| 21. | - Network Address Translation
- By
Jeff Doyle, Jennifer Carroll
- Feb 8, 2002
- Network address translation (NAT) is a function by which IP addresses within a packet are replaced with different IP addresses. This sample chapter from Cisco Press focuses on NAT within routers.
|
| 22. | - Dynamic Routing Protocols
- By
Jeff Doyle
- Nov 16, 2001
- This sample chapter from CCIE: Routing TCP/IP Volume I shows how routers can discover how to correctly switch packets to their respective destinations automatically and share that information with other routers via dynamic routing protocols.
|
| 23. | - Planning the Cisco CallManager Implementation
- By
Salvatore Collora, Ed Leonhardt, Anne Smith
- Sep 24, 2004
- Planning, designing, and implementing a Cisco IP Telephony solution is a much more manageable task if you carefully consider each step outlined in this chapter before moving on to each subsequent step.
|
| 24. | - Wireless Security
- By
Thomas M. Thomas
- Jul 16, 2004
- Tom M. Thomas explains the basics of setting up security for a wireless network. He warns technicians of the various ways in which a wireless network can be breached, and provides help in protecting against those attacks.
|
| 25. | - DSL and Cable Modem Networks
- By
Matthew J Castelli
- Mar 14, 2003
|
| 26. | - Deploying License-Free Wireless Wide-Area Networks
- By
Jack Unger
- May 16, 2003
|
| 27. | - Packet over SONET
- By
Dave Warren, Dennis Hartmann
- Nov 7, 2003
- This sample chapter covers Packet over SONET (PoS) operation, encapsulation, protection, and convergence.
|
| 28. | - Wireless System Architecture: How Wireless Works
- By
Jim Geier
- Oct 15, 2004
- Apart from transmitting the information over the air, wireless networks are very much like wired networks. However, that seemingly small difference can lead to some very large problems if you don't understand the nuances of this medium. Read this chapter to find out how wireless networks work, and why they need to be administered differently from traditional, wired networks.
|
| 29. | - The Basics of the Cisco PIX Firewall
- By
Andy Fox
- Feb 15, 2002
- The Cisco PIX firewall is a fairly simple device to configure, but you need to be familiar with the basic commands to install and secure it properly. In this article, Andy Fox covers the six commands needed to secure this firewall.
|
| 30. | - CCNP Routing Studies: Basic Open Shortest Path First
- By
Henry Benjamin
- May 24, 2002
- Understanding basic Open Shortest Path First routing principles not only applies to the CCNP certification but to all Cisco-based certifications. This chapter focuses on a number of objectives falling under the CCNP routing principles.
|
| 31. | - Cisco Network Security Fundamentals: Wireless Security
- By
Gert DeLaet, Gert Schauwers
- Dec 30, 2004
- This chapter covers wireless security—what it is, how it works, how it is configured, what threatens it, and what policies can be designed to secure it.
|
| 32. | - Traffic Engineering with MPLS
- By
Eric Osborne, Ajay Simha
- Aug 16, 2002
- to come
|
| 33. | - Cisco PIX: Failover Demystified
- By
David W. Chapman
- Dec 28, 2001
- Failover provides a second PIX Firewall if the first one fails. This article covers the following Failover topics: operation, configuration replication, monitoring, fail back rules, and interface testing.
|
| 34. | - Cisco Network Topologies and LAN Design
- By
Anthony Bruno, Jacqueline Kim
- Nov 16, 2001
- This chapter from CCDA Exam Certification Guide reviews the topologies used in network design and covers the technologies and design approaches used when designing a local-area network (LAN).
|
| 35. | - CCNA: Network Media Types
- By
Cisco Systems, Inc.
- Mar 14, 2003
|
| 36. | - Analyzing Business Goals and Constraints of Network Design
- By
Priscilla Oppenheimer
- Aug 6, 2004
- This chapter covers typical network design business goals and constraints and talks about the top-down process for gathering information on goals, and the importance of using systematic methods for network design.
|
| 37. | - Wireless LAN Fundamentals: Mobility
- By
Jonathan Leary, Pejman Roshan
- Jan 9, 2004
- This sample chapter covers the characteristics of roaming, Layer 2 and 3 roaming, and an introduction to Mobile IP.
|
| 38. | - VLAN Access Control Lists
- By
Stephen McQuerry
- Oct 11, 2002
|
| 39. | - MPLS/VPN Architecture Overview
- By
Jim Guichard, Ivan Pepelnjak
- Aug 2, 2002
- MPLS/VPN concepts are introduced in this mock case study of service provider SuperCom and its two key customers. Learn how VPNs based on MPLS combine the benefits of the overlay VPN model with the benefits of the peer-to-peer VPN model.
|
| 40. | - The Business Case for Storage Networks
- By
Bill Williams
- Nov 18, 2004
- This chapter covers the copious reasons for preferring storage networks, from the legal implications of Sarbanes-Oxley to the economy of scale created by their usage. Discover the other advantages storage networks could provide to your business within.
|