当前位置:首页 > 工业技术
TCP/IP 路由技术·卷1
TCP/IP 路由技术·卷1

TCP/IP 路由技术·卷1PDF电子书下载

工业技术

  • 电子书积分:26 积分如何计算积分?
  • 作 者:Jeff Doyle
  • 出 版 社:北京:清华大学出版社
  • 出版年份:1999
  • ISBN:7302029490
  • 页数:1026 页
图书介绍:
《TCP/IP 路由技术·卷1》目录
标签:路由 技术

Foreword 1

Part Ⅰ Routing Basics 3

Chapter 1 Basic Concepts:Internetworks,Routers,and Addresses 4

Bicycles with Motors 6

Data Link Addresses 7

Repeaters and Bridges 11

Routers 18

Network Addresses 22

Looking Ahead 25

Recommended Reading 25

Review Questions 26

Chapter 2 TCP/IP Review 28

The TCP/IP Protocol Layers 29

The IP Packet Header 32

IP Addresses 40

The First Octet Rule 45

Address Masks 48

Subnets and Subnet Masks 51

Designing Subnets 55

Breaking the Octet Boundary 57

Troubleshooting a Subnet Mask 62

ARP 63

Proxy ARP 69

Reverse ARP 72

Gratuitous ARP 72

ICMP 73

The Host-to-Host Layer 78

TCP 78

UDP 83

Looking Ahead 84

Summary Table:Chapter 2 Command Review 85

Recommended Reading 85

Review Questions 86

Configuration Exercises 87

Troubleshooting Exercises 88

Chapter 3 Statie Routing 90

The Route Table 92

Configuring Static Routes 97

Case Study:Simple Static Routes 97

Case Study:Summary Routes 101

Case Study:Alternative Routes 103

Case Study:Floating Static Routes 105

Case Study:Load Sharing 109

Per Destination Load Sharing and Fast Switching 110

Per Packet Load Sharing and Process Switching 111

Case Study:Recursive Table Lookups 113

Troubleshooting Static Routes 114

Case Study:Tracing a Failed Route 115

Case Study:A Protocol Conflict 121

Looking Ahead 126

Summary Table:Chapter3Command Review 126

Review Questions 127

Configuration Exercises 128

Troubleshooting Exercises 130

Chapter 4 Dynamic Routing Protocols 136

Routing Protocol Basics 138

Path Determination 138

Metrics 141

Band width 142

Hop Count 142

Load 143

Delay 143

Reliability 143

Cost 144

Convergence 144

Load Balancing 146

Distance Vector Routing Protocols 146

Common Characteristics 148

Periodic Updates 148

Neighbors 148

Broadcast Updates 148

Routing by Rumor 149

Full Routing Table Updates 149

Route Invalidation Timers 151

Split Horizon 152

Counting to Infinity 156

Triggered Updates 157

Holddown Timers 158

Asynchronous Updates 158

Link State Routing Protocols 160

Neighbors 161

Link State Flooding 162

The Link State Database 173

The SPF Algorithm 176

Areas 181

Interior and Exterior Gateway Protocols 183

Static or Dynamic Routing? 185

Looking Ahead 186

Recommended Reading 186

Reivew Questions 188

Part Ⅱ Interior Routing Protocols 189

Chapter 5 Routing Information Protocol(RIP) 190

Operation of RIP 192

RIP Timers and Stability Features 193

RIP Message Format 196

Request Message Types 199

Classful Routing 200

Classful Routing:Directly Connected Subnets 201

Classful Routing:Summarization at Boundary Routers 203

Classful Routing:Summary 205

Configuring RIP 205

Case Study:A Basic RIP Configuration 205

Case Study:Passive Interfaces 207

Case Study:Configuring Unicast Updates 210

Case Study:Discontiguous Subnets 212

Case Study:Manipulating RIP Metrics 216

Troubleshooting RIP 219

Recommended Reading 220

Looking Ahead 220

Summary Table:Chapter 5Command Review 220

Review Questions 221

Configuration Exercises 221

Troubleshooting Exercises 223

Chapter 6 Interior Gateway Routing Protocol(IGRP) 230

Operation of IGRP 232

IGRP Timers and Stability Features 235

IGRP Metrics 237

IGRP Packet Format 245

Configuring IGRP 249

Case Study:ABasic IGRP Configuration 250

Case Study:Unequal-Cost Load Balancing 251

Case Study:Setting Maximum Paths 256

Case Study:Multiple IGRP Processes 257

Troubleshooting IGRP 260

Case Study:Unequal-Cost Load Balancing, Again 261

Case Study:A Segmented Network 263

Looking Ahead 266

Summary Table:Chapter 6 Command Review 267

Recommended Reading 268

Review Questions 268

Configuration Exercises 269

Troubleshooting Exercises 273

Chapter 7 Routing Information Protocol Version 2 280

Operation of RIPv2 282

RIPv2 Message Format 282

Compatibility with RIPv1 286

Classless Route Lookups 287

Classless Routing Protocols 287

Variable-Length Subnet Masking 288

Authentication 292

Configuring RIPv2 296

Case Study:A Basic RIPv2 Configuration 297

Case Study:Compatibility with RIPv1 297

Case Study:Using VLSM 300

Case Study:Discontiguous Subnets and Classless Routing 303

Case Study:Authentication 306

Troubleshooting RIPv2 309

Case Study:Misconfigured VLSM 310

Looking Ahead 317

Summary Table:Chapter7 Commmand Review 317

Recommended Reading 318

Review Questions 318

Configuration Exercises 319

Troubleshooting Exercises 321

Chapter 8 Enhanced Interior Gateway Routing Protocol(EIGRP) 326

Operation of EIGRP 329

Protocol-Dependdent Modules 330

Reliable Transport Protocol 331

Neighbor Discovery/Recovery 333

The Diffusing Update Algorithm 335

DUAL:Preliminary Concepts 335

The DUAL Finite State Machine 345

Diffusing Computation:Example1 349

Diffusing Computation:Example2 354

EIGRP Packet Formats 363

The EIGRP Packet Header 363

General TLV Fields 365

IP-Specific TLV Fileds 366

Address Aggregation 371

Configuring EIGRP 376

Case Study:A Basic EIGRP Configuration 377

Case Study:Redistribution with IGRP 379

Case Study:Disabling Automatic Summarization 383

Case Study:Address Aggregation 384

Authentication 385

Troubleshooting EIGRP 387

Case Study:A Missing Neighbor 388

Stuck-in-Active Neighbors 394

Summary Table:Chapter 8 Command review 399

Looking Ahead 399

Review Questions 401

Configuration Exercises 402

Troubleshooting Exercises 404

Chapter 9 Open Shortest Path First 408

Operation of OSPF 410

Neighbors and Adjacencies 412

The Hello Protocol 413

Nework Types 415

Designated Routers and Backup Designated Routers 418

OSPF Interfaces 423

OSPF Neighbors 430

Flooding 450

Areas 457

Pouter Types 460

Partitioned Areas 462

Virtual Links 463

The Link State Database 466

LSA Types 470

Stub Areas 479

The Route Table 485

Destination Types 486

Path Types 487

Route Table Lookups 490

OSPF over Demand Circuits 491

Authentication 491

OSPF Packer Formats 493

The Packet Header 495

The Hello Packet 498

The Database Description Packet 499

The Link State Request Packet 501

The Link State Update Packet 502

The Link State Acknowledgment Packet 503

OSPF LSA Formats 504

The LSA Header 504

The Router LSA 506

The Network LSA 509

The Network and ASBR Summary LSAs 510

The Autonomous System External LSA 512

The NSSA External LSA 513

The Options Field 515

Configuring OSPF 516

Case Study:A Basic OSPF Configuration 516

Case Study:Setting Router IDs with Loopback Interfaces 520

Case Study:Domain Name Service Lookups 525

Case Study:OSPF and Secondary Addresses 526

Case Study:Stub Areas 531

Case Study:Totally Stubby Areas 536

Case Study:Not-So-Stubby Areas 537

Case Study:Address Summarization 545

Case Study:Authentication 550

Case Study:Virtual Links 553

Case Study:OSPF on NBMA Networks 555

Case Study:OSPF over Demand Circuits 565

Troubleshooting OSPF 567

Case Study:An Isolated Area 572

Case Study:Misconfigured Summarization 577

Looking Ahead 581

Summary Table:Chapter 9 Command Review 581

Recommended Reading 583

Review Questions 584

Configuration Exercises 585

Troubleshooting Exercises 588

Chatper 10 Integrated IS-IS 592

Operation of Integrated IS-IS 595

IS-IS Areas 597

Network Entity Titles 600

IS-IS Functional Qrganization 603

Subnetwork Dependent Functions 604

Subnetwork Independent Functions 610

IS-IS PDU Formats 621

CLV Fields 624

The IS-IS Hello PDU Format 627

The IS-IS Link State PDU Format 636

The IS-IS Sequence Numbers PDU Format 646

Configuring Integrated IS-IS 647

