图书介绍
Cisco路由器配置导论 英文版【2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载】

- (英)(L.查普尔)Laura Chappell著 著
- 出版社: 北京:清华大学出版社
- ISBN:7302034621
- 出版时间:1999
- 标注页数:534页
- 文件大小:16MB
- 文件页数:561页
- 主题词:
PDF下载
下载说明
Cisco路由器配置导论 英文版PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
Chapter1 The Internetworking Model3
The Evolution of Networks3
1960s and 1970s:Centralized Processing3
PART1 INTRODUCTION TO INTERNETWORKING3
1970s and 1980s:Networks4
Presentation Layer5
1980s and 1990s:Internetworks6
1990s:Global Internetworking7
NetworkTypes and Devices9
Local-Area Networks(LANs)9
Wide-Area Networks(WANs)10
Enterprise Networks12
Network Design Goals13
The Layered Model14
Why Use a Layered Model?14
Application Layer15
Session Layer16
Transport Layer16
Network Layer16
Data Link Layer16
Physical Layer16
Peer-to-Peer Communications17
Data Encapsulation and Headers18
Step1:Build the Data19
Step2:Package Data for End-to-End Transport20
Step3:Append Network Address in Header20
Step4:Append Local Address in Data-Link Header20
Step5: Convert to Bits for Transmission20
Summary21
Chapter One Test: The Internetworking Model22
Reviewing Command History24
Application Layer25
Chapter2 Applications and Upper Layers25
Text and Data Formatting and Conversion27
Pressentation Layer27
Graphics Formatting and Conversion28
Audio and Video Formatting and Conversion28
Session Layer28
Transport Layer29
Multiplexing30
Connection-Oriented Sessions31
Flow Control and Congestion Avoidance32
Flow Control with Windowing33
Positive Acknowledgment35
Summary36
Chapter Two Test:Applications and Upper Layers37
Chapter3 Physical and Data Link Layers39
Basic Data-Link and Physical Layer Functions39
LAN Standards and Standards Organizations40
LAN Data Link Sublayers41
LLC Sublayer Functions42
MAC Sublayer Functions42
Physical and Logical Addressing43
MAC Addresses43
Finding the MAC Address44
Common LAN Technologies46
Ethernet and IEEE802.346
The Ethernet/802.3Physical Layer47
The Ethernet/802.3Interface48
Ethernet/802.3Operation49
Ethernet/802.3Broadcasts and Multicasts50
Ethernet Frame Types50
Ethernet/802.3Reliability52
High-Speed Ethernet Options53
Token Ring and IEEE802.555
Physical Layer: Token Ring/802.556
The Token Ring/802.5 Interface57
Token Ring/802.5 Operation58
Token Ring/802.5 Media Control59
Token Ring/802.5 Active Monitor60
Token Ring/802.5 Reliability60
FDDI61
Physical Layer: FDDI62
The FDDI Interface63
FDDI Dual-Ring Reliability63
Common WAN Technologies64
Physical Layer: WAN66
High-Level Data Link Control(HDLC)67
Link Access Procedure, Balanced(LAPB)67
Synchronous Data Link Control(SDLC)67
Data Link Layer: WAN Protocols67
Point ╰o-Point Protocol (PPP)68
Integrated Services Digital Network(ISDN)68
Summary68
Frame Relay68
Chapter Three Test: Physical and Data Link Layers69
Chapter4 Network Layer and Path Determination71
Network Layer Basics71
Path Determination72
Communicating Path Information73
Addressing: Network and Host74
Protocol Addressing Variations75
TCP/IP Network Addressing76
Other Protocol Addressing77
Routing Uses Network Addresses78
Routed Versus Routing Protocol79
Routed Protocol79
Routing Protocol79
Network-Layer Protocol Operations80
Multiprotocol Routing81
Static Versus Dynamic Routes82
Static Route Example82
Default Roure83
Adapting to Topology Change84
Dynamic Routing Operations85
Representing Distance with Metrics86
Routing Protocols87
Distance Vector Routing88
Distance Vector Network Discovery89
Distance Vector Topology Changes90
Problem: Routing Loops91
Symptom: Counting to Infinity92
Solution: Defining a Maximum92
Solution: Poison Reverse93
Solution: Split Horizon93
Solution: Hold-Down Timers94
Solution: Triggered Updates95
Implementing Solutions in Multiple Routes96
Link-State Routing98
Link-State Network Discovery98
Link-State Topology Changes100
Link-State Concerns100
Problem: Link-State Updates101
Solution: Link-State Mechanisms103
Comparing Distance Vector Routing to Link-State Routing103
Hybrid Routing104
Basic Routing Processes105
LAN-to-LAN Routing105
LAN-to-WAN Routing106
Summary107
Chapter Four Test: Network Layer and Path Determination108
Chapter5 Basic Router Operations111
Starting Up a Router111
External Configuration Sources112
Internal Configuration Components113
RAM/DRAM113
NVRAM113
Flash Memory113
ROM114
Interfaces114
Auxiliary Ports114
System Startup Overview114
Accessing the User Interface116
Router Modes116
ROM Monitor Mode117
Privileged EXEC Mode117
User EXEC Mode117
RXBoot Mode118
Global Configuration Mode118
Setup Mode118
Other Configuration Modes119
Logging In to the Router119
Using Passwords119
Individual Line Passwords120
Privileged EXEC Mode Password120
Encrypted Passwords120
Using a Password121
User Mode Command121
Privileged Mode Command List122
Context-Sensitive Help123
Using Enhanced Editing Commands123
Examining Router Status125
show version Command127
show startup-config Command and show running-config Command128
show interfaces Command128
show protocols Command130
Summary130
Chapter Five Test: Basic Router Operations131
Chapter6 Configuring a Router133
Loading Configuration Files134
Loading Configuration Files—Releases Before10.3135
Loading Configuration Files from a TFTP Server135
Fundamental Configuration Tasks136
Overview of Router Modes136
Configuring Router Identification138
Password Configuration140
Console Password140
Privileged EXEC Mode Password141
Virtual Terminal Password141
Password Encryption142
Configuring and Managing an Interface142
The show interfaces Command143
Interpreting Interface Status144
Configuring a Serial Line145
Determining DCE/DTE Status147
Verifying Your Changes148
Shutting Down an Interface148
Verifying Configuration Changes—Release 10.3and Later149
Saving Configuration Changes—Release10.3+152
Saving Configuration Changes—Releases Before10.3153
Managing the Configuration Environment153
Locating the Cisco IOS Software154
Determining the Current Configuration Register Value155
Boot System Options in Software157
Preparing for a Network Backup Image158
Viewing Available Memory and the Image Filename159
Greating Software Image Backup161
Upgrading the Image from the Network162
Overwriting an Existing Image164
Creating or Changing a Configuration Using Setup Mode165
Setup Mode Global Parameters166
Setup Mode Interface Parameters167
Setup Mode Script Review168
Summary169
Chapter Six Test: Configuring a Router170
Chapter7 Discovaring and Accessing Other Cisco Routers175
Cisco Discovery Protocol Overvew175
Using CDP on a Local Router177
Altering CDP Parameters178
Showing CDP Neighbors179
Showing CDP Entries for a Neighboring Device180
Summary181
Chapter Seven Test: Discovering and Accessing Other Cisco Routers182
PART2 NETWORKING PROTOCOL SUITES187
Chapter8 TCP/IP Overview187
TCP/IP Protocol Stack188
Application LayerOverview189
Transport Layer Overview190
TCP Segment Format191
Port Numbers192
TCP Port Numbers193
TCP Handshake/Open Connection194
TCP Simple Acknowledgment and Windowing195
TCP Sequence and Acknowledgment Numbers197
Internet Layer Overview198
UDP Segment Format198
IP Datagram199
Internet Control Message Protocol(ICMP)200
ICMP Testing201
Address Resolution Protocol203
Reverse ARP203
Summary204
Chapter Eight Test: TCP/IP Overview205
Chapter9 IP Addressing207
TCP/IP Address Overview207
IP Addressing Overview208
IP Address Classes209
IP Address Bit Patterns210
The First Octet Rule211
Host Addresses212
Concepts of IP Address Configuration212
Addressing Without Subnets213
Addressing with Subnets214
Subnetting Addressing215
Subnet Mask216
Decimal Equivalents of Bit Patterns216
Subner Mask Without Subnets217
Subnet Planning218
Subnet Mask with Subnets218
Class B Subnet Planning Example220
Class C Subnet Planning Example220
Broadcast Addresses221
Configuration Commands222
Configuring IP Addresses223
IP Host Names224
Name Server Configuration224
Display Host Names225
Name-to-Address Schemes225
Verifying Address Configuration226
Telnet Command227
Simple Ping Command227
Extended Ping Command228
Trace Command229
Smmary230
Chapter Nine Test: IP Address Configuration231
Chapter10 IP Routing Configuration233
Basic Mechanisms and Commands of IP Routing233
Setting Up the Initial IP Routing Table233
