Standards  >   Network Protocols  >   OSI Protocols  >  

ES-IS Protocol

RSS Feed   
ALSO CALLED: End System to Intermediate System Protocol, End System-Intermediate System Protocol
DEFINITION: ES-IS (End System-to-Intermediate System) is a routing protocol developed by the International Organization for Standardization ( ISO ) as part of their Open Systems Interconnection ( OSI ) model. In the OSI context, an end system (ES) is a node or user device; an intermediate system (IS) is a router .ES-IS allows a node or user device located in a particular subnetwork to determine the existence and  … 

ES-IS Protocol definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
ES-IS Protocol Reports
76 - 86 of 86 Matches Previous Page  |  Next Page
Thou Shalt Not Pass… I Think?!
sponsored by SolarWinds, Inc.
WHITE PAPER: Monitoring and managing VPN concentrators and the combined technology within devices like Cisco ASAs, can be challenging. However, organizations are starting to have a better handle on their networks because they can control them with adaptive devices. In this white paper, learn about breakthroughs for monitoring and managing these technologies.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

SolarWinds, Inc.

TOGAF® and SABSA® Integration
sponsored by ComputerWeekly.com
IT BRIEFING: This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology.
Posted: 05 Jan 2012 | Published: 11 Oct 2011

ComputerWeekly.com

Tunnel-Based versus Tunnel-Free SD-WAN
sponsored by 128 Technology
ANALYST REPORT: SD-WAN enables the kind of connectivity needed in today’s cloud era. However, overlay-based SD-WAN comes with one big caveat: dependence on tunnels. Although these tunnels can make the creation of overlays easier, there are issues. In this research report, learn about the benefits and the option of tunnel-free SD-WAN.
Posted: 20 Mar 2020 | Published: 20 Mar 2020

128 Technology

Understanding Network TAPs
sponsored by Gigamon
WHITE PAPER: Network security depends not only on common communication protocols but also on the ability to decipher what’s actually in those packets. There’s a simple solution to this that provides visibility into networked traffic: network TAPs. Read the white paper to gain a full understanding of why TAPs are the most effective way to copy network traffic.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

Gigamon

Video conferencing standards and interoperability considerations
sponsored by SearchSecurity.com
EGUIDE: Before you can successfully implement a video conferencing system into your enterprise, you must first understand the standards involved to ensure your solution will work with others on your network.  This e-guide uncovers standards and interoperability considerations while also providing migration planning tips.
Posted: 27 Apr 2011 | Published: 27 Apr 2011

SearchSecurity.com

Virtual Panel: COVID-19 & Public Transit
sponsored by CradlePoint
WEBCAST: COVID-19 has caused mass transit ridership and fare revenues to drop by more than 90%. Public transit will hopefully become disease-free sooner rather than later, but agencies must consider the connectivity of riders and how they are accounted for. Watch this webcast for a panel discussion on the implications of COVID-19 on transit technology.
Posted: 10 Sep 2020 | Premiered: Aug 5, 2020

CradlePoint

WAN Speak Musings – Volume I
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.
Posted: 02 May 2013 | Published: 02 May 2013

ComputerWeekly.com

The Swiss Army Knife for the Network Analyst
sponsored by Riverbed Technology, Inc.
CASE STUDY: This exclusive case study covers a tool that helped one company with their network and protocol analysis.
Posted: 31 Jul 2014 | Published: 03 Aug 2013

Riverbed Technology, Inc.

Virtualization Roadmap: Twists, Turns, and Key Considerations
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: This expert presentation transcript explores key management factors you should consider as you navigate your virtualization initiative, including licensing, memory capabilities, and more. Hear about one company's virtualization roadmap and determine whether it aligns with your own virtualization plans.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Dell, Inc. and Intel®

What Enterprises Should Do About IPv6 in 2011
sponsored by Cisco Systems, Inc.
WHITE PAPER: The purpose of this white paper is to provide enterprises with guidance, based on a three- to five-year outlook, on how IPv6 should be included in their network design, planning, and operations starting today. The intended audience is enterprise network administrators.
Posted: 26 Jan 2011 | Published: 26 Jan 2011

Cisco Systems, Inc.

What to Look for in Secure Sockets Layer
sponsored by SearchSecurity.com
EBOOK: This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.
Posted: 04 May 2016 | Published: 04 May 2016

SearchSecurity.com
76 - 86 of 86 Matches Previous Page    2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info