当前位置:网站首页>Comparison of four dynamic routes: Rip, OSPF, Isis, BGP
Comparison of four dynamic routes: Rip, OSPF, Isis, BGP
2022-06-24 02:04:00 【Network technology alliance station】
RIP
RIP(Routing Information Protocol, Routing information protocol ) Is one of the oldest protocols .RIP It is a distributed routing protocol based on distance vector ,RIP The agreement is Xerox 20 century 80 Introduced in the s , It is mainly applicable to small-scale network environment .RIP The protocol is mainly used for one AS( Autonomous systems ) The transmission of routing information within , Every time 30s Send a routing information update .
OSPF
OSPF(Open Shortest Path First Open shortest paths take precedence ) It's an internal gateway protocol (Interior Gateway Protocol, abbreviation IGP), Used in a single autonomous system (autonomous system,AS) Internal decision routing . It is an implementation of link state routing protocol , It belongs to the internal gateway protocol (IGP), Therefore, it operates within the autonomous system . The famous dixcher (Dijkstra) The algorithm is used to calculate the shortest path tree .OSPF Support load balancing and routing based on service type , It also supports multiple routing forms , Such as specific host routing and subnet routing .
ISIS
Intermediate system to intermediate system (ISIS-Intermediate system to intermediate system) Is a hierarchical link state routing protocol , be based on DECnet PhaseV Routing algorithm , Actually with OSPF Very similar , It also uses Hello The protocol looks for adjacent nodes , Use a propagation protocol to send link information .ISIS You can operate on different subnets , Including broadcast type LAN、WAN And point-to-point links .
BGP
Border gateway protocol (BGP) Is running on TCP A routing protocol for autonomous systems . BGP It's the only protocol used to handle networks the size of the Internet , The only inter domain connection protocol that can be handled properly is also the only one . BGP Builds on the EGP On the experience of . BGP The main function of the system is with other BGP System exchange network reachable information . Network accessibility information includes listed autonomous systems (AS) Information about . This information effectively constructs AS The topology of the interconnection and thus the routing loop is cleared , At the same time AS Strategic decisions can be implemented at a level .
Comparison of route update methods
Distance vector routing protocol | RIP( Periodically flood your routing table 30s)、BGP ( Delivery route entry ) |
|---|---|
Link state routing protocol | OSPF( Periodic flooding link status information 1800s)、ISIS ( Periodicity is determined by DIS Pseudo node flooding LSP) |
Path cost calculation ( By default , Generally, you can manually specify )
RIP | Calculate by hops ,16 Can't jump , Beckmann algorithm |
|---|---|
OSPF | According to the interface bandwidth , Compare numerator and denominator ,SPF Algorithm |
ISIS | According to the interface , The default is 10,SPF Algorithm |
BGP | 11 Path optimization algorithm , Path attribute routing principle |
Message type
RIP | request、response |
|---|---|
OSPF | hello、dd、LSR、LSU、LSACK |
ISIS | level-1、level-2、level-1-2 |
BGP | open、keepalive、update、notification、router-refresh |
Route update cycle comparison
RIP | Send routing table periodically |
|---|---|
OSPF | hello、dd、LSR、LSU、LSACK( Triggered updates ) |
ISIS | level-1、level-2( Triggered updates ) |
BGP | Will not send periodically , Triggered updates , Incremental updating |
Anti ring mechanism
RIP | Define the maximum hops , Horizontal segmentation , Poison Reverse , Trigger update , Toxic routing |
|---|---|
BGP | AS_PATH attribute ,IBGP Horizontal segmentation , Reflector Originator_ID and Cluster_List |
OSPF | In the area SPF Algorithm anti loop , Interregional Type3 LSA,Area0 Direct connection , Route introduction anti ring |
ISIS | Level-1 LSP And Level-2 LSP The principle of transmission |
reliability
RIP | 30s Primary flood routing table , unreliable |
|---|---|
ISIS | DIS Every time 10s Send it once CSNP, unreliable |
BGP | TCP Protocol transfer |
OSPF | LSACK confirm |
边栏推荐
- Global and Chinese micro focus X-ray tube industry competitiveness analysis and Investment Strategy Research Report 2022-2028
- 8、 Pipeline pipeline construction project
- Tencent cloud won the first place in the cloud natural language understanding classification task
- If you accidentally make the disk dynamic, how to convert it back (do not guarantee it, but take a snapshot before operation)
- [JS reverse hundred examples] md5+aes encryption analysis of an easy payment password
- Digital case show ‖ made in China for the first time! Tencent cloud tdsql landed in Zhangjiagang bank and worked together to build financial business
- Tcapulusdb Jun · industry news collection
- SAP WM displays the standard report lx09 of TR item
- How to generate EAN13 serial number barcode
- application. Yaml configuring multiple running environments
猜你喜欢
![[SQL injection 13] referer injection foundation and Practice (based on burpseuite tool and sqli labs less19 target platform)](/img/b5/a8c4bbaf868dd20b7dc9449d2a4378.jpg)
[SQL injection 13] referer injection foundation and Practice (based on burpseuite tool and sqli labs less19 target platform)

Review of AI hotspots this week: the Gan compression method consumes less than 1/9 of the computing power, and the open source generator turns your photos into hand drawn photos

I, a 27 year old female programmer, feel that life is meaningless, not counting the accumulation fund deposit of 430000

163 mailbox login portal display, enterprise mailbox computer version login portal

It's too difficult for me. Ali has had 7 rounds of interviews (5 years of experience and won the offer of P7 post)

If there are enumerations in the entity object, the conversion of enumerations can be carried out with @jsonvalue and @enumvalue annotations

layer 3 switch

How to fill in and register e-mail, and open mass mailing software for free

Introduction to development model + test model

Stm32g474 infrared receiving based on irtim peripherals
随机推荐
Line/kotlin jdsl: kotlin DSL for JPA criteria API
[latest] how to realize hybrid cloud active / standby redundant communication through cloud networking and VPN connection?
NFS operations and deployment
Glusterfs version 4.1 selection and deployment
[security] Tencent public cloud released the revolutionary function of "driving threat operation" of the new SOC security operation center!
Five things programmers need to consider when developing with low code – thenewstack
Easynvr background channel list timing request touchstreamclient interface optimization
Tencent cloud database tdsql elite challenge --q & A
Analysis report on market development trends and innovation strategies of China's iron and steel industry 2022-2028
Tencent Conference - black screen analysis
Make standardized tools in the cloud native era to realize efficient cloud R & D workflow
Analysis report on operation situation and development trend of global and Chinese diisobutyl aluminum hydride (Dibah) industry 2022-2028
Based on ARM embedded real-time streaming media service development and deployment, easygbs supports arm64 architecture
Tencent cloud double 11 Live Room activity rules
[JS reverse hundred examples] md5+aes encryption analysis of an easy payment password
The same set of code returns normally sometimes and reports an error sometimes. Signature error authfailure SignatureFailure
Gin framework: adding tracing Middleware
Frequent screen flashing after VNC login - abnormal system time
No serializer found for class ** and no propert no properties discovered to create BeanSerializer
Kubesphere upgrade & enable plug-ins after installation