分享
 
 
 

CCIE必看[重要]

王朝other·作者佚名  2008-05-19
窄屏简体版  字體: |||超大  

The last certification is the CCIE, and is the most promising certification in the market. Besides its difficulty it challenges those with specific troubleshooting methods and configuration techniques. Covering a wide variety of technologies and protocols. The CCIE is composed of a qualification written test and of course a two day lab exam which makes the CCIE what it is today.

1.Erlang B.

Erlang B ia an algorithm used to handles trunk allocation.

In the circuit switch environment, many of the larger switches were blocking other switches. That is, not every input had a path to every output. Complex grading structures were created to help determine the pathways a circuit might take through the switch, and the impact on the GoS.

It should be recognized that traffic theory consists of many queuing methods and associated formulas. Anyone who has taken a queuing theory class can testify to the degree of complexity of the many queuing models that have been derived for various situations.

The most commonly used model and table is Erlang B. Erlang B is based on infinite sources, LCC, and Poisson distribution that is appropriate for either exponential or constant holding times. In general, Erlang B understates the number of trunks because of the LCC assumption, but it is generally the most commonly used algorithm.

2.Counting To Infinity

A distance vector routing protocol uses infinity to know when a route is really down. Counting to infinity is good (and necessary for these protocols to work).

If the hop count rises to a certain number, it is considered unreachable and removed from the routing table and not propagated further. In RIP v1, the infinity hop count was only 16. This led to quick convergence but a small network diameter.

Count to infinity helps keep false routes from propagating for non adjacent routers while split-horizon does the same for adjacent routers.

3.Multicast Layers

IP Multicast lies at Layers 2 and 3 on the OSI layer model

4.X.25 Maximum Speed

The Maximum Speed for X.25 is 2MB/s

5.DS-1

A DS-1 circuit consist of 24 byte interleaved 8 Bit and 1 framing bit

6.IPX Split Horizon

IPX Split Horizon is not supported in any of the IPX feature sets.

7.Default Maximum Servers for SAP

SAP updates sends out a maximum default of 7 services

8.Spanning Tree and Root Bridge

1 Root Bridge for Ethernet and switching, also 1 root bridge per vlan with 1 for all vlans.

9.Route Dampening Policy

Route dampening is a BGP feature designed to minimize the propagation of flapping routes across an internetwork. A route is considered to be flapping when it is repeatedly available, then unavailable, then available, then unavailable, and so on.

A route that is flapping receives a penalty of 1000 for each flap. When the accumulated penalty reaches a configurable limit, BGP suppresses advertisement of the route even if the route is up. The accumulated penalty is decremented by the half-life time. When the accumulated penalty is less than the reuse limit, the route is advertised again (if it is still up).

10.BGP Route Reflector

A route reflector reflects routes for other IBGP router ie it receive data and distribute it to all other routers

BGP Confederations

Confederations eliminated the need to fully meshed BGP communication. Basically splitting a single AS into confederations allows the same AS to speak EBGP, although to all external AS the entire confederation grouping looks like a single AS.

11.FDDI 4B/5B

4B/5B local fiber.

It is the Fiber channel physical media used for FDDI and ATM.Supports speeds of up 100Mbps over multimode fiber.(see note about TAXI 4B/5B)

TAXI 4B/5B

It is a Transmitter/receiver Interface 4-byte/5-Byte. Encoding sheme used for FDDI LANs, as well as for ATM. Supports speeds of up 100Mbps over multimode fiber.TAXI is the chipset that generates 4B/5B encoding on multimode fiber.

Five bit encoding provides 16 data symbols (0-F), 8 control symbols (Q, H, I, J, K, T, R, S), and 8 violation symbols (V). The coding of these symbols is done such that in normal situations, you will not ever have 4 consecutive zeros in a row. "

12.TCP PSH/RST

TCP RST

When TCP session sequence numbers are received out of sequence the detecting station will send a reset. This forces the session to abort.

TCP PSH/RST

If you look at the TCP header format. There is a six bit field called FLAGS. FLAGS are used for data flow and connection control. Valid flags are URG (urgent) ACK (acknowledgement) PSH (push) RST (reset) SYN (syncronize) and FIN (final) they are viewable with a decent sniffer trace of a TCP session.

13.CIDR

Classless Interdomain Routing, CIDR used by BGP ver 4.

14.IPX Load Balancing

IPX supports load balancing, but it is not on automatically. You must manually issue the global command : IPX maximum-path 2(I just picked 2 because I assumed there are only two parallel paths).

15.Fast Link Pulse (FLP)

100 base t auto-negotation link pulse.

16.Realiable Protocols

TCP and LLC Type 2 are realiable protocols while protocols such as IP, UDP, and Frame Relay are NOT realiable protocols.

17.802.10 VLAN Encapsulation

802.10 VLAN encapsulation media type is FDDI.

18.802.2 Standard

The information for IEEE 802.2 standard is the LLC or Link Layer Control

19.DecNet Designated Router Configuration

To setup a specific router to the designated router, the command syntz would be the following:

decnet router-priority xxx (higher the number for choosing the DR)

(i.e. decent router-priority 76)

20.If a person lost there password or just forgot the password, then do the following?

Break into the router and change the router or replace the password. Do not write erase, cause that won't do anything but making you start all over again. You also do not need to copy the nothing over from a TFTP server. Just break into the router, change the register value then reload the router with the new settings. Then you can go into the config and change the password.

21.Difference between Ethernet II and 802.3

802.3 represents a LENGTH field, while the Ethernet II represents the TYPE field.

22.When you see the following line in the config "line vty 0 4, no password", what does that mean?

This means that no one has direct telnet access into the router.

23.Enabling SNMP on router?

use the following command, "snmp-server community"

24.Administrative Distance

The Administrative Distance gives complete priority when choosing routes between different routing protocols like RIP or EIGRP. Here is a list of the administrative distances:

STATIC 1

EIGRP 90

IGRP 100

OSPF 110

ISIS 115

RIP 120

25.Routing Protocols Related To IP

Static Routes, OSPF, ISIS, EIGRP, RIP, IGRP

26.What a SAP service does when it doesn't have a route?

SAP entries are dependent on routing table entries. If an entry in the routing table that SAP is referencing is removed, the SAP entries is also remove from the SAP table. When it receives an entry with no

 
 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
2023年上半年GDP全球前十五强
 百态   2023-10-24
美众议院议长启动对拜登的弹劾调查
 百态   2023-09-13
上海、济南、武汉等多地出现不明坠落物
 探索   2023-09-06
印度或要将国名改为“巴拉特”
 百态   2023-09-06
男子为女友送行,买票不登机被捕
 百态   2023-08-20
手机地震预警功能怎么开?
 干货   2023-08-06
女子4年卖2套房花700多万做美容:不但没变美脸,面部还出现变形
 百态   2023-08-04
住户一楼被水淹 还冲来8头猪
 百态   2023-07-31
女子体内爬出大量瓜子状活虫
 百态   2023-07-25
地球连续35年收到神秘规律性信号,网友:不要回答!
 探索   2023-07-21
全球镓价格本周大涨27%
 探索   2023-07-09
钱都流向了那些不缺钱的人,苦都留给了能吃苦的人
 探索   2023-07-02
倩女手游刀客魅者强控制(强混乱强眩晕强睡眠)和对应控制抗性的关系
 百态   2020-08-20
美国5月9日最新疫情:美国确诊人数突破131万
 百态   2020-05-09
荷兰政府宣布将集体辞职
 干货   2020-04-30
倩女幽魂手游师徒任务情义春秋猜成语答案逍遥观:鹏程万里
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案神机营:射石饮羽
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案昆仑山:拔刀相助
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案天工阁:鬼斧神工
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案丝路古道:单枪匹马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:与虎谋皮
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:李代桃僵
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:指鹿为马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:小鸟依人
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:千金买邻
 干货   2019-11-12
 
推荐阅读
 
 
 
>>返回首頁<<
 
靜靜地坐在廢墟上,四周的荒凉一望無際,忽然覺得,淒涼也很美
© 2005- 王朝網路 版權所有