SlideShare une entreprise Scribd logo
1  sur  14
Link-state routing
Protocol
Aung Thu Rha Hein
Chinnawat Noosrikong
Outline
•   Overview
•   Features of Link-State routing protocols
•   link-state routing algorithm
•   Dijkstra’s algorithm
•   OSPF
•   IS-IS
• Advantages and Disadvantages of LS routing protocols
Overview
• One of two main classes of interior gateway routing protocols
  • OSPF, IS-IS
• Performed by every switching node in the network

Basic Concept
• every node creates a map of the connectivity to the network
  • This graph shows which nodes are connected to which other
    nodes
  • Each node calculates the next best logical path to the destination
  • Collection of best paths form the routing table of the node
Features of Link-state routing
protocols
Link-state advertisement (LSA) or Link-state Packet(LSP)
• a small packet of routing information that is sent between
  routers
Topological database or Link-state Database
• a collection of information gathered from LSAs
SPF algorithm
• a calculation performed on the database that results in the
  SPF tree
Routing table
• a list of the known paths and interfaces
link-state routing algorithm
1.   Each router is responsible for meeting its neighbors and
     learning their names.
       •     Used a Hello Protocol, which send a data packet contains RID
             and address of the network on which the packet is being sent
2.   Each router constructs a LSP/LSA which consists of a list of
     names and cost for each of its neighbors.
3.   The LSP/LSA is transmitted to all other routers. Each router
     stores the most recently generated LSP/LSA from each
     other router.
       •     Link-state flooding: Sequencing and Aging procedures
       •     Each routers store the identical Link State Database
4.   Each router uses complete information on the network
     topology to compute the shortest path route to each
     destination node.
       •     Use SPF or Dijkstra’s algorithm to calculate the shortest path
Dijkstra’s algorithm
  Also known as the shortest path first (SPF) algorithm

Nodes    2      3        4       5(b)      6



1(a)     7      9        ∞        ∞       14



  2      7    9<7+10   7+15       ∞       14



  3      7      9      22<11+     ∞      14<7+1
                        10+7              0+2


  6      7      9       22      9+2+10    14
                                  +7
Dijkstra’s algorithm(Cont.)
Open Shortest Path First (OSPF)
• A routing protocol developed for Internet Protocol
  networks by the Interior Gateway Protocol (IGP)
• Based on the Dijkstra’s Algorithm
• Serving large, heterogeneous internetworks



• OSPF Version 1 (1988)
• OSPF Version 2 (1998) Supported IPv4
• OSPF Version 3 (2008) Supported IPv6
Open Shortest Path First
(OSPF)




OSPF can operate within a hierarchy
Collection of networks under a common administration that share a
common routing strategy
Additional OSPF Features
• Equal-cost
• Multipath routing
• Routing based on upper-layer type-of-service (TOS) requests
IS-IS
• Intermediate System-to-Intermediate System (IS-IS)
• That floods the network with link-state information to build a
  complete, consistent picture of network topology
  • Each IS-IS router independently builds a database of the
    network's topology
• IS-IS uses Dijkstra's algorithm for computing the best path
  through the network
• IS-IS Metrics
• A single required default metric with a maximum path value of
  1024
• Three optional metrics (costs):
  • Delay
  • Expense
  • Error
Integrated IS-IS
•   Integrated IS-IS is a version of the OSI IS-IS
•   To support more network layer protocols than just CLNP
•   Dual IS-IS
•   Implementations send only one set of routing updates
•   Supporting multiple network layer protocols in a router
Advantages and Disadvantages of LS
routing protocols
Advantages
• Smaller routing tables
      • Only a single optimal route for each network ID is stored in
        the routing table.
• Low network overhead
      • do not exchange any routing information when the
        internetwork has converged.
• Ability to scale.
      • scale well to large and very large internetworks.
• Lower convergence time.
      • have a much lower convergence time and the internetwork is
        converged without routing loops.
Advantages and Disadvantages of LS
routing protocols(cont.)
Disadvantages
• Complex
      • much more complex and difficult to understand than DV
        routing protocols.
• More difficult to configure.
      • implementation requires additional planning and
        configuration.
• Resource intensive.
      • For very large internetworks, the LS database and the
        calculation of routing table entries can be memory and
        processor intensive.

Contenu connexe

Tendances (20)

Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
Routing
RoutingRouting
Routing
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.ppt
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Routing ppt
Routing pptRouting ppt
Routing ppt
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
HDLC
HDLCHDLC
HDLC
 
Ipv4 header
Ipv4 headerIpv4 header
Ipv4 header
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Data link layer
Data link layer Data link layer
Data link layer
 
IP Multicasting
IP MulticastingIP Multicasting
IP Multicasting
 
RPL - Routing Protocol for Low Power and Lossy Networks
RPL - Routing Protocol for Low Power and Lossy NetworksRPL - Routing Protocol for Low Power and Lossy Networks
RPL - Routing Protocol for Low Power and Lossy Networks
 

Similaire à Link state routing protocol (20)

Computer networks unit iii
Computer networks    unit iiiComputer networks    unit iii
Computer networks unit iii
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
 
OSPF Configuration
OSPF ConfigurationOSPF Configuration
OSPF Configuration
 
Dynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And BasicsDynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And Basics
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layer
 
1Routing Basics.pdf
1Routing Basics.pdf1Routing Basics.pdf
1Routing Basics.pdf
 
CCNA3 Verson6 Chapter5
CCNA3 Verson6 Chapter5CCNA3 Verson6 Chapter5
CCNA3 Verson6 Chapter5
 
CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocols
 
Chapter07
Chapter07Chapter07
Chapter07
 
ch2_p3_ospf.pptx
ch2_p3_ospf.pptxch2_p3_ospf.pptx
ch2_p3_ospf.pptx
 
ROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptx
 
SEGMENT Routing
SEGMENT RoutingSEGMENT Routing
SEGMENT Routing
 
Routing Protocols
Routing Protocols Routing Protocols
Routing Protocols
 
Ccna routing
Ccna routingCcna routing
Ccna routing
 
MPLS Tutorial
MPLS TutorialMPLS Tutorial
MPLS Tutorial
 
MPLS Tutorial2
MPLS Tutorial2MPLS Tutorial2
MPLS Tutorial2
 
CCNP Route
CCNP Route CCNP Route
CCNP Route
 

Plus de Aung Thu Rha Hein

Bioinformatics for Computer Scientists
Bioinformatics for Computer Scientists Bioinformatics for Computer Scientists
Bioinformatics for Computer Scientists Aung Thu Rha Hein
 
Analysis of hybrid image with FFT (Fast Fourier Transform)
Analysis of hybrid image with FFT (Fast Fourier Transform)Analysis of hybrid image with FFT (Fast Fourier Transform)
Analysis of hybrid image with FFT (Fast Fourier Transform)Aung Thu Rha Hein
 
Introduction to Common Weakness Enumeration (CWE)
Introduction to Common Weakness Enumeration (CWE)Introduction to Common Weakness Enumeration (CWE)
Introduction to Common Weakness Enumeration (CWE)Aung Thu Rha Hein
 
Private Browsing: A Window of Forensic Opportunity
Private Browsing: A Window of Forensic OpportunityPrivate Browsing: A Window of Forensic Opportunity
Private Browsing: A Window of Forensic OpportunityAung Thu Rha Hein
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeAung Thu Rha Hein
 
Survey & Review of Digital Forensic
Survey & Review of Digital ForensicSurvey & Review of Digital Forensic
Survey & Review of Digital ForensicAung Thu Rha Hein
 
Partitioned Based Regression Verification
Partitioned Based Regression VerificationPartitioned Based Regression Verification
Partitioned Based Regression VerificationAung Thu Rha Hein
 
CRAXweb: Automatic Exploit Generation for Web Applications
CRAXweb: Automatic Exploit Generation for Web ApplicationsCRAXweb: Automatic Exploit Generation for Web Applications
CRAXweb: Automatic Exploit Generation for Web ApplicationsAung Thu Rha Hein
 
Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresAung Thu Rha Hein
 
Can the elephants handle the no sql onslaught
Can the elephants handle the no sql onslaughtCan the elephants handle the no sql onslaught
Can the elephants handle the no sql onslaughtAung Thu Rha Hein
 
Fuzzy logic based students’ learning assessment
Fuzzy logic based students’ learning assessmentFuzzy logic based students’ learning assessment
Fuzzy logic based students’ learning assessmentAung Thu Rha Hein
 

Plus de Aung Thu Rha Hein (19)

Writing with ease
Writing with easeWriting with ease
Writing with ease
 
Bioinformatics for Computer Scientists
Bioinformatics for Computer Scientists Bioinformatics for Computer Scientists
Bioinformatics for Computer Scientists
 
Analysis of hybrid image with FFT (Fast Fourier Transform)
Analysis of hybrid image with FFT (Fast Fourier Transform)Analysis of hybrid image with FFT (Fast Fourier Transform)
Analysis of hybrid image with FFT (Fast Fourier Transform)
 
Introduction to Common Weakness Enumeration (CWE)
Introduction to Common Weakness Enumeration (CWE)Introduction to Common Weakness Enumeration (CWE)
Introduction to Common Weakness Enumeration (CWE)
 
Private Browsing: A Window of Forensic Opportunity
Private Browsing: A Window of Forensic OpportunityPrivate Browsing: A Window of Forensic Opportunity
Private Browsing: A Window of Forensic Opportunity
 
Network switching
Network switchingNetwork switching
Network switching
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Survey & Review of Digital Forensic
Survey & Review of Digital ForensicSurvey & Review of Digital Forensic
Survey & Review of Digital Forensic
 
Partitioned Based Regression Verification
Partitioned Based Regression VerificationPartitioned Based Regression Verification
Partitioned Based Regression Verification
 
