X

Security Technology

Security technology typically falls into one of three categories. Identity: Links user authentication and authorization on the network infrastructure; verifies the identity… Read More

Why Networks Need Security?

All Networks Need Security Security is very important. The Internet is a wonderful tool. Meteoric growth like that of Cisco… Read More

QoS in Action

QoS in Action Example 1: Prioritization of IP Telephony Example 2: ERP Application - SUMMARY - The goal of QoS… Read More

Resource Reservation Protocol (RSVP)

Here’s an example of how RSVP works. Let’s first look at what the problem would be without RSVP. In this… Read More

Weighted Random Early Detection (RED)

Cisco’s implementation of RED, called Weighted Random Early Detection (WRED), combines the capabilities of the RED algorithm with IP Precedence.… Read More

QoS Building Blocks

Let’s now take a look at some of the building blocks of QoS. There are a wide range of QoS… Read More

What Is Quality of Service (QoS)?

Basically, QoS comprises the mechanisms that give network managers the ability to control the mix of bandwidth, delay, variances in… Read More

Virtual Trunk Protocol (VTP)

In addition to the ISL packet tagging method, Cisco also created the Virtual Trunking Protocol, or VTP, for dynamically configuring… Read More

Communicating Between VLANs

Another key component of VLANs is the router. Routers provide inter-VLAN communications and are essential for sharing VLAN information in… Read More

VLAN Technologies

Let’s take a look at some technologies that are essential for VLAN implementations. Inter-Switch Link Cisco developed the Inter-Switch Link,… Read More