« Home « Kết quả tìm kiếm

The protocol


Tìm thấy 11+ kết quả cho từ khóa "The protocol"

The Complete IS-IS Routing Protocol- Part 2

tailieu.vn

It defines the base structures of the protocol (adjacencies, flooding, etc). So it looks like IS-IS is a routing protocol for CLNP, and the IP thing is an add-on. I suspect IS-IS might be easier to understand if the CLNP specific part was separated from the base protocol.. So IS-IS can be used for routing IP packets just as well as the other major link-state protocol, the Open Shortest Path First (OSPF) protocol.

The Complete IS-IS Routing Protocol- P53

tailieu.vn

Figure 17.16 shows the structure of a TLV that could convey the information that a certain router can process.. 17.7 Conclusion. The further extension of the IS-IS protocol is not going to stop anytime soon. Additional functionality is required by many service providers and will continue to force evolution of the protocol. IS-IS is no exception to that concern.

The Complete IS-IS Routing Protocol- P4

tailieu.vn

It has the name resolution service for IS-IS built into the protocol. The mechanisms behind this unique translation service are discussed in Chapter 13 “IS-IS Extensions”.. Then why discuss name resolutions in the introduction chapter? Just because IS-IS uses the System-ID in various places. Figure 4.23 and Figure 4.24 show various IDs in the IS-IS protocol that use the System-ID as their first 6 bytes.. IS-IS level 1 link-state database:.

The Complete IS-IS Routing Protocol- P46

tailieu.vn

Sometimes even the debug output, which often shows just an interpretation of the data, does not provide sufficient insight into what the router does not like about a given packet. 15.2.4 Network Analyzers. The main disadvantage of evaluating debug logs is that they show only an interpretation of the protocol and not the actual content.

The Complete IS-IS Routing Protocol- Part 18

tailieu.vn

All of the IGPs suffer from the same protocol defect, in that all of the IGPs do not have any flow-control mechanisms built into the protocol. Churning IGPs was the typical reason in the 1990s when people like the NOC-team managers and the Chief Technology Officer got paged out of bed in the middle of the night.. These lessons were learned and the implementations of the routing protocols did get better.

The Complete IS-IS Routing Protocol- P44

tailieu.vn

However, in IOS, for example, external BGP paths have an administrative dis- tance, which has a route preference of 20 versus an IS-IS route that ranks only at distance 115 of the route selection process. A modification of the protocol prefer- ence configuration helps to unveil the IS-IS routes. If the IP routes finally show up in the main IP routing table, the troubleshooting process may end..

The Complete IS-IS Routing Protocol- P33

tailieu.vn

For instance, for a long time OSPF used to have the Reference-Bandwidth of 100 Mbps, because at the time when OSPF was specified the architects of the protocol thought that 100 Mbps would be sufficient forever. The most significant change of the Extended IS Reachability TLV #22 is the support for sub-TLVs and 24-bit metrics

The Complete IS-IS Routing Protocol- Part 15

tailieu.vn

The two major IS-IS implementations treat all three sources of information equally.. Consider Figure 5.4, which displays a point-to-point IIH header. The same problem applies to the OSPF routing protocol: The Hello. and Dead timer there needs to be conveyed in the protocol. One of the nice things about IS-IS has been that the Hello timer does not need to get encoded on the Hello message. The Hello timer is a purely local matter.

The Complete IS-IS Routing Protocol- Part 17

tailieu.vn

Partition repair is left as an option to the implementer of the protocol, so this is not a major issue. The next four bits in the Attribute block, Bits 7 to 4, determine if the issuing Intermediate System is attached to another area or not.

Lab 11.2.4 Protocol Inspector, TCP and HTTP

tailieu.vn

TCP may seem to be a bit abstract, but the protocol analyzer shows just how important TCP is to network processes such as e-mail and web browsing.. At least one of the hosts must have the Protocol Inspector software installed. If the lab is done in pairs, having the software installed on both machines means that each person can run the lab steps.. Step 1 Start Protocol Inspector and your browser Step 2 Go to detail view. Step 3 Start a capture Step 4 Request a Web Page.

Lab 7.1.9b Introduction to Fluke Protocol Inspector

tailieu.vn

While the Protocol Inspector (PI) software is a valuable part of the Academy program, it is also representative of features available on other products in the market.. 1) Use Protocol Inspector or Protocol Expert in a small controlled LAN that is configured by the instructor in a closed lab environment as shown in the figure above. 2) Perform the steps in a larger environment such as the classroom or the school network to see more variety.

The Complete IS-IS Routing Protocol- P30

tailieu.vn

Ideally, routing protocols should be almost like good wine – the older, the better.. 11.1.2 Ramifications of Non-extensible Routing Protocols. The allowance for constant improvement of the routing protocol through added features and bug fixes forms the essence of the extensible routing protocol. routing protocols negatively impact the maturity cycle of routing protocol software?. A routing protocol becomes stable after spending enough cycles in the maturity (deploy- and-fix) loop.

The Complete IS-IS Routing Protocol- P38

tailieu.vn

If we load the topology with a certain protocol (for example IP) reachability information then the assumption is that the circuits that are supposed to provide reachability between routers can also carry the respective protocol. Consider Figure 13.14.. The black lines indicate link membership in the IPv6 topology. Note that the two topologies are neither con- gruent nor convex.. The multi topology extensions first describe an extension to carry the set of supported protocols in the Hello.

The Complete IS-IS Routing Protocol- P32

tailieu.vn

By limiting the Link Metric to 63 and the Aggregated Metric to 1023, IS-IS makes sure that the indexing function does not consume too much memory. This is another place where CPU/memory constraints have made their way into the IS-IS protocol. environment shortage issue of the time by protocol properties, those protocol properties finally got deprecated over time.

The Complete IS-IS Routing Protocol- P11

tailieu.vn

Compared to OSPF, IS-IS is almost like a case study on how to do it right the first time.. From day one, IS-IS has been designed to stay neutral no matter which Network Layer protocol information it had to transport. IS-IS has always been effectively multi-protocol ready: in the 1980s it was used for routing CNLP traffic. It helps when the message elem- ents and packet types of the base IS-IS routing protocol use the proper TLV encoding.

The Complete IS-IS Routing Protocol- P1

tailieu.vn

The Complete IS-IS Routing Protocol. The complete IS-IS routing protocol / Hannes Gredler, Walter Goralski.. IS-IS (Computer network protocol) 2. IS-IS has always been my favourite Interior Gateway Protocol. Its elegant simplicity, its well-structured data formats, its flexibility and easy extensibility are all appealing – IS-IS epitomizes link-state routing. Whether for this reason or others, IS-IS is the IGP of choice in some of the world’s largest networks.

The Complete IS-IS Routing Protocol- Part 12

tailieu.vn

IS-IS inherited its addressing structure from the OSI suite of networking protocols, as many other protocols (such as ATM) did. End Systems (hosts in IP) discover and register their addresses with the IS-IS router using a protocol called ES–IS (End-System to Intermediate System), a protocol that exists in parallel with IS-IS and is at the same level in the networking stack.

The Complete IS-IS Routing Protocol- P23

tailieu.vn

You have seen in this section how the IP protocol deals with frames that are in certain segments in a network too big to deliver. In the next section you will learn about the messages in the IS-IS protocol that can get larger than the MTU and how IS-IS deals with it. For better illustration we will reference back to the three ways of how the IP protocol fixed the too-small-MTU problem.. 9.3 The Too-small MTU Problem for IS-IS. IS-IS may generate frames that are larger than a single-link MTU.

The Complete IS-IS Routing Protocol- P22

tailieu.vn

For proper chopping the transport protocol needs to know the MTU of the underlying packet transport infrastructure

The Complete IS-IS Routing Protocol- P41

tailieu.vn

The concept of label swapping comes from the original ability of ATM and Frame Relay Switches to change the VPI/VCI or DLCI descriptor as the traffic leaves the chassis. It was clear to the designers of the new MPLS suite of protocols that each IP packet and frame had to be preceded by an MPLS header in order to support label swapping in the IP protocol family.. There are roughly two, unfortunately, fundamentally different views in the industry:.