IT Management  >   Systems Operations  >   Network Management  >  

Network Performance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Optimization, Network Tuning, Network Performance Management, Performance
DEFINITION: Traffic engineering is a method of optimizing the performance of a telecommunications network by dynamically analyzing, predicting and regulating the behavior of data transmitted over that network. Traffic engineering is also known as teletraffic engineering and traffic management. The techniques of traffic engineering can be applied to networks of all kinds, including the PSTN (public switched telephone  … 
Definition continues below.
Network PerformanceWhite Papers (View All Report Types)
126 - 150 of 564 Matches Previous Page  | Next Page
Best Practices for Utilizing Network Monitoring Switches in Cisco Environments
sponsored by Ixia
WHITE PAPER: Access this white paper to discover how network monitoring switches can help overcome the challenges of deploying packet-based monitoring in a Cisco network.
Posted: 03 Mar 2014 | Published: 31 Mar 2013

Ixia

Simplify Network Monitoring
sponsored by Ixia
WHITE PAPER: Day-to-day network monitoring shouldn't be as difficult as it is--but as networks expand, infrastructures have become more complex. Discover how network monitoring switches can help.
Posted: 03 Mar 2014 | Published: 30 Jun 2013

Ixia

Five Steps to Building Visibility and Security Into Your Network
sponsored by Ixia
WHITE PAPER: Discover five steps you need to take to not only build visibility and security into your network, but also get the most out of your current monitoring investments.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

Ixia

Improving Network Visibility with Advanced Packet Filtering
sponsored by Ixia
WHITE PAPER: Find out more about a network monitoring switch tool with advanced filtering options that can quickly resolve network problems and address future requirements.
Posted: 28 Feb 2014 | Published: 31 Aug 2013

Ixia

Automation: The Future of Network Visibility
sponsored by Ixia
WHITE PAPER: Gain an understanding of how monitoring switch automation fits your organization, and discover how different security tools can help boost your compliance initiatives.
Posted: 28 Feb 2014 | Published: 30 Nov 2013

Ixia

Ixia Black Book: Long Term Evolution – Evolved Packet Core Network
sponsored by Ixia
WHITE PAPER: Read on to get an insider's look at the cutting-edge Long Term Evolution , or LTE, technology, and dive into plenty of Evolved Packet Core test cases along the way.
Posted: 27 Feb 2014 | Published: 31 Dec 2012

Ixia

Ixia Black Book: Long Term Evolution - Access
sponsored by Ixia
WHITE PAPER: This in-depth guide provides a general overview of the LTE technology market and explores some informative case studies about LTE.
Posted: 25 Feb 2014 | Published: 31 Dec 2012

Ixia

Next Generation Enterprise Network Security Solutions: The Importance of Incorporating Vulnerability Intelligence-
sponsored by Hewlett-Packard Company
WHITE PAPER: This crucial paper surveys today's network security threat landscape, discussing available tools, best practices, and the critical role that vulnerability intelligence must play in your security strategy.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

Hewlett-Packard Company

NetFlow Generation
sponsored by Gigamon
WHITE PAPER: This resource explains the importance of NetFlow statistics for traffic visibility, and addresses a solution that will protect against switch performance issues and packet drops.
Posted: 24 Feb 2014 | Published: 31 Jan 2014

Gigamon

Intercontinental Exchange Case Study
sponsored by Gigamon
WHITE PAPER: This white paper highlights a case study where one organization successfully deployed a traffic visibility solution that aggregates, filters and replicates network traffic of various link speeds and distributes the traffic to the appropriate tools.
Posted: 21 Feb 2014 | Published: 31 Dec 2012

Gigamon

The Four Elements of EIGRP
sponsored by Global Knowledge
WHITE PAPER: EIGRP has been used successfully for many years by enterprises of all sizes, using mostly Cisco devices. It converges as fast as any other internal gateway protocol and provides features that facilitate design, implementation, and troubleshooting. Download this resource to learn more.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Global Knowledge

Cisco Communications Products in an IPv6 World
sponsored by Global Knowledge
WHITE PAPER: As IPv6 becomes more common place, it is important to know how Cisco Unified Contact Center Enterprise (Unified CCE) integrates with Cisco Unified Communications solutions, how IPv6 is supported, and how to accommodate it within your unified solution. The added IPv6 features like embedded security makes that goal more attractive and desirable.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Global Knowledge

Network IPS Tested Against Latest Vulnerabilities and Attacks
sponsored by IBM
WHITE PAPER: This white paper serves as a guide to help you choose your intrusion prevention system (IPS) investment. Click through for information on a solution that passed essential test factors.
Posted: 20 Feb 2014 | Published: 18 Dec 2013

IBM

Lowering Your Network Support Costs Can’t Be Done Blindfolded
sponsored by Dimension Data
WHITE PAPER: This whitepaper discusses the importance of getting a full understanding of your data center infrastructure so you can adjust operation to cut costs.
Posted: 06 Feb 2014 | Published: 06 Feb 2014

Dimension Data

Cloud WAN Architecture: Rethinking Networks for the Cloud Era
sponsored by Citrix
WHITE PAPER: This expert E-guide explores some key benefits to upgrading your network infrastructure and adapting your network to the cloud.
Posted: 06 Feb 2014 | Published: 06 Feb 2014

Citrix

Why Protection and Performance Matter: Introducing Next-Generation Firewalls
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to discover the benefits of a next-generation firewall and how it offers top security without causing serious network latency.
Posted: 27 Feb 2014 | Published: 31 Dec 2012

Dell, Inc.

Unified Threat Management Guide
sponsored by Sophos, Inc.
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Sophos, Inc.

K-12 School District Implements BYOD and Incorporates Blended Learning Curriculum with Extreme Networks Products
sponsored by Extreme Networks
WHITE PAPER: This case study takes a look at how one school successfully implemented BYOD initiatives and centralized network management.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

Extreme Networks

Chiayi City Tax Bureau Protects Intranet and Extranet from Unauthorized Access with Extreme Networks
sponsored by Extreme Networks
WHITE PAPER: This cast study takes a look at how one company successfully updated their network infrastructure and boosted network performance.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Extreme Networks

The “BYOD Done Right™” Solution
sponsored by Extreme Networks
WHITE PAPER: This guide takes a look at a unique tool for solving potential mobility issues and how with enhanced network management, businesses can enjoy a high-performing mobile workplace.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

Extreme Networks

Mobile-First Enterprise; 10 Requirement for Optimizing your Network for Mobility
sponsored by Aerohive Networks
WHITE PAPER: This informative white paper takes a look at what it means to be a mobile-first enterprise, examining what networks are needed to accommodate today's corporate user and how to overcome the problems IT will inevitably run into.
Posted: 18 Feb 2014 | Published: 18 Feb 2014

Aerohive Networks

Extend the OneFabric Architecture to 3rd Party Applications
sponsored by Extreme Networks
WHITE PAPER: This guide explores the value of SDN and how it can help your network overcome the challenges of growing workplace mobility and BYOD.
Posted: 18 Feb 2014 | Published: 18 Feb 2014

Extreme Networks

Why Leaks Matter
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive white paper takes an in-depth look at the dangers of network leaks and how your organization can form a strategy to mitigate these risks through comprehensive visibility of connectivity.
Posted: 13 Feb 2014 | Published: 13 Feb 2014

Lumeta Corporation

Key Application Performance Concepts
sponsored by Compuware
WHITE PAPER: Today, application performance management (APM) is more important than ever before. But with so many enterprise applications to manage, APM can easily seem overwhelming. Fortunately, this helpful resource discusses fundamental elements of APM, and offers detailed explanations of important performance concepts.
Posted: 11 Feb 2014 | Published: 31 Dec 2012

Compuware

Enabling Network Monitoring at 40Gbps and 100Gbps
sponsored by Gigamon
WHITE PAPER: This guide explores the evolution of network monitoring, its importance to your data center and how you can raise your monitoring speeds from 40Gbps to 100Gbps.
Posted: 30 Jan 2014 | Published: 31 Dec 2012

Gigamon
126 - 150 of 564 Matches Previous Page    4 5 6 7 8 9    Next Page
 
NETWORK PERFORMANCE DEFINITION (continued): …  network), LANs (local area networks), WANs (wide area networks), cellular telephone networks, proprietary business and the Internet.The theory of traffic engineering was originally conceived by A.K. Erlang, a Danish mathematician who developed methods of signal traffic measurement in the early 1900s. Traffic engineering makes use of a statistical concept known as the law of large numbers (LLN), which states that as an experiment is repeated, the observed frequency of a specific outcome approaches the theoretical frequency of that outcome over an entire population. In telecommunications terms, … 
Network Performance definition sponsored by SearchTelecom.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement