Datacom Report

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 50

Syriatel

Data Com
All what you have to know

Sundos Ahdab
4/16/2014
 TCP/IP Basis Issue:
-architecture of OSI RM(Open System Interconnection Reference
Model):

Application layer 7
Presentation layer 6 High Layers: In charge of data
Session layer transmission between hosts.
5
Transport layer 4
Network layer 3
Low Layers: In charge of data
Data link layer 2 transmission in network.

Physical layer 1

-Function of seven layers:

2
-Master architecture TCP/IP:

-process of TCP/IP data encapsulation:

3
Building Configuration Environment:
VRP Basic configuration(Versatile Routing Platform)
-Command View:

-Command Level:

4
-Enter and Quit System View:

operation command

Enter the system view from the user view system-view

Return to the user view from the system view quit

Return to the user view from any other view return

-Language Mode:

operation command

Turn to english mode (default) language-mode english

Turn to chinese mode language-mode chinese

-Configuring Router Name:

operation command

Configure the Router Name sysname

-Configuring The System Clock


-Status Information Query
-File Operation
-Directory Operation

5
-Setup via Console:

 You can build a configuration environment only through the


Console port for the two following occasions:
(1) The router is powered on for the first time.
(2)Configuration environments cannot be built through the
Telnet or AUX port.
 The procedures of configuring a router through the Console
port are as follows:
Procedure 1: Connect the configuration cable
Procedure 2: Create the super terminal:
(1)Run the terminal emulation program, for example,
Super Terminal of WIN XP, on the PC.
(2)Click Start > Program > Communication > Super
Terminal
(3)Input any characters as the name after New
Connection appears and choose a COM connection and
click OK. Then a page as above appears. Set the
parameters on the page as shown in the above figure and
click OK.

6
-Setup via Telnet:

 If it is not the first time that the router is powered on and you
have already correctly configured the IP addresses of the
router interfaces, log-in authentication mode and call-in/call-
out restriction rules, you can log in to the router by Telnet
through WAN or LAN to configure the router.
 There are two methods you may use to configure the router
if the router and the configuration terminal are in the same
LAN:
(1) Connect the PC with the router through a hub or a
layer-2 switch by normal lines.
(2) Connect the configuration terminal such as a PC with
the router directly with crossover network cables.
 1. Configure the IP addresses of the router and the PC.
#Enter the interface view of the router
[Quidway]interface Ethernet 0/0
7
#Configure the IP address of the interface
[Quidway-Ethernet0/0]ip address 1.1.1.4 255.0.0.0
Configure the IP address of the PC such as 1.1.1.2/8 after
the router IP address is configured and
then “ping 1.1.1.4” on the PC to check the communication
between the PC and the router.
 2. Configure the password for logging in through Telnet.
#Enter the vty user view and 0 4 indicates that up to 5
users can log in at the same time.
[Quidway] User-interface vty 0 4
#Choose password as the authentication mode.
[Quidway-ui-vty0-4] authentication-mode password
#Configure the password for authentication to Huawei.
[Quidway-ui-vty0-4] set authentication password simple
Huawei
#Configure the user privilege level to the manage level.
[Quidway-ui-vty0-4] user privilege level 3
Now you can run telnet 1.1.1.4 on the PC to log in to the
router.

8
-Setup via AUX:

 The figure above illustrates the network for configuring the


router through the AUX port. Connect the serial port of the
configuration terminal and the AUX port of the router to the
modem and modems are connected by the PSTN network.
 Make configurations on the router as follows:
#Enter the aux user interface view.
[Quidway] User-interface aux 0
#Select the password mode as the authentication mode.
[Quidway-ui-aux0] authentication-mode password
#Configure the password for authentication to Huawei.
[Quidway-ui-aux0] set authentication password simple Huawei
#Configure the user privilege.
[Quidway-ui-aux0] user privilege level 3
#Configure to allow the modem to call-in/call-out.
[Quidway-ui-aux0] modem both
Now choose Modem on the Super Terminal page to log in to the
router.

9
IP Routing and routing table:

A route is a path information to guide IP packets to be


transferred.
In the internet, routes are decided by routers. A router
chooses an appropriate route according to the destination
address in the header of the packet and sends the packet to
the next router. The last router on the route is responsible for
delivering the packet to the destination host.
The key function of router:
 Check the destination of a packet
 Find the source of the information
 Search for possible routes to the destination
 Select the best route
 Verify and maintain routing information

-Routing table establishment:


Routes in the routing table can be sorted to three categories
according to their sources:
• Routes found by data-link layer protocols (interface routes or
direct routes)
• Static routes manually configured by network administrators.
• Routes found by dynamic routing protocols.

10
-Routes found by data-link layer protocols:
When data-link layer protocols are up, routes of this sort are
generated and their proto field value in the routing table is “direct”.
Routes discovered by the data-link layer do not need
maintenance, which reduces the workload. However, data-link
layer can only find routes to segments directly connected with its
interfaces and can not discover routes that cross segments.
Routes that cross segments can only be discovered by other
methods.

-Static routes:

Static routes are configured by administrators manually and they


can also help to make networks connected. But static routes
cannot make adjustments by themselves when networks fail.
They must be changed by administrators.
The command for configuring the static route is:
[Quidway]ip route-static <ip_address> [ <mask> |
<masklen> ]
<interface_name> | <gateway_address> [ preference
<preference_value> ] [ reject | blackhole ]

11
You can query the routing table by running display ip routing-
table command after the static route is configured.
The static route is displayed in the routing table as highlighted in
red here.

-Dynamic protocol:
it is better to use dynamic routing protocols to find and change
routes, which does not need manual maintenance. However, the
cost of dynamic routing protocols is huge and it is rather
complicated to configure dynamic routing protocols.

12
-Routing Protocol classification -working area:
An AS is a set of networks under unified management.
According to their working area, routing protocols can be divided
into:
• Interior Gateway Protocol (IGP): a protocol for exchanging
routing
information between gateways within an autonomous network.
The protocols we introduce here like RIP and OSPF are IGP
protocols. Other IGP protocols that are not mentioned here
include ISIS, IGRP and EIGRP.
• Exterior Gateway Protocol (EGP): a protocol for exchanging
routing
information between two autonomous systems. The Border
Gateway Protocol (BGP) is a kind of EGP.

-Routing Protocol classification –protocol algorithm:


According to the algorithms used, routing protocols can be divided
into the following categories:
• Distance-Vector routing protocol: RIP and BGP. BGP is also
called the Path -Vector Protocol.
• Link-State Protocol: OSPF and IS-IS.

13
Distance-Vector routing protocols concern about the hops to the
destination, while Link-State protocols care more about the
network topology and bandwidth resources.

-Routing Protocol classification –service application:


Routing protocols can be divided into unicast routing protocols
and multicast routing protocols according to their applications.
• Unicast. In this mode, the destination of a datagram is unique,
which can be a host or a device.
• Multicast. In this mode, the destination address is a multicast
address, which means a group of hosts or devices can receive a
datagram at the same time.

-Routing table:
Routing table plays a key role in packets forwarding. Each router
holds a routing table and every entry in the routing table tells a
packet should be sent through which physical port of a router to
reach a subnet or a host before the packet arrives at the next hop
router or its destination.
A routing table contains the following items:

• Destination: indicates the destination or the destination network


of an IP packet.
•Mask: network masks are important information in a routing
table. If we let an IP address and a network mask go through a
logical AND operation, we can get information about the network
segment.
• Interface : indicates which interface an IP packet should be
forwarded from.

• Nexthop: indicates the IP address of the next interface that an IP


packet will go through.

14
•Preference:Routes to the same destination may come from
different sources. So the next hop of those routes may be the
same or different. In this case, how routers make their choice
about those routes? Route preference is here for this problem.

•Route Metric:

15
The route metric tells the cost of a route to its destination. Route
metrics are often decided by factors including the delay,
bandwidth, line occupation rate, line reliability, hops and the
maximum transmission unit.

-Equal Cost Multi Path(ECMP):

If there are multiple routes to the same destination and their route
metrics and route preference are the same, all these routes will
be added to the routing table.
IP packets are sent on these routes alternatively, which helps to
realize the load balancing.

-Routing loop:

Routing loop is a network problem in which packets are sent from


one router and return back to the router after traveling in the
16
network for a while. When the routing loop problem occurs,
packets travel around several routers until they are discarded
when TTL is 0, which wastes the network resource quite a lot. So
we should take methods to keep routing loops at bay.

OSPF(Open Short Path first):

-OSPF routing protocol basic concepts


 In OSPF, there are two important concepts, one is
Autonomous System ( AS ), which is also called OSPF
routing domain; the other is Router ID.
 In OSPF, Autonomous System ( AS )is a set of routers that
exchange routing information using the same routing
protocol.
 LSDB describes the topology of the whole network, including
all the routers on the network, so each router on the network
should be identified uniquely.
 Router ID is 32 bit number that is used to uniquely identify a
router running OSPF in an AS. Each router running OSPF
must have a Router ID.
Router ID uses the same format with that of IP address, it is
recommended to use IP address of Loopback interface as
Router ID.

17
-Route Calculation Process of Link State Algorithm:
IP routing table

The most charming feature of OSPF is that it is based on


Link State Algorithm, which is different from Distance Vector
Algorithm used by previous routing protocols
 Each router advertises local link state information by flooding
LSA, the link state information includes: available interfaces,
reachable neighbors and attached networks etc.
 Each router collects LSAs generated by other routers and
itself to form a Link State Database ( LSDB ). LSDB gives
the detailed information about network topology of routing
domain.
 All router’s LSDB are the same.
 According to LSDB, each router treats itself as the root and
other routers as leaves to calculate the Shortest Path Tree.
 The Shortest Path Tree calculated by each router gives
route table entries destined for other routers on the network.

-Splitting the AS into Areas:

Area 4

 Area is a set of networks.

18
OSPF supports the combination of a group of networks,
this group can be called an Area, that is to say, Area is a
set of networks.
 Area division reduces the size of LSDB, thus reduce the
network traffic
 the topology information within an area is not flooded
into other areas. Abstract routing information instead of
detailed link state information describing topology is
transmitted between areas.
 The router maintains a single LSDB for each area to
which the router is attached.

 Area 0 is called Backbone Area, which is responsible


for advertising routing information summarized by ABR
between non-backbone areas.

-Router Types:

 Internal Router:

19
Internal Router ( IR ) is the router whose attached
networks are all within the same area. The Internal
Routers within the same area maintain the same LSDB.
 Area Border Router:
Area Border Router ( ABR ) is the router that is attached
to more than one areas. ABR maintains one LSDB for
each attached area.
 Backbone Router:
Backbone Router is the router that has more than one
interfaces attached to the Backbone Area. All ABRs and
the routers whose all interfaces are within Backbone Area
are Backbone Routers.

 AS Boundary Router:
AS Boundary Router ( ASBR ) is the router that
exchanges routing information with routers in other AS.
ASBR advertises AS external routing information into the
whole routing domain.

-OSPF Protocol Runs Directly over IP:


OSPF Packets

 OSPF has 5 types of protocol packets, but all these packets


share a common protocol header.

-OSPF routing protocol packet types

20
Type Packet name Packet function

Discover /maintain neighbor


1 Hello
relationships

2 Database Description Summarize database contents

3 Link State Request Database download

4 Link State Update Database update

5 Link State Ack Flooding acknowledgment

-OSPF Protocol Packet Header:

Version # Type Packet Length

Router ID

Area ID

Checksum AuType

Authentication

Authentication

 All OSPF protocol packets share a common protocol


header.
 Version #:OSPF version number, which should be 2.

21
 Type:OSPF packet type, there are 5 type of packets.
 Packet length:The length of the OSPF protocol packet in
bytes. This length includes the standard OSPF header.
 Router ID:The Router ID of the packet’s source.
 Area ID:A 32-bit number identifying the area that this
packet belongs to.
 AuType:Identifies the authentication procedure to be used
for the packet.
 Authentication:A 64-bit field for use by the authentication
scheme.

-OSPF routing protocol neighbor relationship:


Neighbor:
o Two routers become neighbors if they have interfaces
attached to the same network. The neighbor
relationship is maintained by Hello Protocol.
Adjacency:
o A relationship formed between selected neighboring
routers for the purpose of exchanging routing
information.
Not every two neighboring routers will become adjacent.
The rule of establishing adjacency relationship varies with
network types.

22
-Neighbor State Transition (Neighbor Relationship):
2-Way Received

 This figure shows the process of establishing neighbor


relationship and the transition of neighbor states.
 Down:this is the initial state of a neighbor conversation. It
indicates that there has been no recent information received
from the neighbor. On NBMA networks, Hello packets may
still be sent to “Down” neighbors every PollInterval seconds,
generally this interval is equal to Router Dead Interval.
 Attempt:this state is only valid for neighbors attached to
NBMA networks. It indicates that no recent information has
been received from the neighbor, but that a more concerted
effort should be made to contact the neighbor. This is done
by sending the neighbor Hello packets at intervals of Hello
Interval. If no Hello packet is heard from neighbor in Router
Dead Interval, the state will transit to Down.
 Init: in this state, a Hello packet has recently been seen from
the neighbor. However the router itself did not appear in the
neighbor’s Hello packet indicating that bidirectional
communication has not yet been established with the
neighbor. Neighbor in Init state should be contained in Hello
packet sent by the router itself.
 2-WayReceived: Bidirectional communication has been
realized between the two neighboring routers. This is

23
indicated by the router seeing itself in the neighbor’s Hello
packet.
 2-Way: in this state, communication between the two routers
is bidirectional, but adjacency is not established. This is the
most advanced state short of beginning adjacency
establishment.
 1-WayReceived:a Hello packet has been received form
the neighbor, in which the router is not mentioned. This
situation is usually caused by restarting of neighbor.
-Neighbor State Transition (Adjacency Relationship):
Loading Done

 DD Sequence Number:Each DD packet has a sequence


number which is used for acknowledgement of DD packet.
The sequence number is 2 bytes .
 Master/Slave:Master and Slave relationship should be
established before sending DD packets to exchange LSDB
information. If Master and Slave relationship is determined,
Master is responsible for sending DD packet, Slave can only
send a DD packet whose sequence number must equal to
that of DD packet sent by Master. Related neighbor states:
 ExStart : this is the first step in creating an adjacency
between the two neighboring routers. The goal of this step is
to decide which router is the master, and to decide upon the
initial DD sequence number. Link state information is not
included in DD packet sent by neighbor in this state.
 Exchange:in this state the routers are sending DD packets
containing abstract of link state information to each other.
 Loading:in this state, LS Request packets are sent to the
neighbor asking for the more recent LSAs that have been
discovered but not yet received in the exchange state; LS

24
Update packets are sent to the neighbor sending LS
Request packets.
 Full:in this state, the neighboring routers’ LSDBs are fully
synchronized.

-Network Type Supported by OSPF:


 OSPF defines four network types: Point-to-point, Broadcast,
Non-Broadcast Multi-Access(NBMA) and Point-to-
MultiPoint.
 There is another type of network except four network
types just mentioned, that is Virtual Link.

 The Backbone Area must be continuous, if not, virtual links


can be used to make it logically continuous.
 Virtual links can be established between any two ABRs as
long as these two ABRs have interfaces attached to the
same non-backbone area, the nonbackbone area is called
Transit Area.
 Virtual link is a logical link belonging to the Backbone
Area ( Area 0 ).
25
-DR and BDR:
 Every broadcast and NBMA networks containing more than
two routers has a Designated Router ( DR ) and Backup
Designated Router ( BDR ).

 Functions of DR and BDR:


1. Reduce the number of adjacencies, thus reduce the
frequency of exchanging link state information and routing
information to save the bandwidth and lower the demand
for routers capability. The router that is neither DR nor
BDR only establish adjacency relationship with DR and
BDR to exchange link state information and routing
information, thus the number of adjacencies is greatly
reduced on broadcast and NBMA network.
2. the DR originates a network –LSA describing a
broadcast or NBMA network.
 Routers with a priority of 0 are ineligible to become DR or
BDR.
 The higher the Router Priority, the more preferable the
router is
 If the current DR doesn’t work, the BDR becomes the new
DR and the new BDR is elected; if the current BDR doesn’t
work, the new BDR is elected while the DR is not changed.

26
-LSA Type-Intra-Area Route Calculation:
LS
LSA Name LSA Description
Type

Generated by each router. Describing the


collected states of the router’s interfaces,
1 Router-LSA flooded only within the area where this
LSA is generated.

Generated by DR, available in broadcast


and NBMA network. Describing the set of
2 Network-LSA routers attached to the network. flooded
only within the area where this LSA is
generated.

Generated by ABR. Describing routes to


Network- networks that are outside the area but
3
Summary-LSA inside the AS, flooded within the area
where this LSA is generated

4 ASBR-Summary- Generated by ABR. Describing routes to


LSA ASBRs, flooded within the area where

27
this LSA is generated.

Generated by ASBR. Describing routes


5 AS-external-LSA to destinations external to the As, flooded
within the whole AS.

Intermediate System-to-Intermediate System


(IS-IS) protocol:
IS-IS is an IGP protocol which is based on link state calculation
algorithm. It can be run in both CLNP and IP environment. It
uses the TLV design and thus is of high expandability.
Currently, IS-IS is used widely in large ISP.
IS-IS is configured in the core layer of bearer network as an
important IGP, to make the routers access each other.

-Packet encapsulation of IS-IS:


 Different from other routing protocols, ISIS protocol run
directly on top of the data link layer. In order to synchronize
the link-state database, IS-IS exchange the link information
by sending the Protocol Data Unit (PDU).
 The PDU (Protocol Data Unit)consists of the following 3
parts:

28
 1. The header of the data link layer: OSI family identifier
0xFEFE is marked to indicate that the encapsulated is OSI
packet structure.
 2. IS-IS fixed packet header: The first byte is 0x83, indicates
IS-IS packet. ( If ES-IS protocol is adopted, the first byte of
the fixed packet header is 0x82; if CLNP protocol is adopted,
the first byte of the fixed packet header is 0x81).
 3. IS-IS TLVs:Its content might vary according to packet
type and includes many TLV structure.
 TLV is a variable length data structure, The advantages of
using TLV structure to build the packet are high flexibility and
extensibility.

-Working process of IS-IS protocol:


 Establish the adjacency relationship
 Synchronize the link state database
 Calculate the route

-Identifier:

29
Before establish any type of adjacency relationship with any
neighbor, the identifiers required are as follow:

 Identify every IS (SYSTEM ID)


 Identify the area every IS belonged to (AREA ID)
 Identify the IS type

-NSAP and NET:


NSAP:Network Service Access Point,correspond to CLNP
address of the OSI network layer(similar to the concept of IP
address)NSAP addresses are not fixed in length and can be
up to 20 bytes long (160 bits).
NET:Network Entity Titles,is a special NSAP address

IDP DSP

AFI IDI High Order DSP System ID NSE


Area ID (1~13B) 6B 1B

o N-selector is used to indicate the selected service. 0


indicates to provide service to the network layer
o NET is the identifier of the network equipment itself in
OSI protocol stack.
Example:

30
49.0021 . 1921.6800.1001 . 00
AreaID SystemID N-SEL

88.0001.0755 . 000f.e225.da08. 00
AreaID SystemID N-SEL
 Suppose a router takes the IP address 168.10.1.1 of the
interface Loopback0 as router ID. Then its system ID used in
IS-IS can be transformed with the following method:
 1. Extend every part of the IP address 168.10.1.1 to three
bits. Add 0 to the front of the part that includes less than
three bits.
 2. Divide the extended address 168.010.001.001 into three
parts, with each part consisting of four decimal digits. The
reconstructed 1680.1000.1001 is just the system ID.

-Configuration of SYSTEM ID and AREA ID:

31
 In fact, configuring a Network Entity Title (NET) means
assign a system ID to the router and defines the IS-IS area
address. The area address is identified through the AREA ID
identifier of NET. IS-IS routers that are having the same area
ID are considered to be in the same area.
 One IS-IS router can be configured with at most 3 NETs at
the same time. The Area ID of these 3 NETs are different but
the System ID are the same. Configuring 3 NETs in a single
IS-IS router is useful for merging areas, splitting area and
renumbering.

-Hierarchical Routing Domain:


32
-The size of the LSDB increases according to the network
scale
The increase of the size of LSDB introduces a great challenge
to the performance of the router.
The increase of the network scale might lead it to the instability
state
-Solution: Area division and hierarchical design

The whole routing domain is divided into 3 areas by configuring


the NET

 Level-1 router
33
 Only have the link state information of the local
area.
 Can only access the destination outside this
area via the nearest Level-1-2 router.
 Find the nearest level-1-2 router via the ATT bit
of the LSP.
 Generate a default route which points to the
nearest level-1-2 router in order to access the
destination outside this area.
 Level-2 router
 Form the backbone with other level-2 or level-1-
2 routers
 Contain the LSP for the routers in the whole
backbone area
 Contain the routing information of the whole
routing domain
 Level-1-2 router
 Form the backbone with other level-2 or level-1-
2 routers
 Contain level-1 LSDB and Level-2 LSDB
 Level 1-2 routers set the ATT bit in the Level-1
LSPs originated by itself
 Contain the routing information of the whole
network.

34
Example:

 RTA and RTE are Level-1routers; RTB and RTD are Level-
1-2 routers; RTC is Level-2 router. RTA and RTB belong to
area 49.0001; RTD and RTE belong to area 49.0002. RTA
advertises network 1.1.1.1 into IS-IS while RTE advertises
network 5.5.5.5 into IS-IS.
1-Enable IS-IS:
[RTA] isis
2-Configure network-entity:
[RTA-isis] network-entity 49.0001.0000.0000.1001.00
3-Configure IS level:
[RTA-isis] is-level level-1

35
-IS type, Circuit-level type and Adjacency type:
 3 types of IS
 Level-1, Level-2, Level-1-2
 3 types of circuit level
 Level-1, Level-2, Level-1-2
 3 types of adjacency relationship
 Level-1, Level-2, Level-1-2

 The combinations below can form adjacencies( in same


area)

36
 The combinations below can form adjacencies( in different
areas)

If two of the Level-1-2 routers belong to different area, only


Level-2 adjacencies can be established.

-Adjacency Relationship and Network Type:


 Adjacency relationship establishment varies according to the
network types
 IS-IS supports two network types
o Point to Point network
 PPP, HDLC and so on
 NBMA network is recommended to be configured
as PPP network.
o Broadcast Network
 Ethernet, Token Ring and so on

37
-HELLO Packet:
IS-IS establishes the adjacency relationship via Hello packet.
IS-IS Hello Packets (IIH)
o Level 1 LAN IS-IS Hello

o Level 2 LAN IS-IS Hello

o Point-to-Point Hello

-LSP, CSNP and PSNP:


IS-IS uses 3 types of packets to accomplish the database
synchronization.
o Link State Packets (LSP): carry the state
information.
 Level 1 LSP and Level 2 LSP
o Complete Sequence Number Packets
(CSNP):describe all the LSPs in its own LSDB
 Level 1 CSNP and Level 2 CSNP
o Partial Sequence Number Packets (PSNP) :request
or acknowledge certain LSP.
 Level 1 PSNP and Level 2 PSNP

38
Border Gateway Protocol(BGP):
BGP is a dynamic routing protocol that runs between ASs. It
provides the exchange of loop-free routing information.
 BGP is an enhanced distance vector routing protocol
 Reliable updates:
o Transport protocol: TCP, port 179

o Periodic updates is not required

o Route updates: incremental updates

o Send keepalive message periodically to keep TCP


connection available
 Rich metrics
 No loop in designing
 Support Classless Inter-Domain Routing (CIDR)

-BGP Message Types:


BGP uses four message types:
 Open: form the neighbor relationship with BGP peer
 Keepalive: sent periodically between the BGP peers
to verify the TCP connectivity
 Update: advertise routing information between the
BGP peers
 Notification: notify the peers when BGP speaker
detects the error

39
-Neighbor Relationship Based on the TCP
Connection:

 BGP uses TCP connection to build the neighbor relationship


We can use either IGP or static route to ensure the IP
reachability between two routers that form the TCP connection

-2 Types of BGP Neighbors-IBGP and EBGP:

 BGP runs in the following two modes: IBGP (Internal BGP),


EBGP (External BGP)

40
 If two peers that exchange BGP messages belong to
the same AS, they are Internal BGP (IBGP), such as
RTB and RTD.
 If two peers that exchange BGP messages belong to
different AS, they are External BGP (EBGP), such as
RTD and RTE.
 The basic configuration of BGP is as follow:
-Enable BGP (specify the local AS number), enter BGP view
[Router A] bgp as-number
-Using the bgp command, you can enable BGP and enter BGP
view. By default, the BGP is disabled.
-One router can run in only one AS. This means that one router
can be specified with only one AS-number.
-Specified the peer IP address and its AS number
[Router A-bgp] peer { group-name | ipv4-address | ipv6-
address} as-number as-number

41
-EBGP Multi-hop and specify the update source:

 The direct physical connection is not necessarily exists


between the IBGP peers. However, the TCP connection
must be established between them. We usually specify the
IBGP neighbor by using the loopback interface to ensure the
reliability of the route advertisement of IBGP peers. In the
case where loopback interface is used, we must specify the
source interface of route update packet.
 peer { group-name | peer-address } connect-interface
interface-name
 In most of the cases, there is a direct physical link between
the EBGP peers. However, it is hard to realize this in some
cases. To establish the EBGP connection with the peer on
the indirectly connected network, we need to modify the
maximum hop of EBGP packet by using the following
command:
 peer { group-name | peer-address } ebgp-max-hop [ ttl ]
42
-BGP Route Advertisement Principles:
After the BGP connection is established, information from the
BGP tables is exchanged between the BGP speakers.
When multiple paths exist, BGP speaker only selects the best
route from the BGP for its own use.
For the routes obtained from EBGP, BGP speaker will
advertise them to all its neighbors (including EBGP and IBGP)

-IBGP Full Mesh:

 IBG Full Mesh is one of the solution for route advertisement


problem caused by the IBGP split horizon rule. The
disadvantage of this method is that the router need to
maintain a large number of IBGP sessions and this consume
a lot of resources.
 Besides that, BGP provides 2 other methods for the problem
caused by the IBGP split horizon rule.
 Route-Reflector
 Confederation

43
-First Method to Become BGP Route:
-Network Command:
 The routing information discovered by IGP (for example
OSPF) is injected into the BGP routing table by using the
“network” command
 Need to configure the subnet mask precisely
network ipv4-address [ mask | mask-length ] [ route-policy
route-policy-name ]

-Second Method to Become BGP Route :


- Import Command:
 The second method is redistributing other routing protocols
into BGP routing table by using the import command.
Besides, we can specify the routing policy for the imported
route.
 import-route protocol [ process-id ] [ med med | route-
policy route-policy-name ]

-BGP Path Attributes:


 BGP path attributes are the characteristics of the
advertised BGP routes. It provides the information that
allows BGP to choose a shortest path, detect routing
loops, and determine routing policy.
 There are 4 types of BGP path attributes:
o Well-known mandatory
o Well-known discretionary
o Optional transitive
o Optional non-transitive

44
-Origin:Origin is a well-known mandatory attribute that is
used to define the origin of the routing information. It indicates
how a route becomes BGP route, such as IGP, EGP and
INCOMPLETE.
-As_PATH: A well-known mandatory attribute that lists a
sequence of the autonomous systems passed by a route. It is
used to prevent the routing loop. Besides, it can be used for
route filtering and selection.
-Next hop: A well-known mandatory attribute that defines the
IP address of the border router that should be used as the next
hop to the destinations listed in the Network Layer Reachability
field of the UPDATE message.
-MED:MED is an optional non-transitive attribute. When some
AS has multiple entries, the MED attribute can be used to help
other external AS in selecting a better entry path. The smaller
the MED value of a route, the higher its precedence.
-Local-Preference:Local preference is a well-known
discretionary attribute. It is used only inside an autonomous
system and not passed to other autonomous systems. If an
internal BGP speaker receives multiple routes to the same
destination, it compares the local preference attributes of the
routes. This reflects the preference level of the BGP speaker
for each external route. The larger the local preference value,
the higher the preference level of the route.
-Community:It is an optional transitive attribute that is
designed to simplify policy enforcement. It marks a group of
routing information that has the same feature which is irrelevant
to its IP subnet or autonomous system.
45
 Multi Protocol Label Switching(MPLS):
 MPLS is a kind of label forwarding technology, it adopts
connectionless control plane and connection oriented data
plane, connectionless control plane implements routing
transmission and label distribution, connection oriented data
plane implements packet transmission along LSP (label
switch path) established before.

 In MPLS network domain, router does not need to analyze


every packet’s destination IP address, just forwards by label
that added before the IP header (as the figurer shows that
RTB receives labeled packet from RTA, then forwards by
label, RTC is similar). Comparing to traditional IP forwarding,
MPLS label forwarding greatly improves forwarding
efficiency.
 MPLS integrates the advantage of the two forwarding
technologies, powerful layer 3 routing function of IP network
and high efficiency forwarding mechanism of traditional layer
2 network, its forwarding plane adopts connection oriented, it
is very similar to layer 2 network forwarding method in
existence. It makes MPLS easy to implement seamless
46
combination of IP and ATM, frame relay and other layer 2
network, and provide better solution for TE (Traffic
Engineering), VPN (Virtual Private Network), QoS (Quality of
Service) and other applications.

-MPLS Network Model:

 the router and ATM switch located inside of MPLS domain


are called LSR, router and ATM switch located at the edge
of MPLS domain that used to connect IP network or other
kinds of network are called LER.
 Both of LER and LSR have the ability of label forwarding, but
they are located in different position, the packet processing
is different. LER’s charge is to receive IP packet from IP
network and insert label into the packet, then transmit it to
LSR, whereas, its charge is also to receive labeled packet
from LSR and remove label, transmit it to IP network; LSR’s
charge is to forward according to the label.

47
 The path that packet passes through in MPLS domain is
called Label Switch Path (LSP), this path is already
confirmed and established by kinds of protocols before
packet forwarding, packet will be transmitted along the
specified LSP.

-MPLS Structure:

 In control plane, routing protocol module is used to transmit


routing information, generate routing table; label distribution
protocol is used to complete exchange of label and establish
label switch path.
 Data plane includes IP forwarding table and label forwarding
table, when receiving conventional IP packets, if it is
conventional IP forwarding, it should lookup routing table and
forward, if it is label forwarding, it should forward by the label
forwarding table; when receiving labeled packets, if it needs
to forward by label, it should forward by label forwarding

48
table, if it needs to transmit to IP network, it should remove
label and forward by IP routing table.

-LDP Basic Concept:


 LDP is a protocol used to establish LDP Session between
LSRs and exchange Label/FEC mapping information.

-LDP Message Types:


 Discovery message: announce and maintain the
presence of an LSR in a network.
 Session message: establish, maintain, and terminate
sessions between LDP peers.
 Advertisement message: create, change, and delete
label mapping for FECs.
 Notification message: announce advisory information
and error information.

49
50

You might also like