Font Size: a A A

The Design And Application Of ISIS Protocal In IP Network

Posted on:2008-09-10Degree:MasterType:Thesis
Country:ChinaCandidate:T HeFull Text:PDF
GTID:2178360215482658Subject:Electromagnetic field and microwave technology
Abstract/Summary:PDF Full Text Request
The main contents of the thesis is that it describes the designing and application of ISIS in IP network with the experience of my work on the base of ISIS protocol and the theory of network planning.Firstly, on the second chapter, it describes the protocol as a whole by introducing some important concept of ISIS protocol. ISIS uses delamination structure, transits information by sending data packet between routers, and adopts the convenient form of TLV. Then, it tells the theory of network planning in modern IP network, according to the ISIS protocol, routers in the core layer are always set to Level-2 routers, summary layer to Level-1-2 routers, and access layer to Level-1 routers. On the fourth chapter, it explans route computation through a simple example and the disvantage and advantage of SPF algorithm by comparing the Bellman-Ford algorithm and SPF algorithm. After introducing the basic theory, on the fifth chapter, it explans the network problem and the resolvation through some examples, including looping problem, transplanting problem, neighbour detection and the setting up and maintaining in neighbour and so on. On the sixth chapter, it discusses the ISIS malfunction and its resolvations in my work, mainly from link problem and route maintaining problem. Finally, after summing up the while thesis, it looks forwarding to the development of the route protocol in future, cooperation with other business and supporting to all kinds of network.
Keywords/Search Tags:link status algorithm, area, domain, route leaking
PDF Full Text Request
Related items