Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 1: Introduction to Troubleshooting
Table 1.1: Protocols Used on OSI Layers
Chapter 2: Protocols and Their Characteristics
Table 2.1: Differences between Connection-Oriented and Connectionless Behavior
Table 2.2: Examples of Connection-Oriented and Connectionless Protocols
Table 2.3: The Seven Layers of the OSI Model
Table 2.4: Protocols for OSI Layers
Table 2.5: Fields of PPP Frame
Table 2.6: Phases of the PPP Link
Table 2.7: Configuration of Primary and Secondary Nodes
Table 2.8: Fields of the SDLC Frame
Table 2.9: Differences Between SDLC and HDLC
Table 2.10: The 32-bit IP Address
Table 2.11: Class Requirement and Available Options
Table 2.12: Leading Bits and Address Ranges of Classes
Table 2.13: IP Addresses in Binary Format
Table 2.14: Characteristics of Classes A, B, C, D, and E
Table 2.15: Sample Routing Table
Table 2.16: IGRP Message Format Fields
Table 2.17: Opcode Types
Table 2.18: Protocol-specific TLV Types
Chapter 3: Diagnostic Mechanisms
Table 3.1: The Show Commands with Respect to the Problem Area
Table 3.2: Test Characters and Their Implications
Table 3.3: Test Characters and Their Implications
Table 3.4: Ping Command Options and Their Descriptions
Table 3.5: Commands for Logging Messages
Table 3.6: Level Name, Value, and Description of Debug Log Messages
Chapter 4: Troubleshooting Tools
Table 4.1: The Show Commands and Their Services
Table 4.2: The Debug Command and Its Services
Chapter 5: Troubleshooting TCP/IP
Table 5.1: ping Command Characters and Descriptions
Table 5.2: Cisco-supported Show Commands
Table 5.3: TCP/IP Problems and Symptoms
Table 5.4: TCP/IP Problems and Action Plans
Chapter 6: Troubleshooting RIP Environments
Table 6.1: Characteristics of RIPv1 and RIPv2
Table 6.2: Show Commands and Explanations
Table 6.3: Debug Commands and Explanations
Table 6.4: Commands to Resolve Compatibility Issues Between RIPv1 and RIPv2
Table 6.5: Routing Details for RIP
Table 6.6: Routing Update Information for Router3
Table 6.7: Routing Update Information for Router4
Table 6.8: Split Horizon with Poisoned Reverse Update Packet for Router3
Table 6.9: Router4 Update Packet Status
Chapter 7: Troubleshooting IGRP Routing Environments
Table 7.1: Features of the IGRP Routing Protocol
Table 7.2: IGRP Timers
Table 7.3: Show Commands and Description
Table 7.4: Debug Commands and Descriptions
Chapter 8: Troubleshooting EIGRP Routing Environments
Table 8.1: Features of EIGRP
Table 8.2: Show Commands and Explanations
Table 8.3: debug Commands and Explanations
Table 8.4: Configurations of EIGRP Routers
Table 8.5: Configuration of Routers
Table 8.6: Causes, Commands, and Solutions for the SIA Mode
Chapter 9: Troubleshooting OSPF Routing Environments
Table 9.1: Show Commands and Descriptions
Table 9.2: Debug Commands and Descriptions
Table 9.3: Causes of Neighbor Adjacency Problems and Diagnostic Commands
Table 9.4: Configuration of Routers in Stub Area
Chapter 10: Troubleshooting IS-IS Routing Environments
Table 10.1: Comparing IS-IS Routers
Table 10.2: Data Packets in the IS-IS Routing Protocol
Table 10.3: Show Commands and Descriptions
Table 10.4: debug Commands and Descriptions
Table 10.5: IP Addresses of IS-IS Routers
Chapter 11: Troubleshooting BGP for Routing Environments
Table 11.1: BGP show Commands and Descriptions
Table 11.2: debug Commands to Troubleshoot BGP Problems
Chapter 12: Troubleshooting Redistribution Routing Environments
Table 12.1: Router Configurations
Table 12.2: Router Configuration
Table 12.3: Router Configuration
Table 12.4: Router Configuration
Table 12.5: Router Configuration
Table 12.6: Router Configuration
Previous page
Table of content
Next page
Cisco IP Routing Protocols: Trouble Shooting Techniques (Charles River Media Networking/Security)
ISBN: 1584503416
EAN: 2147483647
Year: 2006
Pages: 130
Authors:
V Anand
,
K Chakrabarty
BUY ON AMAZON
Strategies for Information Technology Governance
Structures, Processes and Relational Mechanisms for IT Governance
Measuring and Managing E-Business Initiatives Through the Balanced Scorecard
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
Governance in IT Outsourcing Partnerships
The Evolution of IT Governance at NB Power
Oracle Developer Forms Techniques
Timers and Displaying a Clock
Base Tables
Does Subclassing Exhibit Intelligence?
Intelligence with Regard to Form Object Properties
A Block Level Commit
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Summary
Configuring and Managing Cisco IPC Express Systems
Cisco IPC Express System GUI Overview
Cisco Voice Network Management Solutions
The main.aef Script
Adobe After Effects 7.0 Studio Techniques
Uber-mastery
Motion Blur
In Conclusion
Pyrotechnics: Fire, Explosions, Energy Phenomena
Learning to See
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity I
Unauthorized Activity II
Internet Security Systems RealSecure
Data Correlation
Incident Response
Digital Character Animation 3 (No. 3)
Finalizing Your Design
Surface Types
Understanding Motion
Conclusion
Developing a Story
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies