Campus Network Design Fundamentals

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

backbone (IS-IS)

BackboneFast

bandwidth

     domains

     of signaling traffic

     requirements for voice traffic

base 10 numbers

base 2 numbers

BE PHB (best effort per-hop behavior)

bearer traffic

best practices

     for network management

     for network security

         network managment

         security policies, implementing

best-effort service 2nd

BGP (Border Gateway Protocol) neighbors

BHT (busy-hour traffic)

     calculating

BIAs (burned-in addresses) 2nd

binary numbers

     converting to decimal

     decimal-to-binary conversion chart

     IP addresses, ANDing

black-box hackers

Blaster worm

block-oriented access

blocking state

Bluetooth

botnets

bottom-up approach to network design

BPDUs (bridge protocol data units)

     configuration BPDUs

bridges 2nd

     comparing to switches

broadcast domains

broadcast storm

built-in Catalyst security

business case

     for CN

     for data and voice network convergence

     for QoS

Категории