Вы находитесь на странице: 1из 104

Module 1

January, 2016

TCP/IP Overview
Course Outline
• Module 1: TCP/IP Overview & Routing
• Module 2: MPLS & MPLS-VPN Overview
• Module 3: Mobile Backhaul End-to-End Communication
• Module 4: RJIL IP MPLS Backhaul Network

Confidential Reliance Jio Infocomm Limited 2


Module 1: Introduction to TCP/IP
• Lesson 1: TCP/IP model
• Lesson 2: Introduction to IPv4 and IPV6
• Lesson 3: Addressing (DHCP)
• Lesson 4: Routing

Confidential Reliance Jio Infocomm Limited 3


Version Tracker

Created by Reviewed by Approved by Approval date Version

Prashant Mude Saurabh Srivastava Saurabh Srivastava 04/01/2016 V2.0

Confidential Reliance Jio Infocomm Limited 4


Lesson 1: Introduction to TCP/IP

January, 2016

TCP/IP Overview
Understanding Host-to-Host Communications

• Older model
• Proprietary
• Application and combinations software controlled by one
vendor
• Standards-based model
• Multivendor software
• Layered approach

Confidential Reliance Jio Infocomm Limited 4


Why a Layered Network Model?

 Reduces complexity
 Standardizes interfaces
 Facilitates modular engineering
 Ensures interoperable technology
 Accelerates evolution
 Simplifies teaching and learning

Confidential Reliance Jio Infocomm Limited 5


TCP/IP Stack vs. the OSI Model

Confidential Reliance Jio Infocomm Limited 6


The TCP/IP Model
• TCP/IP” is the acronym that is commonly used for the set of network protocols that compose
the Internet Protocol suite.
• TCP/IP is now the most widely used protocol for a number of reasons, including its flexible addressing
scheme, its usability by most operating systems and platforms, its many tools and utilities, and the
need to use it to connect to the Internet.
• Originally also known as the DoD Model, built by DARPA an agency of the US Department of Defense.
• Provide end-to-end Connectivity specifying how data should be packetized, addressed, transmitted.
• TCP/IP model specifies 5 Layers, it specifies various protocols at each layer which handing one aspect of
the network communications.

Confidential Reliance Jio Infocomm Limited 9


TCP/IP Stack Layers

• 5 Layers in TCP/IP Stack.


Application

Transport

Internet

Network Interface

Physical

Confidential Reliance Jio Infocomm Limited 10


Application Layer
• This layer is closest to the User.
• Provides Network service to the applications of the user, such as email, file transfer, and terminal
emulation.
• Ensure that data is readable by receiving systems
• Formats data, structure data, provide data Encryption, Compression and Authentication.
• Negotiates data transfer syntax for application.
• Protocols Running at Application Layer : SMTP,DNS,FTP,POP3,SSH

Confidential Reliance Jio Infocomm Limited 11


Transport Layer
• Handles transportation issues between hosts
• The purpose of the transport layer is to hide the network requirements from the application layer.
• Connection-oriented transport provides reliable transport; connectionless transport provides best-
effort transport
• Provide reliability through fault detection, flow control, acknowledgement of receipt, Congestion
control, data recovery.
• UDP is a protocol that operates at the transport layer and provides applications with access to the
network layer without the overhead of the reliability mechanisms of TCP. UDP is a connectionless, best-
effort delivery protocol.
• TCP is a protocol that operates at the transport layer and provides applications with access to the
network layer. TCP is connection-oriented, provides error checking, delivers data reliably, operates in
full-duplex mode, and provides some data recovery functions.

Confidential Reliance Jio Infocomm Limited 12


Reliable vs. Best-Effort Comparison

Reliable Best Effort


Protocol TCP UDP
Connection Type Connection-Oriented Connectionless
Sequencing Yes No
Uses • Email • Voice Streaming
• File Sharing • Video Streaming
• Downloading

Confidential Reliance Jio Infocomm Limited 13


UDP Characteristic
• Operates at transport layer of OSI and TCP/IP models
• Provides applications with access to the network layer without the overhead
of reliability mechanisms
• Is a connectionless protocol
• Provides limited error checking
• Provides best-effort delivery
• Has no data-recovery features

14
TCP Characteristics

• Transport layer of the TCP/IP stack


• Access to the network layer for applications
• Connection-oriented protocol
• Full-duplex mode operation
• Error checking
• Sequencing of data packets
• Acknowledgement of receipt
• Data-recovery features

15
TCP/IP Applications

16
Internet Layer
• Exchanging information between the host connected in different networks.
• Route data packets and select best path to deliver data.
• Provide logical addressing (IP address),which uniquely identify each device on a network.
• Every host (computer, networking device, peripheral) must have a unique address called IP address.
• Two variants for logical address: IPv4 and IPv6
• Provide fragmentation of packet to fit the packet size as per the next Network requirements.

Confidential Reliance Jio Infocomm Limited 17


Network Interface Layer
• Provide node to node communication with in the same network.
• Network interface layer provide interface between Software layer (internet) and hardware layer
(physical).
• Defines the Network access methods for the host.
• The network interface defines a addressing scheme know as: Hardware address/Physical address/MAC
address
• Encapsulate the packets received from network layer in to a frame and also add error detection
information.
• Protocol in this layer include: Ethernet for LAN & PPP, HDLC, Frame-Relay ATM for WAN

Confidential Reliance Jio Infocomm Limited 18


IP PDU Header

Confidential Reliance Jio Infocomm Limited 19


Physical Layer
• Send the data in Bits, Bytes format. Convert Bits, Bytes in voltage levels.
• Defines the electrical, Mechanical, Procedural, and functional specifications for activating, maintaining
and deactivating the physical link.
• Does not try to interpret the meaning of the information it is handling.

Confidential Reliance Jio Infocomm Limited 20


MAC Address Components

Confidential Reliance Jio Infocomm Limited 22


MAC Addresses

Confidential Reliance Jio Infocomm Limited 23


Address Resolution Process (ARP)

Confidential Reliance Jio Infocomm Limited 23


Peer-to-Peer Communications

Confidential Reliance Jio Infocomm Limited 24


Data Encapsulation

Confidential Reliance Jio Infocomm Limited 25


Data De-Encapsulation

Confidential Reliance Jio Infocomm Limited 26


End to End Communications Model

Confidential Reliance Jio Infocomm Limited 27


Lesson 2: Introduction to IPV4 and IPV6

January, 2016

IPv4/IPv6 Overview
IP address Representation
• They uniquely identify each device on an IP network.
• Every host (computer, networking device, peripheral) must have a unique address.
• AN IP address consists of two parts:
• Network Address:
• Identifies the Network of which the host is apart
• Used by routers to maintain information about routes
• Host ID:
• identifies the individual host
• Is assigned by organizations to individual devices

172.18.50.240
Network Host

Confidential Reliance Jio Infocomm Limited 29


IPv4 Address
• 32-Bits of IPV4 address are divided in to 4 Octets.
• Each Octet Can take decimal value between 0-255.
• IPV4 address are classified in to 5 Different Classes.

Confidential Reliance Jio Infocomm Limited 30


IP Address Range
• First Octet Value of IP address decides which class address belongs to.

Class First Octet IP address Range Binary Range


Range
A 1-126 1.0.0.0 to 126.255.255.255 00000001-01111111

B 128-191 128.0.0.1 to 191.255.255.255 10000000-10111111

C 192-223 192.0.0.1 to 223.255.255.255 11000000-11011111

D 224-239 224.0.0.1 to 239.255.255.255 11100000-11101111

E 240-255 240.0.0.1 to 255.255.255.255 11110000-11111111

Confidential Reliance Jio Infocomm Limited 31


Reserved IP Address
• 0.0.0.0- Known as “This Address” & used as the default address when the Host Booting
up.
• 127.X.X.X- Reserved for Loopback address
• Class D IP address are reserved for Multicast
• Class E IP address are reserved for research purpose by IETF
• 255.255.255.255 is reserved for limited broadcast
• First Address of any given network represent Network Address and can not be assigned
to the host
• Last Address of any given network represent the Broadcast Address and can not be
assigned to the host.

Confidential Reliance Jio Infocomm Limited 32


Public and Private IP Address
• Public IP Address:
• Use on Internet or Public Routable environment
• Globally Unique
• Private IP Address:
• Use in LAN or Intranet
• Not Globally Unique
• Same Address range can be used by different organizations for LAN or Intranet
• Packet with Private IP cannot routed on internet
• Private IP address Range:
• 10.X.X.X
• 172.16.X.X to 172.31.X.X
• 192.168.X.X

Confidential Reliance Jio Infocomm Limited 33


Classless IP Address
• The IP address where we have fixed bits of network and fixed bits for host were known as classful IP
address.
• If IP address use default subnet mask known as Classful IP address.
• In the classless addressing scheme, there are no longer fixed network and host bits.
• Users are allowed to choose the network bits as per their requirements.
• The Default network ,ask for Class A,B and C are:

Class Subnet mask


Class A 255.0.0.0
Class B 255.255.0.0
Class C 255.255.255.0

Confidential Reliance Jio Infocomm Limited 34


Subnets
• There can be problems within a single broadcast domain:
• The domain relies on MAC addresses for packet delivery.
• Larger amounts of broadcast traffic consume resources.
• All Devices share the same broadcast domain.

Confidential Reliance Jio Infocomm Limited 35


Subnets (Cont.)
• Solution: Sub networks
• Smaller network are easier to manage.
• Overall traffic is reduced.
• You can apply network security polices more
easily.

Confidential Reliance Jio Infocomm Limited 36


Subnet Masks:

• A Subnet mask:
• Defines the number of bits that represent the
network and subnet part of the address.
• Used by end systems to identify the
destination IP address as either local or
remote.
• Used by Layer 3 devices to determine network
Mask 255.255.0.0 path

Confidential Reliance Jio Infocomm Limited 37


Sub netting Example
• Example: 200.20.1.0
• Given Subnet mask: 255.255.255.224
• Given address is Class C address. Class C Default Subnet mask is 255.255.255.0
200.20.1.0 11001000 00010100 00000001 00000000
255.255.255.224 11111111 11111111 11111111 11100000
• Here extending the mask to be 255.255.255.224,We have taken three bits (indicated in red letter) from
the default subnet mask and we can use this bits to make subnets.
• Using these three bits we can create 8 Subnets.
• Remaining 5 bits (Indicated in Blue letter) use as host ID, in each subnet we can have up to 32 host
address.

Confidential Reliance Jio Infocomm Limited 38


IPv4 Addressing Exhaustion Workarounds
• To Extend the lifetime and usefulness of IPv4 and circumvent address shortage, several mechanisms were
created:
• CIDR
• VLSM
• NAT
• DHCP

• Over the years, hardware support has been added to devices to support IPv4 enhancements.

Confidential Reliance Jio Infocomm Limited 39


IPv6 Features:

• Large address Space: Global reach capability, flexibility, aggregation, multi homing, auto
configuration, “plug-and-plug”, renumbering.
• Simpler header: Routing code streamlined, simpler processing in hardware.
• Security and mobility: Built in to standard, not as extensions.
• Transition richness: Several mechanisms available, including “ Dual-stacking.

Confidential Reliance Jio Infocomm Limited 40


IPv6 Addresses

• Address representation follows:


• Format is X:X:X:X:X:X:X:X, where is a 16-Bit hexadecimal field:
• -Example:2000:0C01:0E9E:0005:0000:0000:0000:0ABC
• Leading Zeros in a filed are optional:
• -Example:2000:C01:E9E:5:0:0:0:ABC
• Successive Fields of 0 are represented as “::” but only once in an address:
• -Example: 2000:C01:E9E:5::ABC

Confidential Reliance Jio Infocomm Limited 41


IPv6 address Types

One to One Communication


Unicast

One to Many Communication


Multicast

One to Nearest Communication


Anycast

Confidential Reliance Jio Infocomm Limited 42


IPv6 Address Type
• Unicast:
• Address is for a single interface
• IPv6 has several types (for example, global, reserved, link-local, and site-local)
• Multicast:
• One-to-many
• Enables more efficient use of the network
• Uses a larger address range
• Anycast:
• One-to-nearest (allocated from unicast address space)
• Multiple devices share the same address
• All anycast nodes should provide uniform service
• Source devices send packets to anycast address
• Routers decide on closest device to reach that destination
• Suitable for load balancing and content delivery services

Confidential Reliance Jio Infocomm Limited 43


IPv6 Unicast Addresses-Global Address

• Types of IPV6 Unicast Addresses:


• Global: Start with 2000::/3 and assigned by the Internet Assigned Number authority.
• Equivalents to Public IP Address in IPv4.

Confidential Reliance Jio Infocomm Limited 44


IPv6 Infrastructure Addressing model

0= Loopback intf. 4-Octet router-id or


IPv6 address pool -> 2405:0200::/29 1- Rtr-Rtr intf. # of /127 subnets
# 2=Rtr-Host intf.
16 Bits

2405 020P: GGYY: AABB: XXXX: XXXX: XXXX: XXXX

1=T.Caches, 2=DPI, 3= CPE/ONT,


4=eNB,5= AP, 6=WLC, 7=ISG,8=SAR,
CSR Location 9=IBR,A=OLT,B=Switch
1 GE Ring#
AG1 Location
10 GE Ring#
IBR Identifier
AG2 Identifier (01-FF). Total 255 AG2 per AG3. 00- Reserved
AG3 Identifier (01-FF). Total 255 AG3 Pan India. 00 Reserved
Infrastructure Identifier (01-FF).00 Reserved
Infrastructure
Confidential Reliance Jio Infocomm Limited 45
IPv6 Unicast Addresses-Link Local Address

• Link Local Address: A Link-Local address is an IPV6 Unicast that can be automatically configured on any
interface
• Link Local Address use for Neighbor discovery protocol on to Particular Physical link.
• Link Local Address always begin with fe80::/10 with 64-bits interface address.
• Loopback (::1)
• Unspecified (::)

Confidential Reliance Jio Infocomm Limited 46


IPv6 EUI-64 Interface Identifier

MAC Address: 00.90.27.17.FC.0F


00.90.27.17.FC.0F
0090:27FF:FE17:FC0F

• Cisco can use the EUI-64 format for interface identifiers.


• This format expands the 48-bit MAC address to 64 bits by inserting “FFFE” into the middle 16 bits.
• To make sure that the chosen address is from a unique
Ethernet MAC address, the U/L bit is set to 1 for global scope (0 for local scope).

47
IPv6 Unicast Addresses-Site Local Address

• Address is same as Private IP in IPV4.


• Reserved for these addresses, which are only routed within site no on Public Internet.
• Not Configured Automatically.
• Prefix of Site-Local is FEC0::/10, the last 64 bits are the interface ID.

Confidential Reliance Jio Infocomm Limited 48


IPv6 Neighbor Discovery
• Use to determine the link-layer address of a neighbor on the same network (local link), Verify the
reachability of a neighbor and Track neighboring devices.
• uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses

Confidential Reliance Jio Infocomm Limited 49


Lesson 3:
Assigning IP Address Using DHCP

January, 2016

IPv4/IPv6 Overview
Need for a DHCP Server

A Manual IP address assignment in a medium-sized LAN is as Follows:


• Time consuming
• Prone to errors
• Unfavorable to employee mobility

A DHCP IP address assignment in a segmented LAN is as Follows:


• An IP address that is a automatically assigned in accordance with user VLAN settings
• A Centralized IP address allocation that enables consistency across the whole organization.
• Avoid Duplication of IP address and Assign IP address for Limited Period

Confidential Reliance Jio Infocomm Limited 51


DHCP
• DHCP is a client-Server Model.
• A DHCP Server allocated Network Addresses and Delivers Configurations.
• A DHCP Client is a host that requests an IP address and configuration from DHCP Server.
• Work at Application Layer and identify by Port Number 67 (Server) and 68 (Client).
• DHCP Client receives the following parameters on lease:
• IP address
• Subnet mask
• Gateway
• Lease Period
• DNS Server address

Confidential Reliance Jio Infocomm Limited 52


DHCP Operation

Confidential Reliance Jio Infocomm Limited 53


DHCP Operation

Confidential Reliance Jio Infocomm Limited 54


DHCP Relay Agent
• Relay agents are used to forward requests and replies between clients and servers when they are not
on the same physical subnet.
• DHCP servers are setup on per network basis.
• A DHCP relay agent required to forward the DHCP DISCOVER message of one subnet to the DHCP
Server present in the other subnet.
• A Relay agent is able to achieve this by adding its own Address In the gateway IP address field of the
DHCP DISCOVER message from the Client, before forwarding this message as unicast to the DHCP
server in other subnet.

Confidential Reliance Jio Infocomm Limited 55


DHCP Relay Agent

Confidential Reliance Jio Infocomm Limited 56


DHCPv6
• IPV6 Support Two types of Dynamic IPV6 address allocation:
 Stateless auto-configuration using Network Discovery
 State-full Configuration using DHCPv6

• Stateless Auto-Configuration use ICMP Messages to assign IPv6 address


• State-full DHCPv6 uses UDP Port number 546 for client and port number 547 for servers.

Confidential Reliance Jio Infocomm Limited 57


Stateless Auto configuration

• Router Solicitations
At Boot time nodes send router solicitations to promptly receive router advertisements.
Router Solicitation packets:
ICMP Type 133
Source=:: (Unspecified address)
Destination=FF02::2 (All Routers multicast address)

Confidential Reliance Jio Infocomm Limited 58


Stateless Auto configuration

• Router advertisement packet


• ICMP advertisement packet:
• ICMP type 134
• Source-router link-local address
• Destination=FF02::1 (All-node multicast address)
• Data=option, prefix lifetime, auto configuration flag
Confidential Reliance Jio Infocomm Limited 59
DHCPv6

Confidential Reliance Jio Infocomm Limited 60


DHCPv6
1) SOLICIT
 A DHCPv6 client sends a Solicit message to locate DHCPv6 servers.
2) ADVERTISE
 A server sends an Advertise message to indicate that it is available for DHCP service, in response to
a Solicit message received from a client.
3) REQUEST
• A client sends a Request message to request configuration parameters, including IP addresses or
delegated prefixes, from a specific server.
4) REPLY
 A server sends a Reply message containing assigned addresses and configuration parameters in
response to a Solicit, Request, Renew, Rebind message received from a client. A server sends a
Reply message containing configuration parameters in response to an Information-request
message.

Confidential Reliance Jio Infocomm Limited 61


Lesson 4:Routing

January, 2016

Routing
Packets forwarding Process on the Internet
• Client Connects to Internet through Internet Service Provider.
• ISP Collects the Packet from Client and forward these packets towards the destination network.
• Destination is identified using IP address in IP Header.
• Routers are connected to each other on internet. Once Router receive packet, router will lookup routing
table for destination Network address.
• According the routing table, router will forward this packet towards the appropriate next hop router.
• Routing is one of the important process of communications on the internet.

Confidential Reliance Jio Infocomm Limited 63


IP Routing
• Every Router with in Network path must aware about Full internet routing information.
• Every hop with in path need a destination-based routing lookup.

R1 R2 R3

Confidential Reliance Jio Infocomm Limited 64


Type of Routing

Static Routing Dynamic Routing

A Network administrator manually enters A Network routing protocol automatically


static routes in to the router. adjusts dynamic routes when the topology
or traffic changes.

A Network topology change requires a Routers learn and maintain routes to the
manual update to the route. remote destination by exchange routing
updates.

Routing behavior can be precisely Routers discover new networks by sharing


controlled. routing table information.

Confidential Reliance Jio Infocomm Limited 65


Type of Protocols

Routed Protocol Routing Protocol

Protocol by which data can be routed. Protocol by which routing information


exchange.

All hosts on an internetwork are using the Protocol use to between routers only.
service of the Routed Protocol.

Example: IPv4,IPv6 Example: OSPF,ISIS,BGP

Confidential Reliance Jio Infocomm Limited 66


IGP Vs. EGP

Confidential Reliance Jio Infocomm Limited 67


IGP-Interior Gateway Protocol

• Use with to exchange the routing information with in the Autonomous System.
• Interior Gateway Routing Protocol further classified:
• Distance Vector Routing Protocol
• Link State Routing Protocol

Confidential Reliance Jio Infocomm Limited 68


Distance Vector Routing Protocol

• Distance vector use Bellman Ford algorithm.


• Use hop count for best path selection. Route with smaller hop count consider the best path.
• Passes periodic copies of routing table to neighbor routes and accumulates distance vectors
• Example of Distance Vector routing protocol is RIP (Routing Information Protocol).

Confidential Reliance Jio Infocomm Limited 69


Link State Routing Protocol
• Link-State protocols are scalable.
• Use SPF (Shortest Path First Algorithm).
• Each router has a full picture of a topology.
• Updates are sent when a topology change occurs and are re-flooded periodically.
• More information is communicated between routers.
• Link State Routing Protocol Example: IS-IS (Intermediate System-Intermediate System, OSPF (Open
Shortest Path first).

Confidential Reliance Jio Infocomm Limited 70


Link state Routing Protocol (Cont.)

• By default, the cost is calculated based on the interface bandwidth.


• Cost=Reference Bandwidth / Interface Bandwidth
• Best Path chosen based on the cost value.
• Path cost is a cumulated cost of all links on the path to destinations.

Confidential Reliance Jio Infocomm Limited 71


OSPF (Open Shortest Path First)
• Link state routing protocol
• Interior Gateway Routing Protocol
• Develop by the IETF
• Establish adjacency before exchange routing table
• Support hierarchical routing & entire AS divide in areas.
• Routing updates are advertise on multicast address.
• Send Triggered and Incremental update.

Confidential Reliance Jio Infocomm Limited 72


OSPF Hierarchical Network

• OSPF support a hierarchical network structure.


• The two-level hierarchy consists of the following:
• -Backbone area (Area 0)
• -Normal areas

Confidential Reliance Jio Infocomm Limited 73


Lesson 5
IS-IS (Intermediate System-Intermediate System)

January, 2016

Routing
Intermediate-System to Intermediate System

• IS-IS is an Interior Gateway Protocol (IGP) developed in the 1980s by DEC and submitted to the
International Organization for Standardization (ISO) as the routing protocol for Open System
Interconnection (OSI).
• A nonproprietary protocol, large and hierarchical addressing scheme.
• Integrated IS-IS is an IS-IS for multiple protocols (IPv4, IPv6, and CLNS).
• Integrated IS-IS uses its own PDUs to transport IP routing information; updates are not sent in IP
packets.
• Same as OSPF,IS-IS use hierarchical routing, and SPF Algorithm.
• Widely used as IGP in large Service Provider backbone Network.

Confidential Reliance Jio Infocomm Limited 75


IS-IS Features
• Stable protocol for Large ISPs.
• IS-IS was originally designed as the IGP for the Connectionless Network Service (CLNS), part of the OSI
protocol suite.
• The OSI protocol suite layer 3 protocol is the Connectionless Network Protocol (CLNP).
• IS-IS uses CLNS addresses to identify routers and build the LSDB.
• Uses Dijkstra’s SPF algorithm; hast fast convergence.
• Uses hellos to establish adjacencies and LSPs to exchange link-state information.
• Efficient use of bandwidth, memory and processor.

Confidential Reliance Jio Infocomm Limited 76


CLNS Address
• The loopback ip address or (router id) can be encoded to NSAP address Exp: 198.168.13.50

• AFI(Authority and format identifier) set to 49


 Locally administered; thus you can assign your own
addresses.
CLNS Address: 49.0001.1981.6801.3050.00 • Area ID
AFI AREA ID SYSTEM ID NSEL  octets of the area address after the AFI.
• System ID
49 0001 1981.6801.3050 00  Routers require a 6-byte system ID.
• NSEL
 Always set to 00 for a router.
 The CLNS address with the NSEL set to 0 called the
NET (Network Entity Title)address.
Confidential Reliance Jio Infocomm Limited 77
IS-IS Link-state Operation

Supports two routing levels:


Level 1: Builds common topology of system IDs in local area and routes within are using lowest cost path.
Level 2: Exchanges prefix information (area addresses) between areas. Routes traffic to area using lowest-
cost path.
Confidential Reliance Jio Infocomm Limited 78
Identifying Systems in IS-IS: Area Address

• The area address uniquely identifies the


routing area, and the system ID identifies each
node.
• All routers within an area must use the same
area address.
• An ES may be adjacent
to a router only if they share a common area
address.
• Area address is used in Level 2 routing.

Confidential Reliance Jio Infocomm Limited 79


IS-IS Link-State Operation
Routers are identified as Level 1, Level 2, or Level 1-2:
• Level 1 routers use LSPs to build topology for local area.
• Level 2 routers use LSPs to build topology between different areas.
• Level 1-2 routers act as border routers between Level 1 and Level 2 routing domains.
Integrated IS-IS:
• Integrated IS-IS is an IS-IS for multiple protocols (IPv4,IPv6 and CLNS).
• Integrated IS-IS uses its own PDUs to transport IP routing information; updates are not sent in IP
packets.
• Integrated IS-IS requires CLSN address even if it is only routing for IP.

Confidential Reliance Jio Infocomm Limited 80


Why ISIS?

• Support Multiple Network Layer Protocol


OSPF is more closely associated with TCP/IP and is common in IP networks; IS-IS was deployed to
support CLNS (Connectionless Network Service) and IP concurrently in early ISP backbones.

• Less Resource Utilization and Fast-Convergence


IS-IS sends advertisements in a standard form and in a single set of packets. OSPF
advertisements vary based on type and are transmitted by type.

Confidential Reliance Jio Infocomm Limited 81


IS-IS Metric

• Default narrow metrics are limited to 6-Bit interface and 10-bit path metric.
• Wide metrics allow 24-bit interface and 32-bit path metric, but they must be enabled.
• The Default metric is 10 in all interfaces.

R1

R2 R3 RB
RA

Confidential Reliance Jio Infocomm Limited 82


Integrated IS-IS Vs. OSPF: Area Design

• OSPF is based on a Central backbone • In IS-IS the area borders lie on links
with all other areas attached to it. – Each IS-IS router belongs to exactly on are.
• In OSPF the border is inside routers (ABRs). – IS-IS is more flexible when extending the
• Each link belongs to one area. backbone

Confidential Reliance Jio Infocomm Limited 83


Comparison if OSPF and Integrated IS-SI
• OSPF Characteristics • Integrated ISI-IS Characteristics
• Area border inside routers (ABRs) • Area Border on links
• Each link in only one area • Each router in only one area
• More Complex to extended backbone • Simple Extension of backbone
• Many small LSAs sent • Fewer LSPs sent
• Runs on top of IP • Runs on top od the data link layer
• Default metric is scaled by interface bandwidth • Default metric is 10 for all interface
• Not easy to extended • Easy to support new protocol with new tlv tuples
• Equipment personnel and information more readily available • Equipment personnel, and information not as easily available.

Confidential Reliance Jio Infocomm Limited 84


ISIS Benefits over OSPF

• Scalability:
OSPF has a central area, whereas IS-IS has a backbone on top of its areas.
Less Resources Utilization and faster convergence
• Less Resource Utilization and Fast-Convergence
IS-IS sends advertisements in a standard form and in a single set of packets. OSPF
advertisements vary based on type and are transmitted by type.
• Easy Troubleshooting
All Prefix information are sent through single LSP, this help to trace the routing information
announced by particular router.
• Support Multiple Network Layer Protocol
OSPF is more closely associated with TCP/IP and is common in IP networks; IS-IS was deployed to
support CLNS (Connectionless Network Service) and IP concurrently in early ISP backbones.

Confidential Reliance Jio Infocomm Limited 85


ISIS Route Leaking
• Level 1 routers within an IS-IS area by default do not carry any routing information external to the area
they belong to.
• They use a default route to exit the area. While this setup is desirable for scalability reasons, it
interferes with BGP routing and Multiprotocol Label Switching (MPLS) and MPLS-VPN where all BGP
next-hop addresses must be present in the local routing table.
• IS-IS now supports a feature called "route leaking," in which selected Level 2 routes can be advertised
by a Level 1/Level 2 router into Level 1.
• Those leaked routes are specially tagged so they will not be re-advertised into Level 2 by another Level
1/Level 2 router

Confidential Reliance Jio Infocomm Limited 86


Lesson 6
BGP (Border Gateway Protocol)

January, 2016

Routing
Border Gateway Protocol
• BGP is an Exterior Gateway Protocol (EGP) that can exchange routing updates between different
Autonomous Systems, so it operate mainly at the border of an AS.
• BGP is not designed to choose paths based on bandwidth, delay and other metrics, but paths are
chosen based on policy attributes.
• Routing table send in unicast packets to particular neighbor router.
• BGP Run on the top of TCP port number 179.
• BGP Allows to influence the route selection for traffic entering or leaving the AS using different routing
policy.

Confidential Reliance Jio Infocomm Limited 88


BGP- Border Gateway Protocol

Confidential Reliance Jio Infocomm Limited 89


BGP- Border Gateway Protocol
• BGP use TCP as transport mechanism, which provides reliable connection orientated discovery. BGP use
TCP port 179.
• Two routers that are using BGP form a connection with each other and exchange messages to open and
confirm the connection parameters. These two BGP router are called “peer routers” or “neighbors.”
• Each router collects this route from each neighbor that successfully establish an adjacency. BGP peer
initially exchange their full BGP routing tables, incremental updates are sent only after topology
changes in the network occur.
• BGP routers exchange reachability information, called path vector, which are made up of path
attributes. The path vector information includes a list of the complete path, hop by hop BGP AS number
that are necessary to reach destination network.
• The AS Path information is useful to construct graph of loop-free autonomous system, and is used to
identify routing policies so that restrictions on routing behavior can be enforced.

Confidential Reliance Jio Infocomm Limited 90


BGP Characteristics

• Reliable updates: BGP run on top of TCP port 179.


• BGP has no method for dynamic neighbor discovery, all neighbors must be discover
manually using the neighbor command.
• Updates is sent on unicast address to the statically configured neighbors.
• Periodic keepalive messages to verify TCP connectivity.
• Use rich metrics called path attributes.
• Designed to scale huge internetworks & Support VLSM & CIDR.
• Loop free (use BGP split-horizon & AS path list to avoid loops inside AS and between ASs)
• External BGP has admin. distance 20 & Internal BGP has admin. distance 200.
• BGP allows administrators to define policies or rules for how data will flow through the
Autonomous Systems.
• Send Triggered updates batched and rate-limited:5 Seconds for Internal peer, 30 Seconds
for external Peers.
Confidential Reliance Jio Infocomm Limited 91
BGP Characteristics

When BGP is most appropriate?


• An AS allows packets to transit through it to reach other AS (e.g. Service Provider)
• An AS has multiple connections to other AS
• Routing policy & route selection for traffic entering or leaving the AS must be
manipulated
• Customers Connected to more than one service provider.
• Service providers exchanging traffic at an exchange point (CIX,GIX,NAP,and so on)

Confidential Reliance Jio Infocomm Limited 92


AS Number

• 16-bits Number:
• Notation: X (for example, “65001”)
• Public range from 1 to 64511 for use on the Internet
• Private range from 64512 to 65535 can be used in isolated environments

• 32-bit AS number:
• Notation: X.Y (for example,”65100.16”)
• Carried in a new attribute
• Compatible with old Systems:
• AS 23456 used in old AS path represent autonomous systems using new AS number format.
• AS 0.X used to encode old AS number in new AS path attribute

Confidential Reliance Jio Infocomm Limited 93


BGP-External BGP & Internal BGP

EBGP Neighbor
IBGP Neighbor
Confidential Reliance Jio Infocomm Limited 94
BGP Architecture-EBGP

• External BGP:
• When BGP neighbors belong to different autonomous systems they are called EBGP.
• EBGP neighbors, by default, need to be directly connected.
• Peer receives and advertises prefixes to and from remote AS.
• Define neighbors:
• A TCP session (three-way handshake) must be established before starting BGP routing update
exchanges.
• Reachability:
• EBGP neighbors are usually directly connected.
• Different AS number:
• EBGP neighbors must have different AS numbers.

Confidential Reliance Jio Infocomm Limited 95


BGP Architecture-EBGP (Cont.)

Confidential Reliance Jio Infocomm Limited 96


BGP Architecture-IBGP

• Internal BGP:
• IGBP refers to the presence of BGP neighbors within the same AS.
• To carry external routing information across the service provider AS to all routers that
require it.
• The neighbors do not have to be directly connected, because they can be reached
through an IGP.
• Neighbor must be defined on the both sides.
• By Default IBGP updates received are not forwarded to other IBGP neighbors.
• IBGP session required full mesh between all routers within an autonomous system.

Confidential Reliance Jio Infocomm Limited 97


BGP Architecture-IBGP

Confidential Reliance Jio Infocomm Limited 98


IBGP Scalability Issues

• IBGP requires a full mesh between all BGP-Speaking routers:


• Large number of TCP sessions
• Unnecessary duplicate routing traffic
• Configuration overhead
• Solutions:
• Route Reflector modify IBGP split-horizon rules.
• BGP Confederations modify IBGP AS path processing
Confidential Reliance Jio Infocomm Limited 99
BGP Route Reflector

• Classic IBGP:
 IBGP routes are not propagated to
other IBGP peers. • Route reflector can propagate IBGP routes to other
IBGP peers.
 Full mesh of IBGP peers is therefore
required. • Full mesh of IBGP peers is not required.
• Route reflector-based network includes route
reflectors and clients.

Confidential Reliance Jio Infocomm Limited 100


Router Reflector

Confidential Reliance Jio Infocomm Limited 101


Route Reflector (Contd.)

Confidential Reliance Jio Infocomm Limited 102


Route Reflector
• In this Example Router B is the RR. Router B will receive routes from router A and C.
• If the packet needs to get from Router C to A. Router C would have received the route information
through Router A.
• Router C only receive the route from B. This does not mean that the packets will flow through Router B
to get to router A.
• Router B Collect the route from each of the other routers, it would maintain the existing next hop info
and share those routes.

Confidential Reliance Jio Infocomm Limited 103


Thank You

January, 2016

Routing

Вам также может понравиться