This document discusses configuring and troubleshooting single-area OSPF routing. It covers topics like:
- Configuring static and dynamic routing on distribution and core routers
- Configuring and verifying single-area OSPF
- Designated router election process for multiaccess networks
- Propagating default static routes in OSPF
- Securing OSPF with message digest 5 authentication
- Components of troubleshooting single-area OSPF like forming adjacencies and transitioning states
This document provides an overview of advanced OSPF configurations and troubleshooting techniques. It discusses how to optimize OSPF in multiaccess networks using the designated router (DR) and backup designated router (BDR). It also covers how to propagate default routes in OSPF, fine-tune OSPF interfaces, and troubleshoot common OSPF issues. Troubleshooting steps include verifying neighbor states, routing tables, and using commands like show ip ospf neighbor to analyze the OSPF neighbor table.
The document describes migrating from OSPF to IS-IS as an IGP. It begins by discussing the preparation needed, such as verifying OSPF configuration, deploying IS-IS across the entire backbone, and setting OSPF's administrative distance higher than IS-IS. Next, it details removing any remaining OSPF configuration and confirming IS-IS is operating correctly before fully removing OSPF. The goal is a smooth migration to using a single IGP of IS-IS for both IPv4 and IPv6 routing.
This document discusses BGP and its evolution. It notes that BGP is proven to scale with internet traffic growth and many services are moving to use BGP. It also provides an overview of SDN and how Cisco sees BGP being used as an abstraction method through its approach of abstraction and orchestration using APIs. Key points covered include BGP's simplicity, extensibility, high availability and role in transporting various services.
弍亠仗亠亠仆亳亠 弍亠亰仂仗舒仆仂亳 亠亳 仂仗亠舒仂舒 于磶亳 仗仂仄仂 BGP FlowSpecCisco Russia
油
The document discusses using BGP FlowSpec to provide network security for an internet service provider. It begins with an introduction to BGP FlowSpec, describing its components and how rules are distributed using BGP. It then covers using BGP FlowSpec for different DDoS mitigation scenarios, including stateless amplification attacks, stateless L3/L4 attacks, and stateful attacks targeting application resources. Configuration and other use cases are also briefly mentioned.
The document provides an overview of the Open Shortest Path First (OSPF) routing protocol. It describes key OSPF concepts like link-state routing, shortest path first algorithm, areas, border routers, link-state advertisements, authentication, and route redistribution. It also covers OSPF configuration and design considerations for building large networks.
The document provides information on configuring the OSPF routing protocol. It discusses OSPF link-state routing concepts, areas, adjacencies, and the SPF algorithm. It also covers configuring OSPF on routers, including enabling OSPF routing, defining network statements, and setting the OSPF router ID using a loopback interface or router-id command. Debugging OSPF packets is demonstrated using the debug ip ospf packet command.
The document discusses OSPF link-state routing protocol. It describes OSPF's use of link-state databases containing topology information and Dijkstra's algorithm to calculate the shortest path to all destinations. It also explains OSPF's hierarchical area-based network structure and use of link-state advertisements to exchange routing information between neighbors.
This document provides instructor materials for teaching a chapter on single-area OSPF. It includes best practices for teaching the topic, such as using Packet Tracer demonstrations and having students draw diagrams. It also outlines the sections and objectives covered in the chapter, which are enabling and configuring both single-area OSPFv2 and OSPFv3. Verification commands are also discussed.
OSPF is a routing protocol for Internet Protocol (IP) networks. It uses a link state routing (LSR) algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). It is defined as OSPF Version 2 for IPv4. The updates for IPv6 are specified as OSPF Version 3. OSPF is perhaps the most widely used interior gateway protocol (IGP) in large enterprise networks.
- IS-IS is an intermediate system to intermediate system (IS-IS) routing protocol that uses link state packets (LSPs) to advertise routing information within an autonomous system.
- It runs the shortest path first (SPF) algorithm on the link state database to determine the best paths to destinations. Areas and levels are used to structure large IS-IS networks hierarchically.
- IS-IS is similar to OSPF in using areas, SPF algorithm, and link state flooding but differs in packet formats, database structures, backbone definitions, and neighbor establishment.
The document discusses SRv6 (Segment Routing IPv6) network programming and deployment use cases. It provides an overview of SRv6, including how it encodes the network path in packet headers, its scalability benefits, and support across industry. Specific functions of SRv6 LocalSIDs are explained, along with examples of fast reroute protection, traffic engineering, VPN overlays, and centralized vs distributed control planes. SRv6 is proposed as a simplification that can eliminate protocols for various use cases.
Segment Routing Technology Deep Dive and Advanced Use CasesCisco Canada
油
The document provides an overview of Segment Routing technologies including SRv6. It begins with a recap of Segment Routing concepts and how it simplifies network operations. It then covers SRv6 which extends Segment Routing to IPv6 networks to take advantage of growing IPv6 adoption. The document discusses how SRv6 can further simplify networks and support new services and traffic patterns from 5G, IoT, and container-based microservices.
This document provides an overview of routing protocols RIP and OSPF, access lists, and frame relay configuration in Cisco routers. It summarizes the key features of RIP and OSPF, including how they calculate routes differently. Configuration steps are shown for implementing routing protocols, access lists to filter traffic, and frame relay. The document concludes that future work will involve studying additional routing protocols and frame relay in more depth.
PLNOG 13: Jeff Tantsura: Programmable and Application aware IP/MPLS networkingPROIDEA
油
Jeff Tantsura Head of Technology Strategy Routing at Ericsson & WG Chair of RTGWG at IETF. Jeff has over 20 years of experience in the design and implementation of complex internet products and solutions, as well as 7+ years in Product Management. Skill set includes an expert level of knowledge of IP/MPLS networking and SDN solutions as well as ability to monetize it. More than 10 patents/applications mostly in IP Routing Fast Convergence area, some L2 (SPB/EVPN). Active contributor to the IETF (chairing Routing Area Working Group): authoring/co-authoring 20+ IETF documents: routing, MPLS, MULTICAST, L2VPN and PCE WGs. Frequent speaker at internal and public events.
Topic of Presentation: Programmable and Application aware IP/MPLS networking
Language: English
Abstract: The session will cover the topic of controlling and managing IP / MPLS architecture using SDN. The concept of Segment Routing (SR) will be presented as this is currently a subject of IETF standardization. The Segment Routing protocol extends the existing set of IP / MPLS-oriented mechanisms to control network using the SDN controller. The concept of support for Segment Routing based on Open Daylight architecture will be shown. Jeff will present examples of Segment Routing applications such as: optimization of the network in near real-time, network applications optimized angle and multi-tenant environment, segment routing and packet optical networks. Jeff Tantsura (speaker) is the co-author of emerging standardization documents relating to Segment Routing.
Cisco Connect Montreal 2017 - Segment Routing - Technology Deep-dive and Adva...Cisco Canada
油
This document provides an overview of Segment Routing (SR) and SRv6. It begins with a recap of SR basics like segment types and how segments are encoded in MPLS labels or IPv6 headers. It then covers SRv6 which uses an IPv6 routing header to encode segments for source routing. The document explains how SRv6 simplifies networking by eliminating the need for overlay protocols and protocols like RSVP. It details the SRv6 header format and how packets are processed hop-by-hop through the segment list.
This document provides an overview of basic network and routing concepts for the CCNP ROUTE certification. It discusses differentiating between dynamic routing protocols, network types including non-broadcast multi-access networks, connecting remote locations using various technologies, and understanding how different traffic types and overlay networks influence routing. The objectives cover routing protocols, branch connectivity options, and IPv6 neighbor discovery.
Routing protocols like RIP are used between routers to determine the best paths and maintain routing tables. RIP is a distance vector routing protocol that uses hop count as the metric to select routes. It broadcasts routing updates every 30 seconds. RIPv1 is classful while RIPv2 is classless and supports VLSM and route summarization. The router rip command enables the RIP process while network identifies participating interfaces.
The document discusses Open Shortest Path First (OSPF) routing protocol. It covers basic OSPF configuration, establishing OSPF neighbor relationships, OSPF message types, OSPF operation overview including building the routing table, and optimizing OSPF adjacencies on multiaccess networks. The key aspects are electing a designated router and backup designated router to reduce routing update traffic and ensure synchronized link-state databases across all routers.
This document discusses IP addressing, subnet masks, default gateways, and the organizations that manage IP addresses. It describes public and private IP addresses and the different IP address classes. It also provides an overview of the 7-layer OSI model and describes each layer's function. Finally, it mentions some common protocol port numbers and introduces Cisco routers and switches.
Zenith Networks is a network integration services company that has been providing LAN, WAN, routing, switching, and security services for 27 years. They are a partner of Juniper Networks and are headquartered in Philadelphia, PA. The document provides information on Zenith Networks' services and certifications, as well as background on their partner Juniper Networks. It also includes steps to access education slides on OSPF routing protocols hosted on Zenith Networks' website.
The document discusses IPv6 addressing and transitioning from IPv4 to IPv6. It describes the need for a larger address space than IPv4 due to the growing number of internet-connected devices. It then covers various IPv6 features and address types including global unicast addresses, link-local addresses, and address assignment methods like stateless autoconfiguration and DHCPv6. The document also discusses IPv6 routing protocols and transition technologies like dual stack and tunneling to help networks migrate from IPv4 to IPv6.
This chapter discusses implementing Border Gateway Protocol (BGP) solutions for Internet Service Provider (ISP) connectivity. It begins with an overview of BGP terminology such as autonomous systems (AS), AS numbers, and BGP peers. The chapter then covers basic BGP configuration and operation, including the exchange of routing information between BGP peers in different ASes. It also discusses considerations for connecting an enterprise network to an ISP, such as addressing, link types, redundancy, and routing protocols.
This document provides an overview and agenda for a session on advanced topics in IP multicast deployment. It discusses tools and techniques for deploying IP multicast, including examples of PIM mode configurations, rendezvous point deployment models, interconnecting PIM domains, label switched multicast, high availability techniques, and multicast in wireless environments. The target audience is network engineers in enterprise and service provider networks.
What PE Teachers and PEX Professionals Have in CommonKaiNexus
油
Presented by Shawna Forst, Performance Excellence, Quality & Risk Coordinator at MercyOne Newton Medical Center
What do physical education teachers and performance excellence professionals have in common? More than you think! This session will feature one former P.E. Teacher's perspective on the similarities between coaching kids and leading quality and improvement efforts in the workplace while also sharing how to leverage KaiNexus to support and encourage those endeavors.
In this webinar, you'll learn:
To explore the basic fundamentals of being an effective coach, regardless of field.
To identify how KaiNexus can be leveraged in being an effective coach.
To understand how Lean methodology, leveraging KaiNexus, can help eliminate waste, build teamwork, reduce conflicts, reduce or eliminate defects, create IDEAL processes, services, and products as well as improve client satisfaction.
About the Presenter:
Shawna Forst
Shawna is the Performance Excellence Quality & Risk Coordinator and Lean Healthcare Coach at MercyOne Newton Medical Center. Shawna has been a Lean Healthcare facilitator since January 2007 and has two years of experience as a technician in a cardiac unit. Since then, she has had various roles in Healthcare Quality and Safety. Shawna graduated from Simpson College in 2002 with a Bachelor of Arts in Physical Education and a Coaching Endorsement. In 2010, she became a Certified Professional in Healthcare Quality (CPHQ) and received her LEAN Green Belt certification in 2014. She also received her Masters in Business Administration from Western Governors University in 2018.
BusinessGPT - Privacy first AI Platform.pptxAGATSoftware
油
Empower users with responsible and secure AI for generating insights from your companys data. Usage control and data protection concerns limit companies from leveraging Generative AI. For customers that dont want to take any risk of using Public AI services. For customers that are willing to use Public AI services but want to manage the risks.
More Related Content
Similar to IS-IS Principles and Configurations.rpdf (20)
The document discusses OSPF link-state routing protocol. It describes OSPF's use of link-state databases containing topology information and Dijkstra's algorithm to calculate the shortest path to all destinations. It also explains OSPF's hierarchical area-based network structure and use of link-state advertisements to exchange routing information between neighbors.
This document provides instructor materials for teaching a chapter on single-area OSPF. It includes best practices for teaching the topic, such as using Packet Tracer demonstrations and having students draw diagrams. It also outlines the sections and objectives covered in the chapter, which are enabling and configuring both single-area OSPFv2 and OSPFv3. Verification commands are also discussed.
OSPF is a routing protocol for Internet Protocol (IP) networks. It uses a link state routing (LSR) algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). It is defined as OSPF Version 2 for IPv4. The updates for IPv6 are specified as OSPF Version 3. OSPF is perhaps the most widely used interior gateway protocol (IGP) in large enterprise networks.
- IS-IS is an intermediate system to intermediate system (IS-IS) routing protocol that uses link state packets (LSPs) to advertise routing information within an autonomous system.
- It runs the shortest path first (SPF) algorithm on the link state database to determine the best paths to destinations. Areas and levels are used to structure large IS-IS networks hierarchically.
- IS-IS is similar to OSPF in using areas, SPF algorithm, and link state flooding but differs in packet formats, database structures, backbone definitions, and neighbor establishment.
The document discusses SRv6 (Segment Routing IPv6) network programming and deployment use cases. It provides an overview of SRv6, including how it encodes the network path in packet headers, its scalability benefits, and support across industry. Specific functions of SRv6 LocalSIDs are explained, along with examples of fast reroute protection, traffic engineering, VPN overlays, and centralized vs distributed control planes. SRv6 is proposed as a simplification that can eliminate protocols for various use cases.
Segment Routing Technology Deep Dive and Advanced Use CasesCisco Canada
油
The document provides an overview of Segment Routing technologies including SRv6. It begins with a recap of Segment Routing concepts and how it simplifies network operations. It then covers SRv6 which extends Segment Routing to IPv6 networks to take advantage of growing IPv6 adoption. The document discusses how SRv6 can further simplify networks and support new services and traffic patterns from 5G, IoT, and container-based microservices.
This document provides an overview of routing protocols RIP and OSPF, access lists, and frame relay configuration in Cisco routers. It summarizes the key features of RIP and OSPF, including how they calculate routes differently. Configuration steps are shown for implementing routing protocols, access lists to filter traffic, and frame relay. The document concludes that future work will involve studying additional routing protocols and frame relay in more depth.
PLNOG 13: Jeff Tantsura: Programmable and Application aware IP/MPLS networkingPROIDEA
油
Jeff Tantsura Head of Technology Strategy Routing at Ericsson & WG Chair of RTGWG at IETF. Jeff has over 20 years of experience in the design and implementation of complex internet products and solutions, as well as 7+ years in Product Management. Skill set includes an expert level of knowledge of IP/MPLS networking and SDN solutions as well as ability to monetize it. More than 10 patents/applications mostly in IP Routing Fast Convergence area, some L2 (SPB/EVPN). Active contributor to the IETF (chairing Routing Area Working Group): authoring/co-authoring 20+ IETF documents: routing, MPLS, MULTICAST, L2VPN and PCE WGs. Frequent speaker at internal and public events.
Topic of Presentation: Programmable and Application aware IP/MPLS networking
Language: English
Abstract: The session will cover the topic of controlling and managing IP / MPLS architecture using SDN. The concept of Segment Routing (SR) will be presented as this is currently a subject of IETF standardization. The Segment Routing protocol extends the existing set of IP / MPLS-oriented mechanisms to control network using the SDN controller. The concept of support for Segment Routing based on Open Daylight architecture will be shown. Jeff will present examples of Segment Routing applications such as: optimization of the network in near real-time, network applications optimized angle and multi-tenant environment, segment routing and packet optical networks. Jeff Tantsura (speaker) is the co-author of emerging standardization documents relating to Segment Routing.
Cisco Connect Montreal 2017 - Segment Routing - Technology Deep-dive and Adva...Cisco Canada
油
This document provides an overview of Segment Routing (SR) and SRv6. It begins with a recap of SR basics like segment types and how segments are encoded in MPLS labels or IPv6 headers. It then covers SRv6 which uses an IPv6 routing header to encode segments for source routing. The document explains how SRv6 simplifies networking by eliminating the need for overlay protocols and protocols like RSVP. It details the SRv6 header format and how packets are processed hop-by-hop through the segment list.
This document provides an overview of basic network and routing concepts for the CCNP ROUTE certification. It discusses differentiating between dynamic routing protocols, network types including non-broadcast multi-access networks, connecting remote locations using various technologies, and understanding how different traffic types and overlay networks influence routing. The objectives cover routing protocols, branch connectivity options, and IPv6 neighbor discovery.
Routing protocols like RIP are used between routers to determine the best paths and maintain routing tables. RIP is a distance vector routing protocol that uses hop count as the metric to select routes. It broadcasts routing updates every 30 seconds. RIPv1 is classful while RIPv2 is classless and supports VLSM and route summarization. The router rip command enables the RIP process while network identifies participating interfaces.
The document discusses Open Shortest Path First (OSPF) routing protocol. It covers basic OSPF configuration, establishing OSPF neighbor relationships, OSPF message types, OSPF operation overview including building the routing table, and optimizing OSPF adjacencies on multiaccess networks. The key aspects are electing a designated router and backup designated router to reduce routing update traffic and ensure synchronized link-state databases across all routers.
This document discusses IP addressing, subnet masks, default gateways, and the organizations that manage IP addresses. It describes public and private IP addresses and the different IP address classes. It also provides an overview of the 7-layer OSI model and describes each layer's function. Finally, it mentions some common protocol port numbers and introduces Cisco routers and switches.
Zenith Networks is a network integration services company that has been providing LAN, WAN, routing, switching, and security services for 27 years. They are a partner of Juniper Networks and are headquartered in Philadelphia, PA. The document provides information on Zenith Networks' services and certifications, as well as background on their partner Juniper Networks. It also includes steps to access education slides on OSPF routing protocols hosted on Zenith Networks' website.
The document discusses IPv6 addressing and transitioning from IPv4 to IPv6. It describes the need for a larger address space than IPv4 due to the growing number of internet-connected devices. It then covers various IPv6 features and address types including global unicast addresses, link-local addresses, and address assignment methods like stateless autoconfiguration and DHCPv6. The document also discusses IPv6 routing protocols and transition technologies like dual stack and tunneling to help networks migrate from IPv4 to IPv6.
This chapter discusses implementing Border Gateway Protocol (BGP) solutions for Internet Service Provider (ISP) connectivity. It begins with an overview of BGP terminology such as autonomous systems (AS), AS numbers, and BGP peers. The chapter then covers basic BGP configuration and operation, including the exchange of routing information between BGP peers in different ASes. It also discusses considerations for connecting an enterprise network to an ISP, such as addressing, link types, redundancy, and routing protocols.
This document provides an overview and agenda for a session on advanced topics in IP multicast deployment. It discusses tools and techniques for deploying IP multicast, including examples of PIM mode configurations, rendezvous point deployment models, interconnecting PIM domains, label switched multicast, high availability techniques, and multicast in wireless environments. The target audience is network engineers in enterprise and service provider networks.
What PE Teachers and PEX Professionals Have in CommonKaiNexus
油
Presented by Shawna Forst, Performance Excellence, Quality & Risk Coordinator at MercyOne Newton Medical Center
What do physical education teachers and performance excellence professionals have in common? More than you think! This session will feature one former P.E. Teacher's perspective on the similarities between coaching kids and leading quality and improvement efforts in the workplace while also sharing how to leverage KaiNexus to support and encourage those endeavors.
In this webinar, you'll learn:
To explore the basic fundamentals of being an effective coach, regardless of field.
To identify how KaiNexus can be leveraged in being an effective coach.
To understand how Lean methodology, leveraging KaiNexus, can help eliminate waste, build teamwork, reduce conflicts, reduce or eliminate defects, create IDEAL processes, services, and products as well as improve client satisfaction.
About the Presenter:
Shawna Forst
Shawna is the Performance Excellence Quality & Risk Coordinator and Lean Healthcare Coach at MercyOne Newton Medical Center. Shawna has been a Lean Healthcare facilitator since January 2007 and has two years of experience as a technician in a cardiac unit. Since then, she has had various roles in Healthcare Quality and Safety. Shawna graduated from Simpson College in 2002 with a Bachelor of Arts in Physical Education and a Coaching Endorsement. In 2010, she became a Certified Professional in Healthcare Quality (CPHQ) and received her LEAN Green Belt certification in 2014. She also received her Masters in Business Administration from Western Governors University in 2018.
BusinessGPT - Privacy first AI Platform.pptxAGATSoftware
油
Empower users with responsible and secure AI for generating insights from your companys data. Usage control and data protection concerns limit companies from leveraging Generative AI. For customers that dont want to take any risk of using Public AI services. For customers that are willing to use Public AI services but want to manage the risks.
CCleaner Pro 6.33 Crack + Key Free Download 2025kortez3
油
Direct License file Link Below https://up-community.net/dl/
CCleaner Pro Crack is the industry-leading system optimization tool trusted by millions to clean, optimize, and protect their computers.
Taylor Swift The Man Music Video Productioneclark941
油
For my school project, I analyzed Taylor Swift's "The Man" music video. I explored how it critiques gender inequality by depicting Taylor Swift as a man to highlight the double standards and societal expectations placed on men and women. The video uses satire and symbolism to comment on issues of power and privilege
Project Status Report Template that our ex-McKinsey & Deloitte consultants like to use with their clients.
For more content, visit www.domontconsulting.com
In the fast-paced world of business, staying on top of key projects and initiatives is crucial for success. An initiative status report is a vital tool that provides transparency, accountability, and valuable insights to stakeholders. By outlining deadlines, costs, quality standards, and potential risks, these reports ensure that projects remain on track and aligned with organizational goals. In this article, we will delve into the essential components of an initiative status report, offering a comprehensive guide to creating effective and informative updates.
Siddhartha Bank Navigating_Nepals_Financial_Challenges.pptxSiddhartha Bank
油
This PowerPoint presentation provides an overview of Nepals current financial challenges and highlights how Siddhartha Bank supports individuals and businesses. It covers key issues such as inflation and limited credit access while showcasing the banks solutions, including loan options, savings plans, digital banking services, and customer support. The slides are designed with concise points for clear and effective communication.
Get Lifetime Access to Premium AI Models with AI IntelliKit's One-Time PurchaseSOFTTECHHUB
油
Imagine a tool that brings all the top AI models such as ChatGPT 4.0, Claude, Gemini Pro, LLaMA, Midjourney, and many more under one roof. Thats exactly what AI IntelliKit does. Designed to replace expensive subscriptions, this toolbox lets you access premium AI tools from a single, user-friendly dashboard. You no longer need to juggle between multiple platforms or pay recurring fees.
TablePlus Crack with Free License Key Downloadhilexalen1
油
Please copy the link and paste it into New Tab
https://dr-up-community.info/
TablePlus is a cross-platform database management GUI tool designed to make managing databases easy and efficient. It supports a wide range of relational databases such as MySQL, PostgreSQL, SQLite, and more.
2025 CEO Impact Index: Business Transformation Drives Executive ImpactGolin
油
In summary, the traditional playbook for CEO communications has been completely rewritten. While CEOs once balanced business performance with social purpose and personal branding, today's leaders must focus primarily on articulating their business transformation story. Golin's 2025 CEO Impact Index reveals that the most influential CEOs are those who can effectively communicate their transformation vision while navigating complex regulatory environments and combating misinformation.
The Will-Skill Matrix is an essential framework for managers and consultants aiming to optimize team performance. This model divides employees into four quadrants based on their levels of motivation (Will) and competencies (Skill):
1.Contributors (Guide): High Will, Low Skill
2.High Performers (Challenge): High Will, High Skill
3.Low Performers (Direct): Low Will, Low Skill
4.Potential Detractors (Motivate): Low Will, High Skill
This PowerPoint presentation is only a small preview of our content. For more details, visit www.domontconsulting.com
Maksym Bilychenko: Empowering IT Products with AI: Opportunities and Pitfalls...Lviv Startup Club
油
Maksym Bilychenko: Empowering IT Products with AI: Opportunities and Pitfalls (UA)
Kyiv AI & BigData Day 2025
Website https://aiconf.com.ua/kyiv
Youtube https://www.youtube.com/startuplviv
FB https://www.facebook.com/aiconf
This presentation was delivered to a mixed sector industrial audience to provide a balanced view of why AI is necessary in many working environments, and further, how it can advantage the individual and organisation. It also dispels the widely held (media) view that AI will destroy jobs and displace people on a socially damaging scale. The really serious threat scenarios actually remain the domain of human players, and not as depicted by some Hollywood dystopian machines take over nightmare!
Primarily seeing AI as a downsizing opportunity is to miss the key point: by empowering employees it is the biggest growth agent!
The nonsensical nature of AI v human supremacy arguments also distract from the symbiotic relationships we are forging. This is especially evident when confronted by complexity beyond our natural abilities. For example: procurement and supply chains may now see >>60 independent variables (features and parameters) with many requiring real time control. Humans can typically cope with 5 - 7, whilst our mathematical framework fails at 5. This primal limiter also compounds the risks involved in designing for:
optimisation v brittleness v resilience
In this context, the digitisation process is largely regarded as an event instead of a continuum and this greatly exacerbates the risks involved. This is illustrated against the backdrop of several past tech-revolutions and the changes they invoked. Two ongoing revolutions are also included with projections for likely futures/outcomes.
The closing remarks remind the audience of just one observation that we all need to keep in mind:
Things that think want to link
and
Things that link want to think
In 2024, I found myself a victim of a cryptocurrency scam, losing $345,000. The sense of loss and frustration was overwhelming, and I was told by many experts that it was highly unlikely to recover such a significant amount. With cryptocurrencys irreversible transactions and anonymity, I felt like my chances were slim. However, after hearing about CRANIX ETHICAL SOLUTIONS HAVEN from a trusted contact, I decided to give it a try, and Im so glad I did. I'll admit, I was initially cautious. The internet is filled with horror stories of recovery services that end up being scams themselves, so I did my due diligence. After speaking with the team at CRANIX ETHICAL SOLUTIONS HAVEN, I was impressed by their transparency and professionalism. They assured me that, while recovery was difficult, it was not impossible. They explained their approach clearly, detailing how they use advanced tracking tools and legal channels to attempt recovery, and I felt confident moving forward. From the start, the process was smooth. The team kept me updated regularly, explaining each step they were taking. They were upfront about the challenges of recovering cryptocurrency, but never made any unrealistic promises. They set proper expectations from the beginning while assuring me they would do everything possible to recover my assets. Their honest and patient approach gave me the trust I needed. After several months of diligent work on their part, I started seeing results. They managed to trace some of the funds to specific wallets and identified potential points of contact that were crucial in the recovery process. While the process was slow, their persistence paid off, and eventually, a significant portion of my funds was recovered. I can say with confidence that CRANIX ETHICAL SOLUTIONS HAVEN delivered on their promise. While they could not guarantee success at the outset, they showed a level of commitment and expertise that made me believe recovery was possible. Their customer support was top-notch, always available to answer questions and provide updates. There were no unexpected charges beyond the initial fee, and they remained transparent throughout the process. While recovering cryptocurrency is not easy, it is absolutely possible with the right team. If youve found yourself in a similar situation, I highly recommend CRANIX ETHICAL SOLUTIONS HAVEN. They are a legitimate, reliable service that genuinely works to help you recover lost assets. Just remember that patience and realistic expectations are key, but with their help, recovery is indeed油achievable.
TELEGRAM: @ cranixethicalsolutionshaven
EMAIL: cranixethicalsolutionshaven @ post . com 油OR 油info @ cranixethicalsolutionshaven
WHATSAPP: +44 (7460) (622730)
Jatin Mansata - A Leader In Finance And PhilanthropyJatin Mansata
油
Jatin Mansata is a financial markets leader and teacher with a deep commitment to social change. As the CEO and Director of JM Global Equities, hes recognized for his acumen for derivatives and equities. Beyond his professional achievements, Jatin mentors 500 students, empowering them with financial knowledge.
In the fast-paced and ever-evolving world of business, staying ahead of the curve requires more than just incremental improvements. Companies must rethink and fundamentally transform their processes to achieve substantial gains in performance. This is where Business Process Reengineering (BPR) comes into play. BPR is a strategic approach that involves the radical redesign of core business processes to achieve dramatic improvements in productivity, efficiency, and quality. By challenging traditional assumptions and eliminating inefficiencies, redundancies, and bottlenecks, BPR enables organizations to streamline operations, reduce costs, and enhance profitability.
For non-performing organizations, BPR serves as a powerful weapon for reinvigoration. By crafting a compelling narrative around the need for change, leaders can inspire and galvanize their teams to embrace the transformation journey. BPR fosters a culture of continuous improvement, innovation, and agility, allowing companies to align their processes with strategic goals and respond swiftly to market trends and customer needs.
Ultimately, BPR leads to substantial performance improvements across various metrics, driving organizations towards renewed purpose and success. Whether it's faster turnaround times, higher-quality outputs, or increased customer satisfaction, the measurable and impactful results of BPR provide a blueprint for sustainable growth and competitive advantage. In a world where change is the only constant, BPR stands as a transformative approach to achieving business excellence.
1. Copyright 息 2019 Huawei Technologies Co., Ltd. All rights reserved.
IS-IS Principles and Configurations
2. Page 1 Copyright 息 2019 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
Intermediate System-to-Intermediate System (IS-IS) is a link-state based
IGP. It uses the Shortest Path First (SPF) algorithm to calculate routes. IS-IS
is a dynamic routing protocol initially designed by the International
Organization for Standardization (ISO) for its Connectionless Network
Protocol (CLNP).
To support IP routing, the Internet Engineering Task Force (IETF) extends
and modifies IS-IS in RFC 1195. This enables IS-IS to be applied to TCP/IP
and OSI environments. This type of IS-IS is called Integrated IS-IS. IS-IS has
been widely used in large ISP networks because of its simplicity and high
scalability.
3. Page 2 Copyright 息 2019 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
Upon completion of this section, you will be able to:
Master IS-IS principles and configurations
Be familiar with differences between IS-IS and OSPF
4. Page 3 Copyright 息 2019 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. IS-IS Principles
2. Differences Between IS-IS and OSPF
3. IS-IS Configurations
5. Page 4 Copyright 息 2019 Huawei Technologies Co., Ltd. All rights reserved.
Backbone network:
Flat area, fast convergence, and
high transmission volume
Campus network:
A variety of areas, changeable policies,
and fine-grained scheduling
Application
ER
CS
SW
ER
CS
SW SW
OSPF
CE
PE
CE
PE
PE
PE
PE
CE
CE
IS-IS+BGP
6. Page 6 Copyright 息 2019 Huawei Technologies Co., Ltd. All rights reserved.
Origin
Application
layer
Presentation
layer
Session
layer
Transport
layer
Network
layer
Data link
layer
Physical
layer
OSI
Application
layer
Transport
layer
Network
layer
Data link
layer
Physical
layer
TCP/IP
ARP
TCP
IP
ES-IS
TP0-TP4
CLNP IS-IS
OSPF
Integrated
IS-IS
Integrated IS-IS characteristics:
Supports CLNP and IP networks.
Works at the data link layer.
OSPF characteristics:
Supports only IP networks.
Works at the IP layer.
7. Page 7 Copyright 息 2019 Huawei Technologies Co., Ltd. All rights reserved.
Establish a neighbor relationship
Route Calculation
Perform SPF route calculation
Shortest path tree
This process is
similar to that in OSPF
H e l l o
Synchronize the LSDB
LSDB
LSP1
LSP2
-------
LSDB
LSP3
LSP4
-------
8. Page 8 Copyright 息 2019 Huawei Technologies Co., Ltd. All rights reserved.
Address Structure
High Order DSP System ID SEL
IDI
AFI
Area ID (1-13B) 6B 1B
NSAP
IDP DSP
49.0 0 0 1 . 0000 . 0 0 0 0 . 0 0 0 1 . 0 0
A r e a I D Sy s t e m I D N - S E L
NET is a special type of NSAP address (SEL=00). When configuring
IS-IS on a router, you only need to consider the NET. For example:
TCP/IP
protocol stack
IP protocol IP address OSPF Area ID+Router
ID
OSI CLNP
protocol
NSAP
address
IS-IS NET identifier
9. Page 10 Copyright 息 2019 Huawei Technologies Co., Ltd. All rights reserved.
IS-IS routers are classified into three types:
Level-1 router: supports only Level-1 LSDB.
Level-2 router: supports only Level-2 LSDB.
Level-1-2 router: is the default router type and supports both Level-1 and Level-2 LSDBs.
Router Types
To establish a
Level-1 adjacency,
ensure that two
routers use the
same area ID.
Same area
Area 49.0001
Different
areas
Area 49.0001 Area 49.0002
10. Page 12 Copyright 息 2019 Huawei Technologies Co., Ltd. All rights reserved.
IS-IS currently supports only P2P and broadcast network types.
Hello Packet
Broadcast multiple
access network type
P2P
Broadcast
Point-to-Point IIH
L1 LAN IIH
Mac:0180-c200-0014
L2 LAN IIH
Mac:0180-c200-0015
OR
Point-to-point network type
11. Page 13 Copyright 息 2019 Huawei Technologies Co., Ltd. All rights reserved.
Neighbor Relationship Establishment
ISO10589 defines two-way handshake, while RFC3373 defines P2P three-way handshake.
point-to-point IIH
RTA RTB
SYS ID 0000.0000.0001 SYS ID 0000.0000.0002
point-to-point IIH
State: up
State: up
Two-way handshake
Establishing neighbor relationship of the multicast access (MA) network type
requires three-way handshake.
RTA RTB
SYS ID 0000.0000.0001 SYS ID 0000.0000.0002
LAN IIH (system ID: 0000.0000.0001 neighbor: null)
LAN IIH (system ID: 0000.0000.0002 neighbor: RTA)
LAN IIH (system ID: 0000.0000.0001 neighbor: RTB)
State: initialized
State: up
State: up
Three-way handshake
DIS election
12. Page 14 Copyright 息 2019 Huawei Technologies Co., Ltd. All rights reserved.
Comparisons Between DIS and DR
Virtual router
(pseudo node)
Leve-1
Leve-1 Leve-1-2
DIS
Item IS-IS DIS OSPF DR
Election priority Devices with all priorities participate
in DIS election
The device with priority 0 does not
participate in DR election
Election waiting time Two Hello intervals 40s
Backup No backup BDR for backup
Adjacency All routers establish adjacencies DR others establish 2-way neighbor
relationships
Preemption Yes No
Function
Send CSNPs periodically to guarantee
LSDB synchronization on MA
networks.
Reduce LSA flooding
Leve-1 Leve-1-2
Leve-1
13. Page 16 Copyright 息 2019 Huawei Technologies Co., Ltd. All rights reserved.
TLV
TYPE LENGTH VALUE
IS-IS packet
structure
LSP PDU: is used to exchange link state
information.
Real node LSP
Pseudo node LSP (exists only in broadcast links)
SNP PDU: is used to maintain and synchronize
the LSDB and carries summary information.
CSNP (used to synchronize LSPs)
PSNP (used to request and acknowledge LSPs)
Link State Information Transmission
IS-IS packets fall into two types: Level-1 and Level-2 packets. The destination MAC
addresses of all IS-IS packets in MA networks are multicast MAC addresses:
Level-1 address: 0180-C200-0014
Level-2 address: 0180-C200-0015
14. Page 18 Copyright 息 2019 Huawei Technologies Co., Ltd. All rights reserved.
Link State Information Exchange
CSNP
A.00-00
PSNP
A.00-00
LSP
A.00-00
PSNP
A.00-00
Retransmission expires
LSP
A.00-00
PSNP
A.00-00
Retransmit PSNP
CSNPs are sent only once on a P2P
network. That is, a CSNP is sent
immediately after a neighbor
relationship is established.
PSNP
A.00-00
B.00-00
B.01-00
LSP
C.00-00
C.00-01
CSNP
A.00-00
B.00-00
B.01-00
C.00-00
C.00-01
LSP
A.00-00
B.00-00
B.01-00
CSNPs are multicast only by the DIS
on an MA network at the default
interval of 10s.
Pseudo node LSP
Fragment LSP
RTA RTB
P2P
RTA
RTC
RTB
DIS MA
15. Page 19 Copyright 息 2019 Huawei Technologies Co., Ltd. All rights reserved.
Routing Algorithms
RTA
RTE
RTA RTB
RTC
RTD
RTE
IS-IS route cost calculation:
The default interface cost is 10.
SPF calculation process:
Complete LSDB synchronization
within a single area.
Generate the network topology.
Generate the shortest path tree,
using the local node as the root.
16. Page 20 Copyright 息 2019 Huawei Technologies Co., Ltd. All rights reserved.
The IS-IS area boundary is a router, while the OSPF area boundary is a router
interface.
Network Hierarchy and Routing Domain
L2
L2
L2
L1/2
L2
L1/2
L1
L1/2
L1
L1
L1
L1/2
L1
L1
Area 49.0001
Area 49.0002
Area 49.0003
Area 49.0004
Area 49.0005
Backbone
17. Page 21 Copyright 息 2019 Huawei Technologies Co., Ltd. All rights reserved.
L1 L1
Maintain L1 LSDB
L1/2
L1 neighbor
Area 49.0001
L1 neighbor
Backbone area
Maintain L2 LSDB
L2
Area 49.0002
L2 neighbor
L2 neighbor
L2
Area 49.0001 accesses Area 49.0002
The Level-1-2 router RTA generates an
LSP with the ATT bit set to 1.
A Level-1 router generates a default
route with the next hop pointing to the
Level-1-2 router after receiving the LSP
with the ATT bit 1.
Area 49.0002 accesses Area 49.0001
The Level-1-2 router, RTA, adds specific routes to Area
49.0001 in the Level-2 LSDB.
A Level-2 router calculates specific routes to Area
49.0001 through SPF calculation.
RTA
Inter-Area Routing
18. Page 22 Copyright 息 2019 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. IS-IS Principles
2. Differences Between IS-IS and OSPF
3. IS-IS Configurations
19. Page 23 Copyright 息 2019 Huawei Technologies Co., Ltd. All rights reserved.
Differences Between IS-IS and OSPF
Use IS-IS or
OSPF based on
your service
requirements
Item IS-IS OSPF
Network types Less More
Cost style
Complicate
d
Simple
Area types Less More
Packet types Simple Various
Route
convergence
Faster Fast
Scalability High Medium
Routing load
capacity
Higher High
20. Page 25 Copyright 息 2019 Huawei Technologies Co., Ltd. All rights reserved.
Terms
Abbreviation OSI Term IETF Term
IS Intermediate System Router
ES End System Host
DIS
Designated Intermediate
System
Designated Router in
OSPF
SysID System ID Router ID in OSPF
LSP Link State PDU LSA in OSPF
IIH IS-IS Hello PDU Hello packet in OSPF
PSNP
Partial Sequence Number
PDU
LSR or LSAck in OSPF
CSNP
Complete Sequence
Number PDU
DD packet in OSPF
21. Page 26 Copyright 息 2019 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. IS-IS Principles
2. Differences Between IS-IS and OSPF
3. IS-IS Configurations
22. Page 27 Copyright 息 2019 Huawei Technologies Co., Ltd. All rights reserved.
In the figure, all routers in the customer network need to run IS-IS to ensure reachable routes on the network. All IS-IS
processes use the process ID 100. RTA is the DIS in Area 49.0001. The network between RTD and RTE must be P2P
network. RTE imports the direct route 192.168.X.X and requires RTA to access Area 49.0002 through the optimal path.
Perform the configuration correctly to meet the preceding customer requirements.
IS-IS Route Configuration Requirements
import1
RTB
RTC
RTD
Area 49.0001
Area 49.0002
Level-1 Level-2
RTA
192.168.1.0/24;
192.168.2.0/24;
192.168.3.0/24;
G0/0/0
G0/0/0
G0/0/1
G0/0/1
G0/0/0
G0/0/0
G0/0/0
S1/0/0
S1/0/0
RTE
25. Page 30 Copyright 息 2019 Huawei Technologies Co., Ltd. All rights reserved.
IS-IS Route Configuration (3)
import1
RTB
RTC
RTD
Area 49.0001
Area 49.0002
Level-1 Level-2
RTA
192.168.1.0/24;
192.168.2.0/24;
192.168.3.0/24;
G0/0/0
G0/0/0
G0/0/1
G0/0/1
G0/0/0
G0/0/0
G0/0/0
S1/0/0
S1/0/0
RTE
isis 100
network-entity 49.0001.0000.0000.0002.00
import-route isis level-2 into level-1
#
interface GigabitEthernet0/0/1
isis enable 100
isis 100
network-entity 49.0001.0000.0000.0003.00
import-route isis level-2 into level-1
#
interface Serial 1/0/0
isis enable 100
isis 100
import-route direct
26. Page 31 Copyright 息 2019 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. How many IS-IS router types exist?
2. What is the function of PSNPs in neighbor interaction?
3. What are the advantages of IS-IS compared with OSPF?