Home > Juniper Certification

IPCisco-Cisco-Juniper-Alcatel-Huawei-CheatSheet

COMPARISON OF TOP FOUR VENDORS’S COMMAND LINE In IP world, there are many vendors. But some of these vendors are very common and widely used. These vendors are Cisco, Juniper, Alcatel-Lucent (Now Nokia) and Huawei. I have prepared a cheat sheet for comparison of these vendors’s command line. These document is especially for the Service […]

Basic VPLS Architecture, Full Mesh

Comparison of VPLS and h-VPLS VPLS (Virtual Private LAN Service) and h-VPLS (Hierarhical VPLS) has some common and different properties. So they have different aadvantages and disadvantages.In this article, we will focus on the comparison of these two concepts. The most important different between VPLS and h-VPLS is in the interface between the CE (Customer […]

Link Layer Discovery Protocol-Media Endpoint Discovery, LLDP-MED

LLDP-MED (Link Layer Discovery Protocol-Media Endpoint Discovery) As a standard and open protocol, LLDP is a good protocol. After the development of LLDP, some of the additional properties needed especially for Voice Over IP (VoIP). So LLDP extended. The extended version of LLDP is LLDP-MED (Link Layer Discovery Protocol – Media Endpoint Discovery). You can […]

How LLDP Works, LLDP Mechanism

LLDP (Link Layer Discovery Protocol) LLDP (Link Layer Discovery Protocol) is a Standard Neighbour Discovery Protocol that is used by all vendors. Like all other Neighbour Discovery Protocols, LLDP works on Layer 2 (Data-link Layer). By using LLDP, directly connected neighbours are discovered. To discover a neighbour device, LLDP must be enabled both on the […]

Neighbour Discovery Protocols Neigbour Discovery Protocols provides directly connected devices to discover and collect information about each other. Network devices can provide directly connected neighbour device’s identification, configuration and any capabilities. Neighbour Discovery Protocols work on Layer 2. There are different neighbour protocols for different vendors. Generally they are refer this protocol like “vendor” discovery […]


Copy Protected by Chetan's WP-Copyprotect.