SlideShare a Scribd company logo
1 of 197
Download to read offline
EXPLORING IP
ROUTING AND
ETHERNET BRIDGING
IPC_207
IP CONVERGENCE & IMS CURRICULUM
Award Solutions' eBook is authorized for a single user only. Do not distribute.
© 2016 Award Solutions, Inc. All Rights Reserved.
This course book and the material and information contained in it are owned by Award Solutions, Inc. (“Award Solu-
tions”) and Award Solutions reserves for itself and successors and assigns all right, title and interest in and to the
Award Content, Award Solutions’ logos and other trademarks, including all copyrights, authorship rights, moral
rights, publication and distribution rights, trademarks and other intellectual property rights. Award grants no license
or other rights in the contents of the course book or course, except as may be expressly set forth in a duly executed
written agreement between Award Solutions and the authorized user of this course book or the user’s employee or
principal. This course book shall not be modified, reproduced, disseminated, or transmitted by or in any medium,
form or means, electronic or mechanical, including photocopying, recording or any information retrieval system, in
whole or in part, without Award Solutions, Inc.’s express, prior written consent signed by an authorized officer
whose authority is evidenced by a duly signed corporate resolution.
This course book was designed for use as a student guide with the subject matter course taught by Award Solu-
tions’ authorized employees and contractors. It was not designed to be a standalone textbook. Award Solutions
makes no representations or warranties and disclaims all implied warranties with respect to the information con-
tained herein or products derived from use of such information and Award Solutions undertakes no obligation to
update or otherwise modify the information or to notify the purchaser or any user of any update or obsolescence.
To the extent permitted by applicable law, Award’s total liability in connection with the course and/or course materi-
al is the amount actually received by Award from the purchaser/user for the purchase or license of the course and
course material. This course book is not made for publication or distribution in the public domain and shall not be
published or placed in the public domain, in whole or in part, without Award Solutions, Inc.’s express, prior written
consent signed by an authorized officer whose authority is evidenced by a duly signed corporate resolution.
2100 Lakeside Blvd., Suite 300
Richardson, TX 75082 USA
Phone: +1.972.664.0727
Website: www.awardsolutions.com
If you have any questions, concerns or comments regarding this course please write to us at:
friends@awardsolutions.com
The 3GPP, LTE and LTE-Advanced logos are the property of Third Generation Partnership Project (3GPP). The
3GPP2 logo is property of Third Generation Partnership Project (3GPP2) and its organization partners. The
content of this document is based on 3GPP/LTE and 3GPP2 specifications which are available at
www.3gpp.org, and www.3gpp2.org.
Award Solutions, Inc. www.awardsolutions.com +1.972.664.0727 v16.0
About Award Solutions
AWARD SOLUTIONS, INC. has over 18 years of
training excellence in advanced wireless, IP, and network
virtualization technologies. Our products and services
provide our customers with innovative, flexible, and cost-
effective solutions that help rapidly boost workforce
productivity to more quickly meet market demands.
Our areas of expertise include:
• 4G				 • OpenStack
• LTE				 • SDN
• VoLTE		 • NFV
• LTE-Advanced • IP Convergence
• IMS				 • IPv6
• TD-LTE		 • Cloud
• Small Cells • M2M
• DAS				 • Technology Trends
The level of technical depth in our training programs gives
students unique benefits that they can apply immediately.
We offer a range of courses appropriate for audiences
needing a high-level overview, engineers looking for
technical details as well as sales and marketing teams
needing a different point of view.
Our Subject Matter Experts (SMEs) and consultants
are best-in-class, having achieved substantial industry
experience in areas such as product definition and
development, network deployment, and network and
systems engineering. We strive to help our students and
customers “become an expert”.
Award Solutions constantly keeps a finger on the pulse of
the industry, always researching new technologies, and
updating our curriculums to stay on the cutting edge.
Whether you are a training manager responsible for a large
organization, or a team lead responsible for enhancing your
team’s skills, Award Solutions can meet your technology
training needs.
We offer a multitude of delivery methods and services:
ON-SITE TRAINING: Our Subject Matter Experts
travel to your facility to engage the students in
an interactive learning experience. This is a great
option for teams with 12 or more people.
VIRTUAL TRAINING: Award Solutions embraces
different learning styles and preferences. Our
virtual trainings are conducted by our Subject
Matter Experts in real-time. This is a great option
for teams geographically dispersed.
PUBLIC TRAINING EVENTS: Award Solutions
hosts a subset of our courses in our office
and in conjunction with Industry events. This
expert-led sessions are ideal for individuals and
small groups. Visit our website at for the latest
schedule.
SELF-PACED eLEARNING: An engaging, cost-
effective solution, allowing individuals to take
training online at their own pace when their
schedule permits.
CERTIFICATIONS: Becoming an Award Certified
Expert (A.C.E.) is the best way to for a student to
demonstrate expertise, prove their ability to use
real-world industry tools, and validate that they
have the required knowledge to implement and/
or run a successful network.
If you are interested in or have any questions regarding
Award Solutions training or services, please visit Award’s
website at www.awardsolutions.com or contact us at
+1-972-664-0727 ext. 306.
OUR PROMISE
To continually demonstrate our core values: Integrity,
Expertise, Flexibility, Teamwork and Excellent Return on
Investment.
Award Solutions, Inc. www.awardsolutions.com +1.972.664.0727 v16.0
Instructor Led Training
Wireless Landscape
[FUND204] Fundamentals of RF Engineering..................2 days
4G LTE
[LTE_101] LTE Essentials.................................................... 1 day
[LTE_114] LTE-Advanced Essentials.................................. 1 day
[LTE_115] LTE RAN Performance Essentials.................... 1 day
[LTE_116] VoLTE Essentials............................................... 1 day
[LTE_205] LTE Technology Overview.................................2 days
[LTE_209] LTE Technology Overview with Public Safety Features....2.5 days
[LTE_203] VoLTE and IMS in LTE-EPC Networks.................... 3 days
[LTE_207] Exploring IMS/VoLTE Networks.......................2 days
[LTE_301] Mastering LTE Air Interface.............................2 days
[[LTE_309] Mastering TD-LTE Air Interface......................2 days
[LTE_302] LTE Protocols and Signaling............................3 days
[LTE_305] LTE-EPC Networks and Signaling....................3 days
[LTE_313] LTE-EPC Networks and Signaling (Architecture, Attach)....2 days
[LTE_310] LTE-Advanced Technical Overview..................2 days
[LTE_401] LTE RF Planning and Design Certification Workshop...5 days
[LTE_405] LTE RAN Signaling and Operations Certification....5 days
[LTE_408] LTE RAN Capacity Planning Certification Workshop....3 days
[LTE_427] VoLTE Signaling and Operations.....................3 days
[LTE_425] eMBMS Protocols and Signaling................... 1.5 days
[LTE_428] LTE Broadcast eMBMS in LTE Networks.....................1 day
[LTE_424]SON:SelfOrganizingNetworkFeaturesinLTEandLTE-Advanced...1.5days
[LTE_415] RF Design Workshop: Part 1 - LTE...................2 days
[LTE_416] RF Design Workshop: Part 2 - VoLTE and Small Cells...2 days
[LTE_418] LTE RAN Signaling and Operations: Part 1 - Attach...1.5 days
[LTE_419]LTERANSignalingandOperations:Part2–Mobility,QoS,Traffic.....1.5days
[LTE_420]LTERANSignalingandOperations:Part3-Interworking(GSM/UMTS)....1.5days
[LTE_412] LTE RF Optimization Certification Workshop (UE Based)....5 days
[LTE_421]LTERFOptimization:Part1 – CoverageandAccessibility....1.5 days
[LTE_422]LTERFOptimization:Part2–DownlinkandUplinkThroughput...1.5days
[LTE_423] LTE RF Optimization: Part 3 – Mobility and Inter-RAT...1.5 days
[LTE_413]SmallCellandVoLTERFPlanningandDesignCertificationWorkshop...4days
*
*
IP Convergence & IMS
[IPC_202] Exploring IPv6.................................................... 1 day
[IPC_203] Exploring MPLS................................................2 days
[IPC_405] IP Networking Workshop for LTE.....................4 days
[IPC_406] IP Networking Workshop for 4G Backhaul.....4 days
[IPC_407] IP Routing and Ethernet Bridging Workshop...4 days
[IPC_409] IPv6 Networking Workshop for LTE Networks....3 days
Network Virtualization
NWV_103] Big Data Essentials.......................................... 1 day
[NWV_110] API Essentials.................................................. 1 day
[NWV_120] SDN and NFV Essentials................................ 1 day
[NWV_122] SDN Essentials............................................... 1 day
OpenStack Cloud IaaS Essentials...................................... 1 day
Virtualization and Cloud Computing Essentials................ 1 day
[NWV_203] Exploring Network Functions Virtualization (NFV)....2 days
[NWV_204] Exploring Cloud, SDN, NFV............................2 days
[NWV_205] Exploring Network Virtualization, NFV, SDN, Orchestration, Cloud, and Big Data... 5 days
[NWV_206] Exploring OpenStack.....................................2 days
[NWV_704] Exploring Software-Defined Networking (SDN) for Network Operators....2 days
Exploring Virtualization and Cloud Computing.................2 days
[NWV_304] SDN and NFV Architecture and Operations...3 days
[NWV_402] Software-Defined Networking (SDN) Workshop..3 days
[NWV_403] SDN in Carrier Networks Workshop..............3 days
[NWV_406] OpenStack Workshop for SDN and NFV.......4 days
[NWV_407] NFV Application Planning and Design Workshop...3 days
[NWV_408] Scripting Workshop for SDN and NFV..........2 days
Software-Defined Networking (SDN) Troubleshooting Workshop.....2 days
Linux SysAdmin Workshop for NFV...................................3 days
[NWV_404] OpenStack Networking Troubleshooting Workshop...3 days
NFV Application Troubleshooting Workshop.....................3 days
[NWV_113] Overview of Mobile CSP Network................... 1 day
[NWV_112] Introduction to Mobile CSP Network..........0.5 day
[NWV_705] Mobile CSP Network Architecture and Operations...2 days
* New Course
TECHNOLOGY PRIMERS
[TPR1001] IoT in Wireless Networks..............................0.5 day
[TPR1002] C-RAN.............................................................0.5 day
[TPR1003] 5G Use Cases and Technology Options.......0.5 day
[TPR1004] Wi-Fi Offload, LTE-U, and LAA.......................... 0.5 day
[TPR1005] SON: Self Organzing Networks.....................0.5 day
[TPR1006] Voice over Wi-Fi (VoWiFi)..............................0.5 day
[TPR1007] Proximity Services, LTE Direct, D2D Communications....0.5 day
[TPR1008] LTE Broadcast/eMBMS................................0.5 day
*
*
*
*
*
*
*
*
Award Solutions, Inc. www.awardsolutions.com +1.972.664.0727 v16.0
Self-paced eLearning
(e) eLearning Course
IP Convergence & IMS
[IPC_103] Welcome to IP Networking (e)...........................3 hrs
[IPC_104] IP Convergence Overview (e).............................4 hrs
[IPC_106] Overview of MPLS (e)......................................3.5 hrs
[IPC_107] Overview of IMS (e)..........................................2.5 hrs
[IPC_108] Voice and Video over IP (VoIP) Overview (e).....3 hrs
[IPC_109] IP Quality of Service (QoS) (e)............................3 hrs
[IPC_110] Session Initiation Protocol (SIP) (e)...................2 hrs
[IPC_114] IP Basics (e)..........................................................1 hr
[IPC_113] IP Routing (e)........................................................1 hr
[IPC_115] QoS in IP Networks (e).........................................1 hr
[IPC_117] TCP and Transport Layer Protocols (e)................1 hr
[IPC_119] Ethernet Basics (e)...............................................1 hr
[IPC_118] Ethernet VLANs (e)...............................................1 hr
[IPC_116] Ethernet Bridging (e)............................................1 hr
[IPC_122] Ethernet Backhaul Overview (e)........................3 hrs
[IPC_120] Interconnecting IP Networks (e)..........................1 hr
[IPC_121] Welcome to IPv6 (e).............................................1 hr
4G LTE
[LTE_109] Welcome to LTE (e)..............................................1 hr
[LTE_102] LTE Overview (e).................................................3 hrs
[LTE_103] LTE SAE Evolved Packet Core (EPC) Overview (e).... 3 hrs
[LTE_111] LTE Air Interface Signaling Overview (e)...........3 hrs
[LTE_113] Overview of IPv6 for LTE Networks (e)...............3hrs
[LTE_117] eMBMS Overview (e)............................................1 hr
[LTE_118] Welcome to VoLTE (e)..........................................1 hr
[LTE_112] VoLTE Overview (e)..........................................1.5 hrs
[TRND103] Overview of OFDM (e)......................................2 hrs
[TRND104] Multiple Antenna Techniques (e).....................3 hrs
Network Virtualization
[NWTF101] Welcome to SDN (Software-Defined Networks) (e)...1 hr
[NWTF104]WelcometoMobileCSPNetworkTransformation(e)....1hr
[NWTF105] SDN Overview (e)...............................................1 hr
[NWTF106] NFV Overview (e)................................................1 hr
[NWTF107] OpenStack Cloud Overview (e)..........................1 hr
[NWTF108] API Overview (e).................................................1 hr
[NWTF109] Big Data Overview (e)........................................1 hr
[NWTF111] Cloud RAN Overview (e).....................................1 hr
[NWTF114] CSP Network Performance Overview (e)..........1 hr
[NWTF115] OpenStack IaaS Overview (e)............................1 hr
[NWTF116] Welcome to SDN and NFV I - Introductions (e).... 1 hr
[NWTF117] Welcome to SDN and NFV II - Foundations (e).... 1 hr
[NWTF118] Welcome to SDN and NFV I - Technologies (e).... 1 hr
*
*
*
API
[Application
Program Interface]
A programmatic
interface that makes
resources
software-accessible
BIG
DATA
Finding insights
by analyzing
volumes of
diverse data
ORCHESTRATION
Automating workflow
to coordinate network
functions and services
NFV
[Network Functions
Virtualization]
Running virtualized
network nodes on
commoditized
hardware
SDN
[Software-Defined
Networking]
Making networking
capabilities elastic
through centralized
control
SOFTWARE-DEFINED NETWORKS
Orchestrating elastic network functions and
services through software
AWARD SOLUTIONS’ NETWORK VIRTUALIZATION CURRICULUM
focuses on preparing you for the evolution of virtualization and the cloud-based network world.
CLOUD COMPUTING
Pooled computing resources accessed in a self-serve way
Table of Contents
Chapter 1: Prologue 1
Chapter 2: Spanning Tree Protocol 7
Broadcast Storms and STP 9
Rapid Spanning Tree Protocol (RSTP) 14
Multiple Spanning Tree Protocol (MSTP) 19
Chapter 3: Routing Table 27
Routing Table Concepts 29
The Longest Match 36
Recursive Routing 40
Black Holes 42
Chapter 4: OSPF Key Concepts 47
Areas and Router Types 50
Link State Advertisements (LSA) 53
Link State Advertisements 57
Chapter 5: OSPF in Wireless Networks 67
Neighbor Discovery 70
Metrics 75
Areas 82
Chapter 6: BGPv4 Key Concepts 89
Autonomous Systems 92
BGP Messages 96
BGP Attributes and Routing Policy 100
Route Reflectors 111
Chapter 7: BGPv4 in Wireless Networks 117
Chapter 8: L3VPN in Wireless Networks 129
Interconnecting MTSOs 131
L3VPN Architecture 135
High-Level Operations 138
Chapter 9: L3VPN Routing 147
Provider-Customer Model 149
MPLS Router 151
VPN Routing and Forwarding 154
VPN Route Distribution using MP-iBGP 160
Route Distinguisher 162
VPNv4 and IPv4 Address Families 167
Route Target 169
IPC_207 Version 2.2c
L3VPN Routing 172
Acronyms 185
References 189
1 | Prologue
Chapter 1:
Prologue
Award Solutions Proprietary
1
Award Solutions' eBook is authorized for a single user only. Do not distribute.
1 | Prologue
Objectives
After completing this module, you will be able to:
• Explain why IP is the data transport of choice for
today’s carrier networks
• Explain the Customer-Provider Model and its use of
Layer 3 VPNs
• Describe the customers found in a carrier’s
implementation of the Customer-Provider Model
• List the routing protocols used in the typical
implementation of L3VPNs
Award Solutions Proprietary
2
Award Solutions' eBook is authorized for a single user only. Do not distribute.
The Customer-Provider model uses Layer 3 Virtual Private
Network (L3VPNs) to provide private network services to a
set of customers. The customer networks include a
Customer Edge (CE) router that connects to the service
provider’s Provider Edge (PE) router. The CE and PE
routers exchange routing information, using Border
Gateway Protocol (BGP). The PE routers use MPLS to
forward packets through the backbone and BGP to
distribute the customer routes to other VPN locations.
The L3VPN solution is widely deployed. It is easy for
customers to send data throughout their respective sites,
while at the same time being scalable and manageable
for the service provider. For these reasons, L3VPNs are
used in carrier networks to isolate traffic between
customers and services.
While the terms customer and provider evoke a
commercial relationship, this is not necessarily the case in
a carrier environment. The customer networks represent
subsystems within the larger network, interconnected
through a transport backbone.
1 | Prologue
Site A
Customer 1
CE
Customer 2
CE
Customer 3
CE
Site C
Site
B
Site
D
Customer-Provider Model
Customer 1
CE
Customer 2
CE
Customer 3
CE
Provider
PE PE
Customer 1
CE
Customer 2
CE
Customer 3
CE
PE
Customer 1
CE
Customer 2
CE
Customer 3
CE
PE
P
P
P
P
Award Solutions Proprietary
3
Award Solutions' eBook is authorized for a single user only. Do not distribute.
Wireless service providers adopt the L3VPN solution as a
means to manage their networks. The makeup of the
customer networks varies according to service provider
policies, but some generalities may be discussed. The
service provider may choose to implement different
wireless network technologies (e.g., UMTS, EVDO, LTE) as
customer networks. They may also choose to implement
different network services (e.g., voice, Internet access, IP
Multimedia Subsystem (IMS)) as customer networks. Or
they may also use them to segregate Operations,
Administration and Maintenance (OAM) connections or
inter-connectivity with Internet peering or roaming
partners.
