Multicast MAC Addressing

At Layer 2, systems recognize multicast traffic because each multicast IP address is mapped to a 48-bit MAC address. The first 24 bits of that MAC address (the organizationally unique identifier or OUI) always begin with 0100.5e and the 25th bit is always 0. The lower 23 bits of the multicast MAC ad...

Potential Problems With Redistribution

Redistribution is not optimal. The simpler and more straightforward the design, the better managed and more stable the network, which means fewer errors and faster convergence. A hierarchical IP addressing scheme designed to allow continued network growth, combined with a single IP routing protocol ...

IPsec Remote Access and L2L Sessions on the Same Router

Figure 18-3 shows an example network that has both remote access and L2L sessions. In this example, the remote office network is acquiring its address dynamically, via DHCP, from its connected ISP, which also is true of the remote access clients. Because the central office router doesn't know the re...

Using the Small Servers

The finger command is a simple utility that allows you to do the equivalent of a show users command on a remote router. Unix computers generally have a standard finger program that you can run as follows: Freebsd% finger @Router1 [Router1]     Line     &n...

Frame Relay Forum Implementation Agreement Document Number FRF.5

The functional specifications of network interworking between Frame Relay and ATM are defined in the Frame Relay Forum Implementation Agreement Document Number FRF.5. FRF.5 describes the implementation agreement on PVC network interworking between Frame Relay and ATM protocols, jointly agreed upon b...

Contact Us

86-136-2222-6316
CALL ME NOW

© 2011 CathaySchool, an ANDA Technology Group company, All Rights Reserved Privacy Policy | Refund Policy | Disclaimer | Sitemap | Resources Tags