and ISIS two kinds of IGP protocols, and OSPF should be much wider than ISIS, the students who understand OSPF and the number of OSPF are far greater than ISIS, so it is more necessary to have a good review Spf--shorest path Tree's path selection principle.
Here again to review the SPF algorithm, understanding of SPF, CSPF is based on SPF evolved. It is also a
IS-IS Basic ConceptsTechnorati label: CCIS, ISP, IS-IS, IS first. ISIS --- Intermediate System-Intermediate system ---- Intermediate system terminology: IS: Intermediate System Intermediate system (Router) DIS: Designated Intermediate system specify Intermediate system (Designated Router) ES: end system (Host) SysID: System ID (Router ID) PDU: Packet data unit packet data unit (IP Packet) LSP: link State Protocol Data unit Link State Data unit (ospf l
(config-if) # ip add 3.3.3.3 255.255.255.255 P (config-if) # no sh R4PE2 (config) # int f0/0PE2 (config-if) # ip add 100.1.1.6 255.255.255.252PE2 (config-if) # no shPE2 (config) # int F0/1PE2 (config-if) # ip add 192.168.2.1 255.255.255.0PE2 (config-if) # no shPE2 (config) # int lo0PE2 (config-if) # ip add 4.4.4.4 255.255.255.255 R5: CE2 (config) # int s0/1CE2 (config-if) # ip add 192.168.2.2 255.255.255.0CE2 (config-if) # no shCE2 (config) # int lo0CE2 (config-if) # ip add 5.5.5.5 255.255.255.
IP OSPF priority command?Router-id 223.255.255.255.Why not 255.255.255.255? Because BGP can only recognize 223.255.255.255, if you set a Router-id greater than 223.255.255.255, BGP and OSPF redistribution will be problematic ( BGP and OSPF must use the same router-id when doing BGP and OSPF redistribution
Some of the other redistribution considerations:
1. Redistribution only once on the same router. If you redistribute the RIP into OSPF and then reassign OSPF to
The links listed below are online documents, and enthusiasts who are interested in information security can serve as an introductory guide.
Background knowledge
General knowledge
Sun Certified-solaris 910 Security Administrator Learning Guide
PICOCTF Information
Application software Security
Code specification for owasp security Code
Vulnerability Mining
Windows ISV Software Security Defense
Mobile Security
OWASP Ten mobile phone security risks
Network security
General Network Attack type
Revers
. seft (ios_base: Scientific, ios_base: floatfield); // set the fractional output form to scientific notationS. unsetf (ios_base: floatfield); // clear the flag of the floatfield FieldOther member functionsThe IOS class also provides several other member functions to control the output domain format. The function prototype is as follows:Int ios_base: width (); // returns the current width. The default value is 0.Int ios_base: width (int n); // set the width.Char IOs: Fill ();Char IOs: Fill (char
This is an interview question for someone in early October. After-sales position: Senior Network Engineer. The interviewer is a three-member CCIE. The interview lasted more than two hours, and he was very impressed. Now this offer is basically determined, and the subject is still considering situations such as treatment and work pressure before deciding whether to accept this offer. the subject also posted interview questions on his blog, so I am also daring to post them.
1. In the current 650
The WebOS team of HP has announced that more Open webOS source code will be released to the development community in the next few months. Today, the Team released the UI widgets of Enyo 2, the JavaScript kernel of the platform, and a new browser named Isis.
Isis provides stronger support for plug-ins and Flash. It is implemented through QtWebKit, which was initially an open-source engine by Nokia. WebOS's
(from the already dead time and again finally hung out of the Baidu space manually rescued, published on 2014-06-24)In order to eliminate the browser to the default CSS settings, keep the Web page in each browser look consistent, the initialization of CSS is very necessary! A lot of the time, the style incompatibility problem can be solved by CSS initialization code. Some common scenarios are listed below:1. The most resource-consuming, simplest2. Selective initialization example (synthesis)Body
; 4 fieldset, img{Border: 0;} fieldset, img{Border: 0;} fieldset, img{Border: 0;} 1. input, select, and textarea also have borders by default. Their borders are not cleared in the Reset based on the idea of graceful degradation. When the background image is modified, remember to clear the border; 5 table{Border-collapse: collapse; border-spacing: 0;} table{Border-collapse: collapse; border-spacing: 0;} table{Border-collapse: collapse; border-spacing: 0;}-6q: before, q: after{Content: ";} q: befo
Web page
When the paragraph label p should be used in the paragraph there are many abuses of the newline label BR, p used to represent the paragraph is recognized. Based on the same logic, many tags should be used to define certain textual elements, such as references, abbreviations, and computer code.
It should be remembered that although most browsers deal with these tags in different ways, it is important to remember that it is not about what the element looks like, but what it gives it.
Init
such as the famous GNU (GNU ' s not Unix), PHP (Php:hypertext preprocessor)
Reply content:Cool. Because it's interesting.
Douglas Hofstadter was first used, in the set of the wall [1] wrote the abbreviation of God, "God over Djinn", the book became in 1976, later known as recursive acronym [2]. Later hackers like to make this joke at the time of naming, and GNU is a little later.
Excerpted from Wikipedia [3]
[1] Gödel, Escher, Bach:an Eternal Golde
Web page
In the production of Web pages, text content is essential! So how do we make the correct layout of the page text?
When the paragraph label p should be used in the paragraph there are many abuses of the newline label BR, p used to represent the paragraph is recognized. Based on the same logic, many tags should be used to define certain textual elements, such as references, abbreviations, and computer code.It should be remembered that although most browsers deal with these tags in differe
Original:http://www.sovavsiti.cz/css/abbr.html
Translation:junchen
Copyright: Translator Junchen All, reprint please contact the translator.
Brief introduction
add the appropriate markup XHTML tags,Windows Internet Explorer temporarily does not support
This IE bug (or feature) has made some Web site personnel think that
Solving method
This method is based on a simple fact: even IE ignores
code example
Take a look at the following code, an example of a simple
between the parent and child elements, there will be a problem. In ie6-, you can set all the Li styles through #nav li{}, and then overwrite the style with #nav Li *{}.Adjacent sibling selector: used to locate an element after an element under the same parent element, such as h2+p. If there is a comment between the target elements, IE7 also has a bug.Property selector:You can find an element based on whether a property exists or the value of the property.Select whether an element has a property
, if it is IE, replace all tags with the modified version (embedded ). Note that we have to use regular expressions and the innerHTML property to replace the standard Dom method, because IE cannot get properties through the DOM.
Styling
Finally, take a look at the CSS used on this page. Quite simple:
ABBR, acronym, SPAN.ABBR {Cursor:help;border-bottom:1px dashed #000;}Mozilla and Opera use the ABBR and acronym
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.