Chapters & Articles

All Articles

Showing 561-580 of 854

Sort by Date | Title

561.
Packet over SONET
Nov 7, 2003
This sample chapter covers Packet over SONET (PoS) operation, encapsulation, protection, and convergence.
562.
Packet Switching Methods on Cisco Networks
Jul 14, 2015
Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, teaches new networking students the basics they need to know about packet switching on Cisco networks. Experienced network engineers will find this article a useful refresher course on Cisco technology.
563.
Paint Your Data Center Green: An Interview with Douglas Alger
Jul 1, 2009
Douglas Alger explains what it takes for businesses to green their data centers.
564.
Passing Certification Exams
Sep 26, 2003
Denise Donohue describes what it takes to be a successful test-taker.
565.
Penetration Testing and Network Defense: Performing Host Reconnaissance
Jun 2, 2006
Malicious hackers also value reconnaissance as the first step in an effective attack. For them, seeing what is on the "other side of the hill" is crucial to knowing what type of attack to launch. Although penetration testers might not always have the luxury of time that a malicious hacker might have, they do recognize the value of reconnaissance. This chapter will help you develop network reconnaissance skills to help you protect your network from intrusion.
566.
Performing a Great Screen Play: The Many Routes to Remote Computing
Apr 12, 2002
Symantec's pcAnywhere is no longer the de facto program for remote access. Ross Scott Rubin demonstrates how cross-platform options, hosted services, and two new options built into Windows XP can bridge the distance between you and another computer.
567.
Physical and Logical Infrastructure Requirements
By Jerome Henry, David Hucaby
Apr 17, 2024

In this sample chapter from CCNP Enterprise Wireless Design ENWLSD 300-425 and Implementation ENWLSI 300-430 Official Cert Guide, 2nd Edition, the authors cover physical and logical infrastructure requirements including powering an access point with Power over Ethernet (PoE) and the communication flow of CAPWAP control and data channels. This chapter covers ENWLSD exam topics 2.1-2.2.

568.
Physical and Logical Infrastructure Requirements
By Robert Barton, Jerome Henry, David Hucaby
Oct 3, 2020

In this sample chapter from CCNP Enterprise Wireless Design ENWLSD 300-425 and Implementation ENWLSI 300-430 Official Cert Guide: Designing & Implementing Cisco Enterprise Wireless Networks, you will learn how to determine physical infrastructure requirements including AP power, cabling, switch port capacity, mounting, and grounding. You will also learn how to determine logical infrastructure requirements such as WLC/AP licensing requirements based on the type of wireless architecture.

569.
PKI Processes and Procedures
Apr 1, 2011
Several processes need to occur in a PKI network for a deployment to function smoothly. To address these processes, this chapter covers enrollment, Certificate Expiration and Renewal, Certificate Verification and Enforcement, and PKI Resiliency.
570.
Planning for Cisco IP Telephony
May 6, 2005
This chapter provides the tasks and best practices involved in the planning phase of the IPT deployment, using an imaginary company "XYZ, Inc." to demonstrate how this planning can be tailored to the unique needs of your business.
571.
Planning and Designing 802.11 Wireless Technologies
May 16, 2012
On top of normal networking issues, WLAN adds a couple of new challenges, such as Layer 1 (radio frequency [RF]) issues; a set of L2 protocols, such as IEEE 802.11; and the need for agencies to regulate the use of this shared medium, as the authors explain in this excerpt from their book, CCIE Wireless Exam (350-050) Quick Reference.
572.
Planning the Cisco CallManager Implementation
Sep 24, 2004
Planning, designing, and implementing a Cisco IP Telephony solution is a much more manageable task if you carefully consider each step outlined in this chapter before moving on to each subsequent step.
573.
Policy, Personnel, and Equipment as Security Enablers
Apr 1, 2005
Policy plays an integral role in security effectiveness. Educating users on their responsibility to enhance security can have a twofold effect: It ensures that deployed equipment can perform tasks with greater effectiveness, and it creates an environment that encourages and supports individual responsibility.
574.
Port Channels and vPCs
By Somit Maloo, Iskren Nikolov
Nov 9, 2022

Port Channel technology allows multiple links between two participating devices to be used to forward traffic by using a load-balancing algorithm. vPC (virtual port channel) technology allows multiple devices to form a port channel. In this sample chapter from Cisco Data Center Fundamentals, the authors discuss Ethernet port channels, including port channel modes, port channel compatibility requirements, and port channel load balancing.

575.
Preparing for the CCNP ONT Exam: IP Quality of Service
Dec 7, 2007
576.
Prevent Wi-Fi Eavesdroppers from Hijacking Your Accounts
Sep 20, 2011
Eric Geier shows you how to protect your privacy when logging on to online accounts that don't always use secure connections, like Facebook, MySpace, Twitter, and Amazon.
577.
Preventive Maintenance and Troubleshooting
By Cisco Networking Academy
Mar 28, 2020

In this sample chapter from IT Essentials Companion Guide v7 for Cisco Networking Academy, you will learn about the many benefits of conducting preventive maintenance for both hardware and software.

578.
Professional Networking Made Easy: Priming the Pump
Jul 21, 2006
Matthew Moran provides techniques and strategies to help you create a strong professional network, starting today.
579.
Project Management Crash Course: What is a Project Charter?
Oct 28, 2009
Rita Mulcahy defines the concept of a project charter and provides examples of soft and hard metrics of a project.
580.
Project Management for IT Pros: An Interview with Rita Mulcahy
Jan 4, 2010
Tim Warner interviews Rita Mulcahy about her new Cisco Press book, how an IT executive makes sense of the often-confusing world of PM certifications, and how an IT decision maker can identify and avoid the most common PM pitfalls.