| 121. | - Building a Business Case for VoIP
- By
John Q. Walker, Jeffrey T. Hicks
- Feb 23, 2004
- This chapter explains how to build a business case for VoIP. It points out some
of the benefits that VoIP can provide and discusses how to analyze return on
investment (ROI) for VoIP implementation and management.
|
| 122. | - Effective BGP Policy Control
- By
Micah Bartell, Randy Zhang
- Jan 23, 2004
|
| 123. | - Developing "Deploying License-Free Wireless Wide-Area Networks"
- By
Jack Unger
- Jul 11, 2003
|
| 124. | - Introduction to Cisco IP Telephony (CIPT) Components
- By
David Lovell
- Dec 17, 2001
- This chapter discusses the Cisco IP Telephony (CIPT) components and the following topics: abbreviations, audience, prerequisites, Sources of Information, Cisco AVVID, and CIPT Components.
|
| 125. | - Passing Certification Exams
- By
Denise Donohue
- Sep 26, 2003
- Denise Donohue describes what it takes to be a successful test-taker.
|
| 126. | - Optimizing Applications on Cisco Networks: Beyond the Boundaries
- By
Michael Hicks
- Jan 28, 2005
- You may only operate (own) part of your delivery mechanism, relying on third-party organizations to deliver your application to both your internal staff and your customers. This chapter discusses approaches to this situation, covering ways to work within these confinements.
|
| 127. | - Demystifying Convergence and VoIP
- By
Anne Smith
- Aug 9, 2002
- Convergence eliminates the need for duplicate hardware and special vendors. Learn how Voice over IP (VoIP) uses the Internet Protocol to deliver voice traffic over a converged network.
|
| 128. | - A Cisco Telephony Architecture Evolution
- By
Stephanie Carhee
- Sep 3, 2004
- This chapter introduces the concept of ROI, and provides the background and reasoning behind Cisco's decision to migrate to an all-IP network.
|
| 129. | - Building Cisco IDS 3.0(3) Custom Signatures
- By
Earl Carter
- Feb 15, 2002
- Tuning your IDS to meet your specific network requirements is crucial for optimum protection of your network, as discussed in this article by Earl Carter.
|
| 130. | - Troubleshooting Your CCIE Lab
- By
Henry Benjamin
- May 23, 2003
- Henry Benjamin, Triple CCIE and former CCIE Proctor, shares some of the tools he used to pass CCIE lab examinations.
|
| 131. | - CCNP BSCI Exam: Using OSPF Across Multiple Areas
- By
Clare Gough
- Apr 25, 2003
|
| 132. | - Make the Right Call: Cisco's AVVID
- By
Robert Richardson
- Jun 21, 2002
- Robert Richardson discusses the pros and cons of Cisco's AVVID — what the industry's been talking about all along for pure IP convergence: smart IP phones plugged into an Ethernet network full of conventional switches and routers. Plenty of issues need to be ironed out, though.
|
| 133. | - E-Learning Goes Global: How the Cisco Networking Academy Transforms Lives
- By
Nader A Nanjiani, Tom M Kelly
- Dec 10, 2004
- With its global success in transforming lives, learning, and social paradigms, the Cisco Networking Academy Program is hailed as a remarkably successful example of a productivity pyramid metaphor.
|
| 134. | - What's New in CCNA #640-607?
- By
Cisco Systems, Inc.
- Mar 22, 2002
- Confused about the new CCNA exam? This FAQ from Cisco Press answers the most common questions about Cisco's new exam #640-607.
|
| 135. | - Learning WAN Switching Technologies
- By
Tracy L Thorpe
- Apr 18, 2003
|
| 136. | - The Security Certification Quagmire
- By
Steve Kalman
- May 30, 2003
|
| 137. | - Intrusion Detection: Cisco IDS Overview
- By
Earl Carter, Rick Stiffler
- Dec 28, 2001
- Cisco Secure IDS is a network-based intrusion detection system that uses a signature database to trigger intrusion alarms.
|
| 138. | - Should I Be Interested in MPLS Traffic Engineering?
- By
Ivan Pepelnjak
- Jan 3, 2003
|
| 139. | - Cisco Networking Simplified: Security
- By
Paul Della Maggiora, Jim Doherty
- Jun 20, 2003
- Security should be designed around efforts to protect from the outside and control from the inside. Discover the vital aspects of security and identity and how each can function to keep your company and its parts safe.
|
| 140. | - Letting The Telecommuters Into The Network
- By
Rebecca Rohan
- Dec 23, 2004
- You worked hard to keep the space rabble out of your network. Now make sure the good guys can get in.
|