Standards  >   Network Protocols  >  

Open Systems Protocols

RSS Feed    Add to Google    Add to My Yahoo!
Open Systems Protocols White Papers (View All Report Types)
 
Critical Concepts of the 200-120 CCNA Routing and Switching Exam
sponsored by Global Knowledge
WHITE PAPER: This paper reviews the major concepts covered on the Cisco Certified Network Associate Routing and Switching exam as of spring 2013.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

Foundational Focus: OSI Model - Breaking Down the 7 Layers
sponsored by Global Knowledge
WHITE PAPER: The OSI model is a conceptual tool used to discuss and describe network functions. It is a good idea to be familiar with the OSI model, the features assigned to each layer, and examples of common protocols or technologies associated with the OSI layers.
Posted: 07 May 2013 | Published: 12 Apr 2013

Global Knowledge

The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER: This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

TCP/IP Sleuthing--Troubleshooting TCP/IP Using Your Toolbox
sponsored by Global Knowledge
WHITE PAPER: Troubleshooting is a necessary part of supporting any network installation. This paper will explain how to consider troubleshooting different problems that could exist in network.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

Comparing Private Line, Frame Relay, ATM, Ethernet and IP VPNs
sponsored by AT&T Corp
WHITE PAPER: This whitepaper helps enterprises choose the appropriate WAN solution.
Posted: 01 Mar 2011 | Published: 01 Mar 2011

AT&T Corp

The Seven Best Practices of Highly Effective eDiscovery Practitioners: Powerful Lessons in eDiscovery Success
sponsored by Guidance Software, Inc.
WHITE PAPER: The Seven Best Practices of Highly Effective eDiscovery Practitioners article provides legal professionals with insight on how they and other members of the eDiscovery team can achieve a repeatable, defensible in-house eDiscovery process. Read this paper to learn so much more.
Posted: 15 Apr 2010 | Published: 15 Apr 2010

Guidance Software, Inc.

Managed File Transfer: The Need for a Strategic Approach
sponsored by Inovis
WHITE PAPER: This paper discusses how business environments are governed by increasingly stringent regulations and consumer demands for privacy. Learn how Managed File Transfer (MFT) can be your solution.
Posted: 04 Sep 2008 | Published: 04 Sep 2008

Inovis

Simplify Your Route to the Internet: Three Advantages of Using LISP
sponsored by Global Knowledge
WHITE PAPER: Uncover the ins and outs of the Location ID separation protocol (LISP): what it is, how it works, how it compares to BGP, and the top three advantages it provides. View now to get help deciding if this protocol can truly help simplify the route to the internet in your organization.
Posted: 29 Jan 2013 | Published: 29 Jan 2013

Global Knowledge

Ten Top Problems Network Techs Encounter
sponsored by Fluke Networks
WHITE PAPER: This whitepaper discusses ten common problems encountered by network technicians today and their symptoms, causes, and resolutions.
Posted: 27 Jan 2010 | Published: 01 Jul 2009

Fluke Networks

Wireless LAN ITDC - Checklist #2
sponsored by SearchSecurity.com
EGUIDE: Download this quick read to get an overview of technical requirements for wireless solutions, questions to ask potential vendors, and a list of vendors that have products that may meet your needs.
Posted: 22 Oct 2012 | Published: 22 Oct 2012

SearchSecurity.com

WLAN Planning For BYOD
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchNetworking.com explores the impact BYOD is having on the WLAN and what you need to do to provide a quality experience to your mobile users without compromising security or control.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

SearchSecurity.com

Tackling Top Wireless Challenges and Debunking Common Myths: Expert Roadmap
sponsored by ADTRAN, Inc.
EGUIDE: This E-Guide from SearchNetworking.com explores the myths associated with cloud-managed WLANs and aims to help you understand what you can truly expect from these service offerings.
Posted: 17 Sep 2012 | Published: 17 Sep 2012

ADTRAN, Inc.

Keeping Up With Network Needs: Five WLAN Questions Answered
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchNetworking.com, wireless expert Lisa A. Phifer takes a look at the top challenges facing the WLAN environment and answers our readers' top after-implementation WLAN questions regarding issues plaguing today's network engineers.
Posted: 12 Feb 2013 | Published: 12 Feb 2013

SearchSecurity.com

Wireless LAN ITDC - Checklist #1
sponsored by SearchSecurity.com
EGUIDE: In the first of SearchNetworking.com's three-part guide on selecting wireless products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of wireless solutions.
Posted: 19 Oct 2012 | Published: 19 Oct 2012

SearchSecurity.com

Upgrading to 802.11n
sponsored by SearchSecurity.com
EGUIDE: This E-Guide identifies key questions that enterprise customers should ask prospective WLAN vendors and also provides a list of vendors that will suit the needs specific to your business.
Posted: 18 Jan 2012 | Published: 18 Jan 2012

SearchSecurity.com

E-Guide: Wireless LAN access control: Managing users and their devices
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions.
Posted: 15 Jul 2011 | Published: 14 Jul 2011

SearchSecurity.com

Ensuring an Optimal Wi-Fi Experience: Best Practices
sponsored by SearchSecurity.com
EGUIDE: This expert guide from SearchNetworking.com examines the available options and best practices to boost your wireless experience.
Posted: 15 Oct 2013 | Published: 15 Oct 2013

SearchSecurity.com

Wireless LAN ITDC - Checklist #3
sponsored by SearchSecurity.com
EGUIDE: This is the third piece in SearchNetworking.com's three-part guide on wireless products. This expert asset takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing a wireless solution.
Posted: 23 Oct 2012 | Published: 23 Oct 2012

SearchSecurity.com

E-Guide: Choosing enterprise wireless LAN equipment
sponsored by NETGEAR Inc.
EGUIDE: 802.11N has solidified and a new product generation has emerged, the time is right for enterprises to pursue broader WLAN deployment. Purchases should be driven by technical requirements that map business needs onto product capabilities. To help you complete that step, we have compiled a list of common enterprise WLAN requirements.
Posted: 09 Mar 2011 | Published: 09 Mar 2011

NETGEAR Inc.

The Packet Delivery Process: Locally Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are locally connected, containing definitions of key terms and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

The Packet Delivery Process: Remotely Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are remotely connected, including key definitions and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

WLAN Market Predicitions
sponsored by TechTarget
RESOURCE: The world of WLAN is ever-expanding and is changing worker behavior and how businesses are functioning. This informative guide dives deep into the most recent expert content of the future of WLAN. From Wi-Fi and 802.11ac, discover what you need to know for 2014.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

CW Buyer's Guide: IPV6 Migration
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This Computer Weekly Buyer's guide takes you through the steps you need to take to migrate to IPv6 and explains the potential impact on your business.
Posted: 26 Jul 2012 | Published: 05 Feb 2012

ComputerWeekly.com

Application Integration in Distributed Retail Environments
sponsored by MuleSoft
WHITE PAPER: This informative guide describes how current data-center-focused technologies are ill-suited for distributed retail environments, and explains how building a network of integrated applications can overcome these limitations. Uncover key characteristics of such a system by reading on now.
Posted: 19 Feb 2013 | Published: 31 Dec 2012

MuleSoft

SDN in the Data Center: What's in Store for the Future
sponsored by SearchSecurity.com
WHITE PAPER: Virtualization of servers and workloads has improved the efficiency of data centers, but networking has lagged behind. This eGuide takes a look at software-defined networking (SDN), and how it has the potential to fully integrate the data center.
Posted: 16 Oct 2013 | Published: 15 Oct 2013

SearchSecurity.com

WAN Speak Musings – Volume I
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.
Posted: 02 May 2013 | Published: 02 May 2013

ComputerWeekly.com

Navigating your Future within an SOA information manufacturing system
sponsored by ComputerWeekly.com
BOOK: As the IT industry reaches maturity, IT departments should think of themselves not as data centres but as manufacturing centres for information. Terry Keene argues in this short e-book.
Posted: 27 Aug 2013 | Published: 27 Aug 2013

ComputerWeekly.com

Network Purchasing Intentions 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This exclusive Computer Weekly/TechTarget research ,based on a survey of over 400 European IT professionals, reveals organisations’ investment plans for networking technology.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

ComputerWeekly.com

Bringing System Management to Messaging & Collaboration
sponsored by ComputerWeekly.com
ANALYST REPORT: The fast growing interaction between email, collaboration and social media is creating new management pressures. Analysts Bernt Ostergaard and Clive Longbottom offer answers in this paper from Quocirca.
Posted: 24 Apr 2014 | Published: 24 Apr 2014

ComputerWeekly.com

SIP contact centers: Key benefits and potential challenges
sponsored by SearchSecurity.com
EGUIDE: Learn how Session Initiation Protocol (SIP), unified communications (UC) and contact centers fit hand in hand in this e-guide from SearchUnifiedCommunications.com.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

SearchSecurity.com

LAN Fundamentals: Logical Addresses vs. Physical Addresses
sponsored by Global Knowledge
WHITE PAPER: There are two basic types of addresses used in Local Area Networking (LAN): logical addresses and physical addresses. Ethernet is the most common LAN and is the example used in this document. Understanding the differences of how the two addresses are used is the focus of this discussion.
Posted: 14 Jun 2013 | Published: 20 May 2013

Global Knowledge

IPV6 Transition – Why the rush ?
sponsored by ComputerWeekly.com
ANALYST BRIEF: This report from Ovum warns that enterprises need to recognise that they will need to move to IPv6, even if they have IPv4 addresses available. They should treat IPv6 like any other disaster recovery plan.
Posted: 01 Dec 2011 | Published: 01 Dec 2011

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement