Need to know
Threats in Borderless Networks
After completing this topic, you should be able to categorize threats to borderless networks.
Dynamic Routing Protocols Overview
More information about routing table. After completing this topic, you should be able to describe dynamic routing protocols.
Catalyst Switch Configuration Overview
After completing this topic, you should be able to describe switch configuration tasks in a VoIP deployment.
Call Admission Control (CAC)
Identify how to manage the available bandwidth between the remote branches in order to guarantee the best call quality.
Starting a Router
The Cisco router startup sequence is similar to that of a Catalyst switch. You can use the setup utility to provide an initial configuration and then go into privileged mode and start configuring it.
Developing an Optimum Design for Layer 2
Typical causes of network congestion. Presenting the bridge and the switch as alternative options to alleviate those issues.