The practical guide to large-scale networking with OSPF and IS-IS
This is the definitive guide to using OSPF and IS-IS protocols in large-scale IP enterprise, carrier, and service provider networks. Well-known network designer Jeff Doyle draws on his consulting experience, offering realistic advice and straight answers on every aspect of working with link-state protocols--from scalability, reliability, and security to area design and database synchronization.
This book is organized to help network engineers and architects compare OSPF and IS-IS. One feature at a time, Doyle first demonstrates how a topic or feature is implemented in OSPF, and then walks through a similar implementation using IS-IS. Professionals who are relatively new to large-scale networking will welcome his practical introduction to the concepts, goals, and history of link state protocols. Coverage includes
Understanding message types, encapsulation, architecture, LSAs, and LSPs
Optimizing addressing, neighbor discovery, adjacencies, and router designation
Improving scalability: controlling the scope of flooding, link state database size, SPF calculation efficiency, and much more
Designing and operating large-scale networks for maximum security and reliability
Hardening networks to thwart attacks against routing protocols
Comparing OSPF and IS-IS extensibility
Utilizing extensions for MPLS-based traffic engineering, IPv6, and multi-topology routing
Troubleshooting OSPF and IS-IS log entries, debug output, and LS databases
Doyle's thorough explanations, end-of-chapter review questions, and many wide-ranging examples for both Cisco's IOS and Juniper's JUNOS also make this book an exceptional resource for anyone pursuing a CCIE or JNCIE certification.
(c) Copyright Pearson Education. All rights reserved.
Voice Over IP is the #1 guide for professionals planning or running VoIP applications. Uyless Black covers every current technical standard, protocol, and interoperability solution.
Cisco Systems, Inc. Modify the current configuration register setting to reflect the way in which you want to load a system image . To do so , change the least significant hexadecimal digit to one of the following : • 0 to load the ...
Principles, Protocols, and Architecture
McGraw-Hill's Cisco IP Library: Unlock the Power of Cisco. Cisco TCP/IP routing professional reference
Describing the protocols that make up the TCP/IP suite, this book provides readers with the background to choose TCP/IP internet hardware and software products to best satisfy their specific requirements.
Handbook of Computer-communications Standards: The TCP
Here is the step-by-step guide to setting up & using firewall security systems-as well as other products-that UNIX programmers have sorely needed. It not only describes what a firewall can...
Quality of Service is a fast growing area of technology, being driven by the growth of real-time applications such as voice over IP. This book is perfect for you, technical...
Why this guide is important; The hammer and XML; XML and Web services; Web Services and Service-Oriented Architecture; Service-Oriented Architecture and the hammer; The hammer and you; The XML &...
This authoritative and practical book offers a current and comprehensive understanding of VoIP (Voice over IP) security. You learn how to design and implement secure VoIP networks and services, and...