General Networking

All General Networking Articles

Showing 1-20 of 329

Sort by Date | Title

Page: 1 2 3 4 5 Next >

1.
2011 Collegiate Cyber Defense Challenge: Shaping the Cyber Warriors of Tomorrow
May 2, 2011
Brad Bowers provides an intriguing look into the 2011 Mid-Atlantic CCDC attack-and-defense competition for information technology students.
2.
5 Questions with Cisco Systems' Telephony Expert Anne Smith
Jan 31, 2003
3.
A Cisco Telephony Architecture Evolution
Sep 3, 2004
This chapter introduces the concept of ROI, and provides the background and reasoning behind Cisco's decision to migrate to an all-IP network.
4.
A Network Administrator's View of Multiservice Networks
Dec 9, 2005
Multiservice networks provide more than one distinct communications service type over the same physical infrastructure. Multiservice implies not only the existence of multiple traffic types within the network, but also the ability of a single network to support all of these applications without compromising quality of service (QoS) for any of them. This chapter covers multiservice networks in detail from the network administrator's viewpoint.
5.
A Student-Hacker Showdown at the Collegiate Cyber Defense Competition
Mar 31, 2006
Students-turned-IT managers faced off against experienced hackers at the Mid-Atlantic Regional Collegiate Cyber Defense Competition. Seth Fogie witnessed this real-world competition and reports on its unexpected twists, turns, and even drama.
6.
Achieving Nomadicity: Accessing the Internet Anytime, Anywhere
Mar 11, 2011
This chapter explains the key concepts that make it possible for users and devices to gain access to IP networks and IP-based applications that are offered by others than their own operator.
7.
An Overview of Cisco IOS Versions and Naming
Jun 28, 2013
This article covers the different Cisco IOS releases and naming structures and aims to give a single location where network engineers can look to figure out what the different releases mean.
8.
An Overview of Cisco IP Communications
Dec 9, 2005
This chapter provides an overview of Cisco IP Communications, including VoIP and how Cisco IP Communications differs from traditional telephone systems, and how you can use VoIP to achieve savings by routing your telephone calls over the IP WAN.
9.
Analyzing MPLS VPN Security
Oct 6, 2005
VPN users have certain expectations and requirements for their VPN service. In a nutshell, they want their service to be both private and secure. In other words, they want their VPN to be as secure as with dedicated circuits while gaining the scalability benefits of a shared infrastructure. Both concepts, of privacy and security, are not black and white, and need to be defined for a real world implementation. This chapter introduces you to VPN MPLS security requirements.
10.
Analyzing the Cisco Enterprise Campus Architecture
Jul 15, 2010
This chapter introduces you to the concepts of enterprise campus designs, along with an implementation process that can ensure a successful campus network deployment.
11.
Applying Cisco Troubleshooting Tools
Nov 16, 2001
This sample chapter from CCNP Support Exam Certification Guide introduces some powerful troubleshooting tools that are built into the Cisco IOS.
12.
Applying the Principles of Network Design
Feb 1, 2002
To illustrate three basics of highly scalable networks, this Cisco Press sample chapter "reforms" a network that is experiencing stability problems to make it stable and scalable.
13.
Around the Globe in the Race Against IPv4 Address Depletion
May 19, 2009
Linda Leung interviews Jeff Doyle about what he sees as the future for IPv6.
14.
Attacking and Defending the Internet with Border Gateway Protocol (BGP)
Aug 25, 2008
Carolyn Meinel explains how sysadmins can take advantage of resources offered by several organizations to detect and defeat BGP problems.
15.
Authentication and Authorization Policies: Using Cisco Identity Services Engine in a BYOD World
Jun 25, 2013
This chapter examines the relationship between authentication and authorization and how to build policies for each, describing a few common Authentication Policies and Authorization Policies to help you see how to work with these policy constructs.
16.
Backbone Router Configuration
Mar 14, 2003
17.
Backup Basics Part 1: Demystifying Server and Workstation Backup Methods
Jun 16, 2006
Understanding the options for backing up servers and workstations is important for any technician or system/server administrator. But for new IT staff, all the details about how backups work and how to configure them can be confusing. In this first article in a three-part series, Ryan Faas demystifies the various types of backups that can be performed on servers and workstations using most backup applications.
18.
Backup Basics Part 2: Demystifying Backup Media
Jun 30, 2006
In part two of a three-part series on backup basics, Ryan Faas continues to demystify backup options for new technicians and server/systems administrators. This time, the topic is choosing the media in which to store your backups. Find out the pros and cons of tape, hard drives, and RAID arrays; using network storage; and archiving using CDs or DVDs.
19.
Backup Basics Part 3: General Tips for a Backup Strategy
Jul 14, 2006
Knowing how to configure backup applications and select backup media is half the battle of designing a successful backup strategy. The other half is choosing how and when to back up the specific pieces of data that are stored on your servers, share points, and workstations. In this final article of his series on backup basics for new technicians and administrators, Ryan Faas offers some suggestions to help you make these important decisions.
20.
Basic Cisco IOS Software and Catalyst 3550 Series Security
Jul 25, 2003
Become comfortable with basic Cisco IOS Software and Catalyst 3550 security features with an introduction to password management, disabling unnecessary services, setting up secure HTTP and NTP services, and SSH.

Page: 1 2 3 4 5 Next >