task group. The internal gateway protocol workgroup is designed for IP addresses, it is the next link State hierarchical routing algorithm of RIP in the Internet communication body. OSPF features include least-cost routing, multi-path, and load balancing. OSPF was developed from an earlier version of the IS-IS protocol and has two main features: first, the Protocol IS open, for example, RFC 1247 has OSPF rules. Second, OSPF is built on the SPF algorithm. SPF is also called DIJKSTRA algorithm. I
routing algorithm of RIP in the Internet communication body. OSPF features include least-cost routing, multi-path, and load balancing. OSPF was developed from an earlier version of the IS-IS protocol and has two main features: first, the Protocol IS open, for example, RFC1247 has OSPF rules. Second, OSPF is built on the SPF algorithm. SPF is also called DIJKSTRA algorithm. It is named after the founder of this algorithm.
Border Gateway Protocol BGP
management domain. All interface information, all measurements, and other variables are included in the OSPF link status broadcast. A vro with 0SPF must first collect the relevant link status information and calculate the shortest path to each node based on certain algorithms. The Distance Vector-based routing protocol only sends route update information to its neighboring routers.
Different from RIP, OSPF divides an autonomous domain into zones. There are two types of routes to be selected: wh
.
2. Introduction to the IP packet sending Tool
Currently, there are many commonly used tools for generating IP packets, such as sendip, Nessus, ipsend, ippacket, And sniffer,
The following describes three commonly used tools: sendip, Nessus, And sniffer.
2.1. sendip Tool
Sendip is a command line tool in Linux.
IP packet, which has a large number of command line parameters to specify the header formats of various protocols. Currently, NTP, BGP, Rip, r
addition, the flannel CIDR-based design is stupid and can cause a lot of wasted IP addresses.CalicoNext look at Calico, it is a relatively young project, but ambitious, can be used in virtual machines, physical machines and container environment. The protocol used by Calico is a BGP protocol that most people have never heard of, and it's completely based on three-tier routing, and it doesn't have a two-tier concept. So you can see a lot of routing ta
forwarding it to hub a. This transmission is then propagated by hub A to all users in workgroup a until the printer a responds. Classification of routers1. Local routerThe so-called local router refers to the 6-20 above, each network segment using a router to connect, but only within a limited area network, not across the remote connection.2. Remote routerWhether it is a local router or a local router, the nature of the router does not change, or the router, but the remote router refers to the
In the ospf protocol, each interface has a cost value calculated by default formula based on its rate. The ospf protocol uses the cost value to determine the optimal path to the destination, if multiple paths reach the destination, the path with the lowest cost value is preferred. The Cost value is the sum of the cost values of all the interfaces that forward data along the destination. The following is an experiment to verify it.
The topology is as follows:
The route table on RT11 is as follo
are three aspects involved in route selection:1 , the processing of various routing protocols , including RIP,IGRPEIGRP,OSPF,IS-IS,BGP, and so on, each protocol passes the network routing information between routers through IP packets, and provides information for the establishment of routing tables.2 , a routing table that receives information from the routing protocol and provides the information needed to forward the packet.3 , the forwarding p
adopt a centralized deployment of the scheme, so in the face of domestic network interconnection problems, even in the face of international network interoperability problem we have to rely on third-party services-good IDC and hosting services. In the experience of traditional solutions in the multi-line room. The test certificate of the BGP room (which has been suspected not to be a true BGP room). Also e
# The following is just a summary of their own, deepen memoryBackground Prerequisites Introduction:Work needs, to achieve the two-level Nginx reverse proxy backup request, due to domestic and foreign network instability reasons.Topology: Main Station (Beijing BGP) front-end nginx, back-end TomcatHomemade CDN (nginx reverse proxy)Node 1:HK Hong KongNode 2:BM North AmericaProblem: BM nginx reverse proxy to Beijing B
Let you achieve: access to the telecommunications server to automatically use telecommunications lines, and access to the Netcom server automatically use the Netcom line. Internet friends are basically clear, the North Netcom and southern Telecom Internet communication bottlenecks, and not to say what is the cause of the specific, but this does give the application of the Internet has caused a great obstacle. Therefore, from the server and IDC operating point of view, there are many dual-line ro
Release date:Updated on:
Affected Systems:RedHat Enterprise Linux Server Optional 6RedHat Enterprise Linux Workstation Optional 6Description:--------------------------------------------------------------------------------Cve id: CVE-2010-1674, CVE-2010-1675
Quagga is a TCP/IP-based routing software suite. The Quagga bgpd daemon implements the BGP routing protocol.
The bgpd daemon of Quagga has a denial-of-service vulnerability in processing certain
engineers to collect some information.
Because of its diligence and diligence, Xiao Gao has accumulated a lot of experience in determining the cause of failure through logs.Troubleshooting Process
According to the company's fault handling process, xiaogao first checks the monitoring alarm log information, confirms that the alarm device is a PE (Provider Edge) router device in a region, and then logs on to the device for troubleshooting, by checking the device logs, we can find that the device h
scope global nexthop dev ppp0 nexthop dev ppp1
# Ip route replace default scope global nexthop dev ppp0 nexthop dev ppp1
Example 4: configure a NAT route. Before forwarding a packet from 192.203.80.144, convert the network address to 193.233.7.83.
# Ip route add nat 192.203.80.142 via 193.233.7.83
Example 5: Achieve Packet-level load balancing and allow random packet sending from multiple routes. You can set the weight for weight.
# Ip route replace default equalize nexthop via 211.139.218
because no interface is specified for the virtual next hop static route, in this case, the next hop uses a BGP Route through route iteration. This route points to RouterE, causing a loop. The next hop 202.105.0.5 address matches the manually added static route, and the next hop address does not change, because the original outbound interface has been down, the current outbound interface changes to RouterE. For example, if you select 61.142.140.166, t
to the previous command
# IP Route del default scope global nexthop Dev ppp0 nexthop Dev ppp1
7.8.ip route show -- list routes
Abbreviations: Show, list, sh, ls, l
Example 1: calculate the number of routes using the gated/BGP protocol
# IP Route ls proto gated/BGP | WC
1413 9891 79010
Example 2: calculate the number of cached routes. The-O option is required because the cached route attributes may be great
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.