Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] backbone (IS-IS) BackboneFast bandwidth domains of signaling traffic requirements for voice traffic base 10 numbers base 2 numbers BE PHB (best effort per-hop behavior) bearer traffic best practices for network management for network security network managment security policies, implementing best-effort service 2nd BGP (Border Gateway Protocol) neighbors BHT (busy-hour traffic) calculating BIAs (burned-in addresses) 2nd binary numbers converting to decimal decimal-to-binary conversion chart IP addresses, ANDing black-box hackers Blaster worm block-oriented access blocking state Bluetooth botnets bottom-up approach to network design BPDUs (bridge protocol data units) configuration BPDUs bridges 2nd comparing to switches broadcast domains broadcast storm built-in Catalyst security business case for CN for data and voice network convergence for QoS |