Understanding How IP Routing Learns Destinations235
Specifying Administrative Distance Values235
Configuring Static Routes237
Configuring Default Routers239
Grouping into Autonomous Systems239
Using Interior or Exterior Routing Protocols240
Routing Protocol Problems242
Interior IP Routing Protocols242
Completing the IP Routing Configuration Tasks243
Configuring Dynamic Routing243
Configuring RIP244
Configuring RIP Router Commands245
Viewing IP RIP Information247
Configuring IGRP249
Understanding IGRP Operation250
Flash Updates250
Poison Reverse250
Holddowns250
Split Horizon251
Using the IGRP Composite Metric251
Unequal-Cost Load Balancing Feature253
Creating an IGRP Routing Process254
Displaying IGRP Routing Information256
Summary258
Chapter Ten Test: IP Routing Configuration259
Chapter11 Configuring Novell IPX263
IPX Routing Overview263
Cisco Routers in NetWare Networks263
Novell NetWare Protocol Suite264
Key Novell NetWare Features265
Novell IPX Addressing267
How to Determine the IPX Address267
Multiple Novell Encapsulations268
Novell and Cisco Encapsulation Names269
Novell Uses RIP for Routing270
SAP: Supporting Service Advertisements272
GNS: The Get Nearest Server Process273
Configuring IPX Routing274
Novell IPX Global Configuration Commands275
ipx routing Command275
ipx maximum-paths Command275
ipx route destination-net next-hop Command276
Novell IPX Interface Configuration Commmands276
interface Command276
ipx network Command276
Novell IPX Configuration Example277
Verifying and Monitoring IPX Routing278
Monitoring the Status of an IPX Interface279
Monitoring IPX Routing Tables280
Monitoring the Novell IPX Servers282
Monitoring IPX Traffic283
Troubleshooting IPX Routing283
Troubleshooting IPX SAP284
Summary285
Chapter Eleven Test: Configuring Novell IPX286
Chapter12 Configuring Apple Talk289
Apple Talk Oveview289
Apple Talk Protocol Stack289
Apple Talk Features291
Nonextended or Extended Networks291
Apple Talk Addressing292
Extended Addressing293
AppleTalk Address Acquisition294
Limiting Requests for Services295
Apple Talk Services296
Locating Apple TalkServices297
Configuring Apple Talk298
AppleTalk Configuration Tasks298
appletalk protocol Command299
appletalk routing Command299
AppleTalk Configuration Commands299
appletalk cable-range Command300
appletalk zone Command300
Apple Talk Configuration Example300
Discovery Mode302
Discovery Mode Example303
Verifying Your Apple Talk Configuration304
Monitoring AppleTalk305
Summary307
Chapter Twelve Test: Configuring AppleTalk308
Chapter13 Basic Traffic Management with Access Lists311
Access Lists Overview311
Why Use Access Lists?311
Standard Access Lists313
Extended Access Lists313
How Access Lists Work314
A List of Tests: Deny or Permit315
Access List Command Overview317
How to Identify Access Lists317
TCP/IP Access Lists318
Testing Packets with IP Access Lists319
Key Concepts for IP Access Lists319
How to Use Wildcard Mask Bits320
Matching Any IP Address322
Matching a Specific IP Host Address323
IP Standard Access Configuration324
Example1: Permit My Network Only324
Example2: Deny a Specific Host325
Example3: Deny a Specific Subnet326
Expended IP Access Lists327
Extended Access List Configuration328
Example1: Deny FTP for EO329
Example2: Deny Only Telnet out of E0; Permit All Other Traffic330
Named Access Lists331
Where to Place IP Access Lists333
Verifying Access Lists333
Monitoring Access List Statements334
Novell IPX Access Lists334
Testing Packets Using Novell Access Lists335
Key Concepts for IPX Access Lists335
Controlling IPX Overhead337
IPX Standard Access List Configuration338
Standard IPX Access List Example339
IPX Extended Access List Configuration340
Normal IPX SAP Operation341
How to Use SAP Filters342
SAP Filter Configuration Commands343
AppleTalk Access Lists346
Verifying IPX Access Lists346
Testing Packets Using AppleTalk Access Lists347
AppleTalk Network Structures348
Key Concepts for AppleTalk Access Lists349
AppleTalk Access List Procedures350
AppleTalk Access List Commands351
ZIP Reply Filter Configuration352
Verifying AppleTalk Access Lists353
Summary353
Chapter Thirteen Test: Basic Traffic Management with Access Lists354
PART3 WIDE-AREA NETWORKING359
Chapter14 Introduction to WAN Connections359
WAN Services359
Interfacing WAN Service Providers360
Customer Premises Equipment(CPE)361
Demarcation361
Toll Network362
Local Loop362
Central Office(CO)Switch362
Subscriber to Provider Interface363
Using WAN Services with Routers364
WAN Frame Format Summary364
An Overview of PPP366
Layering PPP Elements367
PPP LCP Configuration Options368
PPP Session Establishment369
Phase1: Link Establishment369
Phase2: Authentication(Optional)369
Phase3: Network-Layer Protocol370
Selecting a PPP Authentication Protocol370
PAP370
CHAP371
Configuring PPP Authentication372
Summary374
Verifying PPP374
Chapter Fourteen Test: Introduction to Serial Connections375
Chapter15 Configuring X.25377
X.25 Overview377
X.25 Protocol Stack378
X.25 DTE and DCE379
X.25{X.121}Addressing Format380
X.25Encapsulation382
X.25Virtual Circuits382
SVC Usage383
Single Protocol Virtual Circuits384
Multiprotocol Virtual Circuits385
Configuring X.25385
encapsulation x25 Command386
x25 map Command387
x25 address Command387
x.25 Configuration Example388
Additional Configuration Tasks389
Configuring X.25 VC Ranges389
Configuring X.25 Packer Sizes390
Configuring X.25 Window Parameters391
X.25 Additional Configuration Example392
Setting Up the Router as a Switch393
X.25 Local and XOT Switching394
Monitoring X.25395
Summary396
Chapter Fifteen Test: Configuring X.25397
Chapter 16 Configuring Frame Relay399
Frame Relay Overview399
Data-Link Connection Identifier(DLCI)400
Frame Relay Terminology400
Local Access Rate400
Local Management Interface(LMI)401
Committed Information Rate(CIR)402
Oversubscription402
Committed Burst(Bc)402
Excess Burst402
Forward Explicit Congestion Notification (FFCN)403
Backward Explicit Congestion Notification(BECN)403
Discard Eligibility(DE)Indicator403
Frame Relay Operation403
Configuring Frame Relay405
Configuring Optional Commands407
Verifying Frame Relay Operation408
Selecting a Frame Relay Topology409
Partial-Mesh Topology410
Reachability and Resource Issues for Frame Relay410
Star Topology410
Full-Mesh Toplogy410
Resolving Reachability and Resource Issues: Subinterfaces411
Configuring Subinterfaces413
Multipoint Subinterfaces Configuration Example414
Point-to-Point Subinterfaces Configuration Example416
Summary417
Chapter Sixteen Test: Configuring Frame Relay419
APPENDIXES423
Appendix A Chapter Test Answer Key423
Appendix B Configuring DECnet431
Overview of DECnet431
Node Assignments433
Designated Routers434
Routers Pass Information434
Level 1 and Level 2 Routing435
DECnet Configuration Commands435
DECnet Configuration Tasks435
DECnet Configuration Commands437
DECnet Configuration Example437
Configuring DECnet Access Lists438
DECnet Access List Commands439
Controlling DECnet Example439
Monitoring DECnet440
Appendix C Configuring Banyan VINES441
VINES Overview441
Network Number442
Subnet Number442
Hello Messages443
Host Address Assignment443
Cisco VINES Network Number443
Configuring VINES444
VINES Configuration Commands444
VINES Access Lists446
Monitoring VIENS Operation447
Appendix D Autolnstalling Configuration Data449
Appendix E Decimal to Hexadecimal and Binary Conversion Table453
Appendix F Password Recovery461
Technique #1462
Technique #2464
Appendix G Frame Relay Examples and Configurations467
AppleTalk over Frame Relay Example467
Configuring IPX over Frame Relay Example468
Frame Relay Switching Example470
Appendix H Glossary473
Index513
热门推荐
- 3237245.html
- 176119.html
- 2400121.html
- 3362046.html
- 1431285.html
- 3329077.html
- 289014.html
- 19320.html
- 3871796.html
- 1216875.html
- http://www.ickdjs.cc/book_2906309.html
- http://www.ickdjs.cc/book_3018431.html
- http://www.ickdjs.cc/book_3067146.html
- http://www.ickdjs.cc/book_2209195.html
- http://www.ickdjs.cc/book_2944496.html
- http://www.ickdjs.cc/book_261067.html
- http://www.ickdjs.cc/book_982303.html
- http://www.ickdjs.cc/book_446407.html
- http://www.ickdjs.cc/book_189474.html
- http://www.ickdjs.cc/book_1824625.html