Integrated IS-IS Protocol Operation

13 Mar

This chapter covers the following topics, which you need to understand to
pass the CCNP/CCDP/CCIP BSCI exam:
■ Integrated IS-IS operation
■ Integrated IS-IS design considerations

Integrated IS-IS Protocol Operation
The topics in this chapter describe the routing protocol Integrated IS-IS by explaining its operation and design considerations. The detailed explanation of the routing protocol assumes knowledge of the general operation and purpose of routing protocols and, in particular, linkstate routing protocols.

Because Integrated IS-IS is similar to the Open Shortest Path First (OSPF) protocol, you should read the chapters on OSPF and reinforce the fundamentals of link-state protocols.

“Do I Know This Already?” Quiz
The purpose of the “Do I Know This Already?” quiz is to help you decide what parts of this chapter to use. If you already intend to read the entire chapter, you do not necessarily need to answer these questions now.

The 12-question quiz, derived from the major sections in the “Foundation Topics” portion of the chapter, helps you to determine how to spend your limited study time.

Table 11-1 outlines the major topics discussed in this chapter and the “Do I Know This Already?” quiz questions that correspond to those topics.
Table 11-1 “Do I Know This Already?” Foundation Topics Section-to-Question Mapping

Integrated IS-IS Operation

NOTE The goal of self-assessment is to gauge your mastery of the topics in this chapter. If you do not know the answer to a question or are only partially sure of the answer, you should mark this question wrong for purposes of the self-assessment. Giving yourself credit for an answer you correctly guess skews your self-assessment results and might provide you with a false sense of security.

1. What triggers an LSP update to be flooded to neighbors?
a. When an adjacency goes up or down
b. When there is a change in the state of the interface
c. When there is a change in the routing table
d. When an LSP is received

2. If an LSP that already exists in the database is received, the received LSP is ignored on what condition?
a. It is a valid packet that is older than the one in the database.
b. It is a valid packet with the same sequence number as the one in the database.
c. It is not a valid packet because it is corrupted.
d. It is a valid packet that is newer than the one in the database.

3. A point-to-point link uses which of the following packets to create and maintain neighbor tables in addition to the link-state databases?
a. PSNP
b. Hellos
c. CSNP
d. LSP

4. What is the PATH table used for?
a. Each candidate route is placed in the PATH database while the metric is examined to determine if it is the shortest path to the destination.
b. The forwarding database examines the PATH table to ascertain the details of the chosen path.
c. Private Allocation Tree Hidden (PATH table) lists the RFC 1918 addresses to prevent them leaking into the Internet.
d. It holds the LSP immediately prior to flooding.

5. There are many criteria used in selecting routes. These criteria are used in a certain order to ensure that the best decision has been made. Which of the following criteria is used first in the selection process?
a. Longest match, that is, the route with the most specific subnet mask
b. Level 1 routes
c. Internal routes (within the autonomous system)
d. Routes with ToS defined

6. What is the default cost applied to the outgoing interface of a Cisco router configured to run IS-IS?
a. 15
b. 10
c. Inverse of bandwidth
d. There is no default. It must be configured.

7. At what point is the forwarding database created?
a. After all the LSPs are received
b. As soon as the LSP is received
c. After the SPT is built
d. Once the neighbor table is built

8. When the router receives user data and error reports, to which process are they sent?
a. The decision process
b. The forwarding process
c. The receive process
d. The update process

9. When the router receives hellos or routing information (in the form of SNPs and LSPs) to which process are they sent?
a. The decision process
b. The forwarding process
c. The receive process
d. The update process

10. Which of the following are IS-IS rules for summarization?
a. All Level 1 routers can summarize routes.
b. All Level 2 routers can summarize at the area boundary.
c. If a Level 1-2 router is summarizing routes sent to a Level 2 router, all Level 1-2 routers must summarize in the same way.
d. All the above.

11. What is the advantage of designing a totally flat network running Level 1-2 routing on every router?
a. This design allows for easy migration to multiple areas.
b. This design allows for easy system administration.
c. This design requires fewer resources of either the network or the router.
d. Summarization can be configured within the area.

12. What could result if the Level 1-2 router fails?
a. Another router would be elected as the Level 1-2 router.
b. The autonomous system would not be able to communicate with the outside world.
c. The area would be completely annexed from the rest of the network.
d. No summary routes would be sent into the backbone area.

The answers to this quiz are found in Appendix A, “Answers to Chapter ‘Do I Know This Already?’ Quizzes and Q&A Sections.” The suggested choices for your next step are as follows:

■ 6 or less overall score —Read the entire chapter. This includes the “Foundation Topics” and “Foundation Summary” sections, and the “Q&A” section at the end of the chapter.
■ 7–9 overall score —Begin with the “Foundation Summary” section, and then go to the “Q&A” section at the end of the chapter. If you have trouble with these questions, read the appropriate sections in “Foundation Topics.”
■ 10 or more overall score —If you want more review on these topics, skip to the “Foundation Summary” section, and then go to the “Q&A” section at the end of the chapter. Otherwise, move to the next chapter.

Foundation Topics
Integrated IS-IS Operation

Before you can fully grasp the details of IS-IS and how it routes traffic, you must understand the routing protocol operation. This operation is similar to the section on IS-IS convergence detailed in Chapter 5, “IP Link-State Routing Principles.” The section in Chapter 5 dealt with how the routing protocol identifies a change in the network and updates the routing tables. This section describes how all the databases for IS-IS are created and maintained, not simply how they are updated.

A high-level overview of the Integrated IS-IS operation follows:

1. Routers send Hellos out of all Integrated IS-IS interfaces to discover neighbors and to form adjacencies.
2. Routers sharing a common data link become neighbors.
3. Routers build link-state packets (LSPs) based on local Integrated IS-IS interfaces and prefixes learned from other adjacent routers. These are sent to all neighbors.
4. Routers flood received LSPs to all adjacent routers except to the neighbor from which the LSP was received.
5. When new or different LSPs are received, the router adds the LSPs to the link-state database.
6. The router calculates the SPF for each destination and constructs the shortest path tree (SPT) and the forwarding database.

The routing process for IS-IS is divided into four stages:
■ Update
■ Decision
■ Forwarding
■ Receive
The following sections describe each stage in detail.

The Update Process
The router can forward data packets to the remote destination only if it has an understanding of the network topology. The router can then determine the best path to the remote network and send the data packet on the next stage of its journey.

To ensure that every router has the information required, each router generates its own LSP. The LSP lists the router’s neighbors, which are propagated throughout the network. The flooding of LSPs ensures every router has the same set of LSPs and that the link-state databases are identical.

LSPs are generated whenever there is a change in the network, often because of a configuration change. However, any of the following instances trigger a new LSP to be flooded throughout the network:

■ An adjacency either comes up or down (for example, a new router comes online).
■ An interface on the router changes state or is assigned a new metric.
■ An IP route changes (for example, because of redistribution).
During the flooding process, a router both receives and sends LSPs. The action of each instance has
clear rules of engagement.

Sending and Receiving an LSP
On receipt of the new LSP, the router stores it in the link-state database and marks it for flooding. If the LSP is already present in the database, the router just acknowledges and ignores it. The router sends the duplicated LSP to its neighbors, which in turn flood to their neighbors and onward to the very edges of the network. Because Level 1 and Level 2 routers have their own link-state databases, Level 1 LSPs are flooded throughout the area; Level 2 LSPs are sent across all Level 2 adjacencies.

The process of propagating LSPs differs slightly, depending on which medium the LSP was received. The following sections describe the propagation process for point to-point and broadcast links.

Propagating LSPs on a Point-to-Point Interface
The point-to-point link does not need to ensure that multiple systems have synchronized databases. With only one other router with which to work, some reliance is given to the router’s capability to determine the need to update so that bandwidth can be optimized.

The following list describes the flooding process on a point-to-point link:

1. When an adjacency is established, both sides send a complete sequence number packet (CSNP) with a compressed version of their link-state database (Router ID and the sequence number).
2. If there are any LSPs in the receiving router’s database that were not in the CSNP it received, it sends a copy of the missing LSPs to the other router.
3. Likewise, if the database is missing any LSPs received in the CSNP, the receiving router requests the detailed or full LSP to be sent.

4. The individual LSPs are requested, sent, and acknowledged via partial-sequence number packet (PSNPs).
5. When an LSP is sent, the router sets a timer, and if no explicit acknowledgement has been received before the timer expires, the LSP is resent. This timer is the minimumLSPTransmission-interval and can be configured; the default on a Cisco router is five seconds.

Propagating LSPs on a Broadcast Link
A broadcast link may need to send out both Level 1 and Level 2 updates. The link sends these updates using multicast MAC addresses to all Level 1 routers and all Level 2 routers. Because the pseudonode is just that, a pretend system, a real node or system must enter the charade and perform the tasks of the pseudonode. The designated intermediate system (DIS) takes on much of the responsibility for synchronizing the databases on behalf of the pseudonode. The DIS has three tasks, as follows:

■ Creating and maintaining adjacencies
■ Creating and updating the pseudonode LSP
■ Flooding the LSPs over the LAN
The following lists the main steps in the flooding process:

1. On receipt of a CSNP, the router compares each compressed LSP with the link-state database.
2. If the database has a newer version of the LSP sent in the CSNP, or if there is no instance of the LSP in the CSNP, the router multicasts the LSP onto the LAN.
3. If the database is missing an LSP that was in the CSNP, it sends a PSNP requesting the full LSP.
Although the router multicasts, it is only the DIS that takes action.

Figure 11-1 summarizes the flow of CSNPs and PSNPs on broadcast and point-to-point links.
382 Chapter 11: Integrated IS-IS Protocol Operation
Figure 11-1 The Propagation of CSNPs and PSNPs

Propagation of CSNPs and PSNPs

Determining Whether the LSP in the Database Is Valid
The LSP contains three fields that help determine whether the LSP that has been received is more recent than that held in the database, and whether it is intact or has been corrupted. These three fields are as follows:

■ Remaining Lifetime —This is used to age-out old LSPs. If an LSP has been in the database for 20 minutes, it is assumed that the originating router has died. The refresh timer is set to 15 minutes.

If the lifetime expires, the LSP has the content removed, leaving only the header. The lifetime is set to show that it is a new LSP, and then it is flooded through the network.
All receiving routers accept the mutilated LSP, recognize that this means the route is bad, and purge the existing LSP from their databases.

■ Sequence Number —This is an unsigned 32-bit linear number. The first LSP is allocated the sequence number 1, and the following LSPs are incremented by 1.
■ Checksum —If a router receives an LSP and the checksum does not compute correctly, the LSP is flushed and the lifetime is set to 0. The router floods the LSP, all routers purge the LSP, and the originating router retransmits a new LSP.

The Decision Process
After the link-state databases have been synchronized, it is necessary to decide which path to take to reach the destination. Because the routers and hosts may have multiple connections to each other, there may be many paths from which to choose.

To make the decision as to the best path, link-state protocols employ the algorithm defined by Dijkstra. This algorithm is extremely complex, but its core function is to create a tree that mirrors the shortest paths to all destinations. Each router builds a shortest path tree with itself as the root. This is achieved by taking all the LSPs from the link-state database and using the Dijkstra algorithm to create the shortest path tree (SPT). The SPT is used in turn to create the forwarding table, also known as the routing table.

Several tables are created during this procedure. The PATH table is the SPT during construction, and the TENT is a tentative database (a scratchpad).

The steps by which the router’s SPT and the forwarding database are built are as follows:

Step 1 The router places itself at the root in the PATH table.
Step 2 The SPF takes each LSP from the link-state database and selects the best or shortest path by considering the metric for each path in turn. The lowest metric is selected as the shortest path.
Step 3 The decision process looks at LSP for the node just placed in the PATH table. The metric cost of getting to the node is added to the cost shown in LSP (the cost from the node to the destination advertised). If this path is not already in PATH or TENT with a better cost, put it in TENT.
Step 4 If the TENT table is empty, stop.
Step 5 If the TENT table is not empty, find the lowest-cost entry and move the PATH to the TENT table.
Step 6 The router then returns to step 2 and repeats the remaining steps.

If there is more than one path to a remote destination, the criteria by which the lowest cost paths are selected and placed in the forwarding database are as follows:

1. If there is more than one path with the lowest value metric, Cisco equipment places up to six equal-cost paths into the table. The default number of equal-cost paths is four.
2. Optional metrics are chosen before the default metric, but because Cisco supports only the default metric, this is a moot point.
3. Internal paths are chosen before external paths, because going outside the autonomous system is likely to be a suboptimal route and might be the result of a routing loop.
4. Level 1 paths within the area are more attractive. If the path is within the area, not only is it more efficient to route directly to it, but also going outside the area and returning can be the cause of a routing loop, demanding greater resources and time.

5. The address with the longest match or most specific address in IP is the address with the longest IP subnet mask. This ensures that the closest router is chosen, because prefix routing is configured by summarization that can occur only on area boundaries.
6. Type of Service (ToS) is a field in the IP header that allows for complex routing decisions to be made by adding another level of criteria to the decision process. If ToS has been configured, the path with ToS is chosen over those paths with no ToS.
7. If multiple paths have ToS configured, the path with the shortest route is selected.
8. If the ToS is the same, up to six entries are placed into the forwarding database and the routers load balance between them.
9. If there is no path, the forwarding database sends the packet to the nearest Level 2 router, which is the default router.

The metric defines the cost of the path. Integrated IS-IS has four metrics, only one of which is required and supported. The metrics defined in ISO 10589 are as follows:
■ Default—Sometimes referred to as cost. Every Integrated IS-IS router must support this metric. Cisco set the default for all interfaces to be 10.
■ Delay—This optional metric reflects the transit delay.
■ Expense —This optional metric reflects the monetary expense of the network.
■ Error —The reliability of the path is determined as the metric.

The ISO metrics are configured on the outgoing interface using an integer value between 0 and 63. A 10-bit field describes the total path to a destination, allowing a value between 0 and 1023. Considering this to be inadequate, Cisco increased the metric size to be 24 bits. The default configuration is using the 6-bit or narrow metric. This metric is the original metric that acquired the name narrow only after the wide metric was defined.

In determining the shortest path, the lowest metric is chosen, internal paths are chosen over external paths, and Level 1 routes have precedence over Level 2 routes.

The default or cost metric is the only metric supported by Cisco, because each metric used in Integrated IS-IS requires a different link-state database calculation for both the Level 1 and Level 2 routes.

Other rules have little to do with the decision process but are responsible for ensuring the LSPs are valid. Essentially, Integrated IS-IS ignores incomplete fragments. Any fragmented packet entering the router is ignored if there is no starting fragment with the packet header (because this indicates packet loss or corruption). The O fragment also defines whether the OL bit is set, the Integrated IS-IS type, and whether there are entries in the Area Address options field. Although this does not eliminate the reassembly of corrupted packets, it certainly reduces the load.

The Forwarding and Receive Processes
The IP subnets are carried in the LSPs in the IP Reachability TLV (code 128) and are treated in the same manner as the OSI addresses. The decision process for building the SPT is the routing decision.

After the SPT has been built, the forwarding database can be created. The forwarding table is essentially a lookup table for the longest match, where load balancing occurs on multiple equal-cost paths. The forwarding table for Integrated IS-IS is more relevant to CLNS than to IP because the IP routing information is entered directly into the IP routing table, where IP routes are leaves on the tree of IS-IS.

Although the forwarding database is concerned solely with forwarding the data, it selects the longest match and load balances across equal-cost links.

If the frame is valid, the receive process passes user data and error reports to the forwarding process, whereas routing information Hellos, LSPs, and SNPs are sent to the update process.

The receive process is not described in depth here because it is primarily concerned with CLNS routing and does not concern IP. A detailed description is given in the ISO 10589 standards document.

Integrated IS-IS Design Considerations
Optimizing the network depends on careful planning and design. Although each network is constrained by physical and technical limitations, you must strive to design your network to meet the needs of its users and accommodate the demands of various applications.

In Integrated IS-IS, the fundamental design considerations are areas and addressing. The next sections describe the Integrated IS-IS design considerations of area design, route summarization, and nonbroadcast multiaccess (NBMA) modeling solutions.

Area Design of Integrated IS-IS Routers
When designing a network, you have to compromise. Typically, the trade-off is between reliability and speed. What is most efficient for the network is determined by the requirements of the network and the resources available.

In designing Integrated IS-IS networks and the hierarchical design, you need to consider the data flow in addition to the resources required by the routing protocol. Tuning the update process might be sufficient, although this results in the compromise of resources and reliability. If you reduce the update timers, the databases converge more quickly, but the network could be depleted of necessary resources to route data.

In area design, two SPF databases need to be maintained, which requires the use of additional resources for those routers that straddle more than one area, that is, Level 1-2 routers. The increased resources required are not only in terms of CPU and memory, but also in bandwidth for the propagation of LSPs.

Some typical designs include the following:

■ A totally flat network that uses only Level 1 routing. This design will not scale because any change in the network requires a flood of LSPs to all routers, which consequently run the SPF algorithm. However, this simplified design has some advantages: There will be only one SPF database and no problem of suboptimal routing between areas.
■ A totally flat network using only Level 2 routing. As the network expands, Level 1 areas may be added. The Level 2 area has complete internal knowledge with the streamlined advantages of one SPF instance. The Level 1 area may well be a company connecting to the ISP, in which case the areas would be added as new customers came online.
■ A totally flat network using the Cisco default of every router running Level 1-2 routing. This allows for easy migration to a hierarchical design and overcomes the problem of suboptimal routing. However, this design requires resources to maintain two SPF databases.
■ A hierarchical network where the core is running Level 2 routing, with Level 1 areas connecting into the core. Level 1-2 routers are used to connect the areas. Although this is an excellent design, using the strengths of IS-IS, there are still concerns that should be considered. This design results in the use of additional resources and the possibility of suboptimal routing. Configuring the metric for the outbound interface determines the routing decision. This requires a careful knowledge of the topology of the network to ensure that the problem is not compounded. Recent developments have allowed for route leaking to be created, which allows the Level 2 routers to pass some specific routing information into Level 1. This facilitates the optimal routing decision to be selected.

By default, Cisco routers running Integrated IS-IS operate as Level 1-2 routers. You can configure the router to reflect a true Level 1 and Level 2 design, but the default operation overcomes many potential pitfalls, including the following:

■ Area partitions —In hierarchical routing between areas, if there is a loss of connection between the Level 1 router and the Level 2 router, the subarea could be completely annexed unless there is an alternative route.
■ Loss of data —If the area becomes partitioned, a section of the network becomes unavailable through a loss of connectivity.
■ Suboptimal routing decisions —Level 1 areas have knowledge only of networks within their own areas. To reach another area, packets are sent to the nearest Level 2 router. Without additional configuration, the Level 1 router determines the nearest Level 2 router to be the one

with the lowest metric, which translates to the lowest hop count. The metrics used are the default metric of 10, regardless of the bandwidth.

Route Summarization
Summarization has many advantages. It reduces the resource needs of the network and hides network problems within an area. If the router is unaware of a change or problem in the network, the databases are not updated or recalculated, reducing the resources required for SPF calculations. The more details the router knows about the network, the more the router must do to maintain an accurate knowledge of that network; that is, anytime it fails to hear an LSP, however remote and small its detail of the network, the entire network must flood LSPs and recalculate the SPT. Summarization allows the areas to manage the internal knowledge of the network and to summarize that knowledge across area boundaries. The summarization command is given in Chapter 12, “Configuring Integrated IS-IS.”

The rules for summarization using OSPF in multiple areas apply to Integrated IS-IS. The rules for summarizing IP routes in Integrated IS-IS are as follows:

■ Level 1-2 routers can summarize the routes held within their area. The summarized routes are propagated to a Level 2 router. This is an efficient method of establishing prefix routing into other areas. The summarization is configured at the Level 1-2 router at the edge of the area. This is similar to the OSPF summarization by the ABR.
■ If one Level 1-2 router has route summarization configured, you must configure route summarization on every Level 1-2 router injecting updates into Level 2. If one router is advertising without summarization, all traffic destined for the area is sent to that router because Integrated IS-IS uses longest-match routing. Therefore, the router advertising the more specific route is the chosen one. This is true of Level 1-2 routers sharing the same Level 1 area.
■ Level 1 routes cannot be summarized within the area because this is not permitted by the protocol.

