SlideShare una empresa de Scribd logo
1 de 23
Layer 3 Protocols
(A coincise overview)
Ardhendu Sekhar Sinha
Introduction
This presentation will cover the following layer 3 Protocols and techniques.
Routing Protocols •
•
•
•
•
•

BGP ( Border Gateway Protocol )
IS-IS ( Intermediate System-to-Intermediate System )
OSPF ( Open Shortest Path First )
RIP
( Routing Information Protocol )
NDP ( IPV6 Neighbor Discovery Protocol )
HIP
( Host Identity Protocol )

Multicasting Protocols • IGMP ( Internet Group Management Protocol )

Loop Avoidance Techniques
BGP

( Border Gateway Protocol )

Description –
It is an Exterior Gateway Protocol (EGP). It exchanges routing information (Summaries of
Network Routes) between gateway hosts (each with its own router) in a network of
Autonomous Systems (ISPs). The routing table contains a list of known routers, the addresses
they can reach, and a cost metric associated with the path to each router so that the best
available route is chosen. It uses TCP as its transport protocol (port 179).
Two BGP routers form a TCP connection between one another (peer routers) and exchange
messages to open and confirm the connection parameters. It sends updated router table
information (Only the changed part ) when one host has detected a change of the routing table.
Internet BGP routing tables have over 300,000 active forwarding entries with summarization
of over 2 billion addresses.
BGP Speaker - A router that has been configured to run the BGP routing protocol is called a
BGP speaker.
Autonomous system (AS) - It is a set of routers that use the same routing policy while
running under a single technical administration. An AS runs interior gateway protocols (IGPs)
such as RIP, OSPF, and IS-IS within its boundaries. ASs use exterior gateway protocols
(EGPs) to exchange routing information with other ASs. The outside world views an AS as a
single entity, even though it could be a collection of IGPs working together to provide
routing within its interior.
BGP

( Border Gateway Protocol )

Sessions • Internal BGP (iBGP) - When two BGP speakers are in the same autonomous system
• External BGP ( eBGP) - When two BGP speakers are in different autonomous systems
eBGP multihop - Allows the neighbor connection to be established between two
non−directly−connected external peers. e.g. a Cisco router can run eBGP with a third party
router that doesn't allow the two external peers to be directly connected. The multihop is used
only for eBGP and not for iBGP.
Some important attributes with each IP prefix –
• AS path - list of AS numbers that a route has traversed in order to reach a destination.
• Local preference - indication to the AS about which path is preferred to exit the AS in
order to reach a certain network. A path with a higher local preference is more preferred.
• Multi-exit discriminator (MED) - gives adjacent ISPs ability to prefer one peering point
over another.
BGP-V4 Features –
• Provides a new set of mechanisms for supporting class less inter-domain routing (CIDR).
These mechanisms include support for advertising an IP prefix and eliminate the concept
of network “class” within BGP.
• Introduces mechanisms which allow aggregation of routes, including aggregation of AS
paths.
IS-IS ( Intermediate System-to-Intermediate System )
Description It is a link-state protocol. In this protocol routers exchange routing information based on a
single metric to determine network topology. It behaves similar to Open Shortest Path First
(OSPF) in the TCP/IP network. It is faster converging, supports much larger internetworks
and is less susceptible to routing loops.
Functionality –
Clients are called “End systems”. Routers are called “Intermediate systems” (IS). Routers
are organized into local groups called areas. Several areas are grouped together into a
domain.
It uses two levels of hierarchical routing.
• Level 1 - These routers know the topology in their area, including all routers and hosts,
but they do not know the identity of routers or destinations outside of their area. Level 1
routers forward all traffic to a level 2 router within their area for traffic destinations
outside of their area.
• Level 2 - These routers knows the level 2 topology. Level 2 routers do not need to know
the topology within any level 1 area.
IS-IS ( Intermediate System-to-Intermediate System )
P2P link Flooding Each router creates an LSP and flood it to neighbours. Each router maintains a separate
LSDB for level-1 and level-2 LSPs. New LSPs are flooded to all neighbors. Once the
adjacency is established both routers send CSNP packet.
LAN Flooding There’s a Designated Router (DIS). It conducts the flooding (CNSP) over the LAN to
synchronize LSDB over LAN subnets. All routers in the LAN check the CSNP against their
own LSDB and update it.
LSP (Link State PDU) – The header contains LSP-id, Sequence number, Type of LSP (level1, level-2) etc and the data contains Area addresses, IS neighbors etc.
CNSP (Complete Sequence Number PDU)- Describes all LSPs in the LSDB. If LSDB is
large, multiple CSNPs are sent.
Two types of IS-IS addresses :
Network Service Access Point (NSAP) - NSAP addresses identify network layer services,
one for each service running.
Network Entity Title (NET) - NET addresses identify network layer entities or processes
instead of services.
OSPF

( Open Shortest Path First )

Description –
It is a link-state routing protocol that was developed for IP networks and is based on the
Shortest Path First (SPF) algorithm. It is used for routing between routers belonging to a
single Autonomous System.

Functionality Each OSPF router maintains an identical database describing the Autonomous System’s
topology. From this database, a routing table is calculated by constructing a shortest- path tree.
It recalculates routes quickly when a topological change occurs, utilizing a minimum of
routing protocol traffic. More than one OSPF process can be configured in a router but SPF
calculation associated with multiple processes can consume a considerable amount of CPU
and memory.
Features • no hop count limitations.
• understands variable-length subnet masks (VLSMs) and allows for summarization.
• uses multicasts (not broadcasts) to send updates.
• converges much faster because OSPF propagates changes immediately.
• allows for load balancing with up to six equal-cost paths.
• authentication available.
• allows for tagging of external routes injected by other autonomous systems.
OSPF

( Open Shortest Path First )

OSPF network types –
OSPF assumes that, within a subnet all routers can communicate directly using multicasts and
that no router is uniquely positioned in the topology. If five routers are attached to a switch, a
multicast from one reaches the other four and each would be fine as a designated router (DR).
This assumption does not hold good for NBMA.
• Broadcast – It requires a DR. OSPF defines this interface network type to use multicast
Hellos to dynamically discover neighbors, allows more than two routers to be in the same
subnet and to attempt to elect a DR.
• point-to-point - only two OSPF routers can exist in the subnet, neighbors can be
dynamically discovered through Hellos and the routers do not elect a DR.
• point-to-multipoint (NonBroadcast) – It does not involve a DR election; this OSPF
network type is less efficient in a full mesh, but fine with a partial mesh. It is more tolerant
of network changes than the broadcast option.
• NBMA (non-broadcast multiple access) - In an NBMA configuration, OSPF sends
HELLO packets (packets sent periodically to establish and confirm neighbor relationships
between routers) to each router one at a time rather than multicasting them. The HELLO
timer (which tells the router how often to send HELLO packets) is extended from 10 to 30
seconds and the dead router timer (which tells the router how long to wait before it decides
that a neighboring router is not functioning) is extended from 40 to 120 seconds.
(RIP) Routing Information Protocol
Description RIP is a standardized Distance Vector protocol, designed for use on smaller
networks. It is used to exchange of routing information among gateways and hosts.
This protocol is most useful as an interior gateway protocol (i.e. within an
autonomous system) and is supported on a wide variety of systems. It is suitable for
small networks using serial lines whose speeds do not vary widely and is not
intended for use in more complex environments.
Functionality• sends out routing updates every 30 seconds.
• sends out the full routing table every periodic update
• It uses hopcount as its metric (max hopcount 15 )
• uses the Bellman-Ford Distance Vector algorithm to determine the best “path” to a
particular destination
• If multiple paths exist to a particular destination, RIP will load balance between
those paths by default (up to 4 only ) if the metric (hopcount) is equal.
• It uses a round-robin system of load-balancing between equal metric routes which
can lead to pinhole congestion (slower link to become congested).
(RIP) Routing Information Protocol
RIP has two versions - Version 1 (RIPv1) and Version 2 (RIPv2).
RIPv1 –
• does not include the subnet mask with its routing table updates, therefore it does not
support Variable Length Subnet Masks (VLSMs).
• It requires networks must be contiguous and subnets of a major network must be
configured with identical subnet masks else route table inconsistencies will occur.
• sends updates as broadcasts to address 255.255.255.255.
RIPv2 • supports VLSMs, allowing discontiguous networks and varying subnet masks to exist.
• Routing updates are sent via multicast using address 224.0.0.9
• Includes the subnet mask with its routing table updates.
• Encrypted authentication can be configured between RIPv2 routers.
• Route tagging is supported.
RIPv2 can interoperate with RIPv1By default. In this case following will occur
• RIPv1 routers will sent only Version 1 packets
• RIPv1 routers will receive both Version 1 and 2 updates
• RIPv2 routers will both send and receive only Version 2 updates
version of RIP a particular interface will “send” or “receive.” can be controlled.
(RIP) Routing Information Protocol
RIP Timers –
• Update Timer (default 30 seconds) – indicates how often the router will
send out a routing table update.

• Invalid Timer (default 180 seconds) – indicates how long a route will remain in a routing
table before being marked as invalid, if no new updates are heard about this route. The invalid
timer will be reset if an update is received for that particular route before the timer expires.
• Hold-down Timer (default 180 seconds) – indicates how long RIP will “suppress” a route
that it has placed in a hold-down state. It will not accept any new updates for routes in a holddown state, until the hold-down timer expires.
A route will enter a hold-down state for one of three reasons:
- Invalid timer has expired.
- An update has been received from a router marking that route with a metric of 16
(unreachable).
- An update has been received from another router, marking that route with a higher metric
than what is currently in the routing table.
• Flush Timer (default 240 seconds) – indicates how long a route can remain in a routing
table before being flushed, if no new updates are heard about this route. it runs concurrently
with the invalid timer, and thus will flush out a route 60 seconds after it has been marked
invalid.
IPV6 NDP ( Neighbor Discovery Protocol )
Description–
This protocol solves a set of problems related to the interaction between nodes (hosts and
routers) attached to the same link. Nodes use Neighbor Discovery to determine the link-layer
addresses for neighbors known to reside on attached links. It also uses the protocol to actively
keep track of which neighbors are reachable and to detect changed link-layer addresses.
It defines mechanisms for solving following problems • Router Discovery - Hosts locate routers that reside on an attached link.
• Prefix Discovery - Hosts discover set of address prefixes that define which destinations are
on-link for an attached link.
• Address Auto configuration - Nodes automatically configure an address for an interface.
• Address resolution - Nodes determine the link-layer address of an on-link destination
given only the destination's IP address.
• Next-hop determination - The algorithm for mapping an IP destination address into the IP
address of the neighbor through which destination traffic should be sent.
• Neighbor Unreachability Detection - Nodes determine reachability of a neighbor.
• Duplicate Address Detection - Node determines that an address it wishes to use is not
already in use by another node.
• Redirect – a router informs a host of a better first-hop node to reach a particular
destination.
IPV6 NDP ( Neighbor Discovery Protocol )
NDP uses following ICMPV6 messages for
Router Solicitation - When an interface becomes enabled, hosts may send out Router Solicitations that
request routers to generate Router Advertisements immediately rather than at their next scheduled time.
Router Advertisement - Routers advertise their presence together with various link and Internet
parameters either periodically, or in response to a Router Solicitation message. Router Advertisements
contain prefixes that are used for determining whether another address shares the same link (on-link
determination) and/or address configuration, a suggested hop limit value, etc.
Neighbor Solicitation - Sent by a node to determine the link-layer address of a neighbor, or to verify that
a neighbor is still reachable via a cached link-layer address.
Neighbor Advertisement – Sent by a Node as a response to a Neighbor Solicitation message. A node
may also send unsolicited Neighbor Advertisements to announce a link-layer address change
Redirect - Used by routers to inform hosts of a better first hop for a destination.
Duplicate Address Detection (DAD) - Neighbor Solicitation messages are used for Duplicate Address
Detection.
IPV6 NDP ( Neighbor Discovery Protocol )
Node Discovery Process –
Problem - node A wants to deliver packets to destination node B using the IPv6 on the same
local link. However, node A does not know node B's link-layer address.
Procedure •

Node A sends an ICMPv6 Type 135 message (neighbor solicitation) on the local link (with its sitelocal address as the IPv6 source address, solicited-node multicast address corresponding to the
target address as the destination IPv6 address and the source link-layer address of the sender(node
A) as data of the ICMPv6 message. The source link-layer address of this frame is the link-layer
address of node A. The destination link-layer address of this frame uses multicast mapping of the
destination IPv6 address.

•

Node B, which is listening to the local link for multicast addresses, intercepts the neighbor
solicitation message because the destination IPv6 address represents the solicited-node multicast
address corresponding to its IPv6 address.

•

Node B replies by sending a neighbor advertisement message using its site-local address as the
IPv6 source address and the site-local address as the destination IPv6 address. It also includes its
link-layer address in the ICMPv6 message.

•

After receiving neighbor solicitation and neighbor advertisement messages, node A and node B
know each other's link-layer addresses. 
Learned link-layer addresses are kept in a neighbor
discovery table (neighbor cache). Now both the nodes can communicate on the local link.
IPV6 NDP ( Neighbor Discovery Protocol )
Neighbor Unreachability Detection - To verify the reachability of neighbor nodes in the
neighbor discovery table, neighbor solicitation message is used with unicast addresses of the
neighbor nodes as destination IPv6 addresses instead of solicited-node multicast addresses.
Security IPsec AH can be used with NDP messages to enhance security. Also the hosts can verify
through AH that Neighbor Advertisements and Router Advertisements do contain proper and
accurate information. IPsec can be used in NDP only through manual configuration of
Security Associations (SA).
Mapping of ICMPV6 messages to NDP Functionality -

ICMPv6 Type

Name of Message

NDP Functionality

Type 133
Type 134

Router Solicitation (RS)
Router Advertisement (RA)

Type 135

Neighbor Solicitation (NS)

Type 136
Type 137

Neighbor Advertisement (NA)
Redirect Message

Router/Prefix Discover
Router Adverstisement
DAD/Address
resolution/unreachable
detection
Address resolution
Redirection
HIP ( Host Identity Protocol )
Description -

A host and its location are identified using Internet Protocol (IP) addresses in the current
Internet architecture. Now a days a considerable amount of hosts are portable devices. They
often change their IP addresses due to mobility. So mobility and multihoming are hard to
implement securely in the present Internet.
This Protocol is a host identification technology for use on Internet Protocol (IP) networks,
such as the Internet. It enables host mobility and multihoming across different address
families (IPv4 and IPv6), offers end-to-end encryption and protection against attacks, allows
moving away from IP address-based access control to permanent host identities, and restores
end-to-end host identification in the presence of several addressing domains separated by
Network Address Translation (NAT) devices.
This protocol separates the identity of a host from its location. It uses IP in network layer for
routing packets and public key (host identity) in transport and application layers.
Host Identity Tag (HIT) - 128-bit-long bit string – It is constructed by applying a
cryptographic hash function over the public key.
Host Identity – it contains HIT.
HIP ( Host Identity Protocol )
Functionality –
• Each host creates one or more public/private key pairs to provide identities for itself.
A client host obtains the host identity of a server typically from the Domain Name System
(DNS) or a Distributed Hash Table (DHT). For environments where DHT not supported,
public key of the server is added to the known host list after the first connection.
• To communicate using HIP, Initially two hosts (client and server ) establish a HIP
association called HIP Base Exchange (BEX). In this process private keys corresponding
to host identifiers are possessed by their peers and a pair of IPsec Encapsulated Security
Payload (ESP) Security Associations (SAs) for each direction is created.
• Now both client and server communicates using IPsec ESP messages.
• As neither transport layer connections nor security associations created after the HIP base
exchange are bound to IP addresses, a mobile client can change its IP address and continue
to transmit ESP-protected packets to its peer.
HIP supports such mobility events by implementing an end-to-end three-way UPDATE
signaling mechanism between communicating nodes.
HIP ( Host Identity Protocol )
• For two hosts behind NAT applications and firewalls, HIP enables communicate through a
Rendezvous server and uses User Datagram Protocol (UDP)-based encapsulation
(provided by the Interactive Connectivity Establishment (ICE) protocol).
• HIP multihome uses the same mechanisms as mobility for updating the peer with a current
set of host IP addresses.
• HIP provides a network layer alternative to using Secure Sockets Layer/Transport Layer
Security (SSL/TLS) for application security.
• Most Internet applications can run unmodified over HIP, although only applications using
the extended socket interface can take better advantage of the new features that HIP
provides.
IGMP

( Internal Gateway Multicast Protocol )

Description –
The Internet Group Management Protocol (IGMP) is a communications protocol used by
IPv4 hosts to establish multicast group memberships to any immediately neighboring
multicast routers. It can be used for collecting the membership information needed by its
multicast routing protocol (multicast router part) and to inform itself and other neighboring
multicast routers of its memberships (group member part). If an IP multicast router is itself a
member of one or more multicast groups, then it can perform both as "multicast router part"
and the "group member part" of the protocol.
Functionality:
IGMP operates between the client computer and a local multicast router. A network switch is
used to listen in on the IGMP conversation between hosts and routers (IGMP snooping). By
listening to these conversations the switch maintains a map of which links need which IP
multicast streams. Protocol Independent Multicast (PIM) is then used between the local and
remote multicast routers to direct multicast traffic from the multicast server to many multicast
clients.
IGMP can be used for one-to-many networking applications such as online streaming
video/gaming and allow more efficient use of resources while supporting these kind of
applications.
IGMP

( Internal Gateway Multicast Protocol )

IGMP has versions v1, v2 and v3.
IGMPv1: Hosts can join multicast groups. There are no leave messages. Routers use a timeout based mechanism to discover the groups that are of no interest to the members.

IGMPv2: Leave messages were added to the protocol, allowing group membership
termination to be quickly reported to the routing protocol, which is important for
high-bandwidth multicast groups and/or subnets with highly volatile group membership.
IGMPv3: A major revision of the protocol allows hosts to specify the list of hosts from
which they want to receive traffic. Traffic from other hosts is blocked inside the network.
It also allows hosts to block inside the network packets that come from sources that send
unwanted traffic. A single membership report now bundles multiple multicast group records
to decrease the number of packets sent.
State-Change Messages –
A forged State-Change Report message will cause extra processing on each router and on
each member of the group. It can be ignored if source address of the packet is not identified
as belonging to a subnet assigned to the interface on which the packet was received.
Loop Avoidance Techniques
Problem Description When a data packet is continually routed through the same routers over and over
again, the data packets continue to be routed within the network in an endless circle.
This phenomenon is called as routing loop.
Example - RIP updates are broadcast every 30 seconds by default. Due to slow
convergence, routers may not learn about topology changes in a timely manner.
Hence it will repeatedly broadcast updates based on outdated or incorrect route
information causing datagrams to bounce between routers endlessly causing the
routers to start a count to infinity.
It can completely disable the network. This problem is associated with Distance
Vector Protocols.

Loop avoidance techniques or combinations of these techniques can minimize
routing loops passing on incorrect routing information.
Loop Avoidance Techniques
Following are the Loop Avoidance Techniques Count to infinity – This mechanism sets a maximum hop count value to a specified count (e.g. for RIP, it
is 15). When the hop counts exceeded, that causes an endlessly circulating datagram to be dropped and
sets the destination as unreachable.
Split-Horizon – This mechanism Prevents a routing update from being sent out the interface it was
received on. With this mechanism in place, when a change occurs in the network, routers only advertise
that change in one direction, i.e. they send the update out to all other ports except the one from which it
was learned.
Route-Poisoning – This mechanism prevents inconsistencies from spreading. When a router learns that a
route has become unavailable, it overrides split-horizon by advertising the failed route with an infinity
hop count (destination unreachable) out all the interfaces including the one it was received on. This
allows a router to advertise out the same interface it learned information on, but poisons the route by
using a value greater than the maximum hop count. Routers receiving this advertisement assume the
destination network is unreachable.

Hold-Down Timers –This mechanism is used in combination with route poisoning. It prevents routers
from accepting any new updates for routes in a hold-down state, until the hold-down timer expires. Holddown timers start as soon as a router receives an update from a neighbor indicating that an attached
network has gone down. Until the timer elapses, the router ignores updates regarding this route from
other routers unless it receives an update from the neighboring router that initially informed the network
of the downed link. The timer stops if it receives a message from the neighboring router. At that point, the
network is marked as reachable again and the route table is updated.
Thank You

Más contenido relacionado

La actualidad más candente

EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)NetProtocol Xpert
 
Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPFarpit
 
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)anilinvns
 
MPLS Lecture1(H)-102020.pdf
MPLS Lecture1(H)-102020.pdfMPLS Lecture1(H)-102020.pdf
MPLS Lecture1(H)-102020.pdfMulugetaTsehay1
 
BGP (border gateway routing protocol)
BGP (border gateway routing protocol)BGP (border gateway routing protocol)
BGP (border gateway routing protocol)Netwax Lab
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44Jisc
 
OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)Ann Joseph
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN DeploymentAPNIC
 

La actualidad más candente (20)

EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)
 
Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPF
 
IS-IS vs OSPF
IS-IS vs OSPFIS-IS vs OSPF
IS-IS vs OSPF
 
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
 
Ospf
OspfOspf
Ospf
 
OSPF Basics
OSPF BasicsOSPF Basics
OSPF Basics
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
MPLS Lecture1(H)-102020.pdf
MPLS Lecture1(H)-102020.pdfMPLS Lecture1(H)-102020.pdf
MPLS Lecture1(H)-102020.pdf
 
Bgp (1)
Bgp (1)Bgp (1)
Bgp (1)
 
BGP (border gateway routing protocol)
BGP (border gateway routing protocol)BGP (border gateway routing protocol)
BGP (border gateway routing protocol)
 
Ospf area types
Ospf area typesOspf area types
Ospf area types
 
IGMP
IGMPIGMP
IGMP
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44
 
Mpls te
Mpls teMpls te
Mpls te
 
BGP protocol presentation
BGP protocol  presentationBGP protocol  presentation
BGP protocol presentation
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
IP Multicasting
IP MulticastingIP Multicasting
IP Multicasting
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN Deployment
 

Destacado

IPv6 - Neighbour Discovery
IPv6 - Neighbour DiscoveryIPv6 - Neighbour Discovery
IPv6 - Neighbour DiscoveryHeba_a
 
Neighbor discoverydhcp
Neighbor discoverydhcpNeighbor discoverydhcp
Neighbor discoverydhcpFred Bovy
 
IPv6 Neighbor Discovery Problems (and mitigations)
IPv6 Neighbor Discovery Problems (and mitigations)IPv6 Neighbor Discovery Problems (and mitigations)
IPv6 Neighbor Discovery Problems (and mitigations)Juniper Networks
 
Expl sw chapter_02_switches_part_2
Expl sw chapter_02_switches_part_2Expl sw chapter_02_switches_part_2
Expl sw chapter_02_switches_part_2aghacrom
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentationzameer Abbas
 
Neighbor Discovery Deep Dive – IPv6-Networking-Referat
Neighbor Discovery Deep Dive – IPv6-Networking-ReferatNeighbor Discovery Deep Dive – IPv6-Networking-Referat
Neighbor Discovery Deep Dive – IPv6-Networking-ReferatDigicomp Academy AG
 
Infographic: Journey through a DMP pixel
Infographic: Journey through a DMP pixel Infographic: Journey through a DMP pixel
Infographic: Journey through a DMP pixel Switch Concepts
 
Switched networks (LAN Switching – Switches)
Switched networks (LAN Switching – Switches)Switched networks (LAN Switching – Switches)
Switched networks (LAN Switching – Switches)Fleurati
 
Light emittting polymer.ppx
Light emittting polymer.ppxLight emittting polymer.ppx
Light emittting polymer.ppxVineesh Kumar
 
Switching characteristics of power electronic devices
Switching characteristics of power electronic devicesSwitching characteristics of power electronic devices
Switching characteristics of power electronic devicesSunny Purani
 
11 Trends That Are Changing the Marketing World
11 Trends That Are Changing the Marketing World11 Trends That Are Changing the Marketing World
11 Trends That Are Changing the Marketing WorldInside Social
 
Networking standards
Networking standardsNetworking standards
Networking standardsOnline
 
Network switches, functions & role in networks
Network switches, functions & role in networksNetwork switches, functions & role in networks
Network switches, functions & role in networksIT Tech
 
Reference frame theory
Reference frame theoryReference frame theory
Reference frame theoryRamesh Babu
 
Systesm information layer 3 messages
Systesm information layer 3 messagesSystesm information layer 3 messages
Systesm information layer 3 messagesTelebeansolutions
 

Destacado (20)

Presentation For NDP Process
Presentation For NDP ProcessPresentation For NDP Process
Presentation For NDP Process
 
IPv6 - Neighbour Discovery
IPv6 - Neighbour DiscoveryIPv6 - Neighbour Discovery
IPv6 - Neighbour Discovery
 
Neighbor discoverydhcp
Neighbor discoverydhcpNeighbor discoverydhcp
Neighbor discoverydhcp
 
IPv6 Neighbor Discovery Problems (and mitigations)
IPv6 Neighbor Discovery Problems (and mitigations)IPv6 Neighbor Discovery Problems (and mitigations)
IPv6 Neighbor Discovery Problems (and mitigations)
 
Expl sw chapter_02_switches_part_2
Expl sw chapter_02_switches_part_2Expl sw chapter_02_switches_part_2
Expl sw chapter_02_switches_part_2
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
 
Neighbor Discovery Deep Dive – IPv6-Networking-Referat
Neighbor Discovery Deep Dive – IPv6-Networking-ReferatNeighbor Discovery Deep Dive – IPv6-Networking-Referat
Neighbor Discovery Deep Dive – IPv6-Networking-Referat
 
Infographic: Journey through a DMP pixel
Infographic: Journey through a DMP pixel Infographic: Journey through a DMP pixel
Infographic: Journey through a DMP pixel
 
Switched networks (LAN Switching – Switches)
Switched networks (LAN Switching – Switches)Switched networks (LAN Switching – Switches)
Switched networks (LAN Switching – Switches)
 
Light emittting polymer.ppx
Light emittting polymer.ppxLight emittting polymer.ppx
Light emittting polymer.ppx
 
CDMA Introducton
CDMA IntroductonCDMA Introducton
CDMA Introducton
 
Switching characteristics of power electronic devices
Switching characteristics of power electronic devicesSwitching characteristics of power electronic devices
Switching characteristics of power electronic devices
 
11 Trends That Are Changing the Marketing World
11 Trends That Are Changing the Marketing World11 Trends That Are Changing the Marketing World
11 Trends That Are Changing the Marketing World
 
Networking standards
Networking standardsNetworking standards
Networking standards
 
Network switch
Network switchNetwork switch
Network switch
 
Layer 3 messages (2G)
Layer 3 messages (2G)Layer 3 messages (2G)
Layer 3 messages (2G)
 
Network switches, functions & role in networks
Network switches, functions & role in networksNetwork switches, functions & role in networks
Network switches, functions & role in networks
 
Reference frame theory
Reference frame theoryReference frame theory
Reference frame theory
 
Systesm information layer 3 messages
Systesm information layer 3 messagesSystesm information layer 3 messages
Systesm information layer 3 messages
 
Chap 8 switching
Chap 8 switchingChap 8 switching
Chap 8 switching
 

Similar a Layer3protocols

Similar a Layer3protocols (20)

Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
 
Ospf and eigrp concepts and configuration
Ospf and eigrp concepts and configurationOspf and eigrp concepts and configuration
Ospf and eigrp concepts and configuration
 
RIP and OSPF
RIP and OSPFRIP and OSPF
RIP and OSPF
 
OSPF.pdf
OSPF.pdfOSPF.pdf
OSPF.pdf
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ans
 
ch2_p3_ospf.pptx
ch2_p3_ospf.pptxch2_p3_ospf.pptx
ch2_p3_ospf.pptx
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrp
 
OSPF Overview
OSPF OverviewOSPF Overview
OSPF Overview
 
CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
 
Qs.pptx
Qs.pptxQs.pptx
Qs.pptx
 
Lecture number 5 Theory.pdf(machine learning)
Lecture  number  5 Theory.pdf(machine learning)Lecture  number  5 Theory.pdf(machine learning)
Lecture number 5 Theory.pdf(machine learning)
 
ppt (it).pdf
ppt (it).pdfppt (it).pdf
ppt (it).pdf
 
Routing protocols.pptx
Routing protocols.pptxRouting protocols.pptx
Routing protocols.pptx
 
Network Layer Protocol.pptx
Network Layer Protocol.pptxNetwork Layer Protocol.pptx
Network Layer Protocol.pptx
 
1Routing Basics.pdf
1Routing Basics.pdf1Routing Basics.pdf
1Routing Basics.pdf
 
CCNP Route
CCNP Route CCNP Route
CCNP Route
 
Ospf
OspfOspf
Ospf
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
DSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.pptDSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.ppt
 

Más de assinha

Nwe Embodiment (Naba Kalebara) of Lord Jagannath of PURI - The Greatest and B...
Nwe Embodiment (Naba Kalebara) of Lord Jagannath of PURI - The Greatest and B...Nwe Embodiment (Naba Kalebara) of Lord Jagannath of PURI - The Greatest and B...
Nwe Embodiment (Naba Kalebara) of Lord Jagannath of PURI - The Greatest and B...assinha
 
SNMP AT a GLANCE
SNMP AT a GLANCESNMP AT a GLANCE
SNMP AT a GLANCEassinha
 
Umts explained
Umts explainedUmts explained
Umts explainedassinha
 
Architectural patterns part 4
Architectural patterns part 4Architectural patterns part 4
Architectural patterns part 4assinha
 
Architectural patterns part 3
Architectural patterns part 3Architectural patterns part 3
Architectural patterns part 3assinha
 
Architectural Patterns - Interactive and Event Handling Patterns
Architectural Patterns  - Interactive and Event Handling PatternsArchitectural Patterns  - Interactive and Event Handling Patterns
Architectural Patterns - Interactive and Event Handling Patternsassinha
 
Architectural patterns part 1
Architectural patterns part 1Architectural patterns part 1
Architectural patterns part 1assinha
 
Data Structures used in Linux kernel
Data Structures used in Linux kernel Data Structures used in Linux kernel
Data Structures used in Linux kernel assinha
 
E nodeb handover procedure
E nodeb handover procedureE nodeb handover procedure
E nodeb handover procedureassinha
 
Initial LTE call Setup Flow
Initial LTE call Setup FlowInitial LTE call Setup Flow
Initial LTE call Setup Flowassinha
 

Más de assinha (10)

Nwe Embodiment (Naba Kalebara) of Lord Jagannath of PURI - The Greatest and B...
Nwe Embodiment (Naba Kalebara) of Lord Jagannath of PURI - The Greatest and B...Nwe Embodiment (Naba Kalebara) of Lord Jagannath of PURI - The Greatest and B...
Nwe Embodiment (Naba Kalebara) of Lord Jagannath of PURI - The Greatest and B...
 
SNMP AT a GLANCE
SNMP AT a GLANCESNMP AT a GLANCE
SNMP AT a GLANCE
 
Umts explained
Umts explainedUmts explained
Umts explained
 
Architectural patterns part 4
Architectural patterns part 4Architectural patterns part 4
Architectural patterns part 4
 
Architectural patterns part 3
Architectural patterns part 3Architectural patterns part 3
Architectural patterns part 3
 
Architectural Patterns - Interactive and Event Handling Patterns
Architectural Patterns  - Interactive and Event Handling PatternsArchitectural Patterns  - Interactive and Event Handling Patterns
Architectural Patterns - Interactive and Event Handling Patterns
 
Architectural patterns part 1
Architectural patterns part 1Architectural patterns part 1
Architectural patterns part 1
 
Data Structures used in Linux kernel
Data Structures used in Linux kernel Data Structures used in Linux kernel
Data Structures used in Linux kernel
 
E nodeb handover procedure
E nodeb handover procedureE nodeb handover procedure
E nodeb handover procedure
 
Initial LTE call Setup Flow
Initial LTE call Setup FlowInitial LTE call Setup Flow
Initial LTE call Setup Flow
 

Último

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Último (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

Layer3protocols

  • 1. Layer 3 Protocols (A coincise overview) Ardhendu Sekhar Sinha
  • 2. Introduction This presentation will cover the following layer 3 Protocols and techniques. Routing Protocols • • • • • • BGP ( Border Gateway Protocol ) IS-IS ( Intermediate System-to-Intermediate System ) OSPF ( Open Shortest Path First ) RIP ( Routing Information Protocol ) NDP ( IPV6 Neighbor Discovery Protocol ) HIP ( Host Identity Protocol ) Multicasting Protocols • IGMP ( Internet Group Management Protocol ) Loop Avoidance Techniques
  • 3. BGP ( Border Gateway Protocol ) Description – It is an Exterior Gateway Protocol (EGP). It exchanges routing information (Summaries of Network Routes) between gateway hosts (each with its own router) in a network of Autonomous Systems (ISPs). The routing table contains a list of known routers, the addresses they can reach, and a cost metric associated with the path to each router so that the best available route is chosen. It uses TCP as its transport protocol (port 179). Two BGP routers form a TCP connection between one another (peer routers) and exchange messages to open and confirm the connection parameters. It sends updated router table information (Only the changed part ) when one host has detected a change of the routing table. Internet BGP routing tables have over 300,000 active forwarding entries with summarization of over 2 billion addresses. BGP Speaker - A router that has been configured to run the BGP routing protocol is called a BGP speaker. Autonomous system (AS) - It is a set of routers that use the same routing policy while running under a single technical administration. An AS runs interior gateway protocols (IGPs) such as RIP, OSPF, and IS-IS within its boundaries. ASs use exterior gateway protocols (EGPs) to exchange routing information with other ASs. The outside world views an AS as a single entity, even though it could be a collection of IGPs working together to provide routing within its interior.
  • 4. BGP ( Border Gateway Protocol ) Sessions • Internal BGP (iBGP) - When two BGP speakers are in the same autonomous system • External BGP ( eBGP) - When two BGP speakers are in different autonomous systems eBGP multihop - Allows the neighbor connection to be established between two non−directly−connected external peers. e.g. a Cisco router can run eBGP with a third party router that doesn't allow the two external peers to be directly connected. The multihop is used only for eBGP and not for iBGP. Some important attributes with each IP prefix – • AS path - list of AS numbers that a route has traversed in order to reach a destination. • Local preference - indication to the AS about which path is preferred to exit the AS in order to reach a certain network. A path with a higher local preference is more preferred. • Multi-exit discriminator (MED) - gives adjacent ISPs ability to prefer one peering point over another. BGP-V4 Features – • Provides a new set of mechanisms for supporting class less inter-domain routing (CIDR). These mechanisms include support for advertising an IP prefix and eliminate the concept of network “class” within BGP. • Introduces mechanisms which allow aggregation of routes, including aggregation of AS paths.
  • 5. IS-IS ( Intermediate System-to-Intermediate System ) Description It is a link-state protocol. In this protocol routers exchange routing information based on a single metric to determine network topology. It behaves similar to Open Shortest Path First (OSPF) in the TCP/IP network. It is faster converging, supports much larger internetworks and is less susceptible to routing loops. Functionality – Clients are called “End systems”. Routers are called “Intermediate systems” (IS). Routers are organized into local groups called areas. Several areas are grouped together into a domain. It uses two levels of hierarchical routing. • Level 1 - These routers know the topology in their area, including all routers and hosts, but they do not know the identity of routers or destinations outside of their area. Level 1 routers forward all traffic to a level 2 router within their area for traffic destinations outside of their area. • Level 2 - These routers knows the level 2 topology. Level 2 routers do not need to know the topology within any level 1 area.
  • 6. IS-IS ( Intermediate System-to-Intermediate System ) P2P link Flooding Each router creates an LSP and flood it to neighbours. Each router maintains a separate LSDB for level-1 and level-2 LSPs. New LSPs are flooded to all neighbors. Once the adjacency is established both routers send CSNP packet. LAN Flooding There’s a Designated Router (DIS). It conducts the flooding (CNSP) over the LAN to synchronize LSDB over LAN subnets. All routers in the LAN check the CSNP against their own LSDB and update it. LSP (Link State PDU) – The header contains LSP-id, Sequence number, Type of LSP (level1, level-2) etc and the data contains Area addresses, IS neighbors etc. CNSP (Complete Sequence Number PDU)- Describes all LSPs in the LSDB. If LSDB is large, multiple CSNPs are sent. Two types of IS-IS addresses : Network Service Access Point (NSAP) - NSAP addresses identify network layer services, one for each service running. Network Entity Title (NET) - NET addresses identify network layer entities or processes instead of services.
  • 7. OSPF ( Open Shortest Path First ) Description – It is a link-state routing protocol that was developed for IP networks and is based on the Shortest Path First (SPF) algorithm. It is used for routing between routers belonging to a single Autonomous System. Functionality Each OSPF router maintains an identical database describing the Autonomous System’s topology. From this database, a routing table is calculated by constructing a shortest- path tree. It recalculates routes quickly when a topological change occurs, utilizing a minimum of routing protocol traffic. More than one OSPF process can be configured in a router but SPF calculation associated with multiple processes can consume a considerable amount of CPU and memory. Features • no hop count limitations. • understands variable-length subnet masks (VLSMs) and allows for summarization. • uses multicasts (not broadcasts) to send updates. • converges much faster because OSPF propagates changes immediately. • allows for load balancing with up to six equal-cost paths. • authentication available. • allows for tagging of external routes injected by other autonomous systems.
  • 8. OSPF ( Open Shortest Path First ) OSPF network types – OSPF assumes that, within a subnet all routers can communicate directly using multicasts and that no router is uniquely positioned in the topology. If five routers are attached to a switch, a multicast from one reaches the other four and each would be fine as a designated router (DR). This assumption does not hold good for NBMA. • Broadcast – It requires a DR. OSPF defines this interface network type to use multicast Hellos to dynamically discover neighbors, allows more than two routers to be in the same subnet and to attempt to elect a DR. • point-to-point - only two OSPF routers can exist in the subnet, neighbors can be dynamically discovered through Hellos and the routers do not elect a DR. • point-to-multipoint (NonBroadcast) – It does not involve a DR election; this OSPF network type is less efficient in a full mesh, but fine with a partial mesh. It is more tolerant of network changes than the broadcast option. • NBMA (non-broadcast multiple access) - In an NBMA configuration, OSPF sends HELLO packets (packets sent periodically to establish and confirm neighbor relationships between routers) to each router one at a time rather than multicasting them. The HELLO timer (which tells the router how often to send HELLO packets) is extended from 10 to 30 seconds and the dead router timer (which tells the router how long to wait before it decides that a neighboring router is not functioning) is extended from 40 to 120 seconds.
  • 9. (RIP) Routing Information Protocol Description RIP is a standardized Distance Vector protocol, designed for use on smaller networks. It is used to exchange of routing information among gateways and hosts. This protocol is most useful as an interior gateway protocol (i.e. within an autonomous system) and is supported on a wide variety of systems. It is suitable for small networks using serial lines whose speeds do not vary widely and is not intended for use in more complex environments. Functionality• sends out routing updates every 30 seconds. • sends out the full routing table every periodic update • It uses hopcount as its metric (max hopcount 15 ) • uses the Bellman-Ford Distance Vector algorithm to determine the best “path” to a particular destination • If multiple paths exist to a particular destination, RIP will load balance between those paths by default (up to 4 only ) if the metric (hopcount) is equal. • It uses a round-robin system of load-balancing between equal metric routes which can lead to pinhole congestion (slower link to become congested).
  • 10. (RIP) Routing Information Protocol RIP has two versions - Version 1 (RIPv1) and Version 2 (RIPv2). RIPv1 – • does not include the subnet mask with its routing table updates, therefore it does not support Variable Length Subnet Masks (VLSMs). • It requires networks must be contiguous and subnets of a major network must be configured with identical subnet masks else route table inconsistencies will occur. • sends updates as broadcasts to address 255.255.255.255. RIPv2 • supports VLSMs, allowing discontiguous networks and varying subnet masks to exist. • Routing updates are sent via multicast using address 224.0.0.9 • Includes the subnet mask with its routing table updates. • Encrypted authentication can be configured between RIPv2 routers. • Route tagging is supported. RIPv2 can interoperate with RIPv1By default. In this case following will occur • RIPv1 routers will sent only Version 1 packets • RIPv1 routers will receive both Version 1 and 2 updates • RIPv2 routers will both send and receive only Version 2 updates version of RIP a particular interface will “send” or “receive.” can be controlled.
  • 11. (RIP) Routing Information Protocol RIP Timers – • Update Timer (default 30 seconds) – indicates how often the router will send out a routing table update. • Invalid Timer (default 180 seconds) – indicates how long a route will remain in a routing table before being marked as invalid, if no new updates are heard about this route. The invalid timer will be reset if an update is received for that particular route before the timer expires. • Hold-down Timer (default 180 seconds) – indicates how long RIP will “suppress” a route that it has placed in a hold-down state. It will not accept any new updates for routes in a holddown state, until the hold-down timer expires. A route will enter a hold-down state for one of three reasons: - Invalid timer has expired. - An update has been received from a router marking that route with a metric of 16 (unreachable). - An update has been received from another router, marking that route with a higher metric than what is currently in the routing table. • Flush Timer (default 240 seconds) – indicates how long a route can remain in a routing table before being flushed, if no new updates are heard about this route. it runs concurrently with the invalid timer, and thus will flush out a route 60 seconds after it has been marked invalid.
  • 12. IPV6 NDP ( Neighbor Discovery Protocol ) Description– This protocol solves a set of problems related to the interaction between nodes (hosts and routers) attached to the same link. Nodes use Neighbor Discovery to determine the link-layer addresses for neighbors known to reside on attached links. It also uses the protocol to actively keep track of which neighbors are reachable and to detect changed link-layer addresses. It defines mechanisms for solving following problems • Router Discovery - Hosts locate routers that reside on an attached link. • Prefix Discovery - Hosts discover set of address prefixes that define which destinations are on-link for an attached link. • Address Auto configuration - Nodes automatically configure an address for an interface. • Address resolution - Nodes determine the link-layer address of an on-link destination given only the destination's IP address. • Next-hop determination - The algorithm for mapping an IP destination address into the IP address of the neighbor through which destination traffic should be sent. • Neighbor Unreachability Detection - Nodes determine reachability of a neighbor. • Duplicate Address Detection - Node determines that an address it wishes to use is not already in use by another node. • Redirect – a router informs a host of a better first-hop node to reach a particular destination.
  • 13. IPV6 NDP ( Neighbor Discovery Protocol ) NDP uses following ICMPV6 messages for Router Solicitation - When an interface becomes enabled, hosts may send out Router Solicitations that request routers to generate Router Advertisements immediately rather than at their next scheduled time. Router Advertisement - Routers advertise their presence together with various link and Internet parameters either periodically, or in response to a Router Solicitation message. Router Advertisements contain prefixes that are used for determining whether another address shares the same link (on-link determination) and/or address configuration, a suggested hop limit value, etc. Neighbor Solicitation - Sent by a node to determine the link-layer address of a neighbor, or to verify that a neighbor is still reachable via a cached link-layer address. Neighbor Advertisement – Sent by a Node as a response to a Neighbor Solicitation message. A node may also send unsolicited Neighbor Advertisements to announce a link-layer address change Redirect - Used by routers to inform hosts of a better first hop for a destination. Duplicate Address Detection (DAD) - Neighbor Solicitation messages are used for Duplicate Address Detection.
  • 14. IPV6 NDP ( Neighbor Discovery Protocol ) Node Discovery Process – Problem - node A wants to deliver packets to destination node B using the IPv6 on the same local link. However, node A does not know node B's link-layer address. Procedure • Node A sends an ICMPv6 Type 135 message (neighbor solicitation) on the local link (with its sitelocal address as the IPv6 source address, solicited-node multicast address corresponding to the target address as the destination IPv6 address and the source link-layer address of the sender(node A) as data of the ICMPv6 message. The source link-layer address of this frame is the link-layer address of node A. The destination link-layer address of this frame uses multicast mapping of the destination IPv6 address. • Node B, which is listening to the local link for multicast addresses, intercepts the neighbor solicitation message because the destination IPv6 address represents the solicited-node multicast address corresponding to its IPv6 address. • Node B replies by sending a neighbor advertisement message using its site-local address as the IPv6 source address and the site-local address as the destination IPv6 address. It also includes its link-layer address in the ICMPv6 message. • After receiving neighbor solicitation and neighbor advertisement messages, node A and node B know each other's link-layer addresses.  Learned link-layer addresses are kept in a neighbor discovery table (neighbor cache). Now both the nodes can communicate on the local link.
  • 15. IPV6 NDP ( Neighbor Discovery Protocol ) Neighbor Unreachability Detection - To verify the reachability of neighbor nodes in the neighbor discovery table, neighbor solicitation message is used with unicast addresses of the neighbor nodes as destination IPv6 addresses instead of solicited-node multicast addresses. Security IPsec AH can be used with NDP messages to enhance security. Also the hosts can verify through AH that Neighbor Advertisements and Router Advertisements do contain proper and accurate information. IPsec can be used in NDP only through manual configuration of Security Associations (SA). Mapping of ICMPV6 messages to NDP Functionality - ICMPv6 Type Name of Message NDP Functionality Type 133 Type 134 Router Solicitation (RS) Router Advertisement (RA) Type 135 Neighbor Solicitation (NS) Type 136 Type 137 Neighbor Advertisement (NA) Redirect Message Router/Prefix Discover Router Adverstisement DAD/Address resolution/unreachable detection Address resolution Redirection
  • 16. HIP ( Host Identity Protocol ) Description - A host and its location are identified using Internet Protocol (IP) addresses in the current Internet architecture. Now a days a considerable amount of hosts are portable devices. They often change their IP addresses due to mobility. So mobility and multihoming are hard to implement securely in the present Internet. This Protocol is a host identification technology for use on Internet Protocol (IP) networks, such as the Internet. It enables host mobility and multihoming across different address families (IPv4 and IPv6), offers end-to-end encryption and protection against attacks, allows moving away from IP address-based access control to permanent host identities, and restores end-to-end host identification in the presence of several addressing domains separated by Network Address Translation (NAT) devices. This protocol separates the identity of a host from its location. It uses IP in network layer for routing packets and public key (host identity) in transport and application layers. Host Identity Tag (HIT) - 128-bit-long bit string – It is constructed by applying a cryptographic hash function over the public key. Host Identity – it contains HIT.
  • 17. HIP ( Host Identity Protocol ) Functionality – • Each host creates one or more public/private key pairs to provide identities for itself. A client host obtains the host identity of a server typically from the Domain Name System (DNS) or a Distributed Hash Table (DHT). For environments where DHT not supported, public key of the server is added to the known host list after the first connection. • To communicate using HIP, Initially two hosts (client and server ) establish a HIP association called HIP Base Exchange (BEX). In this process private keys corresponding to host identifiers are possessed by their peers and a pair of IPsec Encapsulated Security Payload (ESP) Security Associations (SAs) for each direction is created. • Now both client and server communicates using IPsec ESP messages. • As neither transport layer connections nor security associations created after the HIP base exchange are bound to IP addresses, a mobile client can change its IP address and continue to transmit ESP-protected packets to its peer. HIP supports such mobility events by implementing an end-to-end three-way UPDATE signaling mechanism between communicating nodes.
  • 18. HIP ( Host Identity Protocol ) • For two hosts behind NAT applications and firewalls, HIP enables communicate through a Rendezvous server and uses User Datagram Protocol (UDP)-based encapsulation (provided by the Interactive Connectivity Establishment (ICE) protocol). • HIP multihome uses the same mechanisms as mobility for updating the peer with a current set of host IP addresses. • HIP provides a network layer alternative to using Secure Sockets Layer/Transport Layer Security (SSL/TLS) for application security. • Most Internet applications can run unmodified over HIP, although only applications using the extended socket interface can take better advantage of the new features that HIP provides.
  • 19. IGMP ( Internal Gateway Multicast Protocol ) Description – The Internet Group Management Protocol (IGMP) is a communications protocol used by IPv4 hosts to establish multicast group memberships to any immediately neighboring multicast routers. It can be used for collecting the membership information needed by its multicast routing protocol (multicast router part) and to inform itself and other neighboring multicast routers of its memberships (group member part). If an IP multicast router is itself a member of one or more multicast groups, then it can perform both as "multicast router part" and the "group member part" of the protocol. Functionality: IGMP operates between the client computer and a local multicast router. A network switch is used to listen in on the IGMP conversation between hosts and routers (IGMP snooping). By listening to these conversations the switch maintains a map of which links need which IP multicast streams. Protocol Independent Multicast (PIM) is then used between the local and remote multicast routers to direct multicast traffic from the multicast server to many multicast clients. IGMP can be used for one-to-many networking applications such as online streaming video/gaming and allow more efficient use of resources while supporting these kind of applications.
  • 20. IGMP ( Internal Gateway Multicast Protocol ) IGMP has versions v1, v2 and v3. IGMPv1: Hosts can join multicast groups. There are no leave messages. Routers use a timeout based mechanism to discover the groups that are of no interest to the members. IGMPv2: Leave messages were added to the protocol, allowing group membership termination to be quickly reported to the routing protocol, which is important for high-bandwidth multicast groups and/or subnets with highly volatile group membership. IGMPv3: A major revision of the protocol allows hosts to specify the list of hosts from which they want to receive traffic. Traffic from other hosts is blocked inside the network. It also allows hosts to block inside the network packets that come from sources that send unwanted traffic. A single membership report now bundles multiple multicast group records to decrease the number of packets sent. State-Change Messages – A forged State-Change Report message will cause extra processing on each router and on each member of the group. It can be ignored if source address of the packet is not identified as belonging to a subnet assigned to the interface on which the packet was received.
  • 21. Loop Avoidance Techniques Problem Description When a data packet is continually routed through the same routers over and over again, the data packets continue to be routed within the network in an endless circle. This phenomenon is called as routing loop. Example - RIP updates are broadcast every 30 seconds by default. Due to slow convergence, routers may not learn about topology changes in a timely manner. Hence it will repeatedly broadcast updates based on outdated or incorrect route information causing datagrams to bounce between routers endlessly causing the routers to start a count to infinity. It can completely disable the network. This problem is associated with Distance Vector Protocols. Loop avoidance techniques or combinations of these techniques can minimize routing loops passing on incorrect routing information.
  • 22. Loop Avoidance Techniques Following are the Loop Avoidance Techniques Count to infinity – This mechanism sets a maximum hop count value to a specified count (e.g. for RIP, it is 15). When the hop counts exceeded, that causes an endlessly circulating datagram to be dropped and sets the destination as unreachable. Split-Horizon – This mechanism Prevents a routing update from being sent out the interface it was received on. With this mechanism in place, when a change occurs in the network, routers only advertise that change in one direction, i.e. they send the update out to all other ports except the one from which it was learned. Route-Poisoning – This mechanism prevents inconsistencies from spreading. When a router learns that a route has become unavailable, it overrides split-horizon by advertising the failed route with an infinity hop count (destination unreachable) out all the interfaces including the one it was received on. This allows a router to advertise out the same interface it learned information on, but poisons the route by using a value greater than the maximum hop count. Routers receiving this advertisement assume the destination network is unreachable. Hold-Down Timers –This mechanism is used in combination with route poisoning. It prevents routers from accepting any new updates for routes in a hold-down state, until the hold-down timer expires. Holddown timers start as soon as a router receives an update from a neighbor indicating that an attached network has gone down. Until the timer elapses, the router ignores updates regarding this route from other routers unless it receives an update from the neighboring router that initially informed the network of the downed link. The timer stops if it receives a message from the neighboring router. At that point, the network is marked as reachable again and the route table is updated.