Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 1: Introduction to Troubleshooting
Table 1.1: Protocols Used on OSI Layers
Chapter 2: Protocols and Their Characteristics
Table 2.1: Differences between Connection-Oriented and Connectionless Behavior
Table 2.2: Examples of Connection-Oriented and Connectionless Protocols
Table 2.3: The Seven Layers of the OSI Model
Table 2.4: Protocols for OSI Layers
Table 2.5: Fields of PPP Frame
Table 2.6: Phases of the PPP Link
Table 2.7: Configuration of Primary and Secondary Nodes
Table 2.8: Fields of the SDLC Frame
Table 2.9: Differences Between SDLC and HDLC
Table 2.10: The 32-bit IP Address
Table 2.11: Class Requirement and Available Options
Table 2.12: Leading Bits and Address Ranges of Classes
Table 2.13: IP Addresses in Binary Format
Table 2.14: Characteristics of Classes A, B, C, D, and E
Table 2.15: Sample Routing Table
Table 2.16: IGRP Message Format Fields
Table 2.17: Opcode Types
Table 2.18: Protocol-specific TLV Types
Chapter 3: Diagnostic Mechanisms
Table 3.1: The Show Commands with Respect to the Problem Area
Table 3.2: Test Characters and Their Implications
Table 3.3: Test Characters and Their Implications
Table 3.4: Ping Command Options and Their Descriptions
Table 3.5: Commands for Logging Messages
Table 3.6: Level Name, Value, and Description of Debug Log Messages
Chapter 4: Troubleshooting Tools
Table 4.1: The Show Commands and Their Services
Table 4.2: The Debug Command and Its Services
Chapter 5: Troubleshooting TCP/IP
Table 5.1: ping Command Characters and Descriptions
Table 5.2: Cisco-supported Show Commands
Table 5.3: TCP/IP Problems and Symptoms
Table 5.4: TCP/IP Problems and Action Plans
Chapter 6: Troubleshooting RIP Environments
Table 6.1: Characteristics of RIPv1 and RIPv2
Table 6.2: Show Commands and Explanations
Table 6.3: Debug Commands and Explanations
Table 6.4: Commands to Resolve Compatibility Issues Between RIPv1 and RIPv2
Table 6.5: Routing Details for RIP
Table 6.6: Routing Update Information for Router3
Table 6.7: Routing Update Information for Router4
Table 6.8: Split Horizon with Poisoned Reverse Update Packet for Router3
Table 6.9: Router4 Update Packet Status
Chapter 7: Troubleshooting IGRP Routing Environments
Table 7.1: Features of the IGRP Routing Protocol
Table 7.2: IGRP Timers
Table 7.3: Show Commands and Description
Table 7.4: Debug Commands and Descriptions
Chapter 8: Troubleshooting EIGRP Routing Environments
Table 8.1: Features of EIGRP
Table 8.2: Show Commands and Explanations
Table 8.3: debug Commands and Explanations
Table 8.4: Configurations of EIGRP Routers
Table 8.5: Configuration of Routers
Table 8.6: Causes, Commands, and Solutions for the SIA Mode
Chapter 9: Troubleshooting OSPF Routing Environments
Table 9.1: Show Commands and Descriptions
Table 9.2: Debug Commands and Descriptions
Table 9.3: Causes of Neighbor Adjacency Problems and Diagnostic Commands
Table 9.4: Configuration of Routers in Stub Area
Chapter 10: Troubleshooting IS-IS Routing Environments
Table 10.1: Comparing IS-IS Routers
Table 10.2: Data Packets in the IS-IS Routing Protocol
Table 10.3: Show Commands and Descriptions
Table 10.4: debug Commands and Descriptions
Table 10.5: IP Addresses of IS-IS Routers
Chapter 11: Troubleshooting BGP for Routing Environments
Table 11.1: BGP show Commands and Descriptions
Table 11.2: debug Commands to Troubleshoot BGP Problems
Chapter 12: Troubleshooting Redistribution Routing Environments
Table 12.1: Router Configurations
Table 12.2: Router Configuration
Table 12.3: Router Configuration
Table 12.4: Router Configuration
Table 12.5: Router Configuration
Table 12.6: Router Configuration
Previous page
Table of content
Next page
Cisco IP Routing Protocols: Trouble Shooting Techniques (Charles River Media Networking/Security)
ISBN: 1584503416
EAN: 2147483647
Year: 2006
Pages: 130
Authors:
V Anand
,
K Chakrabarty
BUY ON AMAZON
SQL Tips & Techniques (Miscellaneous)
Understanding SQL Basics and Creating Database Files
Using Data Control Language (DCL) to Setup Database Security
Working with Comparison Predicates and Grouped Queries
Retrieving and Manipulating Data Through Cursors
Exploiting MS-SQL Server Built-in Stored Procedures
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
IP Phone Startup Process
Summary
Review Questions
Summary
Configuring Alarms and Traces
A Practitioners Guide to Software Test Design
State-Transition Testing
Exploratory Testing
When to Stop Testing
Section V - Some Final Thoughts
Appendix A Brown & Donaldson Case Study
C++ How to Program (5th Edition)
Initializing Objects with Constructors
Case Study: Random Number Generation
Fundamentals of Operator Overloading
F.6. The #error and #pragma Preprocessor Directives
Appendix I. C++ Internet and Web Resources
Visual C# 2005 How to Program (2nd Edition)
do...while Repetition Statement
Self-Review Exercises
Introduction
Terminology
C.3. The Locals and Watch Windows
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Cisco Firewall Products
Initial Setup and System Maintenance
Deployment Scenarios
Architectural Overview
Configuring IPSec Site-to-Site Tunnels Using Certificates
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies