社区
下载资源悬赏专区
帖子详情
Data Networks (2nd Edition) Solutions下载
weixin_39821620
2019-05-03 04:00:14
Data Networks (2nd Edition) solutions
相关下载链接:
//download.csdn.net/download/jeraggio8307/2064275?utm_source=bbsseo
...全文
20
回复
打赏
收藏
Data Networks (2nd Edition) Solutions下载
Data Networks (2nd Edition) solutions 相关下载链接://download.csdn.net/download/jeraggio8307/2064275?utm_source=bbsseo
复制链接
扫一扫
分享
转发到动态
举报
写回复
配置赞助广告
用AI写文章
回复
切换为时间正序
请发表友善的回复…
发表回复
打赏红包
Data
Networks
(
2nd
Edit
ion
)
Solut
ion
s
Data
Networks
(
2nd
Edit
ion
)
solut
ion
s
Data
networks
--
Solut
ion
s 数据网络的部分习题解答
Data
Networks
(
2nd
Edit
ion
) by Dimitri P. Bertsekas (Author), Gallager (Author)
Spring
Data
JPA 106精讲
Spring
Data
是 Spring 的一个子项目。用于简化数据库访问,支持NoSQL 和 关系数据存储。使用 Spring
Data
可以大幅减少数据访问层 (DAO) 的开发量. 开发者要做的,就是声明持久层接口,其他都交给 Spring
Data
JPA 来帮你完成!本套课程从最基础JPA到Spring
Data
JPA面面俱到!一共有106讲,本系列课程会实战演示Spring
Data
JPA的各个功能特性。1:本系列课程全程使用注解,无xml2:详解Spring
Data
JPA封装的各种查询方式3:详解Spring
Data
JPA常用接口4:详解Spring
Data
JPA各种查询方式5:详解Spring
Data
JPA在web方面的用法具体内容,可以参考大纲:
Handbook of
Data
Center Management,
2nd
Edit
ion
Handbook of
Data
Center Management: Second
Edit
ion
(CRC Press Revivals) ISBN-10 书号: 1138505749 ISBN-13 书号: 9781138505742
Edit
ion
版本: 1 出版日期: 2017-08-30 pages 页数: 801 Contents SECT
ION
I Strategic Planning 1Long-Range Informat
ion
Systems Planning. 2Developing a Strategic Informat
ion
Plan 3 A
Data
Center Manager’s Guide to Systems Integrators 4 Defining End-User Computing’s New Role in IS SECT
ION
ll
Data
Center Management . 1 Cost-Effective Management Practices for the
Data
Center 2 The Outsourcing Alternative 3 Downsizing Computer Resources: Pianning, Implementat
ion
, 4 Fine Tuning the Help Desk: Goals and Objectives 5 Client/Server vs. Cooperative Processing 6Managing Distributed Computing 7 Making the Decis
ion
to Outsource 8 Achieving Quality in
Data
Center Operat
ion
s. SECT
ION
ll 1Developing a
Data
Center Reporting System. 2 Update on Change Control and Problem Tracking Systems 3 Improving Productivity by Implementing a Tape Workstat
ion
4 File Retent
ion
and Backup 5 Checklists for Reviewing MVS
Data
Center Controls. 6Understanding Computer Negligence and Liability . SECT
ION
IV 1A Primer on Client/Server Technology 2 Managing Hardware in a Client/Server Environment 3 Preparing to Implement Client/Server
Solut
ion
s 4Implementing Business Process Reengineering:A Case Study 5 An Update on Optical Disk Systems 6Planning for Object-Oriented Systems 7 Lessons from Three Client/Server Implementat
ion
s 8 Using Client/Server Technology to Enable Change:A Case Study SECT
ION
V Network Technology 1 Enterprise Network Design Technology . 2 An Expert Operating System That Manages Multinetwork Communicat
ion
s. 3 Securing Distributed
Data
Networks
4Distributed Network Security 5The
Data
Center Manager’s Guide to Ensuring LAN Reliability and Availability 6 Auditing LANs SECT
ION
VI 1Overview of Business Continuity Planning. 2 Strategies for Developing and Testing Business Continuity Plans 3 A Business Impact Analysis for Disaster Recovery. 4 Network Disaster Recovery Planning. 5 Disaster
Cisco Press - OSPF Network Design
Solut
ion
s,
2nd
Edit
ion
Contents at a Glance Introduct
ion
xix Part I OSPF Fundamentals and Communicat
ion
3 Chapter 1 Networking and Routing Fundamentals 5 Chapter 2 Introduct
ion
to OSPF 47 Chapter 3 OSPF Communicat
ion
103 Part II OSPF Routing and Network Design 161 Chapter 4 Design Fundamentals 163 Chapter 5 Routing Concepts and Configurat
ion
225 Chapter 6 Redistribut
ion
339 Chapter 7 Summarizat
ion
405 Part III OSPF Implementat
ion
, Troubleshooting, and Management 439 Chapter 8 Managing and Securing OSPF
Networks
441 Chapter 9 Troubleshooting OSPF 533 Chapter 10 BGP and MPLS in an OSPF Network 655 Part IV Addit
ion
al OSPF Resources 707 Appendix A OSPF RFCs 705 Index 724 0323FMf.book Page vi Wednesday, March 12, 2003 9:41 AM vii Contents Introduct
ion
xix Part I OSPF Fundamentals and Communicat
ion
3 Chapter 1 Networking and Routing Fundamentals 5 Foundat
ion
s of Networking 6 Why Was the OSI Reference Model Needed? 6 Characteristics of the OSI Layers 7 Understanding the Seven Layers of the OSI Reference Model 9 Upper Layers 9 Layer 7—Applicat
ion
9 Layer 6—Presentat
ion
10 Layer 5—Sess
ion
10 Lower Layers 10 Layer 4—Transport 10 Layer 3—Network 11 Layer 2—
Data
Link 11 Layer 1—Physical 12 OSI Reference Model Layers and Informat
ion
Exchange 13 Headers, Trailers, and
Data
13 TCP/IP Protocol Suite 14 TCP/IP Funct
ion
s 15 TCP Overview 15 IP Overview 16 Types of Network Topologies 16 Local-Area
Networks
16 Wide-Area
Networks
17 IP Addressing 21 Class A Addresses 22 Class B Addresses 22 Class C Addresses 23 Class D Addresses 23 Class E Addresses 23 How IP Addresses Are Used 24 Role of IP Addresses 27 How IP Addresses Are Read 27 IP Subnet Addressing 28 Subnet Masking 29 Subnetting Restrict
ion
s 31 Explaining the Need for VLSM and CIDR 31 Route Summarizat
ion
33 Classful Routing 34 Impact of Classful Routing 34 Classless Routing 34 VLSMs 35 VLSM Design Guidelines and Techniques 36 CIDR 37 Validating a CIDRized Network 37 What Do Those Slashes Mean? 38 Important CIDR Terms 38 IP Classless 39 CIDR Translat
ion
Table 39 Manually Computing the Value of a CIDR IP Prefix 40 Case Study: VLSMs 41 Route Aggregat
ion
42 Summary 44 0323FMf.book Page vii Wednesday, March 12, 2003 9:41 AM viii Chapter 2 Introduct
ion
to OSPF 47 What Is a Routing Protocol? 48 Basic Routing Protocol Operat
ion
50 Link-State Versus Distance Vector Routing Protocols 51 Link-State Routing Protocols 52 OSPF Characteristics 53 Integrated Intermediate System-to-Intermediate System 54 Distance Vector Routing Protocols 55 Routing Informat
ion
Protocol Characteristics 56 Conclus
ion
56 Selecting a Routing Protocol 57 Operat
ion
al Considerat
ion
s 57 Protocols Supported 57 Routing Hierarchies 58 IP Address Management 59 IP Encapsulat
ion
Support 59 Available Resources 59 Technical Considerat
ion
s 60 Fast Convergence 60 Routing Updates 61 VLSM and CIDR Support 61 Load Sharing 61 Metrics 61 Scalability 62 Physical Media Support 62 Extensibility 62 Business Considerat
ion
s 62 Standards 63 Multivendor Environments 63 Proven Technology 63 SPF Overview 63 SPF in Operat
ion
64 SPF Funct
ion
s 68 Full and Partial SPF Calculat
ion
s 70 Verifying SPF Operat
ion
70 OSPF Routing Hierarchy 71 Hierarchical Network Design Techniques 71 Routing Types Within an OSPF Network 72 Intra-Area Routing 72 Inter-Area Routing 72 External Routes 73 OSPF Areas 74 Characteristics of a Standard OSPF Area 74 Standard Area Design Rules 74 Area 0: The OSPF Backbone Area 75 Stub Areas 75 Not-So-Stubby Areas 76 OSPF Operat
ion
al Environment 77 Types of OSPF Routers 77 Internal Routers 78 Area Border Routers 78 Autonomous System Boundary Routers 78 Backbone Routers 79 OSPF Network Types 79 Router Identificat
ion
80 Neighbors 81 Adjacencies 82 Neighbor Versus Adjacent OSPF Routers 82 Designated Routers 83 Case Study: Adding a New OSPF Router to a Network 85 0323FMf.book Page viii Wednesday, March 12, 2003 9:41 AM ix Case Study: Developing the Link-State
Data
base 88 Case Study: OSPF Network Evolut
ion
and Convergence 95 Configuring Loopback Interfaces 96 Enabling OSPF 96 Verifying OSPF Operat
ion
97 Summary 101 Chapter 3 OSPF Communicat
ion
103 Link-State Advertisements 103 Types of LSAs 103 Type 1: Router LSAs 104 Type 2: Network LSAs 105 Type 3: ABR Summary LSAs 107 Type 4: ASBR Summary LSAs 108 Type 5: Autonomous System External LSAs 109 Type 7: Not-So-Stubby Area LSAs 110 Type 9: Opaque LSA: Link-Local Scope 112 Type 10: Opaque LSA: Area-Local Scope 113 Type 11: Opaque LSA: Autonomous System Scope 113 LSA Operat
ion
Example 113 Link-State
Data
base Synchronizat
ion
116 Speaking OSPF 121 Types of OSPF Packets 121 Hello Process/Protocol 122 Hello Protocol Operat
ion
al Variat
ion
s 124 Hello Protocol Packet Format 125 Exchange Process/Protocol 126 Flooding Process/Protocol 127 Manipulating LSAs 128 Understanding LSA Group Pacing 128 How to Configure LSA Group Pacing 130 Understanding OSPF Packet Pacing 131 Blocking LSA Flooding 131 Ignoring MOSPF LSA Packets 132 Altering LSA Retransmiss
ion
s 132 Altering LSA Transmiss
ion
Delay 133 Detailed Neighbor Establishment 133 Hello Protocol State Changes 133
Data
base Exchange State Changes 134 Case Study: OSPF Initializat
ion
138 Case Study: Troubleshooting Neighbor Problems 149 Neighbor Stuck in Init STATE 150 Neighbor Stuck in Exstart/Exchange State 151 What’s the
Solut
ion
? 156 Neighbor Stuck in 2-Way State 156 Summary 158 Part II OSPF Routing and Network Design 161 Chapter 4 Design Fundamentals 163 OSPF Design Guidelines 164 OSPF Design Goals 164 Funct
ion
ality 165 Scalability 165 Adaptability 166 Manageability 166 Cost Effectiveness 166 0323FMf.book Page ix Wednesday, March 12, 2003 9:41 AM x OSPF Network Design Methodology 167 Step 1: Analyze the Requirements 168 OSPF Deployment 169 Load Balancing with OSPF 170 OSPF Convergence 170 Step 2: Develop the Network Topology 171 Fully Meshed Topology 171 Hierarchical Topology 171 OSPF Backbone Design in the Hierarchical Model 173 Area Design in the Hierarchical Model 174 Using a Stub Area 175 Example of an OSPF Network with a Hierarchical Structure 177 Step 3: Determine the Addressing and Naming Convent
ion
s 180 Public or Private Address Space 180 Plan Now for OSPF Summarizat
ion
181 Bit Splitting (Borrowing Bits) 184 Map OSPF Addresses for VLSM 184 Discontiguous Subnets 185 Naming Schemes 186 Step 4: Provis
ion
the Hardware 186 Step 5: Deploy Protocol and Cisco IOS Software Features 187 OSPF Features 187 Cisco IOS Software Features 188 Step 6: Implement, Monitor, and Manage the Network 189 OSPF Network Scalability 189 OSPF Network Topology 190 Area Sizing 191 Determining the Number of Areas per ABR 192 Determining the Number of Areas per Router 194 Determining the Number of Neighbors per Router 194 Selecting the Designated Router 195 Fully Meshed Versus Partially Meshed Network Topology 196 Link-State
Data
base Size Considerat
ion
