gogogo
Syndetics cover image
Image from Syndetics

Implementing Cisco IP switched networks (SWITCH) foundation learning guide / Richard Froom, Balaji Sivasubramanian, Erum Frahim.

By: Contributor(s): Material type: TextTextPublication details: Indianapolis, IN : Cisco Press, c2010.Description: xxiv, 526 p. : ill. ; 24 cmISBN:
  • 9781587058844 (hbk.)
  • 1587058847 (hbk.)
Subject(s): DDC classification:
  • 621.382/16076 22
LOC classification:
  • TK5103.8 .F765 2010
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Standard Loan Thurles Library Main Collection 004.66 FRO (Browse shelf(Opens below)) 1 Available R19157KKRC

Enhanced descriptions from Syndetics:

Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide: Foundation learning for SWITCH 642-813

Richard Froom , CCIE No. 5102

Balaji Sivasubramanian

Erum Frahim , CCIE No. 7549

Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide is a Cisco®authorized learning tool for CCNP®and CCDP® preparation. As part of the Cisco Press foundation learning series, this book covers how to plan, configure, and verify the implementation of complex enterprise switching solutions using the Cisco Campus Enterprise Architecture. The Foundation Learning Guide also covers secure integration of VLANs, WLANs, voice, and video into campus networks.

Each chapter opens with the list of topics covered to clearly identify the focus of that chapter. At the end of each chapter, a summary and review questions provide you with an opportunity to assess and reinforce your understanding of the material. Throughout the book detailed explanations with commands, configurations, and diagrams serve to illuminate theoretical concepts.

Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide is ideal for certification candidates who are seeking a tool to learn all the topics covered in the SWITCH 642-813 exam.

- Serves as the official book for the Cisco Networking Academy CCNP SWITCH course

- Provides a thorough presentation of the fundamentals of multilayer switched network design

- Explains the implementation of the design features such as VLAN, Spanning Tree, and inter-VLAN routing in the multilayer switched environment

- Explains how to implement high-availability technologies and techniques

- Covers security features in a switched network

- Presents self-assessment review questions, chapter topics, summaries, command syntax explanations, network diagrams, and configuration examples to facilitate effective studying

This book is in the Foundation Learning Guide Series. These guides are developed together with Cisco® as the only authorized, self-paced learning tools that help networking professionals build their understanding of networking concepts and prepare for Cisco certification exams.

"Foundation learning for SWITCH 642-813"--P. 1, cover.

Includes index.

Table of contents provided by Syndetics

  • Chapter 1 Analyzing the Cisco Enterprise Campus Architecture
  • Introduction to Enterprise Campus Network Design (p. 2)
  • Regulatory Standards Driving Enterprise Architectures (p. 4)
  • Campus Designs (p. 5)
  • Legacy Campus Designs (p. 5)
  • Hierarchical Models for Campus Design (p. 6)
  • Impact of Multilayer Switches on Network Design (p. 7)
  • Ethernet Switching Review (p. 7)
  • Layer 2 Switching (p. 8)
  • Layer 3 Switching (p. 10)
  • Layer 4 and Layer 7 Switching (p. 11)
  • Layer 2 Switching In-Depth (p. 12)
  • Layer 3 Switching In-Depth (p. 12)
  • Understanding Multilayer Switching (p. 14)
  • Introduction to Cisco Switches (p. 15)
  • Cisco Catalyst 6500 Family of Switches (p. 15)
  • Cisco Catalyst 4500 Family of Switches (p. 15)
  • Cisco Catalyst 4948G, 3750, and 3560 Family of Switches (p. 16)
  • Cisco Catalyst 2000 Family of Switches (p. 16)
  • Nexus 7000 Family of Switches (p. 16)
  • Nexus 5000 and 2000 Family of Switches (p. 17)
  • Hardware and Software-Switching Terminology (p. 17)
  • Campus Network Traffic Types (p. 18)
  • Peer-to-Peer Applications (p. 21)
  • Client/Server Applications (p. 21)
  • Client-Enterprise Edge Applications (p. 23)
  • Overview of the SONA and Borderless Networks (p. 25)
  • Enterprise Campus Design (p. 27)
  • Access Layer In-Depth (p. 29)
  • Distribution Layer (p. 29)
  • Core Layer (p. 31)
  • The Need for a Core Layer (p. 32)
  • Campus Core Layer as the Enterprise Network Backbone (p. 33)
  • Small Campus Network Example (p. 33)
  • Medium Campus Network Example (p. 34)
  • Large Campus Network Design (p. 34)
  • Data Center Infrastructure (p. 35)
  • PPDIOO Lifecycle Approach to Network Design and Implementation (p. 37)
  • PPDIOO Phases (p. 37)
  • Benefits of a Lifecycle Approach (p. 38)
  • Planning a Network Implementation (p. 39)
  • Implementation Components (p. 40)
  • Summary Implementation Plan (p. 40)
  • Detailed Implementation Plan (p. 42)
  • Summary (p. 43)
  • Review Questions (p. 43)
  • Chapter 2 Implementing VLANs in Campus Networks (p. 51)
  • Implementing VLAN Technologies in a Campus Network (p. 52)
  • VLAN Segmentation Model (p. 53)
  • End-to-End VLAN (p. 54)
  • Local VLAN (p. 55)
  • Comparison of End-to-End VLANs and Local VLANs (p. 56)
  • Mapping VLANs to a Hierarchical Network (p. 57)
  • Planning VLAN Implementation (p. 58)
  • Best Practices for VLAN Design (p. 59)
  • Configuring VLANs (p. 60)
  • VLAN Ranges (p. 60)
  • Verifying the VLAN Configuration (p. 63)
  • Troubleshooting VLANs (p. 67)
  • Troubleshooting Slow Throughput (p. 67)
  • Troubleshooting Communication Issues (p. 68)
  • Implementing Trunking in Cisco Campus Network (p. 68)
  • Trunking Protocols (p. 69)
  • Understanding Native VLAN in 802.1Q Trunking (p. 71)
  • Understanding DTP (p. 72)
  • Cisco Trunking Modes and Methods (p. 72)
  • VLAN Ranges and Mappings (p. 73)
  • Best Practices for Trunking (p. 73)
  • Configuring 802.1Q Trunking (p. 74)
  • Verifying Trunking Configurations (p. 76)
  • Troubleshooting Trunking (p. 77)
  • VLAN Trunking Protocol (p. 78)
  • VTP Pruning (p. 81)
  • VTP Versions (p. 82)
  • VTP Versions 1 and 2 (p. 82)
  • VTP Version 3 (p. 83)
  • VTP Messages Types (p. 83)
  • Summary Advertisements (p. 83)
  • Subset Advertisements (p. 84)
  • Advertisement Requests (p. 84)
  • VTP Authentication (p. 84)
  • Best Practices for VTP Implementation (p. 84)
  • Configuring VTP (p. 85)
  • Verifying the VTP Configuration (p. 85)
  • Troubleshooting VTP (p. 87)
  • Private VLANs (p. 87)
  • Private VLANs Overview (p. 88)
  • Private VLANs and Port Types (p. 88)
  • Private VLAN Configuration (p. 90)
  • Configuring Private VLANs in Cisco IOS (p. 91)
  • Verifying Private VLAN (p. 92)
  • Private VLAN Configuration Example (p. 93)
  • Single Switch Private Configuration (p. 93)
  • Private VLAN Configuration Across Switches (p. 94)
  • Port Protected Feature (p. 97)
  • Configuring Link Aggregation with EtherChannel (p. 97)
  • Describe EtherChannel (p. 98)
  • PAgP and LACP Protocols (p. 101)
  • PAgP Modes (p. 101)
  • LACP Modes (p. 103)
  • Configure Port Channels Using EtherChannel (p. 105)
  • Guidelines for Configuring EtherChannel (p. 105)
  • Layer 2 EtherChannel Configuration Steps (p. 106)
  • Verifying EtherChannel (p. 108)
  • EtherChannel Load Balancing Options (p. 110)
  • Summary (p. 112)
  • Review Questions (p. 113)
  • Chapter 3 Implementing Spanning Tree (p. 119)
  • Evolution of Spanning Tree Protocols (p. 119)
  • Spanning Tree Protocol Basics (p. 121)
  • STP Operation (p. 122)
  • Rapid Spanning Tree Protocol (p. 125)
  • RSTP Port States (p. 126)
  • RSTP Port Roles (p. 127)
  • Rapid Transition to Forwarding (p. 129)
  • RSTP Topology Change Mechanism (p. 132)
  • Bridge Identifier for PVRST+ (p. 136)
  • Compatibility with 802.1D (p. 137)
  • Cisco Spanning Tree Default Configuration (p. 137)
  • PortFast (p. 138)
  • Configuring the PortFast Feature (p. 138)
  • Configuring the Basic Parameters of PVRST+ (p. 140)
  • Multiple Spanning Tree (p. 141)
  • MST Regions (p. 143)
  • Extended System ID for MST (p. 144)
  • Configuring MST (p. 145)
  • Spanning Tree Enhancements (p. 150)
  • BPDU Guard (p. 152)
  • BPDU Filtering (p. 153)
  • Root Guard (p. 155)
  • Preventing Forwarding Loops and Black Holes (p. 158)
  • Loop Guard (p. 158)
  • UDLD (p. 161)
  • Comparison Between Aggressive Mode UDLD and Loop Guard (p. 165)
  • Flex Links (p. 166)
  • Recommended Spanning Tree Practices (p. 168)
  • Troubleshooting STP (p. 171)
  • Potential STP Problems (p. 171)
  • Duplex Mismatch (p. 172)
  • Unidirectional Link Failure (p. 172)
  • Frame Corruption (p. 173)
  • Resource Errors (p. 173)
  • PortFast Configuration Error (p. 174)
  • Troubleshooting Methodology (p. 174)
  • Develop a Plan (p. 175)
  • Isolate the Cause and Correct an STP Problem (p. 175)
  • Document Findings (p. 177)
  • Summary (p. 178)
  • References (p. 179)
  • Review Questions (p. 179)
  • Chapter 4 Implementing Inter-VLAN Routing (p. 183)
  • Describing Inter-VLAN Routing (p. 184)
  • Introduction to Inter-VLAN Routing (p. 184)
  • Inter-VLAN Routing Using an External Router (Router-on-a-Stick) (p. 186)
  • External Router: Advantages and Disadvantages (p. 189)
  • Inter-VLAN Routing Using Switch Virtual Interfaces (p. 190)
  • SVI: Advantages and Disadvantages (p. 192)
  • Routing with Routed Ports (p. 192)
  • Routed Port: Advantage and Disadvantages (p. 193)
  • L2 EtherChannel Versus L3 EtherChannel (p. 194)
  • Configuring Inter-VLAN Routing (p. 194)
  • Inter-VLAN Configuration with External Router (p. 195)
  • Implementation Planning (p. 195)
  • Inter-VLAN Configuration with SVI (p. 197)
  • Implementation Plan (p. 197)
  • Switch Virtual Interface Configuration (p. 198)
  • SVI Autostate (p. 199)
  • Configuring Routed Port on a Multilayer Switch (p. 200)
  • Verifying Inter-VLAN Routing (p. 201)
  • Troubleshooting Inter-VLAN Problems (p. 204)
  • Example of a Troubleshooting Plan (p. 205)
  • Configuration of Layer 3 EtherChannel (p. 206)
  • Routing Protocol Configuration (p. 208)
  • Verifying Routing Protocol (p. 208)
  • Implementing Dynamic Host Configuration Protocol in a Multilayer Switched Environment (p. 210)
  • DHCP Operation (p. 211)
  • Configuring DHCP and Verifying DHCP (p. 212)
  • Configure DHCP on the Multilayer Switch (p. 212)
  • Configure DHCP Relay (p. 213)
  • Verifying DHCP Operation (p. 214)
  • Deploying CEF-Based Multilayer Switching (p. 215)
  • Multilayer Switching Concepts (p. 215)
  • Explaining Layer 3 Switch Processing (p. 216)
  • CAM and TCAM Tables (p. 217)
  • Distributed Hardware Forwarding (p. 220)
  • Cisco Switching Methods (p. 221)
  • Route Caching (p. 222)
  • Topology-Based Switching (p. 223)
  • CEF Processing (p. 225)
  • CEF Operation and Use of TCAM (p. 227)
  • CEF Modes of Operation (p. 227)
  • Address Resolution Protocol Throttling (p. 228)
  • Sample CEF-Based MLS Operation (p. 230)
  • CEF-Based MLS Load Sharing (p. 231)
  • Configuring CEF and Verifying CEF Configuration (p. 232)
  • CEF-Based MLS Configuration (p. 232)
  • CEF-Based MLS Verification (p. 232)
  • Troubleshooting CEF (p. 236)
  • Summary (p. 237)
  • Review Questions (p. 237)
  • Chapter 5 Implementing High Availability and Redundancy in a Campus Network (p. 243)
  • Understanding High Availability (p. 244)
  • Components of High Availability (p. 244)
  • Redundancy (p. 245)
  • Technology (p. 246)
  • People (p. 246)
  • Processes (p. 247)
  • Tools (p. 248)
  • Resiliency for High Availability (p. 249)
  • Network-Level Resiliency (p. 249)
  • High Availability and Failover Times (p. 249)
  • Optimal Redundancy (p. 251)
  • Provide Alternate Paths (p. 252)
  • Avoid Too Much Redundancy (p. 253)
  • Avoid Single Point of Failure (p. 253)
  • Cisco NSF with SSO (p. 254)
  • Routing Protocols and NSF (p. 255)
  • Implementing High Availability (p. 255)
  • Distributed VLANs on Access Switches (p. 256)
  • Local VLANs on Access Switches (p. 256)
  • Layer 3 Access to the Distribution Interconnection (p. 257)
  • Daisy Chaining Access Layer Switches (p. 257)
  • StackWise Access Switches (p. 259)
  • Too Little Redundancy (p. 260)
  • Implementing Network Monitoring (p. 262)
  • Network Management Overview (p. 262)
  • Syslog (p. 263)
  • Syslog Message Format (p. 265)
  • Configuring Syslog (p. 267)
  • SNMP (p. 269)
  • SNMP Versions (p. 270)
  • SNMP Recommendations (p. 272)
  • Configuring SNMP (p. 272)
  • IP Service Level Agreement (p. 273)
  • IP SLA Measurements (p. 273)
  • IP SLA Operations (p. 275)
  • IP SLA Source and Responder (p. 275)
  • IP SLA Operation with Responder (p. 275)
  • IP SLA Responder Timestamps (p. 277)
  • Configuring IP SLA (p. 277)
  • Implementing Redundant Supervisor Engines in Catalyst Switches (p. 280)
  • Route Processor Redundancy (p. 281)
  • Route Processor Redundancy Plus (p. 282)
  • Configuring and Verifying RPR+ Redundancy (p. 283)
  • Stateful Switchover (SSO) (p. 284)
  • Configuring and Verifying SSO (p. 285)
  • NSF with SSO (p. 286)
  • Configuring and Verifying NSF with SSO (p. 287)
  • Understanding First Hop Redundancy Protocols (p. 288)
  • Introduction to First Hop Redundancy Protocol (p. 288)
  • Proxy ARP (p. 289)
  • Static Default Gateway (p. 290)
  • Hot Standby Router Protocol (HSRP) (p. 291)
  • HSRP States (p. 294)
  • HSRP State Transition (p. 295)
  • HSRP Active Router and Spanning Tree Topology (p. 296)
  • Configuring HSRP (p. 296)
  • HSRP Priority and Preempt (p. 297)
  • HSRP Authentication (p. 298)
  • HSRP Timer Considerations and Configuration (p. 299)
  • HSRP Versions (p. 301)
  • HSRP Interface Tracking (p. 302)
  • HSRP Object Tracking (p. 304)
  • HSRP and IP SLA Tracking (p. 305)
  • Multiple HSRP Groups (p. 306)
  • HSRP Monitoring (p. 307)
  • Virtual Router Redundancy Protocol (p. 309)
  • VRRP Operation (p. 311)
  • VRRP Transition Process (p. 312)
  • Configuring VRRP (p. 312)
  • Gateway Load Balancing Protocol (p. 315)
  • GLBP Functions (p. 316)
  • GLBP Features (p. 317)
  • GLBP Operations (p. 318)
  • GLBP Interface Tracking (p. 318)
  • GLBP Configuration (p. 322)
  • GLBP with VLAN Spanning Across Access Layer Switches (p. 322)
  • Cisco IOS Server Load Balancing (p. 323)
  • Cisco IOS SLB Modes of Operation (p. 325)
  • Configuring the Server Farm in a Data Center with Real Servers (p. 326)
  • Configuring Virtual Servers (p. 328)
  • Summary (p. 330)
  • Review Questions (p. 331)
  • Chapter 6 Securing the Campus Infrastructure (p. 333)
  • Switch Security Fundamentals (p. 334)
  • Security Infrastructure Services (p. 334)
  • Unauthorized Access by Rogue Devices (p. 336)
  • Layer 2 Attack Categories (p. 337)
  • Understanding and Protecting Against MAC Layer Attack (p. 339)
  • Suggested Mitigation for MAC Flooding Attacks (p. 341)
  • Port Security (p. 341)
  • Port Security Scenario 1 (p. 341)
  • Port Security Scenario 2 (p. 342)
  • Configuring Port Security (p. 343)
  • Caveats to Port Security Configuration Steps (p. 344)
  • Verifying Port Security (p. 345)
  • Port Security with Sticky MAC Addresses (p. 347)
  • Blocking Unicast Flooding on Desired Ports (p. 348)
  • Understanding and Protecting Against VLAN Attacks (p. 349)
  • VLAN Hopping (p. 349)
  • VLAN Hopping with Double Tagging (p. 350)
  • Mitigating VLAN Hopping (p. 351)
  • VLAN Access Control Lists (p. 352)
  • Configuring VACL (p. 353)
  • Understanding and Protecting Against Spoofing Attacks (p. 355)
  • Catalyst Integrated Security Features (p. 355)
  • DHCP Spoofing Attack (p. 356)
  • DHCP Snooping (p. 358)
  • ARP Spoofing Attack (p. 361)
  • Preventing ARP Spoofing Through Dynamic
  • ARP Inspection (p. 362)
  • IP Spoofing and IP Source Guard (p. 368)
  • Configuring IPSG (p. 370)
  • Securing Network Switches (p. 372)
  • Neighbor Discovery Protocols (p. 372)
  • Cisco Discovery Protocol (p. 373)
  • Configuring CDP (p. 373)
  • Configuring LLDP (p. 375)
  • CDP Vulnerabilities (p. 375)
  • Securing Switch Access (p. 376)
  • Telnet Vulnerabilities (p. 377)
  • Secure Shell (p. 377)
  • VTY ACLs (p. 378)
  • HTTP Secure Server (p. 379)
  • Authentication Authorization Accounting (AAA) (p. 380)
  • Security Using IEEE 802.1X Port-Based Authentication (p. 387)
  • Configuring 802.1X (p. 389)
  • Switch Security Considerations (p. 390)
  • Organizational Security Policies (p. 391)
  • Securing Switch Devices and Protocols (p. 391)
  • Configuring Strong System Passwords (p. 392)
  • Restricting Management Access Using ACLs (p. 392)
  • Securing Physical Access to the Console (p. 393)
  • Securing Access to vty Lines (p. 393)
  • Configuring System Warning Banners (p. 393)
  • Disabling Unneeded or Unused Services (p. 394)
  • Trimming and Minimizing Use of CDP/LLDP (p. 395)
  • Disabling the Integrated HTTP Daemon (p. 395)
  • Configuring Basic System Logging (p. 396)
  • Securing SNMP (p. 396)
  • Limiting Trunking Connections and Propagated VLANs (p. 396)
  • Securing the Spanning-Tree Topology (p. 396)
  • Mitigating Compromises Launched Through a Switch (p. 397)
  • Troubleshooting Performance and Connectivity (p. 398)
  • Techniques to Enhance Performance (p. 398)
  • Monitoring Performance with SPAN and VSPAN (p. 400)
  • Using SPAN to Monitor the CPU Interface of Switches (p. 403)
  • Monitoring Performance with RSPAN (p. 404)
  • Monitoring Performance with ERSPAN (p. 408)
  • Monitoring Performance Using VACLs with the Capture Option (p. 410)
  • Troubleshooting Using L2 Traceroute (p. 412)
  • Enhancing Troubleshooting and Recovery Using Cisco IOS Embedded Event Manager (p. 413)
  • Performance Monitoring Using the Network Analysis Module in the Catalyst 6500 Family of Switches (p. 414)
  • Summary (p. 415)
  • Review Questions (p. 416)
  • Chapter 7 Preparing the Campus Infrastructure for Advanced Services (p. 419)
  • Planning for Wireless, Voice, and Video Application in the Campus Network (p. 420)
  • The Purpose of Wireless Network Implementations in the Campus Network (p. 420)
  • The Purpose of Voice in the Campus Network (p. 421)
  • The Purpose of Video Deployments in the Campus Network (p. 423)
  • Planning for the Campus Network to Support Wireless Technologies (p. 423)
  • Introduction to Wireless LANs (WLAN) (p. 423)
  • Cisco WLAN Solutions as Applied to Campus Networks (p. 426)
  • Comparing and Contrasting WLANs and LANs (p. 428)
  • Standalone Versus Controller-Based Approaches to WLAN
  • Deployments in the Campus Network (p. 429)
  • Controller-Based WLAN Solution (p. 430)
  • Traffic Handling in Controller-Based Solutions (p. 433)
  • Traffic Flow in a Controller-Based Solution (p. 434)
  • Hybrid Remote Edge Access Points (HREAP) (p. 435)
  • Review of Standalone and Controller-Based WLAN Solutions (p. 436)
  • Gathering Requirements for Planning a Wireless Deployment (p. 436)
  • Planning for the Campus Network to Support Voice (p. 437)
  • Introduction to Unified Communications (p. 438)
  • Campus Network Design Requirements for Deploying VoIP (p. 439)
  • Planning for the Campus Network to Support Video (p. 440)
  • Voice and Video Traffic (p. 441)
  • Video Traffic Flow in the Campus Network (p. 442)
  • Design Requirements for Voice, Data, and Video in the Campus Network (p. 444)
  • Understanding QoS (p. 444)
  • QoS Service Models (p. 446)
  • AutoQoS (p. 447)
  • Traffic Classification and Marking (p. 448)
  • DSCP, ToS, and CoS (p. 448)
  • Classification (p. 449)
  • Trust Boundaries and Configurations (p. 450)
  • Marking (p. 451)
  • Traffic Shaping and Policing (p. 451)
  • Policing (p. 452)
  • Congestion Management (p. 453)
  • FIFO Queuing (p. 453)
  • Weighted Round Robin Queuing (p. 453)
  • Priority Queuing (p. 455)
  • Custom Queuing (p. 455)
  • Congestion Avoidance (p. 455)
  • Tail Drop (p. 456)
  • Weighted Random Early Detection (p. 456)
  • Implementing IP Multicast in the Campus Network (p. 458)
  • Introduction to IP Multicast (p. 459)
  • Multicast IP Address Structure (p. 462)
  • Reserved Link Local Addresses (p. 463)
  • Globally Scoped Addresses (p. 463)
  • Source-Specific Multicast Addresses (p. 463)
  • GLOP Addresses (p. 464)
  • Limited-Scope Addresses (p. 464)
  • Multicast MAC Address Structure (p. 464)
  • Reverse Path Forwarding (p. 465)
  • Multicast Forwarding Tree (p. 466)
  • Source Trees (p. 467)
  • Shared Trees (p. 468)
  • Comparing Source Trees and Shared Trees (p. 469)
  • IP Multicast Protocols (p. 470)
  • PIM (p. 470)
  • Automating Distribution of RP (p. 474)
  • Auto-RP (p. 474)
  • Bootstrap Router (p. 475)
  • Comparison and Compatibility of PIM Version 1 and Version 2 (p. 476)
  • Configuring Internet Group Management Protocol (p. 478)
  • IGMPv1 (p. 478)
  • IGMPv2 (p. 478)
  • IGMPv3 (p. 479)
  • IGMPv3 Lite (p. 479)
  • IGMP Snooping (p. 480)
  • Preparing the Campus Infrastructure to Support Wireless (p. 484)
  • Wireless LAN Parameters (p. 484)
  • Configuring Switches to Support WLANs (p. 484)
  • Preparing the Campus Network for Integration of a Standalone WLAN Solution (p. 484)
  • Preparing the Campus Network for Integration of a Controller-Based WLAN Solution (p. 485)
  • Preparing the Campus Infrastructure to Support Voice (p. 487)
  • IP Telephony Components (p. 487)
  • Configuring Switches to Support VoIP (p. 488)
  • Voice VLANs (p. 488)
  • QoS for Voice Traffic from IP Phones (p. 490)
  • Power over Ethernet (p. 491)
  • Additional Network Requirements for VoIP (p. 493)
  • Preparing the Campus Infrastructure to Support Video (p. 494)
  • Video Components (p. 494)
  • Configuring Switches to Support Video (p. 495)
  • Summary (p. 496)
  • Review Questions (p. 497)
  • Appendix A (p. 503)
  • 9781587058844 TOC 5/20/2010

Author notes provided by Syndetics

Richard E. Froom , CCIE No. 5102, attended Clemson University where he majored in computer engineering. While attending Clemson, Richard held positions at different times for the university network team, IBM, and Scientific Research Corporation. After graduation, Richard joined Cisco. Richard's first role within Cisco was as a TAC engineer supporting Cisco Catalyst switches. After several years in the TAC, Richard moved into a testing role supporting Cisco MDS and SAN technologies. In 2009, Richard moved into the Enhanced Customer Aligned Testing Services (ECATS) organization within Cisco as a test manager of a team focused on testing customer deployments of UCS and Nexus.

Balaji Sivasubramanian is a product line manager in the Cloud Services and Switching Technology Group focusing on upcoming products in the cloud services and Data Center virtualization area. Before this role, Balaji was a senior product manager for the Catalyst 6500 switches product line, where he successfully launched the Virtual Switching System (VSS) technology worldwide. He started his Cisco career in Cisco Technical Assistant Center working in the LAN switching products and technologies. Balaji has been a speaker at various industry events such as Cisco Live and VMworld. Balaji has a Master of Science degree in computer engineering from the University of Arizona and a Bachelor of Engineering degree in electrical and electronics from the College of Engineering, Guindy, Anna University (India).

Erum Frahim , CCIE No. 7549, is a technical leader working for Enhanced Customer Aligned Testing Services (ECATS) at Cisco. In her current role, Erum is leading efforts to test Datacenter solutions for several Cisco high-profile customers. Prior to this, Erum managed the Nexus platform escalation group and served as a team lead for Datacenter SAN Test lab under the Cisco Datacenter Business Unit. Erum joined Cisco in 2000 as a technical support engineer. Erum has a Master of Science degree in electrical engineering from Illinois Institute of Technology and also holds a Bachelor of Engineering degree from NED University, Karachi Pakistan. Erum also authors articles in Certification Magazine and Cisco.com.

Powered by Koha