注册 | 登录读书好,好读书,读好书!
读书网-DuShu.com
当前位置: 首页出版图书科学技术计算机/网络网络与数据通信CiscoCISCO路由器配置导论:英文版

CISCO路由器配置导论:英文版

CISCO路由器配置导论:英文版

定 价:¥53.00

作 者: (英)[L.查普尔]Laura Chappell著
出版社: 清华大学出版社
丛编项: CISCO系列丛书 影印版
标 签: Cisco

购买这本书可以去


ISBN: 9787302034629 出版时间: 2002-01-01 包装: 平装
开本: 23cm 页数: 560 字数:  

内容简介

  内容简介本书包含有关路由模型,进程和设计的翔实的技术细节,可以作为设计,实现或支持基于TCP、IP、IPX、SPX,APPLETALK,SNA,DECNET和BANYANVINES协议的网络互连的参考手册。本书主要包括三部分:I.介绍网络互连的相关概念和理论,主要介绍物理层,数据链路层,网络层的协议以及基本路由器的配置;II详细介绍TCP、IP协议,也包括NOVELIPX,APPLETALK协议的配置方法等;III.介绍WAN的通信,包括WAN的连接,X25和帧中继的配置等。本书特别适合于参加CCNA考试的读者。Cisco公司把本书作为CCNA的正式课本。对于其他读者,本书可以使他们增加对影响网络通信和安全的基础理论的理解。

作者简介

暂缺《CISCO路由器配置导论:英文版》作者简介

图书目录

     Contents
   PART 1 INTRODUCTION TO INTERNETWORKING
    Chapter 1 The Internetworking Model
    The Evolution of Networks
    1960s and 1970s: Centralized Processing
    1970s and 1980s: Networks
    1980s and 1990s: Internetworks
    1990s: Global Internetworking
    Network Types and Devices
    Local-Area Networks (LANs)
    Wide-Area Networks (WANs)
    Enterprise Networks
    Network Design Goals
    The Layered Model
    Why Use a Layered Model?
    Application Layer
    Presentation Layer
    Session Layer
    Transport Layer
    Network Layer
    Data Link Layer
    Physical Layer
    Peer-to-Peer Communications
    Data Encapsulation and Headers
    Step 1: Buildthe Data
    Step 2: Package Data for End-to-End Transport
    Step 3: Append Network Address in Header
    Step 4: Append Local Address
    in Data-Link Header
    Step 5: Convert to Bits for Transmission
    Summary
    Chapter One Test: The Internetworking Model
    Applications and Upper Layers
    Application Layer
    Presentation Layer
    Text and Data Formatting and Conversion
    Graphics Formatting and Conversion
    Audio and Video Formatting and Conversion
    Session Layer
    Transport Layer
    Multiplexing
    Connection-Oriented Sessions
    Flow Control and Congestion Avoidance
    Flow Control with Windowing
    Positive Acknowledgment
    Summary
    Chapter 2 Test: Applications and Upper Layers
    Physical and Data Link Layers
    Basic Data-Link and Physical Layer Functions
    LAN Standards and Standards Organizations
    LAN Data Link Sublayers
    LLC Sublayer Functions
    MAC Sublayer Functions
    Physical and Logical Addressing
    MAC Addresses
    Finding the MAC Address
    Common LAN Technologies
    Ethernet and IEEE 802.3
    The Ethernet/802.3 Physical Layer
    The Ethernet/802.3 Interface
    Ethernet/802.3 Operation
    Ethernet/802.3 Broadcasts and Multicasts
    Ethernet Frame Types
    Ethernet/802.3 Reliability
    High-Speed Ethernet Options
    Token Ring and IEEE 802.5
    Physical Layer: Token Ring/802.5
    The Token Ring/802.5 Interface
    Token Ring/802.5 Operation
    Token Rmg/802.5 Media Control
    Token Ring/802.5 Active Monitor
    Token Ring/802.5 Reliability
    FDDI
    Physical Layer: FDDI
    The FDDI Interface
    FDDI Dual-Ring Reliability
    Common WAN Technologies
    Physical Layer: WAN
    Data Link Layer: WAN Protocols
    Synchronous Data Link Control (SDLC)
    High-Level Data Link Control (HDLC)
    Link Access Procedure, Balanced (LAPB)
    Frame Relay
    Point-to-Point Protocol (PPP)
    Integrated Services Digital Network (ISDN)
    Summary
    Chapter 3 Test: Physical and Data Link Layers
    Chapter 4 Network Layer and Path Determination
    Network Layer Basics
    Path Determination
    Communicating Path Information
    Addressing: Network and Host
    Protocol Addressing Variations
    TCP/IP Network Addressing
    Other Protocol Addressing
    Routing Uses Network Addresses
    Routed Versus Routing Protocol
    Routed Protocol
    Routing Protocol
    Network-Layer Protocol Operations
    Multiprotocol Routing
    Static Versus Dynamic Routes
    Static Route Example
    Default Route
    Adapting to Topology Change
    Dynamic Routing Operations
    Representing Distance with Metrics
    Routing Protocols
    Distance Vector Routing
    Distance Vector Network Discovery
    Distance Vector Topology Changes
    Problem: Routing Loops
    Symptom: Counting to Infinity
    Solution: Defining a Maximum
    Solution: Split Horizon
    Solution: Poison Reverse
    Solution: Hold-Down Timers
    Solution: Triggered Updates
    Implementing Solutions in Multiple Routes
    Link-State Routing
    Link-State Network Discovery
    Link-State Topology Changes
    Link-State Concerns
    Problem: Link-State Updates
    Solution: Link-State Mechanisms
    Comparing Distance Vector Routing to Link-State
    Routing
    Hybrid Routing
    Basic Routing Processes
    LAN-to-LAN Routing
    LAN-to-WAN Routing
    Summary
    Chapter four Test: Network Layer
    and Path Determination
    Chapter 5 Basic Router Operations
    Starting Up a Router
    External Configuration Sources
    Internal Configuration Components
    RAM/DRAM
    NVRAM
    Flash Memory
    ROM
    Interfaces
    Auxiliary Ports
    System Startup Overview
    Accessing the User Interface
    Router Modes
    User EXEC Mode
    Privileged EXEC Mode
    ROM Monitoi- Mode
    Setup Mode
    RXBoot Mode
    Global Configuration Mode
    Other Configuration Modes
    Logging In to the Router
    Using Passwords
    Individual Line Passwords
    Privileged EXEC Mode Password
    Encrypted Passwords
    Using a Password
    User Mode Command List
    Privileged Mode Command List
    Context-Sensitive Help
    Using Enhanced Editing Commands
    Reviewing Command History
    Examining Router Status
    show version Command
    show startup-config Command
    and show running-config Command
    show interfaces Command
    show protocols Command
    Summary
    Chapter Five Test: Basic Router Operations
    Chapter 6 Configuring a Router
    Loading Configuration Files
    Loading Configuration Files-
    Releases Before 10.3
    Loading Configuration Files from a TFTP Server
    Fundamental Configuration Tasks
    Overview of Router Modes
    Configuring Router Identification
    Password Configuration
    Console Password
    Virtual Terminal Password
    Privileged EXEC Mode Password
    Password Encryption
    Configuring and Managing an Interface
    The show interfaces Command
    Interpreting Interface Status
    Configuring a Serial Line
    Determining DCE/DTE Status
    Verifying Your Changes
    Shutting Down an Interface
    Verifying Configuration Changes-
    Release 10.3 and Later
    Verifying Configuration Changes-
    Releases Before 10.3
    Saving Configuration Changes--Release 10.3+ 152
    Saving Configuration Changes-
    Releases Before 10.3
    Managing the Configuration Environment
    Locating the Cisco lOS Software
    Determining the Current
    Configuration Register Value
    Boot System Options in Software
    Preparing for a Network Backup Image
    Viewing Available Memory
    and the Image Filename
    Creating Software Image Backup
    Upgrading the Image from the Network
    Overwriting an Existing Image
    Creating or Changing a Configuration Using Setup
    Mode
    Setup Mode Global Parameters
    Setup Mode Interface Parameters
    Setup Mode Script Review
    Summary
    Chapter Six Test: Configuring a Router
    Discovering and Accessing Other Cisco Routers
    Cisco Discovery Protocol Overview
    Using CDP on a Local Router
    Altering CDP Parameters
    Showing CDP Neighbors
    Showing CDP Entries for a Neighboring Device
    Summary
    Chapter 7 Test: Discovering and Accessing
    Other Cisco Routers
    NETWORKING PROTOCOL SUITES
    TCP/IP Overview
    TCP/IP Protocol Stack
    Application Layer Overview
    Transport Layer Overview
    TCP Segment Format
    Port Numbers
    TCP Port Number
    TCP Handshake/Open Connection
    TCP Simple Acknowledgment and Windowing
    TCP Sequence and Acknowledgment Numbers
    UDP Segment Format
    Internet Layer Overview
    IP Datagram
    Internet Control Message Protocol (ICMP)
    ICMP Testing
   part 2 Address Resolution Protocol
    Reverse ARP
    Summary
    Chapter 8 Test: TCP/IP Overview
    Chapter 9 IP Addressing
    TCP/IP Address Overview
    IP Addressing Overview
    IP Address Classes
    IP Address Bit Patterns
    The First Octet Rule
    Concepts of IP Address Configuration
    Host Addresses
    Addressing Without Subnets
    Addressing with Subnets
    Subnetting Addressing
    Subnet Mask
    Decimal Equivalents of Bit Patterns
    Subnet Mask Without Subnets
    Subnet Mask with Subnets
    Subnet Planning
    Class B Subnet Planning Example
    Class C Subnet Planning Example
    Broadcast Addresses
    Configuration Commands
    Configuring IP Addresses
    IP Host Names
    Name Server Configuration
    Name-to-Address Schemes
    Display Host Names
    Verifying Address Configuration
    Telnet Command
    Simple Ping Command
    Extended Ping Command
    Trace Command
    Summary
    Chapter Nine Test: IP Address Configuration
    Chapter 10 IP Routing Configuration
    Basic Mechanisms and Commands of IP Routing
    Setting Up the Initial IP Routing Table
    Understanding How IP Routing
    Learns Destinations
    Specifying Administrative Distance Values
    Configuring Static Routes
    Configuring Default Routers
    Grouping into Autonomous Systems
    Using Interior or Exterior Routing Protocols
    Routing Protocol Problems
    Interior IP Routing Protocols
    Completing the IP Routing Configuration Tasks
    Configuring Dynamic Routing
    Configuring RIP
    Configuring RIP Router Commands
    Viewing IP RIP Information
    Configuring IGRP
    Understanding IGRP Operation
    Flash Updates
    Poison Reverse
    Holddowns
    Split Horizon
    Using the IGRP Composite Metric
    Unequal-Cost Load Balancing Feature
    Creating an IGRP Routing Process
    Displaying IGRP Routing Information
    Summary
    Chapter Ten Test: IP Routing Configuration
    Chapter 11 Configuring Novell IPX
    IPX Routing Overview
    Cisco Routers in NetWare Networks
    Novell NetWare Protocol Suite
    Key Novell NetWare Features
    Novell IPX Addressing
    How to Determine the IPX Address
    Multiple Novell Encapsulations
    Novell and Cisco Encapsulation Names
    Novell Uses RIP for Routing
    SAP: Supporting Service Advertisements
    GNS: The Get Nearest Server Process
    Configuring IPX Routing
    Novell IPX Global Configuration Commands
    ipx routing Command
    ipx maximum-paths Command
    ipx route destination-net next-hop Command
    Novell IPX Interface Configuration Commands
    interface Command
    ipx network Command
    Novell IPX Configuration Example
    Verifying and Monitoring IPX Routing
    Monitoring the Status of an IPX Interface
    Monitoring IPX Routing Tables
    Monitoring the Novell IPX Servers
    Monitoring IPX Traffic
    Troubleshooting IPX Routing
    Troubleshooting IPX SAP
    Summary
    Chapter Eleven Test: Configuring Novell IPX
    Chapter 12 Configuring AppleTalk
    AppleTalk Overview
    AppleTalk Protocol Stack
    AppleTalk Features
    Nonextended or Extended Networks
    AppleTalk Addressing
    Extended Addressing
    AppleTalk Address Acquisition
    Limiting Requests for Services
    AppleTalk Services
    Locating AppleTalk Services
    Configuring AppleTalk
    AppleTalk Configuration Tasks
    AppleTalk Configuration Commands
    appletalk routing Command
    appletalk protocol Command
    appletalk cable-range Command
    appletalk zone Command
    AppleTalk Configuration Example
    Discovery Mode
    Discovery Mode Example
    Verifying Your AppleTalk Configuration
    Monitoring AppleTalk
    Summary
    Chapter Twelve Test: Configuring AppleTalk
    Chapter 13 Basic Traffic Management with Access Lists
    Access Lists Overview
    Why Use Access Lists?
    Standard Access Lists
    Extended Access Lists
    How Access Lists Work
    A List of Tests: Deny or Permit
    Access List Command Overview
    How to Identify Access Lists
    TCP/IP Access Lists
    Testing Packets with IP Access Lists
    Key Concepts for IP Access Lists
    How to Use Wildcard Mask Bits
    Matching Any IP Address
    Matching a Specific IP Host Address
    IP Standard Access Configuration
    Example 1: Permit My Network Only
    Example 2: Deny a Specific Host
    Example 3: Deny a Specific Subnet
    Extended IP Access Lists
    Extended Access List Configuration
    Example 1: Deny FTP for EO
    Example 2: Deny Only Telnet out of EO;
    Permit All Other Traffic
    Named Access Lists
    Where to Place IP Access Lists
    Verifying Access Lists
    Monitoring Access List Statements
    Novell IPX Access Lists
    Testing Packets Using Novell Access Lists
    Key Concepts for IPX Access Lists
    Controlling IPX Overhead
    IPX Standard Access List Configuration
    Standard IPX Access List Example
    IPX Extended Access List Configuration
    Normal IPX SAP Operation
    How to Use SAP Filters
    SAP Filter Configuration Commands
    Verifying IPX Access Lists
    AppleTalk Access Lists
    Testing Packets Using AppleTalk Access Lists
    AppleTalk Network Structures
    Key Concepts for AppleTalk Access Lists
    AppleTalk Access List Procedures
    AppleTalk Access List Commands
    ZIP Reply Filter Configuration
    Verifying AppleTalk Access Lists
    Summary
    Chapter Thirteen Test: Basic Traffic Management
    with Access Lists
   PART 3 WlDE-AREA NETWORKING
    Chapter 14 Introduction to WAN Connections
    WAN Services
    Interfacing WAN Service Providers
    Customer Premises Equipment (CPE)
    Demarcation
    Local Loop
    Central Office (CO) Switch
    Toll Network
    Subscriber to Provider Interface
    Using WAN Services with Routers
    WAN Frame Format Summary
    An Overview of PPP
    Layering PPP Elements
    PPP LCP Configuration Options
    PPP Session Establishment
    Phase 1: Link Establishment
    Phase 2: Authentication (Optional)
    Phase 3: Network-Layer Protocol
    Selecting a PPP Authentication Protocol
    PAP
    CHAP
    Configuring PPP Authentication
    Verifying PPP
    Summary
    Chapter Fourteen Test:
    Introduction to Serial Connections
    Chapter 15 Configuring X.25
    X.25 Overview
    X.25 Protocol Stack
    X.25 DTE and DCE
    X.25 (X.12l) Addressing Format
    X.25 Encapsulation
    X.25 Virtual Circuits
    SVC Usage
    Single Protocol Virtual Circuits
    Multiprotocol Virtual Circuits
    Configuring X.25
    encapsulation x25 Command
    x25 address Command
    x25 map Command
    X.25 Configuration Example
    Additional Configuration Tasks
    Configuring X.25 VC Ranges
    Configuring X.25 Packet Sizes
    Configuring X.25 Window Parameters
    X.25 Additional Configuration Example
    Setting Up the Router as a Switch
    X.25 Local and XOT Switching
    Monitoring X.25
    Summary
    Chapter Fifteen Test: Configuring X.25
    Chapter 16 Configuring Frame Relay
    Frame Relay Overview
    - Frame Relay Terminology
    Local Access Rate
    Data-Link Connection Identifier (DLCI)
    Local Management Interface (LMI) 401
    Committed Information Rate (CIR) 402
    Oversubscription
    Committed Burst (Bc)
    Excess Burst
    Forward Explicit Congestion Notification
    (FECN)
    Backward Explicit Congestion Notification
    (BECN)
    Discard Eligibility (DE) Indicator
    Frame Relay Operation
    Configuring Frame Relay
    Configuring Optional Commands
    Verifying Frame Relay Operation
    Selecting a Frame Relay Topology
    Star Topology
    Full-Mesh Topology
    Partial-Mesh Topology
    Reachability and Resource Issues for Frame Relay
    Resolving Reachability and Resource Issues:
    Subinterfaces
    Configuring Subinterfaces
    Multipoint Subinterfaces Configuration Example
    Point-to-Point Subinterfaces
    Configuration Example
    Summary
    Chapter Sixteen Test: Configuring Frame Relay
    APPENDIXES
    Appendix A Chapter Test Answer Key
    Appendix B Configuring DECnet
    Overview of DECnet
    Node Assignments
    Routers Pass Information
    Designated Routers
    Level 1 and Level 2 Routing
    DECnet Configuration Commands
    DECnet Configuration Tasks
    DECnet Configuration Commands
    DECnet Configuration Example
    Configuring DECnet Access Lists
    DECnet Access List Commands
    Controlling DECnet Example
    Monitoring DECnet
    Appendix C Configuring Banyan VINES
    VINES Overview
    Network Number
    Subnet Number
    Cisco VINES Network Number
    Host Address Assignment
    Hello Messages
    Configuring VINES
    VINES Configuration Commands
    VINES Access Lists
    Monitoring VINES Operation
    Appendix D Autolnstalling Configuration Data
    Appendix E Decimal to Hexadecimal
    and Binary Conversion Table
    Appendix F Password Recovery
    Technique #1
    Technique #2
   Appendix G Frame Relay Examples and Configurations
   AppleTalk over Frame Relay Example
   Configuring IPX over Frame Relay Example
   Frame Relay Switching Example
   Appendix H Glossary
   Index
   

本目录推荐