CRAXweb: Automatic Exploit Generation for Web Applications
CRAXweb: Automatic Exploit Generation for Web ApplicationsCRAXweb: Automatic Exploit Generation for Web Applications
CRAXweb: Automatic Exploit Generation for Web Applications
 
Botnets 101
Botnets 101Botnets 101
Botnets 101
 
Session initiation protocol
Session initiation protocolSession initiation protocol
Session initiation protocol
 
TPC-H in MongoDB
TPC-H in MongoDBTPC-H in MongoDB
TPC-H in MongoDB
 
Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & Countermeasures
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Can the elephants handle the no sql onslaught
Can the elephants handle the no sql onslaughtCan the elephants handle the no sql onslaught
Can the elephants handle the no sql onslaught
 
Fuzzy logic based students’ learning assessment
Fuzzy logic based students’ learning assessmentFuzzy logic based students’ learning assessment
Fuzzy logic based students’ learning assessment
 
Chat bot analysis
Chat bot analysisChat bot analysis
Chat bot analysis
 
Data mining & column stores
Data mining & column storesData mining & column stores
Data mining & column stores
 

Dernier

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Dernier (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

Link state routing protocol

  • 1. Link-state routing Protocol Aung Thu Rha Hein Chinnawat Noosrikong
  • 2. Outline • Overview • Features of Link-State routing protocols • link-state routing algorithm • Dijkstra’s algorithm • OSPF • IS-IS • Advantages and Disadvantages of LS routing protocols
  • 3. Overview • One of two main classes of interior gateway routing protocols • OSPF, IS-IS • Performed by every switching node in the network Basic Concept • every node creates a map of the connectivity to the network • This graph shows which nodes are connected to which other nodes • Each node calculates the next best logical path to the destination • Collection of best paths form the routing table of the node
  • 4. Features of Link-state routing protocols Link-state advertisement (LSA) or Link-state Packet(LSP) • a small packet of routing information that is sent between routers Topological database or Link-state Database • a collection of information gathered from LSAs SPF algorithm • a calculation performed on the database that results in the SPF tree Routing table • a list of the known paths and interfaces
  • 5. link-state routing algorithm 1. Each router is responsible for meeting its neighbors and learning their names. • Used a Hello Protocol, which send a data packet contains RID and address of the network on which the packet is being sent 2. Each router constructs a LSP/LSA which consists of a list of names and cost for each of its neighbors. 3. The LSP/LSA is transmitted to all other routers. Each router stores the most recently generated LSP/LSA from each other router. • Link-state flooding: Sequencing and Aging procedures • Each routers store the identical Link State Database 4. Each router uses complete information on the network topology to compute the shortest path route to each destination node. • Use SPF or Dijkstra’s algorithm to calculate the shortest path
  • 6. Dijkstra’s algorithm Also known as the shortest path first (SPF) algorithm Nodes 2 3 4 5(b) 6 1(a) 7 9 ∞ ∞ 14 2 7 9<7+10 7+15 ∞ 14 3 7 9 22<11+ ∞ 14<7+1 10+7 0+2 6 7 9 22 9+2+10 14 +7
  • 8. Open Shortest Path First (OSPF) • A routing protocol developed for Internet Protocol networks by the Interior Gateway Protocol (IGP) • Based on the Dijkstra’s Algorithm • Serving large, heterogeneous internetworks • OSPF Version 1 (1988) • OSPF Version 2 (1998) Supported IPv4 • OSPF Version 3 (2008) Supported IPv6
  • 9. Open Shortest Path First (OSPF) OSPF can operate within a hierarchy Collection of networks under a common administration that share a common routing strategy
  • 10. Additional OSPF Features • Equal-cost • Multipath routing • Routing based on upper-layer type-of-service (TOS) requests
  • 11. IS-IS • Intermediate System-to-Intermediate System (IS-IS) • That floods the network with link-state information to build a complete, consistent picture of network topology • Each IS-IS router independently builds a database of the network's topology • IS-IS uses Dijkstra's algorithm for computing the best path through the network • IS-IS Metrics • A single required default metric with a maximum path value of 1024 • Three optional metrics (costs): • Delay • Expense • Error
  • 12. Integrated IS-IS • Integrated IS-IS is a version of the OSI IS-IS • To support more network layer protocols than just CLNP • Dual IS-IS • Implementations send only one set of routing updates • Supporting multiple network layer protocols in a router
  • 13. Advantages and Disadvantages of LS routing protocols Advantages • Smaller routing tables • Only a single optimal route for each network ID is stored in the routing table. • Low network overhead • do not exchange any routing information when the internetwork has converged. • Ability to scale. • scale well to large and very large internetworks. • Lower convergence time. • have a much lower convergence time and the internetwork is converged without routing loops.
  • 14. Advantages and Disadvantages of LS routing protocols(cont.) Disadvantages • Complex • much more complex and difficult to understand than DV routing protocols. • More difficult to configure. • implementation requires additional planning and configuration. • Resource intensive. • For very large internetworks, the LS database and the calculation of routing table entries can be memory and processor intensive.