OSPF Network Design Solutions (2nd Edition): Computer Science Books @ tvnovellas.info ISBN Why is ISBN important ?. Neural Network Design(英文高清PDF版) 虽然只有前面四章，不过确实非常清晰， 值得下载. 立即下载 Cisco Press - OSPF Network Design Solutions, 2nd Edition. Download file - OSPF Network Design Solutions (2nd edition).pdf.
|Language:||English, Spanish, Portuguese|
|ePub File Size:||28.32 MB|
|PDF File Size:||10.13 MB|
|Distribution:||Free* [*Sign up for free]|
Please make sure to include the book title and ISBN in your message. of OSPF Network Design Solutions and a variety of other networking. OSPF Network Design Solutions (2nd Edition) - Ebook download as PDF File . pdf), Text File .txt) or read book online. OSPF DESIGN GUIDE for Networking. Premium Website; ISBN ; ISBN The comprehensive reference for OSPF network design and.
Add To My Wish List. Register your product to gain access to bonus material or receive a coupon. From a technical perspective, the overwhelming presence of OSPF ensures that you will encounter it at some point in your career. As a result, every networking professional should understand how OSPF operates, how to configure and troubleshoot this important protocol, and most importantly how to design a network that uses OSPF. The book begins in Part I by providing you with a common-sense understanding of the primary building blocks of internetworking, and follows up with a detailed examination of how OSPF fits into the big picture. You will also learn how OSPF neighboring routers communicate with one another via link-state advertisements LSAs and how to optimize this communication for network efficiency.
Gather Facts Step 4: March Italics indicate arguments for which you supply actual values. Square brackets [ ] indicate optional elements. The Command Reference describes these conventions as follows: Token Ring Token Ring Line: Boldface indicates commands and keywords that are entered literally as shown.
If you do intend to read them all. Personnel responsible for understanding OSPF should read this book. These rules can help you understand the constraints and recommendations of properly designing each area within an OSPF network.
You can see that everyone will be exposed to OSPF to some degree. A result of these facts is that everyone should understand OSPF including how it operates. You might need to understand OSPF because you are a programmer. Who Should Read This Book? This book is not designed to be a general networking topics book.
Within each of the design sections. In many cases. Chapter 3. Chapter 4. We are going to look at all the OSPF features. Chapter 5. From a technical perspective. This book is intended to tremendously increase your knowledge level with regards to OSPF. In fact. The basis for this chapter is how to go about monitoring OSPF to ensure it is operating correctly and what to do if it is not.
Chapter 8. There are certain troubleshooting procedures and techniques that you can use to determine the causes of a network problem. Chapter 9. Chapter That is impressive considering the sheer number of transistors on a chip that you can hold in your hand!
Moore updated his prediction to indicate that transistor density would double once every two years. In At least the media are feeding on their own now! Can you imagine modern business or life without computers. Intel should have the capability to integrate 1 billion transistors on a production die that will be operating at 10 GHz.
Gordon Moore of Intel made an interesting observation in I hate to admit it. Is this the new economy in action. Unless you try to do something beyond what you have already mastered. This expansion continues to drive the development. Even more importantly. This could result in a performance of Now almost 40 years later. Internet commerce. In my hometown. If you know someone that has written a script to access information in a router.
Anyone can build the software and hardware needed to communicate within the OSI structure. Those of us responsible for networking these many devices follow a theoretical framework that allows the required functionality to be deployed within our networks. OSI stands for open system interconnection. In terms of future network growth and design. In other words. Before the development of the OSI reference model.
This framework is more commonly known as the OSI reference model. Characteristics of the OSI Layers Figure demonstrates how the layers are spanned by a routing protocol.
Network Associates offers its Guide to Communications Protocols at www. For a better picture of how protocols are positioned in the OSI reference model. Figure provides a good illustration of how the seven layers are grouped in the model. The ISO was the primary architect of the model that is in place today. You might also want to contact Network Associates. Real-Time PPP. The application layer is the highest layer and is closest to the end user.
The opposite. Layer 7—Application The application layer essentially acts as the end-user interface. They are generally implemented only in software programs. MS Outlook. The sections that follow examine the three upper layers. For example.
The sections that follow review the functions of each upper layer in detail. This is the layer where interaction between the mail application cc: NOTE The term upper layer is often used to refer to any higher layer.
Both users and application layer processes interact with software programs that contain a communications component so that the application can interact with the OSI model effectively. The upper layers are typically concerned only with applications. Layer 4—Transport The transport layer is responsible for the logical transport mechanism. The sections that follow review the functions of each of the lower layers in detail.
The most common usage of UDP is streaming media solutions. This is the only layer that provides true source-to-destination. These lower layers are the ones that network engineers and designers need to focus on to be successful.
The physical and data link layers are implemented in hardware and software. Layer 6—Presentation The presentation layer is responsible for the agreement and translation of the communication format syntax between applications.
Another example of the actions that occur in this layer is the encryption and decryption of data in Pretty Good Privacy PGP. The other lower layers are generally implemented only in software.
Routing decisions are made based on the locations of the Internet protocol IP address in question. MAC addresses are 6 bytes or 48 bits in size. An important characteristic of this layer is that the information that is applied to it is used by devices to determine if the packet needs to be acted upon by this layer that is. IP addresses establish separate logical topologies. It is important to note at this point that serial interfaces do not normally require unique Layer 2 station addresses.
Layer 2—Data Link The data link layer provides framing. Table shows an example of an Ethernet address that is assigned to Cisco Systems. All are correct. Layer 1—Physical The physical layer.
The physical layer is composed of three main areas: Figure shows the relationship among the seven layers. At the data link layer Layer 2.
This is known as encapsulation. Figure shows the header and data from one layer that are encapsulated in the header of the next-lowest layer. There are now hundreds of online and print references that spend even more time discussing the OSI model. Control information typically takes one of two forms: This section discusses one of the more commonly used protocol suites: Government packet-switched WAN.
Although at the time. Ethernet frame sizes differ from what is allowable in Token Ring. At the IP layer. TCP accepts messages from upper-layer protocols and provides the messages with an acknowledged reliable connection-oriented transport service to the TCP layer of a remote device. TCP Overview Within this suite of protocols.
When combined. Fragments of a datagram might take different paths through a network. The various names are shown in Figure If a message is too large for the underlying network topology.
Different paths might be available through the Internet. Volume 1. It is somewhat dated in its examples.
Each datagram or fragment is given an IP header and is transmitted as a frame by the lower layers. TCP is the main transport layer protocol that offers connection-oriented transport services. IP handles the size changes as needed. The term segment describes a unit of data at the TCP layer.
This section addresses the media that operates in your network. It offers unreliable. Ethernet is currently traditionally found based on copper wire. You can contrast this with Fast Ethernet and Gigabit Ethernet.
The sections on the OSI reference model described the essential means of how data is transported between the various layers that are running on all intranet devices. The most common types of LANs are as follows: The most common types of WAN connectivity technologies include the following: The functional differences between copper.
FDDI is still in use. Gigabit Ethernet—Yet another version of Ethernet that allows for operational speeds of 1 Gbps. FDDI operates at speeds of Mbps. Frame Relay is a great solution for enterprise networks that require a multipoint WAN media. It has multiple wires that connect stations by forming a ring and operates at speeds of 4 Mbps and 16 Mbps.
The ideal result is seamless access to remote resources from geographically separated end users. Token Ring is mentioned here as a courtesy to IBM its creator. Fast Ethernet operates at a speed of Mbps. The key advantage of DSL over dial-up modems is its speed. Cable modem—Refers to a modem that operates over the ordinary cable TV network cables.
Because the coaxial cable used by cable TV provides much greater bandwidth than telephone lines. Integrated Systems Digital Network ISDN —Consists of digital telephony and data transport services using digitization over a specialized telephone network.
ATM is a high-speed. Information is conveyed in small. ATM is ideally suited to applications that cannot tolerate time delay. Asynchronous transfer mode runs can also run on top of SONET as well as on top of other technologies. DSL is from several to dozens of times faster than a dial-up modem connection.
It is now an ANSI standard. In the United States. The future of ISDN is in question because of the development of digital subscriber line and cable modem technologies. This information is a good reference going forward and as the industry develops higher speeds. DA 5MEJ? Because each wavelength or channel is demultiplexed at the end of the transmission back into the original source.
Figure shows some of the basic differences and choices that are considered when switching is involved. Using DWDM. A third component. In this case. Each of these four decimal numbers is separated by a decimal point.
A host address. Note that these numbers can also be displayed in both the binary and hexadecimal numbering systems. IP addresses can be represented as a group of four decimal numbers. Figure illustrates the basic format of an IP address as determined by using dotted decimal notation.
Regardless of what the device is. A device reads the destination IP address in the packet and makes the appropriate routing decision based on this information.
The method of displaying these numbers is known as dotted decimal notation. NOTE IP addresses or masks of either all 1s or all 0s in each octet are not usually allowed or used in a classful network implementation.
Cisco has made exceptions in using all 1s or all 0s. This address is unique because only one network and one host can have this address. Networking and Routing Fundamentals Consider a network that has been assigned an address of This number is further reduced because network The remaining octets are used to provide over The complete address of this host is The address range would then be This has become an accepted method of shorthand for IP addressing.
An administrator then assigns a host the address of This means that only Class A addresses are available for use. Class D addresses are used for multicast packets. These addresses are reserved for future additions to the IP addressing scheme. These future additions might or might not come to fruition with the advent of IP version 6 IPv6. Class E Addresses Addresses in the range of Class D Addresses Class D addresses are special addresses that do not refer to individual networks.
The node address is determined by the last octet. In most networks. The address range would then be in the range of to The following three blocks of IP address space for private networks have been reserved according to RFC Consider these addresses as being preprogrammed within the logical structure of most network components in that when they see a destination address of this type within a packet.
For the subnets and hosts. Table provides information regarding the different IP address classes. N equals the network number and H equals the host number. Note that in the format column. The calculation actually results in N is the network number. Figure No. Figure shows the various IP address classes by network and host components. If the router does not have enough information to route the packet. An interesting side note here is that the telephone system is also running out of numbers.
This router behavior is known as the longest match rule. Routers make their hierarchical decisions based on the network and host components of an IP address.
A router simply sends the packet to the next hop in the route to reach its destination. A router usually has an interface to which it connects. Devices trying to reach a host within the network that are assigned to that interface are routed through the interface. Even in the use of phone numbers. When a match is found. This interface is assigned an IP address and subnet mask. Figure Example of a Hierarchical IP Address IP address 32 bits in length Network Host Network or IP Address Class aka Prefix Class A address is 8 bits long and always starts with 0 Class B address is 16 bits long and always starts with 10 Class C address is 24 bits long and always starts with Another good example of the hierarchical addressing technique used by routers is your phone number.
IP Subnet Addressing The need for subnetting has resulted in the massive growth of networks in the past decade. Section 5. In many organizations. Assign an address to each subnet. To better understand subnets. As the available address space rapidly continues to shrink. Use the following steps to assign addresses in a subnetted network: The router knows that packets going into or coming out of network Assign IP addresses to each node.
Each subnet would have hosts per subnet. This gives you a complete IP subnet address of If you were to then apply this to an Ethernet interface of a router. Now that you are familiar with the technical explanation of subnet masking. The subnet mask also tells the router which octets of an IP address to pay attention to when comparing the destination address of a packet to its routing table.
What is needed is a piece of hardware with more intelligence—the router. The problem here is that bridges use MAC addresses to make decisions on where to forward packets. Your slow. The most important thing to remember about subnet masks is that you cannot assign IP addresses with no consideration. The problem is that as you begin to connect more segments. Large amounts of broadcasts.
For the purpose of this discussion. The question then becomes. Then you might ask. The following list provides the default subnet masks that are used for each class of IP address: If you give that interface a subnet mask of The router then forwards the packet out interface 2. Simply put. The router has been designed to drop all packets if it does not know where to forward them. Networking and Routing Fundamentals In general terms.
This is because. Figure demonstrates this scenario. IP addresses must be assigned to each router interface—assume xxx. TIP Every interface in a router must be assigned a local subnet mask. If you assigned a subnet mask of Cisco routers do not accept an IP address without a mask.
To recap. If you are interested in learning more about basic subnetting techniques. Different masks can be used for different networks. Subnetting Restrictions Typically. Within a network. VLSM can help optimize available address space. For identical subnet masks. You can use subnet masks in different ways to segment your network.
CIDR enables routers to group routes to reduce the quantity of routing information that is carried by the core routers. Before moving on. For further discussion or examples on this topic. A subnetted network cannot be split into isolated portions because all subnets must be contiguous.
With CIDR. IPv6 tackles issues such as the IP address depletion problem. This example will be discussed in further detail. Visit the following website: Not only do these techniques enable us to better use the remaining IP addresses. This is a move to improve the existing IPv4 implementation. This is an unacceptable situation that many network engineers deal with every day.
This answer is this: IP address depletion. One of the most interesting enhancements on the horizon is IP version 6 IPv6. CIDR was invented to solve this problem and save the Internet from collapse. This means that the current IP address scheme. This is a time of constant change and advancement. A prime example of this is the Internet.
NOTE Not only is address depletion an issue. The situation becomes even more critical when you consider that corporations of all sizes are beginning to use the Internet as a means of revenue.
You can also visit the following website: Figure Comparison of Subnetting and Route Summarization Prefix Length increased Host Subnetting increases the prefix size to enable very specific routes. Prefix Length decreased Host Route summarization decreases the prefix size to enable very general or summarized rates. The following requirements enable route summarization to work properly: Figure demonstrates how subnetting and route summarization differ.
This automatic summarization is always done at network boundaries. Further discussion of classful routing and the issues surrounding its use that is. Routing tables can be much shorter. For one thing. Certain techniques have been developed to assist in overcoming this problem: IP unnumbered. A good example of this type of routing is OSPF.
Impact of Classful Routing The use of classful routing has some considerable impact on a network.
Classful Routing Classful routing always summarizes routes by the major network numbers. The following sections discuss classful and classless routing protocols. Classless routing has the following characteristics: In addition. They are called classful because they always consider the network class. Figure illustrates how classful routing and subnetting can affect your network.
System is configured for OSPF and assigned as the process number router ospf ! Specifies network directly connected to the system network This requirement wastes subnet numbers.
With VLSMs. VLSM also enables the routes within the core to be summarized as VLSMs do this by allowing both big subnets and small subnets. In Example As previously mentioned. In Figure If you decide to implement VLSM. The trick to using this technique is ensuring that you have an adequate number of hosts allocated per subnet.
These additional subnets make 63 additional subnets available. Avoid using two different classful subnet masks inside a given network address.
If small subnets are grouped. In conclusion. Allocate VLSM by taking one regular subnet and subnetting it further. Group VLSM subnets so that routing information can be consolidated. VLSM is not supported by every protocol. This idea leads directly into this section on CIDR.
A route is no longer just an IP address that has been interpreted according to its class with the corresponding network and host bits. CIDR can be thought of as advanced subnetting. The subnetting mask. If it is not properly designed. Without CIDR to aggregate these routes. The primary requirement for CIDR is the use of routing protocols that support it. This growth would have resulted in about So these newer protocols might have to coexist with older protocols that do not support VLSM and would have trouble routing.
This would shut down most common BGPspeaking routers due to memory utilization requirements. Between and Through the implementation of CIDR.
A single Class C appears as A former Class B address might appear as This address can also be represented in CIDR terms as This new look to IP addresses consists of an IP address and a mask length. IP classless causes the router to forward packets that are destined for unknown subnets to the best supernet route possible.
The ip classless command prevents the existence of a single subnet route from blocking access through the default route to other subnets. This is opposite to the old classful idea. IP classless is enabled by default. RFC was published with the purpose of specifying how a subnetted network could use more than one subnet mask.
Assume that in Figure Five remaining bits are not used. If you recall. The third octet uses only 3 bits. See Figure Because a subnetted network could have only a single mask. As discussed earlier in this chapter. VLSMs In One solution to this problem was to allow a subnetted network to alter its subnet mask through the use of VLSM.
This assignment would waste approximately IP host addresses for each small subnet deployed.
The This allows the detailed structure of routing information for one subnet group to be hidden from routers in another subnet group.
This is VLSM in action. The next section takes a look at how you can take an IP address range and subnet it into many different sizes so that you can meet the needs of every part of your organization. Router C is able to summarize the six subnets behind it into a single advertisement Notice how Routers F and G are able to summarize the six subnets behind them into a single advertisement Early discussion focused on learning about the structure of networking as found in the OSI reference model.
All networks require a certain amount of common information with which to operate. Upon this structure. This chapter also established the physical foundations and needs for past.
You also learned about the physical layout of networks. Several commonly used techniques were presented to help you better manage your IP addresses: I wish every network used OSPF.
It is an association established in nature and guided by enduring principles of fellowship. This chapter helps you understand the basic types of routing protocols. You also learn about distance vector protocols and how they operate. The purpose of this book is to teach you how to use and implement OSPF as the protocol of choice. This chapter covers the following objectives: Selecting a routing protocol—One of the most practical objectives required by all network designers is the ability to understand how to select a routing protocol.
This section presents this information. The Essence of Family—from the Successories Collection The family is a harbor of safety in an ocean of change. It is within this environment that all discussions are based.
This section discusses the types of OSPF routers and hierarchical design techniques. What Is a Routing Protocol? A routing protocol can be analyzed as a process. This process can be summarized. OSPF supports a variety of techniques and designations that make operation much smoother.
This process involves open written commentary on a proposed technology in an effort to bring about standardization of that technology. As a result of this capability. If you do not know the number of the RFC. This section discusses the following basic aspects of where and how OSPF functions: Routing—For the router to know in which direction to forward packets.
Using a selected routing protocol. Routed protocols—Protocols that forward data via routers. Metrics are numeric values that represent route path characteristics. The routing protocol builds routing tables that tell the router the optimal path to a destination. Dynamic routing protocols—Protocols that accomplish dynamic routing with a routing algorithm. The most commonly known routed protocol is Internet protocol IP. This information is then stored in the routing table to be used by the router when determining the best route to a destination network.
Routing protocols compare numeric values known as metrics to determine the optimal route sometimes referred to as path. A dynamic routing protocol supports a routed protocol and maintains routing tables. Metrics can be thought of as costs. Examples of dynamic routing protocols include OSPF. In summary. A dynamic routing protocol dynamically exchanges information about paths or topology of the network by distributing routing information throughout a network.
OSPF is a dynamic routing protocol. Figure shows the use of a default route. Figure shows an example of where to place a static route and how a static route is used. The router to which this information is sent is also known as the router or gateway of last resort. This type of routing also takes precedence over routes chosen by dynamic routing protocols. Static routing is not an effective stand-alone solution in a medium. The router has only these two networks in its routing tables. The most common use of static routes is in stub networks.
This type of routing forces the destination within routing tables. In conjunction with a dynamic routing protocol such as OSPF. So how does the router recognize these other networks? This can be accomplished in the following ways: Chapter 7. Controversy surrounds the debate over link-state versus distance vector routing algorithms regarding which is better. Having a routing protocol with a fast convergence time is desirable because disruption of routing can occur during the time that a router spends calculating the new optimal path.
In dynamic routing. Those pieces are then replicated and sent throughout the network from router to router via link-state advertisements [LSAs]. Each record contains the following pieces of information: Each router then assembles these pieces by using the SPF algorithm. A simple way to understand how link-state technology operates is to picture the network as a large jigsaw puzzle. The speed at which they converge makes link-state protocols less prone to routing loops than distance vector protocols.
These factors were obvious in the old fully meshed asynchronous transfer mode ATM networks. In addition to the size of the routing table. From this map. NOTE The principle of link-state routing is that all the routers within an area maintain an identical copy of the network topology.
Link-state protocols are based on link-state algorithms. Link-state routing protocols require routers to periodically send routing updates to their neighboring routers in the internetwork.
During this incremental update. This network topology is contained within a link-state database. One of the primary reasons that additional CPU power and memory are needed is that link-state protocols are based on the distributed map concept.
Each piece of the puzzle holds only one router or one LAN. Figure Link-State Operation Because each router knows the complete topology of the network.
Other key characteristics of OSPF are as follows: OSPF Characteristics OSPF is a link-state protocol in which all routers in the routing domain exchange information and thus know about the complete topology of the network. Sends updates to tables only. Figure illustrates all of these pieces put together in operation. After the network converges. Intermediate IS-IS. It is usually referred to as integrated IS-IS. Consider that RIP carries 25 routes per update. The neighbor then forwards its entire routing table to its neighbors.
Figure illustrates this routing table forwarding process. Distance vector algorithms also known as Bellman-Ford algorithms call for each router to send its entire routing table. Distance vector protocols are often referred to as Bellman-Ford protocols because they are based on a computation algorithm described by R.
What is not shown is the periodic sending of the routing table between neighbors—a mechanism that double-checks that the routing information each router has is valid. In this protocol. When a network is in stable or steady state.
Despite their differences. Because they create a consistent view of the internetwork. A router using RIP passes its entire routing table to each directly connected neighbor router that it knows of.
Key characteristics of RIP are as follows: Chapter 5 is dedicated to RIP. Routing information protocol RIP at cisco. Link-state algorithms can therefore be more expensive to implement and support. RIP maintains routing tables. Volume I. On the downside. This is conceptually simple to understand. The inability of a routing protocol to support other protocols can be a detriment to legacy networks or networks with unique routing needs.
These types of considerations can originate from any area within a company and can be the keystones to the success of the network.
Technical considerations—Assist in determining whether a given protocol is capable of supporting a particular set of network requirements. Problems related to complexity and scale can be addressed with the proper use of hierarchy. Because a router has multiple interfaces.
This results in router interfaces being bound to areas. OSPF routers exchange full topology information about that area because the boundaries of areas fall within a router. Within each area.
IS-IS area boundaries are segmented on a link between two routers. OSPF routers carry full topology information about the backbone and connectivity information about all of the areas. Routing Hierarchies The key to building large networks is to introduce a logical hierarchy. Within an area. OSPF supports two levels of hierarchy: If formal classroom instruction is of interest to you. On the other hand.
OSPF is much more widely implemented and understood through the use of books like this one. Available Resources You must be pragmatic when selecting a routing protocol. Resources should be available to assist network engineers at all levels of competence to help them understand the idiosyncrasies of the protocol that you want to implement. The area border routers should summarize that set of addresses with an address mask. If addresses are assigned appropriately.
These reasons simplify network administration and troubleshooting. Some ISPs are running it. Summarization reduces the amount of routing information that is carried by all routers.
Table Important Technical Considerations: After the routing protocol has detected the topology change. In general. Both protocols cause adjacent routers to exchange information periodically.
Introduction to OSPF Technical Considerations Table provides a list of technical issues to consider when selecting a routing protocol.
The amount of CPU time required to do the recompilation is strongly affected by the number of routes and the amount of redundancy in the network. If the topology change were within the area. Between areas. The three most important questions concerning the operation of routing updates are as follows: If route summarization is not done.
Where are they sent? What is in them? Two components are important in how a routing protocol uses metrics: Metrics The quality of route selection is essentially controlled by the value of the metrics placed upon the various routes.
This results in OSPF having a metric range that is from 0 to All routing protocols supported by Cisco provide load sharing across as many as six equal-cost paths. The default for OSPF is to use four equal-cost paths. OSPF computes the cost of a path by summing the metrics for each hop on that path. VLSM is required to support route summarization. By default. The metric range is 0 to ISO states that routers per area and L2 routers should be possible.
Extensibility Protocols must be able to grow and expand to meet the ever-changing and evolving network environment. Integrated IS-IS computes the cost of a path by summing the metrics for each hop on that path. Business Considerations Table documents business issues to consider when selecting a routing protocol. OSPF can overcome this issue. The most common technique is to use the same routing protocol on all the routers.
Integrated IS-IS is implemented by most of the major router vendors. It is common to have portions of a network that are provided by one vendor and other portions that are provided by another. Multivendor Environments Large networks being designed today do not have the luxury of assuming a single vendor environment. Networks running without the protocols and standards will eventually cause problems. Such protocols are also referred to in the literature and technical documents as SPF-based or distributed database protocols.
OSPF is the routing protocol of choice of almost everyone. You can use several techniques to permit multivendor environments. Proven Technology OSPF has been available for several years from all the major routing vendors and is being deployed in an increasing number of networks ranging from very simple to very complex.
This protocol evolved into RIP. By the time he was Dijkstra did not consider his algorithm very remarkable at the time. OSPF is a link-state protocol. Dijkstra was born in in Rotterdam. This caused a demand for a new protocol that could run within an AS and had the capability to grow scale to a large-sized network comprised of many routers and network links. Serious limitations were encountered with RIP as networks grew. Into this gap stepped OSPF version 1. Edsger W. Textbook Binding.
Oddly enough, I like this book. Odd because, usually, when a book is so poorly edited and contains so many contradictions and errors, I just plain don't like it. Even though I do like it, I don't trust it completely. I downloadd it orginally as a reference about eight months ago and only recently set out to read it carefully from cover to cover.
When I did, I discovered that quite often, the text and accompanying diagrams disagree. Why include the table? A diagram intended to show a chronological sequence of events has no sequencing information whatsoever. In fact, the diagram added nothing of value to the discussion. Besides disagreements between text and accompanying tables and and diagrams, there are many errors of grammar that confuse the points the author is trying to make, to the degree that I wasn't able to understand what I'd just read, re-read and read yet again.
At one point, I stoped reading in disbelief that any editor could have allowed this book into print. I checked the flyleaf and found no fewer than eleven editors listed. Eleven people listed as various kinds of editors and not one of them caught the errors. This book reads fairly well; I've learned quite a bit from the author so far I'm only into chapter four and, oddly enough, I'm enjoying it in spite of the problems.
However, I have to say this looks far more like a rough draft I'd strongly recommend that anyone learning OSPF from this book study other works carefully. I can learn from this book, but the number of errors I've found in the first four chapters makes me feel certain that, somewhere, the author has made mistakes that I won't be able to catch. That means I won't be able to trust completely what I've learned from his writing. Overall, I'm quite disappointed.
I rated two stars instead of one star only because of the content and organization, which I find good, even though rife with errors. This book can do a lot for you if you have your OSPF concepts straightened out esp if you have read the anatomy book by Moy.
This book actually covers all the cisco implementation details of OSPF and talks about practical real world scenarios. It has some really cool case studies in which you have to design an OSPF network to connect several remote locations with the campus network. In fact, you can download that chapter from cisco's website.
I didn't read this book from cover to cover but use it as a reference to figure out OSPF related issues. For instance if you want to see how the 'designated router other' selection works in cisco, you can easily look up in this book. It has good explanation of all OSPF parameters that cisco has implemented in the IOS and the examples show the actual configuration as well. One of the things I like about this book is how well its content and its title go together.
At the same time, Tom is clear that he is writing a book for people who are deploying OSPF solutions, not people who are writing code for routers. The latter is the proper audience for John Moy's book, which complements this one. While some of this material is found in earlier Cisco documents, Tom has added much more value in advising when to use techniques, not just how.
He also gives useful pointers to the continuing development of OSPF, which is not standing still! The book organizes a great deal of information and then gives additional real-world experience for the designer of medium-sized enterprise networks.
One person found this helpful. Nice job! This book is not for the person that just wants a surface knowledge of OSPF. This book talks about many details, and shows how to implement OSPF in a variety of network situations. It is well written, and shows many examples. I revisited this book the other day. It's not bad, but it doesn't have any concrete examples that can help set the concepts in concrete.
Originally, I had a scathing review, but after reviewing the book again, I might have over reacted. This book was actually from the s. Since is a technical book, that info is very relevant. I also have just reveived this book and I cannot say how good this book is. Other routing protocols are also described to complete the book. Best ospf book around and better than the documentation than the Cisco CD contains.
See all 9 reviews. What other items do customers download after viewing this item? Anatomy of an Internet Routing Protocol Paperback. There's a problem loading this menu right now. Learn more about site Prime. Get fast, free shipping with site Prime. Back to top. Get to Know Us.
site Payment Products.