Cisco - RBOC, PTT Architecture

Read Online or Download Cisco - RBOC, PTT Architecture PDF

Best networking books

802.1X Port-Based Network Access Authentification

Written to entice a wide viewers, 802. 1X Port-Based Authentication seeks to outline this complicated idea in available phrases and to discover its a variety of functions to present day computing device networks utilizing this actual community protocol. this article assumes that the reader could have very little previous wisdom and just a basic realizing of computing device networking, offering an introductory evaluate in addition to a topic assessment in every one bankruptcy.

Extra resources for Cisco - RBOC, PTT Architecture

Example text

In the 1990s, networking books and training classes taught the 80/20 rule for capacity planning: 80 percent of traffic stays local in departmental LANs, and 20 percent of traffic is destined for other departments or external networks. This rule is no longer universal and is rapidly moving to the other side of the scale. Many companies have centralized servers residing in data centers. In addition, corporations increasingly implement intranets that enable employees to access centralized web servers using Internet Protocol (IP) technologies.

Chapter 2 discusses the details of performance and reliability analysis, but at this point in the design process, you should start addressing these issues. (Remember that 9 10 Top-Down Network Design top-down network design is iterative. ) Changes in Enterprise Networks Enterprise networks at many corporations have been undergoing major changes. The value of making vast amounts of data available to employees, customers, and business partners has been recognized. Corporate employees, field employees, contract employees, and telecommuters need access to sales, marketing, engineering, and financial data, regardless of whether the data is stored on centralized or distributed servers or mainframes.

If all the partners can access data and services on the manufacturer’s network, production costs are reduced, just-in-time manufacturing can be accomplished, and it is easier to plan around component shortages. The ability to share information saves time and money for the automobile manufacturer and for its partners. A network designer must carefully consider requirements for extending the network to outside users. For security reasons, external access should not mean full network access. Using a modular approach to network design is important here so that a clear boundary exists between the enterprise’s private networks and the portions of the internetwork that partners can access.

Download PDF sample

Rated 4.39 of 5 – based on 6 votes