May 2013

Global Knowledge

Network Transformation: A Guide to Planning Your Journey to All-IP
sponsored by Neustar®
WHITE PAPER: This informative guide will help you to effectively plan your organization's transition to an all-IP network by explaining the major impact points, considerations, and dependencies, while helping you to formulate a strategy to maximize results and return on investment.
Posted: 15 Jul 2014 | Published: 15 Jul 2014

Neustar®

Foundational Focus: OSI Model - Breaking Down the 7 Layers
sponsored by Global Knowledge
WHITE PAPER: The OSI model is a conceptual tool used to discuss and describe network functions. It is a good idea to be familiar with the OSI model, the features assigned to each layer, and examples of common protocols or technologies associated with the OSI layers.
Posted: 07 May 2013 | Published: 12 Apr 2013

Global Knowledge

Foundational Focus: Basics of Ethernet
sponsored by Global Knowledge
WHITE PAPER: Ethernet is the most common LAN used. As you start to learn about networking, remember that communication and the movement of large numbers, whether it is people, cars, mail, or network traffic, have a commonality. Everything you know and use in your daily life can be compared to the way traffic moves.
Posted: 14 Jun 2013 | Published: 09 May 2013

Global Knowledge

Cox Metro Ethernet Services
sponsored by Cox Communications, Inc.
WHITE PAPER: This white paper introduces two network solutions, ELAN and MPLS IP-VPN, and helps you to discover which is better suited for your enterprise's networking needs.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Cox Communications, Inc.

Cisco Unified Access Technology Overview: Converged Access
sponsored by Cisco India
WHITE PAPER: This white paper details one company's approach to unified access, an integrated, simplified, and intelligent network platform that streamlines the IT department's task of running a multitude of separate networks.
Posted: 21 Jul 2014 | Published: 31 Jan 2013

Cisco India

IFRS in the Life Sciences: Broad implications
sponsored by Deloitte
WHITE PAPER: This paper provides practical industry insights on IFRS for life science executives and includes useful sections on: IFRS challenges and opportunities in life sciences; Implications of IFRS for financial reporting, tax, human resources, mergers and acquisitions, IT, and treasury and much more.
Posted: 04 Sep 2009 | Published: 03 Sep 2009

Deloitte

Key Considerations for MPLS IP-VPN Success
sponsored by XO Communications
WHITE PAPER: Uncover the benefits of an MPLS-based private IP network and learn how it can not only help you simplify network management and reduce costs, but also prioritize application, create and improve disaster recovery, and much more!
Posted: 25 May 2012 | Published: 30 Apr 2012

XO Communications

Database Middleware: Struggling with Performance?
sponsored by Progress DataDirect
WHITE PAPER: Drivers are an important component of database middleware, but they don’t work in isolation. They’re part of a multi-layered architecture that handles the communication between a database application and the database management software. Learn how these layers influence performance and how to optimize efficiency for data requests and responses.
Posted: 03 Feb 2011 | Published: 03 Feb 2011

Progress DataDirect

Global Risks 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

IT in Europe: Next-Generation Network Management Techniques
sponsored by SearchNetworking.co.UK
EZINE: This issue examines how network managers can simplify their management tools gather from the network through the use of protocols like NetFlow and IPFIX and hardware like matrix switches. Learn how network managers are adopting new tools that give them better control over virtualized infrastructure, cloud environment and multi-vendor networks.
Posted: 09 Mar 2012 | Published: 08 Mar 2012


WAN Speak Musings – Volume II
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles.
Posted: 01 Jul 2013 | Published: 01 Jul 2013

ComputerWeekly.com

Maximizing Business Email Security in Gmail
sponsored by SearchSecurity.com
EGUIDE: This e-guide examines the security risks associated with users forwarding their corporate email to personal Gmail accounts. Discover expert strategies for addressing today's growing email security challenges and learn about Google's latest email scandal and the issues it created surrounding cloud security.
Posted: 28 Mar 2013 | Published: 28 Mar 2013

SearchSecurity.com

What's Wrong with Traditional Firewalls?
sponsored by Dell Software
WHITE PAPER: Did you know that your current firewall may be jeopardizing your network security? Traditional firewalls that only focus on stateful packet inspection and access control rules aren't effective in today's world. This e-book explains where traditional firewalls fall short – and what you can do about it.
Posted: 24 Mar 2014 | Published: 20 Dec 2012

Dell Software

How traditional firewalls fail
sponsored by Dell Software
WHITE PAPER: Did you know that your current firewall may be jeopardizing your network security? Traditional firewalls that only focus on stateful packet inspection and access control rules aren't effective in today's world. This e-book explains where traditional firewalls fall short – and what you can do about it.
Posted: 20 Dec 2012 | Published: 20 Dec 2012

Dell Software

SuperMassive Series data sheet
sponsored by Dell Software
PRODUCT OVERVIEW: The Dell™ SonicWALL™ SuperMassive™ Next-Generation Firewall (NGFW) platform is built to meet the needs of enterprise, government, university and service provider deployments and gives you uncompromising, high-performance firewall protection. Learn how to protect against today's emerging threats in this SuperMassive NGFW datasheet.
Posted: 23 Aug 2013 | Published: 31 Jul 2013

Dell Software

SDN Technologies Primer: Revolution or Evolution in Architecture?
sponsored by SearchSecurity.com
EGUIDE: This e-guide compares the two SDN strategies of centralized control and management of packet forwarding vs. distributed architectures and reviews a new portfolio of SDN products launched in 2013.
Posted: 07 Jun 2013 | Published: 07 Jun 2013

SearchSecurity.com

The Four Elements of OSPF
sponsored by Global Knowledge
WHITE PAPER: This whitepaper explores 4 key elements for the implementation of open shortest path first (OSPF).
Posted: 02 Apr 2014 | Published: 02 Apr 2014

Global Knowledge

Windows 7 Migration Station: The Path of Least Resistance
sponsored by SearchEnterpriseDesktop
EBOOK: Its simplicity and stability makes Windows 7 a perfectly viable option for organizations planning a migration away from Windows XP.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

SearchEnterpriseDesktop

The Four Elements of IS-IS
sponsored by Global Knowledge
WHITE PAPER: This informative guide discusses 4 key elements for the implementation of Intermediate System - Intermediate System (IS-IS).
Posted: 02 Apr 2014 | Published: 02 Apr 2014

Global Knowledge

Authoritative Guide to Advanced LTE Testing
sponsored by Ixia
WHITE PAPER: Find out how to measure the critical elements of network performance under real-world conditions and extreme scale in order to take the guesswork out of determining network quality.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

Ixia

Targeted attacks and how to defend against them
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them.
Posted: 16 Aug 2013 | Published: 16 Aug 2013

ComputerWeekly.com

Next Generation Network Management Techniques
sponsored by SearchSecurity.com
EZINE: The February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles!
Posted: 02 Feb 2012 | Published: 02 Feb 2012

SearchSecurity.com

Red Hat Enterprise Linux Desktop Datasheet
sponsored by Red Hat
WHITE PAPER: This whitepaper will help you learn how Red Hat Enterprise Linux provides a cost-effective alternative to proprietary operating systems, making it extremely attractive to those businesses that don't have a bigbudget but still want reliable, secure desktop for their users.
Posted: 02 Jul 2014 | Published: 02 Jul 2014

Red Hat

E-Guide: Will Windows Server 2012 Increase Costs for Your IT Shop?
sponsored by Dell and Microsoft
EGUIDE: This expert e-guide breaks down the costs associated with upgrading to Windows Server 2012. Find out how its pricing structure differs from its predecessors and discover key factors to consider if you decide to implement this new operating system.
Posted: 15 Aug 2012 | Published: 15 Aug 2012

Dell and Microsoft

A New Tune for Telephony? What MS Lync Really Means
sponsored by SearchUnifiedCommunications.com
EBOOK: This white paper provides answers to a number of major questions surrounding Microsoft Lync. Read now to decide whether Lync is the best solution for your company's communications needs.
Posted: 10 Jul 2014 | Published: 10 Jul 2014

SearchUnifiedCommunications.com

CW+: Quocirca Report: Telecoms re-invention – death of the traditional telco
sponsored by ComputerWeekly.com
WHITE PAPER: The communications provider landscape is evolving as the demand for data—in fixed locations and on the move—outstrips the still growing demand for voice communications.
Posted: 24 Oct 2011 | Published: 03 Aug 2010

ComputerWeekly.com

Driving Operational Excellence with Business Analytics
sponsored by IBM
WHITE PAPER: View this resource to learn more about the power of business analytics. Find out how your organization can improve focus on operational excellence and customer opportunity by reading this resource now. It outlines how you can apply a broad range of analytics technologies to managing and improving the decisions of your business.
Posted: 15 Apr 2013 | Published: 15 Apr 2013

IBM

Threat Management: Devising a new strategy to tackle today's cyberattacks
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
Posted: 31 May 2012 | Published: 31 May 2012

SearchSecurity.com

Computer Weekly – 22 April 2014: Adapting to life after Heartbleed
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we investigate the most significant flaw in recent history to impact the internet. The Heartbleed bug in OpenSSL leaves millions of internet servers vulnerable to attack. Hackers have already exploited Heartbleed to steal passwords from the Mumsnet parenting site. What can websites do to foil future attacks?
Posted: 22 Apr 2014 | Published: 22 Apr 2014

ComputerWeekly.com

Protection for Every Enterprise: How BlackBerry Security Works
sponsored by BlackBerry
WHITE PAPER: This guide explores BlackBerry 10 and their mobile security methods, as well as their criteria for having the most secure mobile operating system.
Posted: 29 Jan 2014 | Published: 18 Jul 2014

BlackBerry

Handbook: Increasing Wireless LAN Capacity: Understanding your options
sponsored by SearchNetworking.com
EZINE: In this tech guide, learn how to increase capacity in your enterprise wireless LAN with 802.11ac, and explore the uses of 60 GHz wireless technology in the upcoming 802.11ad standard.
Posted: 11 Sep 2013 | Published: 11 Sep 2013

SearchNetworking.com

Windows Server 2012 Security from End to Edge and Beyond
sponsored by ComputerWeekly.com
BOOK: This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask.
Posted: 02 Sep 2013 | Published: 02 Sep 2013

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement