Security Technology
Security technology typically falls into one of three categories. Identity: Links user authentication and authorization on the network infrastructure; verifies the identity… Read More
Why Networks Need Security?
All Networks Need Security Security is very important. The Internet is a wonderful tool. Meteoric growth like that of Cisco… Read More
QoS in Action
QoS in Action Example 1: Prioritization of IP Telephony Example 2: ERP Application - SUMMARY - The goal of QoS… Read More
Resource Reservation Protocol (RSVP)
Here’s an example of how RSVP works. Let’s first look at what the problem would be without RSVP. In this… Read More
Weighted Random Early Detection (RED)
Cisco’s implementation of RED, called Weighted Random Early Detection (WRED), combines the capabilities of the RED algorithm with IP Precedence.… Read More
QoS Building Blocks
Let’s now take a look at some of the building blocks of QoS. There are a wide range of QoS… Read More
What Is Quality of Service (QoS)?
Basically, QoS comprises the mechanisms that give network managers the ability to control the mix of bandwidth, delay, variances in… Read More
Virtual Trunk Protocol (VTP)
In addition to the ISL packet tagging method, Cisco also created the Virtual Trunking Protocol, or VTP, for dynamically configuring… Read More
Communicating Between VLANs
Another key component of VLANs is the router. Routers provide inter-VLAN communications and are essential for sharing VLAN information in… Read More
VLAN Technologies
Let’s take a look at some technologies that are essential for VLAN implementations. Inter-Switch Link Cisco developed the Inter-Switch Link,… Read More