《Cisco路由器配置导论 英文版》求取 ⇩

Chapter1 The Internetworking Model3

The Evolution of Networks3

1960s and 1970s:Centralized Processing3

PART1 INTRODUCTION TO INTERNETWORKING3

1970s and 1980s:Networks4

Presentation Layer5

1980s and 1990s:Internetworks6

1990s:Global Internetworking7

NetworkTypes and Devices9

Local-Area Networks(LANs)9

Wide-Area Networks(WANs)10

Enterprise Networks12

Network Design Goals13

The Layered Model14

Why Use a Layered Model?14

Application Layer15

Session Layer16

Transport Layer16

Network Layer16

Data Link Layer16

Physical Layer16

Peer-to-Peer Communications17

Data Encapsulation and Headers18

Step1:Build the Data19

Step2:Package Data for End-to-End Transport20

Step3:Append Network Address in Header20

Step4:Append Local Address in Data-Link Header20

Step5: Convert to Bits for Transmission20

Summary21

Chapter One Test: The Internetworking Model22

Reviewing Command History24

Application Layer25

Chapter2 Applications and Upper Layers25

Text and Data Formatting and Conversion27

Pressentation Layer27

Graphics Formatting and Conversion28

Audio and Video Formatting and Conversion28

Session Layer28

Transport Layer29

Multiplexing30

Connection-Oriented Sessions31

Flow Control and Congestion Avoidance32

Flow Control with Windowing33

Positive Acknowledgment35

Summary36

Chapter Two Test:Applications and Upper Layers37

Chapter3 Physical and Data Link Layers39

Basic Data-Link and Physical Layer Functions39

LAN Standards and Standards Organizations40

LAN Data Link Sublayers41

LLC Sublayer Functions42

MAC Sublayer Functions42

Physical and Logical Addressing43

MAC Addresses43

Finding the MAC Address44

Common LAN Technologies46

Ethernet and IEEE802.346

The Ethernet/802.3Physical Layer47

The Ethernet/802.3Interface48

Ethernet/802.3Operation49

Ethernet/802.3Broadcasts and Multicasts50

Ethernet Frame Types50

Ethernet/802.3Reliability52

High-Speed Ethernet Options53

Token Ring and IEEE802.555

Physical Layer: Token Ring/802.556

The Token Ring/802.5 Interface57

Token Ring/802.5 Operation58

Token Ring/802.5 Media Control59

Token Ring/802.5 Active Monitor60

Token Ring/802.5 Reliability60

FDDI61

Physical Layer: FDDI62

The FDDI Interface63

FDDI Dual-Ring Reliability63

Common WAN Technologies64

Physical Layer: WAN66

High-Level Data Link Control(HDLC)67

Link Access Procedure, Balanced(LAPB)67

Synchronous Data Link Control(SDLC)67

Data Link Layer: WAN Protocols67

Point ╰o-Point Protocol (PPP)68

Integrated Services Digital Network(ISDN)68

Summary68

Frame Relay68

Chapter Three Test: Physical and Data Link Layers69

Chapter4 Network Layer and Path Determination71

Network Layer Basics71

Path Determination72

Communicating Path Information73

Addressing: Network and Host74

Protocol Addressing Variations75

TCP/IP Network Addressing76

Other Protocol Addressing77

Routing Uses Network Addresses78

Routed Versus Routing Protocol79

Routed Protocol79

Routing Protocol79

Network-Layer Protocol Operations80

Multiprotocol Routing81

Static Versus Dynamic Routes82

Static Route Example82

Default Roure83

Adapting to Topology Change84

Dynamic Routing Operations85

Representing Distance with Metrics86

Routing Protocols87

Distance Vector Routing88

Distance Vector Network Discovery89

Distance Vector Topology Changes90

Problem: Routing Loops91

Symptom: Counting to Infinity92

Solution: Defining a Maximum92

Solution: Poison Reverse93

Solution: Split Horizon93

Solution: Hold-Down Timers94

Solution: Triggered Updates95

Implementing Solutions in Multiple Routes96

Link-State Routing98

Link-State Network Discovery98

Link-State Topology Changes100

Link-State Concerns100

Problem: Link-State Updates101

Solution: Link-State Mechanisms103

Comparing Distance Vector Routing to Link-State Routing103

Hybrid Routing104

Basic Routing Processes105

LAN-to-LAN Routing105

LAN-to-WAN Routing106

Summary107

Chapter Four Test: Network Layer and Path Determination108

Chapter5 Basic Router Operations111

Starting Up a Router111

External Configuration Sources112

Internal Configuration Components113

RAM/DRAM113

NVRAM113

Flash Memory113

ROM114

Interfaces114

Auxiliary Ports114

System Startup Overview114

Accessing the User Interface116

Router Modes116

ROM Monitor Mode117

Privileged EXEC Mode117

User EXEC Mode117

RXBoot Mode118

Global Configuration Mode118

Setup Mode118

Other Configuration Modes119

Logging In to the Router119

Using Passwords119

Individual Line Passwords120

Privileged EXEC Mode Password120

Encrypted Passwords120

Using a Password121

User Mode Command121

Privileged Mode Command List122

Context-Sensitive Help123

Using Enhanced Editing Commands123

Examining Router Status125

show version Command127

show startup-config Command and show running-config Command128

show interfaces Command128

show protocols Command130

Summary130

Chapter Five Test: Basic Router Operations131

Chapter6 Configuring a Router133

Loading Configuration Files134

Loading Configuration Files—Releases Before10.3135

Loading Configuration Files from a TFTP Server135

Fundamental Configuration Tasks136

Overview of Router Modes136

Configuring Router Identification138

Password Configuration140

Console Password140

Privileged EXEC Mode Password141

Virtual Terminal Password141

Password Encryption142

Configuring and Managing an Interface142

The show interfaces Command143

Interpreting Interface Status144

Configuring a Serial Line145

Determining DCE/DTE Status147

Verifying Your Changes148

Shutting Down an Interface148

Verifying Configuration Changes—Release 10.3and Later149

Saving Configuration Changes—Release10.3+152

Saving Configuration Changes—Releases Before10.3153

Managing the Configuration Environment153

Locating the Cisco IOS Software154

Determining the Current Configuration Register Value155

Boot System Options in Software157

Preparing for a Network Backup Image158

Viewing Available Memory and the Image Filename159

Greating Software Image Backup161

Upgrading the Image from the Network162

Overwriting an Existing Image164

Creating or Changing a Configuration Using Setup Mode165

Setup Mode Global Parameters166

Setup Mode Interface Parameters167

Setup Mode Script Review168

Summary169

Chapter Six Test: Configuring a Router170

Chapter7 Discovaring and Accessing Other Cisco Routers175

Cisco Discovery Protocol Overvew175

Using CDP on a Local Router177

Altering CDP Parameters178

Showing CDP Neighbors179

Showing CDP Entries for a Neighboring Device180

Summary181

Chapter Seven Test: Discovering and Accessing Other Cisco Routers182

PART2 NETWORKING PROTOCOL SUITES187

Chapter8 TCP/IP Overview187

TCP/IP Protocol Stack188

Application LayerOverview189

Transport Layer Overview190

TCP Segment Format191

Port Numbers192

TCP Port Numbers193

TCP Handshake/Open Connection194

TCP Simple Acknowledgment and Windowing195

TCP Sequence and Acknowledgment Numbers197

Internet Layer Overview198

UDP Segment Format198

IP Datagram199

Internet Control Message Protocol(ICMP)200

ICMP Testing201

Address Resolution Protocol203

Reverse ARP203

Summary204

Chapter Eight Test: TCP/IP Overview205

Chapter9 IP Addressing207

TCP/IP Address Overview207

IP Addressing Overview208

IP Address Classes209

IP Address Bit Patterns210

The First Octet Rule211

Host Addresses212

Concepts of IP Address Configuration212

Addressing Without Subnets213

Addressing with Subnets214

Subnetting Addressing215

Subnet Mask216

Decimal Equivalents of Bit Patterns216

Subner Mask Without Subnets217

Subnet Planning218

Subnet Mask with Subnets218

Class B Subnet Planning Example220

Class C Subnet Planning Example220

Broadcast Addresses221

Configuration Commands222

Configuring IP Addresses223

IP Host Names224

Name Server Configuration224

Display Host Names225

Name-to-Address Schemes225

Verifying Address Configuration226

Telnet Command227

Simple Ping Command227

Extended Ping Command228

Trace Command229

Smmary230

Chapter Nine Test: IP Address Configuration231

Chapter10 IP Routing Configuration233

Basic Mechanisms and Commands of IP Routing233

Setting Up the Initial IP Routing Table233

Understanding How IP Routing Learns Destinations235

Specifying Administrative Distance Values235

Configuring Static Routes237

Configuring Default Routers239

Grouping into Autonomous Systems239

Using Interior or Exterior Routing Protocols240

Routing Protocol Problems242

Interior IP Routing Protocols242

Completing the IP Routing Configuration Tasks243

Configuring Dynamic Routing243

Configuring RIP244

Configuring RIP Router Commands245

Viewing IP RIP Information247

Configuring IGRP249

Understanding IGRP Operation250

Flash Updates250

Poison Reverse250

Holddowns250

Split Horizon251

Using the IGRP Composite Metric251

Unequal-Cost Load Balancing Feature253

Creating an IGRP Routing Process254

Displaying IGRP Routing Information256

Summary258

Chapter Ten Test: IP Routing Configuration259

Chapter11 Configuring Novell IPX263

IPX Routing Overview263

Cisco Routers in NetWare Networks263

Novell NetWare Protocol Suite264

Key Novell NetWare Features265

Novell IPX Addressing267

How to Determine the IPX Address267

Multiple Novell Encapsulations268

Novell and Cisco Encapsulation Names269

Novell Uses RIP for Routing270

SAP: Supporting Service Advertisements272

GNS: The Get Nearest Server Process273

Configuring IPX Routing274

Novell IPX Global Configuration Commands275

ipx routing Command275

ipx maximum-paths Command275

ipx route destination-net next-hop Command276

Novell IPX Interface Configuration Commmands276

interface Command276

ipx network Command276

Novell IPX Configuration Example277

Verifying and Monitoring IPX Routing278

Monitoring the Status of an IPX Interface279

Monitoring IPX Routing Tables280

Monitoring the Novell IPX Servers282

Monitoring IPX Traffic283

Troubleshooting IPX Routing283

Troubleshooting IPX SAP284

Summary285

Chapter Eleven Test: Configuring Novell IPX286

Chapter12 Configuring Apple Talk289

Apple Talk Oveview289

Apple Talk Protocol Stack289

Apple Talk Features291

Nonextended or Extended Networks291

Apple Talk Addressing292

Extended Addressing293

AppleTalk Address Acquisition294

Limiting Requests for Services295

Apple Talk Services296

Locating Apple TalkServices297

Configuring Apple Talk298

AppleTalk Configuration Tasks298

appletalk protocol Command299

appletalk routing Command299

AppleTalk Configuration Commands299

appletalk cable-range Command300

appletalk zone Command300

Apple Talk Configuration Example300

Discovery Mode302

Discovery Mode Example303

Verifying Your Apple Talk Configuration304

Monitoring AppleTalk305

Summary307

Chapter Twelve Test: Configuring AppleTalk308

Chapter13 Basic Traffic Management with Access Lists311

Access Lists Overview311

WhyUse Access Lists?311

Standard Access Lists313

Extended Access Lists313

How Access Lists Work314

A List of Tests: Deny or Permit315

Access List Command Overview317

How to Identify Access Lists317

TCP/IP Access Lists318

Testing Packets with IP Access Lists319

Key Concepts for IP Access Lists319

How to Use Wildcard Mask Bits320

Matching Any IP Address322

Matching a Specific IP Host Address323

IP Standard Access Configuration324

Example1: Permit My Network Only324

Example2: Deny a Specific Host325

Example3: Deny a Specific Subnet326

Expended IP Access Lists327

Extended Access List Configuration328

Example1: Deny FTP for EO329

Example2: Deny Only Telnet out of E0; Permit All Other Traffic330

Named Access Lists331

Where to Place IP Access Lists333

Verifying Access Lists333

Monitoring Access List Statements334

Novell IPX Access Lists334

Testing Packets Using Novell Access Lists335

Key Concepts for IPX Access Lists335

Controlling IPX Overhead337

IPX Standard Access List Configuration338

Standard IPX Access List Example339

IPX Extended Access List Configuration340

Normal IPX SAP Operation341

How to Use SAP Filters342

SAP Filter Configuration Commands343

AppleTalk Access Lists346

Verifying IPX Access Lists346

Testing Packets Using AppleTalk Access Lists347

AppleTalk Network Structures348

Key Concepts for AppleTalk Access Lists349

AppleTalk Access List Procedures350

AppleTalk Access List Commands351

ZIP Reply Filter Configuration352

Verifying AppleTalk Access Lists353

Summary353

Chapter Thirteen Test: Basic Traffic Management with Access Lists354

PART3 WIDE-AREA NETWORKING359

Chapter14 Introduction to WAN Connections359

WAN Services359

Interfacing WAN Service Providers360

Customer Premises Equipment(CPE)361

Demarcation361

Toll Network362

Local Loop362

Central Office(CO)Switch362

Subscriber to Provider Interface363

Using WAN Services with Routers364

WAN Frame Format Summary364

An Overview of PPP366

Layering PPP Elements367

PPP LCP Configuration Options368

PPP Session Establishment369

Phase1: Link Establishment369

Phase2: Authentication(Optional)369

Phase3: Network-Layer Protocol370

Selecting a PPP Authentication Protocol370

PAP370

CHAP371

Configuring PPP Authentication372

Summary374

Verifying PPP374

Chapter Fourteen Test: Introduction to Serial Connections375

Chapter15 Configuring X.25377

X.25 Overview377

X.25 Protocol Stack378

X.25 DTE and DCE379

X.25{X.121}Addressing Format380

X.25Encapsulation382

X.25Virtual Circuits382

SVC Usage383

Single Protocol Virtual Circuits384

Multiprotocol Virtual Circuits385

Configuring X.25385

encapsulation x25 Command386

x25 map Command387

x25 address Command387

x.25 Configuration Example388

Additional Configuration Tasks389

Configuring X.25 VC Ranges389

Configuring X.25 Packer Sizes390

Configuring X.25 Window Parameters391

X.25 Additional Configuration Example392

Setting Up the Router as a Switch393

X.25 Local and XOT Switching394

Monitoring X.25395

Summary396

Chapter Fifteen Test: Configuring X.25397

Chapter 16 Configuring Frame Relay399

Frame Relay Overview399

Data-Link Connection Identifier(DLCI)400

Frame Relay Terminology400

Local Access Rate400

Local Management Interface(LMI)401

Committed Information Rate(CIR)402

Oversubscription402

Committed Burst(Bc)402

Excess Burst402

Forward Explicit Congestion Notification (FFCN)403

Backward Explicit Congestion Notification(BECN)403

Discard Eligibility(DE)Indicator403

Frame Relay Operation403

Configuring Frame Relay405

Configuring Optional Commands407

Verifying Frame Relay Operation408

Selecting a Frame Relay Topology409

Partial-Mesh Topology410

Reachability and Resource Issues for Frame Relay410

Star Topology410

Full-Mesh Toplogy410

Resolving Reachability and Resource Issues: Subinterfaces411

Configuring Subinterfaces413

Multipoint Subinterfaces Configuration Example414

Point-to-Point Subinterfaces Configuration Example416

Summary417

Chapter Sixteen Test: Configuring Frame Relay419

APPENDIXES423

Appendix A Chapter Test Answer Key423

Appendix B Configuring DECnet431

Overview of DECnet431

Node Assignments433

Designated Routers434

Routers Pass Information434

Level 1 and Level 2 Routing435

DECnet Configuration Commands435

DECnet Configuration Tasks435

DECnet Configuration Commands437

DECnet Configuration Example437

Configuring DECnet Access Lists438

DECnet Access List Commands439

Controlling DECnet Example439

Monitoring DECnet440

Appendix C Configuring Banyan VINES441

VINES Overview441

Network Number442

Subnet Number442

Hello Messages443

Host Address Assignment443

Cisco VINES Network Number443

Configuring VINES444

VINES Configuration Commands444

VINES Access Lists446

Monitoring VIENS Operation447

Appendix D Autolnstalling Configuration Data449

Appendix E Decimal to Hexadecimal and Binary Conversion Table453

Appendix F Password Recovery461

Technique #1462

Technique #2464

Appendix G Frame Relay Examples and Configurations467

AppleTalk over Frame Relay Example467

Configuring IPX over Frame Relay Example468

Frame Relay Switching Example470

Appendix H Glossary473

Index513

1999《Cisco路由器配置导论 英文版》由于是年代较久的资料都绝版了,几乎不可能购买到实物。如果大家为了学习确实需要,可向博主求助其电子版PDF文件(由(英)(L.查普尔)Laura Chappell著 1999 北京:清华大学出版社 出版的版本) 。对合法合规的求助,我会当即受理并将下载地址发送给你。

高度相关资料

西方自由民主研究(1990 PDF版)
西方自由民主研究
1990 重庆:重庆出版社
网络互联及路由器技术  第2版( PDF版)
网络互联及路由器技术 第2版
劳动力配置系统论(1989年08月第1版 PDF版)
劳动力配置系统论
1989年08月第1版
WINDOWS 95中文版实用配置手册(1996 PDF版)
WINDOWS 95中文版实用配置手册
1996
商学导论(英文版 )(1998年04月第1版 PDF版)
商学导论(英文版 )
1998年04月第1版 东北财经大学出版社
配器法  德版(1976 PDF版)
配器法 德版
1976
IP Routing fundamentals = IP 路由器技术原理 (影印版)(1999 PDF版)
IP Routing fundamentals = IP 路由器技术原理 (影印版)
1999 清华大学出版社
运筹学导论  英文版  第6版(1999 PDF版)
运筹学导论 英文版 第6版
1999 机械工业出版社
配电装置(1998 PDF版)
配电装置
1998 北京:中国电力出版社
Windows 95中文版配置与使用(1998 PDF版)
Windows 95中文版配置与使用
1998 天津:天津科学技术出版社
Cisco TCP/IP路由管理专业参考(1999 PDF版)
Cisco TCP/IP路由管理专业参考
1999 北京:机械工业出版社
商学导论  英文版(1998 PDF版)
商学导论 英文版
1998 沈阳:东北财经大学出版社
劳动力配置系统论(1989 PDF版)
劳动力配置系统论
1989 北京:劳动人事出版社
中国社会治安综合治理年鉴  1995-1996(1998 PDF版)
中国社会治安综合治理年鉴 1995-1996
1998 北京:法律出版社
IPv6网络互连与Cisco路由器(1999 PDF版)
IPv6网络互连与Cisco路由器
1999 北京:机械工业出版社