Introduction to Link State Protocols



Similar documents
Introduction to ISIS. ISP/IXP Workshops

GregSowell.com. Mikrotik Routing

Link-State Routing Protocols

OSPF Routing Protocol

Route Discovery Protocols

OSPF Version 2 (RFC 2328) Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs).

Chapter 10 Link-State Routing Protocols

Textbook Required: Cisco Networking Academy Program CCNP: Building Scalable Internetworks v5.0 Lab Manual.

Routing Protocols OSPF CHAPTER. The following topics describe supported routing protocols. Topics include OSPF, page 9-1 IS-IS Protocol, page 9-3

Example: Advertised Distance (AD) Example: Feasible Distance (FD) Example: Successor and Feasible Successor Example: Successor and Feasible Successor

IP Routing: ISIS Configuration Guide, Cisco IOS Release 12.4T

CCNA 2 v5.0 Routing Protocols Final Exam Answers

Using OSPF in an MPLS VPN Environment

Introduction to TCP/IP

Router and Routing Basics

Layer 3 Routing User s Manual

Routing with OSPF. Introduction

OSPF Configuring Multi-Area OSPF

Interconnecting Multiple OSPF Areas

Cisco CCNP Optimizing Converged Cisco Networks (ONT)

IP Routing Configuring RIP, OSPF, BGP, and PBR

Introduction to Dynamic Routing Protocols

ITRI CCL. IP Routing Primer. Paul C. Huang, Ph.D. ITRI / CCL / N300. CCL/N300; Paul Huang 1999/6/2 1

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)

Integrated IS-IS Design and Deployment Guide

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing

Internetworking and Internet-1. Global Addresses

Based on Computer Networking, 4 th Edition by Kurose and Ross

Using the Border Gateway Protocol for Interdomain Routing

The Complete IS-IS Routing Protocol

CCNA2 Chapter 11 Practice

KT The Value Networking Company

Border Gateway Protocol (BGP)

Monitoring Routing. Monitoring OSPF LSAs. Type 1 CHAPTER

Chapter 4. Distance Vector Routing Protocols

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur

GregSowell.com. Intro to Networking Mikrotik/Cisco

Deploying OSPF for ISPs. OSPF Design. Agenda. Service Providers. SP Architecture. SP Architecture. OSPF Design in SP Networks

Networking. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Routing Protocols. Interconnected ASes. Hierarchical Routing. Hierarchical Routing

Cisco s OSPF Implementation P1C-107

Route Optimization. rek Petr Grygarek, VSB-TU Ostrava, Routed and Switched Networks 1

Advanced Networking Routing: RIP, OSPF, Hierarchical routing, BGP

Border Gateway Protocol (BGP-4)

ISIS for ISPs. ISP/IXP Workshops

Understanding Route Redistribution & Filtering

CSC458 Lecture 6. Homework #1 Grades. Inter-domain Routing IP Addressing. Administrivia. Midterm will Cover Following Topics

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

6.263 Data Communication Networks

Interconnecting Cisco Networking Devices Part 2

Administrative Distance

APNIC elearning: BGP Basics. Contact: erou03_v1.0

Outline. Internet Routing. Alleviating the Problem. DV Algorithm. Routing Information Protocol (RIP) Link State Routing. Routing algorithms

: Interconnecting Cisco Networking Devices Part 2 v1.1

O /27 [110/129] via , 00:00:05, Serial0/0/1

CS 348: Computer Networks. - IP addressing; 21 st Aug Instructor: Sridhar Iyer IIT Bombay

Advanced IP Addressing

Introduction to LAN/WAN. Network Layer

BGP Best Path Selection Algorithm

Advanced Routing. FortiOS Handbook v3 for FortiOS 4.0 MR3

WHITE PAPER. Understanding IP Addressing: Everything You Ever Wanted To Know

ZXR /5200 Series

IP Addressing A Simplified Tutorial

Distance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh

Configuring a Gateway of Last Resort Using IP Commands

CCNP CISCO CERTIFIED NETWORK PROFESSIONAL LAB MANUAL

How To Understand Bg

BGP Terminology, Concepts, and Operation. Chapter , Cisco Systems, Inc. All rights reserved. Cisco Public

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:

Interconnecting Cisco Network Devices 1 Course, Class Outline

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Introduction to LAN/WAN. Network Layer (part II)

COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking

How To Learn Cisco Cisco Ios And Cisco Vlan

CSE331: Introduction to Networks and Security. Lecture 8 Fall 2006

Internet Addresses (You should read Chapter 4 in Forouzan)

Computer Networks. Main Functions

Classful IP Addressing (cont.)

Evaluation And Implementation Of The Open Shortest Path First (OSPF) Routing Protocol

BGP: Border Gateway Protocol

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Inter-domain Routing. Outline. Border Gateway Protocol

Lecture 12: Link-state Routing"

VLSM and CIDR Malin Bornhager Halmstad University

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

OSI IS-IS Intra-domain Routing Protocol

Transitioning to BGP. ISP Workshops. Last updated 24 April 2013

Internet Control Message Protocol (ICMP)

Computer Network Foundation. Chun-Jen (James) Chung. Arizona State University

Border Gateway Protocol BGP4 (2)

Understanding Virtual Router and Virtual Systems

Switching Basics and Intermediate Routing CCNA 3 Labs and Study Guide Allan Johnson

Routing Protocols (RIP, OSPF, BGP)

Transcription:

1 Introduction to Link State Protocols Session Scott Sturgess scsturge@cisco.com 2

Agenda Overview of Link State Protocols Concepts in Link State Protocols The Dijkstra Algorithm Link State Concepts Comparison Addressing Packet Types Areas and Levels Adjacencies and Flooding Further Reading 3 Overview of Link State Protocols 4

Why Is It Called a Link State Protocol? Traditional Distance Vector Routing Protocols (DVRP) relay information regarding their relative distance to a destination Link State Protocols relay specific link characteristics and state information Only changes or updates are sent across the network Each router uses that information to build a routing table on it s own 5 Link-State vs. Distance Vector Protocols Link-State router tells ALL other routers about ONLY its neighbors and links Distance Vector router tells ONLY neighbors about ALL routes 6

Link-State vs. Distance Vector Protocols In Link-State protocols Update and Decision processes are independent With Distance Vector protocols a router can't send out new vectors until it has processed them Link-State are fast loop-free convergence protocols 7 What Is a Link State Protocol? The network can be viewed as a jigsaw puzzle Each piece of the puzzle holds one router Each router creates a Link State Packet (LSP) which represents its own jigsaw piece LSPs are flooded reliably within the network The LSPs are collected by each router to form a Link State Database (LSDB) or complete picture of the network Use Shortest Path First (SPF) algorithm to put the pieces together 8

Link State Protocols LSP A to B to A LSP B to C to E to A to B to E to D to A LSP E to C to D to B LSP C to D to C LSP D 9 All Routers Have the Same View All routers exchange all LSPs Via a reliable flooding mechanism All routers store all LSPs in a link-state database (LSDB) Separate from the routing table (RIB) All routers should have exactly the same LSDB, but different RIBs 10

All Routers Have the Same LSDB Router - LSPDB LSPB LSPA LSPE LSPD LSPC Router C - LSPDB LSPB LSPA Router - LSPDB LSPB LSPA LSPE LSPD LSPC Router - LSPDB LSPB LSPA LSPE LSPD LSPC Router D - LSPDB LSPB LSPA LSPE LSPE LSPC LSPD LSPC LSPD 11 Only Keep Track of Own State Routers keep track of their own state Send hello s to detect neighbors Keep track of IP addresses interface IP prefixes redistributed IP routes inter-area IP prefixes etc. 12

When to Send an Update? A router only sends a new version of its LSP when there is a change if no changes, then periodic refreshes a new version of an LSP will overwrite the old version of that LSP in LSDB no partial updates, complete LSP sent 13 What To Do With LSPs? Each router calculates a topology map by executing Dijkstra s Shortest Path First algorithm (SPF) the topology is calculated as a Shortest Path Tree (SPT), with itself as root each router computes a different Shortest Path Tree (SPT) From the SPT the RIBs are calculated 14

Advantages of a Link State Protocol Uses metrics (costs) to calculate path Typically displays faster convergence than distance vector routing protocols Typically more scalable due to hierarchical nature 15 Disadvantages of a Link State Protocol Require more memory to store state information, i.e. databases Increased complexity in designing networks 16

Concepts in Link State Protocols 17 Metrics Each link (interface) is assigned a cost Relevant to the outbound interface Routers advertise the cost of their links in an LSP(s) Numeric value that can be assigned or calculated using link characteristics Metric = path cost More flexible than hops used in DVRPs 18

Topology/Link State Database The Link State Database (LSDB) contains information regarding all links and routers within a logical area A router has a separate LSDB for each area to which it belongs All routers belonging to the same area have identical databases SPF calculation is performed separately for each area 19 Neighbor Discovery: Hello Protocol Hello packets are used to acquire and maintain neighbor adjacencies Hello packets ensure that neighbors belong to the same logical subnet, same area, or contain the correct authentication information Dead intervals are used to detect when neighbors are no longer present 20

Building Adjacencies Routers participating in a Link State Protocol are uniquely identified throughout the network with a router ID (some form of address) Link state protocol routers discover their adjacent neighbors with some form of Hello protocol Once discovered neighbors form a relationship to exchange/synchronize LSDB information between them 21 Building the Database Hello packets discover neighbors Once neighbors are discovered LSDB information is exchanged A Hello, I m B Hello, I m A Let s exchange information OK I know about these links I know about these links B 22

Synchronizing the Database Routers exchange lists describing the information they know Routers request specific information from their neighbor about things they do not know based on the received list Reception of new information is reliably acknowledged 23 Logical Hierarchy Link State Protocols deploy a logical hierarchy in their design Usually consists of the concept of a backbone level and another sub-level OSPF: Backbone area (area 0), regular areas IS-IS: L2 Backbone areas, L1 areas Enables scalability by Allowing summarization Providing a level of abstraction 24

Not Summarized: Specific Links 1.1.1.0 1.1.2.0 1.1.3.0 1.1.4.0 1.1.1.0 Token Ring 1.1.4.0 Token Ring 1.1.2.0 1.1.3.0 2.2.1.0 2.2.2.0 2.2.3.0 2.2.1.0 Backbone Area 0 Token Ring 2.2.2.0 Token Ring 2.2.3.0 3.3.1.0 Token Ring 3.3.3.0 3.3.4.0 3.3.1.0 3.3.2.0 3.3.3.0 3.3.4.0 Token Ring 3.3.4.0 25 Summarized: Summary Links 1.1.1.0 1.1.2.0 1.1.3.0 1.1.4.0 1.1.1.0 Token Ring 1.1.4.0 Token Ring 1.1.2.0 1.1.3.0 Backbone 1.0.0.0 Area 0 3.0.0.0 2.0.0.0 2.2.1.0 2.2.2.0 2.2.3.0 2.2.1.0 Token Ring 2.2.3.0 3.3.1.0 Token Ring 3.3.3.0 3.3.4.0 3.3.1.0 3.3.2.0 3.3.3.0 3.3.4.0 Token Ring 3.3.4.0 Token Ring 2.2.2.0 Only summary LSA advertised out Link-state changes do not propagate 26

Flooding Information that changes or is learned from a neighbor is flooded across a logical network area This is done to maintain consistency of the LSDB across all routers Flooding of Link State Packets (LSP) are usually contained within an area 27 Flooding LAN LAN!!! 28

The DijkstraAlgorithm 29 Shortest Path First algorithm We maintain three lists UNKNOWN list: all nodes start on this list TENTative list: PATHS list: all nodes to which a path has been found which is not yet known to be minimum cost. Also called candidate list all nodes to which we have calculated final paths with definitive cost Also called known list 30

Shortest Path First algorithm We execute N steps typically N is the number of nodes in the network. During each step we find the path(s) to one node from root. We initialise the computation by moving ourselves to the TENT list 31 Shortest Path First algorithm At each step: Find the node amongst all nodes on TENT that has the lowest cost, and move it from TENT into PATHS Find all neighbours reachable from that node and move them into TENT Find all prefixes advertised by the node that was moved to PATHS and install them in the RIB 32

Shortest Path First algorithm Two Way Connectivity Check (TWCC) Before moving a node into TENT, we want to be sure the parent has the same visibility than its child The node we want to move to TENT has to report the adjacency back to its parent 33 Finding the next-hop Special actions If a node is directly connected to us, search the first-hop info in the adjacency database If a node is not directly connected to us, copy the first-hop info from the parent(s) For each node on TENT, maintain the cost to get there from the root, and the firsthop info 34

An Example Network Unknown Paths 5 G 4 F 2 12 12 E 8 B 3 3 4 C D 3 7 3 S2 S3 S1 A S0 35 The Link-State Database LSP F IS: 4 E IS: 2 C IS: 5 G LSP E IS: 8 B IS: 4 F LSP G IS: 5 F IS: 12 D IS: 12 C LSP D IS: 3 A IS: 3 C IS: 12 G LSP B IS: 3 A IS: 4 A IS: 3 C IS: 8 E LSP C IS: 7 A IS: 3 D IS: 3 B IS: 2 F IS: 12 G LSP A IS: 3 B IS: 4 B IS: 7 C IS: 3 D 36

Adjacency Database (Router-A) Neighbor Interface Cost B serial0 3 B serial1 4 C serial2 7 D serial3 3 37 Shortest Path First Example Initial situation TENT: A PATHS: empty Unknown: B C D E F G 38

Shortest Path First Example First iteration Move A (ourself) to PATHS with cost 0 Move neighbors of A to TENT: B, C, D Note that TWCC succeeds since B, C, D reports an adjacency to A Find first-hop info in adjacency database TENT: D cost 3 via S3, [lowest cost] C cost 7 via S2, B cost 3 via S0 [lowest cost] PATHS: Unknown: A E F G 39 PATHS and TENT: 1 st Iteration Unknown Paths 5 G 4 F 2 12 12 Unknown TENT E 8 B 3 4 3 C 3 7 3 S2 S1 A S0 S3 D PATHS 40

Shortest Path First Example Second iteration Move D (lowest cost in TENT) to PATHS with cost 3 and insert in RIB its prefixes Move neighbors of D to TENT: G, found better path to C, ignore A TENT: C cost 6 via S3, B cost 3 via S0, [lowest cost] G cost 15 via S3 PATHS:A, D cost 3 via S3 Unknown: E F 41 PATHS and TENT: 2 nd Interation Unknown Paths Known Paths 4 F 2 5 12 G 12 Unknown TENT E 8 B 3 3 4 C 3 7 3 S2 S1 A S0 S3 D PATHS 42

Shortest Path First Example Third iteration Move B to PATHS with cost 3 and insert in RIB its prefixes Move neighbors of B to TENT: E, found equal cost path to C, ignore A TENT: C cost 6 via S3 & S0 [lowest cost] G cost 15 via S3, E cost 11 via S0 PATHS:A, D cost 3 via S3, B cost 3 via S0 Unknown: F 43 PATHS and TENT: 3 rd Iteration Unknown Paths Known Paths 4 F 2 5 12 G 12 Unknown TENT E 8 B 3 3 4 C 3 7 3 S2 S1 A S0 S3 D PATHS 44

Shortest Path First Example Fourth iteration Move C to PATHS with cost 6 and insert in RIB its prefixes Move neighbors of C to TENT: F, ignore G, ignore B, ignore D, ignore A TENT: G cost 15 via S3, E cost 11 via S0, F cost 8 via S3 & S0 [lowest cost] PATHS:A, D cost 3 via S3, B cost 3 via S0, C cost 6 via S3 & S0 Unknown: 45 PATHS and TENT: 4 th Interation Unknown Paths Known Paths 4 F 2 5 12 G 12 Unknown TENT E 8 B 3 3 4 C 3 7 3 S2 S1 A S0 S3 D PATHS 46

Shortest Path First Example Fifth iteration Move F to PATHS with cost 8 and insert in RIB its prefixes Move neighbors of F to TENT: Better path to G, ignore C, ignore E TENT: G cost 13 via S3 & S0, E cost 11 via S0 [lowest cost] PATHS:A, D cost 3 via S3, B cost 3 via S0, C cost 6 via S3 & S0, F cost 8 via S3 & S0 Unknown: 47 PATHS and TENT: 5 th Iteration Unknown Paths Known Paths 4 F 2 5 12 G 12 Unknown TENT E 8 B 3 3 4 C 3 7 3 S2 S1 A S0 S3 D PATHS 48

Shortest Path First Example Sixth iteration Move E to PATHS with cost 11 and insert in RIB its prefixes Move neighbors of E to TENT: Ignore B, ignore F TENT: G cost 13 via S3 & S0 [last entry] PATHS:A, D cost 3 via S3, B cost 3 via S0, C cost 6 via S3 & S0, F cost 8 via S3 & S0, E cost 11 via S0 Unknown: 49 PATHS and TENT Unknown Paths Known Paths 4 F 2 5 12 G 12 Unknown TENT E 8 B 3 3 4 C 3 7 3 S2 S1 A S0 S3 D PATHS 50

Shortest Path First Example Seventh iteration Move G to PATHS with cost 13 and insert in RIB its prefixes Move neighbors of G to TENT: Ignore F, ignore C, ignore D TENT: EMPTY!!! PATHS:A, D cost 3 via S3, B cost 3 via S0, C cost 6 via S3 & S0, F cost 8 via S3 & S0, E cost 11 via S0 G cost 13 via S3 & S0 Unknown: 51 PATHS and TENT Unknown Paths Known Paths 4 F 2 5 12 G 12 Unknown TENT E 8 B 3 3 4 C 3 7 3 S2 S1 A S0 S3 D PATHS 52

Shortest Path First Example TENT is empty => iteration stops Result: A, D cost 3 via S3, B cost 3 via S0, C cost 6 via S3 & S0, F cost 8 via S3 & S0, E cost 11 via S0, G cost 13 via S3 & S0 53 Shortest Path First Example The Shortest Path Tree Not all links are used (dotted links) Still if a change occurs in one of these unused links, the full SPF algorithm needs to be re -run G Cost: 13, NH: D F Cost: 8, NH: D, B E Cost: 11, NH: B C Cost: 6, NH: D, B D Cost: 3, NH: D B Cost: 3, NH: B S1 S2 S3 S0 A Cost: 0, NH: -- 54

When a Link Changes State Router 1 LSP Router 2 ACK Link State Table Every router in area receives the new LSP via flooding Each router computes shortest path routing table Old Routing Table Dijkstra Algorithm New Routing Table 55 Link State Concepts Comparison 56

What Is IS-IS? Intermediate System to Intermediate System An IS is ISO terminology for a router IS-IS was originally designed for use as a dynamic routing protocol for ISO CLNP, defined in the ISO 10589 standard Later adapted to carry IP prefixes in addition to CLNP (known as Integrated or Dual IS-IS) as described in RFC 1195 Predominantly used in ISP environment 57 IS-IS Timeline 1978ish New Arpanet Algorithm Eric Rosen et al 1986 to 90 Decnet Phase V Radia Perlman, Mike Shand 1987 ISO 10589 (IS-IS) Dave Oran 1990 RFC 1195 (Integrated IS-IS) Ross Callon, Chris Gunner 1990 to present All sorts of enhancements Everyone and his dog! 58

What Is OSPF? Open Shortest Path First Link State Protocol using the Shortest Path First algorithm (Dijkstra) to calculate loopfree routes Used purely within the TCP/IP environment Designed to respond quickly to topology changes but using minimal protocol traffic Used in both Enterprise and ISP Environment 59 OSPF Timeline Development began in 1987 by IETF OSPF v1 published in 1989 with RFC 1131 OSPFv2 published in 1991 with RFC 1247 Further enhancements to OSPFv2 in 1994 with RFC 1583 Latest revision for OSPFv2 was in 1998 with RFC 2328 All above OSPF RFCs authored by John Moy 60

IS-IS & OSPF: Similarities Both are Interior Gateway Protocols (IGP) They distribute routing information between routers belonging to a single Autonomous System (AS) With support for: Classless Inter-Domain Routing (CIDR) Variable Subnet Length Masking (VLSM) Authentication Multi-path IP unnumbered links 61 IS-IS and OSPF Terminology OSPF Host Router Link Packet Designated router (DR) Backup DR (BDR) Link-State Advertisement (LSA) Hello packet Database Description (DBD) ISIS End System (ES) Intermediate System (IS) Circuit Protocol Data Unit (PDU) Designated IS (DIS) N/A (no BDIS is used) Link-State PDU (LSP) IIH PDU Complete sequence number PDU (CSNP) 62

IS-IS and OSPF Terminology (Cont.) OSPF Area Non-backbone area Backbone area Area Border Router (ABR) Autonomous System Boundary Router (ASBR) ISIS Sub domain (area) Level-1 area Level-2 Sub domain (backbone) L1L2 router Any IS 63 Addressing 64

Transport OSPF uses IP Protocol 89 as transport Data Link Header IP Header OSPF Header OSPF Data IS-IS is directly encapsulated in Layer 2 Data Link Header IS-IS Header IS-IS Data 65 IS-IS: Basic CLNS NSAP Format NSAP: Network Service Access Point An NSAP mainly consists of 3 parts: Area Address System ID PN-ID Variable Length 6 Bytes (fixed) 1 Byte Total length is between 8 and 20 bytes Example: 49.01.0000.0000.0007.00 Area. System ID. Pseudonode ID 66

OSPF: Router ID Makes use of IPv4 addressing Routers are identified by a unique ID Router ID can be assigned automatically or manually configured router-id <ip address> RID: Highest IP address from any loopbacks RID: If no loopback exists, highest IP address configured to a physical interface Router ID used to build the SPT 67 Packet Types 68

OSPF Protocol Packets Share a common protocol header Routing protocol packets are sent with type of service (TOS) of 0 Five types of OSPF routing protocol packets Hello - packet type 1 Database description - packet type 2 Link-state request - packet type 3 Link-state update - packet type 4 Link-state acknowledgement - packet type 5 69 Types of LSAs Router link (LSA type 1) Network link (LSA type 2) Network summary (LSA type 3) ASBR summary (LSA type 4) External (LSA type 5) NSSA external (LSA type 7) 70

IS-IS PDUs Hello PDUs (IIH, ISH, ESH) Link State Packet (LSP) Non-pseudonode LSP Pseudonode LSPs Complete Sequence Number PDU Partial Sequence Number PDU 71 Node and Pseudonode LSP 2 kinds of Link State PDUs Non-Pseudonodes represent routers Pseudonodes represents LANs (created by the DIS) Level 1 routers create Level 1 LSP Level 2 routers create Level 2 LSP Level 1 2 routers create Level 1 LSP and Level 2 LSP 72

Areas and Levels 73 Hierarchy Levels Both IS-IS and OSPF Have a 2 Layer Hierarchy IS-IS: The backbone (level-2 domain) The areas (level-1) OSPF The backbone (Area 0) The areas 74

IS-IS: Level-1 Routers Level-1 Router Neighbors only in the same Level-1 area Level-1 LSDB with intra-area information Level-1 only routers look at the attached-bit to find the closest Level-1-2 router Level-1 only routers install a default route to the closest Level-1-2 router in the area 75 IS-IS: Level-2 Routers May have neighbours in other areas L2 has information about L2 topology L2 has information about which L1 areas are reachable and how to reach them via the L2 topology L2 routers often do also L1 routing so called L1L2 routers 76

Level-1, Level-2 and Level-1-2 Routers Backbone MUST BE L2 contiguous Area-2 L1L2 L1-only L1L2 L1L2 L1-only L1L2 L1L2 Area-3 L2-only Area-4 Area-1 L1L2 L1L2 L1-only L1-only L1L2 77 OSPF Areas Group of contiguous hosts and networks Per area topological database Invisible outside the area Reduction in routing traffic Backbone area contiguous All other areas must be connected to the backbone Virtual Links Area 2 Area 3 Area 4 Area 0 Backbone Area Area 1 78

Classification of Routers IR Area 2 Area 3 To other AS ASBR Area 1 ABR/BR Area 0 IR/BR Internal Router (IR) Area Border Router (ABR) Backbone Router (BR) Autonomous System Border Router (ASBR) 79 OSPF Route Types Area 2 Area 3 To other AS ASBR Area 1 ABR Area 0 Intra-area Route all routes inside an area Inter-area Route routes advertised from one area to another by an Area Border Router External Route routes imported into OSPF from other protocol or static routes 80

Adjacencies and Flooding 81 Discovering Neighbors: Hello Protocol Both IS-IS and OSPF use a Hello mechanism for discovering neighbors and maintaining adjacencies IS-IS uses the following defaults: Hello Interval: Hold Time: 10 seconds 30 seconds OSPF uses the following defaults: Hello Interval Dead Interval 10 seconds 40 seconds 82

The Hello Protocol Responsible for establishing and maintaining neighbour relationships Elects designated router on multi-access networks Hello Hello FDDI Dual Ring Hello 83 OSPF: Hello Packets Router priority Hello interval Router dead interval Hello Network mask Options: TOS-bit List of neighbours Hello FDDI Dual Ring Hello Multicast to 224.0.0.5 84