Case Study:A Basic Integrated IS-IS Configuration 650

Case Study:Changing the Router Types 655

Case Study:An Area Migration 660

CaSe Study: Route Summarization 664

Case Study:Authentication 668

Troubleshooting Integrated IS-IS 671

Troubleshooting IS-IS Adjacencies 672

Troubleshooting the IS-IS Link State Database 673

Case Study:Integrated IS-IS on NBMA Networks 678

Looking Ahead 684

Summary Table:Chapter 10 Command Review 685

Review Questions 686

Configuration Exercises 688

Troubleshooting Exercises 690

Part Ⅲ Route Control and Interoperability 693

Chapter11 Route Redistribution 694

Principles of Redistribution 698

Metrics 698

Administrative Distances 699

Redistributing from Classless to Classful Protocols 707

Configuring Redistribution 712

Case Study:Redistributing IGRP and RIP 715

Case Study:Redistributing EIGRP and OSPF 717

Case Study:Redistribution and Route Summarization 722

Case Study:Redistributing IS-IS and RIP 730

Case Study:Redistributing Static Routes 733

Looking Ahead 737

Summary Table:Chapter 11 Command Review 738

Review Questions 738

Configuration Exercises 739

Troubleshooting Exercises 740

Chapter 12 Default Routes and On-Demand Routing 742

Fundamentals of Default Routes 744

Fundamentals of On-Demand Routing 746

Configuring Default Routes and ODR 750

Case Study:Static Default Routes 751

Case Study:The Default-Network Command 755

Case Study:The Default-Information Originate Command 758

Case Study:Configuring On-Demand Routing 763

Looking Ahead 764

Summary Table:Chapter 12 Command Review 765

Review Questions 765

Chapter 13 Route Filtering 768

Configuring Route Filters 771

Case Study:Filtering Specific Routes 772

Case Study:Route Filtering and Redistribution 776

Case Study:A Protocol Migration 780

Case Study:Multiple Redistribution Points 787

Case Study:Using Distances to Set Router Preferences 794

Looking Ahead 797

Summary Table:Chapter 13 Commad Review 797

Configuration Exercises 798

Troubleshooting Exercises 801

Chapter 14 Route Maps 804

Basic Uses of Route Maps 805

Configuring Route Maps 809

Case Study:Policy Routing 812

Case Study:Policy Routing and Quality of Service Routing 820

Case Study:Route Maps and Redistribution 824

Case Study:Route Tagging 829

Looking Ahead 836

Summary Table:Chapter 14 Command Review 837

Review Questions 839

Configuration Exercises 839

Troubleshooting Exercises 841

Part Ⅳ Appendixes 843

Appendix A Tutorial:Working with Binary and Hex 844

Working with Binaty Numbers 847

Working with Hexadecimal Numbers 849

Appendix B Tutorial:Access Lists 852

Access List Basics 854

Implicit Deny Any 856

Sequentiality 856

Access List Types 857

Editing Access Lists 861

Standard IP Access Lists 862

Extended IP Access Lists 865

TCP Access Lists 869

UDP Access Lists 870

ICMP Access Lists 871

Calling the Access List 871

Keyword Alternatives 875

Named Access Lists 876

Filter Placement Considerations 877

Access List Monitoring and Accounting 880

Appendix C CCIE Preparation Tips 882

Laying the Foundations 885

Hands-On Expertience 886

Intensifying the Study 887

The Final Six Months 888

Exam Day 889

Appendix D Answers to Review Questions 892

Chapter1 893

Chapter2 896

Chapter3 900

Chapter4 902

Chapter5 905

Chapter6 906

Chapter7 907

Chapter8 908

Chapter9 911

Chapter10 914

Chapter11 916

Chapter12 917

Chapter14 918

Appendix E Solutions to Configuration Problems 920

Chapter2 921

Chapter3 931

Chapter5 935

Chapter6 938

Chapter7 939

Chapter8 942

Chapter9 943

Chapter10 948

Chapter11 958

Chapter13 959

Chapter14 962

Appendix F Solutions to Troubleshooting Exercises 966

Chapter2 967

Chapter3 968

Chapter5 968

Chapter6 970

Chapter7 970

Chapter8 970

Chapter9 971

Chapter10 971

Chapter11 972

Chapter13 972

Chapter14 973

Index 974

相关图书
作者其它书籍
返回顶部