s 197 Determining Router Memory Requirements 197 Router CPU Requirements 199 Bandwidth Usage 199 OSPF Security 199 Area Design Considerat
ion
s 200 Area Design Overview 200 Considering Physical Proximity 201 Reducing the Area Size if Links Are Unstable 201 Ensuring Contiguous Areas 201 Using Tunable OSPF Parameters 202 Naming an Area 204 Standard Area Design 205 Golden Rules of Standard Area Design 205 Backbone Area Design 205 Backbone Design Golden Rules 206 Stub Area Design 207 Stub Area Design Golden Rules 208 Stub Area Configurat
ion
208 Totally Stubby Areas 212 Not-So-Stubby Areas 212 NSSA Implementat
ion
Considerat
ion
s 214 OSPF Virtual Links: Bane or Benefit? 215 Mending a Partit
ion
ed Area 0 215 Ensuring a Connect
ion
to Area 0 216 Golden Rules of Virtual Link Design 217 Virtual Link Configurat
ion
Example 217 OSPF Design Tools 230 Altering Neighbor Cost 230 0323FMf.book Page x Wednesday, March 12, 2003 9:41 AM xi Configuring a Neighbor’s Cost on Point-to-Multipoint Broadcast
Networks
231 Configuring an Interface as Point-to-Multipoint Nonbroadcast 231 Configuring Route Calculat
ion
Timers 232 Suppressing OSPF Updates 232 Summary 232 Case Studies 233 Case Study: Understanding Subinterfaces 233 Point-to-Point Subinterfaces 233 Multipoint Subinterfaces 234 Case Study: Point-to-Multipoint Link
Networks
235 Router Configurat
ion
Examples 237 Case Study Conclus
ion
239 Case Study: Designing an OSPF Network 240 New WAN Requirements 242 Determining the Frame Relay PVC Architecture 242 Determining Multiprotocol Support 242 Determining the Traffic Flow 243 Determining the Number of Routers 244 Determining the IP Addressing Scheme 244 Determining Internet Connectivity 244 Determining Enterprise Routing Policies 244 Establishing Security Concerns 244 Implementing Your Design 245 IP Addressing 245 OSPF Area Organizat
ion
247 Specifying the OSPF Network Type 248 Implementing Authenticat
ion
248 Configuring Link Cost 249 Tuning OSPF Timers 249 Strategizing Route Redistribut
ion
250 Chapter 5 Routing Concepts and Configurat
ion
255 OSPF Routing Concepts 255 OSPF Cost 256 ip cost Interface Command 259 Changing the Reference Bandwidth 259 Altering OSPF Convergence 261 Hello Timers 261 Dead Timers 262 SPF Timers 262 Setting the Router ID 264 Loopback Interfaces 264 Configuring a Loopback Interface 265 Routing Loopback Interfaces 265 Configuring the Designated Router 266 Route Types 266 Which Is Better—E1 or E2 Routes? 268 Controlling Inter-Area Traffic 269 Configuring OSPF 270 Activating OSPF 271 network Command 272 OSPF Router Considerat
ion
s 273 ABR Considerat
ion
s 273 ASBR Considerat
ion
s 274 Backbone Router Considerat
ion
s 275 Different Network Types and OSPF 276 Configuring the Network Type 276 Broadcast
Networks
277 Nonbroadcast
Networks
278 Point-to-Multipoint
Networks
279 Point-to-Point
Networks
283 0323FMf.book Page xi Wednesday, March 12, 2003 9:41 AM xii Area Configurat
ion
284 Normal Area Configurat
ion
285 Stub Area Configurat
ion
289 Totally Stubby Area Configurat
ion
294 Not-So-Stubby-Area (NSSA) Configurat
ion
297 area default-cost Command 306 Area Range 309 Tuning OSPF Operat
ion
313 Altering OSPF Administrative Distance 313 Load Balancing 314 Default Routes 318 Passive Interfaces 321 On-Demand Circuits 322 Implementat
ion
Considerat
ion
s 324 On-Demand Configurat
ion
Examples 324 On-Demand Circuits Summary 328 Summary 328 Case Study: Assigning Unique Network Numbers to Each OSPF Area 329 Case Study: OSPF with Multiple Areas 330 Case Study: OSPF with Stub and Totally Stubby Areas 335 Chapter 6 Redistribut
ion
339 OSPF Redistribut
ion
340 Administrative Distance and Metrics 341 Redistribut
ion
Golden Rules 342 Redistribut
ion
Configurat
ion
343 External Routes 347 Default Routes 347 default-informat
ion
originate Command 348 Assigning Metrics for Redistributed Protocols 354 Using the redistribute Command to Assign a Metric 354 Using the default-metric Command to Assign a Metric 354 Configurat
ion
Example 1: Setting the Default Metric for Redistributed Routes 355 Route Tagging 359 Mutual Redistribut
ion
360 Distribute List Concerns 361 Avoiding Redistribut
ion
Loops 364 Route Maps 365 Configurat
ion
Example 2: RIP and OSPF 366 Configuring the RIP Network 366 Adding OSPF to the Center of a RIP Network 368 Adding OSPF Areas 372 What If Mutual Redistribut
ion
Were Required? 375 Configurat
ion
Example 3: Redistributing Connected and Loopback Interfaces 376 Configurat
ion
Example 4: Redistributing OSPF and EIGRP 380 OSPF and EIGRP Mutual Redistribut
ion
384 Using Route Maps to Protect Against Routing Loops 385 Using Route Tagging to Protect Against Routing Loops 388 Configurat
ion
Example 5: Redistributing OSPF and RIP and Tagging Routes 390 OSPF and RIP Mutual Redistribut
ion
392 Redistributing into OSPF with Route Tagging 393 Configurat
ion
Example 6: Controlling Redistribut
ion
396 Altering Link Cost 396 Altering Routes 397 Filtering Routes 398 Distribute Lists and OSPF 398 Chapter Summary 403 0323FMf.book Page xii Wednesday, March 12, 2003 9:41 AM xiii Chapter 7 Summarizat
ion
with OSPF 405 Summarizat
ion
with OSPF 406 Benefits of Summarizat
ion
408 Summarizat
ion
Golden Rules 409 Troubleshooting Summarizat
ion
410 Types of OSPF Summarizat
ion
410 Summarize Area Routes 411 Summarize External Routes 414 Summarizat
ion
s Effect on the Routing Table 418 Configurat
ion
Example 3: Subnetting with Summarizat
ion
420 Alternative Area Summarizat
ion
Example 423 Using Private Addressing to Summarize? 424 Configurat
ion
Example 4: Using VLSM with Summarizat
ion
426 Summary 431 Final Router Example Configurat
ion
s 431 Part III OSPF Implementat
ion
, Troubleshooting, and Management 439 Chapter 8 Managing and Securing OSPF
Networks
441 Network Management 442 Network Management Tools 444 CiscoView 444 CiscoWorks 445 Cisco ConfigMaker 446 Simple Network Management Protocol 446 Introduct
ion
to SNMP 450 Network Management System 451 Agents 452 Managed Devices 452 Management Informat
ion
Base Overview 453 SNMP Operat
ion
455 SNMP Operat
ion
Definit
ion
s 455 Network Management System Operat
ion
456 Agent Response to NMS Request 458 Cisco’s MIB Extens
ion
s+ 459 Access Lists for SNMP 462 Multiple Community Strings 462 OSPF MIBs 462 Network Security 466 Assessing the Need for Security 467 Golden Rules for Designing a Secure Network 467 Document Your Security Plan 468 Know Your Enemy 469 Count the Cost 469 Identify Your Assumpt
ion
s 470 Control and Limit Your Secrets 470 Remember Human Factors 471 Know Your Weaknesses 472 Limit the Scope of Access 472 Understand Your Environment 472 Limit Your Trust 472 Remember Physical Security 473 Security Is Pervasive 473 Addit
ion
al Resources on Network Security 473 Securing Your OSPF Network 473 OSPF and Network Devices 474 Cisco IOS Password Encrypt
ion
474 Network Impact: User Passwords (vty and Enable) 475 Increasing SNMP Security 477 Network
Data
Encrypt
ion
478 0323FMf.book Page xiii Wednesday, March 12, 2003 9:41 AM xiv OSPF Authenticat
ion
479 Benefits of OSPF Neighbor Authenticat
ion
480 When to Deploy OSPF Neighbor Authenticat
ion
481 How OSPF Authenticat
ion
Works 481 Configuring OSPF Authenticat
ion
in an Area 483 Configuring OSPF Authenticat
ion
on a Virtual Link 489 Changing the Virtual Link Password 492 Restricting Access to Network Devices 493 Controlling Access to Network Equipment 493 Terminal Access Controller Access Control System 497 Nonprivileged Access 498 Privileged Access 498 Privilege Level Security 499 Access Lists to Restrict Access 501 User Authenticat
ion
to Restrict Access 504 Summary 505 Case Study: IOS Secure Template 506 Case Study: Router and Firewall Deployment 518 Defending Against Attacks Directly to Network Devices 518 Controlling Traffic Flow 519 Configuring the Firewall Router 520 Defining Firewall Access Lists 520 Applying Access Lists to Interfaces 527 Configuring the Communicat
ion
Server 528 Defining the Communicat
ion
Server’s Access Lists 528 Applying Access Lists to Lines 529 Spoofing and Inbound Access Lists 529 Addit
ion
al Firewall Security Considerat
ion
s 530 File Transfer Protocol Port 530 Chapter 9 Troubleshooting OSPF 533 The Mechanics of Troubleshooting OSPF 533 Preparing for Network Failure 534 Troubleshooting Methodology 535 Step 1: Clearly Define the Problem 537 Step 2: Gather Facts 537 Step 3: Consider Possible Problems 538 Step 4: Create an Act
ion
Plan 539 Step 5: Implement the Act
ion
Plan 539 Step 6: Gather Results 539 Step 7: Reiterate the Process 540 Determining That OSPF Is Operating Properly 540 Monitoring the Operat
ion
of OSPF 541 Configuring Lookup of DNS Names 541 System Logging (SYSLOG) 543 Configuring SYSLOG 543 Logging OSPF Neighbor Changes 548 OSPF Troubleshooting Commands 549 show ip ospf Command 550 show ip ospf process-id Command 553 show ip ospf interface Command 553 show ip ospf border-routers Command 555 show ip ospf
data
base Command 556 show ip ospf
data
base asbr-summary Command 560 show ip ospf
data
base
data
base-summary Command 563 show ip ospf
data
base external Command 564 show ip ospf
data
base network Command 566 show ip ospf
data
base router Command 568 show ip ospf
data
base summary Command 570 show ip ospf delete Command (Hidden) 572 show ip ospf events Command (Hidden) 575 show ip ospf flood-list Command 579 0323FMf.book Page xiv Wednesday, March 12, 2003 9:41 AM xv show ip ospf maxage-list Command (Hidden) 579 show ip ospf neighbor Command 580 show ip ospf neighbor ip address Command 581 show ip ospf neighbor int ip-address Command 581 show ip ospf neighbor detail Command 581 show ip ospf virtual-links Command 583 show ip ospf stat Command (Hidden) 583 show ip ospf summary-address Command 585 clear ip ospf Command 585 clear ip ospf counters Command 585 clear ip ospf process Command 586 clear ip ospf redistribut
ion
Command 587 OSPF debug Commands 587 When to Use debug Commands 587 How to Use debug Commands 588 Timestamping debug Output 589 Complete OSPF debug Commands 589 debug ip ospf adjacency Command 591 debug ip ospf events Command 593 debug ip ospf flood Command 595 debug ip ospf hello Command 597 debug ip ospf lsa-generat
ion
Command 598 debug ip ospf monitor Command (Hidden) 599 debug ip ospf packet Command 600 debug ip ospf retransmiss
ion
Command 602 debug ip ospf spf Command 602 debug ip routing Command 614 Summary 615 Case Study: In the Trenches with OSPF 616 Problem No. 1 616 Step 1: Define the Problem 617 Step 2: Gather Facts 617 Step 3: Consider Possible Problems 621 Step 4: Create an Act
ion
Plan 622 Step 5: Implement the Act
ion
Plan 622 Step 6: Gather Results 623 Step 7: Reiterate the Process, If Needed, in Steps 4–7 623 Step 4: Create a New Act
ion
Plan 624 Step 5: Implement the New Act
ion
Plan 624 Step 6 Revisited: Gather Results 625 Step 7: Reiterate Steps 4–6 625 Step 6 Visited Again: Gather Results 627 Problem #2: Performance Issues 628 Step 1: Define the Problem 628 Step 2: Gather Facts 628 Step 4: Create an Act
ion
Plan 629 Step 5: Implement the Act
ion
Plan 630 Step 6: Gather Results 631 Case Study Conclus
ion
and Design Tips 632 Case Study: OSPF Issues and Teasers 633 OSPF Error Messages 634 What Do %OSPF-4-ERRRCV Error Messages Mean? 635 What Does the Adv router not-reachable Error Message Mean? 635 OSPF Is Having Neighbor and Adjacency Problems 635 OSPF Stuck in INIT 636 OSPF Stuck in EXSTART/EXCHANGE 638 OSPF Stuck in LOADING 641 OSPF Stuck in TWO-WAY 641 OSPF Routes Missing from Routing Table 642 OSPF Routes Are in the
Data
base but Not in the Routing Table 643 0323FMf.book Page xv Wednesday, March 12, 2003 9:41 AM xvi Miscellaneous Known OSPF Issues 647 Why Doesn’t My Cisco 1600 Router Recognize the OSPF Protocol? 647 Why Doesn’t My Cisco 800 Router Run OSPF 647 Why Is the ip ospf interface-retry 0 Configurat
ion
Command Added to All Interfaces? 648 How Do I Produce a Stable OSPF Network with Serial Links Flapping? 648 OSPF Routing Issues 648 Chapter 10 BGP and MPLS in an OSPF Network 655 Review of Interior Gateway Protocols and Exterior Gateway Protocols 655 Role of IGPs and EGPs in a Network 656 Introduct
ion
to BGP 660 Characteristic Overview of BGP 661 Operat
ion
al Overview of BGP 662 Preventing Routing Loops 663 Types of BGP 664 BGP and OSPF Interact
ion
665 Routing Dependencies and Synchronizat
ion
667 Synchronizat
ion
Is Good 668 Synchronizat
ion
Is Bad 669 Next-Hop Reachability 671 Redistributing OSPF into BGP 673 Redistributing OSPF Internal (Intra- and Inter-Area) Routes into BGP 676 Redistributing OSPF External (Type 1 and 2) Routes into BGP 677 Redistributing Both Internal and External Routes into BGP 679 Redistributing OSPF NSSA-External Routes into BGP 679 Conclus
ion
s About BGP 680 Case Study: BGP 680 Problem Descript
ion
680 MPLS and OSPF 683 Background of MPLS 684 What Is the Benefit of MPLS? 686 Why Not IP Routing or ATM Switching? 686 Convent
ion
al Best Effort Routing 687 MPLS Overview 689 Label Structure 691 Label Placement 692 MPLS Addresses Traffic Engineering 693 Looking up the Label Path 695 Configuring OSPF and MPLS 696 Configuring MPLS 697 Verifying OSPF and MPLS Operat
ion
701 Summary 703 Part IV Addit
ion
al OSPF Resources 705 Appendix A Overview of the OSPF RFCs 707 0323FMf.book Page xvi Wednesday, March 12, 2003 9:41 AM xvii
下载资源悬赏专区
12,792
社区成员
12,328,225
社区内容
发帖
与我相关
我的任务
下载资源悬赏专区
CSDN 下载资源悬赏专区
复制链接
扫一扫
分享
社区描述
CSDN 下载资源悬赏专区
其他
技术论坛(原bbs)
社区管理员
加入社区
获取链接或二维码
近7日
近30日
至今
加载中
查看更多榜单
社区公告
暂无公告
试试用AI创作助手写篇文章吧
+ 用AI写文章