How does isis routing protocol work




















These addresses are part of the NET Value. They can be anywhere from 8 to 20 bytes long, but are often only 10 bytes. An example of a NET is The address is a series of HEX values, separated by dots. The Area-ID is variable in length, but must be at least one byte. It is often a three-byte value. The System-ID needs to be unique within the area, but may overlap in different areas.

Combining it with the Area-ID makes the entire address unique. This is like a packet in OSPF terminology. Level 1 routers need the Area-ID to match. Authentication and network type must also match for neighbours to form. Level routers send and receive both types.

This adds to the scalability of IS-IS, as more routers can exist on the network without over flooding. Routers hold an election to select the DIS. The router with the highest priority on the segment wins the election and becomes the DIS. If there is a tie, the router with the highest MAC wins. The topology is as follows:. The first step is to enable the IS-IS process. Each IS-IS area uses a separete process.

This could be any value, but reformatting a loopback IP makes troubleshooting easier. All later processes are Level 1 by default. Change this with the is-type command.

Show clns neighbours confirms that neighbour relationships have been established. If a default route were required, it could be advertised with default-information originate. Wikipedia — IS-IS. You must be logged in to post a comment.

See Also. To support this concept, a router may be one of the following types: Level 1 — A router in a normal area that does not connect to another area Level — A router in a normal or backbone area that connects different areas Level 2 — A backbone router that does not connect to other areas The topology below shows an example of a network with several areas. There is no backup DIS. The use of passive-interface is the same as with any other routing protocol. Following this, enable IS-IS on an interface.

Show isis database shows the LSDB. This is router reachability information. Each NSAP represents a service that is available at that node.

In addition to having multiple services, a single node can belong to multiple areas. Each network entity also has a special network address called a network entity title NET.

Most end systems and intermediate systems have one NET. Intermediate systems that participate in multiple areas can have multiple NETs. NETs take several forms, depending on your network requirements. NET addresses are hexadecimal and range from 8 octets to 20 octets in length. The simplest format omits the domain ID and is 10 octets long. For example, the NET address The system identifier must be unique within the network. For an IP-only network, we recommend using the IP address of an interface on the router.

Configuring a loopback NET address with the IP address is helpful when troubleshooting is required on the network. The first portion of the address is the area number, which is a variable number from 1 through 13 bytes. The first byte of the area number 49 is the authority and format indicator AFI.

The next bytes are the assigned domain area identifier, which can be from 0 through 12 bytes. In the examples above, the area identifier is The next six bytes form the system identifier.

The system identifier can be any six bytes that are unique throughout the entire domain. The system identifier commonly is the media access control MAC address as in the first example, 00a0. The last byte 00 is the n-selector.

The system identifier cannot be All 0s is an illegal setting, and the adjacency is not formed with this setting. Therefore, in a link-state routing protocol, the next hop address to which data is forwarded is determined by choosing the best end-to-end path to the eventual destination. The main advantage of a link state routing protocol is that the complete knowledge of topology allows routers to calculate routes that satisfy particular criteria. This can be useful for traffic engineering purposes, where routes can be constrained to meet particular quality of service requirements.

The main disadvantage of a link state routing protocol is that it does not scale well as more routers are added to the routing domain. Increasing the number of routers increases the size and frequency of the topology updates, and also the length of time it takes to calculate end-to-end routes.

This lack of scalability means that a link state routing protocol is unsuitable for routing across the Internet at large, which is the reason why IGPs only route traffic within a single AS.



0コメント

  • 1000 / 1000