Vi ste ovdje
Overview/Description
When you are migrating to a VoIP network, all network requirements, including power and capacity planning, must be examined so that voice is seamlessly integrated into the existing network. IP telephony services provided over the campus infrastructure must have mechanisms set in place to differentiate traffic types and to offer priority processing to delay sensitive voice traffic. Congestion avoidance techniques, quality of service (QoS), and high availability also need to be implemented to ensure an optimal flow throughout the network. This course covers how to plan...
Overview/Description
Over the last 50 years, businesses have achieved improving levels of productivity and competitive advantages through the use of communication and computing technology. Over the past 20 years the enterprise campus network has evolved, becoming a key element in this business computing and communication infrastructure. The increasing complexity of business and network requirements creates an environment where a fixed model no longer completely describes the set of capabilities and services that constitute the campus network today. The Cisco Life-cycle Services model uses a...
Overview/Description
Businesses and consumers that rely on intranet and Internet services for their mission-critical communications require and expect their networks and applications to be continuously available to them. A network with high availability provides an alternative means by which all infrastructure paths and key servers can be accessed at all times. It is important for you as a Cisco administrator to know how to implement high availability using Cisco IOS software. Features such as Hot Standby Router Protocol (HSRP) provide Layer 3 redundancy to network hosts. Virtual Router...
Overview/Description
A network with high availability provides an alternate means of allowing constant access to all infrastructure paths and key servers. High availability is not only about adding redundant devices. It also implies planning with an eye on where the points of failure occur, and to design the network so that these points of failure can be compensated for. As a Cisco administrator it is important for you to have the knowledge required to implement a highly available network. This course covers how to evaluate the uses, requirements, benefits, and performance expectations for...
Overview/Description
Multiple active paths between switches can cause loops in the network topology. This can cause duplication of frames being forwarded. To prevent loops while providing path redundancy, you can use Spanning Tree Protocol (STP). One limitation of the traditional Spanning Tree Protocol (STP; IEEE 802.1D) is the convergence delay after a topology change. In response, several enhancements were made to improve this convergence time by adding specific Cisco features to the original 802.1D protocol, and by creating new protocols that are faster or more efficient. This course...
Overview/Description
When a network architect hands off a design to you, you must be able to create an implementation plan based on your knowledge of VLANs. As a Cisco administrator, it is important that you understand the purpose of VLANs and how VLAN implementation can simplify network management and troubleshooting, and can improve network performance. You must be able to create an implementation plan, implement that plan, and then verify the operation of the VLANs and trunks. Sometimes network resources may be located far from where users might need them, and links between switches or...
Overview/Description
Wireless LAN (WLAN) is an access technology that has an increasing significance for network access in offices, factories, hotels, and airports, and at home. WLANs are often compared to standard LANs and are often seen as "LANs without cables". Although WLANS have similarities to wired LANs, they also present important differences that you need to understand in order to perform a successful integration. The integration of wireless technology into the LAN network is a lot more than just merely connecting access points (APs) to access switches. WLAN integration into the...
Overview/Description
When a network architect hands off a design to you, switches at the distribution layer, or in a collapsed core, will almost certainly have multiple VLANs connected to them. A switch with multiple VLANs requires a means of passing Layer 3 traffic between those VLANs. As an administrator, you must understand the process and the various methods of routing traffic from VLAN to VLAN such as using an external router or a multilayer switch. It is also important to understand how to configure features such as DHCP services and Layer 3 Etherchannel. This course covers how to...
Overview/Description
In a switched network, a host of attacks can be launched at a switch and its ports. MAC flooding, rogue traffic "hopping" from one VLAN to another, spoofing attacks, as well as DHCP and Address Resolution Protocol (ARP) threats can occur at Layer 2. It is important that you implement basic security measures to guard against these types of Layer 2 malicious activities. This course defines the potential vulnerabilities relating to VLANs that can occur within a network. After the vulnerabilities are identified, solutions for each vulnerability are discussed, and...