« Home « Chủ đề Switch catalyst

Chủ đề : Switch catalyst


Có 20+ tài liệu thuộc chủ đề "Switch catalyst"

Thiết bị và kỹ thuật thi công mạng - Bài 8: Cơ bản về cấu hình CISCO IOS

tailieu.vn

MH/MĐ: THIẾT BỊ VÀ KỸ THUẬT THI CÔNG MANG. Bài 1: HẠ TẦNG HỆ THỐNG THIẾT BỊ MẠNG Bài 2: HẠ TẦNG HỆ THỐNG CÁP MẠNG Bài 3: TIÊU CHUẨN THI CÔNG MẠNG Bài 4: THIẾT KẾ HỆ THỐNG MẠNG Bài 5: KỸ THUẬT THI CÔNG MẠNG LAN Bài 6: KỸ THUẬT THI CÔNG MẠNG WLAN Bài 7: MÁY CHỦ...

Practical TCP/IP and Ethernet Networking- P1

tailieu.vn

Practical TCP/IP and Ethernet Networking. Practical Data Acquisition for Instrumentation and Control Systems (John Park, Steve Mackay). Practical Data Communications for Instrumentation and Control (Steve Mackay, Edwin Wright, John Park). Practical Industrial Safety, Risk Assessment and Shutdown Systems for Instrumentation and Control (Dave Macdonald). Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems (Gordon Clarke, Deon Reynders). Practical TCP/IP and...

Practical TCP/IP and Ethernet Networking- P2

tailieu.vn

8.10 SMTP (simple mail transfer protocol) 154 8.11 POP (post office protocol) 155 8.12 BOOTP (bootstrap protocol) 156 8.13 DHCP (dynamic host configuration protocol) 158. 10.1 Introduction 174. 10.2 Repeaters 175. 10.3 Media converters 176. 10.4 Bridges 177. 10.5 Hubs 179. 10.6 Switches 182. 10.7 Routers 186. 10.8 Gateways 187. 10.9 Print servers 188. 10.10 Terminal servers 188. 10.11 Thin...

Practical TCP/IP and Ethernet Networking- P3

tailieu.vn

Alternatively, the data may be represented by the presence or absence of light in an optical fiber cable.. A source of the information. A communications channel. A receiver to convert the data signals back into a form the destination can understand. The destination of the information This process is shown in Figure 1.1.. The transmitter encodes the information into a...

Practical TCP/IP and Ethernet Networking- P4

tailieu.vn

The direction of the transition in mid-interval (negative to positive or positive to negative) indicates the value (1 or 0, respectively) and provides the clocking.. There is a transition from one to the other voltage level halfway through each bit interval. There may or may not be a transition at that start of each bit interval, depending on whether the...

Practical TCP/IP and Ethernet Networking- P5

tailieu.vn

In the OSI model, the entity in the next higher layer is referred to as the N+1 entity and the entity in the next lower layer as N–1. The services available to the higher layers are the result of the services provided by all the lower layers.. The functions and capabilities expected at each layer are specified in the model.....

Practical TCP/IP and Ethernet Networking- P6

tailieu.vn

802.1E System load protocol. 802.1F Guidelines for layer management standards. 802.1G Remote MAC bridges. 802.1I MAC bridges (FDDI supplement) /+++2UMOIGRROTQIUTZXUR. This is the interface between the network layer and the specific network environments at the physical layer. The IEEE has divided the data link layer in the OSI model into two sub layers – the media access MAC sub layer,...

Practical TCP/IP and Ethernet Networking- P7

tailieu.vn

Explain the operation of the CSMA/CD protocol. List the fields in the Ethernet data frames. The Ethernet network concept was developed by Xerox Corporation at its Palo Alto Research Center (PARC) in the mid-seventies. It was based on the work done by researchers at the University of Hawaii where there were campus sites on the various islands. thus advising the...

Practical TCP/IP and Ethernet Networking- P8

tailieu.vn

Provided all is correct, the frame is passed to the LLC layer for further processing.. The monitoring and detection of collisions is the method by which a node ensures unique access to the shared medium. It is only a problem when there are excessive collisions.. This reduces the available bandwidth of the cable and slows the system down while retransmission...

Practical TCP/IP and Ethernet Networking- P9

tailieu.vn

The PHY layer specifies the 4B/5B coding of the data, data scrambling and the non return to zero – inverted (NRZI) data coding together with the clocking, data and clock extraction processes.. In turn, this symbol is encoded using non return to zero – inverted (NRZ-I) where a ‘1’ is represented by a transition at the beginning of the cell,...

Practical TCP/IP and Ethernet Networking- P10

tailieu.vn

72 Practical TCP/IP and Ethernet Networking. spreads the laser light evenly over the core of the multimode fiber so the laser source looks more like a light emitting diode (LED) source. This spreads the light in a large number of rays across the fiber resulting in smoother spreading of the pulses, so less interference. This conditioned launch is done in...

Practical TCP/IP and Ethernet Networking- P11

tailieu.vn

For class A, the first bit is fixed at 0. In particular is used to test that the TCP/IP protocol is properly configured by sending information in a loop back to the computer that originally sent the packet, without it traveling over the network. or ‘all ones’ for HostID. An IP address with a host number of zero is used...

Practical TCP/IP and Ethernet Networking- P12

tailieu.vn

This field indicates where in the original datagram this fragment belongs. In other words, the transmitted offset value is equal to the actual offset divided by eight. The purpose of this field is to cause undeliverable datagrams to be discarded. The original design called for TTL to be decremented not only for the time it passed a datagram, but also...

Practical TCP/IP and Ethernet Networking- P13

tailieu.vn

SCOP is a 4-bit multicast scope value used to limit the scope of the multicast group, for example to ensure that packets intended for a local videoconference are not spread across the Internet.. The multicast address FF:08::43 points to all NTP servers in a given organization, in the following way:. 8 points to all interfaces in the same organization as...

Practical TCP/IP and Ethernet Networking- P14

tailieu.vn

Figure 6.38. In addition to the reports on errors and exceptional conditions, there is a set of ICMP messages to request information, and to reply to such request.. An echo request message is sent to the destination node. The structure of the request and reply are indicated below.. Figure 6.39. It usually consists of the ASCII characters a, b, c,...

Practical TCP/IP and Ethernet Networking- P15

tailieu.vn

Host-to-host (transport) layer protocols. Explain the basic functions of the host-to-host layer. Explain the meaning of each field in the TCP and UDP headers. The host-to-host communications layer (also referred to as the service layer, or as the transport layer in terms of the OSI model) is primarily responsible for ensuring end-to- end delivery of packets transmitted by the Internet...

Practical TCP/IP and Ethernet Networking- P16

tailieu.vn

This is the 16-bit one’s complement of the one’s complement sum of a pseudo header of information from the IP header, the UDP header, and the data, padded with ‘0’ bytes at the end (if necessary) to make a multiple of two bytes.. The pseudo header, conceptually prefixed to the UDP header, contains the source address, the destination address, the...

Practical TCP/IP and Ethernet Networking- P17

tailieu.vn

5 Status request – used to obtain the status of a TELNET option from the remote machine.. If the server application malfunctions and stops reading data from the TCP connection, the operating system buffers will fill up until TCP eventually indicates to the client system a window size of zero, thus preventing further data flow from the client. Whenever it...

Practical TCP/IP and Ethernet Networking- P18

tailieu.vn

An object identifier (or object ID) uniquely identifies a managed object in the MIB hierarchy. MIBs that have not been standardized typically are positioned in the experimental branch. The managed object at Input can be uniquely identified either by the object name – iso.identified-organization.. private.enterprise.cisco.temporary variables.Novell.atInput – or by the equivalent object descriptor . The Get operation is used by...

Practical TCP/IP and Ethernet Networking- P19

tailieu.vn

When you have completed study of this chapter you should able to apply the following utilities:. The TCP/IP utilities are discussed throughout the book. Most of the older utilities are DOS-based. ‘Pinging’ is one of the easiest ways to test connectivity across the network and confirm that an IP address is reachable. The DOS ping utility (ping.exe) uses ICMP to...