Fiber Optic Bend Radius Standards
Fiber optic cable can be damaged by placing too much tension on the cable or bending the cable excessively during installation. Excessive bending or too much pulling force can permanently damage the fiber by causing micro cracks. More ...
IPv6 Address Compressor Expander
Enter the IPv6 address in the top text box. Click on the appropriate button: Omit Leading Zeros, Consolidate Zeros Segments, Expand Zeros Segments, Replace Leading Zeros. The formatted address will appear in the bottom text box. More ...
Structured Network Troubleshooting Methodology Step 2 Establish a Theory of Probable Cause
Step 1 in a structured network troubleshooting methodology is to identify the problem. Here we discuss step 2, establish a theory of probable cause. More ...
Network Topology Diagram
An IT manager must know the network topology and should always have it in front of his eyes. Here, we review the process of the network topology discovery and network diagram creation using the specialized software. More ...
Network Address Translation (NAT) Protocol
NAT is a protocol that is used by a router to convert IP addresses on the internal private network to the it's own public IP address for the Internet. If NAT were not used each computer on the internal private network would be visible to the Internet. More ...
Structured Network Troubleshooting Methodology Step 4 Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
Step 2 in a structured network troubleshooting methodology is to establish a theory of probable cause. Step 3 is to Test the Theory to Determine the Cause. Here we discus Step 4, Establish a Plan of Action to Resolve the Problem and Identify Potential Effects. More ...
How a Firewall Provides Network Security
A firewall provides security by controlling access between a network and an untrusted network. A firewall can be a hardware device, software, or combination of hardware and software. More ...
What is Network Automation?
Network Automation is the process of automating the configuration, management, testing, deployment, and operations of physical and virtual devices within a network. Using a combination of hardware and software-based solutions, large organizations, service providers, and enterprises can implement network automation to control and manage repetitive processes and improve network service availability. More ...
Internet-Scale Load Balancing
Common techniques used to balance network traffic come with advantages and trade-offs. This article explains some of those trade-offs. More ...
Nine Tips for Designing a Small Business Network
Technology professionals can get wrapped up in a lot of detail while planning and designing systems. It is up to the business to ensure that the needs and requirements of the business are considered throughout the planning process. More ...
Troubleshoot Network Connectivity With a Time Domain Reflectometer (TDR)
A time-domain reflectometer (TDR) is an instrument that can be used to locate faults in network cables. It can be used for routine maintenance or tracking down illegal taps. More ...
Building the Backbone Network
The backbone is a network, the function of which is to connect the LANs together. There are no workstations connected directly to the backbone. In some cases, you might connect servers to it, but most backbones carry nothing but internetwork traffic. More ...
Letting Your SME Users Access the Internet
The Web is a data service that allows users to access and display information contained on devices elsewhere in the world. The Web is also one of the greatest sources of malware. More ...
To Avoid Network Downtime Perform Risk Assessment
The demand for new applications, coupled with burgeoning use of edge computing, and the need to keep the current systems operational may lead to overlooking the day to day preventative steps and infrastructure requirements. More ...
