At 3:17 PM -0500 9/10/03, MADMAN wrote:
>Howard C. Berkowitz wrote:
>
>>At 5:00 PM + 9/10/03, Priscilla Oppenheimer wrote:
>>
>>>Tim Champion wrote:
>>>
>>>>All the info relating to this book is good and I'm going to buy
>>>>on
At 5:00 PM + 9/10/03, Priscilla Oppenheimer wrote:
>Tim Champion wrote:
>>
>> All the info relating to this book is good and I'm going to buy
>> on the back
>> of these reviews but... what makes people write switching
>> related poems?
>
>Because if we don't laugh at ourselves then we h
At 5:32 PM + 9/10/03, Priscilla Oppenheimer wrote:
>Reimer, Fred wrote:
>>
>> I've always liked hex myself. A hex mask of FF.FF.F8.00 can be
>> written as
>> F800 and still mean the same thing. You obviously can't do
>> that with
>> 255.255.128.0 (255.255.128.0 != 2,552,551,280). Wh
At 11:34 AM -0400 9/10/03, Reimer, Fred wrote:
>Yes, but the CCIE labs are supposed to be for ISP level engineers, who
>almost certainly won't be using default routes most of the time. It should
>be assumed that by the time you get to the CCIE level you have much
>experience in default routing.
>
At 11:40 AM -0400 9/10/03, Reimer, Fred wrote:
>I've always liked hex myself. A hex mask of FF.FF.F8.00 can be written as
>F800 and still mean the same thing. You obviously can't do that with
>255.255.128.0 (255.255.128.0 != 2,552,551,280). While binary works the same
>way as hex in this man
At 12:18 AM + 9/10/03, exchange wrote:
>Hi All,
>
>I have a production site that has a Class C ip address scheme with /28 block
>giving us 16 ip addresses. However, we need additional public ip addresses
>and our ISP is unable to provide us with another contiguous block of 32 ip
>addresses usi
At 10:08 PM + 9/8/03, Priscilla Oppenheimer wrote:
>Maybe a dumb question, but I know you guys can help me. :-)
>
>How would I know if a router is using excessive CPU on IP access lists?
>
>What am I looking for when I do a show processes cpu?
>
>Thanks,
>
>Priscilla
>
This isn't a complete an
>Oh, and while I'm on the subject - why EIGRP? This is a proprietary
>Cisco Protocol. OK, I believe that Juniper may have implemented it, but
>to the best of my knowledge no one else has.
Can we say account control?
EIGRP is somewhat less resource intensive than link state protocols
under some c
At 11:32 PM + 9/9/03, Priscilla Oppenheimer wrote:
>Dom wrote:
>>
>> And one last point, No LAN is an island, why two IG(P)
>> protocols and no
>> EG(P) protocol?
>>
>> A NA should at least a some understanding of how to connect to
>> the
>> outside world - when to use BGP and when not to
At 10:36 PM + 9/9/03, Dom wrote:
>Fred, check out the archives for Howard's piece on the difference
>between 'Rocket Science' and 'BGP' when at NASA.
>
>Best regards,
>
>Dom Stocqueler
>SysDom Technologies
>Visit our website - www.sysdom.org
Seriously, I've fought a battle for many years with
At 2:23 PM -0400 8/26/03, Reimer, Fred wrote:
>
>I'm almost positive that the exact same material is in all four other
>courses, and I hope that this is within the bounds of fair use, but page 2-4
>says:
>
>
>There are four primary threats to network security:
>
>* Unstructured threats
>
>* Str
At 2:23 PM -0400 8/26/03, Reimer, Fred wrote:
>
>I'm almost positive that the exact same material is in all four other
>courses, and I hope that this is within the bounds of fair use, but page 2-4
>says:
>
>
>There are four primary threats to network security:
>
>* Unstructured threats
>
>* Str
At 12:04 PM -0400 8/26/03, Reimer, Fred wrote:
>Please pass this on to Annlee.
She can read, but is having trouble posting.
>
>I've already sent another message with an excerpt (fair use!) from the new
>Cisco training materials that refutes this.
>
>The "threats" are:
>
>Structured
>Unstructured
At 3:03 AM + 8/26/03, Charlie Wehner wrote:
>This is an excellent example of why I hated taking the SAFE exam. I found
>myself for several questions thinking... "Well, I depends on what you mean
>by this term."
>
>I agree with Fred though. I believe the answers they are looking for are
>Unst
At 7:10 PM + 8/25/03, Reimer, Fred wrote:
>A structured threat is a threat from someone who has experience and
>knowledge as far as breaking into networks. An unstructured threat is a
>threat by a script kiddie. I guess they use structured because a
>knowledgeable black-hat would have a compr
At 6:36 PM + 8/25/03, Robert Edmonds wrote:
>To add to Chuck's comment: If you're familiar with Cisco, your sanity is
>also the difference. The way Nortel configures their routers is
>dramatically different and can leave you very frustrated if you're not used
>to them. Do they still use Site
At 12:28 AM + 8/25/03, Marko Milivojevic wrote:
> > Yet when I go through the SAFE documentation, I find:
>> 7 Axioms of types of targets (p. 5 of PDF)
>> 3 Types of Expected Threats (p. 10)
>> 3 separate validation services for remote user access (p. 30)
>> 12 elements
At 1:45 AM + 8/25/03, Charlie Wehner wrote:
>Not sure if this what there looking for but in my MCNS book they have the
>following threat types:
>
>Security Threat Types:
>-Reconnaissance
>-Unauthorized access
>-Denial of Service
>-Data Manipulation
I suspect that's the list -- that the people
ng whether the Ministry of Silly Walks runs EIGRP.
>
>-Original Message-
>From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
>Howard C. Berkowitz
>Sent: 24 August 2003 22:45
>To: [EMAIL PROTECTED]
>Subject: SAFE and the Holy Hand Grenade of Antioch [7:7430
Monty Python is always my inspiration in understanding network
architecture. The number for the Holy Hand Grenade of Antioch is not
two and not four, but three.
And so the SAFE Test Blueprint asks you to:
"Identify four kinds of types of security threats"
"Discuss in detail the four diffe
These days, when anyone talks about data center design, you can't go
terribly far without stating your availability and security policy.
These will be basic drivers. Indeed, for a sufficiently high level
of availability, you have to have more than one data center (or
backup at a colocation fac
At 4:57 PM + 8/11/03, Truman, Michelle, RTSLS wrote:
>Advantis is actually now called AGNS for AT&T Global Network (Was the
>IBM Global Network after it was Advantis).
I still cherish memories of teaching a class to Advantis when it was
still an IBM-Sears joint venture. It was a private ICRC,
I freely admit that I've lost the sense of the problem that actually
needs to be solved, with all the discussion of the various tables.
Before my brain started to reboot, however, it sounded like it was a
traffic engineering problem. Has anyone looked at the OSPF Traffic
Engineering extensions
At 6:49 PM + 8/12/03, Zsombor Papp wrote:
>So you want to solve a traffic engineering problem with MPLS/TE, huh? How
>boring... :)
Hey, if you can't take a joke in this business...
>
>Howard C. Berkowitz wrote:
>>
>> I freely admit that I've lost the sens
>Howard C. Berkowitz wrote:
>>
>> Significant interest in Asia.
>> Selected industries: HDTV, 3G wireless, new generation air
>> traffic control
>
>HDTV? Do you have any thoughts or pointers as to why HDTV
>would be looking at v6?
When I was at Nortel,
At 8:08 PM + 8/6/03, Marko Milivojevic wrote:
> > > I wonder what the logic for that is.
>>
>> I wonder, too. :)
>
> The reason could be as simple as the possibility to reuse the code (or
>function-call). For that brief moment when there is BDR, but no DR, exactly
>the same code base can
>Howard C. Berkowitz wrote:
>>
>> Significant interest in Asia.
>> Selected industries: HDTV, 3G wireless, new generation air
>> traffic control
>
>HDTV? Do you have any thoughts or pointers as to why HDTV
>would be looking at v6?
When I was at Nortel,
>Howard C. Berkowitz wrote:
>>
>> Significant interest in Asia.
>> Selected industries: HDTV, 3G wireless, new generation air
>> traffic control
>
>HDTV? Do you have any thoughts or pointers as to why HDTV
>would be looking at v6?
When I was at Nortel,
te packets, and it calculates that it can't send anymore.
Exactly. A conformant implementation cannot send more than this amount.
>Now it HAS to
>wait for host B to ACK some of the data, so that it can send more. If it
>only needed to send 2,000 bytes of data to the other app
At 3:33 PM + 8/7/03, John Neiberger wrote:
>And I don't mean the Starship Enterprise. :-) I'm pretty sure they do use
>IPng, though.
I was at the Toronto IETF meeting when the final IPng decision was
made. Scott Bradner had been going on and on about how V4 had served
us well, but it was t
At 2:17 PM + 8/5/03, Janik James wrote:
>Here are some tcp questions:
>
>1.Can the sender send more than the window size?
No.
>2.Can receiver send ack before whole window comes in?
Not for the window it's receiving, but for a previous window.
Message Posted at:
http://www.groupstudy.com/
At 6:40 PM + 8/3/03, " Chuck Whose Road is Ever Shorter " wrote:
>""Shab Hanon"" wrote in message
>news:[EMAIL PROTECTED]
>> If you look at excluded topics you will find "ISO CLNS"
>>
>> and you can make search for this key word ... ISIS ... will be the out
>> put.
>>
>> Please get it
At 6:24 AM + 8/3/03, Zsombor Papp wrote:
>Howard C. Berkowitz wrote:
>> When you consider interface buffers are allocated to each
>> subinterface
>
>Which command displays information about the buffers allocated to the
>subinterfaces?
Zsombor, interesting observati
At 1:40 AM + 8/3/03, " Chuck Whose Road is Ever Shorter " wrote:
>""Howard C. Berkowitz"" wrote in message
>news:[EMAIL PROTECTED]
>> At 3:35 PM + 8/2/03, Charles Cthulhu Riley wrote:
>> >Less IP addresses used?
>>
>> Ty
At 3:35 PM + 8/2/03, Charles Cthulhu Riley wrote:
>Less IP addresses used?
Typically, the advantage of P2P is that you can impose individual
policies on each spoke. A basic such example would be bandwidth
matching the CIR if all CIR's are not the same. Spoke-specific
access lists would be
At 2:38 PM + 8/2/03, annlee wrote:
> > which when combined with a couple of bucks gets me a latte.
>
>But not a double latte. {g}
Has anyone else noticed that the increasing number of permutations at
a trendy coffee bar is making the specification of your drink
increasingly like configuring
At 9:04 PM + 8/1/03, annlee wrote:
>Actually, Apple used that block as well for local networking.
>
>quote:
>If the host has a Microsoft Windows OS (9x or 2000/XP) or an
>Apple OS, it will fall back to what is called the "auto-configure
>address", which is an address from the 169.254/16 address
At 7:00 PM + 8/1/03, John Neiberger wrote:
>[This isn't the usual type of follies question where you have to figure
>something out. In this case, you either know the answer or you don't. If you
>don't, you can probably figure out how to look it up and it would be good
>information to have in ca
One thing that gets missed in the L2VPN versus L3VPN issue, with
provider-provisioned LANs, is the people aspect both for the provider
and customer.
If you provision a L2VPN, it's a familiar interface to the customer.
It's also much more familiar to telco/TDM technicians. I've seen
market esti
At 8:17 PM + 7/29/03, Priscilla Oppenheimer wrote:
>Fathalla Ahmed wrote:
>>
>> Hi,
>>
>> Any body knows if IPX and AppleTalk are included in the new
>> CCDA exam?
>
>Although I haven't taken the test, I do have a copy of the course, and
>there's no IPX or AppleTalk.
>
>Good luck with it.
>
At 9:54 PM + 7/29/03, " Chuck Whose Road is Ever Shorter " wrote:
>
> >
>> BTW, I think it was dre who suggested I read the RFCs, which I've started
>to
>> do, and suggested I check out the www.lightreading.com website. That site
>is
>> great! I did do a search on Kompella vs. Kompella. I f
> >By the way, FORTEZZA is used for more that "sensitive but unclassified"
>>traffic. That's just one application. What you're probably looking for
>is
>>a product that falls in the "NSA Type 2" category. We can discuss more
>>offline if you want to...
>
>Out of curiosity, what is currently use
> >By the way, FORTEZZA is used for more that "sensitive but unclassified"
>>traffic. That's just one application. What you're probably looking for
>is
>>a product that falls in the "NSA Type 2" category. We can discuss more
>>offline if you want to...
>
>Out of curiosity, what is currently use
Does anyone know if there's a FORTEZZA encryption product available,
presumably third-party, for Cisco routers? It's a NSA-approved
chipset, usually on PC card, for government "sensitive but
unclassified" traffic. CCO search doesn't give any hits.
Message Posted at:
http://www.groupstudy.c
At 5:55 AM + 7/27/03, Nakul Malik wrote:
>Thanks Anlee.
>I used to work for GTL a while back and they told us that passport was at
>heart running on FR. When i say passport, i refer to 6480/7480 etc., not
>8600, which most people, including me still refer to as Accelar.
>I agree with u on the b
At 2:22 PM + 7/26/03, Nakul Malik wrote:
>passport at heart an ATM switch/
>
>Passport is FR.
>
>-Nakul
The Passport is internally a cell switch, onto which Nortel has
overlaid a great many other features. Before I went to work for
Nortel, I consulted on the BGP implementation, an
At 2:34 PM + 7/25/03, p b wrote:
>Here's some text from CCO regarding CEF and using source
>and destination IPs to map a packet to one of a set of
>load sharing links:
>
>Configuring Per-Destination Load Balancing
>
>Per-destination load balancing is enabled by default when you enable CEF. To
>
At 4:01 PM + 7/24/03, Tim Champion wrote:
>Could someone please confirm the following to be true (taken from CCO):
>
>"Per-destination load balancing allows the router to distribute packets
>based on the destination address, and uses multiple paths to achieve load
>sharing. Packets for a given
At 9:32 AM -0700 7/24/03, Wilmes, Rusty wrote:
>Im in the process of building out a new datacenter. I was wondering if
>anyone had any pointers to electircal and fire codes in California on fire
>suppression requirements in a datacenter.
>
>I've done some googling and havent found much.
>
>ONe o
This is an area where your local building inspectors and your
insurers aren't going to let you be creative. While local codes can
override, in general, you are going to have to comply with the rules
of the National Electrical Code and the National Fire Protection
Association. In turn, they gene
At 10:06 PM + 7/22/03, annlee wrote:
>You're feeling better now, eh? Or is it the medications?
>
>Howard C. Berkowitz wrote:
>> Don't forget relevant folk:
>>
>> Pete Seeger: "This LAN is Your LAN"
>> Kingston Trio: "MTA&
Don't forget relevant folk:
Pete Seeger: "This LAN is Your LAN"
Kingston Trio: "MTA" (triple duty for email, token management, and
looping)
Peter Paul & Mary: "If I had a token, I'd ring it in the morning"
And surely there must be a version of "Alice's Restaurant" sung by Cisco
Sales.
At 7:06 PM + 7/21/03, alaerte Vidali wrote:
>Thanks,
>
>The challenge I am facing is to improve the OSPF design of a network that is
>in production, without changing the existing WAN links. The area 5 is bigger
>than I think it would be ideal (there are 56 routers) and there is no
>interesting
At 5:29 PM + 7/20/03, Zsombor Papp wrote:
>I think comparing shared wireless to dedicated wired connections is a bit of
>an apple vs orange contest.
AppleTalk, I thought, is off the exam...
>You can get shared wireless where you can't get
>anything else (e.g. walking from one meeting room to
ming back--because I keep finding
>him the most economical solution for the problems I've identified
>which he is choosing to solve this month vs. deferring. Every bit
>of business not deferred further comes back to me.
>
>But that's a long-term view again, and many businesses do
At 3:25 AM + 7/20/03, " Chuck Whose Road is Ever Shorter " wrote:
>""Howard C. Berkowitz"" wrote in message
>news:[EMAIL PROTECTED]
>
>> What's the medium cost between the two cities? Can you use demand
>> circuits as a backup? C
I can't get to the server where I have a tested configuration for an
approach to partitioned nonzero repair, but let me describe one hack
I've done. It's either very elegant or very ugly. It is the mirror
image of restoring the backbone using a virtual link through a
nonzero area.
1. Assume A
At 1:10 AM + 7/20/03, " Chuck Whose Road is Ever Shorter " wrote:
>""Reimer, Fred"" wrote in message
>news:[EMAIL PROTECTED]
>> Of course you can have more than one ABR for an area, but there is no
>single
>> "area 5" in the diagram below. There are two separate areas, that happen
>to
>> u
At 5:17 PM + 7/19/03, Rajesh Kumar wrote:
>Hello all,
>
>If a router has its interfaces in Area 1 and Area 2 and no Area 0, is it
>
>still considered to be an ABR OR strictly, one of the interfaces has to
>
>be in Area 0 to be an ABR?
In the present implementation, at least one interface must
At 11:50 PM + 7/18/03, Priscilla Oppenheimer wrote:
>alaerte Vidali wrote:
>>
>> Thanks.
>>
>> The addresses are contiguous.
>>
>> Suppose a network with many ABRs, one in each city. Any big
>> city represents small cities. Could you use an area for each
>> ABR? (I am wondering if there is
At 9:05 PM + 7/19/03, bergenpeak wrote:
>RFC2328 defines this router to be an ABR. However, there are some
>issues with this approach. RFC 3509 defines an alternative behavior
>for ABRs. In summary, when the router connects to multiple areas
>but not to area 0, the router should not operate
At 9:47 PM + 7/18/03, alaerte Vidali wrote:
>Thanks.
>
>The addresses are contiguous.
>
>Suppose a network with many ABRs, one in each city. Any big city represents
>small cities. Could you use an area for each ABR? (I am wondering if there
>is no limit in the number of areas. I bet not).
In m
I do have this horrible mental image of Blind Justice standing there
with a packet stream going into each pan of the balance. Of course,
one needs to decide on the weight of a packet...
Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=72635&t=72635
At 6:27 PM + 7/18/03, alaerte Vidali wrote:
>Can you see any mistake in the following network?
>
>
>Rx ---area 5--R2area 0---R3-
>||
> area 0 |
>
At 8:18 PM + 7/18/03, Priscilla Oppenheimer wrote:
>I think this would work, but why would you want to do it? Why not make those
>two parts of Area 5 different areas? Simply from a documenation and human
>communication point of view, you don't want the design to be confusing. When
>someone refe
At 12:05 AM + 7/17/03, annlee wrote:
>I did, though it turned out to be only for Outlook Express. However, I
>configured Outlook per their mail account settings--but, like you, I find
>their customer service to be an oxymoron.
>
>Annlee
I've done enough escalation and schmoozing in Comcast cu
At 2:25 AM + 7/14/03, Jason Viera wrote:
>What bothers me is that Cisco's implementation of a protocol doesn't always
>match the RFC.
Part of the problem is the RFC sometimes doesn't match ANYONE's
implementation. That's not to say that there weren't interoperable
implementations at the tim
At 8:02 PM + 7/13/03, annlee wrote:
>N+1 means one more than that required. Suppose you have a large switch which
>can operate half the blade capacity with one power supply and it requires 2
>power supplies to operate fully populated. Then, when it is half-populated,
>dual power supplies provid
At 3:44 PM + 7/13/03, Hemingway wrote:
>""Jason Viera"" wrote in message
>news:[EMAIL PROTECTED]
>> The individuals writing the book probably aren't privy to any exam
content
>> changes that are around the corner unless they are a part of the CCIE
>team,
>> another misconception is that Cis
bits routed to the null interface? Is there a true
astronomical black hole into which they are dumped? Alternatively,
might there be a bit dump somewhere in Northern New Jersey, which
someday may explode?
>
>At 03:13 AM 7/10/2003 +, Howard C. Berkowitz wrote:
>>At 5:40 PM -0700
At 5:40 PM -0700 7/9/03, Zsombor Papp wrote:
>At 11:07 PM 7/9/2003 +0000, Howard C. Berkowitz wrote:
>>At 12:43 PM + 7/9/03, Zsombor Papp wrote:
>>>The original question (as I understood) was about a single LSA that is
>>>larger than 1500 bytes (think Type
if you set the IP MTU on an Ethernet interface to 500 bytes,
>and you have a large enough OSPF database, then you should see a lot of
>fragmented OSPF packets, regardless of how big the individual LSAs are.
>
>I didn't write the code though, so take all this with a grain of salt. :)
At 2:42 AM + 7/9/03, Priscilla Oppenheimer wrote:
>Howard C. Berkowitz wrote:
>>
>> At 10:46 PM + 7/8/03, Zsombor Papp wrote:
>> >The LSA will be fragmented at the IP layer.
>>
>> Do you know for certain this is what Cisco's implementation
>&g
At 10:46 PM + 7/8/03, Zsombor Papp wrote:
>The LSA will be fragmented at the IP layer.
Do you know for certain this is what Cisco's implementation does?
The OSPF code is aware of the MTU and can build OSPF packets for it.
I don't think you're really going to simplify it by relieving it of
t
At 9:38 PM + 7/8/03, Priscilla Oppenheimer wrote:
>hebn wrote:
>>
>> hello,everyone:
>
>> OSPF use raw socket (datagram) to communicate with peers. In
> > general, layer 2 frame has a MTU of 1500 bytes.
I'm not sure I'd call it a strict datagram protocol. In some cases,
it's acknowl
At 9:27 PM + 7/7/03, Priscilla Oppenheimer wrote:
>Puckette, Larry (TIFPC) wrote:
>>
>> Just to conclude an issue that I queried the group on a couple
>> weeks ago...
>> We had 2 new 3725 routers with internal DS3 DSUs that would
>> crash when
>> downloading large files from the web. These
Need I have Lxwana talk to both of you?
At 11:57 PM + 7/2/03, Tom Lisa wrote:
>Puny Marvin,
>
>It is appropriate that you ended you last sentence
>with "I'm afraid." You should be afraid, very
>afraid!!! I have the new and improved, ultra
>special, galaxy class disrupter. I say pshaw to
I wanted to post this in response to several of the threads about
"how many peers can I have", "how much resources does BGP consume,"
etc. It's not that this gives the answers, but it does have 42 pages
of information (a fair bit of technical tutorial) on just defining
the problem so a meaning
Need I have Lxwana talk to both of you?
At 11:57 PM + 7/2/03, Tom Lisa wrote:
>Puny Marvin,
>
>It is appropriate that you ended you last sentence
>with "I'm afraid." You should be afraid, very
>afraid!!! I have the new and improved, ultra
>special, galaxy class disrupter. I say pshaw to
>-
> > From: John A. Kilpatrick [mailto:[EMAIL PROTECTED]
>> Sent: Wednesday, May 14, 2003 5:35 AM
>> To: [EMAIL PROTECTED]
>> Subject: Cisco and MED [7:69060]
>>
>>
>> One question I havewhy does Cisco refer to MED as
>> "metric" all the time?
>> I admittedly am new to BGP on Cisco (I'v
At 11:19 AM -0400 6/29/03, Carroll Kong wrote:
> > I'm not quite sure where this is going to go, but as you may know,
>> I've worked pretty extensively in medicine, have developed expert
>> systems for diagnosis, etc. When you mentioned Doogie Howser, you
>> gave me several flashbacks to some v
At 11:19 AM -0400 6/29/03, Carroll Kong wrote:
> > I'm not quite sure where this is going to go, but as you may know,
>> I've worked pretty extensively in medicine, have developed expert
>> systems for diagnosis, etc. When you mentioned Doogie Howser, you
>> gave me several flashbacks to some v
At 4:56 AM + 6/28/03, Carroll Kong wrote:
>
>I liked Howard's idea, however, yes it is not scalable, but would
>improve the quality. My other post suggested, Cisco has not shown
>any real attempt to make it that much harder, they do want more CCIEs
>out there. If that is what they want, nothi
At 5:23 PM + 6/28/03, Don Kanicki wrote:
>Im Probably wrong here but my understanding is that multi-link groups
>multiple channels into a singel entity for lack of a better term.For
>instance with ISDN if you use multi-link I believe it brings both B channels
>up when interesting traffic is for
At 3:27 PM + 6/28/03, Thomas Larus wrote:
>Thanks for the eye-opener. I did not know that many of the errors one finds
>in technical books are introduced in the editorial process.
There were two reasons I switched from Macmillan (deceased sister of
Cisco Press, but using lots of Cisco Press
>"dre" wrote,
>""Howard C. Berkowitz"" wrote in message ...
>> *sigh* you realize, I know, that we are talking about utterly
>> essential concepts in working in the ISP space, yet these are things
>> that don't show up on any C
At 2:50 AM + 6/28/03, Hemingway wrote:
Is that Ernest, Margot, or Mariel?
>for those using some mix of 26xx routers in their study labs, one can now
>get the "enterprise basic" IOS load, which includes such things as IS-IS,
>BGP, MPLS, CEF, but none of the obsolte crap such as Apollo and
>Priscilla Oppenheimer wrote:
>>
>> Zsombor Papp wrote:
>> >
>> > As a side question, do you think that TCP must run over IP? :)
>>
>> I forgot to comment on that very important question! :-)
>>
>> I've never seen TCP run over anything other than IP, although
>> in theory it could.
>
>Has any
Not for any specific performance argument going on, but for all of them.
In the eighties, I presented several papers on SNA performance at the
Computer Measurement Group conference, held in Las Vegas.
My opening line:
"In the casino of network performance, the house always wins."
In other wor
At 9:15 AM + 6/27/03, Mwalie W wrote:
>Hi All,
>
>What causes Circuit Flapping? While checking the Network Notices of a
>certain ISP, I see this as a common problem.
>
>This problem can not be solved for all time?
>
>Thanks.
>
>Mwalie
I'm assuming you are referring to BGP flaps in the global I
At 8:29 PM + 6/27/03, dre wrote:
>""Howard C. Berkowitz"" wrote in message ...
>> The tier concept is mostly marketing these days, although there is
>> some technical basis.
>
>> A tier 1 provider never buys transit. It gets all its routes from
credit, they at least
have the Networking Council series that puts design books in context.
To varying extents, the Networking Council itself (Vint Cerf, Scott
Bradner, Lyman Chapin) do get involved in the project -- Scott was
very helpful for the WAN Surival Guide.
>
>Howard C. Berkowitz wrote
At 4:50 PM + 6/27/03, annlee wrote:
>As an author (with the same publisher, and more or less the same experience,
>I'm afraid), I must comment. A publishing contract is almost as one-sided as
>buying a house -- once you agree, you are stuck with a long-term
>proposition. Knowing that, it's stil
At 5:33 AM + 6/27/03, Mwalie W wrote:
>Hi All,
>
>This should be a simple one.
>
>I have heard that we have Tier 1, Tier 2, Tier 3 ISPs.I do assume we only
>have Tier 1 and Tier 2 in the US, Europe and Asia (Japan, China).
>
>In a third world country, can we have Tier 1 and Tier 2? Or we just h
At 3:52 PM + 6/26/03, n rf wrote:
>
>
>
>Look, first of all, I'm obviously not endorsing that anybody with x years of
>experience are automatically handed a ccie number. They would still have to
>pass the test just like anybody else.
>
>Therefore the idea is simple. You use a minimum number o
At 3:53 PM + 6/26/03, douglas mizell wrote:
>Jeez,
>
> That is ridiculous, the program is run by Cisco, a private
>corporation. It is not a government entity and requiring those types of
>prerequisites makes no sense. How do you quantify experience anyway?
Several ways. In an act
At 5:33 PM + 6/26/03, Priscilla Oppenheimer wrote:
>It's not a dumb question, as far as I can tell, but it's awfully hard to
>parse due to your stream of consciousness style and lack of paragarpahs.
>White space is a good thing. :-)
>
>There's nothing wrong with IP secondary addresses as far as
>At 8:29 PM + 6/25/03, Hemingway wrote:
> > The main differences being that
>>
>> a.) the FR switch typically doesn't learn the DLCI numbers dynamically,
>> rather the service provider needs to configure it hop-by-hop, and
>>
>> b.) the DLCI is not a globally unique identifier, like the MAC
At 6:34 PM + 6/25/03, annlee wrote:
>I found the sense dubious at the time ;-) but it was how the customer wanted
>to do it...
>
>Annlee
I never cease to be amazed at how less-than-well-informed-customers
demand crazy protocol changes. One of my favorites was to introduce
something along th
This is NOT the sort of thing that belongs on an IETF mailing list,
because it's vendor specific. That being said, it's relevant here.
>
>Date: Tue, 24 Jun 2003 18:15:59 -0700
>Reply-To: Mailing List
>Sender: Mailing List
>From: Sina Mirtorabi
>Subject: Re: Clarification on Cisco OSPF netwo
1 - 100 of 1844 matches
Mail list logo