Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • White Papers // Jun 2011

    Toward Secure Embedded Web Interfaces

    The authors address the challenge of building secure embedded web interfaces by proposing WebDroid: the first framework specifically dedicated to this purpose. Their design extends the Android Framework, and enables developers to create easily secure web interfaces for their applications. To motivate their work, they perform an in-depth study of...

    Provided By USEnet Live!

  • White Papers // Jun 2012

    New Attacks on Timing-based Network Flow Watermarks

    A network flow watermarking scheme attempts to manipulate the statistical properties of a flow of packets to insert a \"Mark\" making it easier to detect the flow after passing through one or more relay hosts. Because an attacker that is willing to tolerate delay can (nearly) always eliminate such marks,...

    Provided By USEnet Live!

  • White Papers // Sep 2011

    Local System Security via SSHD Instrumentation

    The adoption of SSH as the defacto protocol for interactive shell access has proven to be extremely successful in terms of avoiding shared media credential theft and man in the middle attacks. In this paper, the authors describe a method for near real-time identification of attack behavior and local security...

    Provided By USEnet Live!

  • White Papers // Jan 2014

    ConfiDNS: Leveraging Scale and History to Improve DNS Security

    The use of distributed computing to address performance and reliability problems in the Domain Name System (DNS) has recently received much research attention, and has spawned two widely-deployed distributed systems, CoDNS and CoDoNS. While cooperative DNS resolver systems, such as Co-DNS, have demonstrated improved reliability and performance over standard approaches,...

    Provided By USEnet Live!

  • White Papers // Jul 2010

    Visual Security Policy for the Web

    Many web security vulnerabilities allow parts of a page to interact when they should be isolated. Such vulnerabilities can be mitigated by implementing protection boundaries between web page elements. Several methods exist for creating such boundaries, but existing methods require relatively sophisticated knowledge of web technologies. To make protection mechanisms...

    Provided By USEnet Live!

  • White Papers // Jun 2012

    Towards a Framework for Evaluating BGP Security

    Security and performance evaluation of Internet protocols can be greatly aided by emulation in realistic deployment scenarios. The authors describe their implementation of such methods which uses high-level abstractions to bring simplicity into a virtualized test-lab. They argue that current test-labs have not adequately captured those challenges, partly because their...

    Provided By USEnet Live!

  • White Papers // Jan 2010

    Beat The Blue-Collar Resume Blues

    A resume is a chance for job seekers to make a great first impression, yet many blue-collar workers pay little attention to this important document. Follow these tips to create a resume that gets noticed. If you don't have a resume and aren't sure where to start, use the Monster...

    Provided By Monster Worldwide

  • White Papers // Feb 2009

    SFTP: The Secure File Transfer Protocol

    The Secure File Transfer Protocol, or SFTP, is not based on the industry standard File Transfer Protocol (FTP), as defined in RFC-959. It is a completely distinct file transfer specification developed by the Secure Shell Working Group and SSH Communications Security Corp. Built on the Secure Shell (SSH) Protocol, the...

    Provided By South River Technologies

  • White Papers // May 2013

    Genetic Algorithm Performance with Different Selection Methods in Solving Multi-Objective Network Design Problem

    Selection is one of the key operations of Genetic Algorithm (GA). This paper presents a comparative analysis of GA performance in solving Multi-Objective Network Design Problem (MONDP) using different parent selection methods. Three problem instances were tested and results show that on the average tournament selection is the most effective...

    Provided By University of Illinois, Rehab Services

  • White Papers // Nov 2012

    Rarest-First and Coding Are Not Enough

    Network coding has been applied successfully in Peer-To-Peer (P2P) systems to shorten the distribution time. Pieces of data, i.e. blocks, are combined, i.e. encoded, by the sending peers before forwarding to other peers. Even though requiring all peers to encode might achieve shortest distribution time, it is not necessarily optimal...

    Provided By WasatchWare

  • White Papers // Aug 2010

    An Alignment Model For Business Process Management And Service Oriented Architecture

    Business Process Management (BPM) and Service Oriented Architecture (SOA) are two approaches that receive considerable attention in the scientific domain and in industry. Although both concepts can exist independently, they are considered as two-sides-of-the-same coin and seen as promising IS/IT strategies. Aligning both approaches should enable organizations to be agile...

    Provided By Utralshareware Software

  • White Papers // May 2012

    Resource Allocation and Access Strategy Selection for QoS Provisioning in Cognitive Networks

    Dynamic Spectrum Access (DSA) strategy selection and the associated resource allocation are critically important issues for cognitive networks, because they need to not only satisfy the interference constraint caused to the Primary Users (PU), but also meet the delay Quality-of-Service (QoS) requirements for the Secondary Users (SU). In this paper,...

    Provided By WasatchWare

  • White Papers // May 2010

    Exploring Application Layer Protocol Relationships in SoftSwitch

    Relationships between application layer protocols in softswitch are explored in this paper. Two notions, i.e. protocol relationship and protocol grouping, are proposed, which are not clearly defined and even not paid much attention to before. On the basis of a well known protocol relationship named protocol conversion, three novel protocol...

    Provided By Plone Foundation

  • White Papers // Jul 2010

    On the Connectivity of One-dimensional Vehicular Ad Hoc Networks

    Mobile Ad Hoc NETworks (MANETs) are comprised of self-organizing mobile nodes that lack a network infrastructure, such as base stations. This technology has been proposed as a complementary to the fourth-generation wireless networks. And in recent years, there is a growing interest on the research and deployment of MANETs technology...

    Provided By Plone Foundation

  • White Papers // Jul 2011

    Towards Client-Side HTML Security Policies

    With the proliferation of content rich web applications, content injection has become an increasing problem. Cross site scripting is the most prominent examples of this. Many systems have been designed to mitigate content injection and cross site scripting. Notable examples are BEEP, BLUEPRINT, and content security policy, which can be...

    Provided By USEnet Live!

  • White Papers // Mar 2013

    Chatty Tenants and the Cloud Network Sharing Problem

    The emerging ecosystem of cloud applications leads to significant inter-tenant communication across a datacenter's internal network. This poses new challenges for cloud network sharing. Richer inter-tenant traffic patterns make it hard to offer minimum bandwidth guarantees to tenants. Further, for communication between economically distinct entities, it is not clear whose...

    Provided By USEnet Live!

  • Downloads // Feb 2007

    Meet VoIP bandwidth requirements without crippling your network performance

    Failure to account for VoIP bandwidth requirements will severely limit the reliability of a VoIP system and place a huge burden on your WAN infrastructure. George Ou explains how to deal with the various audio compression algorithms and WAN topologies so that you can calculate your bandwidth needs. Once you've...

    Provided By George Ou

  • Downloads // Jan 2007

    TechRepublic's ultimate guide to enterprise wireless LAN security

    Enterprise wireless LAN security is a persistent concern for every system administrator and CIO. Threats from both within and without the enterprise threaten your data each and every day. This download gives you the basic foundation you need to secure your enterprise wireless connections by detailing security protocols such...

    Provided By George Ou

  • Downloads // Jan 2007

    Excel Template: Configure Aironet access points for enterprise security

    An Excel Worksheet that automatically generates a ready-to-use tool for documenting and creating new CLI configuration files for Aironet access points. This tool is published as a supplement to TechRepublic's Ultimate Wireless Security Guide. Individual articles in the TechRepublic ultimate guide to enterprise wireless LAN security series...

    Provided By George Ou

  • Book chapters // Aug 2006

    MCDST study guide: Administer Active Directory like an expert

    Administer Active Directory like an expert by mastering the tools described in this sample chapter from MCDST Self-Paced Training Kit (Exam 70-271): Supporting Users and Troubleshooting a Microsoft Windows XP Operating System, Second Edition. A system of lessons, hands-on exercises, troubleshooting labs, and review questions guide you through the...

    Provided By Microsoft Press

  • Book chapters // Oct 2006

    Simplify Active Directory administration by mastering these essential tools

    Core Active Directory administration focuses on key tasks that are performed routinely with Active Directory directory service, such as creating computer accounts or joining computers to a domain. Master the tools you can use to manage Active Directory as well as specific techniques for managing computers, domain controllers, and...

    Provided By Microsoft Press

  • Downloads // Oct 2007

    How do I... Use C# to upload and download files from an FTP server?

    Many third party components exist that enable developers to implement upload and download capabilities in their applications. With C# and the .NET Framework Microsoft has given developers this capability without the need to use third party components. Zach Smith demonstrates how to upload and download files from a FTP server...

    Provided By Zach Smith

  • Downloads // Apr 2008

    How do I... Install and configure a DHCP server in Windows Server 2008?

    Dynamic Host Configuration Protocol (DHCP) is an invaluable service when you have a network larger than a handful of computers. It's also a standard component of enterprise networks and sub networks. Microsoft Windows Server 2008's built-in DHCP server allows Windows machines (and any other TCP/IP-based machines and devices) to obtain...

    Provided By Steven Warren

  • White Papers // Aug 2010

    Quo Vadis, SNMP?: White Paper Part 1 - Introducing SNMP

    As business efficiency becomes more and more dependent on connected computer systems, monitoring and ensuring their reliability in performance is absolutely necessary. Because of the huge amount of devices on the market, supplied by various manufacturers, it was imperative to introduce a standard for this kind of monitoring. That is...

    Provided By Paessler AG

  • White Papers // Jan 2011

    Traffic Management Strategies for Operators

    Nearly a decade after its debut, 3G has been widely deployed and supports over a billion subscribers. With the success of broadband, the 3G footprint continues to expand leading to an exponential increase in data traffic demand. The key question now is how can operators meet this demand? There is...

    Provided By Qual-IT London

  • White Papers // Jan 2013

    Polynomial-Complexity, Low-Delay Scheduling for SCFDMA-Based Wireless Uplink Networks

    Uplink scheduling/resource allocation under the single-carrier FDMA constraint is investigated, taking into account the queuing dynamics at the transmitters. Under the single-carrier constraint, the problem of MaxWeight scheduling, as well as that of determining if a given number of packets can be served from all the users, are shown to...

    Provided By Qual-IT London

  • White Papers // May 2013

    A Control Theoretic Approach to Analyzing Peer-to-Peer Searching

    A generic linear mathematical model is proposed to represent the dynamics of bandwidth usage, network topology, and host processing power in large scale Peer-to-Peer (P2P) networks. Feedback control theory is employed to analyze system stability and query controllability, as well as deriving an explicit solution for the bandwidth usage. The...

    Provided By Qual-IT London

  • White Papers // Feb 2013

    Provisioning and Resource Allocation for Green Clouds

    The aim of Green Cloud Computing is to achieve a balance between the resource consumption and quality of service. In order to achieve this objective and to maintain the flexibility of the cloud, dynamic provisioning and allocation strategies are needed to regulate the internal settings of the cloud to address...

    Provided By Federal University of Santa Catarina

  • White Papers // Jan 2009

    Multishot Codes for Network Coding: Bounds and a Multilevel Construction

    The subspace channel was introduced by Koetter and Kschischang as an adequate model for the communication channel from the source node to a sink node of a multicast network that performs random linear network coding. So far, attention has been given to one-shot subspace codes, that is, codes that use...

    Provided By Federal University of Santa Catarina

  • Case Studies // Jan 2010

    Sage CRM and ISS Damage Control CRM Case Study

    The business of ISS Damage Control is to provide fast response in case of disasters such as fire and flood. This response should be from someone with the right experience, expertise and resources. They provide damage limitation, restoration and renovation services to victims, insurers and those who face losses during...

    Provided By Concentrix

  • White Papers // Mar 2007

    Intrusion Detection and Response in Ad Hoc Networks

    Ad hoc networks have received great attention in recent years, mainly due to their important advantages and their growing demand. Nevertheless, ad hoc networks present many inherent vulnerabilities and demand efficient security mechanisms in order to be safeguarded. An efficient intrusion detection approach combined with an authenticated intrusion response can...

    Provided By University of Phoenix

  • White Papers // Jun 2006

    Intrusion Detection of Packet Dropping Attacks in Mobile Ad Hoc Networks

    The evolution of wireless network technologies and the recent advances in mobile computing hardware have made possible the introduction of various applications in mobile ad hoc networks. Not only is the infrastructure of these networks inherently vulnerable but they have increased requirements regarding their security as well. As intrusion prevention...

    Provided By University of Phoenix

  • White Papers // Jan 2008

    Intrusion Detection Using Emergent Self-organizing Maps

    In this paper, the authors propose an intrusion detection approach that is based on a class of neural networks known as Kohonen's Self-Organizing Maps (KSOMs). Their approach combines information visualization and machine learning techniques and enables the user with the ability to have a visual view of network activity. In...

    Provided By University of Phoenix

  • White Papers // Mar 2013

    A Survey on Security and Privacy Issues in Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are characterized by dynamic self-organization, self-configuration and self-healing to enable flexible integration, quick deployment, easy maintenance, low cost, and may also be used to improve the performance of multi-hop ad-hoc networks, Wireless Local Areas Networks (WLANs) and Wireless Metropolitan Area Networks (WMANs). Wireless Mesh Networks (WMNs)...

    Provided By University of Phoenix

  • White Papers // Apr 2010

    Multishot Codes for Network Coding Using Rank-Metric Codes

    The multiplicative-additive finite-field matrix channel arises as an adequate model for linear network coding systems when links are subject to errors and erasures, and both the network topology and the network code are unknown. In a previous work the authors proposed a general construction of multishot codes for this channel...

    Provided By Federal University of Santa Catarina

  • White Papers // Feb 2009

    Improvement of a Bidirectional Switch for Electric Network

    This paper suggest a new behaviour for a bipolar bidirectional switch for network application. The paper uses two high current gain bipolar power transistors, based on TBSBT, one to control the forward current, and the second one to short-circuit the complementary diode, thus, for the first time, significantly decrease its...

    Provided By Universite de Tours

  • White Papers // Sep 2012

    Dynamic Proofs of Retrievability via Oblivious RAM

    Proofs of retrievability allow a client to store their data on a remote server (e.g., "in the cloud") and periodically execute an efficient audit protocol to check that all of the data is being maintained correctly and can be recovered from the server. For efficiency, the computation and communication of...

    Provided By Koc University

  • White Papers // Jan 2011

    Rate Control for Gop-Level Rate Adaptation in H.264 Video Coding

    It may be desirable to adapt the coding bitrate according to both bandwidth availability and user preferences in video transmission over packet networks. Classical approaches for rate adaptation has been bitstream switching, which requires storing several pre-coded versions of the same video at different bitrates, or layered (scalable) video coding,...

    Provided By Koc University

  • White Papers // Dec 2011

    Five Tips for Safer Wireless LAN

    Wireless local area networks, or WLANs, provide homes and businesses with convenient and easy access to the Internet. But wireless networks can leave you vulnerable if you don't secure them properly. Here are five easy ways to strengthen your wireless network's protection.

    Provided By Astaro

  • White Papers // Dec 2011

    Albert School District: A Customer Success Story

    Albert School District gets a lesson in wireless security; Sophos Astaro Wireless Security provides simple management and reliable Internet access.

    Provided By Astaro