Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 1: Introduction to Troubleshooting
Table 1.1: Protocols Used on OSI Layers
Chapter 2: Protocols and Their Characteristics
Table 2.1: Differences between Connection-Oriented and Connectionless Behavior
Table 2.2: Examples of Connection-Oriented and Connectionless Protocols
Table 2.3: The Seven Layers of the OSI Model
Table 2.4: Protocols for OSI Layers
Table 2.5: Fields of PPP Frame
Table 2.6: Phases of the PPP Link
Table 2.7: Configuration of Primary and Secondary Nodes
Table 2.8: Fields of the SDLC Frame
Table 2.9: Differences Between SDLC and HDLC
Table 2.10: The 32-bit IP Address
Table 2.11: Class Requirement and Available Options
Table 2.12: Leading Bits and Address Ranges of Classes
Table 2.13: IP Addresses in Binary Format
Table 2.14: Characteristics of Classes A, B, C, D, and E
Table 2.15: Sample Routing Table
Table 2.16: IGRP Message Format Fields
Table 2.17: Opcode Types
Table 2.18: Protocol-specific TLV Types
Chapter 3: Diagnostic Mechanisms
Table 3.1: The Show Commands with Respect to the Problem Area
Table 3.2: Test Characters and Their Implications
Table 3.3: Test Characters and Their Implications
Table 3.4: Ping Command Options and Their Descriptions
Table 3.5: Commands for Logging Messages
Table 3.6: Level Name, Value, and Description of Debug Log Messages
Chapter 4: Troubleshooting Tools
Table 4.1: The Show Commands and Their Services
Table 4.2: The Debug Command and Its Services
Chapter 5: Troubleshooting TCP/IP
Table 5.1: ping Command Characters and Descriptions
Table 5.2: Cisco-supported Show Commands
Table 5.3: TCP/IP Problems and Symptoms
Table 5.4: TCP/IP Problems and Action Plans
Chapter 6: Troubleshooting RIP Environments
Table 6.1: Characteristics of RIPv1 and RIPv2
Table 6.2: Show Commands and Explanations
Table 6.3: Debug Commands and Explanations
Table 6.4: Commands to Resolve Compatibility Issues Between RIPv1 and RIPv2
Table 6.5: Routing Details for RIP
Table 6.6: Routing Update Information for Router3
Table 6.7: Routing Update Information for Router4
Table 6.8: Split Horizon with Poisoned Reverse Update Packet for Router3
Table 6.9: Router4 Update Packet Status
Chapter 7: Troubleshooting IGRP Routing Environments
Table 7.1: Features of the IGRP Routing Protocol
Table 7.2: IGRP Timers
Table 7.3: Show Commands and Description
Table 7.4: Debug Commands and Descriptions
Chapter 8: Troubleshooting EIGRP Routing Environments
Table 8.1: Features of EIGRP
Table 8.2: Show Commands and Explanations
Table 8.3: debug Commands and Explanations
Table 8.4: Configurations of EIGRP Routers
Table 8.5: Configuration of Routers
Table 8.6: Causes, Commands, and Solutions for the SIA Mode
Chapter 9: Troubleshooting OSPF Routing Environments
Table 9.1: Show Commands and Descriptions
Table 9.2: Debug Commands and Descriptions
Table 9.3: Causes of Neighbor Adjacency Problems and Diagnostic Commands
Table 9.4: Configuration of Routers in Stub Area
Chapter 10: Troubleshooting IS-IS Routing Environments
Table 10.1: Comparing IS-IS Routers
Table 10.2: Data Packets in the IS-IS Routing Protocol
Table 10.3: Show Commands and Descriptions
Table 10.4: debug Commands and Descriptions
Table 10.5: IP Addresses of IS-IS Routers
Chapter 11: Troubleshooting BGP for Routing Environments
Table 11.1: BGP show Commands and Descriptions
Table 11.2: debug Commands to Troubleshoot BGP Problems
Chapter 12: Troubleshooting Redistribution Routing Environments
Table 12.1: Router Configurations
Table 12.2: Router Configuration
Table 12.3: Router Configuration
Table 12.4: Router Configuration
Table 12.5: Router Configuration
Table 12.6: Router Configuration
Previous page
Table of content
Next page
Cisco IP Routing Protocols: Trouble Shooting Techniques (Charles River Media Networking/Security)
ISBN: 1584503416
EAN: 2147483647
Year: 2006
Pages: 130
Authors:
V Anand
,
K Chakrabarty
BUY ON AMAZON
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Why Project Risk Management?
Identifying Project Schedule Risk
Quantifying and Analyzing Activity Risks
Managing Project Risk
Conclusion
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
Network Address Data Types
Client 1Connecting to the Server
Client 1Connecting to the Server
Client 3Query Processing
pgcurlWeb-enabling Your PostgreSQL Server
Information Dashboard Design: The Effective Visual Communication of Data
Thirteen Common Mistakes in Dashboard Design
Supplying Inadequate Context for the Data
Choosing a Deficient Measure
Visually Encoding Data for Rapid Perception
Eloquence Through Simplicity
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 330 Metal-Clad Cable Type MC
Article 354 Nonmetallic Underground Conduit with Conductors Type NUCC
Article 386 Surface Metal Raceways
Article 404: Switches
Article 406: Receptacles, Cord Connectors, and Attachment Plugs (Caps)
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
Computers as Persuasive Media Simulation
Credibility and the World Wide Web
Increasing Persuasion through Mobility and Connectivity
Captology Looking Forward
Programming .Net Windows Applications
CommonDialog Classes
TreeView
List Controls
ADO.NET
Exceptions
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies