OSPF and IS-IS: Choosing an IGP for Large-Scale Networks
Jeff Doyle
- 出版商: Addison Wesley
- 出版日期: 2005-11-01
- 定價: $2,200
- 售價: 8.0 折 $1,760
- 語言: 英文
- 頁數: 480
- 裝訂: Paperback
- ISBN: 0321168798
- ISBN-13: 9780321168795
-
相關分類:
Cisco、TCP/IP
-
相關翻譯:
OSPF 和 IS-IS 詳解 (簡中版)
立即出貨
買這商品的人也買了...
-
$620$490 -
$480$408 -
$650$553 -
$1,083Java How to Program, 6/e (IE)(美國版ISBN:0131483986)
-
$1,078Operating System Principles, 7/e(IE) (美國版ISBN:0471694665-Operating System Concepts, 7/e) (平裝)
-
$450$428 -
$350$277 -
$620$558 -
$860$679 -
$880$581 -
$750$585 -
$890$757 -
$199Communication Skills Handbook (Paperback)
-
$780$702 -
$680$578 -
$390$332 -
$650$507 -
$600$540 -
$550$468 -
$720$569 -
$480$408 -
$580$458 -
$950Assembly Language for Intel-Based Computers, 5/e (IE) (美國版ISBN:0132383101)
-
$774Concepts of Programming Languages, 8/e(美國版ISBN: 0321493621)
-
$520$442
相關主題
商品描述
Description
This is the definitive guide to using OSPF and IS-IS protocols in large-scale IP enterprise, carrier, and service provider networks. Well-known network designer Jeff Doyle draws on his consulting experience, offering realistic advice and straight answers on every aspect of working with link-state protocols—from scalability, reliability, and security to area design and database synchronization.
This book is organized to help network engineers and architects compare OSPF and IS-IS. One feature at a time, Doyle first demonstrates how a topic or feature is implemented in OSPF, and then walks through a similar implementation using IS-IS. Professionals who are relatively new to large-scale networking will welcome his practical introduction to the concepts, goals, and history of link state protocols. Coverage includes
Understanding message types, encapsulation, architecture, LSAs, and LSPs
Optimizing addressing, neighbor discovery, adjacencies, and router designation
Improving scalability: controlling the scope of flooding, link state database size, SPF calculation efficiency, and much more
Designing and operating large-scale networks for maximum security and reliability
Hardening networks to thwart attacks against routing protocols
Comparing OSPF and IS-IS extensibility
Utilizing extensions for MPLS-based traffic engineering, IPv6, and multi-topology routing
Troubleshooting OSPF and IS-IS log entries, debug output, and LS databases
Doyle's thorough explanations, end-of-chapter review questions, and many wide-ranging examples for both Cisco's IOS and Juniper's JUNOS also make this book an exceptional resource for anyone pursuing a CCIE or JNCIE certification.
Table of Contents
About the Author.
Preface.
Audience.
What Is a Large-Scale Data Communications Network?
A Word on IOS and JUNOS.
Acknowledgments.
1. The Roots of LinkState Protocols.
An Intergalactic Network.
ARPANET.
The Network Working Group.
The Birth of the Internet.
Routing in the ARPANET.
The European Invasion.
Separate But Equal.
Conclusion.
2. LinkState Basics.
Vector Protocol Basics.
Vector Protocol Convergence.
Common Characteristics of Vector Protocols .
Routing Loops.
Fundamental Link State Concepts.
Adjacencies.
Flooding.
Announcement Headers.
Database Synchronization.
SPF Calculations.
Areas.
Review Questions.
3. Message Types.
Comparative Terminology.
Message Encapsulation.
Message Architecture.
Message Types.
LSAs and LSPs.
Subnetwork Dependent and Independent Functions.
Subnetwork Dependent Functions.
Subnetwork Independent Functions.
Review Questions.
4. Addressing, Neighbor Discovery, and Adjacencies.
Router and Area IDs.
OSPF Router IDs.
Troubleshooting: Duplicate Router IDs.
OSPF Area IDs.
IS-IS System and Area IDs.
The Hello Protocol.
OSPF Hello Protocol Basics.
IS-IS Hello Protocol Basics.
IS-IS Dynamic Hostname Exchange.
OSPF Domain Name Lookup.
Adjacencies.
OSPF Adjacencies.
IS-IS Adjacencies.
Designated Routers.
OSPF Designated Routers.
IS-IS Designated Intermediate Systems.
Media Types.
OSPF Network Types.
IS-IS Network Types.
Interface Databases.
The OSPF Interface Data Structure.
OSPF Interface States.
The IS-IS Interface Data Structure.
Review Questions.
5. Flooding.
Flooding Components.
OSPF Flooding.
IS-IS Flooding.
Areas and Router Types.
OSPF Areas and Router Types.
IS-IS Areas and Router Types.
Metric Types.
OSPF Metrics.
IS-IS Metrics.
Essential LSAs.
Router LSAs.
Network LSAs.
Network Summary LSAs.
ASBR Summary LSAs.
AS-External LSAs.
Essential TLVs.
Area Addresses TLV.
IS Neighbors TLV.
Protocols Supported TLV.
IP Interface Addresses TLV.
IP Internal Reachability Information TLV.
IP External Reachability Information TLV.
Extended IS Reachability TLV.
Extended IP Reachability TLV.
Review Questions.
6. LinkState Database Synchronization.
OSPF Database Synchronization.
OSPF Packets Used in Database Synchronization.
The Options Field.
The OSPF Neighbor Data Structure.
LSA Lists for Database Exchange and Flooding.
Database Exchange Management: Masters and Slaves.
The OSPF Neighbor State Machine.
Troubleshooting: Reading OSPF Log Entries and Debug Output.
Troubleshooting: Comparing OSPF LS Databases.
IS-IS Database Synchronization.
IS-IS PDUs Used in Synchronization.
Send Routing Message and Send Sequence Number Flags.
Synchronization on Point-to-Point Networks.
Synchronization on Broadcast Networks.
Troubleshooting: Reading IS-IS Log Entries and Debug Output.
Troubleshooting: Comparing IS-IS LS Databases.
Review Questions.
7. Area Design.
Area Scalability.
Area Reliability.
OSPF Areas.
Backbone and Non-Backbone Areas.
Factors for Scaling OSPF Areas.
External Prefixes and OSPF Scaling.
Stub Areas.
Totally Stubby Areas.
Not-So-Stubby Areas.
Address Summarization.
Virtual Links.
IS-IS Areas.
Backbone and Non-Backbone Areas.
Factors for Scaling IS-IS Areas.
Default IS-IS L1 Area Behavior.
Redundant L1/L2 Routers.
Address Summarization, Again.
L2 to L1 Route Leaking.
Redistributing External Prefixes into IS-IS.
Multiple Area IDs.
IS-IS Virtual Links.
BGP and Area Design.
Review Questions.
8. Scaling.
SPF Enhancements.
Equal-Cost Multipath.
Pseudonodes and ECMP.
Incremental SPF Calculations.
Partial Route Calculations.
SPF Delay.
Flooding Enhancements.
Transmit Pacing.
Retransmit Pacing.
Mesh Groups.
Demand Circuits and Flood Reduction.
Fragmentation.
Overloading.
Review Questions.
9. Security and Reliability.
Routing Protocol Vulnerabilities.
Malicious Threats.
Non-Malicious Threats.
Security and Reliability Features.
Inherent Security.
Authentication.
Checksums.
Graceful Restart.
Bidirectional Forwarding Detection.
Designing for Security and Reliability.
Redundancy.
Protecting the Domain Edge.
Protecting the Router.
Operating for Security and Reliability.
Configuration Management.
Change Management.
The Network Lab.
Review Questions.
10. Extensibility.
Extending OSPF.
The OSPF Extensibility Problem.
Opaque LSAs.
The Router Information Opaque LSA.
Extending IS-IS.
The IS-IS Extensibility Advantage.
The Protocols Supported TLV.
Route Tagging.
Review Questions.
11. Extensions for MPLS Traffic Engineering.
MPLS: An Overview.
Labels and Label Switching.
Forwarding Equivalence Classes and Label Binding.
Label Distribution.
The MPLS Header.
Traffic Engineering: An Overview.
TE Link Parameters.
Constrained Shortest Path First.
OSPF Extensions for Traffic Engineering.
IS-IS Extensions for Traffic Engineering.
Review Questions.
12. Extensions for IPv6.
IPv6: An Overview.
IPv6 Features and Functions.
IPv6 Address Format.
IPv6 Address Representation.
The Neighbor Discovery Protocol.
Stateless Address Autoconfiguration.
IPv6 Header Format.
Extension Headers.
OSPFv3.
IPv4 and IPv6 Compatibility in OSPF.
Differences from OSPFv2.
OSPFv3 LSAs.
The Options Field.
OSPFv3 Packets.
Future Extensions to OSPFv3.
IS-IS Extensions for IPv6.
Review Questions.
13. Extensions for Multi-Topology Routing.
OSPF Extensions for Multi-Topology Routing.
MT-OSPF Procedures.
MT-OSPF LSAs.
Link Exclusion.
IS-IS Extensions for Multi-Topology Routing.
MT-ISIS Procedures.
MT-ISIS TLVs.
Review Questions.
AFTERWORD: The Future of LinkState Protocols.
Index.
About the Author.
Preface.
Audience.
What Is a Large-Scale Data Communications Network?
A Word on IOS and JUNOS.
Acknowledgments.
1. The Roots of LinkState Protocols.
An Intergalactic Network.
ARPANET.
The Network Working Group.
The Birth of the Internet.
Routing in the ARPANET.
The European Invasion.
Separate But Equal.
Conclusion.
2. LinkState Basics.
Vector Protocol Basics.
Vector Protocol Convergence.
Common Characteristics of Vector Protocols .
Routing Loops.
Fundamental Link State Concepts.
Adjacencies.
Flooding.
Announcement Headers.
Database Synchronization.
SPF Calculations.
Areas.
Review Questions.
3. Message Types.
Comparative Terminology.
Message Encapsulation.
Message Architecture.
Message Types.
LSAs and LSPs.
Subnetwork Dependent and Independent Functions.
Subnetwork Dependent Functions.
Subnetwork Independent Functions.
Review Questions.
4. Addressing, Neighbor Discovery, and Adjacencies.
Router and Area IDs.
OSPF Router IDs.
Troubleshooting: Duplicate Router IDs.
OSPF Area IDs.
IS-IS System and Area IDs.
The Hello Protocol.
OSPF Hello Protocol Basics.
IS-IS Hello Protocol Basics.
IS-IS Dynamic Hostname Exchange.
OSPF Domain Name Lookup.
Adjacencies.
OSPF Adjacencies.
IS-IS Adjacencies.
Designated Routers.
OSPF Designated Routers.
IS-IS Designated Intermediate Systems.
Media Types.
OSPF Network Types.
IS-IS Network Types.
Interface Databases.
The OSPF Interface Data Structure.
OSPF Interface States.
The IS-IS Interface Data Structure.
Review Questions.
5. Flooding.
Flooding Components.
OSPF Flooding.
IS-IS Flooding.
Areas and Router Types.
OSPF Areas and Router Types.
IS-IS Areas and Router Types.
Metric Types.
OSPF Metrics.
IS-IS Metrics.
Essential LSAs.
Router LSAs.
Network LSAs.
Network Summary LSAs.
ASBR Summary LSAs.
AS-External LSAs.
Essential TLVs.
Area Addresses TLV.
IS Neighbors TLV.
Protocols Supported TLV.
IP Interface Addresses TLV.
IP Internal Reachability Information TLV.
IP External Reachability Information TLV.
Extended IS Reachability TLV.
Extended IP Reachability TLV.
Review Questions.
6. LinkState Database Synchronization.
OSPF Database Synchronization.
OSPF Packets Used in Database Synchronization.
The Options Field.
The OSPF Neighbor Data Structure.
LSA Lists for Database Exchange and Flooding.
Database Exchange Management: Masters and Slaves.
The OSPF Neighbor State Machine.
Troubleshooting: Reading OSPF Log Entries and Debug Output.
Troubleshooting: Comparing OSPF LS Databases.
IS-IS Database Synchronization.
IS-IS PDUs Used in Synchronization.
Send Routing Message and Send Sequence Number Flags.
Synchronization on Point-to-Point Networks.
Synchronization on Broadcast Networks.
Troubleshooting: Reading IS-IS Log Entries and Debug Output.
Troubleshooting: Comparing IS-IS LS Databases.
Review Questions.
7. Area Design.
Area Scalability.
Area Reliability.
OSPF Areas.
Backbone and Non-Backbone Areas.
Factors for Scaling OSPF Areas.
External Prefixes and OSPF Scaling.
Stub Areas.
Totally Stubby Areas.
Not-So-Stubby Areas.
Address Summarization.
Virtual Links.
IS-IS Areas.
Backbone and Non-Backbone Areas.
Factors for Scaling IS-IS Areas.
Default IS-IS L1 Area Behavior.
Redundant L1/L2 Routers.
Address Summarization, Again.
L2 to L1 Route Leaking.
Redistributing External Prefixes into IS-IS.
Multiple Area IDs.
IS-IS Virtual Links.
BGP and Area Design.
Review Questions.
8. Scaling.
SPF Enhancements.
Equal-Cost Multipath.
Pseudonodes and ECMP.
Incremental SPF Calculations.
Partial Route Calculations.
SPF Delay.
Flooding Enhancements.
Transmit Pacing.
Retransmit Pacing.
Mesh Groups.
Demand Circuits and Flood Reduction.
Fragmentation.
Overloading.
Review Questions.
9. Security and Reliability.
Routing Protocol Vulnerabilities.
Malicious Threats.
Non-Malicious Threats.
Security and Reliability Features.
Inherent Security.
Authentication.
Checksums.
Graceful Restart.
Bidirectional Forwarding Detection.
Designing for Security and Reliability.
Redundancy.
Protecting the Domain Edge.
Protecting the Router.
Operating for Security and Reliability.
Configuration Management.
Change Management.
The Network Lab.
Review Questions.
10. Extensibility.
Extending OSPF.
The OSPF Extensibility Problem.
Opaque LSAs.
The Router Information Opaque LSA.
Extending IS-IS.
The IS-IS Extensibility Advantage.
The Protocols Supported TLV.
Route Tagging.
Review Questions.
11. Extensions for MPLS Traffic Engineering.
MPLS: An Overview.
Labels and Label Switching.
Forwarding Equivalence Classes and Label Binding.
Label Distribution.
The MPLS Header.
Traffic Engineering: An Overview.
TE Link Parameters.
Constrained Shortest Path First.
OSPF Extensions for Traffic Engineering.
IS-IS Extensions for Traffic Engineering.
Review Questions.
12. Extensions for IPv6.
IPv6: An Overview.
IPv6 Features and Functions.
IPv6 Address Format.
IPv6 Address Representation.
The Neighbor Discovery Protocol.
Stateless Address Autoconfiguration.
IPv6 Header Format.
Extension Headers.
OSPFv3.
IPv4 and IPv6 Compatibility in OSPF.
Differences from OSPFv2.
OSPFv3 LSAs.
The Options Field.
OSPFv3 Packets.
Future Extensions to OSPFv3.
IS-IS Extensions for IPv6.
Review Questions.
13. Extensions for Multi-Topology Routing.
OSPF Extensions for Multi-Topology Routing.
MT-OSPF Procedures.
MT-OSPF LSAs.
Link Exclusion.
IS-IS Extensions for Multi-Topology Routing.
MT-ISIS Procedures.
MT-ISIS TLVs.
Review Questions.
AFTERWORD: The Future of LinkState Protocols.
Index.
商品描述(中文翻譯)
《描述》
這是在大型企業、運營商和服務提供商網絡中使用OSPF和IS-IS協議的權威指南。知名網絡設計師Jeff Doyle根據他的咨詢經驗,提供了關於使用鏈路狀態協議的每個方面的實際建議和直接回答,包括可擴展性、可靠性、安全性、區域設計和數據庫同步等。
這本書的組織方式有助於網絡工程師和架構師比較OSPF和IS-IS。Doyle首先演示了如何在OSPF中實現某個主題或功能,然後通過使用IS-IS進行類似實現的步驟。對於相對新手的大型網絡工程師,他對鏈路狀態協議的概念、目標和歷史的實用介紹將受到歡迎。內容包括:
- 理解消息類型、封裝、架構、LSA和LSP
- 優化地址分配、鄰居發現、鄰接和路由器指定
- 提高可擴展性:控制洪水範圍、鏈路狀態數據庫大小、SPF計算效率等
- 設計和運營大型網絡以實現最大安全性和可靠性
- 加固網絡以防止針對路由協議的攻擊
- 比較OSPF和IS-IS的可擴展性
- 利用MPLS流量工程、IPv6和多拓撲路由的擴展功能
- 故障排除OSPF和IS-IS的日誌記錄、調試輸出和LS數據庫
Doyle的詳細解釋、章末的復習問題以及對Cisco的IOS和Juniper的JUNOS的眾多廣泛示例,使本書成為追求CCIE或JNCIE認證的人的卓越資源。
《目錄》
關於作者。
前言。
- 受眾。
- 什麼是大型數據通信網絡?
- 關於IOS和JUNOS的一點話。
致謝。
1. 鏈路狀態協議的起源。
- 一個星際網絡。
- ARPANET。
- 網絡工作組。
- 互聯網的誕生。
- ARPANET中的路由。
- 歐洲的入侵。
- 分離但平等。
- 結論。
2. 鏈路狀態基礎知識。