Flylib.com
IS-IS Network Design Solutions (Networking Technology)
IS-IS Network Design Solutions (Networking Technology)
ISBN: 1578702208
EAN: 2147483647
Year: 2005
Pages: 144
Authors:
Abe Martey
BUY ON AMAZON
IS-IS Network Design Solutions
Table of Contents
Copyright
About the Authors
About the Technical Reviewers
Acknowledgments
Foreword
Introduction
Objectives
Audience
Organization
How to Read This Book
Command Syntax Conventions
Part I: IS-IS Protocol: Design Specification and Features
Chapter 1. Overview of IP Routing
IP Routing and Forwarding
Essentials of IP Addressing
Classification of IP Routing Protocols
Unicast Versus Multicast Routing
Cisco Packet-Switching Mechanisms
Comments on IPv6
Summary
Review Questions
References
Chapter 2. Introduction to the IS-IS Routing Protocol
ISO Connectionless Network Service
Chapter Summary
Review Questions
References
Chapter 3. Integrated IS-IS Routing Protocol Concepts
IS-IS Routing Domain
IS-IS Areas and Routing Hierarchies
IS-IS Packets
IS-IS Protocol Functions
Addressing Concepts in Integrated IS-IS
Security
Summary
Review Questions
References
Chapter 4. Addressing in Integrated IS-IS
OSI Network Addresses
NSAP Format
Obtaining Globally Unique NSAP Addresses
Defining the System ID
Configuring Multiple NETs for a Single IS-IS Process
NSAP Selector Values
NSAP AddresstoHost Name Mapping
Summary
Review Questions
References
Chapter 5. The IS-IS Link-State Database
IS-IS Link-State Packets
Link-State Packet TLVs
IS-IS Metric Extensions
Sequence Number Packets
Flooding and Link-State Database Synchronization
Protocol Timers and Other IS-IS Database Parameters
More About the IS-IS Link-State Database
Summary
Review Questions
References
Chapter 6. The Shortest Path First Algorithm
Overview of the SPF Algorithm
Calculating IS-IS Routes with the SPF Algorithm
IS-IS SPF Operation on Cisco Routers
Summary
Review Questions
References
Part II: Integrated IS-IS Network Design for IP Internets
Chapter 7. General Network Design Issues
IP Network Design Principles
Using IS-IS as an IGP
IS-IS Scaling Issues-Network Stability and Convergence
Processing Resources
Comparing Integrated IS-IS and OSPF
A Brief Historical Tour
Terminology
IS-IS Versus OSPF-A Closer Look
Summary
Chapter 8. Network Design Scenarios
Case Study: Migration of Areas
Case Study: Migration from Narrow to Wide Metrics
Using IS-IS in ISP Networks
Using IS-IS in Dual Environments
Summary
Review Questions
Part III: Configuring and Troubleshooting Integrated IS-IS
Chapter 9. Configuring IS-IS for IP Routing on Cisco Routers
Point-to-Point Serial-Link Configuration
Configuring IS-IS on Broadcast Multiaccess Links
Configuring IS-IS on NBMA Media
Configuring IS-IS Capabilities
Configuring IS-IS for Optimized Performance
Summary
References
Chapter 10. Troubleshooting the IS-IS Routing Protocol
Interpreting the Output of Key IS-IS show Commands
Other Useful IS-IS Troubleshooting Commands
Troubleshooting IS-IS Routing Problems
IS-IS Error Logging
Summary
Review Questions
References
Part IV: Appendixes
Appendix A. IS-IS Packet Formats
IS-IS Packet Fields (Alphabetical Order)
Hello Packets
Link-State Packets
Sequence Number Packets
Appendix B. Answers to Review Questions
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 8
Chapter 10
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_K
index_L
index_M
index_N
index_O
index_P
index_R
index_S
index_T
index_U
index_V
index_W
index_X
index_Z
IS-IS Network Design Solutions (Networking Technology)
ISBN: 1578702208
EAN: 2147483647
Year: 2005
Pages: 144
Authors:
Abe Martey
BUY ON AMAZON
Certified Ethical Hacker Exam Prep
Apply Your Knowledge
Firewalls
Summary
Functions of Cryptography
Practice Exam Questions
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Conduct Data Collection
Auditing the Kanban
Appendix B Kanban Supermarkets
Appendix C Two-Bin Kanban Systems
Appendix H Case Study 1: Motor Plant Casting Kanban
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Working with the Workbook Object
Working with Templates
The VSTO Programming Model
Introduction to Smart Tags
Location, Location, Location
Cultural Imperative: Global Trends in the 21st Century
Cultural Spectacles
Cognitive Processes
The China Phenomenon
Empires Past, Present, and Future
Epilogue After September 11
Comparing, Designing, and Deploying VPNs
What Is a Virtual Private Network?
VPN Devices
Advantages and Disadvantages of MPLS Layer 3 VPNs
Deploying IPsec Remote Access VPNs Using Preshared Key and Digital Signature Authentication
Implementing Full Network Access Using the Cisco SSL VPN Client
The Oracle Hackers Handbook: Hacking and Defending Oracle
The Oracle Network Architecture
Attacking the TNS Listener and Dispatchers
Attacking Oracle PL/SQL Web Applications
Accessing the Network
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies