Blog

Packet Tracer BGP Configuration Example To understand BGP (Border Gateway Protocol) better, we will make a basic Packet Tracer BGP Configuration example. Because of the limited numbers of commands available 
Read More
Ping Command and Ping Command Options Whenever other engineers see network engineers during troubleshooting, they think that, network engineers only ping from one node to another. But as you know 
Read More
Both One-to-One and Facility Backup can protect different network elements. And these can be achieved by two ways: – Node Protection : Protect against the failure of the next downstream 
Read More
The goal of the protection is minimizing the down time. To do this, protection must be done near to the failure. Local protection does this. By doing this types of 
Read More
As we say in the following articles, while using Secondary LSP-Paths, sharing links between Primary and Secondary LSP-Paths must be avoided. We can say this term “Path Diversity“.There are some 
Read More