• <big id="791nd"><optgroup id="791nd"></optgroup></big>
    <thead id="791nd"><dfn id="791nd"></dfn></thead>
    注冊(cè) | 登錄讀書好,好讀書,讀好書!
    讀書網(wǎng)-DuShu.com
    當(dāng)前位置: 首頁(yè)出版圖書科學(xué)技術(shù)計(jì)算機(jī)/網(wǎng)絡(luò)網(wǎng)絡(luò)與數(shù)據(jù)通信CiscoCISCO路由器配置導(dǎo)論:英文版

    CISCO路由器配置導(dǎo)論:英文版

    CISCO路由器配置導(dǎo)論:英文版

    定 價(jià):¥53.00

    作 者: (英)[L.查普爾]Laura Chappell著
    出版社: 清華大學(xué)出版社
    叢編項(xiàng): CISCO系列叢書 影印版
    標(biāo) 簽: Cisco

    ISBN: 9787302034629 出版時(shí)間: 2002-01-01 包裝: 平裝
    開本: 23cm 頁(yè)數(shù): 560 字?jǐn)?shù):  

    內(nèi)容簡(jiǎn)介

      內(nèi)容簡(jiǎn)介本書包含有關(guān)路由模型,進(jìn)程和設(shè)計(jì)的翔實(shí)的技術(shù)細(xì)節(jié),可以作為設(shè)計(jì),實(shí)現(xiàn)或支持基于TCP、IP、IPX、SPX,APPLETALK,SNA,DECNET和BANYANVINES協(xié)議的網(wǎng)絡(luò)互連的參考手冊(cè)。本書主要包括三部分:I.介紹網(wǎng)絡(luò)互連的相關(guān)概念和理論,主要介紹物理層,數(shù)據(jù)鏈路層,網(wǎng)絡(luò)層的協(xié)議以及基本路由器的配置;II詳細(xì)介紹TCP、IP協(xié)議,也包括NOVELIPX,APPLETALK協(xié)議的配置方法等;III.介紹WAN的通信,包括WAN的連接,X25和幀中繼的配置等。本書特別適合于參加CCNA考試的讀者。Cisco公司把本書作為CCNA的正式課本。對(duì)于其他讀者,本書可以使他們?cè)黾訉?duì)影響網(wǎng)絡(luò)通信和安全的基礎(chǔ)理論的理解。

    作者簡(jiǎn)介

    暫缺《CISCO路由器配置導(dǎo)論:英文版》作者簡(jiǎn)介

    圖書目錄

         Contents
       PART 1 INTRODUCTION TO INTERNETWORKING
        Chapter 1 The Internetworking Model
        The Evolution of Networks
        1960s and 1970s: Centralized Processing
        1970s and 1980s: Networks
        1980s and 1990s: Internetworks
        1990s: Global Internetworking
        Network Types and Devices
        Local-Area Networks (LANs)
        Wide-Area Networks (WANs)
        Enterprise Networks
        Network Design Goals
        The Layered Model
        Why Use a Layered Model?
        Application Layer
        Presentation Layer
        Session Layer
        Transport Layer
        Network Layer
        Data Link Layer
        Physical Layer
        Peer-to-Peer Communications
        Data Encapsulation and Headers
        Step 1: Buildthe Data
        Step 2: Package Data for End-to-End Transport
        Step 3: Append Network Address in Header
        Step 4: Append Local Address
        in Data-Link Header
        Step 5: Convert to Bits for Transmission
        Summary
        Chapter One Test: The Internetworking Model
        Applications and Upper Layers
        Application Layer
        Presentation Layer
        Text and Data Formatting and Conversion
        Graphics Formatting and Conversion
        Audio and Video Formatting and Conversion
        Session Layer
        Transport Layer
        Multiplexing
        Connection-Oriented Sessions
        Flow Control and Congestion Avoidance
        Flow Control with Windowing
        Positive Acknowledgment
        Summary
        Chapter 2 Test: Applications and Upper Layers
        Physical and Data Link Layers
        Basic Data-Link and Physical Layer Functions
        LAN Standards and Standards Organizations
        LAN Data Link Sublayers
        LLC Sublayer Functions
        MAC Sublayer Functions
        Physical and Logical Addressing
        MAC Addresses
        Finding the MAC Address
        Common LAN Technologies
        Ethernet and IEEE 802.3
        The Ethernet/802.3 Physical Layer
        The Ethernet/802.3 Interface
        Ethernet/802.3 Operation
        Ethernet/802.3 Broadcasts and Multicasts
        Ethernet Frame Types
        Ethernet/802.3 Reliability
        High-Speed Ethernet Options
        Token Ring and IEEE 802.5
        Physical Layer: Token Ring/802.5
        The Token Ring/802.5 Interface
        Token Ring/802.5 Operation
        Token Rmg/802.5 Media Control
        Token Ring/802.5 Active Monitor
        Token Ring/802.5 Reliability
        FDDI
        Physical Layer: FDDI
        The FDDI Interface
        FDDI Dual-Ring Reliability
        Common WAN Technologies
        Physical Layer: WAN
        Data Link Layer: WAN Protocols
        Synchronous Data Link Control (SDLC)
        High-Level Data Link Control (HDLC)
        Link Access Procedure, Balanced (LAPB)
        Frame Relay
        Point-to-Point Protocol (PPP)
        Integrated Services Digital Network (ISDN)
        Summary
        Chapter 3 Test: Physical and Data Link Layers
        Chapter 4 Network Layer and Path Determination
        Network Layer Basics
        Path Determination
        Communicating Path Information
        Addressing: Network and Host
        Protocol Addressing Variations
        TCP/IP Network Addressing
        Other Protocol Addressing
        Routing Uses Network Addresses
        Routed Versus Routing Protocol
        Routed Protocol
        Routing Protocol
        Network-Layer Protocol Operations
        Multiprotocol Routing
        Static Versus Dynamic Routes
        Static Route Example
        Default Route
        Adapting to Topology Change
        Dynamic Routing Operations
        Representing Distance with Metrics
        Routing Protocols
        Distance Vector Routing
        Distance Vector Network Discovery
        Distance Vector Topology Changes
        Problem: Routing Loops
        Symptom: Counting to Infinity
        Solution: Defining a Maximum
        Solution: Split Horizon
        Solution: Poison Reverse
        Solution: Hold-Down Timers
        Solution: Triggered Updates
        Implementing Solutions in Multiple Routes
        Link-State Routing
        Link-State Network Discovery
        Link-State Topology Changes
        Link-State Concerns
        Problem: Link-State Updates
        Solution: Link-State Mechanisms
        Comparing Distance Vector Routing to Link-State
        Routing
        Hybrid Routing
        Basic Routing Processes
        LAN-to-LAN Routing
        LAN-to-WAN Routing
        Summary
        Chapter four Test: Network Layer
        and Path Determination
        Chapter 5 Basic Router Operations
        Starting Up a Router
        External Configuration Sources
        Internal Configuration Components
        RAM/DRAM
        NVRAM
        Flash Memory
        ROM
        Interfaces
        Auxiliary Ports
        System Startup Overview
        Accessing the User Interface
        Router Modes
        User EXEC Mode
        Privileged EXEC Mode
        ROM Monitoi- Mode
        Setup Mode
        RXBoot Mode
        Global Configuration Mode
        Other Configuration Modes
        Logging In to the Router
        Using Passwords
        Individual Line Passwords
        Privileged EXEC Mode Password
        Encrypted Passwords
        Using a Password
        User Mode Command List
        Privileged Mode Command List
        Context-Sensitive Help
        Using Enhanced Editing Commands
        Reviewing Command History
        Examining Router Status
        show version Command
        show startup-config Command
        and show running-config Command
        show interfaces Command
        show protocols Command
        Summary
        Chapter Five Test: Basic Router Operations
        Chapter 6 Configuring a Router
        Loading Configuration Files
        Loading Configuration Files-
        Releases Before 10.3
        Loading Configuration Files from a TFTP Server
        Fundamental Configuration Tasks
        Overview of Router Modes
        Configuring Router Identification
        Password Configuration
        Console Password
        Virtual Terminal Password
        Privileged EXEC Mode Password
        Password Encryption
        Configuring and Managing an Interface
        The show interfaces Command
        Interpreting Interface Status
        Configuring a Serial Line
        Determining DCE/DTE Status
        Verifying Your Changes
        Shutting Down an Interface
        Verifying Configuration Changes-
        Release 10.3 and Later
        Verifying Configuration Changes-
        Releases Before 10.3
        Saving Configuration Changes--Release 10.3+ 152
        Saving Configuration Changes-
        Releases Before 10.3
        Managing the Configuration Environment
        Locating the Cisco lOS Software
        Determining the Current
        Configuration Register Value
        Boot System Options in Software
        Preparing for a Network Backup Image
        Viewing Available Memory
        and the Image Filename
        Creating Software Image Backup
        Upgrading the Image from the Network
        Overwriting an Existing Image
        Creating or Changing a Configuration Using Setup
        Mode
        Setup Mode Global Parameters
        Setup Mode Interface Parameters
        Setup Mode Script Review
        Summary
        Chapter Six Test: Configuring a Router
        Discovering and Accessing Other Cisco Routers
        Cisco Discovery Protocol Overview
        Using CDP on a Local Router
        Altering CDP Parameters
        Showing CDP Neighbors
        Showing CDP Entries for a Neighboring Device
        Summary
        Chapter 7 Test: Discovering and Accessing
        Other Cisco Routers
        NETWORKING PROTOCOL SUITES
        TCP/IP Overview
        TCP/IP Protocol Stack
        Application Layer Overview
        Transport Layer Overview
        TCP Segment Format
        Port Numbers
        TCP Port Number
        TCP Handshake/Open Connection
        TCP Simple Acknowledgment and Windowing
        TCP Sequence and Acknowledgment Numbers
        UDP Segment Format
        Internet Layer Overview
        IP Datagram
        Internet Control Message Protocol (ICMP)
        ICMP Testing
       part 2 Address Resolution Protocol
        Reverse ARP
        Summary
        Chapter 8 Test: TCP/IP Overview
        Chapter 9 IP Addressing
        TCP/IP Address Overview
        IP Addressing Overview
        IP Address Classes
        IP Address Bit Patterns
        The First Octet Rule
        Concepts of IP Address Configuration
        Host Addresses
        Addressing Without Subnets
        Addressing with Subnets
        Subnetting Addressing
        Subnet Mask
        Decimal Equivalents of Bit Patterns
        Subnet Mask Without Subnets
        Subnet Mask with Subnets
        Subnet Planning
        Class B Subnet Planning Example
        Class C Subnet Planning Example
        Broadcast Addresses
        Configuration Commands
        Configuring IP Addresses
        IP Host Names
        Name Server Configuration
        Name-to-Address Schemes
        Display Host Names
        Verifying Address Configuration
        Telnet Command
        Simple Ping Command
        Extended Ping Command
        Trace Command
        Summary
        Chapter Nine Test: IP Address Configuration
        Chapter 10 IP Routing Configuration
        Basic Mechanisms and Commands of IP Routing
        Setting Up the Initial IP Routing Table
        Understanding How IP Routing
        Learns Destinations
        Specifying Administrative Distance Values
        Configuring Static Routes
        Configuring Default Routers
        Grouping into Autonomous Systems
        Using Interior or Exterior Routing Protocols
        Routing Protocol Problems
        Interior IP Routing Protocols
        Completing the IP Routing Configuration Tasks
        Configuring Dynamic Routing
        Configuring RIP
        Configuring RIP Router Commands
        Viewing IP RIP Information
        Configuring IGRP
        Understanding IGRP Operation
        Flash Updates
        Poison Reverse
        Holddowns
        Split Horizon
        Using the IGRP Composite Metric
        Unequal-Cost Load Balancing Feature
        Creating an IGRP Routing Process
        Displaying IGRP Routing Information
        Summary
        Chapter Ten Test: IP Routing Configuration
        Chapter 11 Configuring Novell IPX
        IPX Routing Overview
        Cisco Routers in NetWare Networks
        Novell NetWare Protocol Suite
        Key Novell NetWare Features
        Novell IPX Addressing
        How to Determine the IPX Address
        Multiple Novell Encapsulations
        Novell and Cisco Encapsulation Names
        Novell Uses RIP for Routing
        SAP: Supporting Service Advertisements
        GNS: The Get Nearest Server Process
        Configuring IPX Routing
        Novell IPX Global Configuration Commands
        ipx routing Command
        ipx maximum-paths Command
        ipx route destination-net next-hop Command
        Novell IPX Interface Configuration Commands
        interface Command
        ipx network Command
        Novell IPX Configuration Example
        Verifying and Monitoring IPX Routing
        Monitoring the Status of an IPX Interface
        Monitoring IPX Routing Tables
        Monitoring the Novell IPX Servers
        Monitoring IPX Traffic
        Troubleshooting IPX Routing
        Troubleshooting IPX SAP
        Summary
        Chapter Eleven Test: Configuring Novell IPX
        Chapter 12 Configuring AppleTalk
        AppleTalk Overview
        AppleTalk Protocol Stack
        AppleTalk Features
        Nonextended or Extended Networks
        AppleTalk Addressing
        Extended Addressing
        AppleTalk Address Acquisition
        Limiting Requests for Services
        AppleTalk Services
        Locating AppleTalk Services
        Configuring AppleTalk
        AppleTalk Configuration Tasks
        AppleTalk Configuration Commands
        appletalk routing Command
        appletalk protocol Command
        appletalk cable-range Command
        appletalk zone Command
        AppleTalk Configuration Example
        Discovery Mode
        Discovery Mode Example
        Verifying Your AppleTalk Configuration
        Monitoring AppleTalk
        Summary
        Chapter Twelve Test: Configuring AppleTalk
        Chapter 13 Basic Traffic Management with Access Lists
        Access Lists Overview
        Why Use Access Lists?
        Standard Access Lists
        Extended Access Lists
        How Access Lists Work
        A List of Tests: Deny or Permit
        Access List Command Overview
        How to Identify Access Lists
        TCP/IP Access Lists
        Testing Packets with IP Access Lists
        Key Concepts for IP Access Lists
        How to Use Wildcard Mask Bits
        Matching Any IP Address
        Matching a Specific IP Host Address
        IP Standard Access Configuration
        Example 1: Permit My Network Only
        Example 2: Deny a Specific Host
        Example 3: Deny a Specific Subnet
        Extended IP Access Lists
        Extended Access List Configuration
        Example 1: Deny FTP for EO
        Example 2: Deny Only Telnet out of EO;
        Permit All Other Traffic
        Named Access Lists
        Where to Place IP Access Lists
        Verifying Access Lists
        Monitoring Access List Statements
        Novell IPX Access Lists
        Testing Packets Using Novell Access Lists
        Key Concepts for IPX Access Lists
        Controlling IPX Overhead
        IPX Standard Access List Configuration
        Standard IPX Access List Example
        IPX Extended Access List Configuration
        Normal IPX SAP Operation
        How to Use SAP Filters
        SAP Filter Configuration Commands
        Verifying IPX Access Lists
        AppleTalk Access Lists
        Testing Packets Using AppleTalk Access Lists
        AppleTalk Network Structures
        Key Concepts for AppleTalk Access Lists
        AppleTalk Access List Procedures
        AppleTalk Access List Commands
        ZIP Reply Filter Configuration
        Verifying AppleTalk Access Lists
        Summary
        Chapter Thirteen Test: Basic Traffic Management
        with Access Lists
       PART 3 WlDE-AREA NETWORKING
        Chapter 14 Introduction to WAN Connections
        WAN Services
        Interfacing WAN Service Providers
        Customer Premises Equipment (CPE)
        Demarcation
        Local Loop
        Central Office (CO) Switch
        Toll Network
        Subscriber to Provider Interface
        Using WAN Services with Routers
        WAN Frame Format Summary
        An Overview of PPP
        Layering PPP Elements
        PPP LCP Configuration Options
        PPP Session Establishment
        Phase 1: Link Establishment
        Phase 2: Authentication (Optional)
        Phase 3: Network-Layer Protocol
        Selecting a PPP Authentication Protocol
        PAP
        CHAP
        Configuring PPP Authentication
        Verifying PPP
        Summary
        Chapter Fourteen Test:
        Introduction to Serial Connections
        Chapter 15 Configuring X.25
        X.25 Overview
        X.25 Protocol Stack
        X.25 DTE and DCE
        X.25 (X.12l) Addressing Format
        X.25 Encapsulation
        X.25 Virtual Circuits
        SVC Usage
        Single Protocol Virtual Circuits
        Multiprotocol Virtual Circuits
        Configuring X.25
        encapsulation x25 Command
        x25 address Command
        x25 map Command
        X.25 Configuration Example
        Additional Configuration Tasks
        Configuring X.25 VC Ranges
        Configuring X.25 Packet Sizes
        Configuring X.25 Window Parameters
        X.25 Additional Configuration Example
        Setting Up the Router as a Switch
        X.25 Local and XOT Switching
        Monitoring X.25
        Summary
        Chapter Fifteen Test: Configuring X.25
        Chapter 16 Configuring Frame Relay
        Frame Relay Overview
        - Frame Relay Terminology
        Local Access Rate
        Data-Link Connection Identifier (DLCI)
        Local Management Interface (LMI) 401
        Committed Information Rate (CIR) 402
        Oversubscription
        Committed Burst (Bc)
        Excess Burst
        Forward Explicit Congestion Notification
        (FECN)
        Backward Explicit Congestion Notification
        (BECN)
        Discard Eligibility (DE) Indicator
        Frame Relay Operation
        Configuring Frame Relay
        Configuring Optional Commands
        Verifying Frame Relay Operation
        Selecting a Frame Relay Topology
        Star Topology
        Full-Mesh Topology
        Partial-Mesh Topology
        Reachability and Resource Issues for Frame Relay
        Resolving Reachability and Resource Issues:
        Subinterfaces
        Configuring Subinterfaces
        Multipoint Subinterfaces Configuration Example
        Point-to-Point Subinterfaces
        Configuration Example
        Summary
        Chapter Sixteen Test: Configuring Frame Relay
        APPENDIXES
        Appendix A Chapter Test Answer Key
        Appendix B Configuring DECnet
        Overview of DECnet
        Node Assignments
        Routers Pass Information
        Designated Routers
        Level 1 and Level 2 Routing
        DECnet Configuration Commands
        DECnet Configuration Tasks
        DECnet Configuration Commands
        DECnet Configuration Example
        Configuring DECnet Access Lists
        DECnet Access List Commands
        Controlling DECnet Example
        Monitoring DECnet
        Appendix C Configuring Banyan VINES
        VINES Overview
        Network Number
        Subnet Number
        Cisco VINES Network Number
        Host Address Assignment
        Hello Messages
        Configuring VINES
        VINES Configuration Commands
        VINES Access Lists
        Monitoring VINES Operation
        Appendix D Autolnstalling Configuration Data
        Appendix E Decimal to Hexadecimal
        and Binary Conversion Table
        Appendix F Password Recovery
        Technique #1
        Technique #2
       Appendix G Frame Relay Examples and Configurations
       AppleTalk over Frame Relay Example
       Configuring IPX over Frame Relay Example
       Frame Relay Switching Example
       Appendix H Glossary
       Index
       

    本目錄推薦

    掃描二維碼
    Copyright ? 讀書網(wǎng) talentonion.com 2005-2020, All Rights Reserved.
    鄂ICP備15019699號(hào) 鄂公網(wǎng)安備 42010302001612號(hào)