Introduction |
|
xxvii | |
Assessment Test |
|
xxxvii | |
|
Network Design and Concepts |
|
|
1 | (28) |
|
|
2 | (2) |
|
Static vs. Dynamic Routing |
|
|
2 | (1) |
|
Interior vs. Exterior Routing Protocols |
|
|
3 | (1) |
|
Distance Vector vs. Link-State Routing Protocols |
|
|
3 | (1) |
|
|
4 | (3) |
|
Physical Layer (OSI Layer 1) |
|
|
4 | (1) |
|
Data-Link Layer (OSI Layer 2) |
|
|
4 | (1) |
|
Network Layer (OSI Layer 3) |
|
|
5 | (1) |
|
Transport Layer (OSI Layer 4) |
|
|
5 | (1) |
|
Session Layer (OSI Layer 5) |
|
|
6 | (1) |
|
Presentation Layer (OSI Layer 6) |
|
|
6 | (1) |
|
Application Layer (OSI Layer 7) |
|
|
6 | (1) |
|
|
7 | (3) |
|
Benefits of Hierarchical Topologies |
|
|
7 | (1) |
|
The Three-Layer Hierarchical Model |
|
|
8 | (2) |
|
|
10 | (3) |
|
Reliability and Availability |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
Fault-Tolerant Topologies |
|
|
13 | (6) |
|
Redundant LAN Configurations |
|
|
14 | (2) |
|
Redundant WAN Connections |
|
|
16 | (2) |
|
Performance: Load Balancing |
|
|
18 | (1) |
|
Fault Tolerance on Multiaccess Segments |
|
|
19 | (3) |
|
Internet Control Message Protocol (ICMP) Redirects |
|
|
19 | (1) |
|
|
20 | (2) |
|
Binary, Decimal, Hexadecimal Conversion |
|
|
22 | (2) |
|
Binary to Decimal Conversion |
|
|
22 | (1) |
|
Binary to Hexadecimal Conversion |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
26 | (2) |
|
Answers to Review Questions |
|
|
28 | (1) |
|
Configuration and IOS Commands |
|
|
29 | (58) |
|
Cisco Router User Interface |
|
|
30 | (29) |
|
|
30 | (1) |
|
Command Line Interface (CLI) |
|
|
31 | (23) |
|
The Configuration Register |
|
|
54 | (2) |
|
Changing the Configuration Register |
|
|
56 | (1) |
|
|
57 | (2) |
|
|
59 | (8) |
|
|
62 | (2) |
|
|
64 | (2) |
|
Using a Cisco Router as a TFTP Host |
|
|
66 | (1) |
|
Cisco Discovery Protocol (CDP) |
|
|
67 | (8) |
|
|
68 | (1) |
|
|
69 | (1) |
|
|
70 | (5) |
|
Using an ACL to Control Vty Access |
|
|
75 | (1) |
|
|
76 | (5) |
|
Terminal Access Server Functionality |
|
|
77 | (1) |
|
Using a Reverse Telnet Session |
|
|
77 | (1) |
|
|
78 | (1) |
|
Terminal Access Server Configuration |
|
|
79 | (1) |
|
Terminal Access Server Troubleshooting |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
83 | (2) |
|
Answers to Review Questions |
|
|
85 | (2) |
|
WAN Technologies and Configuration |
|
|
87 | (44) |
|
Physical Layer Technologies |
|
|
88 | (4) |
|
Synchronous Lines (T1/E1) |
|
|
88 | (2) |
|
|
90 | (1) |
|
Dynamic Packet Transport (DPT)/Spatial Reuse Protocol (SRP) |
|
|
91 | (1) |
|
|
92 | (12) |
|
Packet Switching and X.25 |
|
|
92 | (4) |
|
High-Level Data Link Control (HDLC) Protocol |
|
|
96 | (1) |
|
Point-to-Point Protocol (PPP) |
|
|
96 | (2) |
|
|
98 | (6) |
|
Configuring HDLC on a Cisco Router |
|
|
104 | (1) |
|
|
104 | (1) |
|
HDLC Configuration Commands |
|
|
105 | (1) |
|
Configuring PPP on a Cisco Router |
|
|
105 | (1) |
|
PPP Configuration Commands |
|
|
106 | (1) |
|
Configuring Frame Relay on a Cisco Router |
|
|
106 | (19) |
|
Frame Relay Switch Configuration Command |
|
|
107 | (3) |
|
Frame Relay Router Configuration Commands |
|
|
110 | (7) |
|
Troubleshooting Frame Relay |
|
|
117 | (8) |
|
|
125 | (1) |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
127 | (2) |
|
Answers to Review Questions |
|
|
129 | (2) |
|
Asynchronous Transfer Mode (ATM) |
|
|
131 | (36) |
|
|
132 | (6) |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
136 | (2) |
|
Introduction to LAN Emulation |
|
|
138 | (6) |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
141 | (1) |
|
The LAN Emulation Configuration Server |
|
|
142 | (1) |
|
The Broadcast and Unknown Server |
|
|
143 | (1) |
|
|
144 | (3) |
|
|
147 | (14) |
|
Configuring ATM Permanent Virtual Circuits (PVCs) |
|
|
149 | (5) |
|
Configuring PVC Auto Discovery |
|
|
154 | (1) |
|
Configuring ATM Switched Virtual Circuits (SVCs) |
|
|
155 | (6) |
|
|
161 | (1) |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
164 | (2) |
|
Answers to Review Questions |
|
|
166 | (1) |
|
|
167 | (22) |
|
|
168 | (8) |
|
|
169 | (7) |
|
Token Ring Specialized Components |
|
|
176 | (3) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
Configuration Report Server |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
180 | (2) |
|
|
180 | (1) |
|
Token Ring Troubleshooting |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
185 | (2) |
|
Answers to Review Questions |
|
|
187 | (2) |
|
Ethernet LAN Technologies |
|
|
189 | (68) |
|
|
190 | (10) |
|
Carrier Sense Multiple Access with Collision Detect (CSMA/CD) |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
193 | (4) |
|
|
197 | (1) |
|
|
198 | (2) |
|
|
200 | (1) |
|
|
200 | (6) |
|
10 Gigabit Ethernet (802.3ae) |
|
|
201 | (1) |
|
Wireless Ethernet IEEE 802.11b |
|
|
202 | (4) |
|
Configuring the Catalyst 5000 and 3550 Switches |
|
|
206 | (44) |
|
Catalyst Configuration Commands |
|
|
206 | (43) |
|
Troubleshooting the Catalyst Switch |
|
|
249 | (1) |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
252 | (1) |
|
|
253 | (2) |
|
Answers to Review Questions |
|
|
255 | (2) |
|
Building the Layer 2 Network |
|
|
257 | (30) |
|
|
259 | (3) |
|
Layer 2 Configuration Task 2.1 |
|
|
262 | (11) |
|
Solution 2.1: Frame Relay Switch (FS) Configuration |
|
|
263 | (2) |
|
Solution 2.1: Router Configurations |
|
|
265 | (5) |
|
Solution 2.1: Catalyst Switch Configuration |
|
|
270 | (3) |
|
Solution 2.1: Testing the Configuration |
|
|
273 | (1) |
|
|
273 | (1) |
|
Layer 2 Configuration Task 2.2 |
|
|
273 | (12) |
|
Solution 2.2: Frame Relay Switch (FS) Configuration |
|
|
274 | (2) |
|
Solution 2.2: Router Configurations |
|
|
276 | (7) |
|
Solution 2.2: Catalyst Switch Configuration |
|
|
283 | (1) |
|
The Issue of Frame Relay and Inverse ARP |
|
|
284 | (1) |
|
Solution 2.2: Testing the Configuration |
|
|
285 | (1) |
|
|
285 | (2) |
|
IP Addressing and Subnetting |
|
|
287 | (52) |
|
|
288 | (16) |
|
The Internet Layer Protocols |
|
|
290 | (6) |
|
The Host-to-Host Layer Protocols |
|
|
296 | (5) |
|
The Process/Application Layer Protocols |
|
|
301 | (3) |
|
|
304 | (9) |
|
|
305 | (1) |
|
The Hierarchical IP Addressing Scheme |
|
|
305 | (7) |
|
|
312 | (1) |
|
|
313 | (8) |
|
|
314 | (1) |
|
Subnetting Class C Addresses |
|
|
314 | (2) |
|
Subnetting Class B Addresses |
|
|
316 | (4) |
|
Subnetting Class A Addresses |
|
|
320 | (1) |
|
|
321 | (3) |
|
|
322 | (2) |
|
Applying Supernets to Cisco Routers |
|
|
324 | (1) |
|
Classless Inter-Domain Routing (CIDR) |
|
|
324 | (6) |
|
|
325 | (1) |
|
Configuring Subnet Mask Display Formats |
|
|
326 | (1) |
|
Variable Length Subnet Masking (VLSM) |
|
|
327 | (3) |
|
|
330 | (2) |
|
|
331 | (1) |
|
|
332 | (1) |
|
|
332 | (2) |
|
|
334 | (1) |
|
|
335 | (2) |
|
Answers to Review Questions |
|
|
337 | (2) |
|
IP Interior Gateway Protocols |
|
|
339 | (104) |
|
|
340 | (2) |
|
Static Route Configuration |
|
|
340 | (2) |
|
Administrative Distance for All Routing Protocols |
|
|
342 | (2) |
|
|
343 | (1) |
|
Distance Vector Operation |
|
|
344 | (3) |
|
|
344 | (1) |
|
Rule of Split-Horizon and Route Poisoning |
|
|
345 | (1) |
|
|
346 | (1) |
|
|
347 | (1) |
|
Routing Information Protocol (RIP) |
|
|
347 | (10) |
|
|
347 | (1) |
|
|
348 | (2) |
|
Manipulating Routes with RIP |
|
|
350 | (1) |
|
Configuring RIP Version 1 |
|
|
351 | (1) |
|
|
352 | (4) |
|
Configuring RIP Version 2 |
|
|
356 | (1) |
|
Interior Gateway Routing Protocol (IGRP) |
|
|
357 | (12) |
|
The Five Path Vector Metrics for IGRP |
|
|
358 | (3) |
|
|
361 | (1) |
|
IGRP: Classful (FLSM) Example |
|
|
362 | (2) |
|
Manipulating Routes with IGRP |
|
|
364 | (1) |
|
Rule of Split-Horizon for IGRP |
|
|
365 | (1) |
|
Unequal-Cost Load-Balancing Traffic |
|
|
365 | (1) |
|
Configuring IGRP on a Router |
|
|
365 | (1) |
|
|
366 | (2) |
|
|
368 | (1) |
|
Enhanced Interior Gateway Routing Protocol (EIGRP) |
|
|
369 | (23) |
|
Differences between EIGRP and IGRP |
|
|
370 | (2) |
|
The Five Path Vector Metrics for EIGRP |
|
|
372 | (11) |
|
Manipulating Routes with EIGRP |
|
|
383 | (1) |
|
Rule of Split-Horizon for EIGRP |
|
|
384 | (1) |
|
|
384 | (2) |
|
Configuring EIGRP on a Router |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
388 | (1) |
|
|
389 | (3) |
|
|
392 | (1) |
|
Intermediate System-to-Intermediate System (IS-IS) |
|
|
392 | (16) |
|
Network Entity Title (NET) |
|
|
394 | (2) |
|
|
396 | (2) |
|
|
398 | (1) |
|
Default Route Propagation |
|
|
399 | (1) |
|
IS-IS Interarea Default Routes |
|
|
400 | (2) |
|
Address Summarization for IS-IS |
|
|
402 | (1) |
|
Narrow-Style Metrics vs. Wide-Style Metrics |
|
|
402 | (1) |
|
Understanding the Network Types |
|
|
403 | (1) |
|
|
404 | (3) |
|
IS-IS Troubleshooting Commands |
|
|
407 | (1) |
|
Open Shortest Path First (OSPF) |
|
|
408 | (30) |
|
|
408 | (1) |
|
|
409 | (3) |
|
|
412 | (1) |
|
OSPF Link-State Advertisements |
|
|
413 | (2) |
|
|
415 | (1) |
|
|
416 | (3) |
|
OSPF Designated Router (DR) |
|
|
419 | (1) |
|
|
419 | (1) |
|
Activating OSPF Interfaces |
|
|
420 | (1) |
|
|
421 | (2) |
|
Summary Addressing in OSPF |
|
|
423 | (3) |
|
Configuring OSPF Authentication |
|
|
426 | (4) |
|
Configuring OSPF Virtual Links |
|
|
430 | (4) |
|
Configuring OSPF on the Router |
|
|
434 | (4) |
|
|
438 | (1) |
|
|
438 | (1) |
|
|
439 | (1) |
|
|
440 | (2) |
|
Answers to Review Questions |
|
|
442 | (1) |
|
Protocol Redistribution and NAT |
|
|
443 | (40) |
|
|
444 | (1) |
|
Controlling Redistribution |
|
|
445 | (12) |
|
|
446 | (4) |
|
|
450 | (1) |
|
|
450 | (2) |
|
|
452 | (3) |
|
|
455 | (2) |
|
Redistributing between Classful and Classless Routing Protocols |
|
|
457 | (6) |
|
Classless Routing Protocol with a Longer Mask Redistributing Routes into a Classful Routing Protocol |
|
|
457 | (2) |
|
Classless Routing Protocol with a Shorter Mask Redistributing Routes into a Classful Routing Protocol |
|
|
459 | (4) |
|
|
463 | (1) |
|
Network Address Translation (NAT) |
|
|
464 | (13) |
|
|
465 | (1) |
|
|
466 | (1) |
|
|
466 | (2) |
|
|
468 | (1) |
|
|
469 | (1) |
|
NAT: Overloading or Port Address Translation (PAT) |
|
|
470 | (2) |
|
|
472 | (1) |
|
|
473 | (3) |
|
|
476 | (1) |
|
|
477 | (1) |
|
|
477 | (1) |
|
|
478 | (1) |
|
|
479 | (3) |
|
Answers to Review Questions |
|
|
482 | (1) |
|
Configuring the Layer 3 Network |
|
|
483 | (38) |
|
|
485 | (3) |
|
Layer 3 Configuration Task 3.1 |
|
|
488 | (16) |
|
Solution 3.1: Configuring RIP on the Network |
|
|
489 | (3) |
|
Solution 3.1: Configuring OSPF on the Network |
|
|
492 | (5) |
|
Solution 3.1: Configuring IS-IS on the Network |
|
|
497 | (4) |
|
Solution 3.1: Configuring Redistribution on the Network |
|
|
501 | (3) |
|
Solution 3.1: Testing the Network |
|
|
504 | (1) |
|
Solution 3.1: Troubleshooting the Network |
|
|
504 | (1) |
|
Layer 3 Configuration Task 3.2 |
|
|
504 | (16) |
|
Solution 3.2: Configuring OSPF on the Network |
|
|
506 | (5) |
|
Solution 3.2: Configuring EIGRP on the Network |
|
|
511 | (2) |
|
Solution 3.2: Configuring IGRP on the Network |
|
|
513 | (1) |
|
Solution 3.2: Configuring Redistribution on the Network |
|
|
514 | (5) |
|
Solution 3.2: Testing the Network |
|
|
519 | (1) |
|
Solution 3.2: Troubleshooting the Network |
|
|
519 | (1) |
|
|
520 | (1) |
|
Border Gateway Protocol (BGP) |
|
|
521 | (80) |
|
|
522 | (2) |
|
When Shouldn't I Use BGP? |
|
|
524 | (1) |
|
|
524 | (2) |
|
Stub and Transit Autonomous Systems |
|
|
524 | (2) |
|
|
526 | (14) |
|
|
527 | (2) |
|
Classful, Classless Inter-Domain Routing and Summarization |
|
|
529 | (1) |
|
Advertising Networks into BGP |
|
|
530 | (1) |
|
|
530 | (4) |
|
|
534 | (1) |
|
BGP Two-Step Routing Process |
|
|
535 | (5) |
|
|
540 | (41) |
|
|
541 | (2) |
|
|
543 | (4) |
|
|
547 | (1) |
|
Configuring BGP Attributes |
|
|
547 | (10) |
|
Configuring and Using Communities |
|
|
557 | (10) |
|
Using BGP Regular Expressions |
|
|
567 | (2) |
|
|
569 | (11) |
|
|
580 | (1) |
|
|
581 | (1) |
|
|
581 | (13) |
|
|
582 | (1) |
|
Solution for BGP Configuration Task 1 |
|
|
583 | (10) |
|
|
593 | (1) |
|
|
594 | (1) |
|
|
595 | (2) |
|
|
597 | (1) |
|
|
598 | (2) |
|
Answers to Review Questions |
|
|
600 | (1) |
|
|
601 | (34) |
|
Internetwork Packet Exchange (IPX) |
|
|
602 | (24) |
|
|
603 | (1) |
|
IPX Addresses, Protocol, and Socket numbers |
|
|
604 | (2) |
|
Service Advertising Protocol (SAP) and Get Nearest Server (GNS) |
|
|
606 | (2) |
|
Configuring IPX with IPX RIP |
|
|
608 | (4) |
|
Configuring IPX with IPX EIGRP |
|
|
612 | (3) |
|
Configuring IPX with NLSP |
|
|
615 | (2) |
|
Configuring IPX Route Redistribution |
|
|
617 | (1) |
|
Configuring the IPXWAN Protocol |
|
|
618 | (1) |
|
Configuring IPX through a GRE Tunnel |
|
|
619 | (2) |
|
Static Routes, Default Routes, and SAPs |
|
|
621 | (2) |
|
|
623 | (3) |
|
|
626 | (2) |
|
|
627 | (1) |
|
|
627 | (1) |
|
|
628 | (1) |
|
|
628 | (1) |
|
|
629 | (1) |
|
|
630 | (1) |
|
|
631 | (3) |
|
Answers to Review Questions |
|
|
634 | (1) |
|
Bridging and Data-Link Switching (DLSw) |
|
|
635 | (72) |
|
|
636 | (2) |
|
|
637 | (1) |
|
|
638 | (5) |
|
Configuring Transparent Bridging |
|
|
642 | (1) |
|
The Spanning-Tree Protocol (STP) and Algorithm |
|
|
643 | (4) |
|
Spanning Tree Global Commands |
|
|
646 | (1) |
|
Spanning-Tree Interface Commands |
|
|
646 | (1) |
|
Source-Route Bridging (SRB) |
|
|
647 | (2) |
|
|
649 | (6) |
|
Configuring Local Source-Route Bridging |
|
|
651 | (4) |
|
Introduction to Remote Source-Route Bridging (RSRB) |
|
|
655 | (7) |
|
|
655 | (1) |
|
|
656 | (5) |
|
|
661 | (1) |
|
Source-Route Transparent (SRT) Bridging |
|
|
662 | (2) |
|
Configuring Source-Route Transparent (SRT) Bridging |
|
|
663 | (1) |
|
Source-Route Translational Bridging (SR/TLB) |
|
|
664 | (3) |
|
Configuring Source-Route/Translational Bridging |
|
|
666 | (1) |
|
Canonical vs. Noncanonical Bit Ordering |
|
|
667 | (1) |
|
Concurrent Routing and Bridging (CRB) and Integrated Routing and Bridging (IRB) |
|
|
668 | (4) |
|
Configuring Concurrent Routing and Bridging (CRB) |
|
|
669 | (1) |
|
Configuring Integrated Routing and Bridging (IRB) |
|
|
669 | (3) |
|
Bridging: Troubleshooting Commands |
|
|
672 | (1) |
|
Data-Link Switching (DLSw) |
|
|
673 | (27) |
|
|
675 | (1) |
|
|
676 | (12) |
|
|
688 | (8) |
|
DLSw Improved Scalability with Border Peers and Peer on Demand |
|
|
696 | (3) |
|
|
699 | (1) |
|
|
700 | (1) |
|
|
701 | (1) |
|
|
702 | (1) |
|
|
703 | (3) |
|
Answers to Review Questions |
|
|
706 | (1) |
|
Integrated Services Digital Network (ISDN) and Dial Backup |
|
|
707 | (48) |
|
What Is Integrated Services Digital Network (ISDN)? |
|
|
708 | (1) |
|
|
709 | (2) |
|
Basic Rate Interface (BRI) |
|
|
710 | (1) |
|
Primary Rate Interface (PRI) |
|
|
710 | (1) |
|
|
711 | (2) |
|
|
713 | (1) |
|
|
714 | (3) |
|
|
714 | (3) |
|
|
717 | (2) |
|
|
717 | (1) |
|
|
718 | (1) |
|
Configuring Dial Backup with IP |
|
|
719 | (13) |
|
|
720 | (1) |
|
|
720 | (1) |
|
|
721 | (1) |
|
|
722 | (1) |
|
|
722 | (1) |
|
|
723 | (1) |
|
|
724 | (1) |
|
|
725 | (1) |
|
|
725 | (2) |
|
|
727 | (2) |
|
|
729 | (1) |
|
|
730 | (1) |
|
|
731 | (1) |
|
|
732 | (2) |
|
Configuring Legacy DDR with Callback |
|
|
734 | (4) |
|
Configuring Dialer Profiles |
|
|
738 | (8) |
|
|
738 | (3) |
|
Configuring Dialer Profiles with Callback |
|
|
741 | (5) |
|
|
746 | (3) |
|
|
747 | (2) |
|
|
749 | (1) |
|
|
749 | (1) |
|
|
750 | (1) |
|
|
751 | (2) |
|
Answers to Review Questions |
|
|
753 | (2) |
|
Access Control Lists (ACLs) |
|
|
755 | (36) |
|
What Is an Access Control List? |
|
|
756 | (1) |
|
|
757 | (3) |
|
Applying Access Lists to an Interface as Traffic Filters |
|
|
758 | (1) |
|
Applying Access Lists under the Routing Processes |
|
|
758 | (1) |
|
Applying Access Lists to Control Access to Vty Lines |
|
|
758 | (1) |
|
Applying Access Lists for Queuing Mechanisms |
|
|
758 | (1) |
|
Applying Access Lists for Traffic Shaping and Policing Tools |
|
|
759 | (1) |
|
Applying Access Lists for Cisco Encryption and IPSEC |
|
|
759 | (1) |
|
Applying Access Lists for Dialing Applications |
|
|
759 | (1) |
|
Applying Access Lists for Network Address Translations (NAT) |
|
|
759 | (1) |
|
|
760 | (25) |
|
Configuring IP Access Lists |
|
|
761 | (14) |
|
Configuring IPX Access Lists |
|
|
775 | (3) |
|
Nonroutable Traffic Access Lists |
|
|
778 | (7) |
|
ACL Troubleshooting Commands |
|
|
785 | (1) |
|
|
785 | (1) |
|
|
786 | (1) |
|
|
786 | (1) |
|
|
787 | (2) |
|
Answers to Review Questions |
|
|
789 | (2) |
|
Route Filtering Capabilities |
|
|
791 | (34) |
|
|
792 | (1) |
|
|
793 | (1) |
|
Applying Route Filters and Policies |
|
|
793 | (25) |
|
|
794 | (7) |
|
|
801 | (3) |
|
|
804 | (2) |
|
Policy-Based Routing (PBR) |
|
|
806 | (2) |
|
Using Regular Expressions (regexp) |
|
|
808 | (4) |
|
|
812 | (6) |
|
|
818 | (1) |
|
|
819 | (1) |
|
|
820 | (1) |
|
|
821 | (2) |
|
Answers to Review Questions |
|
|
823 | (2) |
|
|
825 | (52) |
|
Delivering Network Services |
|
|
826 | (11) |
|
|
826 | (1) |
|
|
827 | (2) |
|
|
829 | (1) |
|
Packet Classification and Marking |
|
|
830 | (7) |
|
|
837 | (21) |
|
First In/First Out (FIFO) |
|
|
838 | (1) |
|
|
839 | (2) |
|
|
841 | (3) |
|
Weighted Fair Queuing (WFQ) |
|
|
844 | (3) |
|
Weighted Random Early Detection (WRED) |
|
|
847 | (2) |
|
Weighted Round Robin (WRR) |
|
|
849 | (1) |
|
Class-Based Weighed Fair Queuing (CBWFQ) |
|
|
850 | (4) |
|
|
854 | (1) |
|
Low Latency Queuing (LLQ) |
|
|
855 | (3) |
|
Traffic Shaping and Policing |
|
|
858 | (12) |
|
|
859 | (8) |
|
Committed Access Rate (CAR) and Policing |
|
|
867 | (1) |
|
Network Based Application Recognition (NBAR) |
|
|
868 | (1) |
|
|
869 | (1) |
|
|
870 | (1) |
|
|
871 | (1) |
|
|
872 | (1) |
|
|
873 | (2) |
|
Answers to Review Questions |
|
|
875 | (2) |
|
|
877 | (28) |
|
|
878 | (7) |
|
|
878 | (1) |
|
|
879 | (2) |
|
|
881 | (4) |
|
|
885 | (2) |
|
|
885 | (1) |
|
|
886 | (1) |
|
Security Servers and Authorization |
|
|
887 | (1) |
|
|
887 | (3) |
|
|
887 | (2) |
|
|
889 | (1) |
|
Authentication, Authorization, and Accounting (AAA) |
|
|
890 | (5) |
|
Security Servers and Accounting |
|
|
890 | (1) |
|
Controlling Network Traffic |
|
|
890 | (1) |
|
Private Internet Exchange (PIX) |
|
|
891 | (1) |
|
IP Access Control Lists (ACLs) |
|
|
892 | (1) |
|
Network Address Translation (NAT) |
|
|
893 | (1) |
|
|
893 | (1) |
|
|
894 | (1) |
|
Multimedia Considerations |
|
|
894 | (1) |
|
|
895 | (1) |
|
|
895 | (1) |
|
|
895 | (1) |
|
|
896 | (2) |
|
Internet Key Exchange and IP Security |
|
|
896 | (1) |
|
|
897 | (1) |
|
|
898 | (1) |
|
|
899 | (1) |
|
|
900 | (1) |
|
|
901 | (2) |
|
Answers to Review Questions |
|
|
903 | (2) |
|
Multiservice Technologies |
|
|
905 | (34) |
|
|
907 | (6) |
|
|
908 | (1) |
|
|
909 | (2) |
|
|
911 | (2) |
|
Telecommunication Standards |
|
|
913 | (2) |
|
Real-Time Transport Protocol and RTP Control Protocol |
|
|
913 | (2) |
|
|
915 | (1) |
|
Session Initiation Protocol |
|
|
916 | (1) |
|
Analog-to-Digital Signal Conversion |
|
|
916 | (3) |
|
|
917 | (1) |
|
|
917 | (1) |
|
|
917 | (2) |
|
Voice-over-Network Configuration |
|
|
919 | (9) |
|
|
919 | (1) |
|
|
920 | (4) |
|
Optional Voice Port Capabilities |
|
|
924 | (3) |
|
Optional Dial Capabilities |
|
|
927 | (1) |
|
|
928 | (1) |
|
Multiprotocol Label Switching |
|
|
929 | (5) |
|
|
930 | (1) |
|
MPLS Label Switch Routers |
|
|
931 | (1) |
|
|
932 | (1) |
|
MPLS Virtual Private Networks |
|
|
932 | (2) |
|
|
934 | (1) |
|
|
935 | (1) |
|
|
935 | (1) |
|
|
936 | (2) |
|
Answers to Review Questions |
|
|
938 | (1) |
|
|
939 | (42) |
|
|
940 | (4) |
|
|
940 | (1) |
|
|
941 | (1) |
|
|
942 | (2) |
|
|
944 | (5) |
|
Mapping IP Multicast to Ethernet |
|
|
945 | (4) |
|
Managing Multicast in an Internetwork |
|
|
949 | (7) |
|
Subscribing and Maintaining Groups |
|
|
949 | (1) |
|
|
949 | (3) |
|
|
952 | (1) |
|
Configuring IGMP on a Router |
|
|
953 | (1) |
|
|
953 | (3) |
|
Routing Multicast Traffic |
|
|
956 | (19) |
|
|
956 | (4) |
|
Managing Multicast Delivery |
|
|
960 | (1) |
|
|
961 | (1) |
|
|
962 | (5) |
|
Sparse Mode Routing Protocols |
|
|
967 | (5) |
|
|
972 | (1) |
|
IP Multicast Troubleshooting |
|
|
972 | (1) |
|
IP Multicast Configuration Examples |
|
|
973 | (2) |
|
|
975 | (1) |
|
|
975 | (1) |
|
|
976 | (1) |
|
|
977 | (2) |
|
Answers to Review Questions |
|
|
979 | (2) |
|
|
981 | (31) |
|
Internet Control Message Protocol (ICMP) |
|
|
982 | (5) |
|
ICMP Router Discovery Protocol (IRDP) |
|
|
987 | (2) |
|
|
988 | (1) |
|
|
988 | (1) |
|
|
989 | (1) |
|
|
989 | (2) |
|
The Advantages and Disadvantages of Proxy ARP |
|
|
990 | (1) |
|
Enabling Proxy ARP on Cisco Routers |
|
|
990 | (1) |
|
Disabling Proxy ARP on Cisco Routers |
|
|
991 | (1) |
|
Hot Standby Router Protocol (HSRP) |
|
|
991 | (5) |
|
|
992 | (4) |
|
Dynamic Host Configuration Protocol (DHCP) |
|
|
996 | (6) |
|
Domain Name Service (DNS) |
|
|
1002 | (1) |
|
Hypertext Transfer Protocol (HTTP) |
|
|
1003 | (1) |
|
Network Time Protocol (NTP) |
|
|
1003 | (3) |
|
|
1006 | (1) |
|
|
1007 | (1) |
|
|
1008 | (1) |
|
|
1009 | (2) |
|
Answers to Review Questions |
|
|
1011 | (1) |
Index |
|
1012 | |