IT Systems  >   Communications Networks  >   LAN  >  

Virtual LAN Software

RSS Feed    Add to Google    Add to My Yahoo!
Virtual LAN Software White Papers (View All Report Types)
 
The Packet Delivery Process: Remotely Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are remotely connected, including key definitions and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

The Packet Delivery Process: Locally Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are locally connected, containing definitions of key terms and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

What Is an Ethernet Fabric?
sponsored by Brocade
WHITE PAPER: Compared to classic hierarchical Ethernet architectures, Ethernet fabrics provide the higher levels of performance, utilization, availability and simplicity required to meet the business needs of data centers today and into the future.
Posted: 15 Nov 2011 | Published: 31 Aug 2011

Brocade

Switching Essentials: An Introduction to Network Switching
sponsored by Global Knowledge
WHITE PAPER: In this white paper, we will address the basics of this Layer 2 technology and help you get your network switch up and running. For our examples, we will use Cisco's 2950 switch.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

Five Best Practices to Protect Your Virtual Environment
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover how you can realize the benefits of virtualization without sacrificing security in this whitepaper that outlines five best practices to utilize to protect your virtual environment.
Posted: 01 May 2012 | Published: 20 Apr 2012

Juniper Networks, Inc.

Solving the Mysteries of Subnetting
sponsored by Global Knowledge
WHITE PAPER: Subnetting is a complicated topic that has confused students for a very long time, however, subnetting is an important topic for many different certifications with various vendors, including Cisco.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

The ECHO™ - Avaya Connection: ECHO™, and How It Interacts with Avaya's Telephony Solutions
sponsored by Teleformix
WHITE PAPER: Read this paper to learn how Teleformix's ECHO™ digital recording solution integrates seamlessly with Avaya's telephony systems, providing your company with a crucial customer service tool - quality assurance recording.
Posted: 11 Jul 2008 | Published: 01 Jul 2007

Teleformix

The Case for Virtual Local Area Networks (VLANs)
sponsored by Global Knowledge
WHITE PAPER: In this whitepaper you will learn about the evolution of Ethernet, the reasons VLANs were introduced, and the ways that VLANs can be used.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

Eliminating Security Trade-Offs with Cross-Platform Server Isolation
sponsored by Apani
WHITE PAPER: This paper will examine the challenges of using network firewalls and VLANs for security within the corporate network and introduce the many advantages of cross-platform server isolation as an alternative in protecting servers.
Posted: 18 Feb 2008 | Published: 01 Feb 2008

Apani
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement