图书介绍
TCP/IP 路由技术·卷1pdf电子书版本下载
- Jeff Doyle 著
- 出版社: 北京:清华大学出版社
- ISBN:7302029490
- 出版时间:1999
- 标注页数:1026页
- 文件大小:27MB
- 文件页数:1053页
- 主题词:
PDF下载
下载说明
TCP/IP 路由技术·卷1PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如 BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
Foreword 1
Part Ⅰ Routing Basics 3
Chapter 1 Basic Concepts:Internetworks,Routers,and Addresses 4
Bicycles with Motors 6
Data Link Addresses 7
Repeaters and Bridges 11
Routers 18
Network Addresses 22
Looking Ahead 25
Recommended Reading 25
Review Questions 26
Chapter 2 TCP/IP Review 28
The TCP/IP Protocol Layers 29
The IP Packet Header 32
IP Addresses 40
The First Octet Rule 45
Address Masks 48
Subnets and Subnet Masks 51
Designing Subnets 55
Breaking the Octet Boundary 57
Troubleshooting a Subnet Mask 62
ARP 63
Proxy ARP 69
Reverse ARP 72
Gratuitous ARP 72
ICMP 73
The Host-to-Host Layer 78
TCP 78
UDP 83
Looking Ahead 84
Summary Table:Chapter 2 Command Review 85
Recommended Reading 85
Review Questions 86
Configuration Exercises 87
Troubleshooting Exercises 88
Chapter 3 Statie Routing 90
The Route Table 92
Configuring Static Routes 97
Case Study:Simple Static Routes 97
Case Study:Summary Routes 101
Case Study:Alternative Routes 103
Case Study:Floating Static Routes 105
Case Study:Load Sharing 109
Per Destination Load Sharing and Fast Switching 110
Per Packet Load Sharing and Process Switching 111
Case Study:Recursive Table Lookups 113
Troubleshooting Static Routes 114
Case Study:Tracing a Failed Route 115
Case Study:A Protocol Conflict 121
Looking Ahead 126
Summary Table:Chapter3Command Review 126
Review Questions 127
Configuration Exercises 128
Troubleshooting Exercises 130
Chapter 4 Dynamic Routing Protocols 136
Routing Protocol Basics 138
Path Determination 138
Metrics 141
Band width 142
Hop Count 142
Load 143
Delay 143
Reliability 143
Cost 144
Convergence 144
Load Balancing 146
Distance Vector Routing Protocols 146
Common Characteristics 148
Periodic Updates 148
Neighbors 148
Broadcast Updates 148
Routing by Rumor 149
Full Routing Table Updates 149
Route Invalidation Timers 151
Split Horizon 152
Counting to Infinity 156
Triggered Updates 157
Holddown Timers 158
Asynchronous Updates 158
Link State Routing Protocols 160
Neighbors 161
Link State Flooding 162
The Link State Database 173
The SPF Algorithm 176
Areas 181
Interior and Exterior Gateway Protocols 183
Static or Dynamic Routing? 185
Looking Ahead 186
Recommended Reading 186
Reivew Questions 188
Part Ⅱ Interior Routing Protocols 189
Chapter 5 Routing Information Protocol(RIP) 190
Operation of RIP 192
RIP Timers and Stability Features 193
RIP Message Format 196
Request Message Types 199
Classful Routing 200
Classful Routing:Directly Connected Subnets 201
Classful Routing:Summarization at Boundary Routers 203
Classful Routing:Summary 205
Configuring RIP 205
Case Study:A Basic RIP Configuration 205
Case Study:Passive Interfaces 207
Case Study:Configuring Unicast Updates 210
Case Study:Discontiguous Subnets 212
Case Study:Manipulating RIP Metrics 216
Troubleshooting RIP 219
Recommended Reading 220
Looking Ahead 220
Summary Table:Chapter 5Command Review 220
Review Questions 221
Configuration Exercises 221
Troubleshooting Exercises 223
Chapter 6 Interior Gateway Routing Protocol(IGRP) 230
Operation of IGRP 232
IGRP Timers and Stability Features 235
IGRP Metrics 237
IGRP Packet Format 245
Configuring IGRP 249
Case Study:ABasic IGRP Configuration 250
Case Study:Unequal-Cost Load Balancing 251
Case Study:Setting Maximum Paths 256
Case Study:Multiple IGRP Processes 257
Troubleshooting IGRP 260
Case Study:Unequal-Cost Load Balancing, Again 261
Case Study:A Segmented Network 263
Looking Ahead 266
Summary Table:Chapter 6 Command Review 267
Recommended Reading 268
Review Questions 268
Configuration Exercises 269
Troubleshooting Exercises 273
Chapter 7 Routing Information Protocol Version 2 280
Operation of RIPv2 282
RIPv2 Message Format 282
Compatibility with RIPv1 286
Classless Route Lookups 287
Classless Routing Protocols 287
Variable-Length Subnet Masking 288
Authentication 292
Configuring RIPv2 296
Case Study:A Basic RIPv2 Configuration 297
Case Study:Compatibility with RIPv1 297
Case Study:Using VLSM 300
Case Study:Discontiguous Subnets and Classless Routing 303
Case Study:Authentication 306
Troubleshooting RIPv2 309
Case Study:Misconfigured VLSM 310
Looking Ahead 317
Summary Table:Chapter7 Commmand Review 317
Recommended Reading 318
Review Questions 318
Configuration Exercises 319
Troubleshooting Exercises 321
Chapter 8 Enhanced Interior Gateway Routing Protocol(EIGRP) 326
Operation of EIGRP 329
Protocol-Dependdent Modules 330
Reliable Transport Protocol 331
Neighbor Discovery/Recovery 333
The Diffusing Update Algorithm 335
DUAL:Preliminary Concepts 335
The DUAL Finite State Machine 345
Diffusing Computation:Example1 349
Diffusing Computation:Example2 354
EIGRP Packet Formats 363
The EIGRP Packet Header 363
General TLV Fields 365
IP-Specific TLV Fileds 366
Address Aggregation 371
Configuring EIGRP 376
Case Study:A Basic EIGRP Configuration 377
Case Study:Redistribution with IGRP 379
Case Study:Disabling Automatic Summarization 383
Case Study:Address Aggregation 384
Authentication 385
Troubleshooting EIGRP 387
Case Study:A Missing Neighbor 388
Stuck-in-Active Neighbors 394
Summary Table:Chapter 8 Command review 399
Looking Ahead 399
Review Questions 401
Configuration Exercises 402
Troubleshooting Exercises 404
Chapter 9 Open Shortest Path First 408
Operation of OSPF 410
Neighbors and Adjacencies 412
The Hello Protocol 413
Nework Types 415
Designated Routers and Backup Designated Routers 418
OSPF Interfaces 423
OSPF Neighbors 430
Flooding 450
Areas 457
Pouter Types 460
Partitioned Areas 462
Virtual Links 463
The Link State Database 466
LSA Types 470
Stub Areas 479
The Route Table 485
Destination Types 486
Path Types 487
Route Table Lookups 490
OSPF over Demand Circuits 491
Authentication 491
OSPF Packer Formats 493
The Packet Header 495
The Hello Packet 498
The Database Description Packet 499
The Link State Request Packet 501
The Link State Update Packet 502
The Link State Acknowledgment Packet 503
OSPF LSA Formats 504
The LSA Header 504
The Router LSA 506
The Network LSA 509
The Network and ASBR Summary LSAs 510
The Autonomous System External LSA 512
The NSSA External LSA 513
The Options Field 515
Configuring OSPF 516
Case Study:A Basic OSPF Configuration 516
Case Study:Setting Router IDs with Loopback Interfaces 520
Case Study:Domain Name Service Lookups 525
Case Study:OSPF and Secondary Addresses 526
Case Study:Stub Areas 531
Case Study:Totally Stubby Areas 536
Case Study:Not-So-Stubby Areas 537
Case Study:Address Summarization 545
Case Study:Authentication 550
Case Study:Virtual Links 553
Case Study:OSPF on NBMA Networks 555
Case Study:OSPF over Demand Circuits 565
Troubleshooting OSPF 567
Case Study:An Isolated Area 572
Case Study:Misconfigured Summarization 577
Looking Ahead 581
Summary Table:Chapter 9 Command Review 581
Recommended Reading 583
Review Questions 584
Configuration Exercises 585
Troubleshooting Exercises 588
Chatper 10 Integrated IS-IS 592
Operation of Integrated IS-IS 595
IS-IS Areas 597
Network Entity Titles 600
IS-IS Functional Qrganization 603
Subnetwork Dependent Functions 604
Subnetwork Independent Functions 610
IS-IS PDU Formats 621
CLV Fields 624
The IS-IS Hello PDU Format 627
The IS-IS Link State PDU Format 636
The IS-IS Sequence Numbers PDU Format 646
Configuring Integrated IS-IS 647
Case Study:A Basic Integrated IS-IS Configuration 650
Case Study:Changing the Router Types 655
Case Study:An Area Migration 660
CaSe Study: Route Summarization 664
Case Study:Authentication 668
Troubleshooting Integrated IS-IS 671
Troubleshooting IS-IS Adjacencies 672
Troubleshooting the IS-IS Link State Database 673
Case Study:Integrated IS-IS on NBMA Networks 678
Looking Ahead 684
Summary Table:Chapter 10 Command Review 685
Review Questions 686
Configuration Exercises 688
Troubleshooting Exercises 690
Part Ⅲ Route Control and Interoperability 693
Chapter11 Route Redistribution 694
Principles of Redistribution 698
Metrics 698
Administrative Distances 699
Redistributing from Classless to Classful Protocols 707
Configuring Redistribution 712
Case Study:Redistributing IGRP and RIP 715
Case Study:Redistributing EIGRP and OSPF 717
Case Study:Redistribution and Route Summarization 722
Case Study:Redistributing IS-IS and RIP 730
Case Study:Redistributing Static Routes 733
Looking Ahead 737
Summary Table:Chapter 11 Command Review 738
Review Questions 738
Configuration Exercises 739
Troubleshooting Exercises 740
Chapter 12 Default Routes and On-Demand Routing 742
Fundamentals of Default Routes 744
Fundamentals of On-Demand Routing 746
Configuring Default Routes and ODR 750
Case Study:Static Default Routes 751
Case Study:The Default-Network Command 755
Case Study:The Default-Information Originate Command 758
Case Study:Configuring On-Demand Routing 763
Looking Ahead 764
Summary Table:Chapter 12 Command Review 765
Review Questions 765
Chapter 13 Route Filtering 768
Configuring Route Filters 771
Case Study:Filtering Specific Routes 772
Case Study:Route Filtering and Redistribution 776
Case Study:A Protocol Migration 780
Case Study:Multiple Redistribution Points 787
Case Study:Using Distances to Set Router Preferences 794
Looking Ahead 797
Summary Table:Chapter 13 Commad Review 797
Configuration Exercises 798
Troubleshooting Exercises 801
Chapter 14 Route Maps 804
Basic Uses of Route Maps 805
Configuring Route Maps 809
Case Study:Policy Routing 812
Case Study:Policy Routing and Quality of Service Routing 820
Case Study:Route Maps and Redistribution 824
Case Study:Route Tagging 829
Looking Ahead 836
Summary Table:Chapter 14 Command Review 837
Review Questions 839
Configuration Exercises 839
Troubleshooting Exercises 841
Part Ⅳ Appendixes 843
Appendix A Tutorial:Working with Binary and Hex 844
Working with Binaty Numbers 847
Working with Hexadecimal Numbers 849
Appendix B Tutorial:Access Lists 852
Access List Basics 854
Implicit Deny Any 856
Sequentiality 856
Access List Types 857
Editing Access Lists 861
Standard IP Access Lists 862
Extended IP Access Lists 865
TCP Access Lists 869
UDP Access Lists 870
ICMP Access Lists 871
Calling the Access List 871
Keyword Alternatives 875
Named Access Lists 876
Filter Placement Considerations 877
Access List Monitoring and Accounting 880
Appendix C CCIE Preparation Tips 882
Laying the Foundations 885
Hands-On Expertience 886
Intensifying the Study 887
The Final Six Months 888
Exam Day 889
Appendix D Answers to Review Questions 892
Chapter1 893
Chapter2 896
Chapter3 900
Chapter4 902
Chapter5 905
Chapter6 906
Chapter7 907
Chapter8 908
Chapter9 911
Chapter10 914
Chapter11 916
Chapter12 917
Chapter14 918
Appendix E Solutions to Configuration Problems 920
Chapter2 921
Chapter3 931
Chapter5 935
Chapter6 938
Chapter7 939
Chapter8 942
Chapter9 943
Chapter10 948
Chapter11 958
Chapter13 959
Chapter14 962
Appendix F Solutions to Troubleshooting Exercises 966
Chapter2 967
Chapter3 968
Chapter5 968
Chapter6 970
Chapter7 970
Chapter8 970
Chapter9 971
Chapter10 971
Chapter11 972
Chapter13 972
Chapter14 973
Index 974