IS-IS: Hello Packets IIHs are between routers Exchanged by IS to form adjacencies Point-to-point IIH Level 1 LAN IIH Level 2 LAN IIH 85 IS-IS L1 Neighborship 49.0000.0000.1234.5678.1234.00 49.0000.0000.1234.5678.5678.00 L1 Neighborship because the area is the same L2 Neighborship possible (but not always needed) When Area-ID is the same between neighbors a L1 or L2 neighborship is possible 86

IS-IS L2 Neighborship 49.0000.0001.1234.5678.1234.00 49.0000.0000.1234.5678.5678.00 NO L1 Neighborship because the area is different L2 Neighborship established When Area-ID are different only L2 neighborship is possible 87 IS-IS Adjacency Only two active states: INIT and UP Adjacency makes synchronisation of LSDB possible: On p2p through the ack ing of the LSP s On broadcast through frequently sending CSNP packets 88

OSPF: Adjacency States 2-way Router sees itself in other Hello packets DR selected from neighbours in state 2-way or greater 2-Way DR BDR 89 OSPF: Adjacency States Full Routers are fully adjacent Databases synchronised Full Relationship to DR and BDR DR BDR 90

When to Become Adjacent Underlying network is point to point Underlying network type is virtual link The router itself is the designated router The router itself is the backup designated router The neighbouring router is the designated router The neighbouring router is the backup designated router 91 Flooding Scope OSPF IS-IS Intra-area, inter-area, external Area, backbone 92

OSPF: Types of Flooding Flooding on p2p links Each LSA is acknowleged Flooding on LANs DR is responsible (Network LSA) General background flooding Refreshing LSAs 93 OSPF: LSA Flooding Type 2 Area 1 Type 3/4/5 ABR Type 3 LSA Types 1. Router 2. Network 3. Summary 4. ASBR Summary 5. External Area 0 Type 3/4/5 ABR Type 3 Area 2 ASBR Type 5 RIP Domain 94

OSPF: Designated Routers Reduce OSPF traffic on multiaccess links Store and distribute neighbors LSDBs Backup DR for redundancy OSPF priority used in DR selection ip ospf priority <value> Range 1 255 default 1, 0 for non-candidate 95 OSPF: Function of DR/BDR DR Flood Link change 224.0.0.5 224.0.0.6 Link change BDR 96

IS-IS: Types of Flooding Flooding on p2p links with positive acks each LSP is acknowleged with a PSNP Flooding on LANs with negative acks DIS multicasts a full list of LSP descriptions in a CSNP packet every 10 seconds re-transmission requests are done via PSNP General background flooding Refreshing LSPs 97 Pseudonode LSP Generation DIS DIS PSN Broadcast link represented as virtual node, referred to as Pseudonode (PSN) PSN role played by the Designated Router (DIS) DIS election is preemptive, based on interface priority with highest MAC address being tie breaker IS-IS has only one DIS; DIS helps routers on broadcast link to synchronize their IS-IS databases 98

Further Reading 99 Further Reading: CCO OSPF IS-IS http://www.cisco.com/ cgibin/support/browse/ p sp_view.pl?p=internetworking:ospf http://www.cisco.com/ cgibin/support/browse/ p sp_view.pl?p=internetworking:isis 100

Further Reading: Cisco Press OSPF IS-IS OSPF Network Design Solutions ISBN: 1587050323 OSPF Command and Configuration Handbook ISBN: 1587050714 IS-IS Network Design Solutions ISBN: 1578702208 101 Recommended Reading Routing TCP/IP Volume I ISBN: 1578700418 IS-IS Network Design Solutions ISBN: 1578702208 OSPF Network Design Solutions, Second Ed. ISBN: 1587050323 Available on-site at the Cisco Company Store 102

Recommended Reading Internetworking Technologies Handbook, Fourth Edition ISBN: 1587051192 Available in Aug 2003. Internetworking Technologies, Third Edition ISBN: 1587050013 Available on-site at the Cisco Company Store 103 Cisco Advanced Services Network Deployment Mentoring Boot Camps Building Core Networks with OSPF, BGP, and MPLS For more information, schedules and registration for this course please: email aeskt_registration@cisco.com visit www.cisco.com/go/ndm call 800-800-1180 ext 5-0933 or 408-525-0933 104

Please Complete Your Evaluation Form Session 105 106