Large-Scale IP Network Solutions (CCIE Professional Development)
by Khalid Raza - CCIE, Mark Turner
Fundamentals and Operation of IS-IS
As with any other link-state protocol, IS-IS also relies on neighbor information. Each router within an area maintains information about its connected network. This information is flooded to all the connected neighbors, and then the neighbors further flood the information.
During this flooding process, information about the origin of the routing information is preserved. This way, every router in the link-state database knows which router originated specific information within its area.
This is how all the routers within the IS-IS area receive complete information. When all the information is received, each router performs a Shortest Path First algorithm to find the best path to any destination. Every ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access