Network protocols and standards News
October 15, 2014
The Internet of Things is spurring a new architecture for relaying data, referred to by some as mesh networking. But it may not be enterprise-ready yet.
February 18, 2011
Learn how IPv6 impacts network security in this interview with the authors of the new book, IPv6 Security: Protection measures for the next Internet Protocol.
June 23, 2010
The IEEE has ratified 40 and 100 Gigabit Ethernet and vendors can now release products that should interoperate. Should you care?
June 18, 2010
The Transparent Interconnection of Lots of Links (TRILL) protocol is going through the standards process and some say it could emerge as a viable replacement for spanning tree. Other experts worry about some aspects of its design.
Network protocols and standards Get Started
Bring yourself up to speed with our introductory content
Is there a 'd-i' missing from the middle of the IoT acronym? Read on for IT and business strategist Harvey Koeppel's humorous take on the meaning and disruptive nature of the Internet of Things and the 10 things CIOs can do to prepare for the IoT. Continue Reading
Evaluate Network protocols and standards Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
How are disruptive technology trends like BYOD and IoT impacting wireless networks? Networking expert Craig Mathias explains in this Q&A. Continue Reading
Product ReviewsPowered by IT Central Station
Deployment was rather simple, but did require quite a bit of time to configure since our applications are so complex.Powered by IT Central Station
We develop our applications in-house to address our organization’s specific mission and operational needs. The data housed within these...Continue Reading
Beyond the savings of the IT team’s productivity, the reduction of the performance degradations has helped save money.Powered by IT Central Station
Despite their ability to monitor availability and resource consumption (CPU, RAM, Disk…), our SNMP monitoring tools (Microsoft SCOM) did not...Continue Reading
We went from having fully 1/3 of all incoming alarms being about dead monitoring agents to less than 1%Powered by IT Central Station
Valuable Features: Full featured, non-java, agent based technology that allowed the user to install as many probes as needed on each server...Continue Reading
Problem Solve Network protocols and standards Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Using MPLS in the core network, service providers can safely run Border Gateway Protocol (BGP) only on the network edge. Continue Reading
This tip discusses IPv6 deployment and advises telecom service providers to get ready to move from IPv4 to IPv6 and start testing their entire configuration. Continue Reading
In this tip, learn how virtual routing and forwarding (VRF) divides a router or Layer 3 switch into multiple independent virtual devices, how VRF-equipped routers provide gateways to MPLS, and where VRF fits in with secure tunnelling. Continue Reading