Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Introduction to Internetworking
Figure 1.1: Repeater in a LAN
Figure 1.2: Bridging a LAN
Figure 1.3: LAN connections in a hub
Figure 1.4: A router segmenting a LAN
Figure 1.5: Routers connecting three cities creating a WAN
Figure 1.6: Physical data flow through a model
Figure 1.7: Logical data flow between peer layers
Figure 1.8: The layers of the OSI reference model
Figure 1.9: OSI layer functions
Figure 1.10: Transport layer data segments sharing a traffic stream
Figure 1.11: Establishing a connection-oriented session
Figure 1.12: Transmitting segments with flow control
Figure 1.13: TCP/IP window sizes
Figure 1.14: Transport layer reliable delivery
Figure 1.15: Communicating through an internetwork
Figure 1.16: The Network layer process
Figure 1.17: Ethernet II and 802.3 Ethernet frames
Figure 1.18: The LLC sublayer of the Data Link layer
Figure 1.19: Data encapsulation at each layer of the OSI reference model
Figure 1.20: FDDI network topology
Figure 1.21: Dual-ring reliability
Figure 1.22: Token Ring media access control field
Figure 1.23: Token Ring frame status field
Figure 1.24: Identifying collision and broadcast domains
Chapter 2: LAN Segmentation
Figure 2.1: Ethernet network with repeaters
Figure 2.2: Segmentation with a bridge
Figure 2.3: Routing tables are kept for each Network layer routing protocol.
Figure 2.4: Empty forward/filter table on a switch
Figure 2.5: How switches learn hosts’ locations
Figure 2.6: Broadcast storm
Figure 2.7: Multiple frame copies
Figure 2.8: A traditional 80/20 network
Figure 2.9: A 20/80 network
Figure 2.10: Different switching modes within a frame
Figure 2.11: Flat network structure
Figure 2.12: The advantage of a switched network
Figure 2.13: Physical LANs connected to a router in a traditional network
Figure 2.14: Switches removing the physical boundary
Figure 2.15: Access and trunk links in a switched network
Figure 2.16: Half-duplex circuitry
Figure 2.17: Full-duplex circuitry
Chapter 3: Network Protocols
Figure 3.1: The DOD model and the OSI model
Figure 3.2: The TCP/IP protocol suite
Figure 3.3: MAC addresses
Figure 3.4: Resolving a local IP address
Figure 3.5: Resolving a remote IP address
Figure 3.6: IPX protocol suite and the OSI model
Figure 3.7: Remote IPX clients on a serverless network
Chapter 4: Pre-Design Procedures
Figure 4.1: Cisco’s Small- to Medium-Sized Business Solutions Framework
Figure 4.2: High-level topology map
Chapter 5: Designing Modular Network Topologies
Figure 5.1: A basic hierarchical network
Figure 5.2: An expanded hierarchical network
Figure 5.3: Hierarchical network design
Figure 5.4: Access layer additions
Figure 5.5: A sample internetwork
Figure 5.6: An HSRP example—logical
Figure 5.7: An HSRP example—physical
Figure 5.8: A full mesh network
Figure 5.9: A redundant hierarchical network
Figure 5.10: Pinhole congestion
Chapter 6: Enterprise WAN Design
Figure 6.1: Point-to-point connections between branches and the corporate office
Figure 6.2: Point-to-point protocol stack
Figure 6.3: Partial meshed network examples
Chapter 7: Network Addressing and Naming
Figure 7.1: IP address example
Figure 7.2: The makeup of an IP version 4 address
Figure 7.3: Hierarchical IP address structure
Figure 7.4: Hierarchical routing decisions
Figure 7.5: VLSM subnet adjustment
Figure 7.6: VLSM implementation example
Figure 7.7: Fourteen subnets with no VLSM applied
Figure 7.8: Fourteen subnets with VLSM applied
Figure 7.9: The three steps in creating a VLSM table
Figure 7.10: VLSM network example one
Figure 7.11: VLSM table example one
Figure 7.12: VLSM network example two
Figure 7.13: VLSM table example two
Figure 7.14: VLSM network example three
Figure 7.15: VLSM table example three
Figure 7.16: VLSM network example four
Figure 7.17: VLSM table example four
Figure 7.18: Route summarization
Figure 7.19: Discontiguous networking example
Figure 7.20: An
ip
unnumbered
example
Figure 7.21: An
ip
helper-address
single server example
Figure 7.22: An
ip
helper-address
multiple server example
Figure 7.23: Network address translation
Figure 7.24: Serial interface addressing example
Chapter 8: Routing Protocols
Figure 8.1: Distance-vector operation with three routers.
Figure 8.2: Distance-vector network decisions
Figure 8.3: Route types recognized by IGRP
Figure 8.4: IGRP route update process
Figure 8.5: Split horizon
Figure 8.6: Route updates vs. calculation
Figure 8.7: Best-route selection
Figure 8.8: Handling route changes
Chapter 9: Link-State and Bridging Protocols
Figure 9.1: OSPF peer initialization
Figure 9.2: OSPF LSU and LSAck exchange
Figure 9.3: IS-IS areas with Level 1 and Level 2 routing
Figure 9.4: IS-IS area and NET configuration
Figure 9.5: OSI-model bridge routing
Figure 9.6: Transparent bridge
Figure 9.7: Workstation 1–to–Server 1 frame
Figure 9.8: Server 1–to–Workstation 1 frame
Figure 9.9: Redundant bridges
Figure 9.10: Spanning-Tree Protocol implemented
Chapter 10: Cisco IOS Software
Figure 10.1: Priority assignment using weighted fair queuing
Figure 10.2: Bandwidth allocation with weighted fair queuing
Figure 10.3: Dispatching algorithm in priority queuing
Figure 10.4: Custom queuing algorithm
Chapter 13: Designing Networks for Integrated Security and Voice Transport
Figure 13.1: Firewall placement
Figure 13.2: A three-part firewall system
Figure 13.3: Modules of a SAFE network design
Previous page
Table of content
Next page
CCDA: Cisco Certified Design Associate Study Guide, 2nd Edition (640-861)
ISBN: 0782142001
EAN: 2147483647
Year: 2002
Pages: 201
Authors:
Todd Lammle
,
Andy Barkl
BUY ON AMAZON
Java I/O
Meta-Information: Manifest Files and Signatures
The jar Tool
JarFile
Reading and Writing Objects
Nonblocking I/O
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Jump Start with SWT/JFace
Text Controls
Dialogs
Other Important SWT Components
Sample Application
SQL Hacks
Hack 24. Multiply Across a Result Set
Hack 50. Combine Tables Containing Different Data
Hack 55. Import Someone Elses Data
Hack 72. Extract a Subset of the Results
Hack 80. Play Six Degrees of Kevin Bacon
C & Data Structures (Charles River Media Computer Engineering)
Memory Allocation
Union
Arrays, Searching, and Sorting
Linked Lists
Problems in Trees
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The Pulsing Heart of ASP.NET AJAX
Partial Page Rendering
The AJAX Control Toolkit
Built-in Application Services
Building AJAX Applications with ASP.NET
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Social Actors
Credibility and the World Wide Web
Increasing Persuasion through Mobility and Connectivity
Captology Looking Forward
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies