How to Connect Two Computers Together with an Ethernet Cable
You can connect two computers to one another using an Ethernet cable. Once you've connected the computers, you can share files between them by using both computers file sharing settings. More ...
SME Network Internet IP Addressing Strategies
Every device that needs to communicate with the Internet needs a unique IP address. There are two different, and functionally incompatible, IP addressing schemes: IPv4 and IPv6. More ...
How to Repair a Damaged Fiber Optic Cable
A cut or damaged fiber optic cable can take your network down. it is possible to quickly fix the cable with the right tools. This article shows you how to splice a cut fiber optic cable back together with a fiber optic stripper and cutter and a fiber optic crimper. More ...
Calculating VoIP Bandwidth
If an organization is considering VoIP deployment, it should first calculate how much bandwidth is required. Bandwidth consumption estimated early on will determine if the organization needs to increase Internet speeds or otherwise optimize their network. More ...
Structured Network Troubleshooting Methodology Step 3 Test the Theory to Determine the Cause
Step 1 in a structured network troubleshooting methodology is to identify the problem. Step 2 is to establish a theory of probable cause. Here we discus Step 3, to do a sanity check of your theory before taking action. More ...
Metro Ethernet Fundamentals for WAN Connectivity
Because of its cost effectiveness, availability and seamless protocol transition from campus network to WAN, Metro Ethernet is increasing in popularity. This artice provides the fundamentals for Metro Ethernet WAN Connectivity. More ...
Network Design Process - Effective Network Planning and Design
The network planning and design methodology describes a process with nine specific steps and a sequence for those activities. It is an engineering life cycle that supports technical initiatives such as Windows migration, IP telephony and wireless design. The methodology begins with examining company business requirements. More ...
Steps For Designing a Crisis Management Plan
There are six steps for defining a crisis management plan that can be easily remembered using the word CRISIS. Use the steps of CRISIS to be ready to deal with emergencies that your organization might face. More ...
Restrict User's Logon Hours and Access to Computers
For each user account you can restrict the hours during which the user is allowed to log on and you can restrict a user to only certain computers. More ...
What is the Difference Between NAT and PAT?
NAT works by mapping a pool of public IP addresses one-to-one to the private IP addresses, keeping the port number intact. PAT uses a single public IP address and maps multiple private IP addresses to it by using different port numbers. More ...
Network Cabling Do's and Don'ts
Installing network cabling yourself can definitely be cost effective. Here are some tips for both network cabling professionals and do-it-yourselfers. More ...
Campus and WAN Multilayer Network Design
The idea for defining a multilayer campus model was developed by Cisco to improve campus network performance, availability and scalability. There are three layers that comprise the campus multilayer model are the access layer, distribution layer and core layer. More ...
Lean IT in Simple Terms
Lean is a method applied by Toyota to their manufacturing system in the 1990's. Lean IT is an extension of this method applied to the IT environment. It's difficult to lean what lean IT is because, in order to sell training seminars and certifications, any description or explanation of it is loaded with buzzwords and jargon. More ...
Troubleshooting the Intermediate System to Intermediate System (IS-IS) Protocol
Troubleshooting issues with the Intermediate System to Intermediate System (IS-IS) protocol is pursued thru an investigation with the Cisco show and debug commands and their options. More ...
