EXPERT ANALYSIS
How Network Engineers Can Avoid Extinction
- Adapt to change and learn new technologies to avoiding becoming a network dinosaur.
By Terry Slattery , 11/04/2016 -
- 0 Comments
- READ
- POST A COMMENT
SDN Market: A Slow Burn
- Gradual enterprise adoption of SDN will drive a $12.7 billion market by 2020, TBR says.
By Marcia Savage , 11/04/2016 -
- 0 Comments
- READ
- POST A COMMENT
Machine Learning, Cloud, And Big Data: A Perfect Storm
- Cloud and big data technologies complement machine learning, creating an array of new applications.
By Bob Friday , 11/04/2016 -
- 0 Comments
- READ
- POST A COMMENT
OpenStack: The Philosophical Divide
- The open source cloud software has spawned a variety of perspectives on the best way to implement it.
By Dan Conde , 11/03/2016 -
- 0 Comments
- READ
- POST A COMMENT
How SDN Interacts With Software-Defined Storage
- A look at the relationship between SDN and SDS and potential performance issues.
By Jim O'Reilly , 11/03/2016 -
- 0 Comments
- READ
- POST A COMMENT
Prepping For The Digital Transformation
- Poll shows many organizations are trying out new technologies like SDN, but don't feel ready for a major...
By Network Computing Editors , 11/02/2016 -
- 0 Comments
- READ
- POST A COMMENT
Network Performance Analysis: TCP MSS
- To ensure optimal performance, check your TCP maximum segment size.
By Tony Fortunato , 11/02/2016 -
- 0 Comments
- READ
- POST A COMMENT
12 Key Networking Mergers Of 2016
- The networking industry continued to morph with several significant acquisitions so far this year.
By Marcia Savage , 11/02/2016 -
- 0 Comments
- READ
- POST A COMMENT
Migrating To A Software-Defined World
- At ONUG, IT leaders discuss challenges in shifting from legacy infrastructure, the need for open networking...
By Lee Doyle , 11/01/2016 -
- 0 Comments
- READ
- POST A COMMENT
BGP Security: Mitigating Route Leaks
- Learn best practices to prevent BGP route leaks and hijacks from leading to disaster.
By Young Xu, Analyst at ThousandEyes , 11/01/2016 -
- 0 Comments
- READ
- POST A COMMENT
How DNS Works: A Primer
- The Domain Name System is critical to fundamental IP networking. Learn DNS basics in this primer.
By Andrew Froehlich , 10/31/2016 -
- 0 Comments
- READ
- POST A COMMENT
What Haunts IT Pros?
- Survey shows that data security breaches and service outages top the list of IT managers' fears.
By Network Computing Editors , 10/31/2016 -
- 0 Comments
- READ
- POST A COMMENT
Packet Blast: Top Tech Blogs, Oct. 28
- We collect the top expert content in the infrastructure community and fire it along the priority queue.
By Packet Blast , 10/28/2016 -
- 0 Comments
- READ
- POST A COMMENT
Navigating Today's IT Choices
- IT pros can cut through the cluttered IT landscape by adopting sales skills.
By Kong Yang , 10/28/2016 -
- 0 Comments
- READ
- POST A COMMENT
DDos On Dyn Used Malicious TCP, UDP Traffic
- Dyn confirms Mirai IoT botnet was primary source of the attack, involving some 100,000 infected devices.
By Kelly Jackson Higgins , 10/27/2016 -
- 0 Comments
- READ
- POST A COMMENT
Racing To 2.5 And 5 Gigabit Ethernet
- The IEEE standard was approved at lightning speed. What's next?
By Peter Jones, Chairman, NBASE-T Alliance , 10/27/2016 -
- 0 Comments
- READ
- POST A COMMENT
SDN Post-Deployment Considerations
- Here are three things to think about once you've got a software-defined network up and running.
By Steve Shah , 10/27/2016 -
- 0 Comments
- READ
- POST A COMMENT
Why We May See The End Of The Private Network
- Tom Nolle ponders the potential demise of private networking as enterprises increasingly turn to the cloud.
By Tom Nolle , 10/26/2016 -
- 0 Comments
- READ
- POST A COMMENT
MPLS Lives On In Hybrid WAN Era
- EMA finds that the rise of internet connectivity for next-gen WAN does not spell the death of MPLS.
By Shamus McGillicuddy , 10/26/2016 -
- 0 Comments
- READ
- POST A COMMENT
A Music Playlist For Networking Pros
- Check out this selection of tunes tailored for those who work to keep the network up and running.
By Dan Conde , 10/26/2016 -
- 3 Comments
- READ
- POST A COMMENT
- Latest Comment: Good idea! I think it's always good to get some pick me up songs when you're tired or it...
CURRENT CONVERSATIONS
-
Posted by: jason@imperialnetsolutions.com
That is my understanding. Because the "multi-user" aspect only works downstream (i.e. from the access point to the client devices), the acknowledgement is upstream and must be unicast.
In reply to: Re: Regarding ACKs back from clients -
Posted by: Tony Fortunato
thanks for sharing
In reply to: Re: Securing A Cisco Router: The Basics -
Posted by: Tony Fortunato
thanks for the feedback and additional information
In reply to: Re: How about keeping the Router Switched Off when not in Use? -
Posted by: ademarr
setting the security in your Linksys router helps keep your wireless community safe from unauthorized access.
In reply to: Securing A Cisco Router: The Basics -
Posted by: aikenwaisu
In this article i will come up with eight steps, smooth to comply with.
In reply to: Securing A Cisco Router: The Basics
1- manage get entry to on your router;
2- restrict telnet access to it;
three- Block Spoof/Malicious packets;




