Flash-nvram-system buffer-interface buffer, Computer Networking

Assignment Help:

Flash

It is also permanent storage device. It stores the compressed form of Cisco IOS software image and the NVRAM data.

Device structure

One flash socket

Support 80 pin flash SIMMs

Dual bank

Note: 16MB flash presents in built in mode in 2600XM series motherboard.

NVRAM

It is an EPROM,it is used for writable permanent storage device of  the startup configuration. In Flash device, NVRAM data is stored where the boot code is loaded.

There are two type of dynamic memory

1)    DRAM

2)    SDRAM

Two dual in line memory module sockets are available in cisco 2600 series. 100-pin DRAM can be fitted in each socket. For configure the DRAM as combine of shared memory , to use the iomem software command . It is used for data transmitted or received by WAN interface cards ,NM and public buffer which is allotted for the CPU.

The Cisco 2691 router contains two 168-pin DIMM sockets for SDRAM. 168 pin SDRAM can be fitted with each socket .if you assemble one DIMM, you must put it in slot 0

Memory structure overview is given above.

There are two types of memory buffer such as system buffer and interface buffer.

System Buffer

It is provided of process the packets and it is created by Cisco IOS.

Interface Buffer

Interface buffer is nothing but particle based. using particles for interfaces with maximum transmission unit for avoiding overhead. According to buffer size, it is short buffer size than system buffer.


Related Discussions:- Flash-nvram-system buffer-interface buffer

CLIENT SERVER BLACKJACK, So for this project, we’re going to make a game. ...

So for this project, we’re going to make a game. This game will make use of a server to join two clients together for a modified game of Blackjack.

Recognize the command to verify if cdp is enabled, show cdp is the command...

show cdp is the command to verify if CDP is enabled.

Circuit switched and packet-switched mode for sending a file, Two hosts are...

Two hosts are connected by a path made of four links as shown in the figure below. The links are of data rate R = 2 Mbps each. Host A has a file of size F = 1,000,000 bytes to tran

Explain about traffic shaping, Q. Explain about Traffic shaping ? Traf...

Q. Explain about Traffic shaping ? Traffic shaping -Method to control the amount and the rate of the traffic sent to the network.? Leaky bucket Token bucket -

How to connect remote lans, Q. How to connect Remote LANs? - Remote br...

Q. How to connect Remote LANs? - Remote bridges acting as connecting devices to connect LANs and point-to-point networks such as leased telephone lines or ADSL lines

Explain peer-to-peer networking model, Explain Peer-to-Peer Networking Mode...

Explain Peer-to-Peer Networking Model. A networking model where every workstation has equivalent capabilities and responsibilities is called as peer-to-peer model. There is no

Firewall rules based on a fictitious organisation, Question 1 requires you ...

Question 1 requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption t

Assignement, I have an asignement regarding TCP tunning and optimization. C...

I have an asignement regarding TCP tunning and optimization. Can you help?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd