Flylib.com
OSPF and IS-IS: Choosing an IGP for Large-Scale Networks: Choosing an IGP for Large-Scale Networks
OSPF and IS-IS: Choosing an IGP for Large-Scale Networks: Choosing an IGP for Large-Scale Networks
ISBN: 0321168798
EAN: 2147483647
Year: 2006
Pages: 111
Authors:
Jeff Doyle
BUY ON AMAZON
OSPF and IS-IS: Choosing an IGP for Large-Scale Networks
Table of Contents
Copyright
About the Author
Preface
Audience
What Is a Large-Scale Data Communications Network?
A Word on IOS and JUNOS
Acknowledgments
Chapter 1. The Roots of Link State Protocols
Section 1.1. An Intergalactic Network
Section 1.2. ARPANET
Section 1.3. The Network Working Group
Section 1.4. The Birth of the Internet
Section 1.5. Routing in the ARPANET
Section 1.6. The European Invasion
Section 1.7. Separate But Equal
Section 1.8. Conclusion
Chapter 2. Link State Basics
Section 2.1. Vector Protocol Basics
Section 2.2. Fundamental Link State Concepts
Review Questions
Chapter 3. Message Types
Section 3.1. Comparative Terminology
Section 3.2. Message Encapsulation
Section 3.3. Message Architecture
Section 3.4. Message Types
Chapter 4. Addressing, Neighbor Discovery, and Adjacencies
Section 4.1. Router and Area IDs
Section 4.2. The Hello Protocol
Section 4.3. Adjacencies
Section 4.4. Designated Routers
Section 4.5. Media Types
Section 4.6. Interface Databases
Review Questions
Chapter 5. Flooding
Section 5.1. Flooding Components
Section 5.2. Areas and Router Types
Section 5.3. Metric Types
Section 5.4. Essential LSAs
Section 5.5. Essential TLVs
Review Questions
Chapter 6. Link State Database Synchronization
Section 6.1. OSPF Database Synchronization
Section 6.2. IS-IS Database Synchronization
Review Questions
Chapter 7. Area Design
Section 7.1. Area Scalability
Section 7.2. Area Reliability
Section 7.3. OSPF Areas
Section 7.4. IS-IS Areas
Section 7.5. BGP and Area Design
Review Questions
Chapter 8. Scaling
Section 8.1. SPF Enhancements
Section 8.2. Flooding Enhancements
Section 8.3. Fragmentation
Section 8.4. Overloading
Review Questions
Chapter 9. Security and Reliability
Section 9.1. Routing Protocol Vulnerabilities
Section 9.2. Security and Reliability Features
Section 9.3. Designing for Security and Reliability
Section 9.4. Operating for Security and Reliability
Review Questions
Chapter 10. Extensibility
Section 10.1. Extending OSPF
Section 10.2. Extending IS-IS
Section 10.3. Route Tagging
Review Questions
Chapter 11. Extensions for MPLS Traffic Engineering
Section 11.1. MPLS: An Overview
Section 11.2. Traffic Engineering: An Overview
Section 11.3. OSPF Extensions for Traffic Engineering
Section 11.4. IS-IS Extensions for Traffic Engineering
Review Questions
Chapter 12. Extensions for IPv6
Section 12.1. IPv6: An Overview
Section 12.2. OSPFv3
Section 12.3. IS-IS Extensions for IPv6
Review Questions
Chapter 13. Extensions for Multi-Topology Routing
Section 13.1. OSPF Extensions for Multi-Topology Routing
Section 13.2. IS-IS Extensions for Multi-Topology Routing
Review Questions
Afterword: The Future of Link State Protocols
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
R
S
T
U
V
W
Z
OSPF and IS-IS: Choosing an IGP for Large-Scale Networks: Choosing an IGP for Large-Scale Networks
ISBN: 0321168798
EAN: 2147483647
Year: 2006
Pages: 111
Authors:
Jeff Doyle
BUY ON AMAZON
Qshell for iSeries
Parameters and Variables, Defined
The Integrated File System
Commands
Scripts - Debugging, Signals, and Traps
Application Development Tools
Systematic Software Testing (Artech House Computer Library)
Test Implementation
The Test Manager
Some Final Thoughts…
Appendix A Glossary of Terms
Appendix B Testing Survey
Competency-Based Human Resource Management
Competency-Based Employee Rewards
Competency-Based HR Management The Next Steps
Appendix A Frequently Asked Questions About Competency-Based HR Management
Appendix B Further Suggestions on Employee Development
Appendix C Examples of Life-Career Assessment Exercises
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 1. Get Around http://maps.google.com
Hack 2. Find Yourself (and Others) on Google Maps
Hack 3. Navigate the World in Your Web Browser
Hack 50. Geoblog with Google Maps in Thingster
Hack 65. Add More Imagery with a WMS Interface
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
Computers as Persuasive Media Simulation
Computers as Persuasive Social Actors
Increasing Persuasion through Mobility and Connectivity
Captology Looking Forward
Digital Character Animation 3 (No. 3)
Chapter One. Basics of Character Design
Secondary Action
Conclusion
Adding Personality to a Walk
Conclusion
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies