larger cover

Add To My Wish List

Register your product to gain access to bonus material or receive a coupon.

Routing TCP/IP, Volume 1, 2nd Edition

eBook (Watermarked)

  • Your Price: $58.88
  • List Price: $73.60
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe Reader PDF The popular standard, used most often with the free Acrobat® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Also available in other formats.

  • Description
  • Sample Content
  • Updates
  • Copyright 2010
  • Dimensions: 7-3/8" x 9-1/8"
  • Edition: 2nd
  • eBook (Watermarked)
  • ISBN-10: 0-13-311603-4
  • ISBN-13: 978-0-13-311603-8

A detailed examination of interior routing protocols -- completely updated in a new edition

  • A complete revision of the best-selling first edition--widely considered a premier text on TCP/IP routing protocols
  • A core textbook for CCIE preparation and a practical reference for network designers, administrators, and engineers
  • Includes configuration and troubleshooting lessons that would cost thousands to learn in a classroom and numerous real-world examples and case studies

    Praised in its first edition for its approachable style and wealth of information, this new edition provides readers a deep understanding of IP routing protocols, teaches how to implement these protocols using Cisco routers, and brings readers up to date protocol and implementation enhancements. Routing TCP/IP, Volume 1, Second Edition, includes protocol changes and Cisco features that enhance routing integrity, secure routers from attacks initiated through routing protocols, and provide greater control over the propagation of routing information for all the IP interior routing protocols. Routing TCP/IP, Volume 1, Second Edition, provides a detailed analysis of each of the IP interior gateway protocols (IGPs). Its structure remains the same as the best-selling first edition, though information within each section is enhanced and modified to include the new developments in routing protocols and Cisco implementations. What's New In This Edition? The first edition covers routing protocols as they existed in 1998. The new book updates all covered routing protocols and discusses new features integrated in the latest version of Cisco IOS Software. IPv6, its use with interior routing protocols, and its interoperability and integration with IPv4 are also integrated into this book. Approximately 200 pages of new information are added to the main text, with some old text removed. Additional exercise and solutions are also included.

  • Table of Contents

    Part I    Routing Basics

    Chapter 1    TCP/IP Review

            TCP/IP Protocol Layers  

            IP Packet Header 

            IPv4 Addresses 

            First Octet Rule 

            Address Masks 

            Subnets and Subnet Masks 

            Designing Subnets 

            Breaking the Octet Boundary 

            Troubleshooting a Subnet Mask 

            Address Resolution Protocol (ARP) 

            Proxy ARP 

            Gratuitous ARP 

            Reverse ARP 

            Internet Control Message Protocol (ICMP) 

            Host-to-Host Layer 



            Looking Ahead 

            Summary Table: Chapter 1 Command Review 

            Recommended Reading 

            Review Questions 

            Configuration Exercises 

            Troubleshooting Exercises 

    Chapter 2    IPv6 Overview 

            IPv6 Addresses  

            Address Representation 

            IPv6 Address Types 

            Global Unicast Addresses 

            Identifying IPv6 Address Types 

            Local Unicast Addresses 

            Anycast Addresses 

            Multicast Addresses 

            Embedded IPv4 Addresses 

            IPv6 Packet Header Format 

            Extension Headers 


            Neighbor Discovery Protocol 

            NDP Messages 

            Router Discovery 

            Address Autoconfiguration 

            Duplicate Address Detection 

            Neighbor Address Resolution 

            Privacy Addresses 

            Neighbor Unreachability Detection 

            Looking Ahead 

            Review Questions 

    Chapter 3    Static Routing 

            Route Table  

            Configuring Static Routes 

            Case Study: Simple IPv4 Static Routes 

            Case Study: Simple IPv6 Static Routes 

            Case Study: Summary Routes 

            Case Study: Alternative Routes 

            Case Study: Floating Static Routes 

            Case Study: IPv6 Floating Static Routes 

            Case Study: Load Sharing 

            Load Sharing and Cisco Express Forwarding 

            Per Destination Load Sharing and Fast Switching 

            Per Packet Load Sharing and Process Switching 

            Which Switching Method Will Be Used? 

            Case Study: Recursive Table Lookups 

            Troubleshooting Static Routes 

            Case Study: Tracing a Failed Route 

            Case Study: A Protocol Conflict 

            Case Study: A Replaced Router 

            Case Study: Tracing An IPv6 Failed Route 

            Looking Ahead 

            Summary Table: Chapter 3 Command Review 

            Review Questions 

            Configuration Exercises 

            Troubleshooting Exercises 

    Chapter 4    Dynamic Routing Protocols 

            Routing Protocol Basics  

            Path Determination 


            Hop Count 







            Load Balancing 

            Distance Vector Routing Protocols 

            Common Characteristics 

            Periodic Updates 


            Broadcast Updates 

            Full Routing Table Updates 

            Routing by Rumor 

            Route Invalidation Timers 

            Split Horizon 

            Counting to Infinity 

            Triggered Updates 

            Holddown Timers 

            Asynchronous Updates 

            Link State Routing Protocols 


            Link State Flooding 

            Sequence Numbers 


            Link State Database 

            SPF Algorithm 


            Interior and Exterior Gateway Protocols 

            Static or Dynamic Routing? 

            Looking Ahead 

            Recommended Reading 

            Review Questions 

    Part II     Interior Routing Protocols

    Chapter 5    Routing Information Protocol (RIP) 

            Operation of RIP  

            RIP Timers and Stability Features 

            RIP Message Format 

            Request Message Types 

            Classful Routing 

            Classful Routing: Directly Connected Subnets 

            Classful Routing: Summarization at Boundary Routers 

            Classful Routing: Summary 

            Configuring RIP 

            Case Study: A Basic RIP Configuration 

            Case Study: Passive Interfaces 

            Case Study: Configuring Unicast Updates 

            Case Study: Discontiguous Subnets 

            Case Study: Manipulating RIP Metrics 

            Case Study: Minimizing the Impact of Updates 

            Troubleshooting RIP 

            Looking Ahead 

            Summary Table: Chapter 5 Command Review 

            Recommended Reading 

            Review Questions 

            Configuration Exercises 

            Troubleshooting Exercises 

    Chapter 6     RIPv2, RIPng, and Classless Routing 

            Operation of RIPv2  

            RIPv2 Message Format 

            Compatibility with RIPv1 

            Classless Route Lookups 

            Classless Routing Protocols 

            Variable-Length Subnet Masking 


            Operation of RIPng 

            Configuring RIPv2 

            Case Study: A Basic RIPv2 Configuration 

            Case Study: Compatibility with RIPv1 

            Case Study: Using VLSM 

            Case Study: Discontiguous Subnets and Classless Routing 

            Case Study: Authentication 

            Configuring RIPng 

            Case Study: Basic RIPng Configuration 

            Case Study: RIPng Process Customization 

            Case Study: Metric Manipulation 

            Case Study: Route Summarization 

            Troubleshooting RIPv2 and RIPng 

            Case Study: Misconfigured VLSM 

            Looking Ahead 

            Summary Table: Chapter 6 Command Review 

            Recommended Reading 

            Review Questions 

            Configuration Exercises 

            Troubleshooting Exercises 

    Chapter 7    Enhanced Interior Gateway Routing Protocol (EIGRP) 

            The Roots of EIGRP: An Overview of IGRP  

            Process Domains 

            IGRP Timers and Stability Features 

            IGRP Metrics 

            From IGRP to EIGRP 

            Operation of EIGRP 

            Protocol-Dependent Modules 

            Reliable Transport Protocol 

            Neighbor Discovery/Recovery 

            Diffusing Update Algorithm 

            DUAL: Preliminary Concepts 

            DUAL Finite State Machine 

            Diffusing Computation: Example 1 

            Diffusing Computation: Example 2 

            EIGRP Packet Formats 

            EIGRP Packet Header 

            General TLV Fields 

            IP-Specific TLV Fields 

            Address Aggregation 

            EIGRP and IPv6 

            Configuring EIGRP 

            Case Study: A Basic EIGRP Configuration 

            Case Study: Unequal-Cost Load Balancing 

            Case Study: Setting Maximum Paths 

            Case Study: Multiple EIGRP Processes 

            Case Study: Disabling Automatic Summarization 

            Case Study: Stub Routing 

            Case Study: Address Summarization 


            Troubleshooting EIGRP 

            Case Study: A Missing Neighbor 

            Stuck-in-Active Neighbors 

            Looking Ahead 

            Summary Table: Chapter 7 Command Review 

            Review Questions 

            Configuration Exercises 

            Troubleshooting Exercises 

    Chapter 8     OSPFv2 

            Operation of OSPF  

            Neighbors and Adjacencies 

            Hello Protocol 

            Network Types 

            Designated Routers and Backup Designated Routers 

            OSPF Interfaces 

            OSPF Neighbors 



            Router Types 

            Partitioned Areas 

            Virtual Links 

            Link-State Database 

            LSA Types 

            Stub Areas 

            Route Table 

            Destination Types 

            Path Types 

            Route Table Lookups 


            OSPF over Demand Circuits 

            OSPF Packet Formats 

            Packet Header 

            Hello Packet 

            Database Description Packet 

            Link State Request Packet 

            Link State Update Packet 

            Link State Acknowledgment Packet 

            OSPF LSA Formats 

            LSA Header 

            Router LSA 

            Network LSA 

            Network and ASBR Summary LSAs 

            Autonomous System External LSA 

            NSSA External LSA 

            Options Field 

            Configuring OSPF 

            Case Study: A Basic OSPF Configuration 

            Case Study: Setting Router IDs with Loopback Interfaces 

            Case Study: Domain Name Service Lookups 

            Case Study: OSPF and Secondary Addresses 

            Case Study: Stub Areas 

            Case Study: Totally Stubby Areas 

            Case Study: Not-So-Stubby Areas 

            Case Study: Address Summarization 

            Case Study: Filtering Between Areas 

            Case Study: Authentication 

            Case Study: Virtual Links 

            Case Study: OSPF on NBMA Networks 

            Case Study: OSPF over Demand Circuits 

            Troubleshooting OSPF 

            Case Study: An Isolated Area 

            Case Study: Misconfigured Summarization 

            Looking Ahead 

            Summary Table: Chapter 8 Command Review 

            Recommended Reading 

            Review Questions 

            Configuration Exercises 

            Troubleshooting Exercises


    Chapter 9 OSPFv3 

            Operation of OSPFv3  

            OSPFv3 Differences from OSPFv2 

            OSPFv3 Messages 

            An Overview of OSPFv3 LSAs 

            OSPFv3 LSA Formats 

            The Router LSA 

            Network LSA 

            Inter-Area Prefix LSA 

            Inter-Area Router LSA 

            AS-External LSA 

            Link LSA  489
            Intra-Area Prefix LSA 

            Options Field 

            Configuring OSPFv3 

            Case Study: A Basic OSPFv3 Configuration 

            Case Study: Stub Areas 

            Case Study: Multiple Instances on a Link 

            Case Study: OSPFv3 on NBMA Networks 

            Troubleshooting OSPFv3 

            Case Study: Frame-Relay Mapping 

            Looking Ahead  509
            Summary Table: Chapter 9 Command Review 

            Recommended Reading 

            Review Questions 

            Configuration Exercises 

    Chapter 10 Integrated IS-IS 

            Operation of Integrated IS-IS  

            IS-IS Areas 

            Network Entity Titles 

            IS-IS Functional Organization 

            Subnetwork Dependent Functions 

            Subnetwork Independent Functions 

            IS-IS PDU Formats 

            TLV Fields 

            IS-IS Hello PDU Format 

            IS-IS Link State PDU Format 

            IS-IS Sequence Numbers PDU Format 

            Extensions to IS-IS 

            3-Way Handshaking 

            Domain-Wide Prefix Distribution 

            Wide Metrics 

            Routing IPv6 with IS-IS 

            Dynamic Hostname Exchange 

            Multiple Topologies 

            Mesh Groups 

            Flooding Delays 

            Improving SPF Efficiency 

            Configuring Integrated IS-IS  

            Case Study: A Basic IPv4 Integrated IS-IS Configuration 

            Case Study: Changing the Router Types 

            Case Study: An Area Migration 

            Case Study: Route Summarization 

            Case Study: Authentication 

            Case Study: A Basic Integrated IS-IS Configuration for IPv6 

            Case Study: Transition to Multiple Topology Mode 

            Case Study: Route Leaking Between Levels 

            Case Study: Multiple L1 Areas Active on A Router 

            Troubleshooting Integrated IS-IS 

            Troubleshooting IS-IS Adjacencies 

            Troubleshooting the IS-IS Link-State Database 

            Case Study: Integrated IS-IS on NBMA Networks 

            Looking Ahead 

            Summary Table: Chapter 10 Command Review 

            Review Questions 

            Configuration Exercises 

            Troubleshooting Exercises 

    Part III    Route Control and Interoperability

    Chapter 11    Route Redistribution 

            Principles of Redistribution  


            Administrative Distances 

            Redistributing from Classless to Classful Protocols 

            Configuring Redistribution 

            Case Study: Redistributing IGRP and RIP 

            Case Study: Redistributing EIGRP and OSPF 

            Case Study: Redistribution and Route Summarization 

            Case Study: Redistributing OSPFv3 and RIPng 

            Case Study: Redistributing IS-IS and RIP/RIPng 

            Case Study: Redistributing Static Routes 

            Looking Ahead 

            Summary Table: Chapter 11 Command Review 

            Review Questions 

            Configuration Exercises 

            Troubleshooting Exercises 

    Chapter 12    Default Routes and On-Demand Routing 

            Fundamentals of Default Routes  677
            Fundamentals of On-Demand Routing 

            Configuring Default Routes and ODR 

            Case Study: Static Default Routes 

            Case Study: The Default-Network Command 

            Case Study: The Default-Information Originate Command 

            Case Study: Configuring On-Demand Routing 

            Looking Ahead 

            Summary Table: Chapter 12 Command Review 

            Review Questions 

    Chapter 13    Route Filtering 

            Configuring Route Filters  

            Case Study: Filtering Specific Routes 

            Case Study: Route Filtering and Redistribution 

            Case Study: A Protocol Migration 

            Case Study: Multiple Redistribution Points 

            Case Study: Using Administrative Distances to Set Router Preferences 

            Looking Ahead 

            Summary Table: Chapter 13 Command Review 

            Configuration Exercises 

            Troubleshooting Exercises 

    Chapter 14    Route Maps 

             Basic Uses of Route Maps  

             Configuring Route Maps 

             Case Study: Policy Routing 

             Case Study: Policy Routing and Quality of Service Routing 

             Case Study: Route Maps and Redistribution 

             Case Study: Route Tagging 

             Case Study: Filtering Tagged Routes Out of OSPF Route Table 

             Case Study: IPv6 Redistribution with Route Maps 

             Looking Ahead 

             Summary Table: Chapter 14 Command Review 

             Review Questions 

             Configuration Exercises 

             Troubleshooting Exercise 

    Part IV    Appendixes

    Appendix A    Tutorial : Working with Binary and Hex

    Appendix B    Tutorial : Access Lists

    Appendix C    CCIE Preparation Tips 

    Appendix D    Answers to Review Questions 

    Appendix E    Solutions to Configuration Exercises 

    Appendix F    Solutions to Troubleshooting Exercises 


    Cisco Press Promotional Mailings & Special Offers

    I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.


    Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Cisco Press products and services that can be purchased through this site.

    This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

    Collection and Use of Information

    To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

    Questions and Inquiries

    For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

    Online Store

    For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.


    Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

    Contests and Drawings

    Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.


    If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email

    Service Announcements

    On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

    Customer Service

    We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

    Other Collection and Use of Information

    Application and System Logs

    Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

    Web Analytics

    Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

    Cookies and Related Technologies

    This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

    Do Not Track

    This site currently does not respond to Do Not Track signals.


    Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.


    This site is not directed to children under the age of 13.


    Pearson may send or direct marketing communications to users, provided that

    • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
    • Such marketing is consistent with applicable law and Pearson's legal obligations.
    • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
    • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

    Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

    Correcting/Updating Personal Information

    If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at and we will process the deletion of a user's account.


    Users can always make an informed choice as to whether they should proceed with certain services offered by Cisco Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive:

    Sale of Personal Information

    Pearson does not rent or sell personal information in exchange for any payment of money.

    While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to

    Supplemental Privacy Statement for California Residents

    California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

    Sharing and Disclosure

    Pearson may disclose personal information, as follows:

    • As required by law.
    • With the consent of the individual (or their parent, if the individual is a minor)
    • In response to a subpoena, court order or legal process, to the extent permitted or required by law
    • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
    • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
    • To investigate or address actual or suspected fraud or other illegal activities
    • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
    • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
    • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.


    This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

    Requests and Contact

    Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

    Changes to this Privacy Notice

    We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

    Last Update: November 17, 2020