Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Implementing Cisco Networking Solutions
  • Table Of Contents Toc
  • Feedback & Rating feedback
Implementing Cisco Networking Solutions

Implementing Cisco Networking Solutions

By : Harpreet Singh
4.7 (3)
close
close
Implementing Cisco Networking Solutions

Implementing Cisco Networking Solutions

4.7 (3)
By: Harpreet Singh

Overview of this book

Most enterprises use Cisco networking equipment to design and implement their networks. However, some networks outperform networks in other enterprises in terms of performance and meeting new business demands, because they were designed with a visionary approach. The book starts by describing the various stages in the network lifecycle and covers the plan, build, and operate phases. It covers topics that will help network engineers capture requirements, choose the right technology, design and implement the network, and finally manage and operate the network. It divides the overall network into its constituents depending upon functionality, and describe the technologies used and the design considerations for each functional area. The areas covered include the campus wired network, wireless access network, WAN choices, datacenter technologies, and security technologies. It also discusses the need to identify business-critical applications on the network, and how to prioritize these applications by deploying QoS on the network. Each topic provides the technology choices, and the scenario, involved in choosing each technology, and provides configuration guidelines for configuring and implementing solutions in enterprise networks.
Table of Contents (12 chapters)
close
close

Encrypting and securing the WAN

One of the considerations of choosing a WAN circuit is security, and the type of data that is being transmitted over that WAN link. If the data is very confidential, it should not be transmitted over public infrastructures, as it is vulnerable to be exploited.

MPLS VPNs were launched in early 2000, and even though it was highly secure from a transport perspective, a lot of organizations were skeptical about using the shared infrastructure of the SP for their internal IT environments. But they saw the huge benefits in cost savings with regard to building their own dedicated infrastructures using TDM links from SPs, and the availability benefits the users realized due to the redundant infrastructure of the MPLS SP. Also, the services could scale up and scale down by just changing the access port bandwidth of an Ethernet port, and thus made the networks...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete