While running the show version command on a Cisco 2600 series router during a Live Lab session I see that it reports :-
32K bytes of non-volatile configuration memory.
8192K bytes of processor board System flash (Read/Write)
Aren't these two memory types not essentially the same ? Why is there separate NVRAM and System Flash memory in the router ? Cannot the system startup config files and IOS images all not just be stored in Flash memory ? I am puzzled as to why the separate NVRAM memory is required by the router.
In current implementations the distinction between the memory types gets smaller and there are some models in which it is possible to store the config file in flash and to boot the router using the config in flash rather than in NVRAM (I recently tested this in an 1841 router). But historically the types of memory used (SRAM EPROM) were different, had different capacities, and different operating characteristics. So the current distinction of NVRAM and Flash are there mostly for historical reasons.
dear rossua994, can i sum up your answer that flash memory is just have higher capacity than the NVRAM, but by convention in routers we save startup configurations in NVRAM and IOS in the flash....but literally both are permanent memories in case..is that you saying exactly..??
i am still confused..hope to get the reply soon..!!
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...