TCAM Operation

The TCAM in a switch is more or less self-sufficient. Access lists are compiled or merged automatically into the TCAM, so there is nothing to configure. The only concept you need to be aware of is how the TCAM resources are being used.  TCAMs have a limited number of usable mask, value patter...

From ARPANET to NSFNET

By 1985, the ARPANET was heavily utilized and burdened with congestion. In response, the National Science Foundation initiated phase 1 development of the NSFNET. The NSFNET was composed of multiple regional networks and peer networks (such as the NASA Science Network) connected to a major backbone t...

Data Transfer

The exchange of data in an 802.11 network is bidirectional between the radio card and access point. As mentioned earlier, data frames in an infrastructure wireless LAN do not travel directly between wireless users. Instead, the access point relays the data. A radio card or access point (802.11 st...

The IS-IS metric Command

IS-IS is limited because its metric has only six bits. This means that the value of an individual metric can range only from 0 to 63. The total length of a path between two ISs can be 1023 maximum. You should consider the metric in advance. The default value is assigned to be 10, independent of the ...

Reverse-Tunnel Forwarding

You configure Reverse-Tunnel Forwarding on the Mobile Node so that it requests this feature when it registers with the Foreign Node: RouterMobile#configure terminal Enter configuration commands, one per line.  End with CNTL/Z. RouterMobile(config)#ip mobile router RouterMobile(mobile-...

Contact Us

86-136-2222-6316
CALL ME NOW

© 2011 CathaySchool, an ANDA Technology Group company, All Rights Reserved Privacy Policy | Refund Policy | Disclaimer | Sitemap | Resources Tags