IS-IS TLV’s

TLV (Type-Length-Value or Tag-Length-Value) is an encoding scheme used for optional information element in a certain protocol. The type and length are fixed in size (typically 1-4 bytes), and the value field is of variable size. Type: It is simply the data being processed, a binary code, often simply alphanumeric, which indicates the kind of field that this part of the message represents. Length: It specifies the length/size of the value field, typically in bytes Value: Variable-sized series of bytes which contains data for this part of the message. It is the third field and contains a “length” amount of data representing the value for Read More …

Adjacencies in IS-IS

IS-IS Protocol has two types of nodes (since the roots of IS-IS are based on ISO Connectionless Network Protocol) i.e. IS & ES. ES (End System): A workstation or network host (limited routing capability) IS (Intermediate Systems): Network devices such as routers with full packet-forwarding capabilities. The word intermediate refers to the capabilities of routers as intermediate forwarding or relay devices. These are also referred to as gateway in some older networking literature of ISO   *If these terms are new to you, I would recommend to review the IS-IS terminology & basics at ATech before proceeding further at: A brief flashback of IS-IS – Part I Read More …

Jumbo, MTU and MFL

 is short for maximum transmit unit, which represents the length of an L3 packet or IP data packet. is short for Maximum Received Unit, which represents the maximum frame which can be received on the link.  is short for maximum frame length, which represents the length of an L2 packet or Ethernet MAC frame. To better explain, let’s look at the structure of an Ethernet frame:   From the diagram, we can see that: – The IP data packet ranges from 46 bytes to 1500 bytes. So the MTU is 1500 bytes. – The Ethernet MAC frame ranges from 64 Read More …

OSPF Authentication

What is Authentication: Authentication is the mechanism of recognizing the identity of a user. Associating an incoming request with a set of identifying credentials is called Authentication.    The credentials provided are compared to those in the database of the authorized user’s information register on a local operating system or somewhere remote. If the user is on white-list then he/she is allowed the access, otherwise the access is rejected simply.     Types of OSPF Authentication OSPF supports two types of authentication i.e. Plain Text authentication and Message Digest 5 (MD5) authentication. As a message/packet required authentication for both destinations.   Read More …