generate the most reasonable path (merge ).
(The basic logic of RIP is: if A is 6 away from B and I am 1 Away From A, the distance from A to B is 7)
For technical reasons (looping hops), rip considers that IP addresses over 15 cannot arrive. Therefore, rip is more used in the Internet (such as the entire China Telecom Network ). Such an internet part often belongs to the same ISP or has the same management organization, so it is called an autonomous system (as, autonomous system ). Hosts and
Use BGP when one of the following conditions exists
----- As allows data packets to pass through it to other self-made Systems
Multiple external connections, multiple carriers, and multiple Internet connections
You must control the inbound and outbound data streams.
BGP is not used when the following conditions exist:
Connect only to the as or Internet
When the vro memory and CPU performance is poor
《
BGP routing policies in ISP Networks
"
IEEE Network magazine 2005
1 Ways to configure local policythere are three classes of "knobs" that can be used to controlimport and export policies: 1) preference (demo-process) 2) filter (eliminate certain route) 3) tag (community) 2 BGP policy common practice and design pattern1) business relationship (1) inbound: Assign local-preference to influence the
The problems that arise:
A) R1 has a 7.7.7.0/24 route on it, but Ping 7.7.7.7 is not reached. (R7 same)
Now view the R1 routing table
R7#sh IP route
B 1.1.1.0 [20/0] via 5.5.5.5, 00:02:54/To save space incomplete display
It can be seen that R7 learned the route of the R1, from the surface to see the experiment is perfect, for the purpose, but then the problem arises, make a test, on the R7 ping R1
R7#ping 1.1.1.1
Type escape sequence to abort.
Sending 5, 0-byte ICMP Echos to 7.7.7.7, tim
1. If the next hop cannot be reached, do not consider2. Select a route with the maximum weight.3. If the route has the same weight, use the route with the highest local priority.4. If you have the same local priority, the BGP Route from the vrobgp is preferred.5. If there is no BGP Route from the vrobgp, select the route with the shortest AS length.6. If all the routes have the same AS length, select the ro
What is the next hop of a BGP third party? Compare the next hop of the route from which the router sends the route with the outgoing interface. If the route is in the same CIDR Block, the next hop of the route remains unchanged. Let's take a look at the following example: www.2cto.com R1, R2, and R3 routers. The interface IP addresses are 10.1.1.1/10.1.1.2 and 10.1.1.3 respectively. R1 and R2 run IBGP, R1 and R3 run EBGP, there is a loopback2 on R2 an
Experiment topology:
R1 configuration:
R2 configuration:
R3 configuration:
Verify:
From the BGP general rule 1.1.1.0/24 's next hop should be R2 (123.1.1.2) but it has automatically changed to R1 123.1.1.1. This is the third party's next jump. This is a change in the control level.
Route redirection is a change in the forwarding of the data plane, and the next hop does not change. (Refer to My route redirection experiment)
This arti
Tip: You can modify some of the code before running
Simple and practical music anycast effect and Between--> and --> erait-mediaplayer V1.0 version music 1 music 2 music 3
If you forget it, remember
1. Download the original data package of .bz2from http://archive.routeviews.org/and decompress
Bzip2-D xxx.bz2
2. Download the zebra-dump-parser software to convert data into ASCII code.
Http://www.linux.it /~
^ Flags The beginning of an expression, and if this character is not used, there is no starting limit for default. For example: When using the permit ^254, the meaning is that the route that is connected to the local as is 254 is allowed. If you use
Rpm-i (or--install) options file1.rpm ... filen.rpm
Parameters:
file1.rpm ... filen.rpm the name of the RPM package that will be installed
Detailed options:
-H (or--hash) output hash mark (' # ') at installation
The--test is only tested for
Huawei's configuration:
As shown in the following illustration, for the purpose of understanding the IP address (C class address/30 mask) that is used to make the host name connected between them.
The blue area is Area1, the green area is Area2,
= Day 1 =
Today we are talking about advanced IP address Editing:I found that there are indeed many IPv6 addresses! On average, each person has hundreds of millions and hundreds of millions of people ...... Enough ~IPv6 addresses starting with 2002 are used to convert v4, followed by v4 addresses in hexadecimal notation;I have a more perceptual knowledge of anycast, which means that data needs to be sent to the RP first, and then the target host need
, BSD sockets4 Transport LayerTransport Layer such as TCP, UDP, TLS, RTP, SCTP, SPX, ATP, IL3 Network layerNetwork layer such as IP, ICMP, IGMP, IPX, BGP, OSPF, RIP, IGRP, EIGRP, ARP, RARP, x.2 Data Link layerData Link layer such as Ethernet, Token Ring, HDLC, Frame Relay, ISDN, ATM, IEEE 802.11, FDDI, PPP1 Physical layerPhysical layer such as line, radio, optical fiberIPV6 addressingThe IPV6 has a much larger encoding address space than the I
specific Nat route. The target address is a dumb address (or an external address). before forwarding, you mustFor address translation.Anycast is assigned to the local machine as the target anycast address. This type of address is similar to a local address, noThis type of address cannot be used as the source address of any data packet.Multicast uses multicast routing. In a common routing table, this route does not exist.
7. 5. Route table
Starting fr
internal algorithm
LS (link state) type
Flooding: Requires the source node to send a grouped copy to all neighborsControlled flooding: Each node maintains a list of received, duplicated, forwarded short addresses, and broadcast groupings, which are judged when a copy is received
4 BGP (Broder Gateway Protocol)
Bgp-tcp-ip
As algorithm between
5 As-as
Maybe
Editor's note: Sdn-ip is an application on Onos that allows software-defined networks to connect to external networks using standard Border Gateway Protocol (BGP). From a BGP perspective, the SDN network behaves as a single autonomous system (as), with the same behavior as any traditional as. The SDN-IP application based on as provides an integrated integration mechanism between
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.