SlideShare una empresa de Scribd logo
1 de 37
IS-IS An introduction to IGP routing protocols Hagai Kahana
Compass-EOS Confidential 156.10.24.1 16.55.42.10 57.13.29.2
[object Object],Compass-EOS Confidential AS 11 AS 22 AS 33 iBGP eBGP AS 11
IGP routing protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential
IS-IS introduction ,[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential
Link-state protocol – High-level description ,[object Object],[object Object],Compass-EOS Confidential
Link-state protocol – High-level description ,[object Object],[object Object],Compass-EOS Confidential
Link-state protocol – High-level description ,[object Object],[object Object],Compass-EOS Confidential
Link-state protocol – High-level description ,[object Object],[object Object],Compass-EOS Confidential
IS-IS introduction ,[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential
IS-IS Addressing ,[object Object],[object Object],Compass-EOS Confidential
TLV ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential Length in Octets 1 1 Length of value TYPE LENGTH VALUE . . .
TLV ,[object Object],[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential Type ( 10 ) Length (Variable) Authentication type  Authentication value Authentication type code Value Reserved 0 Clear text password 1 HNAC-MD5 Authentication  54 Private authentication  255
IS-IS Common Header Compass-EOS Confidential Packet Data    … Definition Values network layer identifier assigned to IS-IS (ISO 9577) 0x83 Length of the packet header fields in octets Variable Version 0x1 Indicates length of the source ID (SysID) field 0x0 -> 6 byte IS-IS packet type (3 bits reserved)  Hello, LSP or SNP Version 0x1 Reserved 0 Number of area addresses permitted for this intermediate system’s area 0x0 = max 3 areas
Neighbor discovery
Neighbor discovery ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IIH message
Neighbor discovery -cont ,[object Object],[object Object],[object Object],Value Name 15 / 16 IIH LAN 17 IIH P2P
Handshaking – 3 ways ,[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential Adjacency UP Adjacency UP Router 2 Router 1 IIH Router 1 TLV s IIH Router 1 “ I see Router 2” +  TLVs IIH Router 2 “ I see Router 1” +  TLVs
IIH – LAN Level 1 and Level 2  Compass-EOS Confidential Field Definition Circuit type Level 1, Level 1-2, or Level 2 only (6 bit reserved) Source ID System ID of the router that generated packet Holding time Maximum interval between two consecutive hello packets before the router is considered no longer available PDU length Length of the entire PDU, including header Priority designates the DIS (Level 1 or Level 2) on the LAN LAN ID SysID of the DIS plus an octet-long unique ID for this router assigned by the DIS. TLV fields Type 1 - Area Addresses  Type 6 - IS Neighbors  Type 8 - Padding  Type 10 - Authentication Type
IIH – IS-IS Hello Packet ,[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential
IIH – IS-IS Hello Packet ,[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential 40 30 20 10 Hello Packet 30sec hold time  Hello Packet 30sec hold time  Hello Packet 40sec hold time
Flooding
LSP Link State Protocol data unit ,[object Object],[object Object],Compass-EOS Confidential
LSP Link State Protocol data unit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential
LSP Revision control Compass-EOS Confidential ,[object Object],[object Object],[object Object],Which LSP is the most recent one?
LSP Revision contol ,[object Object],[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential ,[object Object],[object Object],[object Object],[object Object],[object Object]
LSP Link State Protocol data unit ,[object Object],[object Object],Intradomain Routing Proto Descriminator Lenth Indicator Version/Protocol ID Extension ID Length PDU Type R R R Version Reserved Maximum Area Addresses PDU Length Remaining Lifetime LSP ID Sequence Number Checksum LSPDBOL IS Type P ATT TLVFIELDS
LSP Link State Protocol data unit ,[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential
Link state database Synchronization.
Pseudo-nodes and Designated Routers ,[object Object],[object Object],Compass-EOS Confidential
Pseudo-nodes and Designated Routers ,[object Object],Compass-EOS Confidential LSP 1111.1111.1111.01-00 LSP 5555.5555.5555.00-00 LSP 6666.6666.6666.00-00 LSP 3333.3333.3333.00-00 LSP 4444.4444.4444.00-00 Nbr 1111.1111.1111.00-00 Nbr 2222.2222.2222.00-00 Nbr 3333.3333.3333.00-00 Nbr 4444.4444.444.00-00 Nbr 5555.5555.5555.00-00 Nbr 6666.6666.6666.00-00 Nbr 1111.1111.1111.01-00 Nbr 1111.1111.1111.01-00 Nbr 1111.1111.1111.01-00 Nbr 1111.1111.1111.01-00 LSP 1111.1111.1111.00-00 Nbr 1111.1111.1111.01-00 LSP 2222.2222.2222.00-00 Nbr 1111.1111.1111.01-00
Pseudo-nodes and Designated Routers ,[object Object],[object Object],[object Object],Compass-EOS Confidential
Synchronizing Databases in LANs ,[object Object],Compass-EOS Confidential Compass-EOS Confidential Router 2 Router 1 CSNP Router XXXX.00-00 Life time 1678 Seq 0x05 Checksum 0xABCD Router …. … . PSNP Router XXXX.00-00 Life time 0 Seq 0x00 Checksum 0xABCD LSP Router XXXX.00-00 Life time 1678 Seq 0x05 Checksum 0xABCD
SPF (short path first) calculation.
SPF ,[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential
SPF – Hold down ,[object Object],[object Object],[object Object],Compass-EOS Confidential
Thank you Compass-EOS Confidential

Más contenido relacionado

La actualidad más candente (20)

Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)
 
Ospf
 Ospf Ospf
Ospf
 
bgp protocol
 bgp protocol bgp protocol
bgp protocol
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
STP (spanning tree protocol)
STP (spanning tree protocol)STP (spanning tree protocol)
STP (spanning tree protocol)
 
Border Gatway Protocol
Border Gatway ProtocolBorder Gatway Protocol
Border Gatway Protocol
 
BGP
BGPBGP
BGP
 
MPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicMPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - Basic
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
CCNP v6 Route: Implementing IP Routing Chapter 3
CCNP v6 Route: Implementing IP Routing Chapter 3CCNP v6 Route: Implementing IP Routing Chapter 3
CCNP v6 Route: Implementing IP Routing Chapter 3
 
How BGP Works
How BGP WorksHow BGP Works
How BGP Works
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPF
 
MPLS Layer 3 VPN
MPLS Layer 3 VPN MPLS Layer 3 VPN
MPLS Layer 3 VPN
 
OSPF LSA Types Explained
OSPF LSA Types ExplainedOSPF LSA Types Explained
OSPF LSA Types Explained
 
OSPF Basics
OSPF BasicsOSPF Basics
OSPF Basics
 
Ethernet VPN (EVPN) EVerything Provider Needs
Ethernet VPN (EVPN) EVerything Provider NeedsEthernet VPN (EVPN) EVerything Provider Needs
Ethernet VPN (EVPN) EVerything Provider Needs
 

Similar a An intoroduction to the IS-IS IGP routing protocol

Similar a An intoroduction to the IS-IS IGP routing protocol (20)

Ospf
OspfOspf
Ospf
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
Menggali Lebih Dalam tentang OSPF: Protokol Routing Dinamis yang Efisien.ppt
Menggali Lebih Dalam tentang OSPF: Protokol Routing Dinamis yang Efisien.pptMenggali Lebih Dalam tentang OSPF: Protokol Routing Dinamis yang Efisien.ppt
Menggali Lebih Dalam tentang OSPF: Protokol Routing Dinamis yang Efisien.ppt
 
ospf.ppt
ospf.pptospf.ppt
ospf.ppt
 
CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
 
Osp fv3 cs
Osp fv3 csOsp fv3 cs
Osp fv3 cs
 
Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocols
 
Networking interview questions
Networking interview questionsNetworking interview questions
Networking interview questions
 
Tcp
TcpTcp
Tcp
 
ch2_p3_ospf.pptx
ch2_p3_ospf.pptxch2_p3_ospf.pptx
ch2_p3_ospf.pptx
 
Ospfv3 primer
Ospfv3 primerOspfv3 primer
Ospfv3 primer
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
ospf.ppt
ospf.pptospf.ppt
ospf.ppt
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
 
Chapter7ccna
Chapter7ccnaChapter7ccna
Chapter7ccna
 

Más de Iftach Ian Amit

Cyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLVCyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLVIftach Ian Amit
 
BSidesTLV Closing Keynote
BSidesTLV Closing KeynoteBSidesTLV Closing Keynote
BSidesTLV Closing KeynoteIftach Ian Amit
 
Social Media Risk Metrics
Social Media Risk MetricsSocial Media Risk Metrics
Social Media Risk MetricsIftach Ian Amit
 
From your Pocket to your Heart and Back
From your Pocket to your Heart and BackFrom your Pocket to your Heart and Back
From your Pocket to your Heart and BackIftach Ian Amit
 
Painting a Company Red and Blue
Painting a Company Red and BluePainting a Company Red and Blue
Painting a Company Red and BlueIftach Ian Amit
 
"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?Iftach Ian Amit
 
Seeing Red In Your Future?
Seeing Red In Your Future?Seeing Red In Your Future?
Seeing Red In Your Future?Iftach Ian Amit
 
Passwords good badugly181212-2
Passwords good badugly181212-2Passwords good badugly181212-2
Passwords good badugly181212-2Iftach Ian Amit
 
Advanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done itAdvanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done itIftach Ian Amit
 
Infecting Python Bytecode
Infecting Python BytecodeInfecting Python Bytecode
Infecting Python BytecodeIftach Ian Amit
 
Cheating in Computer Games
Cheating in Computer GamesCheating in Computer Games
Cheating in Computer GamesIftach Ian Amit
 

Más de Iftach Ian Amit (20)

Cyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLVCyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLV
 
Devsecops at Cimpress
Devsecops at CimpressDevsecops at Cimpress
Devsecops at Cimpress
 
BSidesTLV Closing Keynote
BSidesTLV Closing KeynoteBSidesTLV Closing Keynote
BSidesTLV Closing Keynote
 
Social Media Risk Metrics
Social Media Risk MetricsSocial Media Risk Metrics
Social Media Risk Metrics
 
ISTS12 Keynote
ISTS12 KeynoteISTS12 Keynote
ISTS12 Keynote
 
From your Pocket to your Heart and Back
From your Pocket to your Heart and BackFrom your Pocket to your Heart and Back
From your Pocket to your Heart and Back
 
Painting a Company Red and Blue
Painting a Company Red and BluePainting a Company Red and Blue
Painting a Company Red and Blue
 
"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?
 
Armorizing applications
Armorizing applicationsArmorizing applications
Armorizing applications
 
Seeing Red In Your Future?
Seeing Red In Your Future?Seeing Red In Your Future?
Seeing Red In Your Future?
 
Hacking cyber-iamit
Hacking cyber-iamitHacking cyber-iamit
Hacking cyber-iamit
 
Passwords good badugly181212-2
Passwords good badugly181212-2Passwords good badugly181212-2
Passwords good badugly181212-2
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Sexy defense
Sexy defenseSexy defense
Sexy defense
 
Cyber state
Cyber stateCyber state
Cyber state
 
Advanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done itAdvanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done it
 
Infecting Python Bytecode
Infecting Python BytecodeInfecting Python Bytecode
Infecting Python Bytecode
 
Exploiting Second life
Exploiting Second lifeExploiting Second life
Exploiting Second life
 
Dtmf phreaking
Dtmf phreakingDtmf phreaking
Dtmf phreaking
 
Cheating in Computer Games
Cheating in Computer GamesCheating in Computer Games
Cheating in Computer Games
 

Último

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

An intoroduction to the IS-IS IGP routing protocol

  • 1. IS-IS An introduction to IGP routing protocols Hagai Kahana
  • 2. Compass-EOS Confidential 156.10.24.1 16.55.42.10 57.13.29.2
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. IS-IS Common Header Compass-EOS Confidential Packet Data … Definition Values network layer identifier assigned to IS-IS (ISO 9577) 0x83 Length of the packet header fields in octets Variable Version 0x1 Indicates length of the source ID (SysID) field 0x0 -> 6 byte IS-IS packet type (3 bits reserved) Hello, LSP or SNP Version 0x1 Reserved 0 Number of area addresses permitted for this intermediate system’s area 0x0 = max 3 areas
  • 16.
  • 17.
  • 18.
  • 19. IIH – LAN Level 1 and Level 2 Compass-EOS Confidential Field Definition Circuit type Level 1, Level 1-2, or Level 2 only (6 bit reserved) Source ID System ID of the router that generated packet Holding time Maximum interval between two consecutive hello packets before the router is considered no longer available PDU length Length of the entire PDU, including header Priority designates the DIS (Level 1 or Level 2) on the LAN LAN ID SysID of the DIS plus an octet-long unique ID for this router assigned by the DIS. TLV fields Type 1 - Area Addresses Type 6 - IS Neighbors Type 8 - Padding Type 10 - Authentication Type
  • 20.
  • 21.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. Link state database Synchronization.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. SPF (short path first) calculation.
  • 35.
  • 36.
  • 37. Thank you Compass-EOS Confidential

Notas del editor

  1. July 10, 2000
  2. July 10, 2000
  3. July 10, 2000
  4. July 10, 2000
  5. July 10, 2000
  6. July 10, 2000
  7. July 10, 2000
  8. July 10, 2000
  9. July 10, 2000
  10. July 10, 2000
  11. July 10, 2000
  12. July 10, 2000
  13. July 10, 2000
  14. July 10, 2000
  15. July 10, 2000
  16. July 10, 2000
  17. July 10, 2000
  18. July 10, 2000
  19. July 10, 2000
  20. In OSPF all timers must align with the DR (designated router) July 10, 2000
  21. Any change in network conditions causing changes in TLV information advertised in the most recent hello transmitted ID length in the IIH. This field indicates the length of the SysID and the SysID must be consistent on all routers across the domain Maximum number of areas. addresses supported in a single router configuration must match between adjacent neighbors, default maximum value of 3. July 10, 2000
  22. July 10, 2000
  23. POP - close collection of routers July 10, 2000
  24. POP - close collection of routers July 10, 2000
  25. If pseudo-node ID is 00 it means that this is a real router. Since IS-IS is on layer 2 there is no fragmentation service, do it is part of the IS-IS itself July 10, 2000
  26. If pseudo-node ID is 00 it means that this is a real router. Since IS-IS is on layer 2 there is no fragmentation service, do it is part of the IS-IS itself July 10, 2000
  27. July 10, 2000
  28. July 10, 2000
  29. July 10, 2000
  30. July 10, 2000
  31. July 10, 2000
  32. July 10, 2000
  33. Synchronizing DB and resulting routing tables is crucial for bringing packets closer to their destination. CSNP by default is sends every 10 seconds. Can be configured. CSNP can be more than one packet. Start and end LAN-ID is used to identify it: 0000.0000.0000.00-00 to ffff.ffff.ffff.ff-ff SRM – set on a link the corresponding LSP has to be sent out on that link. SSN – the corresponding LSP should be included in the next PSNP Behavior when CSNP reporting an older version of the LSP\\a more recent version of LSP\\ an unknown LSP July 10, 2000
  34. July 10, 2000
  35. July 10, 2000
  36. July 10, 2000
  37. TLV - Type Length Value Authentication is applied on the entire PDU July 10, 2000