Standards  >   Network Protocols  >   LAN Protocols  >  

Internet Packet Exchange Protocol

RSS Feed    Add to Google    Add to My Yahoo!
Internet Packet Exchange ProtocolReports
 
LAN Fundamentals: Logical Addresses vs. Physical Addresses
sponsored by Global Knowledge
WHITE PAPER: There are two basic types of addresses used in Local Area Networking (LAN): logical addresses and physical addresses. Ethernet is the most common LAN and is the example used in this document. Understanding the differences of how the two addresses are used is the focus of this discussion.
Posted: 14 Jun 2013 | Published: 20 May 2013

Global Knowledge

Surviving and Thriving in a World of Change
sponsored by Workday
WEBCAST: Watch this in-depth webcast to find out about the changes in financial management systems and regulations.
Posted: 21 Apr 2014 | Premiered: Feb 12, 2014

Workday

Cox Metro Ethernet Services
sponsored by Cox Communications, Inc.
WHITE PAPER: This white paper introduces two network solutions, ELAN and MPLS IP-VPN, and helps you to discover which is better suited for your enterprise's networking needs.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Cox Communications, Inc.

The Open Group - Cloud Computing guide to interoperability and portability
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide from the Open Group offers advice to businesses on how to avoid supplier "lock-in" when you move data into the cloud.
Posted: 05 Jul 2013 | Published: 05 Jul 2013

ComputerWeekly.com

EtherScope Network Assistant -- Free Hardware Trial
sponsored by Fluke Networks
PRODUCT DEMO: First responders to network emergencies need to solve problems fast on 10, 100 and Gig copper, fiber and wireless LAN networks. This tool helps frontline network professionals quickly solve the wide range of problems they encounter.
Posted: 04 Feb 2009 | Published: 04 Feb 2009

Fluke Networks

Virtualization Roadmap: Twists, Turns, and Key Considerations
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: This expert presentation transcript explores key management factors you should consider as you navigate your virtualization initiative, including licensing, memory capabilities, and more. Hear about one company's virtualization roadmap and determine whether it aligns with your own virtualization plans.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Dell, Inc. and Intel®

Securing the Foundation of Information Technology (IT) Systems
sponsored by Trusted Computer Solutions
WHITE PAPER: This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process.
Posted: 12 Jan 2010 | Published: 12 Jan 2010

Trusted Computer Solutions

Closing the IT Process Automation Gap
sponsored by Opalis Software, Inc.
WHITE PAPER: Many organizations are in the midst of implementing ITIL. But are they putting the appropriate operational processes into place? Learn how automating operational processes with run book automation software can help organizations better benefit from ITIL.
Posted: 28 Aug 2007 | Published: 01 Aug 2007

Opalis Software, Inc.

Database Middleware: Struggling with Performance?
sponsored by Progress DataDirect
WHITE PAPER: Drivers are an important component of database middleware, but they don’t work in isolation. They’re part of a multi-layered architecture that handles the communication between a database application and the database management software. Learn how these layers influence performance and how to optimize efficiency for data requests and responses.
Posted: 03 Feb 2011 | Published: 03 Feb 2011

Progress DataDirect

The Packet Delivery Process: Locally Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are locally connected, containing definitions of key terms and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

The Packet Delivery Process: Remotely Connected Hosts
sponsored by Global Knowledge
WHITE PAPER: This white paper focuses on the packet delivery process when two devices are remotely connected, including key definitions and a detailed look at the actual process of exchanging data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

Secure internet routing
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com

Improve BYOD with the Bonjour Protocol
sponsored by Aerohive Networks
EGUIDE: This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Aerohive Networks

Fair exchange protocols with anonymity and non-repudiation for payments
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series looks in detail at two key principles necessary for secure payments: fair exchange and non-repudiation.
Posted: 02 May 2013 | Published: 02 May 2013

ComputerWeekly.com

How to tackle secure protocols and mobile management
sponsored by ComputerWeekly.com
WHITE PAPER: For a truly mobile device, operating to de-perimeterised principles, a wireless connection is probably required to achieve optimal connectivity while roaming.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

Simplify Your Route to the Internet: Three Advantages of Using LISP
sponsored by Global Knowledge
WHITE PAPER: Uncover the ins and outs of the Location ID separation protocol (LISP): what it is, how it works, how it compares to BGP, and the top three advantages it provides. View now to get help deciding if this protocol can truly help simplify the route to the internet in your organization.
Posted: 29 Jan 2013 | Published: 29 Jan 2013

Global Knowledge

How to tackle internet filtering and reporting
sponsored by ComputerWeekly.com
WHITE PAPER: In an environment where access to a secure computing device is governed and controlled by inherently secure protocols, the problem still remains of how access to untrusted environments such as the Web is controlled.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

Internet Security Threat Report - 2014
sponsored by Symantec Corporation
WHITE PAPER: This in-depth guide explores today's widespread threat landscape and 7 areas that deserve special attention in the coming year.
Posted: 07 May 2014 | Published: 07 May 2014

Symantec Corporation

What Is Ethernet-Dedicated Internet?
sponsored by Cox Communications, Inc.
EGUIDE: This e-guide answers a number of questions about Ethernet DIA, a continuous, high-bandwidth method for enterprises to connect their LANs with the public internet and streamline the performance of their WAN.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

Cox Communications, Inc.

How traditional firewalls fail
sponsored by Dell Software
WHITE PAPER: Your current firewall may be jeopardizing your security. This white paper explains exactly where traditional firewalls fall short, and how next-generation firewalls can help.
Posted: 20 Dec 2012 | Published: 20 Dec 2012

Dell Software

Ixia Black Book: Long Term Evolution – Evolved Packet Core Network
sponsored by Ixia
WHITE PAPER: Read on to get an insider's look at the cutting-edge Long Term Evolution , or LTE, technology, and dive into plenty of Evolved Packet Core test cases along the way.
Posted: 27 Feb 2014 | Published: 31 Dec 2012

Ixia

IT in Europe: Next-Generation Network Management Techniques
sponsored by SearchNetworking.co.UK
EZINE: This issue examines how network managers can simplify their management tools gather from the network through the use of protocols like NetFlow and IPFIX and hardware like matrix switches. Learn how network managers are adopting new tools that give them better control over virtualized infrastructure, cloud environment and multi-vendor networks.
Posted: 09 Mar 2012 | Published: 08 Mar 2012


It's Time to Simplify Large File Exchanges
sponsored by GlobalScape
WHITE PAPER: Access this resource to explore a range of security solutions built to fit varying business needs for exchanging large files.
Posted: 23 May 2014 | Published: 23 May 2014

GlobalScape

Internet Gateway Security – A state of the nation
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth white paper, discover how new next generation firewalls can protect organisations against dangerous threats as well as address the vulnerabilities created by new technologies like cloud computing and mobilisation.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Icomm Technologies

Enabling the Internet of Things For Smarter Environments
sponsored by IBM
WHITE PAPER: Driven by the ongoing rapid growth in low-cost, web-enabled smart sensors and mobile broadband communications, the emerging Internet of Things promises to transform our personal and working lives. But what does it take to truly tap into the potential of the data surrounding the IoT? Read the following white paper to find out more.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

IBM

WAN Speak Musings – Volume II
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles.
Posted: 01 Jul 2013 | Published: 01 Jul 2013

ComputerWeekly.com

Network Performance Management Comes of Age
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Riverbed Cascade is a new type of tool that incorporates traffic monitoring, packet capture and protocol analysis to provide an application-aware view of the network. Download this white paper from NetMedia to learn how Riverbed Cascade can help to solve your IT performance challenges.
Posted: 23 Apr 2013 | Published: 23 Apr 2013

Riverbed Technology, Inc.

The Four Elements of OSPF
sponsored by Global Knowledge
WHITE PAPER: This whitepaper explores 4 key elements for the implementation of open shortest path first (OSPF).
Posted: 02 Apr 2014 | Published: 02 Apr 2014

Global Knowledge

DDos Survival Handbook
sponsored by Singlehop
WHITE PAPER: This handbook is the survival guide to fight off cyber attackers and mitigate the risk of DDoS attacks.
Posted: 29 Sep 2014 | Published: 31 Dec 2013

Singlehop

Content Filtering: Taming the Wild Web
sponsored by SearchSecurity.com
EGUIDE: Despite the countless opportunities and benefits the Internet provides, it also introduces a number of business risks. In this e-guide, uncover expert advice on how to mitigate risks with content filtering as well as how to balance web control with employee privacy.
Posted: 22 Jun 2012 | Published: 21 Jun 2012

SearchSecurity.com

CW Buyer's Guide: IPV6 Migration
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This Computer Weekly Buyer's guide takes you through the steps you need to take to migrate to IPv6 and explains the potential impact on your business.
Posted: 26 Jul 2012 | Published: 05 Feb 2012

ComputerWeekly.com

The Four Elements of IS-IS
sponsored by Global Knowledge
WHITE PAPER: This informative guide discusses 4 key elements for the implementation of Intermediate System - Intermediate System (IS-IS).
Posted: 02 Apr 2014 | Published: 02 Apr 2014

Global Knowledge

SIP and the Art of Converged Communications
sponsored by Global Knowledge
WHITE PAPER: Session Initiation Protocol (SIP) is an internet signaling protocol, developed by the IETF (starting in 1996), for establishing, maintaining, and tearing down sessions between a variety of real-time media, including voice, video, and chat. This white paper is going to look at the way SIP is used in the converged Unified Communications environment.
Posted: 25 Jul 2013 | Published: 18 Jun 2013

Global Knowledge
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement