Standards  >   Network Protocols  >  

Local Area Network Protocols

RSS Feed    Add to Google    Add to My Yahoo!
Local Area Network Protocols White Papers (View All Report Types)
 
The Packet Delivery Process: Locally Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are locally connected, containing definitions of key terms and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

The Packet Delivery Process: Remotely Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are remotely connected, including key definitions and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

Critical Concepts of the 200-120 CCNA Routing and Switching Exam
sponsored by Global Knowledge
WHITE PAPER: This paper reviews the major concepts covered on the Cisco Certified Network Associate Routing and Switching exam as of spring 2013.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

Savvy Network Architects Are Boosting Performance and Lowering the TCO of Campus LANs
sponsored by Brocade
WHITE PAPER: Campus networks are vital to many top initiatives of the modern enterprise. However, to deliver the performance requirements of a campus LAN, new, cost-effective, efficient solutions are needed. In this resource, uncover how a multivendor approach can help you increase network performance while lowering the TCO of campus LANs.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

Brocade

Ensuring the Health of Tomorrow's Fiber LANs - Part II: OTDR Trace Analysis -- Become an Expert Troubleshooter with Advanced OTDR Trace Analysis
sponsored by Fluke Networks
WHITE PAPER: Experience designing cable and network testers has enabled a breakthrough in automated fiber trace analysis. This white paper discusses how an OTDR detects and analyzes test results, and explains expected and unexpected trace data from fiber networks.
Posted: 09 Nov 2006 | Published: 01 Nov 2006

Fluke Networks

Top US Law Firm Delivers Quality Service While Containing Costs
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how a top 100 US law firm is leveraging Cisco WAAS to reduce bandwidth costs and optimize its WAN, to keep information flow among its offices fast, secure and easy.
Posted: 18 Dec 2006 | Published: 01 Dec 2006

Cisco Systems, Inc.

Emerging Multicast VPN Applications
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper provides background information on MVPNs, as well as describes emerging MVPN applications.
Posted: 25 Nov 2008 | Published: 25 Nov 2008

Juniper Networks, Inc.

Motorola's Wireless Broadband Indoor/Outdoor Solution
sponsored by Motorola, Inc.
WHITE PAPER: With a Wi-Fi network, businesses can increase the efficiency of their mobile employees resulting in increased ROI and greater profitability. This document highlights two specific indoor/outdoor Wi-Fi network configurations based on Motorola's MOTOMESH Duo product solution.
Posted: 28 Apr 2009 | Published: 02 Apr 2009

Motorola, Inc.

What Is an Ethernet Fabric?
sponsored by Brocade
WHITE PAPER: Compared to classic hierarchical Ethernet architectures, Ethernet fabrics provide the higher levels of performance, utilization, availability and simplicity required to meet the business needs of data centers today and into the future.
Posted: 15 Nov 2011 | Published: 31 Aug 2011

Brocade

Keeping Up With Network Needs: Five WLAN Questions Answered
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchNetworking.com, wireless expert Lisa A. Phifer takes a look at the top challenges facing the WLAN environment and answers our readers' top after-implementation WLAN questions regarding issues plaguing today's network engineers.
Posted: 12 Feb 2013 | Published: 12 Feb 2013

SearchSecurity.com

Wireless LAN ITDC - Checklist #3
sponsored by SearchSecurity.com
EGUIDE: This is the third piece in SearchNetworking.com's three-part guide on wireless products. This expert asset takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing a wireless solution.
Posted: 23 Oct 2012 | Published: 23 Oct 2012

SearchSecurity.com

Wireless LAN ITDC - Checklist #2
sponsored by SearchSecurity.com
EGUIDE: Download this quick read to get an overview of technical requirements for wireless solutions, questions to ask potential vendors, and a list of vendors that have products that may meet your needs.
Posted: 22 Oct 2012 | Published: 22 Oct 2012

SearchSecurity.com

Hype or Ripe? 5 Essential Elements of the 802.11ac Wave 2 Business Case
sponsored by Extreme Networks
EBOOK: In this e-book, you will discover the five key justifications required to build a business case for investment in Wave 2 of 802.11ac. Read on to receive the benefits of this wireless technology and learn how it helps maximize end user productivity.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

Extreme Networks

WLAN Planning For BYOD
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchNetworking.com explores the impact BYOD is having on the WLAN and what you need to do to provide a quality experience to your mobile users without compromising security or control.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

SearchSecurity.com

Wireless LAN ITDC - Checklist #1
sponsored by SearchSecurity.com
EGUIDE: In the first of SearchNetworking.com's three-part guide on selecting wireless products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of wireless solutions.
Posted: 19 Oct 2012 | Published: 19 Oct 2012

SearchSecurity.com

Ensuring an Optimal Wi-Fi Experience: Best Practices
sponsored by SearchSecurity.com
EGUIDE: This expert guide from SearchNetworking.com examines the available options and best practices to boost your wireless experience.
Posted: 15 Oct 2013 | Published: 15 Oct 2013

SearchSecurity.com

Upgrading to 802.11n
sponsored by SearchSecurity.com
EGUIDE: This E-Guide identifies key questions that enterprise customers should ask prospective WLAN vendors and also provides a list of vendors that will suit the needs specific to your business.
Posted: 18 Jan 2012 | Published: 18 Jan 2012

SearchSecurity.com

Establishing a Robust VoIP Infrastructure: Five Best Practices
sponsored by Oracle Corporation
EGUIDE: This expert e-guide highlights the five most important practices for establishing a robust VoIP infrastructure. Read on now to discover the amount of VoIP bandwidth you'll need to avoid latency for SIP trunk services.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

Oracle Corporation

Network Purchasing Intentions 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This exclusive Computer Weekly/TechTarget research ,based on a survey of over 400 European IT professionals, reveals organisations’ investment plans for networking technology.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

ComputerWeekly.com

E-Guide: Choosing enterprise wireless LAN equipment
sponsored by NETGEAR Inc.
EGUIDE: 802.11N has solidified and a new product generation has emerged, the time is right for enterprises to pursue broader WLAN deployment. Purchases should be driven by technical requirements that map business needs onto product capabilities. To help you complete that step, we have compiled a list of common enterprise WLAN requirements.
Posted: 09 Mar 2011 | Published: 09 Mar 2011

NETGEAR Inc.

Tackling Top Wireless Challenges and Debunking Common Myths: Expert Roadmap
sponsored by ADTRAN, Inc.
EGUIDE: This E-Guide from SearchNetworking.com explores the myths associated with cloud-managed WLANs and aims to help you understand what you can truly expect from these service offerings.
Posted: 17 Sep 2012 | Published: 17 Sep 2012

ADTRAN, Inc.

Next Generation Network Management Techniques
sponsored by SearchSecurity.com
EZINE: The February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles!
Posted: 02 Feb 2012 | Published: 02 Feb 2012

SearchSecurity.com

Top WLAN products: Determine which one is right for you
sponsored by TechTarget
RESOURCE: Our latest e-guide looks at wireless LAN (WLAN) technology and the evolution of cloud-controlled versus on-premises WLAN solutions. Access this resource now and learn what to look for when buying these products and examine the top WLAN products in the market.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

E-Guide: Wireless LAN access control: Managing users and their devices
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions.
Posted: 15 Jul 2011 | Published: 14 Jul 2011

SearchSecurity.com

What network virtualization technology can do for your network today
sponsored by VMware
EGUIDE: Software-defined networking (SDN) and network virtualization technologies are being combined to fundamentally change our approach to networking. This exclusive guide will enlighten you on how these burgeoning technologies are being used to create a new networking foundation.
Posted: 24 May 2016 | Published: 17 May 2016

VMware

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

E-Guide: Virtualization implementation and management: A network perspective
sponsored by SearchSecurity.com
EGUIDE: Virtualization has become a reality in the networking world. It is vital for professionals to understand how server virtualization and networks affect each other.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

SearchSecurity.com

WAN Speak Musings – Volume I
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.
Posted: 02 May 2013 | Published: 02 May 2013

ComputerWeekly.com

Building a hybrid network with SDN, network virtualization
sponsored by VMware
EGUIDE: Considering the benefits they offer, it is critical to understand SDN and network virtualization technologies. This exclusive guide will dispel any lingering confusion about SDN and network virtualization and help you determine exactly what to look for when considering vendors.
Posted: 24 May 2016 | Published: 17 May 2016

VMware

Ten essential network virtualization definitions
sponsored by VMware
EGUIDE: There is some confusion surrounding network virtualization as there is no one definition. In this exclusive guide, you'll find ten definitions to help you better understand the basics and build the best software-defined network possible.
Posted: 24 May 2016 | Published: 17 May 2016

VMware

Networking Requirements for Bringing iPads in the Classroom
sponsored by SearchSecurity.com
EGUIDE: Discover the benefits a BYOD or iPad-in-the-classroom program has to offer, and learn why a stable wireless LAN is vital to their success.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement