Автор: Stephanie L. Carhee
Издательство: Cisco Press
Год издания: 2004
isbn: 1-58720-088-0
Количество страниц: 408
Язык: english
Формат: CHM
There is no better path to the successful implementation of a new technology than to follow in the experienced footsteps of an organization that has already been there. >The Road to IP Telephony> tells you how Cisco Systems successfully moved its own organization to a converged, enterprise-wide network. You will learn the implementation and operational processes, what worked, what didn't work, and how to develop your own successful methodology. After presenting this topic to hundreds of Cisco customers, including Fortune 500 companies, Stephanie Carhee consistently encountered the same question, "If I decide to move to IP Telephony, where do I begin and what can I do to ensure that I do it right the first time?" Although the needs of every enterprise are different, some things are universal; planning, communication, teamwork, and understanding your user's requirements are as important as technical expertise. >The Road to IP Telephony> shares with you everything you need to know about managing your deployment. It starts with where to begin, including what needs to be addressed before you even begin the planning process, to building your project team. Key best practices are also offered to help you set the project's pace and schedule, get your users on board, identify a migration strategy, develop a services and support strategy, and work toward the final PBX decommission.
Автор: Jim Guichard, François Le Faucheur, Jean-
Издательство: Cisco Press
Год издания: 2005
isbn: 1-58705-186-9
Количество страниц: 552
Язык: english
Формат: CHM
Service providers can turn to numerous sources that describe technologies used in MPLS networks, such as QoS, Traffic Engineering (TE), and VPN; however there is no single resource that illustrates how to actually design a network that benefits from the latest technologies, and combines them optimally for a specific environment. Definitive MPLS Network Designs fills this void by providing a series of design studies showing how to combine key techniques and technologies at the heart of IP/MPLS networks in line with real-life network best practices.
Автор: Jim Geier
Издательство: Cisco Press
Год издания: 2004
isbn: 1-58720-111-9
Количество страниц: 264
Язык: english
Формат: CHM
As a basic introduction to wireless networking, Wireless Networks First-Step assumes that readers have no previous wireless experience. The book provides an overview of wireless networking, along with details of applicable standards and technologies. Newcomers to wireless technologies will find practical information along with an abundance of examples. Case studies throughout the chapters provide real-world implementation examples, presented in a non-technical fashion. Implementation details are discussed only to the extent that readers can identify what type of wireless network may be appropriate for their needs.
Автор: Alexander Clemm
Издательство: Cisco Press
Год издания: 2007
isbn: 1-58720-137-2
Количество страниц: 510
Язык: english
Формат: PDF
Network Management Fundamentals explains the different technologies that are used in network management and how they relate to each other. The book focuses on fundamental concepts and principles. It provides a solid technical foundation for the practitioner to successfully navigate network management topics and apply those concepts to particular situations.
Автор: Andrew Mason, Mark J.Newcomb
Издательство: Cisco Press
Год издания: 2001
isbn: 1-58705-016-1
Количество страниц: 528
Язык: english
Формат: PDF
Cisco Secure Internet Security Solutions covers the basics of Internet security, and then concentrates on each member of the Cisco Secure product family, providing a detailed explanation with examples of the preferred configurations required for securing Internet connections. The Cisco Secure PIX Firewall is covered in depth from an architectural point of view, and a reference of the PIX commands explains their use in the real world. Although Cisco Secure Internet Security Solutions is primarily concerned with Internet security, the information inside is also applicable to many general network security scenarios
Автор: Джонатан Дэвидсон, Джеймс Питерс, Манож Бхатия
Издательство: Вильямс
Год издания: 2007
isbn: 1-58705-257-1, 978-5-8459-1281-7
Количество страниц: 392
Язык: русский
Формат: DJVU
Для передачи голоса и данных по сетям применяются собственные, достаточно сложные технологии, которым посвящено немало книг. В этой книге описан состав и работа фундаментальной инфраструктуры современной телефонной связи, основные концепции сетей передачи голоса и данных, а также протоколы IP, используемые для передачи данных между современными телефонными системами.
Здесь основы технологий VoIP рассматриваются на уровне, достаточном, чтобы администратор сети, разработчик программного обеспечения или любой, кого просто интересуют технологические вопросы по сетям VoIP, получили необходимый объем информации.
Автор: Walter J. Goralski
Издательство: Wiley Publishing, Inc.
Год издания: 2002
isbn: 0-471-21592-9
Количество страниц: 723
Язык: english
Формат: PDF
Books about Internet routing protocols and the role that these routing protocols play on the Internet have been around for a while. But other books tend to play up the nuts-and-bolts aspects of the routing protocols such as message exchanges and protocol packet structures. So there are long chapters on the low-level functioning of OSPF Link-State Advertisements (LSAs), IS-IS Type-Length-Value (TLV) extensions, and BGP attributes, but little information about how network administrators use these routing protocols on the Internet today. A key aspect of the way these routing protocols interoperate and interact today is the concept of a routing policy. Arouting policy is just a set of rules that establish the ways that a route (today most often called a prefix) is used when learned by the router and then passed on (advertised) to other routers. Yet information about the formulation and use of these routing policies is quite hard to come by.
Автор: Brian M. Edwards, Leonard A. Giuliano, B.R. Wright
Издательство: Addison Wesley
Год издания: 2002
isbn: 0-201-74612-3
Количество страниц: 384
Язык: english
Формат: CHM
Interdomain Multicast Routing is a book on the timely technology of multicasting and is written, mainly, for network engineers responsible for configuring and maintaining that capability within their networks. It is a practical reference guide that includes Cisco Systems and Juniper Networks technology. The authors' goals are to explain the rationale and benefits of multicast routing on the Internet, to include the two leading vendors of routers and routing technology and note how they differ when applying interdomain multicast routing (IMR), and to explain the underpinnings of interdomain multicasting in simple, clear language.
Издательство: Cisco Press
Год издания: 2003
isbn: 1587051192
Количество страниц: 1321
Язык: english
Формат: PDF
Everything Cisco Systems does to facilitate the efficient flow of data among hosts on networks big and small, except those products that have to do with Voice over IP (VoIP). Beginning with the essentials of internetworking, and proceeding through LAN and WAN protocols, multiservice access technologies like digital subscriber line (DSL), switching and bridging (with emphasis on virtual LANs), and routing protocols, this book covers the state of the Cisco Systems art.
Издательство: Cisco Press
Год издания: 2003
Количество страниц: 1050
Язык: english
Формат: PDF
Upon completion of this course, you will be able to perform
the following tasks:
* Recognize the services offered by cryptography and
recommend those services to an organization to address their
specific needs.
* Describe various encryption, hashing, and signing algorithms
and select the best algorithm in a design situation.
* Explain the role of key management in cryptography.
* Explain specific guidelines which need to be considered when
deploying cryptographic systems.
* Select the best practices of key management in a design
situation. * Describe the standards and procedures used with the PKI.
* Explain the limitations of PKI technologies in various
security designs.
* Design secure VPN’s using various VPN technologies.
* Identify the benefits and drawbacks of each VPN
technology.
* Implement basic IPSec using all currently supported
encryption and authentication mechanisms. * Design and implement site-to-site VPNs using
IPSec.
* Design and implement remote access VPNs
using IPSec.
* List the software products used to form the
management of IPSec devices and solutions.
* Design and implement secure wireless
networks.