Posts

Showing posts from October, 2019

ccie lab website Summary of routing loop knowledge point

Image
Human creativity is as powerful as destructive power." Network interoperability has also spawned complicated routing protocols and various Internet services. As well as the huge field of "network security." That's why all of today's network traffic that 80 % of the resources are wasted and only 20% is used for efficient data transmission. The anti-ring mechanism is generated under such a large background. Loops appear at all levels of the Internet and the causes and solutions of different loops are different. Usually the network loop is divided into a second layer loop and the three-layer loop. The formation of all loops is caused by the confusion of the destination path. The second layer loop is mainly a vicious circle of the switch broadcast stream. The three-layer loop is much more complicated and usually caused by various network failures. It is also focus on this paper. This article divides the three-layer loop into three : Single link l

ccie 400-101 dump On the status of IPv6 in the financial industry

Image
  The meaning of IPv6  Beginning in the 1990s, the IETF noticed that the mainstream version of Internet addresses IPv4 was running out. In order to avoid the disruptive impact on the Internet, research on next-generation Internet protocols began to replace IPv4.  Since 1996, Cisco Academician Steve E Deering and former Nokia Fellow Robert M Hinden have proposed a series of IPv6-defined documents such as RFC1883-1887. In December 1998, the RFC2460-IPv6 standard was proposed which defines the IPv6 packet format and header.  Standards such as format have become the basic standard of IPv6.  In addition to solving the problem of IPv4 address exhaustion, IPv6 also uses multicast to replace broadcast in IPv4 (perhaps Deering and Hinden are the inventors of IP multicast) and uses header expandable bytes to achieve diversity.  Additional features, such as segmentation routing.  IPv4 and IPv6 are generated at different times. In the IPv4 domain, global addresses and DNS root servers are

ccie lab v5 dumps, What are the factors that affect the core switch?

Image
The main parameters of the core switch selection is scalability, forwarding rate, backplane bandwidth, four-layer switching, system redundancy and other parameters.  The core switches should all adopt a modular structure that must have a considerable number of slots, have strong network expansion capabilities, and can select modules of different numbers, different rates and different interface types according to actual or future needs. To adapt to ever-changing network requirements.     What are the factors that affect the core switch?   1, backplane bandwidth  The backplane bandwidth also known as the switching capacity. It is the maximum amount of data that can be handled between the switch interface processor or the interface card and the data bus. That just like the sum of the lanes owned by the overpass.  Since communication between all ports needs to be completed through the backplane, the bandwidth that the backplane can provide becomes a bottleneck for concurre

ccie written rs Customize what you think, ubiquitous Cisco collaboration

Image
Now more and more employees are already on the move: 1.Up to 90% of employees work outside the company's headquarters; 2.Up to 60% of employees need to collaborate regularly with people from different regions and even different time zones; 3.The growth rate of online video traffic of large enterprises is as high as 70% per year; Customers prefer to use online mode compared to traditional methods. Market demand is generating new collaboration needs. Communication between people is becoming the core of modern corporate workflows. If a worker wants to do something good, he must first sharpen his tools. Cisco's collaborative product portfolio is the core of collaborative communications that rather than applications or devices by providing a rich context and an interactive environment. Leveraging industry-leading collaboration platforms. Cisco is making it easier to connect with people between businesses and businesses. Also, with expertise through an innovative

cisco ccie r&s lab Behind the scenes team of Cisco security products

Image
It is the mysterious team behind Cisco's many security products. It blocks threats 20 billion times a day blocking 80 million malicious DNS queries receiving 16 billion website requests It deals with ransomware to prevent cryptocurrency mining and to exploit malicious attacks such as phishing. Facing security threats, almost omnipotent It is our protagonist today - Cisco Talos Meet Cisco Talos Talos is a core threat intelligence organization that serves as the Cisco security portfolio. Talos' name comes from the mechanical giant in Greek mythology, and its sole mission is to protect the coast of Crete from invaders and pirates. Like the mechanical giant, Cisco Talos is committed to providing superior protection to its customers through products and services. Cisco Talos covers six key areas: threat intelligence and interception, inspection research, engine development, vulnerability research and discovery, community, and global outreach. √ The Thr