SPECIAL OFFERS
Keep up with new releases and promotions. Sign up to hear from us.
Register your product to gain access to bonus material or receive a coupon.
This eBook includes the following formats, accessible from your Account page after purchase:
EPUB
The open industry format known for its reflowable content and usability on supported mobile devices.
PDF
The popular standard, used most often with the free Adobe® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
This eBook includes the following formats, accessible from your Account page after purchase:
EPUB
The open industry format known for its reflowable content and usability on supported mobile devices.
PDF
The popular standard, used most often with the free Adobe® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
Design, operate, and troubleshoot advanced Cisco IP multicast in enterprise, data center, and service provider networks
IP Multicast, Volume II thoroughly covers advanced IP multicast designs and protocols specific to Cisco routers and switches. It offers a pragmatic discussion of common features, deployment models, and field practices for advanced Cisco IP multicast networks, culminating with commands and methodologies for implementation and advanced troubleshooting.
After fully discussing inter-domain routing and Internet multicast, the authors thoroughly explain multicast scalability, transport diversification, and multicast MPLS VPNs. They share in-depth insights into multicast for the data center, a full chapter of best-practice design solutions, and a start-to-finish troubleshooting methodology designed for complex environments.
Reflecting the authors’ extensive experience with service provider and enterprise networks, IP Multicast, Volume II will be indispensable to IP multicast engineers, architects, operations technicians, consultants, security professionals, and collaboration specialists. Network managers and administrators will find its case studies and feature explanations especially valuable.