Datacom Report
Datacom Report
Datacom Report
Data Com
All what you have to know
Sundos Ahdab
4/16/2014
TCP/IP Basis Issue:
-architecture of OSI RM(Open System Interconnection Reference
Model):
Application layer 7
Presentation layer 6 High Layers: In charge of data
Session layer transmission between hosts.
5
Transport layer 4
Network layer 3
Low Layers: In charge of data
Data link layer 2 transmission in network.
Physical layer 1
2
-Master architecture TCP/IP:
3
Building Configuration Environment:
VRP Basic configuration(Versatile Routing Platform)
-Command View:
-Command Level:
4
-Enter and Quit System View:
operation command
-Language Mode:
operation command
operation command
5
-Setup via Console:
6
-Setup via Telnet:
If it is not the first time that the router is powered on and you
have already correctly configured the IP addresses of the
router interfaces, log-in authentication mode and call-in/call-
out restriction rules, you can log in to the router by Telnet
through WAN or LAN to configure the router.
There are two methods you may use to configure the router
if the router and the configuration terminal are in the same
LAN:
(1) Connect the PC with the router through a hub or a
layer-2 switch by normal lines.
(2) Connect the configuration terminal such as a PC with
the router directly with crossover network cables.
1. Configure the IP addresses of the router and the PC.
#Enter the interface view of the router
[Quidway]interface Ethernet 0/0
7
#Configure the IP address of the interface
[Quidway-Ethernet0/0]ip address 1.1.1.4 255.0.0.0
Configure the IP address of the PC such as 1.1.1.2/8 after
the router IP address is configured and
then “ping 1.1.1.4” on the PC to check the communication
between the PC and the router.
2. Configure the password for logging in through Telnet.
#Enter the vty user view and 0 4 indicates that up to 5
users can log in at the same time.
[Quidway] User-interface vty 0 4
#Choose password as the authentication mode.
[Quidway-ui-vty0-4] authentication-mode password
#Configure the password for authentication to Huawei.
[Quidway-ui-vty0-4] set authentication password simple
Huawei
#Configure the user privilege level to the manage level.
[Quidway-ui-vty0-4] user privilege level 3
Now you can run telnet 1.1.1.4 on the PC to log in to the
router.
8
-Setup via AUX:
9
IP Routing and routing table:
10
-Routes found by data-link layer protocols:
When data-link layer protocols are up, routes of this sort are
generated and their proto field value in the routing table is “direct”.
Routes discovered by the data-link layer do not need
maintenance, which reduces the workload. However, data-link
layer can only find routes to segments directly connected with its
interfaces and can not discover routes that cross segments.
Routes that cross segments can only be discovered by other
methods.
-Static routes:
11
You can query the routing table by running display ip routing-
table command after the static route is configured.
The static route is displayed in the routing table as highlighted in
red here.
-Dynamic protocol:
it is better to use dynamic routing protocols to find and change
routes, which does not need manual maintenance. However, the
cost of dynamic routing protocols is huge and it is rather
complicated to configure dynamic routing protocols.
12
-Routing Protocol classification -working area:
An AS is a set of networks under unified management.
According to their working area, routing protocols can be divided
into:
• Interior Gateway Protocol (IGP): a protocol for exchanging
routing
information between gateways within an autonomous network.
The protocols we introduce here like RIP and OSPF are IGP
protocols. Other IGP protocols that are not mentioned here
include ISIS, IGRP and EIGRP.
• Exterior Gateway Protocol (EGP): a protocol for exchanging
routing
information between two autonomous systems. The Border
Gateway Protocol (BGP) is a kind of EGP.
13
Distance-Vector routing protocols concern about the hops to the
destination, while Link-State protocols care more about the
network topology and bandwidth resources.
-Routing table:
Routing table plays a key role in packets forwarding. Each router
holds a routing table and every entry in the routing table tells a
packet should be sent through which physical port of a router to
reach a subnet or a host before the packet arrives at the next hop
router or its destination.
A routing table contains the following items:
14
•Preference:Routes to the same destination may come from
different sources. So the next hop of those routes may be the
same or different. In this case, how routers make their choice
about those routes? Route preference is here for this problem.
•Route Metric:
15
The route metric tells the cost of a route to its destination. Route
metrics are often decided by factors including the delay,
bandwidth, line occupation rate, line reliability, hops and the
maximum transmission unit.
If there are multiple routes to the same destination and their route
metrics and route preference are the same, all these routes will
be added to the routing table.
IP packets are sent on these routes alternatively, which helps to
realize the load balancing.
-Routing loop:
17
-Route Calculation Process of Link State Algorithm:
IP routing table
Area 4
18
OSPF supports the combination of a group of networks,
this group can be called an Area, that is to say, Area is a
set of networks.
Area division reduces the size of LSDB, thus reduce the
network traffic
the topology information within an area is not flooded
into other areas. Abstract routing information instead of
detailed link state information describing topology is
transmitted between areas.
The router maintains a single LSDB for each area to
which the router is attached.
-Router Types:
Internal Router:
19
Internal Router ( IR ) is the router whose attached
networks are all within the same area. The Internal
Routers within the same area maintain the same LSDB.
Area Border Router:
Area Border Router ( ABR ) is the router that is attached
to more than one areas. ABR maintains one LSDB for
each attached area.
Backbone Router:
Backbone Router is the router that has more than one
interfaces attached to the Backbone Area. All ABRs and
the routers whose all interfaces are within Backbone Area
are Backbone Routers.
AS Boundary Router:
AS Boundary Router ( ASBR ) is the router that
exchanges routing information with routers in other AS.
ASBR advertises AS external routing information into the
whole routing domain.
20
Type Packet name Packet function
Router ID
Area ID
Checksum AuType
Authentication
Authentication
21
Type:OSPF packet type, there are 5 type of packets.
Packet length:The length of the OSPF protocol packet in
bytes. This length includes the standard OSPF header.
Router ID:The Router ID of the packet’s source.
Area ID:A 32-bit number identifying the area that this
packet belongs to.
AuType:Identifies the authentication procedure to be used
for the packet.
Authentication:A 64-bit field for use by the authentication
scheme.
22
-Neighbor State Transition (Neighbor Relationship):
2-Way Received
23
indicated by the router seeing itself in the neighbor’s Hello
packet.
2-Way: in this state, communication between the two routers
is bidirectional, but adjacency is not established. This is the
most advanced state short of beginning adjacency
establishment.
1-WayReceived:a Hello packet has been received form
the neighbor, in which the router is not mentioned. This
situation is usually caused by restarting of neighbor.
-Neighbor State Transition (Adjacency Relationship):
Loading Done
24
Update packets are sent to the neighbor sending LS
Request packets.
Full:in this state, the neighboring routers’ LSDBs are fully
synchronized.
26
-LSA Type-Intra-Area Route Calculation:
LS
LSA Name LSA Description
Type
27
this LSA is generated.
28
1. The header of the data link layer: OSI family identifier
0xFEFE is marked to indicate that the encapsulated is OSI
packet structure.
2. IS-IS fixed packet header: The first byte is 0x83, indicates
IS-IS packet. ( If ES-IS protocol is adopted, the first byte of
the fixed packet header is 0x82; if CLNP protocol is adopted,
the first byte of the fixed packet header is 0x81).
3. IS-IS TLVs:Its content might vary according to packet
type and includes many TLV structure.
TLV is a variable length data structure, The advantages of
using TLV structure to build the packet are high flexibility and
extensibility.
-Identifier:
29
Before establish any type of adjacency relationship with any
neighbor, the identifiers required are as follow:
IDP DSP
30
49.0021 . 1921.6800.1001 . 00
AreaID SystemID N-SEL
88.0001.0755 . 000f.e225.da08. 00
AreaID SystemID N-SEL
Suppose a router takes the IP address 168.10.1.1 of the
interface Loopback0 as router ID. Then its system ID used in
IS-IS can be transformed with the following method:
1. Extend every part of the IP address 168.10.1.1 to three
bits. Add 0 to the front of the part that includes less than
three bits.
2. Divide the extended address 168.010.001.001 into three
parts, with each part consisting of four decimal digits. The
reconstructed 1680.1000.1001 is just the system ID.
31
In fact, configuring a Network Entity Title (NET) means
assign a system ID to the router and defines the IS-IS area
address. The area address is identified through the AREA ID
identifier of NET. IS-IS routers that are having the same area
ID are considered to be in the same area.
One IS-IS router can be configured with at most 3 NETs at
the same time. The Area ID of these 3 NETs are different but
the System ID are the same. Configuring 3 NETs in a single
IS-IS router is useful for merging areas, splitting area and
renumbering.
Level-1 router
33
Only have the link state information of the local
area.
Can only access the destination outside this
area via the nearest Level-1-2 router.
Find the nearest level-1-2 router via the ATT bit
of the LSP.
Generate a default route which points to the
nearest level-1-2 router in order to access the
destination outside this area.
Level-2 router
Form the backbone with other level-2 or level-1-
2 routers
Contain the LSP for the routers in the whole
backbone area
Contain the routing information of the whole
routing domain
Level-1-2 router
Form the backbone with other level-2 or level-1-
2 routers
Contain level-1 LSDB and Level-2 LSDB
Level 1-2 routers set the ATT bit in the Level-1
LSPs originated by itself
Contain the routing information of the whole
network.
34
Example:
RTA and RTE are Level-1routers; RTB and RTD are Level-
1-2 routers; RTC is Level-2 router. RTA and RTB belong to
area 49.0001; RTD and RTE belong to area 49.0002. RTA
advertises network 1.1.1.1 into IS-IS while RTE advertises
network 5.5.5.5 into IS-IS.
1-Enable IS-IS:
[RTA] isis
2-Configure network-entity:
[RTA-isis] network-entity 49.0001.0000.0000.1001.00
3-Configure IS level:
[RTA-isis] is-level level-1
35
-IS type, Circuit-level type and Adjacency type:
3 types of IS
Level-1, Level-2, Level-1-2
3 types of circuit level
Level-1, Level-2, Level-1-2
3 types of adjacency relationship
Level-1, Level-2, Level-1-2
36
The combinations below can form adjacencies( in different
areas)
37
-HELLO Packet:
IS-IS establishes the adjacency relationship via Hello packet.
IS-IS Hello Packets (IIH)
o Level 1 LAN IS-IS Hello
o Point-to-Point Hello
38
Border Gateway Protocol(BGP):
BGP is a dynamic routing protocol that runs between ASs. It
provides the exchange of loop-free routing information.
BGP is an enhanced distance vector routing protocol
Reliable updates:
o Transport protocol: TCP, port 179
39
-Neighbor Relationship Based on the TCP
Connection:
40
If two peers that exchange BGP messages belong to
the same AS, they are Internal BGP (IBGP), such as
RTB and RTD.
If two peers that exchange BGP messages belong to
different AS, they are External BGP (EBGP), such as
RTD and RTE.
The basic configuration of BGP is as follow:
-Enable BGP (specify the local AS number), enter BGP view
[Router A] bgp as-number
-Using the bgp command, you can enable BGP and enter BGP
view. By default, the BGP is disabled.
-One router can run in only one AS. This means that one router
can be specified with only one AS-number.
-Specified the peer IP address and its AS number
[Router A-bgp] peer { group-name | ipv4-address | ipv6-
address} as-number as-number
41
-EBGP Multi-hop and specify the update source:
43
-First Method to Become BGP Route:
-Network Command:
The routing information discovered by IGP (for example
OSPF) is injected into the BGP routing table by using the
“network” command
Need to configure the subnet mask precisely
network ipv4-address [ mask | mask-length ] [ route-policy
route-policy-name ]
44
-Origin:Origin is a well-known mandatory attribute that is
used to define the origin of the routing information. It indicates
how a route becomes BGP route, such as IGP, EGP and
INCOMPLETE.
-As_PATH: A well-known mandatory attribute that lists a
sequence of the autonomous systems passed by a route. It is
used to prevent the routing loop. Besides, it can be used for
route filtering and selection.
-Next hop: A well-known mandatory attribute that defines the
IP address of the border router that should be used as the next
hop to the destinations listed in the Network Layer Reachability
field of the UPDATE message.
-MED:MED is an optional non-transitive attribute. When some
AS has multiple entries, the MED attribute can be used to help
other external AS in selecting a better entry path. The smaller
the MED value of a route, the higher its precedence.
-Local-Preference:Local preference is a well-known
discretionary attribute. It is used only inside an autonomous
system and not passed to other autonomous systems. If an
internal BGP speaker receives multiple routes to the same
destination, it compares the local preference attributes of the
routes. This reflects the preference level of the BGP speaker
for each external route. The larger the local preference value,
the higher the preference level of the route.
-Community:It is an optional transitive attribute that is
designed to simplify policy enforcement. It marks a group of
routing information that has the same feature which is irrelevant
to its IP subnet or autonomous system.
45
Multi Protocol Label Switching(MPLS):
MPLS is a kind of label forwarding technology, it adopts
connectionless control plane and connection oriented data
plane, connectionless control plane implements routing
transmission and label distribution, connection oriented data
plane implements packet transmission along LSP (label
switch path) established before.
47
The path that packet passes through in MPLS domain is
called Label Switch Path (LSP), this path is already
confirmed and established by kinds of protocols before
packet forwarding, packet will be transmitted along the
specified LSP.
-MPLS Structure:
48
table, if it needs to transmit to IP network, it should remove
label and forward by IP routing table.
49
50