zte is-is protocol

Upload: ghee17

Post on 13-Oct-2015

74 views

Category:

Documents


0 download

DESCRIPTION

ZTE IS-IS Protocol

TRANSCRIPT

  • 5/22/2018 ZTE IS-IS Protocol

    1/45

    IS-IS Protocol Principle

    V1.0

  • 5/22/2018 ZTE IS-IS Protocol

    2/45

    Purpose

    The purpose for studying the contents is to: Understand the basic concept of the ISIS.

    Master the area division of the ISIS.

    Master the routing calculation process of the ISIS.

  • 5/22/2018 ZTE IS-IS Protocol

    3/45

    Basic Concept of the ISIS

    Hierarchical Division of the ISIS

    Neighbor Establishment of the ISIS

    Database Maintenance of the ISIS

    Routing Calculation of the ISIS

    Comparison of the ISIS and the OSPF

    Contents

  • 5/22/2018 ZTE IS-IS Protocol

    4/45

    IS-IS Overview

    IS-IS: dynamical routing protocol in the opensystem interconnect (OSI) (OSI 10589 or

    RFC1195)

    Integrated IS-IS can support both of ISO and

    TCP/IP

    IS-IS: the IGP protocol

    IS-IS: similar to the link-state protocol OSPF of

    routing protocol

  • 5/22/2018 ZTE IS-IS Protocol

    5/45

    Same Points of the ISIS and the OSPF

    Maintain the database of a link state and use the SPFalgorithm to calculate a shortest path tree;

    Use the Hello packet to form and maintain the neighbor

    relation;

    Use the area concept or different level to form a two-levelhierarchical topology;

    Have the capability to provide the address summarization

    among areas;

    Classless routing selection protocol; Select an specified router to describe the broadcast type

    network;

    Have the authentication capability.

  • 5/22/2018 ZTE IS-IS Protocol

    6/45

    OSI and TCP/IPOSI TCP/IP

    End System (ES) Host

    IntermediateSystem (IS) Router

    ES-IS

    Communication protocol

    from the host to the router

    Proxy ARP

    and others

    IS-IS

    Routing selection protocol

    OSPF

    Protocol Data Unit (PDU) packet

    DLPDU

    Data link PDU

    Frame

    NPDU

    Protocol Data Unit in the

    network layer

    Packet and

    group

    OSI TCP/IP

    CLNP

    No connection network

    protocol

    IP protocol

    NSAP

    Address and identifier

    IP address

    Subnetwork Point of

    Attachment (SNPA)

    Subnet

    LSP (IS-IS)

    PDU of link status. It is

    the packet.

    LSA (OSPF)

  • 5/22/2018 ZTE IS-IS Protocol

    7/45

    ISIS Address StructureNET

    NET Address (Network entity title ) The address of the OSI network. It is called the NET address. It is

    used to describe the area ID and the system ID of the device.

    Area: the area number. The length is variable from 1 to 13 bytes.By default, one router can have three area numbers.

    ID: the system ID. It is similar to the Router ID in the OSPF. Thelength is variable. Commonly, it is 6 bytes. It is identified by usingthe interface MAC. It is unique in the area.

    Sel: selection character. It is similar to the IP protocol number. It isset to 0x00. It means a NET address.

  • 5/22/2018 ZTE IS-IS Protocol

    8/45

    Example of the NET Addresses

    39.0f01.0002.4444.4444.4444.00

    39.0f01.0002.3333.3333.3333.00

    39.0f01.0003.6666.6666.6666.00

    39.0f01.0004.7777.7777.7777.00

    39.0f01.0001.2222.2222.2222.00

    39.0f01.0001.1111.1111.1111.00

  • 5/22/2018 ZTE IS-IS Protocol

    9/45

    Basic Concept of the ISIS

    Hierarchical Division of the ISIS

    Neighbor Establishment of the ISIS

    Database Maintenance of the ISIS Routing Calculation of the ISIS

    Comparison of the ISIS and the OSPF

    Contents

  • 5/22/2018 ZTE IS-IS Protocol

    10/45

    Area Division of the ISIS

    IS-IS is composed of L2 backbone area and L1non backbone area.

    The following routers run the IS-IS router:

    L1 router (routing inside the area)

    L2 router (routing among areas)

    L1/L2 router (similar to the ABR router of the OSPF)

  • 5/22/2018 ZTE IS-IS Protocol

    11/45

    Area Comparison of the ISIS and the OSPF

    Area

    0

    A

    B

    C D

    E

    F

    Area1

    Area

    2

    ABR

    ABR

    The area division of the OSPF is

    done on the router.

    A

    B

    C D

    E

    F

    L1

    Area

    2

    L1/L2

    L1/L2

    L1

    L2L2

    The area division of the ISIS is done on the link.

  • 5/22/2018 ZTE IS-IS Protocol

    12/45

    Features of the ISIS

    The area division of the IS-IS is done on the link.The whole router is in one area.

    To prevent routing loop among areas, the

    communication among areas must pass through

    L2 area. Therefore, L2 router must be directlyconnected.

    The L1/L2 router only notifies the routing of L1

    type to L1 router. The L1 area is equivalent to thetotally-stub area of the OSPF protocol.

  • 5/22/2018 ZTE IS-IS Protocol

    13/45

    L1 Router and L2 Router

    Level1 router: It can only be neighbor with the routers in the area.

    It has the level1 LSDB which contains all routing

    information in the area.

    It uses the nearest L1/L2 router to leave the area. It may have the sub optimization routing.

    Level2 router:

    It can be neighbor with routers in other areas.

    It has the level2 LSDB which contains all routing

    information in other areas.

  • 5/22/2018 ZTE IS-IS Protocol

    14/45

    L1/L2 Router

    L1/L2 router:It can have neighbors of other areas.

    It has two LSDBs:

    Level1 LSDB about the internal routing information in the area

    Level2 LSDB about routing information among areas

    If one router has the adjacency relation with other

    routers, it may pass through other Level1 router in

    the area: it is the potential exit of the area itself.

  • 5/22/2018 ZTE IS-IS Protocol

    15/45

    Network Hierarchical Structure of IS-IS

  • 5/22/2018 ZTE IS-IS Protocol

    16/45

    Basic Concept of the ISIS

    Hierarchical Division of the ISIS

    Neighbor Establishment of the ISIS

    Database Maintenance of the ISIS Routing Calculation of the ISIS

    Comparison of the ISIS and the OSPF

    Contents

  • 5/22/2018 ZTE IS-IS Protocol

    17/45

    Working Progress of the ISIS

    Establish the adjacency relation; Send the LSP and synchronize the database

    information of the link status;

    Use the SPF algorithm to calculate the best routes.

  • 5/22/2018 ZTE IS-IS Protocol

    18/45

    Neighbor Establishment Process of the ISIS

    Send the Hello packets (IIH PDU) in period (10s)to find the neighbors;

    Match the parameters to establish the adjacency

    relation.

    Init

    Learn the neighbors. But the adjacency

    relation is not formed;

    UP Establish the adjacency relation.

  • 5/22/2018 ZTE IS-IS Protocol

    19/45

    Hello PDUIIH

    IIH interconnects with others to form adjacency among

    ISIS routers.

    Classification of the IIH:

    P2P IIH (used for point to point network)LAN IIH (used for broadcast type network)

    -- LAN Level1 IIH (0180.C200.0014)

    -- LAN Level2 IIH (0180.C200.0015)

    IIH fulfills the MTU. Only when the MTUs in the two ends

    are consistent, then the adjacency can be formed.

  • 5/22/2018 ZTE IS-IS Protocol

    20/45

    Hello PDUIIH

  • 5/22/2018 ZTE IS-IS Protocol

    21/45

    Three Handshakes for Establishing Neighbor

    Enter the init status when receiving the hello packet of theneighbor;

    Enter the UP status when finding the MAC of itself in the

    TLV of neighbor hello packet.

  • 5/22/2018 ZTE IS-IS Protocol

    22/45

    The election of the Designated ISDIS

    Reduce the neighbor information carried in the LSP sent inthe broadcast type network and simplify the networkstructure.

    In the broadcast type network, We should elect designatedrouter for L1 and L2 areas respectively .

    All neighbors need to establish the adjacency relation.

    DIS assigns LAN IDs of the network. It is composed of thesystem ID of the DIS

    Election principle-- The interface is specified with a L1 type priority and a L2 type

    priority. The range is 0127. The larger the number is, the higher the

    priority is;-- When the priorities are the same, see the MAC addresses of

    the interfaces. The larger the number is, the higher the priority is;

    -- The DIS is not stable and it can be preempted .