Integrated IS-IS NBMA Modeling Solutions in a Switched WAN Network
In the good old days, eight or more years ago, most organizations had a broadcast network (such as Ethernet) for the LAN and point-to-point links (such as a serial link) for the WAN. The broadcast link was multiaccess and the point-to-point link connected two systems, typically over a very low bandwidth link. Accommodating these different technologies when building a routing protocol made sense, but technologies have developed in complexity since then, particularly in the WAN environment.

Frame Relay and ATM are examples of NBMA networks. NBMA networks are not accommodated in Integrated IS-IS. OSPF has a point-to-multipoint configuration option, but Integrated IS-IS does not. The options are to use a multipoint configuration (which equates to a full mesh using broadcast technology), point-to-point subinterfaces, or a combination of both. The recommended solution is point-to-point subinterfaces, although it is possible to configure the interfaces as multipoint.

Foundation Summary
The “Foundation Summary” section of each chapter lists the most important facts from the chapter. Although this section does not list every fact from the chapter that will be on your exam, a wellprepared candidate should, at a minimum, know all the details in each “Foundation Summary” before going to take the exam.

Figure 11-2 shows how IS-IS selects the best path to be entered into the forwarding table.
The routing process is divided into four stages:

■ The update process
■ The decision process
■ The forwarding process
■ The receive process
Some typical area designs include the following:
■ A totally flat network that uses only Level 1 routing.
■ A totally flat network using only Level 2 routing. As the network expands, Level 1 areas may be added.

■ A totally flat network using the Cisco default configuration of every router running Level 1-2 routing.
■ A hierarchical network where the core is running Level 2 routing with Level 1 areas connecting into the core. Level 1-2 routers are used to connect the areas.

By default, Cisco routers running Integrated IS-IS operate as Level 1-2 routers, which overcomes many potential pitfalls, including the following:
■ Area partitions
■ Loss of data
■ Suboptimal routing decisions

However, this configuration consumes far more resources than a topology that uses a hierarchical design with Level 1, Level 2, and Level 1-2 routers.

Integrated IS-IS does not have a point-to-multipoint configuration option. The alternatives are as follows:

■ Configure the link as multipoint, creating a broadcast environment that requires the election of a DIS.
■ Configure the interfaces with subinterfaces that are point-to-point.

Figure 11-2 Selecting the Best Path to Be Entered into the Forwarding Table

Entered into the Forwarding

Q&A

As mentioned in the introduction, “All About the CCNP, CCDP, and CCIP Certifications,” you have two choices for review questions. The questions that follow next give you a bigger challenge than the exam itself by using an open-ended question format. By reviewing now with this more difficult question format, you can exercise your memory better and prove your conceptual and factual knowledge of this chapter. The answers to these questions are found in Appendix A.

For more practice with examlike question formats, including questions using a router simulator and multichoice questions, use the exam engine on the CD-ROM.

1. Which systems would you configure as Level 1-2 systems?
2. Which IS-IS configuration uses a full mesh and simulates a broadcast technology?
3. What are the four stages of the routing process?
4. What does an LSP contain?
5. When are LSPs generated?
6. State at least one of the main steps of the flooding process on a point-to-point link.
7. Which three fields determine whether the LSP is valid?
8. Once the link-state databases are synchronized, the Dijkstra algorithm is run. Describe where the router places itself in the tree.
9. State two criteria in determining which paths are to be placed in the forwarding database.
10. What are the ISO metrics?
11. How many equal-cost paths is it possible to have in the IS-IS routing table of a Cisco router?
12. What is a narrow metric?
13. Where is the IS-IS metric applied?
14. What action will the routing process take if it sees an incomplete LSP fragment?
15. Why is the IS-IS default of cost the only metric supported by Cisco?
16. When designing a network for fast convergence, what is the compromise that you need to consider?
17. What is a suboptimal routing decision?
18. Where does route summarization take place?
19. When is a DIS elected in a WAN environment?
20. Explain briefly how the IS-IS NBMA cloud is different than the configuration of the OSPF cloud.

No comments yet

Leave a Reply

You must be logged in to post a comment.