0

configure a cisco catalyst 2950 switch with this template

Tài liệu Cisco Catalyst Switch 4006 vaø 3524XL ppt

Tài liệu Cisco Catalyst Switch 4006 vaø 3524XL ppt

Quản trị mạng

... Cisco Catalyst Switch 4006 và 3524XL Trang 38 2/2 1-2 Catalyst4 006> (enable) Catalyst3 524_1 #configure terminal Enter configuration commands, one per line. End with CNTL/Z. Catalyst3 524_1(config)#interface ... Catalyst3 524_1(config)#interface gi0/1 Catalyst3 524_1(config-if)#switchport mode trunk Catalyst3 524_1(config-if)#switchport trunk encapsulation dot1q Catalyst3 524_1#sh interfaces gigabitEthernet 0/1 switchport Name: ... frames: 0 Catalyst3 524_1# Sau khi cấu hình trunk cho các liên kết gi a các switch. Các packet c a VTP sẽ có thể cập nhật qua lại gi a các switch trong VTP domain: Catalyst4 006> (enable)...
  • 59
  • 519
  • 3
A simple introduction to working with LVM

A simple introduction to working with LVM

Kỹ thuật lập trình

... this: can create a dedicated /home partition using LVM - and if I need more space I can extend it.In this example hda1, hda2, and hda3 are all physical volumes. We'll initialize hda3 as ... logical volume manager allows you to create and manage the storage of your servers in a very useful manner; adding, removing, and resizing partitions on demand. Getting started with LVM can be a ... lvm2Now that we have a volume group (called skx-vol) we can actually start using it.Working with logical volumesWhat we really want to do is create logical volumes which we can mount and actually...
  • 7
  • 674
  • 0
 Báo cáo y học:

Báo cáo y học: "A cyclic-RGD-BioShuttle functionalized with TMZ by DARinv “Click Chemistry” targeted to αvβ3 integrin for therapy"

Y học thưởng thức

... Harms JF, Welch DR, Samant RS, et al. A small molecule antagonist of the alpha(v)beta3 integrin suppresses MDA-MB-435 skeletal metastasis. Clin Exp Metastasis. 2004; 21: 119-28. 3. Takada ... Sakamoto S, Kyprianou N. Targeting anoikis resistance in prostate cancer metastasis. Mol Aspects Med. 2010 Apr;31(2):205-14. 5. Zanardi LA, Battistini L, Burreddu P, et al. Targeting alpha(v)beta(3) ... organic phase was washed with water, followed by 1N HCl and again water. The organic layer was dried over Na2SO4 and evaporated. The resulting residue was chromatographed on silica gel by...
  • 14
  • 480
  • 0
current situation of outsourcing development, a number of favorable factors promoting this industry as well as analysis of outsourcing activities FPT Software.doc

current situation of outsourcing development, a number of favorable factors promoting this industry as well as analysis of outsourcing activities FPT Software.doc

Quản trị kinh doanh

... approximately the same as India’s a decade ago and the wage rates in Vietnam are roughly the same as India’s initial rates. As such, a lot of people have raised the question that whether Vietnam ... FSoft has established FPT Software Japan, Ltd. with its headquarters in Tokyo and a representative office in Osaka, Japan. Following the success of FPT Software Japan, location and has all the ... said to be in the same situation of India 20 years ago. Vietnam already provides a lower cost alternative to India and as the wage rate differential increases over the next few years, companies...
  • 79
  • 611
  • 6
OReilly.Building.a.Web.2.0.Portal.with.ASP.NET.3.5.Jan.2008-BBL

OReilly.Building.a.Web.2.0.Portal.with.ASP.NET.3.5.Jan.2008-BBL

Kỹ thuật lập trình

... Widgets|17Update PanelsUpdatePanels allow you to update any part of the Start page asynchronously and giveany web site an Ajax look-and-feel. However,UpdatePanels are a significant drag onthe page. ... can add more widgets from a widget catalog and decorate the page as they like.How an Ajax-Powered Start Page Is DifferentThe advantages of Ajax and a rich client-side experience give users a ... 3.5, as well as regular View-State and store temporary states. ASP.NET Cache can be used to cache widget data. This approach is far better than what you would find in any current web portalwhere...
  • 310
  • 488
  • 1
Contents i What’s New with This Edition Teach Yourself ANSI C++ in 21 Days, Premier Edition, is

Contents i What’s New with This Edition Teach Yourself ANSI C++ in 21 Days, Premier Edition, is

Kỹ thuật lập trình

... clear.First, the separation of data from the tasks that manipulate the data became harder and harderto comprehend and maintain. It is natural to think of your data (employee records, forexample) ... features. A Quasar inherits all that a Star is and hasadditional features, as well.As with other fields of engineering, software engineers have invented a name for the designtechnique of making ... aninternational effort to standardize the C++ language between the American NationalStandards Institute (ANSI) and the International Standards Organization (ISO) commit-tees. The purpose of this...
  • 875
  • 460
  • 1
Tài liệu Chapter9 Managing a Cisco Internetwork docx

Tài liệu Chapter9 Managing a Cisco Internetwork docx

Chứng chỉ quốc tế

... hosts 命令验证新建的主机表,如下: 2500#sh hosts Default domain is not set Name/address lookup uses domain service Name servers are 255.255.255.255 Host Flags Age Type Address(es) 2501B (perm, OK) 0 IP 172.16.10.2 ... 1900S Translating “1900S”…domain server (192.168.0.23) [OK] (略) 使用 show hosts 命令验证下,如下: 2500#sh hosts Default domain is noko.com Name/address lookup uses domain service Name servers are 192.168.023 ... holdtime 命令,如下: Router#conf t Chapter9 Managing a Cisco Internetwork The Internal Components of a Cisco Router Cisco Router 的一些组件: bootstrap:存储在 ROM 中的微码(microcode)中,用来在初始化的时候启动 router,然后加载...
  • 9
  • 682
  • 0
Tài liệu 20 Terabytes a Night  by Doug Rosenberg with Matt Stephens doc

Tài liệu 20 Terabytes a Night  by Doug Rosenberg with Matt Stephens doc

Kỹ thuật lập trình

... a night  21 summarizes the challenge facing Jeff and Tim very nicely: The LSST websiteThe science archive will consist of 400,000 sixteen‐megapixel images per night (for 10 years), comprising 60 PB of pixel data. This enormous LSST data archive and object database enables a diverse multidisciplinary research program: astronomy & astrophysics; machine learning (data mining); exploratory data analysis; extremely large databases; scientific visualization; computational science & distributed computing; and inquiry‐based science education (using data in the classroom). Many possible scientific data mining use cases are anticipated with this database. The LSST scientific database will include:     * Over 100 database tables     * Image metadata consisting of 700 million rows     * A source catalog with 3 trillion rows     * An object catalog with 20 billion rows each with 200+ attributes     * A moving object catalog with 10 million rows     * A variable object catalog with 100 million rows     * An alerts catalog. Alerts issued worldwide within 60 seconds.     * Calibration, configuration, processing, and provenance metadata Sky Movies—Challenges of LSST Data Management The Data Management (DM) part of the LSST software is a beast of a project. LSST will deal with unprecedented data volumes. The telescope’s camera will produce a stream of individual images that are each 3.2 billion pixels, with a new image coming along every couple of minutes. In essence, the LSST sky survey will produce a 10 year “sky movie”. If you think of telescopes like LBT producing a series of snapshots of selected galaxies and other celestial objects, and survey telescopes such as Sloan producing a “sky map”22, then LSST’s data stream is more analogous to producing a 10 year, frame‐by‐frame video of the sky.  LSST’s Use Cases Will Involve Accessing the Catalogs LSST’s mandate includes a wide distribution of science data. Virtually anyone who wants to will be able to access the LSST database. So parts of the LSST DM software will involve use cases and user interfaces for accessing the data produced by the telescope. Those data mining parts of the software will be designed using regular use‐case‐driven ICONIX Process, but they’re not the part of the software that we’re concerned with in this book.  ... a night  21 summarizes the challenge facing Jeff and Tim very nicely: The LSST websiteThe science archive will consist of 400,000 sixteen‐megapixel images per night (for 10 years), comprising 60 PB of pixel data. This enormous LSST data archive and object database enables a diverse multidisciplinary research program: astronomy & astrophysics; machine learning (data mining); exploratory data analysis; extremely large databases; scientific visualization; computational science & distributed computing; and inquiry‐based science education (using data in the classroom). Many possible scientific data mining use cases are anticipated with this database. The LSST scientific database will include:     * Over 100 database tables     * Image metadata consisting of 700 million rows     * A source catalog with 3 trillion rows     * An object catalog with 20 billion rows each with 200+ attributes     * A moving object catalog with 10 million rows     * A variable object catalog with 100 million rows     * An alerts catalog. Alerts issued worldwide within 60 seconds.     * Calibration, configuration, processing, and provenance metadata Sky Movies—Challenges of LSST Data Management The Data Management (DM) part of the LSST software is a beast of a project. LSST will deal with unprecedented data volumes. The telescope’s camera will produce a stream of individual images that are each 3.2 billion pixels, with a new image coming along every couple of minutes. In essence, the LSST sky survey will produce a 10 year “sky movie”. If you think of telescopes like LBT producing a series of snapshots of selected galaxies and other celestial objects, and survey telescopes such as Sloan producing a “sky map”22, then LSST’s data stream is more analogous to producing a 10 year, frame‐by‐frame video of the sky.  LSST’s Use Cases Will Involve Accessing the Catalogs LSST’s mandate includes a wide distribution of science data. Virtually anyone who wants to will be able to access the LSST database. So parts of the LSST DM software will involve use cases and user interfaces for accessing the data produced by the telescope. Those data mining parts of the software will be designed using regular use‐case‐driven ICONIX Process, but they’re not the part of the software that we’re concerned with in this book.  ... 29 A Few More Thoughts About ICONIX Process for Algorithms as Used on LSST Modeling pipelines as activity diagrams involved not only “transmogrifying” the diagram from a use case diagram to an activity diagram, but also incorporating “Policy” as an actor which defined paths through the various pipeline stages. Although the LSST DM software will run without human intervention, various predefined Policies act as proxies for how a human user would guide the software. As it turned out on LSST, there were two parallel sets of image processing pipelines that differed only in the policies to guide them, so making the pipeline activity diagram “policy driven” immediately allowed us to cut the number of “pipeline use case diagrams” in half. This was an encouraging sign as an immediate simplification of the model resulted from the process tailoring we did. Modeling pipeline stages as high‐level algorithms meant replacing the “schizophrenic” algorithm‐use case template of Inputs: Outputs: Basic Course: Alternate Courses:  With an activity specification template more suited to algorithms, namely: Inputs: Outputs: Algorithm: Exceptions: Not surprisingly, writing algorithm descriptions as algorithms and not as scenarios made the model much easier to understand. This simple process modification went a long way towards addressing the lack of semantic consistency in the model.  We used robustness diagrams to elaborate activities (is that legal?) 29 The “algorithm‐use cases” that had been written in Pasadena had been elaborated on robustness diagrams, and we made the non‐standard process enhancement to elaborate the pipeline stage activities with these robustness diagrams as well. Enterprise Architect was flexible enough to support this.   Modeling Tip: Good modeling tools are flexible I’ve been bending the rules (and writing new ones) of software development processes for more than 20 years. One of the key attributes that I look for in a tool is flexibility. Over the years, I’ve found that I can make Enterprise Architect do almost anything. It helps me, but doesn’t get in my way. Keeping this elaboration of pipeline stage algorithms on robustness diagrams was important for a number of reasons, one of the primary reasons being that we wanted to maintain the decomposition into “controllers” (lower level algorithms) and “entities” (domain classes). Another important reason was that project estimation tools and techniques relied on the number of controllers within a given pipeline stage (and an estimate of level of effort for each controller) for cost and schedule estimation.  ...
  • 46
  • 394
  • 0
Tài liệu Cisco Catalyst LAN Switching docx

Tài liệu Cisco Catalyst LAN Switching docx

Kỹ thuật lập trình

... Modules130Gigabit Ethernet Line Cards131 Catalyst 8510 Line Cards132The Chassis132 Catalyst 2900 Series132 Catalyst 5002 Series133 Catalyst 5000134 Catalyst 5505135 Catalyst 5509135 Catalyst ... Ethernet SNAP. This frameheader replaced the DSAP and SSAP with "AA." When "AA" appears in both the DSAP andSSAP fields, the frame is an Ethernet SNAP frame. The Layer 3 protocol ... Kamla, Todd Kamla, EldenKamla, Karmen Kamla, Wynn Legault, Mark Walter, Robert Walter, Lucy Walter, Ralph andJane Box.My friends: Stuart Higgins, John Gorman at Tech Force, Karl Schuman at...
  • 379
  • 342
  • 0
Tài liệu Cisco Content Services Switch Getting Started Guide(Software Version 4.01) doc

Tài liệu Cisco Content Services Switch Getting Started Guide(Software Version 4.01) doc

Quản trị mạng

... Protocols A- 7Transport A- 7Network A- 7Routing A- 8Gateway A- 8Application A- 8Network Utilities A- 8Network Management A- 9DC Power Supply Safety Warnings A- 10Lithium Battery Disposal Warnings A- 11APPENDIX BCable PinoutsB-1RJ-45 ... might apply. Refer to Appendix A, Specifications for lithium battery safety warnings.WarningUltimate disposal of this product should be handled according to all national laws and regulations. ... install modules without using appropriate anti-static guard measures. The CSS includes an anti-static wrist strap in the Accessory kit. Attach the copper tape end of the strap to an unpainted...
  • 148
  • 390
  • 0
Tài liệu Cisco Secure ACS Switch Security for Controlled User Access pdf

Tài liệu Cisco Secure ACS Switch Security for Controlled User Access pdf

Quản trị mạng

... ALSwitch(config)#aaa new-model ALSwitch(config)#aaa authentication login default group tacacs+ local b. Configure the security for ACS authentication ALSwitch(config)#aaa authentication ... authentication enable default group tacacs+ enable ALSwitch(config)#aaa authorization exec tacacs+ ALSwitch(config)#tacacs-server host 10.1.1.254 ALSwitch(config)#tacacs-server timeout 30 ALSwitch(config)#tacacs-server ... authentication login default tacacs+ local DLRouter(config)#aaa authorization exec tacacs+ b. Configure the security for ACS authentication DLRouter(config)#aaa authentication enable default tacacs+...
  • 5
  • 450
  • 0
Tài liệu Building a Cisco Network for Windows 2000 P2 doc

Tài liệu Building a Cisco Network for Windows 2000 P2 doc

Quản trị mạng

... a good idea to go ahead and putthe impossible down as a goal when a team member suggests a technologyneed. Sometimes that so-called “impossible” feat is actually available as a feature of a ... understand how the router is configured and workingStackMaker An application that an administrator can use to create a vir-tual stack of devices for easier visual managementThreshold Manager A remote ... each interface as you build therouter, and do not accidentally select an interface that is not available forthat particular device.ConfigMaker can also collect information about a Cisco device...
  • 20
  • 402
  • 0

Xem thêm