Have you ever wondered what’s on the mind of an Internet Guru? What’s the 411 on IPv6, QoS, Smart Grid, IP Technologies?
Now's your chance to ask the expert. We invite you to submit your burning technology questions for this month’s featured expert Fred Baker (Wikipedia bio)
Fred has been involved in data communications since 1978, and in Internet technology since 1986. At Cisco, where he has worked since 1994, he is a Cisco Fellow, which is to say a senior engineer charged with advising on both business and product decisions. He has contributed to over 40 IETF protocols and holds several US patents and is a former member of the Technical Advisory Council of the FCC.
Fred has worked at the forefront of IP technology and can dish on topics such as:
4G mobile Internet
Role of IP in the migration from 3G to 4G
IPv6 and its deployment
QoS (quality of service)
IP routing technologies
How do I post a question? 1. Log into the community with your cisco.com ID and password and post your questions in the comment section of this blog 2. Don't have a cisco.com login? Complete this short registration form and then log in to the community (top right of screen).
Post your questions now and Fred will answer them in this mobility community September 15 through September 18.
Hey folks, backgroundI am merging two ASes, AS100 and AS300. AS100 runs ISIS level-2-only and has SR enabled. AS300 runs ospf and ospfv3 and has LDP enabled. I have interconnected iosxr-9k-3 in AS100 to iosxrv-5 AS300 using a physical link and r...
I routinely have to lifecycle 50+ from a site. One of the longest parts of this process is documenting and transferring specifics onto the new phone profile IE. Extension, Identifying name, ECT.Is there anyway to transfer a phone profile to a different ty...
Hello,during SMU installation on NCS5501-SE, IOS XR 7.1.2 I almost run out of a disk space. Here is the warning%HA-HA_WD-3-DISK_ALARM_ALERT : A monitored device / ( rootfs:/ ) is above 80% utilization. Current utilization = 85. Please remove unwanted user...
Hi, Guys, There are multiple IS-IS instances which are both running with Level-2 only in the network, and I do not want to leak the routes between these IS-IS instances, how to implement this stuff? Appreciate!