SlideShare une entreprise Scribd logo
1  sur  37
IS-IS An introduction to IGP routing protocols Hagai Kahana
Compass-EOS Confidential 156.10.24.1 16.55.42.10 57.13.29.2
[object Object],Compass-EOS Confidential AS 11 AS 22 AS 33 iBGP eBGP AS 11
IGP routing protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential
IS-IS introduction ,[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential
Link-state protocol – High-level description ,[object Object],[object Object],Compass-EOS Confidential
Link-state protocol – High-level description ,[object Object],[object Object],Compass-EOS Confidential
Link-state protocol – High-level description ,[object Object],[object Object],Compass-EOS Confidential
Link-state protocol – High-level description ,[object Object],[object Object],Compass-EOS Confidential
IS-IS introduction ,[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential
IS-IS Addressing ,[object Object],[object Object],Compass-EOS Confidential
TLV ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential Length in Octets 1 1 Length of value TYPE LENGTH VALUE . . .
TLV ,[object Object],[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential Type ( 10 ) Length (Variable) Authentication type  Authentication value Authentication type code Value Reserved 0 Clear text password 1 HNAC-MD5 Authentication  54 Private authentication  255
IS-IS Common Header Compass-EOS Confidential Packet Data    … Definition Values network layer identifier assigned to IS-IS (ISO 9577) 0x83 Length of the packet header fields in octets Variable Version 0x1 Indicates length of the source ID (SysID) field 0x0 -> 6 byte IS-IS packet type (3 bits reserved)  Hello, LSP or SNP Version 0x1 Reserved 0 Number of area addresses permitted for this intermediate system’s area 0x0 = max 3 areas
Neighbor discovery
Neighbor discovery ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IIH message
Neighbor discovery -cont ,[object Object],[object Object],[object Object],Value Name 15 / 16 IIH LAN 17 IIH P2P
Handshaking – 3 ways ,[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential Adjacency UP Adjacency UP Router 2 Router 1 IIH Router 1 TLV s IIH Router 1 “ I see Router 2” +  TLVs IIH Router 2 “ I see Router 1” +  TLVs
IIH – LAN Level 1 and Level 2  Compass-EOS Confidential Field Definition Circuit type Level 1, Level 1-2, or Level 2 only (6 bit reserved) Source ID System ID of the router that generated packet Holding time Maximum interval between two consecutive hello packets before the router is considered no longer available PDU length Length of the entire PDU, including header Priority designates the DIS (Level 1 or Level 2) on the LAN LAN ID SysID of the DIS plus an octet-long unique ID for this router assigned by the DIS. TLV fields Type 1 - Area Addresses  Type 6 - IS Neighbors  Type 8 - Padding  Type 10 - Authentication Type
IIH – IS-IS Hello Packet ,[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential
IIH – IS-IS Hello Packet ,[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential 40 30 20 10 Hello Packet 30sec hold time  Hello Packet 30sec hold time  Hello Packet 40sec hold time
Flooding
LSP Link State Protocol data unit ,[object Object],[object Object],Compass-EOS Confidential
LSP Link State Protocol data unit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential
LSP Revision control Compass-EOS Confidential ,[object Object],[object Object],[object Object],Which LSP is the most recent one?
LSP Revision contol ,[object Object],[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential ,[object Object],[object Object],[object Object],[object Object],[object Object]
LSP Link State Protocol data unit ,[object Object],[object Object],Intradomain Routing Proto Descriminator Lenth Indicator Version/Protocol ID Extension ID Length PDU Type R R R Version Reserved Maximum Area Addresses PDU Length Remaining Lifetime LSP ID Sequence Number Checksum LSPDBOL IS Type P ATT TLVFIELDS
LSP Link State Protocol data unit ,[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential
Link state database Synchronization.
Pseudo-nodes and Designated Routers ,[object Object],[object Object],Compass-EOS Confidential
Pseudo-nodes and Designated Routers ,[object Object],Compass-EOS Confidential LSP 1111.1111.1111.01-00 LSP 5555.5555.5555.00-00 LSP 6666.6666.6666.00-00 LSP 3333.3333.3333.00-00 LSP 4444.4444.4444.00-00 Nbr 1111.1111.1111.00-00 Nbr 2222.2222.2222.00-00 Nbr 3333.3333.3333.00-00 Nbr 4444.4444.444.00-00 Nbr 5555.5555.5555.00-00 Nbr 6666.6666.6666.00-00 Nbr 1111.1111.1111.01-00 Nbr 1111.1111.1111.01-00 Nbr 1111.1111.1111.01-00 Nbr 1111.1111.1111.01-00 LSP 1111.1111.1111.00-00 Nbr 1111.1111.1111.01-00 LSP 2222.2222.2222.00-00 Nbr 1111.1111.1111.01-00
Pseudo-nodes and Designated Routers ,[object Object],[object Object],[object Object],Compass-EOS Confidential
Synchronizing Databases in LANs ,[object Object],Compass-EOS Confidential Compass-EOS Confidential Router 2 Router 1 CSNP Router XXXX.00-00 Life time 1678 Seq 0x05 Checksum 0xABCD Router …. … . PSNP Router XXXX.00-00 Life time 0 Seq 0x00 Checksum 0xABCD LSP Router XXXX.00-00 Life time 1678 Seq 0x05 Checksum 0xABCD
SPF (short path first) calculation.
SPF ,[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential
SPF – Hold down ,[object Object],[object Object],[object Object],Compass-EOS Confidential
Thank you Compass-EOS Confidential

Contenu connexe

Tendances

MPLS Traffic Engineering
MPLS Traffic EngineeringMPLS Traffic Engineering
MPLS Traffic EngineeringAPNIC
 
STP (spanning tree protocol)
STP (spanning tree protocol)STP (spanning tree protocol)
STP (spanning tree protocol)Netwax Lab
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Peter R. Egli
 
EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)NetProtocol Xpert
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)Respa Peter
 
BGP Weight Manipulation with Route Map
BGP Weight Manipulation with Route MapBGP Weight Manipulation with Route Map
BGP Weight Manipulation with Route MapNetProtocol Xpert
 
Juniper mpls best practice part 1
Juniper mpls best practice   part 1Juniper mpls best practice   part 1
Juniper mpls best practice part 1Febrian ‎
 
Hot standby router protocol (hsrp) using
Hot standby router protocol (hsrp) usingHot standby router protocol (hsrp) using
Hot standby router protocol (hsrp) usingShubhiGupta94
 
Spannig tree
Spannig treeSpannig tree
Spannig tree1 2d
 
OSPF Summary LSA (Type 3 LSA)
OSPF Summary LSA (Type 3 LSA)OSPF Summary LSA (Type 3 LSA)
OSPF Summary LSA (Type 3 LSA)NetProtocol Xpert
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44Jisc
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsDsunte Wilson
 

Tendances (20)

Ospf
 Ospf Ospf
Ospf
 
OSPF Basics
OSPF BasicsOSPF Basics
OSPF Basics
 
MPLS Traffic Engineering
MPLS Traffic EngineeringMPLS Traffic Engineering
MPLS Traffic Engineering
 
STP (spanning tree protocol)
STP (spanning tree protocol)STP (spanning tree protocol)
STP (spanning tree protocol)
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)
 
EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
BGP Weight Manipulation with Route Map
BGP Weight Manipulation with Route MapBGP Weight Manipulation with Route Map
BGP Weight Manipulation with Route Map
 
VPLS Fundamental
VPLS FundamentalVPLS Fundamental
VPLS Fundamental
 
MENOG-Segment Routing Introduction
MENOG-Segment Routing IntroductionMENOG-Segment Routing Introduction
MENOG-Segment Routing Introduction
 
Juniper mpls best practice part 1
Juniper mpls best practice   part 1Juniper mpls best practice   part 1
Juniper mpls best practice part 1
 
OSPF Configuration
OSPF ConfigurationOSPF Configuration
OSPF Configuration
 
Hot standby router protocol (hsrp) using
Hot standby router protocol (hsrp) usingHot standby router protocol (hsrp) using
Hot standby router protocol (hsrp) using
 
Spannig tree
Spannig treeSpannig tree
Spannig tree
 
OSPF Summary LSA (Type 3 LSA)
OSPF Summary LSA (Type 3 LSA)OSPF Summary LSA (Type 3 LSA)
OSPF Summary LSA (Type 3 LSA)
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
BGP protocol presentation
BGP protocol  presentationBGP protocol  presentation
BGP protocol presentation
 
EVPN Introduction
EVPN IntroductionEVPN Introduction
EVPN Introduction
 

Similaire à An intoroduction to the IS-IS IGP routing protocol

Similaire à An intoroduction to the IS-IS IGP routing protocol (20)

Ospf
OspfOspf
Ospf
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
Menggali Lebih Dalam tentang OSPF: Protokol Routing Dinamis yang Efisien.ppt
Menggali Lebih Dalam tentang OSPF: Protokol Routing Dinamis yang Efisien.pptMenggali Lebih Dalam tentang OSPF: Protokol Routing Dinamis yang Efisien.ppt
Menggali Lebih Dalam tentang OSPF: Protokol Routing Dinamis yang Efisien.ppt
 
ospf.ppt
ospf.pptospf.ppt
ospf.ppt
 
CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
 
Osp fv3 cs
Osp fv3 csOsp fv3 cs
Osp fv3 cs
 
Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocols
 
Networking interview questions
Networking interview questionsNetworking interview questions
Networking interview questions
 
Tcp
TcpTcp
Tcp
 
ch2_p3_ospf.pptx
ch2_p3_ospf.pptxch2_p3_ospf.pptx
ch2_p3_ospf.pptx
 
Ospfv3 primer
Ospfv3 primerOspfv3 primer
Ospfv3 primer
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
ospf.ppt
ospf.pptospf.ppt
ospf.ppt
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
 
Chapter7ccna
Chapter7ccnaChapter7ccna
Chapter7ccna
 
Chapter7ccna
Chapter7ccnaChapter7ccna
Chapter7ccna
 

Plus de Iftach Ian Amit

Cyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLVCyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLVIftach Ian Amit
 
BSidesTLV Closing Keynote
BSidesTLV Closing KeynoteBSidesTLV Closing Keynote
BSidesTLV Closing KeynoteIftach Ian Amit
 
Social Media Risk Metrics
Social Media Risk MetricsSocial Media Risk Metrics
Social Media Risk MetricsIftach Ian Amit
 
From your Pocket to your Heart and Back
From your Pocket to your Heart and BackFrom your Pocket to your Heart and Back
From your Pocket to your Heart and BackIftach Ian Amit
 
Painting a Company Red and Blue
Painting a Company Red and BluePainting a Company Red and Blue
Painting a Company Red and BlueIftach Ian Amit
 
"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?Iftach Ian Amit
 
Seeing Red In Your Future?
Seeing Red In Your Future?Seeing Red In Your Future?
Seeing Red In Your Future?Iftach Ian Amit
 
Passwords good badugly181212-2
Passwords good badugly181212-2Passwords good badugly181212-2
Passwords good badugly181212-2Iftach Ian Amit
 
Advanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done itAdvanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done itIftach Ian Amit
 
Infecting Python Bytecode
Infecting Python BytecodeInfecting Python Bytecode
Infecting Python BytecodeIftach Ian Amit
 
Cheating in Computer Games
Cheating in Computer GamesCheating in Computer Games
Cheating in Computer GamesIftach Ian Amit
 

Plus de Iftach Ian Amit (20)

Cyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLVCyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLV
 
Devsecops at Cimpress
Devsecops at CimpressDevsecops at Cimpress
Devsecops at Cimpress
 
BSidesTLV Closing Keynote
BSidesTLV Closing KeynoteBSidesTLV Closing Keynote
BSidesTLV Closing Keynote
 
Social Media Risk Metrics
Social Media Risk MetricsSocial Media Risk Metrics
Social Media Risk Metrics
 
ISTS12 Keynote
ISTS12 KeynoteISTS12 Keynote
ISTS12 Keynote
 
From your Pocket to your Heart and Back
From your Pocket to your Heart and BackFrom your Pocket to your Heart and Back
From your Pocket to your Heart and Back
 
Painting a Company Red and Blue
Painting a Company Red and BluePainting a Company Red and Blue
Painting a Company Red and Blue
 
"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?
 
Armorizing applications
Armorizing applicationsArmorizing applications
Armorizing applications
 
Seeing Red In Your Future?
Seeing Red In Your Future?Seeing Red In Your Future?
Seeing Red In Your Future?
 
Hacking cyber-iamit
Hacking cyber-iamitHacking cyber-iamit
Hacking cyber-iamit
 
Passwords good badugly181212-2
Passwords good badugly181212-2Passwords good badugly181212-2
Passwords good badugly181212-2
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Sexy defense
Sexy defenseSexy defense
Sexy defense
 
Cyber state
Cyber stateCyber state
Cyber state
 
Advanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done itAdvanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done it
 
Infecting Python Bytecode
Infecting Python BytecodeInfecting Python Bytecode
Infecting Python Bytecode
 
Exploiting Second life
Exploiting Second lifeExploiting Second life
Exploiting Second life
 
Dtmf phreaking
Dtmf phreakingDtmf phreaking
Dtmf phreaking
 
Cheating in Computer Games
Cheating in Computer GamesCheating in Computer Games
Cheating in Computer Games
 

Dernier

Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Dernier (20)

Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

An intoroduction to the IS-IS IGP routing protocol

  • 1. IS-IS An introduction to IGP routing protocols Hagai Kahana
  • 2. Compass-EOS Confidential 156.10.24.1 16.55.42.10 57.13.29.2
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. IS-IS Common Header Compass-EOS Confidential Packet Data … Definition Values network layer identifier assigned to IS-IS (ISO 9577) 0x83 Length of the packet header fields in octets Variable Version 0x1 Indicates length of the source ID (SysID) field 0x0 -> 6 byte IS-IS packet type (3 bits reserved) Hello, LSP or SNP Version 0x1 Reserved 0 Number of area addresses permitted for this intermediate system’s area 0x0 = max 3 areas
  • 16.
  • 17.
  • 18.
  • 19. IIH – LAN Level 1 and Level 2 Compass-EOS Confidential Field Definition Circuit type Level 1, Level 1-2, or Level 2 only (6 bit reserved) Source ID System ID of the router that generated packet Holding time Maximum interval between two consecutive hello packets before the router is considered no longer available PDU length Length of the entire PDU, including header Priority designates the DIS (Level 1 or Level 2) on the LAN LAN ID SysID of the DIS plus an octet-long unique ID for this router assigned by the DIS. TLV fields Type 1 - Area Addresses Type 6 - IS Neighbors Type 8 - Padding Type 10 - Authentication Type
  • 20.
  • 21.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. Link state database Synchronization.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. SPF (short path first) calculation.
  • 35.
  • 36.
  • 37. Thank you Compass-EOS Confidential

Notes de l'éditeur

  1. July 10, 2000
  2. July 10, 2000
  3. July 10, 2000
  4. July 10, 2000
  5. July 10, 2000
  6. July 10, 2000
  7. July 10, 2000
  8. July 10, 2000
  9. July 10, 2000
  10. July 10, 2000
  11. July 10, 2000
  12. July 10, 2000
  13. July 10, 2000
  14. July 10, 2000
  15. July 10, 2000
  16. July 10, 2000
  17. July 10, 2000
  18. July 10, 2000
  19. July 10, 2000
  20. In OSPF all timers must align with the DR (designated router) July 10, 2000
  21. Any change in network conditions causing changes in TLV information advertised in the most recent hello transmitted ID length in the IIH. This field indicates the length of the SysID and the SysID must be consistent on all routers across the domain Maximum number of areas. addresses supported in a single router configuration must match between adjacent neighbors, default maximum value of 3. July 10, 2000
  22. July 10, 2000
  23. POP - close collection of routers July 10, 2000
  24. POP - close collection of routers July 10, 2000
  25. If pseudo-node ID is 00 it means that this is a real router. Since IS-IS is on layer 2 there is no fragmentation service, do it is part of the IS-IS itself July 10, 2000
  26. If pseudo-node ID is 00 it means that this is a real router. Since IS-IS is on layer 2 there is no fragmentation service, do it is part of the IS-IS itself July 10, 2000
  27. July 10, 2000
  28. July 10, 2000
  29. July 10, 2000
  30. July 10, 2000
  31. July 10, 2000
  32. July 10, 2000
  33. Synchronizing DB and resulting routing tables is crucial for bringing packets closer to their destination. CSNP by default is sends every 10 seconds. Can be configured. CSNP can be more than one packet. Start and end LAN-ID is used to identify it: 0000.0000.0000.00-00 to ffff.ffff.ffff.ff-ff SRM – set on a link the corresponding LSP has to be sent out on that link. SSN – the corresponding LSP should be included in the next PSNP Behavior when CSNP reporting an older version of the LSP\\a more recent version of LSP\\ an unknown LSP July 10, 2000
  34. July 10, 2000
  35. July 10, 2000
  36. July 10, 2000
  37. TLV - Type Length Value Authentication is applied on the entire PDU July 10, 2000