SlideShare a Scribd company logo
IS-IS PROTOCOL ADJACENCY
www.netprotocolxpert.in
• There are three types adjacency in IS-IS Protocol.These are:
• – Level 1 routers form L1 adjacency with L1 and L1/2 Routers
– Level 2 routers form L2 adjacency with L2 and L1/2 Routers
– Level 1/2 routers form L1/2 adjacency with L1/2 Routers
• There is no neighbour ship between L1 and L2 routers.
• In IS-IS Protocol, adjacency is established with 3-way handshake mechanism.
There are three states in IS-IS adjacency. Let’s check the adjacency states of IS-IS
Protocol.
• In the first place the router adjacency is in Down State. One of the routers, here
Router A sends a Hello PDU. When the router B receive this Hello including the
MAC address of the sending node Router A, it goes to Initialize State and sends
Hello to Router A too. Again, when Router A receives Hello including the MAC
address of Router B, bidirectional communication established. And the name of
this state is Up State.
• As a summary:
• No IS-IS neighbour (Down State)
• RTRA Sends Hello (Initializing
State)
• RTRB records MAC address f
RTRA and Sends Hello too. RTRA
sees MAC address of RTRB.
Bidirectional communication
established (Up State)
IS-IS Protocol Operation
• Beginning with IS-IS adjacency establishment, to
the RoutingTable establishment, IS-IS Operation
has some steps.
We can summarize IS-IS operation in 6 steps.
These IS-IS operation steps are given below:
1. IS-IS Routers are send Hello PDUs to discover the neighbours and establish the
adjacency.
2. IS-IS adjacency is established ( mainly authentication, IS-type, MTU must
match)
3. LSPs are build by routers about their self and the learned adjacent routers
4. Routers send the LSPs to the adjacent routers.
5. All routers build their LSDB according to these LSPsBy SPF algorithm best
paths are calculated and routing table is build.
DIS (Designated IS)
• In ISIS network, LSDB databases must be syntonized. To do this, full mesh or
another solution is required. So, in IS-IS Protocol, one router is selected as DIS
(Designated IS)and DIS is used to reduce the adjacency in areas. It is like DR in
OSPF.
• Router with the highest priority and then the highest MAC address is elected as
DIS. The default DIS priority is 64. There is no BDR like OSPF. And like OSPF, if
you want to prevent the router to be DIS, you can set the priority 0. If a new router
added to the ISIS network, the election occurs again.This is not like this in OSPF.
IS-IS Protocol DIS Election
• DIS is used on multipoint-
to-multipoint topologies.
It is not used in point-to-
point topologies.
Separate DISs are
selected for Level 1 and
Level 2.
IS-IS Protocol NetworkTypes
• IS-IS Protocol supports two types of networks.These network are :
– Broadcast networks
– Point-to-Point networks
The other network types that is used in OSPF is not used in IS-IS Protocol.
• Different IIH Hellos are used for different network types while establishing
neighbour ship.
• In Broadcast networks IS-IS Protocol requires a full mesh topology. By selecting
DIS, full mesh is eliminated. DIS election is used in IS-IS broadcast networks.
IS-IS Cost
• Default IS-IS Protocol cost is 10 for all IS-IS Protocol links. But these costs can be
set to a different value per interface. For an interface, normally maximum 63 is
accepted as cost. But you an set this as 16,777,215 with the wide
metrics command.
Cost is advertised by the TLV fields in PDU.
Two routers can set different cost values to reach each other.
IS-IS Protocol Administrative Distance
• The administrative distance of all IS-IS routes are 115 for Cisco . But for Alcatel-
Lucent and Juniper, these administrative distance (preference) value is different.
Both vendor use four different value for both Level 1 and Level 2 routers and for
both internal and external routes.These are:
– IS-IS Level 1 internal route = 15
– IS-IS Level 2 internal route = 18
– IS-IS Level 1 external route = 160
– IS-IS Level 2 external route = 165
• If you want one route not to be used in the route calculation, you can set the the
administrative distance manually to 255.
IS-IS Protocol Authentication
• In IS-IS Protocol, by default there is no authentication. But you can set two types
of authentication.These authentications types are:
– Simple
– MD5
• With authentication in Hello packets, you can secure Hello Packets and it
determines whether a adjacency is established or not between these routers.
• With authentication in LSPs, it allows the remote router to read theTLV fields and
according to this information it does the SFP calculation.
IS-IS ProtocolTimers
• IS-IS Protocol has some timers like other routing protocols. In IS-IS Protocol,
modifying default timer settings is recommended because modifying these timers
make your IS-IS Protocol better.
These timers are given below:
– Lsp-refresh timer
– Max-lsp-lifetime
– Prc-interval
– Spf-interval
– Hello-interval
– Hello-multiplier
– Isis-retransmit-interval
– Csnp-interval
Follow Us On
https://www.facebook.com/Ne
tProtocolXpert/
https://www.linkedin.com/co
mpany/netprotocol-xpert
https://plus.google.com/u/0/c
ollection/AYQ-EB
https://www.instagram.com/n
etprotocol_xpert/
https://twitter.com/NPX_cisco
https://branded.me/netprotoc
olxpert

More Related Content

What's hot

Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD) Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD)
KHNOG
 
OSPF LSA Types Explained
OSPF LSA Types ExplainedOSPF LSA Types Explained
OSPF LSA Types Explained
Duane Bodle
 
VRRP (virtual router redundancy protocol)
VRRP (virtual router redundancy protocol)VRRP (virtual router redundancy protocol)
VRRP (virtual router redundancy protocol)
Netwax Lab
 
MPLS Concepts and Fundamentals
MPLS Concepts and FundamentalsMPLS Concepts and Fundamentals
MPLS Concepts and Fundamentals
Shawn Zandi
 
MENOG-Segment Routing Introduction
MENOG-Segment Routing IntroductionMENOG-Segment Routing Introduction
MENOG-Segment Routing Introduction
Rasoul Mesghali, CCIE RS
 
Mpls L3_vpn
Mpls L3_vpnMpls L3_vpn
Mpls L3_vpn
Reza Farahani
 
Ospf area types
Ospf area typesOspf area types
Ospf area types
Roger Perkin
 
Mpls
MplsMpls
ospf routing protocol
ospf routing protocolospf routing protocol
ospf routing protocol
Ameer Agel
 
MPLS Traffic Engineering
MPLS Traffic EngineeringMPLS Traffic Engineering
MPLS Traffic Engineering
APNIC
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
sarasanandam
 
Vpc notes
Vpc notesVpc notes
Vpc notes
Krunal Shah
 
BGP (border gateway routing protocol)
BGP (border gateway routing protocol)BGP (border gateway routing protocol)
BGP (border gateway routing protocol)
Netwax Lab
 
OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)
Ann Joseph
 
Comparing ospf vs isis
Comparing ospf vs isisComparing ospf vs isis
Comparing ospf vs isis
rushi7567
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
Unni Kannan VijayaKumar
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
Sourabh Goyal
 
MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)
Netwax Lab
 
Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010Febrian ‎
 

What's hot (20)

Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD) Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD)
 
OSPF LSA Types Explained
OSPF LSA Types ExplainedOSPF LSA Types Explained
OSPF LSA Types Explained
 
VRRP (virtual router redundancy protocol)
VRRP (virtual router redundancy protocol)VRRP (virtual router redundancy protocol)
VRRP (virtual router redundancy protocol)
 
MPLS Concepts and Fundamentals
MPLS Concepts and FundamentalsMPLS Concepts and Fundamentals
MPLS Concepts and Fundamentals
 
MENOG-Segment Routing Introduction
MENOG-Segment Routing IntroductionMENOG-Segment Routing Introduction
MENOG-Segment Routing Introduction
 
Mpls L3_vpn
Mpls L3_vpnMpls L3_vpn
Mpls L3_vpn
 
OSPF
OSPF OSPF
OSPF
 
Ospf area types
Ospf area typesOspf area types
Ospf area types
 
Mpls
MplsMpls
Mpls
 
ospf routing protocol
ospf routing protocolospf routing protocol
ospf routing protocol
 
MPLS Traffic Engineering
MPLS Traffic EngineeringMPLS Traffic Engineering
MPLS Traffic Engineering
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
Vpc notes
Vpc notesVpc notes
Vpc notes
 
BGP (border gateway routing protocol)
BGP (border gateway routing protocol)BGP (border gateway routing protocol)
BGP (border gateway routing protocol)
 
OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)
 
Comparing ospf vs isis
Comparing ospf vs isisComparing ospf vs isis
Comparing ospf vs isis
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)
 
Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010
 

Similar to IS-IS Protocol Adjacency

ISIS Routing Protocol for Network Engineers.pptx
ISIS Routing Protocol for Network Engineers.pptxISIS Routing Protocol for Network Engineers.pptx
ISIS Routing Protocol for Network Engineers.pptx
MohammadHamedHaidary
 
Allwyn ospf ppt
Allwyn ospf pptAllwyn ospf ppt
Allwyn ospf ppt
Allwyngeorge4
 
Day 8 1 introducing routing n
Day 8 1 introducing routing nDay 8 1 introducing routing n
Day 8 1 introducing routing n
CYBERINTELLIGENTS
 
Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocols
assinha
 
Network Layer Protocol.pptx
Network Layer Protocol.pptxNetwork Layer Protocol.pptx
Network Layer Protocol.pptx
SeekayAlaisKaruppaia
 
Dynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And BasicsDynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And Basics
Harsh Mehta
 
Osp fv3 cs
Osp fv3 csOsp fv3 cs
Osp fv3 cs
Fred Bovy
 
OSPF Overview
OSPF OverviewOSPF Overview
OSPF Overview
NetProtocol Xpert
 
Ospf
OspfOspf
Dynamic Routing Protocol OSPF
Dynamic Routing Protocol OSPFDynamic Routing Protocol OSPF
Dynamic Routing Protocol OSPF
Atakan ATAK
 
OSPF - Copie.pptx
OSPF - Copie.pptxOSPF - Copie.pptx
OSPF - Copie.pptx
MAROUANEAZZA3
 
Ospf Last Modified Eng
Ospf  Last Modified EngOspf  Last Modified Eng
Ospf Last Modified Eng
Alp isik
 
ODA000009 IS-IS Routing Protocol.ppt
ODA000009 IS-IS Routing Protocol.pptODA000009 IS-IS Routing Protocol.ppt
ODA000009 IS-IS Routing Protocol.ppt
marwan76
 
OSPF Configuration
OSPF ConfigurationOSPF Configuration
OSPF Configuration
NetProtocol Xpert
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocols
Online
 
1164 Routers
1164 Routers1164 Routers
1164 Routers
techbed
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44
Jisc
 

Similar to IS-IS Protocol Adjacency (20)

ISIS Routing Protocol for Network Engineers.pptx
ISIS Routing Protocol for Network Engineers.pptxISIS Routing Protocol for Network Engineers.pptx
ISIS Routing Protocol for Network Engineers.pptx
 
Allwyn ospf ppt
Allwyn ospf pptAllwyn ospf ppt
Allwyn ospf ppt
 
Day 8 1 introducing routing n
Day 8 1 introducing routing nDay 8 1 introducing routing n
Day 8 1 introducing routing n
 
Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocols
 
Network Layer Protocol.pptx
Network Layer Protocol.pptxNetwork Layer Protocol.pptx
Network Layer Protocol.pptx
 
ch2_p3_ospf.pptx
ch2_p3_ospf.pptxch2_p3_ospf.pptx
ch2_p3_ospf.pptx
 
Dynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And BasicsDynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And Basics
 
Osp fv3 cs
Osp fv3 csOsp fv3 cs
Osp fv3 cs
 
OSPF Overview
OSPF OverviewOSPF Overview
OSPF Overview
 
Ospf
OspfOspf
Ospf
 
Dynamic Routing Protocol OSPF
Dynamic Routing Protocol OSPFDynamic Routing Protocol OSPF
Dynamic Routing Protocol OSPF
 
OSPF - Copie.pptx
OSPF - Copie.pptxOSPF - Copie.pptx
OSPF - Copie.pptx
 
CCNA part 5 routing
CCNA part 5 routingCCNA part 5 routing
CCNA part 5 routing
 
Ospf Last Modified Eng
Ospf  Last Modified EngOspf  Last Modified Eng
Ospf Last Modified Eng
 
ODA000009 IS-IS Routing Protocol.ppt
ODA000009 IS-IS Routing Protocol.pptODA000009 IS-IS Routing Protocol.ppt
ODA000009 IS-IS Routing Protocol.ppt
 
OSPF Configuration
OSPF ConfigurationOSPF Configuration
OSPF Configuration
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocols
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
1164 Routers
1164 Routers1164 Routers
1164 Routers
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44
 

More from NetProtocol Xpert

Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)
NetProtocol Xpert
 
MPLS Layer 3 VPN
MPLS Layer 3 VPN MPLS Layer 3 VPN
MPLS Layer 3 VPN
NetProtocol Xpert
 
Common Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & MitigationCommon Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & Mitigation
NetProtocol Xpert
 
Storm-Control
Storm-ControlStorm-Control
Storm-Control
NetProtocol Xpert
 
Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)
NetProtocol Xpert
 
IP Source Guard
IP Source Guard IP Source Guard
IP Source Guard
NetProtocol Xpert
 
DHCP Snooping
DHCP SnoopingDHCP Snooping
DHCP Snooping
NetProtocol Xpert
 
Password Recovery
Password RecoveryPassword Recovery
Password Recovery
NetProtocol Xpert
 
Application & Data Center
Application & Data CenterApplication & Data Center
Application & Data Center
NetProtocol Xpert
 
Cisco ISR 4351 Router
Cisco ISR 4351 RouterCisco ISR 4351 Router
Cisco ISR 4351 Router
NetProtocol Xpert
 
Cisco ASR 1001-X Router
Cisco ASR 1001-X RouterCisco ASR 1001-X Router
Cisco ASR 1001-X Router
NetProtocol Xpert
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
NetProtocol Xpert
 
Point to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAPPoint to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAP
NetProtocol Xpert
 
Avoid DNS lookup when mistyping a command
Avoid DNS lookup when mistyping a commandAvoid DNS lookup when mistyping a command
Avoid DNS lookup when mistyping a command
NetProtocol Xpert
 
TCLSH and Macro Ping Test on Cisco Routers and Switches
TCLSH and Macro Ping Test on Cisco Routers and SwitchesTCLSH and Macro Ping Test on Cisco Routers and Switches
TCLSH and Macro Ping Test on Cisco Routers and Switches
NetProtocol Xpert
 
Private VLANs
Private VLANsPrivate VLANs
Private VLANs
NetProtocol Xpert
 
MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)
NetProtocol Xpert
 
OTV Configuration
OTV ConfigurationOTV Configuration
OTV Configuration
NetProtocol Xpert
 
Cisco OTV 
Cisco OTV Cisco OTV 
Cisco OTV 
NetProtocol Xpert
 
OTV(Overlay Transport Virtualization)
OTV(Overlay  Transport  Virtualization)OTV(Overlay  Transport  Virtualization)
OTV(Overlay Transport Virtualization)
NetProtocol Xpert
 

More from NetProtocol Xpert (20)

Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)
 
MPLS Layer 3 VPN
MPLS Layer 3 VPN MPLS Layer 3 VPN
MPLS Layer 3 VPN
 
Common Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & MitigationCommon Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & Mitigation
 
Storm-Control
Storm-ControlStorm-Control
Storm-Control
 
Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)
 
IP Source Guard
IP Source Guard IP Source Guard
IP Source Guard
 
DHCP Snooping
DHCP SnoopingDHCP Snooping
DHCP Snooping
 
Password Recovery
Password RecoveryPassword Recovery
Password Recovery
 
Application & Data Center
Application & Data CenterApplication & Data Center
Application & Data Center
 
Cisco ISR 4351 Router
Cisco ISR 4351 RouterCisco ISR 4351 Router
Cisco ISR 4351 Router
 
Cisco ASR 1001-X Router
Cisco ASR 1001-X RouterCisco ASR 1001-X Router
Cisco ASR 1001-X Router
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
 
Point to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAPPoint to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAP
 
Avoid DNS lookup when mistyping a command
Avoid DNS lookup when mistyping a commandAvoid DNS lookup when mistyping a command
Avoid DNS lookup when mistyping a command
 
TCLSH and Macro Ping Test on Cisco Routers and Switches
TCLSH and Macro Ping Test on Cisco Routers and SwitchesTCLSH and Macro Ping Test on Cisco Routers and Switches
TCLSH and Macro Ping Test on Cisco Routers and Switches
 
Private VLANs
Private VLANsPrivate VLANs
Private VLANs
 
MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)
 
OTV Configuration
OTV ConfigurationOTV Configuration
OTV Configuration
 
Cisco OTV 
Cisco OTV Cisco OTV 
Cisco OTV 
 
OTV(Overlay Transport Virtualization)
OTV(Overlay  Transport  Virtualization)OTV(Overlay  Transport  Virtualization)
OTV(Overlay Transport Virtualization)
 

Recently uploaded

Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Recently uploaded (20)

Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 

IS-IS Protocol Adjacency

  • 2. • There are three types adjacency in IS-IS Protocol.These are: • – Level 1 routers form L1 adjacency with L1 and L1/2 Routers – Level 2 routers form L2 adjacency with L2 and L1/2 Routers – Level 1/2 routers form L1/2 adjacency with L1/2 Routers
  • 3. • There is no neighbour ship between L1 and L2 routers. • In IS-IS Protocol, adjacency is established with 3-way handshake mechanism. There are three states in IS-IS adjacency. Let’s check the adjacency states of IS-IS Protocol. • In the first place the router adjacency is in Down State. One of the routers, here Router A sends a Hello PDU. When the router B receive this Hello including the MAC address of the sending node Router A, it goes to Initialize State and sends Hello to Router A too. Again, when Router A receives Hello including the MAC address of Router B, bidirectional communication established. And the name of this state is Up State.
  • 4. • As a summary: • No IS-IS neighbour (Down State) • RTRA Sends Hello (Initializing State) • RTRB records MAC address f RTRA and Sends Hello too. RTRA sees MAC address of RTRB. Bidirectional communication established (Up State)
  • 5. IS-IS Protocol Operation • Beginning with IS-IS adjacency establishment, to the RoutingTable establishment, IS-IS Operation has some steps.
  • 6. We can summarize IS-IS operation in 6 steps. These IS-IS operation steps are given below: 1. IS-IS Routers are send Hello PDUs to discover the neighbours and establish the adjacency. 2. IS-IS adjacency is established ( mainly authentication, IS-type, MTU must match) 3. LSPs are build by routers about their self and the learned adjacent routers 4. Routers send the LSPs to the adjacent routers. 5. All routers build their LSDB according to these LSPsBy SPF algorithm best paths are calculated and routing table is build.
  • 7. DIS (Designated IS) • In ISIS network, LSDB databases must be syntonized. To do this, full mesh or another solution is required. So, in IS-IS Protocol, one router is selected as DIS (Designated IS)and DIS is used to reduce the adjacency in areas. It is like DR in OSPF. • Router with the highest priority and then the highest MAC address is elected as DIS. The default DIS priority is 64. There is no BDR like OSPF. And like OSPF, if you want to prevent the router to be DIS, you can set the priority 0. If a new router added to the ISIS network, the election occurs again.This is not like this in OSPF.
  • 8. IS-IS Protocol DIS Election • DIS is used on multipoint- to-multipoint topologies. It is not used in point-to- point topologies. Separate DISs are selected for Level 1 and Level 2.
  • 9. IS-IS Protocol NetworkTypes • IS-IS Protocol supports two types of networks.These network are : – Broadcast networks – Point-to-Point networks The other network types that is used in OSPF is not used in IS-IS Protocol. • Different IIH Hellos are used for different network types while establishing neighbour ship. • In Broadcast networks IS-IS Protocol requires a full mesh topology. By selecting DIS, full mesh is eliminated. DIS election is used in IS-IS broadcast networks.
  • 10. IS-IS Cost • Default IS-IS Protocol cost is 10 for all IS-IS Protocol links. But these costs can be set to a different value per interface. For an interface, normally maximum 63 is accepted as cost. But you an set this as 16,777,215 with the wide metrics command. Cost is advertised by the TLV fields in PDU. Two routers can set different cost values to reach each other.
  • 11. IS-IS Protocol Administrative Distance • The administrative distance of all IS-IS routes are 115 for Cisco . But for Alcatel- Lucent and Juniper, these administrative distance (preference) value is different. Both vendor use four different value for both Level 1 and Level 2 routers and for both internal and external routes.These are: – IS-IS Level 1 internal route = 15 – IS-IS Level 2 internal route = 18 – IS-IS Level 1 external route = 160 – IS-IS Level 2 external route = 165 • If you want one route not to be used in the route calculation, you can set the the administrative distance manually to 255.
  • 12. IS-IS Protocol Authentication • In IS-IS Protocol, by default there is no authentication. But you can set two types of authentication.These authentications types are: – Simple – MD5 • With authentication in Hello packets, you can secure Hello Packets and it determines whether a adjacency is established or not between these routers. • With authentication in LSPs, it allows the remote router to read theTLV fields and according to this information it does the SFP calculation.
  • 13. IS-IS ProtocolTimers • IS-IS Protocol has some timers like other routing protocols. In IS-IS Protocol, modifying default timer settings is recommended because modifying these timers make your IS-IS Protocol better. These timers are given below: – Lsp-refresh timer – Max-lsp-lifetime – Prc-interval – Spf-interval – Hello-interval – Hello-multiplier – Isis-retransmit-interval – Csnp-interval