Network Technology

All Network Technology Articles

Showing 21-40 of 312

Sort by Date | Title | Popularity

21.
Network Address Translation
By Jeff Doyle, Jennifer Carroll
Feb 8, 2002
Network address translation (NAT) is a function by which IP addresses within a packet are replaced with different IP addresses. This sample chapter from Cisco Press focuses on NAT within routers.
22.
Dynamic Routing Protocols
By Jeff Doyle
Nov 16, 2001
This sample chapter from CCIE: Routing TCP/IP Volume I shows how routers can discover how to correctly switch packets to their respective destinations automatically and share that information with other routers via dynamic routing protocols.
23.
Planning the Cisco CallManager Implementation
By Salvatore Collora, Ed Leonhardt, Anne Smith
Sep 24, 2004
Planning, designing, and implementing a Cisco IP Telephony solution is a much more manageable task if you carefully consider each step outlined in this chapter before moving on to each subsequent step.
24.
Wireless Security
By Thomas M. Thomas
Jul 16, 2004
Tom M. Thomas explains the basics of setting up security for a wireless network. He warns technicians of the various ways in which a wireless network can be breached, and provides help in protecting against those attacks.
25.
DSL and Cable Modem Networks
By Matthew J Castelli
Mar 14, 2003
26.
Deploying License-Free Wireless Wide-Area Networks
By Jack Unger
May 16, 2003
27.
Packet over SONET
By Dave Warren, Dennis Hartmann
Nov 7, 2003
This sample chapter covers Packet over SONET (PoS) operation, encapsulation, protection, and convergence.
28.
Wireless System Architecture: How Wireless Works
By Jim Geier
Oct 15, 2004
Apart from transmitting the information over the air, wireless networks are very much like wired networks. However, that seemingly small difference can lead to some very large problems if you don't understand the nuances of this medium. Read this chapter to find out how wireless networks work, and why they need to be administered differently from traditional, wired networks.
29.
The Basics of the Cisco PIX Firewall
By Andy Fox
Feb 15, 2002
The Cisco PIX firewall is a fairly simple device to configure, but you need to be familiar with the basic commands to install and secure it properly. In this article, Andy Fox covers the six commands needed to secure this firewall.
30.
CCNP Routing Studies: Basic Open Shortest Path First
By Henry Benjamin
May 24, 2002
Understanding basic Open Shortest Path First routing principles not only applies to the CCNP certification but to all Cisco-based certifications. This chapter focuses on a number of objectives falling under the CCNP routing principles.
31.
Cisco Network Security Fundamentals: Wireless Security
By Gert DeLaet, Gert Schauwers
Dec 30, 2004
This chapter covers wireless security—what it is, how it works, how it is configured, what threatens it, and what policies can be designed to secure it.
32.
Traffic Engineering with MPLS
By Eric Osborne, Ajay Simha
Aug 16, 2002
to come
33.
Cisco PIX: Failover Demystified
By David W. Chapman
Dec 28, 2001
Failover provides a second PIX Firewall if the first one fails. This article covers the following Failover topics: operation, configuration replication, monitoring, fail back rules, and interface testing.
34.
Cisco Network Topologies and LAN Design
By Anthony Bruno, Jacqueline Kim
Nov 16, 2001
This chapter from CCDA Exam Certification Guide reviews the topologies used in network design and covers the technologies and design approaches used when designing a local-area network (LAN).
35.
CCNA: Network Media Types
By Cisco Systems, Inc.
Mar 14, 2003
36.
Analyzing Business Goals and Constraints of Network Design
By Priscilla Oppenheimer
Aug 6, 2004
This chapter covers typical network design business goals and constraints and talks about the top-down process for gathering information on goals, and the importance of using systematic methods for network design.
37.
Wireless LAN Fundamentals: Mobility
By Jonathan Leary, Pejman Roshan
Jan 9, 2004
This sample chapter covers the characteristics of roaming, Layer 2 and 3 roaming, and an introduction to Mobile IP.
38.
VLAN Access Control Lists
By Stephen McQuerry
Oct 11, 2002
39.
MPLS/VPN Architecture Overview
By Jim Guichard, Ivan Pepelnjak
Aug 2, 2002
MPLS/VPN concepts are introduced in this mock case study of service provider SuperCom and its two key customers. Learn how VPNs based on MPLS combine the benefits of the overlay VPN model with the benefits of the peer-to-peer VPN model.
40.
The Business Case for Storage Networks
By Bill Williams
Nov 18, 2004
This chapter covers the copious reasons for preferring storage networks, from the legal implications of Sarbanes-Oxley to the economy of scale created by their usage. Discover the other advantages storage networks could provide to your business within.