IT Management  >   Systems Operations  >   Network Management  >  

Network Performance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Optimization, Network Tuning, Network Performance Management, Performance
DEFINITION: Traffic engineering is a method of optimizing the performance of a telecommunications network by dynamically analyzing, predicting and regulating the behavior of data transmitted over that network. Traffic engineering is also known as teletraffic engineering and traffic management. The techniques of traffic engineering can be applied to networks of all kinds, including the PSTN (public switched telephone  … 
Definition continues below.
Network PerformanceWhite Papers (View All Report Types)
101 - 125 of 540 Matches Previous Page  | Next Page
Authoritative Guide to Advanced LTE Testing
sponsored by Ixia
WHITE PAPER: Find out how to measure the critical elements of network performance under real-world conditions and extreme scale in order to take the guesswork out of determining network quality.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

Ixia

Protecting DNS Infrastructure - Inside and Out
sponsored by Infoblox
WHITE PAPER: This guide takes a look at some top threats your network faces and explores the strategies needed to defend yourself against DNS-based attacks.
Posted: 06 Mar 2014 | Published: 31 Jan 2014

Infoblox

A Cybercriminal's Guide to Exploiting DNS for Fun and Profit
sponsored by Infoblox
WHITE PAPER: This guide explores current network security trends and how to protect your DNS from various cyber-attacks.
Posted: 06 Mar 2014 | Published: 31 Jan 2014

Infoblox

Small Cells, Big Challenge: A Definitive Guide to Designing and Deploying HetNets
sponsored by Ixia
WHITE PAPER: Network operators are under pressure to enhance network coverage, reliability, and capacity, while increasing the quality of the mobile experience. Heterogeneous networks (HetNets) -- more diversified access networks -- are emerging as a strategy to bridge the cost and capacity gap and meet demand.
Posted: 04 Mar 2014 | Published: 30 Nov 2013

Ixia

A Cybercriminal's Guide to Exploiting DNS for Fun and Profit
sponsored by Infoblox
WHITE PAPER: This guide explores current network security trends and how to protect your DNS from various cyber-attacks.
Posted: 04 Mar 2014 | Published: 31 Jan 2014

Infoblox

Optimizing Visibility, Control and Performance of Network Traffic
sponsored by Ixia
WHITE PAPER: Learn how network monitoring switches can help offload and control your current tools, providing the visibility you need for effective data center network monitoring and management.
Posted: 03 Mar 2014 | Published: 30 Jun 2013

Ixia

Best Practices for Utilizing Network Monitoring Switches in Cisco Environments
sponsored by Ixia
WHITE PAPER: Access this white paper to discover how network monitoring switches can help overcome the challenges of deploying packet-based monitoring in a Cisco network.
Posted: 03 Mar 2014 | Published: 31 Mar 2013

Ixia

Simplify Network Monitoring
sponsored by Ixia
WHITE PAPER: Day-to-day network monitoring shouldn't be as difficult as it is--but as networks expand, infrastructures have become more complex. Discover how network monitoring switches can help.
Posted: 03 Mar 2014 | Published: 30 Jun 2013

Ixia

Five Steps to Building Visibility and Security Into Your Network
sponsored by Ixia
WHITE PAPER: Discover five steps you need to take to not only build visibility and security into your network, but also get the most out of your current monitoring investments.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

Ixia

Improving Network Visibility with Advanced Packet Filtering
sponsored by Ixia
WHITE PAPER: Find out more about a network monitoring switch tool with advanced filtering options that can quickly resolve network problems and address future requirements.
Posted: 28 Feb 2014 | Published: 31 Aug 2013

Ixia

Automation: The Future of Network Visibility
sponsored by Ixia
WHITE PAPER: Gain an understanding of how monitoring switch automation fits your organization, and discover how different security tools can help boost your compliance initiatives.
Posted: 28 Feb 2014 | Published: 30 Nov 2013

Ixia

Ixia Black Book: Long Term Evolution – Evolved Packet Core Network
sponsored by Ixia
WHITE PAPER: Read on to get an insider's look at the cutting-edge Long Term Evolution , or LTE, technology, and dive into plenty of Evolved Packet Core test cases along the way.
Posted: 27 Feb 2014 | Published: 31 Dec 2012

Ixia

Ixia Black Book: Long Term Evolution - Access
sponsored by Ixia
WHITE PAPER: This in-depth guide provides a general overview of the LTE technology market and explores some informative case studies about LTE.
Posted: 25 Feb 2014 | Published: 31 Dec 2012

Ixia

Next Generation Enterprise Network Security Solutions: The Importance of Incorporating Vulnerability Intelligence-
sponsored by Hewlett-Packard Company
WHITE PAPER: This crucial paper surveys today's network security threat landscape, discussing available tools, best practices, and the critical role that vulnerability intelligence must play in your security strategy.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

Hewlett-Packard Company

The Four Elements of EIGRP
sponsored by Global Knowledge
WHITE PAPER: EIGRP has been used successfully for many years by enterprises of all sizes, using mostly Cisco devices. It converges as fast as any other internal gateway protocol and provides features that facilitate design, implementation, and troubleshooting. Download this resource to learn more.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Global Knowledge

Cisco Communications Products in an IPv6 World
sponsored by Global Knowledge
WHITE PAPER: As IPv6 becomes more common place, it is important to know how Cisco Unified Contact Center Enterprise (Unified CCE) integrates with Cisco Unified Communications solutions, how IPv6 is supported, and how to accommodate it within your unified solution. The added IPv6 features like embedded security makes that goal more attractive and desirable.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Global Knowledge

Network IPS Tested Against Latest Vulnerabilities and Attacks
sponsored by IBM
WHITE PAPER: This white paper serves as a guide to help you choose your intrusion prevention system (IPS) investment. Click through for information on a solution that passed essential test factors.
Posted: 20 Feb 2014 | Published: 18 Dec 2013

IBM

Modern, High-Velocity Application Delivery
sponsored by CA Technologies.
WHITE PAPER: This guide explores a unique application delivery strategy and how you can enhance network speed and performance while lowering operational costs.
Posted: 06 Mar 2014 | Published: 31 Dec 2013

CA Technologies.

Why Protection and Performance Matter: Introducing Next-Generation Firewalls
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to discover the benefits of a next-generation firewall and how it offers top security without causing serious network latency.
Posted: 27 Feb 2014 | Published: 31 Dec 2012

Dell, Inc.

Unified Threat Management Guide
sponsored by Sophos, Inc.
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Sophos, Inc.

K-12 School District Implements BYOD and Incorporates Blended Learning Curriculum with Extreme Networks Products
sponsored by Extreme Networks
WHITE PAPER: This case study takes a look at how one school successfully implemented BYOD initiatives and centralized network management.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

Extreme Networks

Chiayi City Tax Bureau Protects Intranet and Extranet from Unauthorized Access with Extreme Networks
sponsored by Extreme Networks
WHITE PAPER: This cast study takes a look at how one company successfully updated their network infrastructure and boosted network performance.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Extreme Networks

The “BYOD Done Right™” Solution
sponsored by Extreme Networks
WHITE PAPER: This guide takes a look at a unique tool for solving potential mobility issues and how with enhanced network management, businesses can enjoy a high-performing mobile workplace.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

Extreme Networks

Mobile-First Enterprise; 10 Requirement for Optimizing your Network for Mobility
sponsored by Aerohive Networks
WHITE PAPER: This informative white paper takes a look at what it means to be a mobile-first enterprise, examining what networks are needed to accommodate today's corporate user and how to overcome the problems IT will inevitably run into.
Posted: 18 Feb 2014 | Published: 18 Feb 2014

Aerohive Networks

Extend the OneFabric Architecture to 3rd Party Applications
sponsored by Extreme Networks
WHITE PAPER: This guide explores the value of SDN and how it can help your network overcome the challenges of growing workplace mobility and BYOD.
Posted: 18 Feb 2014 | Published: 18 Feb 2014

Extreme Networks
101 - 125 of 540 Matches Previous Page    3 4 5 6 7 8    Next Page
 
NETWORK PERFORMANCE DEFINITION (continued): …  network), LANs (local area networks), WANs (wide area networks), cellular telephone networks, proprietary business and the Internet.The theory of traffic engineering was originally conceived by A.K. Erlang, a Danish mathematician who developed methods of signal traffic measurement in the early 1900s. Traffic engineering makes use of a statistical concept known as the law of large numbers (LLN), which states that as an experiment is repeated, the observed frequency of a specific outcome approaches the theoretical frequency of that outcome over an entire population. In telecommunications terms, … 
Network Performance definition sponsored by SearchTelecom.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement