Solved

WHAT IS THE FUNCTION OF L2 ROUTER IN IS-IS NETWORK

Posted on 2004-09-02
3
445 Views
Last Modified: 2012-05-05
Hi

According to my understanding

In IS-IS L1 ROUTER EXHANGE ROUTES WITH L1 ROUTERS
L1 routers talk to L1-L2 routers to get out of their own area

If this this correct, then what is the function of L2 router, also what do L1 routers talk about to L1 routers in the same area and what is the need there for them to talk ?
0
Comment
Question by:kamal73
  • 2
3 Comments
 
LVL 28

Expert Comment

by:mikebernhardt
ID: 11968744
You use L2-only routers in the core of your network, if it's big enough to require routers in between the areas. L1 routers talk to each other about the routes in their same area.
0
 

Author Comment

by:kamal73
ID: 11968816
would it be right to say that they summerize the routes in their area and pass it on to next area L2 router which then talks to L1-L2 router and L1-L2 router then talks to or replies to L1 router if it needs to know about those routes ?
0
 
LVL 28

Accepted Solution

by:
mikebernhardt earned 500 total points
ID: 11968862
IS-IS is like any other routing protocol. Just like OSPF, you may have multiple routers in the same area and they all need to know about each other. And not all of them may connect directly to the L1-2 router in the area some of them may have to pass through another L1 router on their way to the L1-2. And depending on how big the network is, there may be multiple router hops in between the L1 areas, connecting L1-2 routers together. Those would be L2-only routers.

Hope that's a little clearer than my first post.
0

Featured Post

Zoho SalesIQ

Hassle-free live chat software re-imagined for business growth. 2 users, always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

It happens many times that access list (ACL) have to be applied to outgoing router interface in order to limit some traffic.This article is about how to test ACL from the router which is not very intuitive for everyone. Below scenario shows simple s…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

25 Experts available now in Live!

Get 1:1 Help Now