Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Voice over IP Fundamentals
Voice over IP Fundamentals

A systematic approach to understanding the basics of Voice over IP

* Understand the basics of PSTN services and IP signaling protocols, including SS7
* Learn how VoIP can run the same applications as the existing telephony system, but in a more cost-efficient and scalable manner
* Delve into such VoIP topics as jitter, latency,
...

Cisco Express Forwarding (Networking Technology)
Cisco Express Forwarding (Networking Technology)
How does a router switch a packet? What is the difference between routing a packet, switching a frame, and packet switching? What is the Cisco® Express Forwarding (CEF) feature referred to in Cisco documentation and commonly found in Cisco IOS® commands? CEF is a general term that describes the mechanism by which Cisco routers and...
Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide
Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide

Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide: Foundation learning for SWITCH 642-813

 

Richard Froom, CCIE No. 5102

Balaji Sivasubramanian

Erum...

Inside Cisco IOS Software Architecture (CCIE Professional Development)
Inside Cisco IOS Software Architecture (CCIE Professional Development)
An essential guide to understanding the Cisco IOS architecture

In-depth coverage of Cisco's IOS Software architecture provides crucial information to:

  • Prevent network problems and optimize performance through more efficient design and configuration
  • Isolate and resolve network problems more quickly and...
Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting (Networking Technology)
Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting (Networking Technology)
When most information security professionals think about threats to their networks, they think about the threat of attackers from the outside. However, in recent years the number of computer security incidents occurring from trusted users within a company has equaled those occurring from external threats. The difference is, external threats are...
 
   
   
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy