SlideShare a Scribd company logo
IS-IS An introduction to IGP routing protocols Hagai Kahana
Compass-EOS Confidential 156.10.24.1 16.55.42.10 57.13.29.2
[object Object],Compass-EOS Confidential AS 11 AS 22 AS 33 iBGP eBGP AS 11
IGP routing protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential
IS-IS introduction ,[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential
Link-state protocol – High-level description ,[object Object],[object Object],Compass-EOS Confidential
Link-state protocol – High-level description ,[object Object],[object Object],Compass-EOS Confidential
Link-state protocol – High-level description ,[object Object],[object Object],Compass-EOS Confidential
Link-state protocol – High-level description ,[object Object],[object Object],Compass-EOS Confidential
IS-IS introduction ,[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential
IS-IS Addressing ,[object Object],[object Object],Compass-EOS Confidential
TLV ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential Length in Octets 1 1 Length of value TYPE LENGTH VALUE . . .
TLV ,[object Object],[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential Type ( 10 ) Length (Variable) Authentication type  Authentication value Authentication type code Value Reserved 0 Clear text password 1 HNAC-MD5 Authentication  54 Private authentication  255
IS-IS Common Header Compass-EOS Confidential Packet Data    … Definition Values network layer identifier assigned to IS-IS (ISO 9577) 0x83 Length of the packet header fields in octets Variable Version 0x1 Indicates length of the source ID (SysID) field 0x0 -> 6 byte IS-IS packet type (3 bits reserved)  Hello, LSP or SNP Version 0x1 Reserved 0 Number of area addresses permitted for this intermediate system’s area 0x0 = max 3 areas
Neighbor discovery
Neighbor discovery ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IIH message
Neighbor discovery -cont ,[object Object],[object Object],[object Object],Value Name 15 / 16 IIH LAN 17 IIH P2P
Handshaking – 3 ways ,[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential Adjacency UP Adjacency UP Router 2 Router 1 IIH Router 1 TLV s IIH Router 1 “ I see Router 2” +  TLVs IIH Router 2 “ I see Router 1” +  TLVs
IIH – LAN Level 1 and Level 2  Compass-EOS Confidential Field Definition Circuit type Level 1, Level 1-2, or Level 2 only (6 bit reserved) Source ID System ID of the router that generated packet Holding time Maximum interval between two consecutive hello packets before the router is considered no longer available PDU length Length of the entire PDU, including header Priority designates the DIS (Level 1 or Level 2) on the LAN LAN ID SysID of the DIS plus an octet-long unique ID for this router assigned by the DIS. TLV fields Type 1 - Area Addresses  Type 6 - IS Neighbors  Type 8 - Padding  Type 10 - Authentication Type
IIH – IS-IS Hello Packet ,[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential
IIH – IS-IS Hello Packet ,[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential 40 30 20 10 Hello Packet 30sec hold time  Hello Packet 30sec hold time  Hello Packet 40sec hold time
Flooding
LSP Link State Protocol data unit ,[object Object],[object Object],Compass-EOS Confidential
LSP Link State Protocol data unit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential
LSP Revision control Compass-EOS Confidential ,[object Object],[object Object],[object Object],Which LSP is the most recent one?
LSP Revision contol ,[object Object],[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential ,[object Object],[object Object],[object Object],[object Object],[object Object]
LSP Link State Protocol data unit ,[object Object],[object Object],Intradomain Routing Proto Descriminator Lenth Indicator Version/Protocol ID Extension ID Length PDU Type R R R Version Reserved Maximum Area Addresses PDU Length Remaining Lifetime LSP ID Sequence Number Checksum LSPDBOL IS Type P ATT TLVFIELDS
LSP Link State Protocol data unit ,[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential
Link state database Synchronization.
Pseudo-nodes and Designated Routers ,[object Object],[object Object],Compass-EOS Confidential
Pseudo-nodes and Designated Routers ,[object Object],Compass-EOS Confidential LSP 1111.1111.1111.01-00 LSP 5555.5555.5555.00-00 LSP 6666.6666.6666.00-00 LSP 3333.3333.3333.00-00 LSP 4444.4444.4444.00-00 Nbr 1111.1111.1111.00-00 Nbr 2222.2222.2222.00-00 Nbr 3333.3333.3333.00-00 Nbr 4444.4444.444.00-00 Nbr 5555.5555.5555.00-00 Nbr 6666.6666.6666.00-00 Nbr 1111.1111.1111.01-00 Nbr 1111.1111.1111.01-00 Nbr 1111.1111.1111.01-00 Nbr 1111.1111.1111.01-00 LSP 1111.1111.1111.00-00 Nbr 1111.1111.1111.01-00 LSP 2222.2222.2222.00-00 Nbr 1111.1111.1111.01-00
Pseudo-nodes and Designated Routers ,[object Object],[object Object],[object Object],Compass-EOS Confidential
Synchronizing Databases in LANs ,[object Object],Compass-EOS Confidential Compass-EOS Confidential Router 2 Router 1 CSNP Router XXXX.00-00 Life time 1678 Seq 0x05 Checksum 0xABCD Router …. … . PSNP Router XXXX.00-00 Life time 0 Seq 0x00 Checksum 0xABCD LSP Router XXXX.00-00 Life time 1678 Seq 0x05 Checksum 0xABCD
SPF (short path first) calculation.
SPF ,[object Object],[object Object],[object Object],[object Object],Compass-EOS Confidential
SPF – Hold down ,[object Object],[object Object],[object Object],Compass-EOS Confidential
Thank you Compass-EOS Confidential

More Related Content

What's hot

Route Redistribution between OSPF and EIGRP
Route Redistribution between OSPF and EIGRPRoute Redistribution between OSPF and EIGRP
Route Redistribution between OSPF and EIGRP
NetProtocol Xpert
 
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)
NetProtocol Xpert
 
Routing Protocol EIGRP
Routing Protocol EIGRPRouting Protocol EIGRP
Routing Protocol EIGRP
Dmitry Figol
 
Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD) Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD)
KHNOG
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
NetProtocol Xpert
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
Sourabh Goyal
 
ospf routing protocol
ospf routing protocolospf routing protocol
ospf routing protocol
Ameer Agel
 
CCNP ROUTE V7 CH6
CCNP ROUTE V7 CH6CCNP ROUTE V7 CH6
CCNP ROUTE V7 CH6
Chaing Ravuth
 
OSPF LSA Types Explained
OSPF LSA Types ExplainedOSPF LSA Types Explained
OSPF LSA Types Explained
Duane Bodle
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
Muuluu
 
Layer 2 switching
Layer 2 switchingLayer 2 switching
Layer 2 switching
NetProtocol Xpert
 
Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPFarpit
 
STP (spanning tree protocol)
STP (spanning tree protocol)STP (spanning tree protocol)
STP (spanning tree protocol)
Netwax Lab
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
sarasanandam
 
HSRP (hot standby router protocol)
HSRP (hot standby router protocol)HSRP (hot standby router protocol)
HSRP (hot standby router protocol)
Netwax Lab
 
Bgp
BgpBgp
Spannig tree
Spannig treeSpannig tree
Spannig tree1 2d
 
Policy Based Routing (PBR)
Policy Based Routing (PBR)Policy Based Routing (PBR)
Policy Based Routing (PBR)
KHNOG
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
Respa Peter
 

What's hot (20)

Route Redistribution between OSPF and EIGRP
Route Redistribution between OSPF and EIGRPRoute Redistribution between OSPF and EIGRP
Route Redistribution between OSPF and EIGRP
 
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)
 
Routing Protocol EIGRP
Routing Protocol EIGRPRouting Protocol EIGRP
Routing Protocol EIGRP
 
Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD) Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD)
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Ospf
 Ospf Ospf
Ospf
 
ospf routing protocol
ospf routing protocolospf routing protocol
ospf routing protocol
 
CCNP ROUTE V7 CH6
CCNP ROUTE V7 CH6CCNP ROUTE V7 CH6
CCNP ROUTE V7 CH6
 
OSPF LSA Types Explained
OSPF LSA Types ExplainedOSPF LSA Types Explained
OSPF LSA Types Explained
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
Layer 2 switching
Layer 2 switchingLayer 2 switching
Layer 2 switching
 
Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPF
 
STP (spanning tree protocol)
STP (spanning tree protocol)STP (spanning tree protocol)
STP (spanning tree protocol)
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
HSRP (hot standby router protocol)
HSRP (hot standby router protocol)HSRP (hot standby router protocol)
HSRP (hot standby router protocol)
 
Bgp
BgpBgp
Bgp
 
Spannig tree
Spannig treeSpannig tree
Spannig tree
 
Policy Based Routing (PBR)
Policy Based Routing (PBR)Policy Based Routing (PBR)
Policy Based Routing (PBR)
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 

Similar to An intoroduction to the IS-IS IGP routing protocol

Ospf
OspfOspf
Ospf
Alp isik
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
sarasanandam
 
Menggali Lebih Dalam tentang OSPF: Protokol Routing Dinamis yang Efisien.ppt
Menggali Lebih Dalam tentang OSPF: Protokol Routing Dinamis yang Efisien.pptMenggali Lebih Dalam tentang OSPF: Protokol Routing Dinamis yang Efisien.ppt
Menggali Lebih Dalam tentang OSPF: Protokol Routing Dinamis yang Efisien.ppt
RochmadGSaputra
 
ospf.ppt
ospf.pptospf.ppt
ospf.ppt
parthashee3
 
CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
muazumuhammad6
 
Osp fv3 cs
Osp fv3 csOsp fv3 cs
Osp fv3 cs
Fred Bovy
 
Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocols
assinha
 
Networking interview questions
Networking interview questionsNetworking interview questions
Networking interview questions
zahadath
 
Tcp
TcpTcp
Tcpgiaolvq
 
ch2_p3_ospf.pptx
ch2_p3_ospf.pptxch2_p3_ospf.pptx
ch2_p3_ospf.pptx
NilsJuanSoncoMedina
 
Ospfv3 primer
Ospfv3 primerOspfv3 primer
Ospfv3 primer
Fred Bovy
 
Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01
Sachin Morya
 
ospf.ppt
ospf.pptospf.ppt
ospf.ppt
SolWeje
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
Reetesh Gupta
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
AIRTEL
 
Chapter7ccna
Chapter7ccnaChapter7ccna
Chapter7ccnarobertoxe
 
Chapter7ccna
Chapter7ccnaChapter7ccna
Chapter7ccnaernestlithur
 

Similar to An intoroduction to the IS-IS IGP routing protocol (20)

Ospf
OspfOspf
Ospf
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
Menggali Lebih Dalam tentang OSPF: Protokol Routing Dinamis yang Efisien.ppt
Menggali Lebih Dalam tentang OSPF: Protokol Routing Dinamis yang Efisien.pptMenggali Lebih Dalam tentang OSPF: Protokol Routing Dinamis yang Efisien.ppt
Menggali Lebih Dalam tentang OSPF: Protokol Routing Dinamis yang Efisien.ppt
 
ospf.ppt
ospf.pptospf.ppt
ospf.ppt
 
CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
 
Osp fv3 cs
Osp fv3 csOsp fv3 cs
Osp fv3 cs
 
Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocols
 
Networking interview questions
Networking interview questionsNetworking interview questions
Networking interview questions
 
Tcp
TcpTcp
Tcp
 
ch2_p3_ospf.pptx
ch2_p3_ospf.pptxch2_p3_ospf.pptx
ch2_p3_ospf.pptx
 
Ospfv3 primer
Ospfv3 primerOspfv3 primer
Ospfv3 primer
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01
 
ospf.ppt
ospf.pptospf.ppt
ospf.ppt
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
 
Chapter7ccna
Chapter7ccnaChapter7ccna
Chapter7ccna
 
Chapter7ccna
Chapter7ccnaChapter7ccna
Chapter7ccna
 

More from Iftach Ian Amit

Cyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLVCyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLV
Iftach Ian Amit
 
Devsecops at Cimpress
Devsecops at CimpressDevsecops at Cimpress
Devsecops at Cimpress
Iftach Ian Amit
 
BSidesTLV Closing Keynote
BSidesTLV Closing KeynoteBSidesTLV Closing Keynote
BSidesTLV Closing Keynote
Iftach Ian Amit
 
Social Media Risk Metrics
Social Media Risk MetricsSocial Media Risk Metrics
Social Media Risk Metrics
Iftach Ian Amit
 
ISTS12 Keynote
ISTS12 KeynoteISTS12 Keynote
ISTS12 Keynote
Iftach Ian Amit
 
From your Pocket to your Heart and Back
From your Pocket to your Heart and BackFrom your Pocket to your Heart and Back
From your Pocket to your Heart and Back
Iftach Ian Amit
 
Painting a Company Red and Blue
Painting a Company Red and BluePainting a Company Red and Blue
Painting a Company Red and Blue
Iftach Ian Amit
 
"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?Iftach Ian Amit
 
Armorizing applications
Armorizing applicationsArmorizing applications
Armorizing applications
Iftach Ian Amit
 
Seeing Red In Your Future?
Seeing Red In Your Future?Seeing Red In Your Future?
Seeing Red In Your Future?
Iftach Ian Amit
 
Hacking cyber-iamit
Hacking cyber-iamitHacking cyber-iamit
Hacking cyber-iamitIftach Ian Amit
 
Passwords good badugly181212-2
Passwords good badugly181212-2Passwords good badugly181212-2
Passwords good badugly181212-2Iftach Ian Amit
 
Cyber state
Cyber stateCyber state
Cyber state
Iftach Ian Amit
 
Advanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done itAdvanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done it
Iftach Ian Amit
 
Infecting Python Bytecode
Infecting Python BytecodeInfecting Python Bytecode
Infecting Python Bytecode
Iftach Ian Amit
 
Exploiting Second life
Exploiting Second lifeExploiting Second life
Exploiting Second life
Iftach Ian Amit
 
Cheating in Computer Games
Cheating in Computer GamesCheating in Computer Games
Cheating in Computer GamesIftach Ian Amit
 

More from Iftach Ian Amit (20)

Cyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLVCyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLV
 
Devsecops at Cimpress
Devsecops at CimpressDevsecops at Cimpress
Devsecops at Cimpress
 
BSidesTLV Closing Keynote
BSidesTLV Closing KeynoteBSidesTLV Closing Keynote
BSidesTLV Closing Keynote
 
Social Media Risk Metrics
Social Media Risk MetricsSocial Media Risk Metrics
Social Media Risk Metrics
 
ISTS12 Keynote
ISTS12 KeynoteISTS12 Keynote
ISTS12 Keynote
 
From your Pocket to your Heart and Back
From your Pocket to your Heart and BackFrom your Pocket to your Heart and Back
From your Pocket to your Heart and Back
 
Painting a Company Red and Blue
Painting a Company Red and BluePainting a Company Red and Blue
Painting a Company Red and Blue
 
"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?
 
Armorizing applications
Armorizing applicationsArmorizing applications
Armorizing applications
 
Seeing Red In Your Future?
Seeing Red In Your Future?Seeing Red In Your Future?
Seeing Red In Your Future?
 
Hacking cyber-iamit
Hacking cyber-iamitHacking cyber-iamit
Hacking cyber-iamit
 
Passwords good badugly181212-2
Passwords good badugly181212-2Passwords good badugly181212-2
Passwords good badugly181212-2
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Sexy defense
Sexy defenseSexy defense
Sexy defense
 
Cyber state
Cyber stateCyber state
Cyber state
 
Advanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done itAdvanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done it
 
Infecting Python Bytecode
Infecting Python BytecodeInfecting Python Bytecode
Infecting Python Bytecode
 
Exploiting Second life
Exploiting Second lifeExploiting Second life
Exploiting Second life
 
Dtmf phreaking
Dtmf phreakingDtmf phreaking
Dtmf phreaking
 
Cheating in Computer Games
Cheating in Computer GamesCheating in Computer Games
Cheating in Computer Games
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 

An intoroduction to the IS-IS IGP routing protocol

  • 1. IS-IS An introduction to IGP routing protocols Hagai Kahana
  • 2. Compass-EOS Confidential 156.10.24.1 16.55.42.10 57.13.29.2
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. IS-IS Common Header Compass-EOS Confidential Packet Data … Definition Values network layer identifier assigned to IS-IS (ISO 9577) 0x83 Length of the packet header fields in octets Variable Version 0x1 Indicates length of the source ID (SysID) field 0x0 -> 6 byte IS-IS packet type (3 bits reserved) Hello, LSP or SNP Version 0x1 Reserved 0 Number of area addresses permitted for this intermediate system’s area 0x0 = max 3 areas
  • 16.
  • 17.
  • 18.
  • 19. IIH – LAN Level 1 and Level 2 Compass-EOS Confidential Field Definition Circuit type Level 1, Level 1-2, or Level 2 only (6 bit reserved) Source ID System ID of the router that generated packet Holding time Maximum interval between two consecutive hello packets before the router is considered no longer available PDU length Length of the entire PDU, including header Priority designates the DIS (Level 1 or Level 2) on the LAN LAN ID SysID of the DIS plus an octet-long unique ID for this router assigned by the DIS. TLV fields Type 1 - Area Addresses Type 6 - IS Neighbors Type 8 - Padding Type 10 - Authentication Type
  • 20.
  • 21.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. Link state database Synchronization.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. SPF (short path first) calculation.
  • 35.
  • 36.
  • 37. Thank you Compass-EOS Confidential

Editor's Notes

  1. July 10, 2000
  2. July 10, 2000
  3. July 10, 2000
  4. July 10, 2000
  5. July 10, 2000
  6. July 10, 2000
  7. July 10, 2000
  8. July 10, 2000
  9. July 10, 2000
  10. July 10, 2000
  11. July 10, 2000
  12. July 10, 2000
  13. July 10, 2000
  14. July 10, 2000
  15. July 10, 2000
  16. July 10, 2000
  17. July 10, 2000
  18. July 10, 2000
  19. July 10, 2000
  20. In OSPF all timers must align with the DR (designated router) July 10, 2000
  21. Any change in network conditions causing changes in TLV information advertised in the most recent hello transmitted ID length in the IIH. This field indicates the length of the SysID and the SysID must be consistent on all routers across the domain Maximum number of areas. addresses supported in a single router configuration must match between adjacent neighbors, default maximum value of 3. July 10, 2000
  22. July 10, 2000
  23. POP - close collection of routers July 10, 2000
  24. POP - close collection of routers July 10, 2000
  25. If pseudo-node ID is 00 it means that this is a real router. Since IS-IS is on layer 2 there is no fragmentation service, do it is part of the IS-IS itself July 10, 2000
  26. If pseudo-node ID is 00 it means that this is a real router. Since IS-IS is on layer 2 there is no fragmentation service, do it is part of the IS-IS itself July 10, 2000
  27. July 10, 2000
  28. July 10, 2000
  29. July 10, 2000
  30. July 10, 2000
  31. July 10, 2000
  32. July 10, 2000
  33. Synchronizing DB and resulting routing tables is crucial for bringing packets closer to their destination. CSNP by default is sends every 10 seconds. Can be configured. CSNP can be more than one packet. Start and end LAN-ID is used to identify it: 0000.0000.0000.00-00 to ffff.ffff.ffff.ff-ff SRM – set on a link the corresponding LSP has to be sent out on that link. SSN – the corresponding LSP should be included in the next PSNP Behavior when CSNP reporting an older version of the LSP\\a more recent version of LSP\\ an unknown LSP July 10, 2000
  34. July 10, 2000
  35. July 10, 2000
  36. July 10, 2000
  37. TLV - Type Length Value Authentication is applied on the entire PDU July 10, 2000