INTRODUCTION For resiliency purposes, Layer2 topologies are designed and deployed in a physical loop. Unlike the IP protocol which uses the TTL field as a built-in mechanism for preventing packets from looping endlessly through the network, the Ethernet protocol does not provide such facility and therefore, unless we can prevent a layer2 loop, the following problems would occur: Broadcast storms – endless broadcast of frames through the entire L2 domain Hosts end-up receiving duplicates frames from different switches Unstable mac-address tables due to continuous host mac address learning on different ports The STP (Spanning Tree Protocol) was developed to avoid…
In this blog, I will explain the OSI model from a more pragmatic point of view. Doing so, I’m hoping to bring some of the abstract concepts to life.
A step by step guide on How to setup LDAP authentication on the F5-BIGIP.
A brief refresher on IP address classes, classless and classfull addresses