  • 5/22/2018 ZTE IS-IS Protocol

    23/45

    DIS on the Broadcast Link

  • 5/22/2018 ZTE IS-IS Protocol

    24/45

    Basic Concept of the ISIS Hierarchical Division of the ISIS

    Neighbor Establishment of the ISIS

    Database Maintenance of the ISIS Routing Calculation of the ISIS

    Comparison of the ISIS and the OSPF

    Contents

  • 5/22/2018 ZTE IS-IS Protocol

    25/45

    Maintenance of the Database

    LSP: link state PDU

    Exchange the routes information, establish and maintainthe LSDB .

    CSNP: Complete Sequence Number PDU

    In the point to point and broadcast link, CSNP is used to

    check the consistency of the LSDB

    PSNP: Partial sequence number PDU

    The two main functions :

    In the point to point link, it is used to confirm the received

    LSP;In the point to point and broadcast link, it is used to requestthe newest version or lost LSP.

  • 5/22/2018 ZTE IS-IS Protocol

    26/45

    LSPLink State PDU

    Two types of LSPLSP generated by non pseudo node

    LSP of the LAN represented by pseudo node

    (generated by DIS)

    Level 1 router generates Level 1 LSP

    Level 2 router generates Level 2 LSP

    Level 1-2 router generates Level 1 LSP and Level

    2 LSP

  • 5/22/2018 ZTE IS-IS Protocol

    27/45

    Generation of Non Pseudo Node LSP

    In the following conditions, each IS routergenerates and disperses the non pseudo node

    LSP:

    New neighbor joining or leaving

    New IP prefix adding or removing

    Changing of the metric of link

    Refreshing timer overflow

  • 5/22/2018 ZTE IS-IS Protocol

    28/45

    Generation of Pseudo Node LSP

    Pseudo LSP is generated by DISEach layer generates a LSP

    Each LAN generates a LSP

    Pseudo node LSP can reduce the adjacency andflooding

    In the following conditions, DIS generates and

    floods new pseudo nodes LSPs :

    New neighbor joining or leaving

    Refreshing timer overflow

  • 5/22/2018 ZTE IS-IS Protocol

    29/45

    Generation of Pseudo Node

    Broadcast link is represented by a virtual node, which is calledpseudo node (PSN).

    Pseudo node

    Only DIS can generate the PSN

    The DIS election is preemptive. It is determined by the interface

    priority. If the priorities are consistent, it is determined by the MACaddress. The larger the number is, the higher the priority is.

    There is only DIS and no backup DIS. DIS is helpful for the routersin the broadcast link to synchronize LSDB.

    DIS

    PSN

    DIS

  • 5/22/2018 ZTE IS-IS Protocol

    30/45

    LSP Database (No PSN)

  • 5/22/2018 ZTE IS-IS Protocol

    31/45

    LSP Database (Carried with PSN)

  • 5/22/2018 ZTE IS-IS Protocol

    32/45

    LSP Packet

  • 5/22/2018 ZTE IS-IS Protocol

    33/45

    CSNP Packet

  • 5/22/2018 ZTE IS-IS Protocol

    34/45

    PSNP Packet

  • 5/22/2018 ZTE IS-IS Protocol

    35/45

    Basic Concept of the ISIS Hierarchical Division of the ISIS

    Neighbor Establishment of the ISIS

    Database Maintenance of the ISIS Routing Calculation of the ISIS

    Comparison of the ISIS and the OSPF

    Contents

  • 5/22/2018 ZTE IS-IS Protocol

    36/45

    Calculation of the RouteMetric

    Default: default metric (necessary) Delay: pass-through delay of a subnet (optional)

    Expense: cost of a subnet (optional)

    Error: show the remaining error problems of the subnet. It

    is similar to reliability metric of IGRP/EIGRP (optional).

    Each metric is expressed by 063. each kind of metric is

    calculated by the separated independent routing.

    Therefore, if one system supports the four metrics. SPFcan make L1 and L2 to calculate four times. The router

    SPF to the destination can be calculated repetitiously.

  • 5/22/2018 ZTE IS-IS Protocol

    37/45

    Calculation of RouteBest Router Selection

    If there are multiple routes to a destination : The path of L1 is prior to the path of L2

    If the path supports the optional metric, then it is prior to

    the default metric

    The route with lowest metric is prior than others in eachlevel

    If there are multiple paths with the same cost in the

    routing table, you can use the load balancing. There are

    six at most(depend on router).

  • 5/22/2018 ZTE IS-IS Protocol

    38/45

    Basic Concept of the ISIS Hierarchical Division of the ISIS

    Neighbor Establishment of the ISIS

    Database Maintenance of the ISIS Routing Calculation of the ISIS

    Comparison of the ISIS and the OSPF

    Contents

  • 5/22/2018 ZTE IS-IS Protocol

    39/45

    Same Points of the ISIS and the OSPF(1)

    They are both the link state protocols and use the SPF

    algorithm to calculate the routes.

    They both have the fast convergence and loop free

    function. They are capable for large networks.

    They both use the hello protocol to maintain the neighborrelation.

    They both use the hierarchical routing concept. They both

    have the backbone areas, which can provide the agile and

    actual design plan for the network planning.

  • 5/22/2018 ZTE IS-IS Protocol

    40/45

    Same Points of the ISIS and the OSPF(2)

    To control the scale and complexity of LSDB , DR/DIS is

    elected on the broadcast network.

    They both support the authentication.

    They both use the interface configurable cost for route

    metric .

    They both have the capability to provide the address

    summarization among areas.

    They both support the classless routing selection protocol.

  • 5/22/2018 ZTE IS-IS Protocol

    41/45

    Distinctions of the ISIS and the OSPF(1)ISIS OSPF

    Protocol model OSI model

    Design for CLNS. It is added with the

    support of the IP.

    TCP/IP model

    It is dedicated for the IP network.

    Packet

    encapsulation

    Run in the link layer. The packet is

    directly encapsulated in the packet of

    the link status. It supports multiple

    protocols, such as CLNS and IP.

    Packet is encapsulated in the IP. It only

    supports the IP protocol.

    Network type Broadcast type and point to point Broadcast type, point to point, point to

    multiple points, NBMA and virtual link

    Area Backbone area is not a specified area. It

    is composed of continuous Level 2

    routers.

    Area border is in the link among routers.

    By default, the ISIS is the stub area. L2

    cannot leak routing information to L1.

    Backbone area is area 0

    Area border is on the ABR router

    By default, it is not the stub area.

    DR/DIS Preemptive. No BDR.

    In the broadcast network, the router and

    all neighbors establish the adjacency

    relation.

    Non preemptive. Have BDR.

    The router only establishes the

    adjacency relation with DR and BDR

    neighbors.

    Adjacency

    establishment

    Establish the adjacency relation through

    the hello packet. and establish

    adjacency

    Establish the neighbor relation through

    the hello packet, and establish

    adjacency after LSDB synchronization

  • 5/22/2018 ZTE IS-IS Protocol

    42/45

    Distinctions of the ISIS and the OSPF(2)

    ISIS OSPF

    LSDB Use LSP. It is a packet .

    The initial database synchronization is

    done after the establishment of the

    adjacency relation.

    Use LSA. It is encapsulated in the IP

    packet.

    The initial database synchronization is

    done before the establishment of the

    adjacency relation.

    SPF algorithm Run Level 1 SPF in the area to

    calculate the routings.Run Level 2 SPF in the area to

    calculate the routings.

    Run SPF in the area to calculate the

    routings.Run distance vector algorithm among

    areas to calculate the routings.

    Scalability ISIS can neglect the TLV type that it

    does not support.

    All OSPF routers in the network must

    identify all used extension and LSA

    options.

    Applicable

    range

    It is commonly used in the large ISP. It is commonly used in the enterprise

    network and large ISP.

    Complexity Generate less LSP. Commonly, it uses

    only one area.

    Generate more LSAs. Commonly it is

    configured with multiple areas.

    Network scale It can support rather larger single area. For rather large network, it is commonly

    divided to multiple areas.

  • 5/22/2018 ZTE IS-IS Protocol

    43/45

    Summary

    The chapter mainly introduces the

    following contents:

    Basic concept of the ISIS ISIS area division, database

    maintenance and routing calculation

    method

    Comparison of the ISIS and the OSPF

  • 5/22/2018 ZTE IS-IS Protocol

    44/45

    Questions

    1. How many kinds of the ISIS areas are there?What are the features of each kind?

    2. What is the function of the hello packet of the ISIS?

    3. Which kind of network generates the DIS? How is

    it elected?

  • 5/22/2018 ZTE IS-IS Protocol

    45/45