IS-IS in Detail. ISP Workshops

Size: px
Start display at page:

Download "IS-IS in Detail. ISP Workshops"

Transcription

1 IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese ( Last updated 27 th November

2 Ackowledgemets p This material origiated from the Cisco ISP/IXP Workshop Programme developed by Philip Smith & Barry Greee p Use of these materials is ecouraged as log as the source is fully ackowledged ad this otice remais i place p Bug fixes ad improvemets are welcomed Please workshop (at) bgp4all.com Philip Smith 2

3 IS-IS Stadards History p ISO specifies OSI IS-IS routig protocol for CLNS traffic A Lik State protocol with a 2 level hierarchical architecture Type/Legth/Value (TLV) optios to ehace the protocol p RFC 1195 added IP support Itegrated IS-IS I/IS-IS rus o top of the Data Lik Layer 3

4 IS-IS Stadards History p RFC5308 adds IPv6 address family support to IS-IS p RFC5120 defies Multi-Topology cocept for IS-IS Permits IPv4 ad IPv6 topologies which are ot idetical (Required for a icremetal roll-out of IPv6 o existig IPv4 ifrastructure) 4

5 ISIS Levels p IS-IS has a 2 layer hierarchy Level-2 (the backboe) Level-1 (the areas) p A router ca be Level-1 (L1) router Level-2 (L2) router Level-1-2 (L1L2) router 5

6 ISIS Levels p Level-1 router Has eighbours oly o the same area Has a level-1 LSDB with all routig iformatio for the area p Level-2 router May have eighbours i the same or other areas Has a Level-2 LSDB with all routig iformatio about iter-area p Level-1-2 router May have eighbours o ay area. Has two separate LSDBs: level-1 LSDB & level-2 LSDB 6

7 Backboe & Areas p IS-IS does ot have a backboe area as such (like OSPF) p Istead the backboe is the cotiguous collectio of Level-2 capable routers p IS-IS area borders are o liks, ot routers p Each router is idetified with a uique Network Etity Title (NET) NET is a Network Service Access Poit (NSAP) where the - selector is 0 (Compare with each router havig a uique Router-ID with IP routig protocols) 7

8 Example: L1, L2, ad L1L2 Routers L1-oly L1L2 Area 3 Area 2 L1L2 L1-oly L1L2 L2-oly Area 4 Area 1 L1L2 L1L2 L1-oly L1-oly 8

9 NSAP ad Addressig IDP DSP AFI IDI High Order DSP System ID NSEL Variable legth Area address 6 bytes 1 byte p NSAP: Network Service Access Poit Total legth betwee 8 ad 20 bytes Area Address: variable legth field (up to 13 bytes) System ID: defies a ES or IS i a area. NSEL: N-selector; idetifies a etwork service user (trasport etity or the IS etwork etity itself) p NET: the address of the etwork etity itself 9

10 Addressig Commo Practices p ISPs typically choose NSAP addresses thus: First 8 bits pick a umber (usually 49) Next 16 bits area Next 48 bits router loopback address Fial 8 bits zero p Example: NSAP: Router: (loopback) i Area 1 10

11 Addressig & Desig Practices p ISPs usually oly use oe area Multiple areas oly come ito cosideratio oce the etwork is several hudred routers big p NET begis with 49 Private address rage p All routers are i L2 oly Note that Cisco IOS default is L1L2 Set L2 uder IS-IS geeric cofiguratio (ca also be doe per iterface) 11

12 Typical ISP Desig PoP PoP PoP PoP All routers are i L2 oly ad oly oe area is used 12

13 Adjacecies p Hello Protocol Data Uits (PDUs) are exchaged betwee routers to form adjacecies ISIS adjacecy through IIH p Area addresses are exchaged i IIH PDUs Itermediate-System to Itermediate System Hello PDUs (PDU is IS-IS equivalet of a packet) 13

14 Lik State PDU (LSP) p Each router creates a LSP ad floods it to eighbours p A level-1 router will create level-1 LSP(s) p A level-2 router will create level-2 LSP(s) p A level-1-2 router will create level-1 LSP(s) ad level-2 LSP(s) 14

15 The IS-IS LSP p LSPs have a Fixed Header ad TLV coded cotets p The LSP header cotais LSP-id (Sequece umber) Remaiig Lifetime (Checksum) Type of LSP (level-1, level-2) Attached bit (Overload bit) p The LSP cotets are coded as TLV (Type, Legth, Value) Area addresses IS eighbours Autheticatio Iformatio 15

16 Lik State Database Cotet p Each router maitais a separate LSDB for level-1 ad level-2 LSPs p The LSDB cotais: LSP headers ad cotets SRM bits: set per iterface whe router has to flood this LSP SSN bits: set per iterface whe router has to sed a PSNP for this LSP 16

17 Floodig of LSPs p New LSPs are flooded to all eighbors p All routers get all LSPs p Each LSP has a sequece umber p There are 2 kids of floodig: Floodig o a p2p lik Floodig o LAN 17

18 Floodig o a p2p lik p Oce the adjacecy is established both routers sed CSNP packet p Missig LSPs are set by both routers if ot preset i the received CSNP p Missig LSPs may be requested through PSNP 18

19 Floodig o a LAN p Each LAN has a Desigated Router (DIS) p The DIS has two tasks Coductig the floodig over the LAN Creatig ad updatig a special LSP describig the LAN topology (Pseudoode LSP) p DIS electio is based o priority Best practice is to select two routers ad give them higher priority the i case of failure oe provides determiistic backup for the other Tie break is by the highest MAC address 19

20 Floodig o a LAN p DIS coducts the floodig over the LAN p DIS multicasts CSNP every 10 secods p All routers o the LAN check the CSNP agaist their ow LSDB (ad may ask specific re-trasmissios with PSNPs) 20

21 Complete Sequece Number PDU p Describes all LSPs i your LSDB (i rage) p If the LSDB is large, multiple CSNPs are set p Used o 2 occasios: Periodic multicast by DIS (every 10 secods) to sychroise the LSDB over LAN subets O p2p liks whe lik comes up 21

22 Partial Sequece Number PDUs p PSNPs Exchaged o p2p liks (ACKs) p Two fuctios Ackowledge receipt of a LSP Request trasmissio of latest LSP p PSNPs describe LSPs by its header LSP idetifier Sequece umber Remaiig lifetime LSP checksum 22

23 Network Desig Issues p As i all IP etwork desigs, the key issue is the addressig lay-out p ISIS supports a large umber of routers i a sigle area p Whe etwork is so large requirig the use of areas, use summary-addresses p >400 routers i the backboe is quite doable 23

24 Network Desig Issues p Lik cost Default o all iterfaces is 10 (Compare with OSPF which sets cost accordig to lik badwidth) Maually cofigured accordig to routig strategy p Summary address cost Equal to the best more specific cost Plus cost to reach eighbour of best specific p Backboe has to be cotiguous Esure cotiuity by redudacy p Area partitioig Desig so that backboe ca NOT be partitioed 24

25 Scalig Issues p Areas vs. sigle area Use areas where p sub-optimal routig is ot a issue p areas with oe sigle exit poit p Start with L2-oly everywhere Future implemetatio of level-1 areas will be easier Backboe cotiuity is esured from start 25

26 IS-IS i Detail ISP Workshops 26

Transitioning to BGP

Transitioning to BGP Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April

More information

IS-IS for IPv6. ISP Workshops

IS-IS for IPv6. ISP Workshops IS-IS for IPv6 ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 8 th April 2018

More information

Introduction to OSPF. ISP Training Workshops

Introduction to OSPF. ISP Training Workshops Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged

More information

IS-IS for ISPs. ISP Workshops

IS-IS for ISPs. ISP Workshops IS-IS for ISPs ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 21 st April 2017

More information

IPv6 Routing Protocols. ISP Training Workshops

IPv6 Routing Protocols. ISP Training Workshops IPv6 Routig Protocols ISP Traiig Workshops 1 Iitial IPv6 Cofiguratio for Cisco IOS 2 IPv6 Cofiguratio o Cisco IOS p To eable IPv6 the followig global commads are required: Router(cofig)# ipv6 uicast-routig

More information

Deploying 32-bit ASNs

Deploying 32-bit ASNs Deployig 32-bit ASNs ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 26 th September

More information

The Value of Peering

The Value of Peering The Value of Peerig ISP/IXP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 25 th

More information

Routing Protocol - IS-IS

Routing Protocol - IS-IS Routing Protocol - IS-IS What is IS-IS? Intermediate System to Intermediate System intra-domain routing protocol :: IS, ES Is a Link State Protocol Is a dynamic routing protocol based on SPF routing algorithm

More information

Introduction to IS-IS

Introduction to IS-IS Introduction to IS-IS ISP Workshops Last updated 28 November 2013 1 IS-IS p Intermediate System to Intermediate System p ISO 10589 specifies OSI IS-IS routing protocol for CLNS traffic n A Link State protocol

More information

BGP Attributes and Path Selection. ISP Training Workshops

BGP Attributes and Path Selection. ISP Training Workshops BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics

More information

ISP Systems Design. ISP Workshops

ISP Systems Design. ISP Workshops ISP Systems Desig ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April

More information

IS-IS Operation. SANOG July, 2017 Gurgaon, INDIA

IS-IS Operation. SANOG July, 2017 Gurgaon, INDIA IS-IS Operation SANOG 30 14-18 July, 2017 Gurgaon, INDIA IS-IS Intermediate System to Intermediate System Designed for OSI networks to carry CLNS traffic (RFC1142 - ISO 10859) CLNP was to OSI, what IPv4/IPv6

More information

IPv6 Deployment Planning

IPv6 Deployment Planning IPv6 Deploymet Plaig ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 5 th July

More information

BSCI. Section 5. Intermediate System-to- Intermediate System (IS-IS)

BSCI. Section 5. Intermediate System-to- Intermediate System (IS-IS) BSCI Section 5 Intermediate System-to- Intermediate System () Intermediate System-to-Intermediate System () is a routing protocol developed by the ISO. It is a link-state protocol and behaves much like

More information

IS-IS basic configuration 37 DIS election configuration 41 Configuring IS-IS route redistribution 45 IS-IS GR configuration example 49 IS-IS FRR

IS-IS basic configuration 37 DIS election configuration 41 Configuring IS-IS route redistribution 45 IS-IS GR configuration example 49 IS-IS FRR Contents Configuring IS-IS 1 IS-IS overview 1 Basic concepts 1 IS-IS area 3 IS-IS network type 5 IS-IS PDUs 6 Supported IS-IS features 13 Protocols and standards 15 IS-IS configuration task list 16 Configuring

More information

IPv6 Deployment Planning

IPv6 Deployment Planning IPv6 Deploymet Plaig ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 8 th April

More information

Introduction to The Internet

Introduction to The Internet Itroductio to The Iteret ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 13 th

More information

IS-IS for ISPs. ISP Workshops. Last updated 25 th August 2015

IS-IS for ISPs. ISP Workshops. Last updated 25 th August 2015 IS-IS for ISPs ISP Workshops Last updated 25 th August 2015 1 Configuring IS-IS in Cisco IOS p Starting IS-IS in Cisco IOS router isis [name] n Where the optional name can specify the name of the ISIS

More information

The IPv6 Protocol & IPv6 Standards

The IPv6 Protocol & IPv6 Standards The IPv6 Protocol & IPv6 Stadards ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated

More information

Switch Construction CS

Switch Construction CS Switch Costructio CS 00 Workstatio-Based Aggregate badwidth /2 of the I/O bus badwidth capacity shared amog all hosts coected to switch example: Gbps bus ca support 5 x 00Mbps ports (i theory) I/O bus

More information

Comparing IS-IS and OSPF

Comparing IS-IS and OSPF Comaring IS-IS and OSPF ISP Workshos These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (htt://creativecommons.org/licenses/by-nc/4.0/) Last udated

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

The IPv6 Protocol & IPv6 Standards

The IPv6 Protocol & IPv6 Standards The IPv6 Protocol & IPv6 Stadards ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

Introduction to ISIS. ISP/IXP Workshops. 1999, Cisco Systems, Inc.

Introduction to ISIS. ISP/IXP Workshops. 1999, Cisco Systems, Inc. Introduction to ISIS ISP/IXP Workshops 1999, Cisco Systems, Inc. 1 Acknowledgements Thanks to Stefano Previdi Any questions 2 Basic ISIS 3 ISIS - Intermediate System to Intermediate

More information

Integrated IS-IS CHAPTER 4. ISO Network Entity Title (NET)

Integrated IS-IS CHAPTER 4. ISO Network Entity Title (NET) CHAPTER 4 Integrated IS-IS This chapter provides information and commands concerning the following Intermediate System-to-Intermediate System (IS-IS) topics: ISO Network Entity Title (NET) Rules for creating

More information

K-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns

K-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns K-NET bus The K-Net bus is based o the SPI bus but it allows to addressig may differet turrets like the I 2 C bus. The K-Net is 6 a wires bus (4 for SPI wires ad 2 additioal wires for request ad ackowledge

More information

Configuring Integrated IS-IS Protocol Shutdown Support Maintaining Configuration Parameters

Configuring Integrated IS-IS Protocol Shutdown Support Maintaining Configuration Parameters Configuring Integrated IS-IS Protocol Shutdown Support Maintaining Configuration Parameters The Integrated IS-IS Protocol Shutdown Support Maintaining Configuration Parameters feature allows you to disable

More information

ABR (Area Border Router), 206, 216 access, dedicated networks, 23 access layer, three-layer hierarchical design model, 6

ABR (Area Border Router), 206, 216 access, dedicated networks, 23 access layer, three-layer hierarchical design model, 6 1358_fmi.book Page 460 Thursday, May 27, 2004 2:21 PM A ABR (Area Border Router), 206, 216 access, dedicated networks, 23 access layer, three-layer hierarchical design model, 6 access lists, scalable networks,

More information

IS-IS Overview and Basic Configuration

IS-IS Overview and Basic Configuration This module provides a technical overview of the Integrated Intermediate System-to-Intermediate System (IS-IS) routing protocol. IS-IS is a link-state Interior Gateway Protocol (IGP). Link-state protocols

More information

IS-IS. About IS-IS. About NET. This chapter describes the Intermediate System to Intermediate System (IS-IS) routing protocol.

IS-IS. About IS-IS. About NET. This chapter describes the Intermediate System to Intermediate System (IS-IS) routing protocol. This chapter describes the Intermediate System to Intermediate System () routing protocol. About, page 1 Prerequisites for, page 8 Guidelines for, page 8 Configure, page 8 Monitoring, page 23 History for,

More information

Simple Multihoming. ISP Training Workshops

Simple Multihoming. ISP Training Workshops Simple Multihomig ISP Traiig Workshops 1 Why Multihome? p Redudacy Oe coectio to iteret meas the etwork is depedet o: p Local router (cofiguratio, software, hardware) p WAN media (physical failure, carrier

More information

Course Information. Details. Topics. Network Examples. Overview. Walrand Lecture 1. EECS 228a. EECS 228a Lecture 1 Overview: Networks

Course Information. Details. Topics. Network Examples. Overview. Walrand Lecture 1. EECS 228a. EECS 228a Lecture 1 Overview: Networks Walrad Lecture 1 Course Iformatio Lecture 1 Overview: Networks Jea Walrad www.eecs.berkeley.edu/~wlr Istructor: Jea Walrad Office Hours: M-Tu 1:00-2:00 Time/Place: MW 2:00-3:30 i 285 Cory Home Page: http://wwwist.eecs.berkeley.edu/~ee228a

More information

802.1ad Provider & Provider Edge Bridges

802.1ad Provider & Provider Edge Bridges 802.ad rovider & rovider Edge Bridges age rovider Bridge rovider Edge Bridge Customer Systems S-VLAN S-VLAN E E E E C-VLAN C-VLAN CE CE C-tagged C-tagged S-tagged port based B & BB models / 2006-0-0 budlig/multiplexig

More information

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Introduction to Network Technologies & Layered Architecture BUPT/QMUL Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network

More information

IPv6 Routing Protocols

IPv6 Routing Protocols IPv6 Routing Protocols ITU/APNIC/PacNOG21 IPv6 Workshop 4 th 8 th December 2017 Nuku alofa These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

Integrated IS-IS Commands

Integrated IS-IS Commands Integrated IS-IS Commands Use the commands in this chapter to configure and monitor the Intermediate System-to-Intermediate System (IS-IS) protocol. For IS-IS configuration information and examples, refer

More information

IPv6 Addressing. ISP Workshops

IPv6 Addressing. ISP Workshops IPv6 Addressig ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 12 th April 2018

More information

MPLS Core Networks Николай Милованов/Nikolay Milovanov

MPLS Core Networks Николай Милованов/Nikolay Milovanov Tuning Core Routing Protocols Николай Милованов/Nikolay Milovanov Contents ISIS overview ISIS tuning http://niau.org 2 ISIS overview 3 IP routing design requirements Requirements towards the IGP protocols:

More information

Message Integrity and Hash Functions. TELE3119: Week4

Message Integrity and Hash Functions. TELE3119: Week4 Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

5288_index Page 293 Tuesday, September 10, :05 PM. Index

5288_index Page 293 Tuesday, September 10, :05 PM. Index 5288_index Page 293 Tuesday, September 10, 2002 4:05 PM Index A Access layer, 174 Adjacency(ies), 23-25 Level 1 and Level 2, 76-77 three-way handshake to establish, 72-74 Administrative Group (Color) sub-

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

L I N U X. Unit 6 S Y S T E M DHCP & DNS (BIND) A D M I N I S T R A T I O n DPW

L I N U X. Unit 6 S Y S T E M DHCP & DNS (BIND) A D M I N I S T R A T I O n DPW it 6 HCP & (B) oa Warre HCP ervice yamically assigs a P address to requestig machies P addresses are leased scope of addresses ca be assiged or excluded from assigmet HCP servers do ot talk to each other

More information

Comparing IS-IS and OSPF

Comparing IS-IS and OSPF Comaring IS-IS and OSPF ISP Workshos Last udated 8 th Setember 2016 1 Comaring IS-IS and OSPF Both are Link State Routing Protocols using the Dijkstra SPF Algorithm So what s the difference then? And why

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

Passit4Sure.4A Questions 4A Alcatel-Lucent Interior Routing Protocols and High Availability

Passit4Sure.4A Questions 4A Alcatel-Lucent Interior Routing Protocols and High Availability Passit4Sure.4A0-101.300Questions Number: 4A0-101 Passing Score: 800 Time Limit: 120 min File Version: 7.5 http://www.gratisexam.com/ 4A0-101 Alcatel-Lucent Interior Routing Protocols and High Availability

More information

IPv6 Protocols & Standards. ISP Training Workshops

IPv6 Protocols & Standards. ISP Training Workshops IPv6 Protocols & Stadards ISP Traiig Workshops 1 So what has really chaged? p Expaded address space Address legth quadrupled to 16 bytes p Header Format Simplificatio Fixed legth, optioal headers are daisy-chaied

More information

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1 Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

IPv6 Deployment Study

IPv6 Deployment Study IPv6 Deploymet Study ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 8 th April

More information

IPv6 Routing Protocol Security

IPv6 Routing Protocol Security IPv6 Routig Protocol Security ITU/APNIC/PacNOG21 IPv6 Workshop 4 th 8 th December 2017 Nuku alofa These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/)

More information

CCIE Routing and Switching v4.0

CCIE Routing and Switching v4.0 Table of Cotets CCIE Routig ad Switchig v4.0 Quick Referece Brad Ellis Jacob Uecker Steve Meas Chapter 1 Geeral Networkig Theory...2 Chapter 2 Bridgig ad LAN Switchig... 11 Chapter 3 IP Addressig... 30

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

IPv6 Addressing. ISP Workshops

IPv6 Addressing. ISP Workshops IPv6 Addressig ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 21 st October

More information

Τεχνολογία Λογισμικού

Τεχνολογία Λογισμικού ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr

More information

Configuring IS IS for IP on Cisco Routers

Configuring IS IS for IP on Cisco Routers Configuring IS IS for IP on Cisco Routers Document ID: 13795 Contents Introduction Prerequisites Requirements Components Used Conventions IS IS Sample Configuration Network Diagram Configurations Monitoring

More information

ISP Network Design. ISP Workshops

ISP Network Design. ISP Workshops ISP Network Desig ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th February

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Windows Server 2008 R2 networking

Windows Server 2008 R2 networking Chapter3 Widows Server 2008 R2 etworkig Orgaizatios large ad small deped o computer etworks to operate their busiesses. Employees require aywhere access to data, while cliets ad busiess parters demad ehaced

More information

Cisco Building Scaleable Cisco Internetworks (BSCI) Practice Test. Version https://certkill.com

Cisco Building Scaleable Cisco Internetworks (BSCI) Practice Test. Version https://certkill.com Cisco 642-901 642-901 Building Scaleable Cisco Internetworks (BSCI) Practice Test Version 2.12 QUESTION NO: 1 Cisco 642-901: Practice Exam A company has a BGP network and a BGP route of 196.27.125.0/24

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

On (K t e)-saturated Graphs

On (K t e)-saturated Graphs Noame mauscript No. (will be iserted by the editor O (K t e-saturated Graphs Jessica Fuller Roald J. Gould the date of receipt ad acceptace should be iserted later Abstract Give a graph H, we say a graph

More information

Vendor: Alcatel-Lucent. Exam Code: 4A Exam Name: Alcatel-Lucent Interior Routing Protocols and High Availability.

Vendor: Alcatel-Lucent. Exam Code: 4A Exam Name: Alcatel-Lucent Interior Routing Protocols and High Availability. Vendor: Alcatel-Lucent Exam Code: 4A0-101 Exam Name: Alcatel-Lucent Interior Routing Protocols and High Availability Version: Demo QUESTION 1 When a router receives an IP packet, but does not find a match

More information

University of North Carolina at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS. Sravanthi Chalasani

University of North Carolina at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS. Sravanthi Chalasani Uiversity of North Carolia at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS Overview Itroductio History of smart cards Types of smart cards Categories of smart cards Smart Card Stadards SLE4442

More information

Migrating from OSPF to IS-IS

Migrating from OSPF to IS-IS Migrating from OSPF to IS-IS Philip Smith philip@nsrc.org SAFNOG 2 7 th -8 th April 2015 Mbabane Last updated 27 March 2014 1 Presentation slides p Available at: n http://bgp4all.com/ftp/seminars/safnog2-

More information

Routing Protocols. Technology Description BGP CHAPTER

Routing Protocols. Technology Description BGP CHAPTER CHAPTER 11 This chapter describes the level of support that Cisco ANA provides for routing protocols, as follows: Technology Description, page 11-1 Information Model Objects (IMOs), page 11-3 Vendor-Specific

More information

n n B. How many subsets of C are there of cardinality n. We are selecting elements for such a

n n B. How many subsets of C are there of cardinality n. We are selecting elements for such a 4. [10] Usig a combiatorial argumet, prove that for 1: = 0 = Let A ad B be disjoit sets of cardiality each ad C = A B. How may subsets of C are there of cardiality. We are selectig elemets for such a subset

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

Graphs ORD SFO LAX DFW. Lecture notes adapted from Goodrich and Tomassia. 3/14/18 10:28 AM Graphs 1

Graphs ORD SFO LAX DFW. Lecture notes adapted from Goodrich and Tomassia. 3/14/18 10:28 AM Graphs 1 Graphs 337 1843 1743 1233 802 Lecture otes adapted from Goodrich ad Tomassia 3/14/18 10:28 AM Graphs 1 Graph A graph is a pair (V, E), where V is a set of odes, called vertices E is a collectio of pairs

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

HP Firewalls and UTM Devices

HP Firewalls and UTM Devices HP Firewalls and UTM Devices Appendix Protocol Reference Part number: 5998-4171 Software version: F1000-A-EI: Feature 3722 F1000-S-EI: Feature 3722 F5000: Feature 3211 F1000-E: Feature 3174 Firewall module:

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 22 Database Recovery Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Recovery algorithms Recovery cocepts Write-ahead

More information

Configuring ISO CLNS

Configuring ISO CLNS Configuring ISO CLNS First Published: March 01, 2004 Last Updated: February 26, 2010 The International Organization for Standardization (ISO) Connectionless Network Service (CLNS) protocol is a standard

More information

Configuring ISO CLNS. Understanding Addresses

Configuring ISO CLNS. Understanding Addresses Configuring ISO CLNS The International Organization for Standardization (ISO) Connectionless Network Service (CLNS) protocol is a standard for the network layer of the Open System Interconnection (OSI)

More information

Algorithm Design Techniques. Divide and conquer Problem

Algorithm Design Techniques. Divide and conquer Problem Algorithm Desig Techiques Divide ad coquer Problem Divide ad Coquer Algorithms Divide ad Coquer algorithm desig works o the priciple of dividig the give problem ito smaller sub problems which are similar

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

Our second algorithm. Comp 135 Machine Learning Computer Science Tufts University. Decision Trees. Decision Trees. Decision Trees.

Our second algorithm. Comp 135 Machine Learning Computer Science Tufts University. Decision Trees. Decision Trees. Decision Trees. Comp 135 Machie Learig Computer Sciece Tufts Uiversity Fall 2017 Roi Khardo Some of these slides were adapted from previous slides by Carla Brodley Our secod algorithm Let s look at a simple dataset for

More information

log-adjacency-changes (IS-IS), on page 3 lsp-full suppress, on page 4 lsp-refresh-interval (IS-IS), on page 9

log-adjacency-changes (IS-IS), on page 3 lsp-full suppress, on page 4 lsp-refresh-interval (IS-IS), on page 9 log-adjacency-changes (IS-IS), on page 3 lsp-full suppress, on page 4 lsp-gen-interval (IPX), on page 6 lsp-gen-interval (IS-IS), on page 7 lsp-refresh-interval (IS-IS), on page 9 max-area-addresses, on

More information

CS 111: Program Design I Lecture 19: Networks, the Web, and getting text from the Web in Python

CS 111: Program Design I Lecture 19: Networks, the Web, and getting text from the Web in Python CS 111: Program Desig I Lecture 19: Networks, the Web, ad gettig text from the Web i Pytho Robert H. Sloa & Richard Warer Uiversity of Illiois at Chicago April 3, 2018 Goals Lear about Iteret Lear about

More information

Cluster Analysis. Andrew Kusiak Intelligent Systems Laboratory

Cluster Analysis. Andrew Kusiak Intelligent Systems Laboratory Cluster Aalysis Adrew Kusiak Itelliget Systems Laboratory 2139 Seamas Ceter The Uiversity of Iowa Iowa City, Iowa 52242-1527 adrew-kusiak@uiowa.edu http://www.icae.uiowa.edu/~akusiak Two geeric modes of

More information

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000. 5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator

More information

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

IPv6 Routing: IS-IS Support for IPv6

IPv6 Routing: IS-IS Support for IPv6 This module describes how to configure Integrated Intermediate System-to-Intermediate System (IS-IS) for IPv6. IS-IS is an Interior Gateway Protocol (IGP) that advertises link-state information throughout

More information

Cisco CCNP Switch ( ) LearnSmart Exam Manual Copyright 2011 by LearnSmart, LLC. Product ID: Production Date: November 10, 2011

Cisco CCNP Switch ( ) LearnSmart Exam Manual Copyright 2011 by LearnSmart, LLC. Product ID: Production Date: November 10, 2011 Maual Cisco Cisco CCNP Switch (642-813) LearSmart Maual Copyright 2011 by LearSmart, LLC. Product ID: 12377 Productio Date: November 10, 2011 All rights reserved. No part of this documet shall be stored

More information

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio

More information

ISO CLNS Configuration Guide

ISO CLNS Configuration Guide ISO CLNS Configuration Guide Cisco IOS XE Release 3S Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)

More information

Computers and Scientific Thinking

Computers and Scientific Thinking Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput

More information

IP Routing: ISIS Configuration Guide

IP Routing: ISIS Configuration Guide Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

Weston Anniversary Fund

Weston Anniversary Fund Westo Olie Applicatio Guide 2018 1 This guide is desiged to help charities applyig to the Westo to use our olie applicatio form. The Westo is ope to applicatios from 5th Jauary 2018 ad closes o 30th Jue

More information

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 10 Defiig Classes Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 10.1 Structures 10.2 Classes 10.3 Abstract Data Types 10.4 Itroductio to Iheritace Copyright 2015 Pearso Educatio,

More information

Greedy Algorithms. Interval Scheduling. Greedy Algorithms. Interval scheduling. Greedy Algorithms. Interval Scheduling

Greedy Algorithms. Interval Scheduling. Greedy Algorithms. Interval scheduling. Greedy Algorithms. Interval Scheduling Greedy Algorithms Greedy Algorithms Witer Paul Beame Hard to defie exactly but ca give geeral properties Solutio is built i small steps Decisios o how to build the solutio are made to maximize some criterio

More information

On Signaling Efficiency for Call Setup in all-ip Wireless Networks

On Signaling Efficiency for Call Setup in all-ip Wireless Networks O Sigalig Efficiecy for Call Setup i all-ip Wireless Networks Miguel Melyk ad Admela Juka Uiversity of Illiois at Urbaa Champaig {mmelyk2, juka}@uiuc.edu Abstract This paper aalyzes the sigalig efficiecy

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13 CIS Data Structures ad Algorithms with Java Sprig 08 Stacks ad Queues Moday, February / Tuesday, February Learig Goals Durig this lab, you will: Review stacks ad queues. Lear amortized ruig time aalysis

More information