Network Architecture & Design

All Network Architecture & Design Articles

Showing 1-20 of 30

Sort by Date | Title

Page: 1 2 Next >

1.
The Art of Network Architecture: Applying Modularity
May 12, 2014
This chapter focuses on why we use specific design patterns to implement modularity, discussing specifically why we should use hierarchical design to create a modular network design, why we should use overlay networks to create virtualization, and the results of virtualization as a mechanism to provide modularity.
2.
Cisco Networking Academy's Introduction to Scaling Networks
Apr 17, 2014
This chapter introduces strategies that can be used to systematically design a highly functional network, such as the hierarchical network design model, the Cisco Enterprise Architecture, and appropriate device selections.
3.
IPv6 Translation and Tunneling Technologies
Jun 26, 2013
With the exhaustion of the IPv4 addressing space quickly approaching, it has become a high priority for organizations to begin their own deployments of IPv6. This can be accomplished in a number of different ways. This article examines specific methods and how they can be used to support an IPv6 deployment.
4.
IPv6 Tunneling Technology Configuration
Jun 26, 2013
This article focuses on the basic configuration of available IPv6 tunneling technologies for Cisco networks.
5.
Eight Cool Things You Probably Don’t Know About Data Centers
Sep 27, 2012
Doug Alger, author of The Art of the Data Center, discusses eight cool things most people don’t realize about Data Centers in this InformIT exclusive audio segment.
6.
Achieving Nomadicity: Accessing the Internet Anytime, Anywhere
Mar 11, 2011
This chapter explains the key concepts that make it possible for users and devices to gain access to IP networks and IP-based applications that are offered by others than their own operator.
7.
Introduction to Cisco NX-OS
Jul 19, 2010
This chapter provides an introduction and overview of NX-OS and a comparison between traditional IOS and NX-OS configurations and terminology.
8.
Analyzing the Cisco Enterprise Campus Architecture
Jul 15, 2010
This chapter introduces you to the concepts of enterprise campus designs, along with an implementation process that can ensure a successful campus network deployment.
9.
Cisco Data Center Virtualization Server Architectures
Jul 1, 2010
This chapter examines processor, memory, and I/O subsystems with particular reference to servers built according to the IA-32, often generically called x86 architecture.
10.
I/O Consolidation in the Data Center
Sep 23, 2009
This chapter explains the benefits and challenges of designing physical infrastructure to simultaneously carry multiple types of traffic.
11.
Using Static IP Addresses on Your Network
Sep 14, 2009
Eric Geier helps you discover ways to convert from dynamic to static addresses on your network.
12.
Green Data Center Design and Build Strategies
Aug 12, 2009
This chapter discusses methods for limiting the environmental impact that occurs during the construction of a Data Center.
13.
Offloading Traditional Mobile Networks with IP
Jun 23, 2009
This chapter discusses pseudowire transport mechanisms used to provide a bridge between the legacy TDM systems and All IP systems on mobile networks.
14.
Structuring and Modularizing the Network with Cisco Enterprise Architecture
Jun 12, 2008
This chapter introduces a modular hierarchical approach to network design, the Cisco Enterprise Architecture.
15.
An Overview of Cisco IP Communications
Dec 9, 2005
This chapter provides an overview of Cisco IP Communications, including VoIP and how Cisco IP Communications differs from traditional telephone systems, and how you can use VoIP to achieve savings by routing your telephone calls over the IP WAN.
16.
Improve Your Network's Security Using Network Admission Control
Aug 26, 2005
Is there a place for security focused on the good guys in networking? There is, and one of the latest additions to this area of security is called Network Admission Control (NAC). Sean Convery introduces NAC, a security measure built around the idea that asking specific questions of an organization's end hosts can improve the overall security of a network by improving the compliance of end systems to a given admission policy.
17.
Troubleshooting Unicast Flooding Due to Topology
Sep 10, 2004
Unicast flooding occurs for many reasons in a switched network. This article addresses how to detect and troubleshoot unicast flooding issues due to spanning tree topology changes.
18.
Analyzing Business Goals and Constraints of Network Design
Aug 6, 2004
This chapter covers typical network design business goals and constraints and talks about the top-down process for gathering information on goals, and the importance of using systematic methods for network design.
19.
General Design Considerations for Secure Networks
Jun 18, 2004
20.
Using Multicast Domains
Jun 27, 2003
Learn how multicast domains allow service providers to offer mVPN services to their customers by using native multicasting techniques in the core. You will see the many advantages of these multicasting techniques and how they can relate to you and your customers.

Page: 1 2 Next >