Concurrent writes to a single file are not desirable in any operating system. To prevent this, most operating systems use  locks to guarantee that only one process can write to a file at a  time. Operating systems traditionally lock entire files, although newer  ones allow a range of bytes within a file to be locked. If another  process attempts to write to a file (or section of one) that is already  locked, it will receive an error from the operating system and will wait  until the lock is released. Read more…
			
		 
		
	 
	
		
		
		
			This  table compares QoS values for IP precedence, Differentiated Services  Code Point (DSCP) and Multiprotocol Label Switching (MPLS) Experimental  (EXP) values along with standard values used in Cisco IOS  Software for  configuration.  Read more…
			
		 
		
	 
	
		
		
		
			To understand how to interpret the show policy-map interface command, you first need to understand the concept of congestion.Conceptually, congestion is defined by the Cisco IOS software  configuration guide as: “During periods of transmit congestion at the  outgoing interface, packets arrive faster than the interface can send  them.” Read more…
			
		 
		
	 
	
		
		
		
			
The Kerberos authentication method originated at the Massachusetts Institute of Technology in the 1980s.
It was part of a project called Athena that involved integrating the computers on the MIT campus, which ran on different operating systems, in a network that offered single sign-on (SSO).
At that time, most UNIX systems allowed users to access their resources as long as they had an account name and password.  Read more…
			
		 
		
	 
	
		
		
		
			An aide-memoir.  This example uses dual distribution layer switches for load-balancing VLAN traffic using MST: Read more…
			
		 
		
	 
	
		
		
		
			An NTP server can provide synchronised date and times for devices in a network. Since a router cannot be a Stratum 1 device (cannot connect to a Stratum 0 device such as a GPS clock), a router is not an accurate source of time information. If this is not important to you, then using a router as an NTP server may be acceptable. Read more…
			
		 
		
	 
	
		
		
		
			Moving your applications into “the cloud” means that round-trip times and protocol and application latency can become a serious issue.
The Riverbed Virtual Steelhead Appliance, a software version of Riverbed Technology’s WDS solution is worth considering:
 Read more…
			
		 
		
	 
	
		
		
		
			Bob Gilbert discusses how Riverbed Technology RSP provides “one-box” solution for local delivery of virtualized industry-standard applications, speeding up your network:
 Read more…
			
		 
		
	 
	
		
		
		
			When multiple WAEs exist in a service group, WCCPv2 automatically  distributes redirected traffic across all WAEs in the service group.  When traffic passes through an IOS device with WCCPv2 redirection  configured, the IOS device assigns traffic for that connection to a  bucket. Read more…