Answer Posted / deepak
Boot Process
ROM - bootstrap
- the system bootstrap routine starts from ROM and tells the
router to run the POST and then look for an IOS in Flash memory
- router runs the POST (Power-On Self Test)
FLASH ( IOS--->DRAM)
- looks for a compressed IOS image in Flash Memory
· if an IOS is found, it is decompressed and loaded
into DRAM
· if no IOS is found the bootstrap routine can either
load an image from a TFTP server or from the included CD
that come with the router
NVRAM (Config--->DRAM)
- the router looks to NVRAM for a startup config
· if a startup config is found in NVRAM it is loaded
into DRAM
· if there is no startup config in NVRAM, then the
router goes into *setup mode
DRAM (ARP cache and routing tables)
- the DRAM is now loaded with the IOS and config, and the
router sends out ARP’s and Routing protocol broadcasts to
build it’s ARP cache and routing tables and store them in
DRAM. This is now the operating memory of the router. All
other types of memory are fairly dormant from this point on.
* setup mode is an interactive, step-by-step process with
only very basic global commands. You can enter setup mode
at any time from priviledged mode by typing “setup”. There
are two versions: Basic Management and Extended Setup
Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
Explain the types of communication in ipv6 ?
Explain the terms unicast, multicast, broadcast.
What is HDLC?
What is the different between console port and auxiliary port?
What is formula of hold down time of eigrp protocol?
What is the subnetmask of / 27 in network based and host based?
What is the difference between static ip addressing and dynamic ip addressing?
What causes a triggered update to reset the router hold-down timer?
What is the igp (interior gateway protocol)?
Mention what are the ranges for the private ips?
Explain the difference between arp and rarp?
What are some standards supported by the Presentation layer?
When ip confliction accord in subnet which ip assigned automatically and what it called?
How do we do encryption and authentication in L2F?
What is the attenuation?