| | Copyright |
| | About the Author |
| | Preface |
| | | Audience |
| | | What Is a Large-Scale Data Communications Network? |
| | | A Word on IOS and JUNOS |
| | Acknowledgments |
| | Chapter 1. The Roots of Link State Protocols |
| | | Section 1.1. An Intergalactic Network |
| | | Section 1.2. ARPANET |
| | | Section 1.3. The Network Working Group |
| | | Section 1.4. The Birth of the Internet |
| | | Section 1.5. Routing in the ARPANET |
| | | Section 1.6. The European Invasion |
| | | Section 1.7. Separate But Equal |
| | | Section 1.8. Conclusion |
| | Chapter 2. Link State Basics |
| | | Section 2.1. Vector Protocol Basics |
| | | Section 2.2. Fundamental Link State Concepts |
| | | Review Questions |
| | Chapter 3. Message Types |
| | | Section 3.1. Comparative Terminology |
| | | Section 3.2. Message Encapsulation |
| | | Section 3.3. Message Architecture |
| | | Section 3.4. Message Types |
| | Chapter 4. Addressing, Neighbor Discovery, and Adjacencies |
| | | Section 4.1. Router and Area IDs |
| | | Section 4.2. The Hello Protocol |
| | | Section 4.3. Adjacencies |
| | | Section 4.4. Designated Routers |
| | | Section 4.5. Media Types |
| | | Section 4.6. Interface Databases |
| | | Review Questions |
| | Chapter 5. Flooding |
| | | Section 5.1. Flooding Components |
| | | Section 5.2. Areas and Router Types |
| | | Section 5.3. Metric Types |
| | | Section 5.4. Essential LSAs |
| | | Section 5.5. Essential TLVs |
| | | Review Questions |
| | Chapter 6. Link State Database Synchronization |
| | | Section 6.1. OSPF Database Synchronization |
| | | Section 6.2. IS-IS Database Synchronization |
| | | Review Questions |
| | Chapter 7. Area Design |
| | | Section 7.1. Area Scalability |
| | | Section 7.2. Area Reliability |
| | | Section 7.3. OSPF Areas |
| | | Section 7.4. IS-IS Areas |
| | | Section 7.5. BGP and Area Design |
| | | Review Questions |
| | Chapter 8. Scaling |
| | | Section 8.1. SPF Enhancements |
| | | Section 8.2. Flooding Enhancements |
| | | Section 8.3. Fragmentation |
| | | Section 8.4. Overloading |
| | | Review Questions |
| | Chapter 9. Security and Reliability |
| | | Section 9.1. Routing Protocol Vulnerabilities |
| | | Section 9.2. Security and Reliability Features |
| | | Section 9.3. Designing for Security and Reliability |
| | | Section 9.4. Operating for Security and Reliability |
| | | Review Questions |
| | Chapter 10. Extensibility |
| | | Section 10.1. Extending OSPF |
| | | Section 10.2. Extending IS-IS |
| | | Section 10.3. Route Tagging |
| | | Review Questions |
| | Chapter 11. Extensions for MPLS Traffic Engineering |
| | | Section 11.1. MPLS: An Overview |
| | | Section 11.2. Traffic Engineering: An Overview |
| | | Section 11.3. OSPF Extensions for Traffic Engineering |
| | | Section 11.4. IS-IS Extensions for Traffic Engineering |
| | | Review Questions |
| | Chapter 12. Extensions for IPv6 |
| | | Section 12.1. IPv6: An Overview |
| | | Section 12.2. OSPFv3 |
| | | Section 12.3. IS-IS Extensions for IPv6 |
| | | Review Questions |
| | Chapter 13. Extensions for Multi-Topology Routing |
| | | Section 13.1. OSPF Extensions for Multi-Topology Routing |
| | | Section 13.2. IS-IS Extensions for Multi-Topology Routing |
| | | Review Questions |
| | Afterword: The Future of Link State Protocols |
| | Index |