The customer networks are present throughout the
service provider’s facilities, including local Mobile
Telephone Switching Offices (MTSO), regional Network or
Data Centers and national Network or Data Centers.
1 | Prologue
MTSO
MTSO
MTSO
MTSO
3G Voice
CE
3G Data
CE
4G Data
CE
Segregating Services
Core
PE
PE
PE
PE
P
P
P
P
IMS
CE
OAM
CE
Peering
CE
3G Voice
CE
3G Data
CE
4G Data
CE
IMS
CE
OAM
CE
Peering
CE
Award Solutions Proprietary
4
Award Solutions' eBook is authorized for a single user only. Do not distribute.
The customer networks run an interior gateway routing
protocol such as the Open Shortest Path First (OSPF). The
Core runs an interior gateway routing protocol as well to
distribute routes between the PE and P routers. The CE
and PE routers run eBGP to exchange customer routing
information. This routing information is subsequently
passed from one PE router to another PE using Multi-
Protocol BGP (MP-BGP) to distribute customer routes
throughout the network.
1 | Prologue
L3VPN Routing Protocols
Award Solutions Proprietary
5
Award Solutions' eBook is authorized for a single user only. Do not distribute.
1 | Prologue
Summary
• Wireless equipment at the cell site used T1s as transport before the
use of IP.
• IP interfaces in wireless networks carry user data, OA&M data and
signaling data.
• The Customer-Provider Model implements L3VPNs to segregate the
data traffic of individual customers.
• The customer networks found in a carrier’s network can include
networks belonging to individual customers, networks belonging to
technologies such as LTE and UMTS, and networks belonging to
particular traffic types such as OA&M.
• In a network that implements Layer 3 VPNs (L3VPNs), eBGP is used
between CEs and PEs to exchange customer routes, MP-BGP is used
between PEs to distribute the customer routes, and OSPF is used
between the PEs and P for internal core routing exchanges.
Award Solutions Proprietary
6
Award Solutions' eBook is authorized for a single user only. Do not distribute.
2 | Spanning Tree Protocol
Chapter 2:
Spanning Tree Protocol
Award Solutions Proprietary
7
Award Solutions' eBook is authorized for a single user only. Do not distribute.
2 | Spanning Tree Protocol
Objectives
After completing this module, you will be able to:
• Explain how the Spanning Tree Protocol protects
networks from broadcast storms
• Select the best Spanning Tree Protocol for a
given network
• List the differences between STP, RSTP, and
MSTP
• Describe the significance of the root switch to
the Spanning Tree Protocol
Award Solutions Proprietary
8
Award Solutions' eBook is authorized for a single user only. Do not distribute.
2 | Spanning Tree Protocol
Broadcast Storms and
STP
Award Solutions Proprietary
9
Award Solutions' eBook is authorized for a single user only. Do not distribute.
Several version of spanning tree protocols have been
developed over the years. The most significant are:
Spanning Tree Protocol (STP)
The first Spanning Tree Protocol published as a standard
by the Institute of Electrical and Electronic Engineering
(IEEE) in 802.1d-1990. It is generally no longer used in
service provider environments as it takes too long to
discover and react to changes in the network topology. It
also predates the existence of virtual LANs (VLANs).
Rapid Spanning Tree Protocol (RSTP)
As its name implies, RSTP revamps the operation of the
spanning tree protocol to reduce the time it takes to
detect and react to changes in the topology. It does not,
however, incorporate support for VLANs. RSTP was first
published in 802.1w-2001, but was later incorporated
into 802.1d-2004.
Rapid Per-VLAN Spanning Tree Protocol Plus (Rapid-
PVST+)
Rapid-PVST+ represents the an evolution in a series of
spanning tree protocols developed by Cisco Systems, Inc.
It incorporates the performance improvements of RSTP
and includes support for VLANs. It is used in networks that
run only Cisco equipment, and is not widely supported by
other equipment vendors.
Multiple Spanning Tree Protocol (MSTP)
The latest version of the spanning tree protocol
standardized by the IEEE, originally published as 802.1s-
2002 and later incorporated into 802.1q-2005. MSTP
builds on the capabilities of RSTP and includes support for
multiple VLANs. One notable difference between MSTP
and Rapid-PVST+ regards the number of spanning tree
instances that run in the switch. Rapid-PVST+ requires
one spanning tree instance per VLAN, while MSTP allows
many VLANs to be mapped onto a single spanning tree.
MSTP therefore operates more efficiently when large
numbers of VLANs are configured. MSTP also supports
hierarchical network design with the concept of a region.
Topology changes affect the switches in the region, but
are invisible to switches outside of the region. This allows
for more efficient operation in large-scale networks.
2 | Spanning Tree Protocol
Spanning Tree Protocols
•Legacy STP, now obsolete
•Recovery time < 1 minute
•Does not support VLANs
STP
•Recovery time < 1 second
•Does not support VLANs
RSTP
•Cisco proprietary
•One spanning tree per VLAN
Rapid-PVST+
•Latest open standard
•Multiple VLANs share one spanning tree
•Supports hierarchical network design
MSTP
Award Solutions Proprietary
10
Award Solutions' eBook is authorized for a single user only. Do not distribute.
Broadcast storms may occur whenever a loop exists in the
Ethernet LAN topology. The figure illustrates a simple case
in which a loop exists between two Ethernet switches. The
sequence of events unfolds as follows:
1. The node on the left sends a broadcast frame. SW1
receives it on port gi0/1.
2. Whenever an Ethernet switch receives a broadcast
frame, it forwards the frame out all active ports,
except the one on which the frame was received. In
this case, SW1 forwards the frame out ports gi0/2
(shown in red) and gi0/3 (shown in green).
3. SW2 receives two broadcast frames. Ethernet does
not provide any means to determine that these are, in
fact, two copies of the same original frame, so SW2
must process each one independently. It receives one
frame (red) on port gi0/7 and forwards it out ports
gi0/6 and gi0/8. It receives the other frame (green)
on port gi0/8 and forwards it out gi0/6 and gi0/7.
The node on the right receives two copies of the
frame.
4. SW1 receives two broadcast frames. Ethernet
provides no means to determine that these are
copies of the frames that it recently forwarded on to
SW1, so it must process them again. It receives one
frame (green) on port gi0/2 and forwards it out ports
gi0/1 and gi0/3. It receives the other frame (red) on
port gi0/3 and forwards it out ports gi0/1 and gi0/2.
The node on the left receives two copies of the frame
that it originally sent.
The frames are now stuck in the loop. Ethernet has no
concept of a frame identifier, so the switches do not
recognize that they are processing the same frame again
and again. Ethernet also does not have a timeout
mechanism, so the switches continue processing the
frames in this manner forever. And each iteration through
the loop causes additional copies of the frame to be
made, so the storm consumes an increasing amount of
bandwidth, buffer space and processing time.
2 | Spanning Tree Protocol
Broadcast Storms
Loops cause broadcast storms
bcast bcast
bcast bcast
bcast bcast
bcast bcast
bcast bcast
bcast bcast
gi0/2
gi0/1
gi0/3
gi0/7
gi0/6
gi0/8
bcast
bcast bcast
bcast bcast
bcast
bcast
bcast
bcast
bcast
bcast
bcast
bcast
SW1 SW2
Award Solutions Proprietary
11
Award Solutions' eBook is authorized for a single user only. Do not distribute.
Broadcast storms may be prevented (or managed) by
avoiding large, complex Ethernet networks in the first
place. Service providers may choose to strategically
deploy IP and MPLS to minimize the reach of the Ethernet
topology. Where Ethernet is used, designing loop-free
networks (i.e., tree topology) also eliminates the
conditions in which storms may occur. Most Ethernet
switches also implement some form of storm control
mechanisms wherein the broadcast traffic gets throttled.
Storm control features minimize the damage caused by
broadcast storms, but do not prevent them outright.
Finally, spanning tree protocols can also be used to
automatically patrol the network for loops. When a loop is
detected, the spanning tree protocol automatically
disables some links in order to break the loop.
2 | Spanning Tree Protocol
Broadcast Storm Prevention
1. Prefer IP and MPLS over Ethernet
for large networks
2. Avoid loops in Ethernet topology
3. Storm Control
4. Spanning Tree Protocols
Backhaul
Router
CE
CE
CE
CE
PE
PE
Award Solutions Proprietary
12
Award Solutions' eBook is authorized for a single user only. Do not distribute.
When Spanning Tree Protocol is used, the switches in the
network exchange messages that enable them to detect
loops that would otherwise cause broadcast storms. They
then select one or more ports to be blocked in order to
simplify the logical topology of the network such that it
resembles a tree. The switches do not forward user traffic
through a blocked port. The net result is that the loop is
broken and the conditions for a broadcast storm are
eliminated.
2 | Spanning Tree Protocol
Spanning Tree Protocol
Before After
Award Solutions Proprietary
13
Award Solutions' eBook is authorized for a single user only. Do not distribute.
2 | Spanning Tree Protocol
Rapid Spanning Tree
Protocol (RSTP)
Award Solutions Proprietary
14
Award Solutions' eBook is authorized for a single user only. Do not distribute.
The Spanning Tree Protocol selects one switch to serve as
the root of the logical tree topology. The root switch
election process governs which switch gets selected as
the root and ensures that all switches make the same
selection. The procedure is relatively straightforward. Each
switch has a unique identifier. The switch with the lowest
identifier becomes the root. The identifier is a combination
of a priority value and the switch’s MAC address. By
default, all switches use the same priority value, so the
root switch election boils down to which switch has the
numerically lowest MAC address.
Choosing the root switch based solely on the MAC address
is fairly arbitrary, but the loop detection procedures work
regardless of which switch gets elected to be the root. The
administrator may influence the outcome, however, by
overriding the default priority value and setting it to
something lower than the default value. The other
switches then select it as the root switch.
The figure illustrates the process of overriding the default
priority value to select the root switch. If we let all of the
switches use the default priority value of 32768, then the
switch in the center would become the root switch, since it
has the numerically lowest address. By changing the
priority of the switch at the top of the figure, we ensure
that it wins the root switch election.
2 | Spanning Tree Protocol
The Root Switch
Root Switch Election
• ID = Priority + Address
• By default, all switches use same priority value
• Override default priority value to specify root switch
32768
+ AABB:1122:0001
32768
+ AABB:1122:0003
32768
+ AABB:1122:0002
32768
+ AABB:1122:0005
32768
+ AABB:1122:0004
32768
+ AABB:1122:0006
8192 32768
+ AABB:1122:0007
Award Solutions Proprietary
15
Award Solutions' eBook is authorized for a single user only. Do not distribute.
The spanning tree algorithm assigns a cost to each switch
port based on the speed of the link. Faster links cost less.
The spanning tree algorithm also calculates the root path
cost for each switch port. This is defined as the sum of the
port costs between it and the root switch. When the
spanning tree detects a loop, it uses the root path cost to
determine which ports should carry traffic and which
should be blocked.
2 | Spanning Tree Protocol
Shortest Path Selection
Shortest Path Selection
• Port Cost = assigned based on link speed (range: 1 to 200M)
• Root Path Cost = sum of port costs of shortest path to root switch
1
Cost: 2000 Cost: 2000
Cost: 2000
Cost: 2000
Root Path Cost: 6000
Root Path Cost:
6000
Root Path Cost:
4000
Award Solutions Proprietary
16
Award Solutions' eBook is authorized for a single user only. Do not distribute.
The spanning tree algorithm assigns each switch port a
specific role to play. It selects one port on each switch to
be the root port for that switch. This port provides the
most optimal path to the root switch (i.e., the lowest root-
path cost). The algorithm also selects one port on each
LAN segment to be the designated port for that segment.
Any remaining ports are designated alternate ports. Root
ports and designated ports forward user traffic. Alternate
ports discard user traffic.
The spanning tree algorithm only assigns the alternate
port role when a loop exists in the network’s topology. This
is the heart of the algorithm’s loop-detection function. The
loop is broken because the alternate port discards user
traffic. When a node in the LAN sends a broadcast frame,
it floods the network through root and designated ports,
but gets dropped by alternate ports.
2 | Spanning Tree Protocol
Port Role Assignment
Port Roles
• Root Port = per switch, shortest path to root switch; forwards traffic
• Designated Port = per segment, shortest path to root; forwards traffic
• Alternate Port = alternate, but less optimal path to root switch; discards
traffic
1
Designated Port
Root Port
Alternate Port
32768
+ AABB:1122:0001
32768
+ AABB:1122:0003
32768
+ AABB:1122:0002
32768
+ AABB:1122:0005
32768
+ AABB:1122:0004
32768
+ AABB:1122:0006
8192
+ AABB:1122:0007
Award Solutions Proprietary
17
Award Solutions' eBook is authorized for a single user only. Do not distribute.
When a switch detects the loss of a Physical Layer signal,
the spanning tree algorithm re-assesses the port role
assignments in light of the new connectivity. If it
determines that a change is necessary, it sends a
proposal of the new role to its neighboring switch. The
neighboring switch re-assesses its own port roles based
on this new information and may agree or, if it believes it
has better insight into the topology, issue a counter-
proposal. Changing the role of one port on the switch may
cause a ripple effect throughout the network. The
proposal/agreement exchanges propagate in a link-by-link
fashion away from the failure toward the root switch until
it reaches a switch for whom the new proposal does not
require any changes.
In the figure shown, the link that connects the center
switch to the root switch fails. This had been the center
switch’s root port. The precise details of the operation go
beyond the scope of this discussion, but the loss of the
root port forces the center switch to change the remaining
port’s role from designated port to root port. The bottom-
most switch changes its root port to a designated port and
must therefore unblock one of its alternate ports. In this
example, the root path cost is the same for both alternate
ports, so the port priorities are considered. Similar to the
root switch priority, the administrator can influence the
selection of the root switch by modifying the default
priority value. If both ports have the same priority value,
then the numerical port identifier is used to break the tie.
The bottom-most switch sends a proposal to the
neighboring switch (on its left in the figure). The proposal
does not require it to change any of its port roles, so the
configuration changes stop there. The network has re-
converged on the new topology.
One task remains, however. Remember that each of the
switches in the network maintains a MAC table that
associated MAC addresses with port numbers. Some of
that information is now out of date. The root switch sends
a Topology Change Notification, which the other switches
use as a signal to flush stale data from their MAC tables.
2 | Spanning Tree Protocol
Topology Changes
Topology Changes
• Nodes detect link failure through Physical Layer, or message timeout
• Proposal and agreement process updates port roles
• Topology Change Notification tells switches to flush MAC tables
1
Designated Port
Root Port
Alternate Port
Link Fails
DP becomes RP
RP becomes
DP
AP becomes RP
Proposal/
Agreement
Proposal/
Agreement
Award Solutions Proprietary
18
Award Solutions' eBook is authorized for a single user only. Do not distribute.
2 | Spanning Tree Protocol
Multiple Spanning Tree
Protocol (MSTP)
Award Solutions Proprietary
19
Award Solutions' eBook is authorized for a single user only. Do not distribute.
The figure illustrates a hypothetical Ethernet backhaul
network design. In this design, each cell site is assigned a
unique VLAN ID. The cell site links enter the Mobile
Telephone Switching Office (MTSO) and connect to a set
of access switches. Each access switch carries traffic for
ten cell sites. Two access switches, designated SWA and
SWB are shown in the diagram. The others are omitted
due to lack of space. The access switches connect to a
pair of aggregation switches, SWC and SWD, which in turn
connect to a Multi-Layer Switch (MLS) that acts as
backhaul router. The spanning tree protocol manages the
redundant links between the access and aggregation
switches.
2 | Spanning Tree Protocol
Multiple VLAN Sample Topology
MLS
SWC
SWA
SWB
SWD
Aggregation switches
Access switches
Spanning Tree manages
redundant links
Award Solutions Proprietary
20
Award Solutions' eBook is authorized for a single user only. Do not distribute.
Let’s assume that the MLS is the root switch in our sample
topology. When the spanning tree algorithm runs, each
access switch selects a root port and an alternate port.
The root path costs are the same for both ports (assuming
of the same links are the same speed), so the selection of
the root and alternate ports is fairly arbitrary. In the figure
shown, the top-most port on SWA remains active, while the
bottom-most port gets blocked. SWB does just the
opposite of this.
2 | Spanning Tree Protocol
Spanning Tree Results
MLS
SWC
SWA
SWB
SWD
Designated Port
Root Port
Alternate Port
Award Solutions Proprietary
21
Award Solutions' eBook is authorized for a single user only. Do not distribute.
When redundant links are deployed in the network,
service providers often prefer a load-balancing solution to
a strict active/standby scheme. When multiple VLANs are
used, this can be accomplished by directing some VLAN
traffic (for example, the even-numbered VLANs) across
one of the redundant links and other VLAN traffic (for
example, the odd-numbered VLANs) across the other
redundant link.
Referring back to our sample topology, let us focus on the
links that connect access switch SWA to the aggregation
switches SWC and SWD. SWA carries traffic for 10 VLANs
(one per cell site). If RSTP is used to manage these links,
then load balancing is not possible. When RSTP computes
the spanning tree, the traffic for all 10 VLANs is carried
over the active link. The blocked link remains idle. This is
because RSTP does not support the notion of computing
multiple spanning trees.
Alternatively, one could use PVSTP+ instead. As its name
implies, Rapid PVSTP+ computes one spanning tree
solution for each VLAN configured on the switch. There
would therefore be 10 spanning trees in our example. By
overriding the default port priorities, we could arrange for
half of the spanning trees to select the top-most port to be
the root port and the bottom-most port to be the alternate
port. We could configure the other half of the spanning
trees to do just the opposite. The net effect is that the
traffic would be evenly divided (assuming the cell sites
were equally loaded) across the two links. If either of the
links failed, then the spanning trees would react by
unblocking the alternate port and all traffic would be
directed over the remaining link.
2 | Spanning Tree Protocol
Load Balancing with VLANs
• MSTP
– Efficient load balancing
– Two spanning trees (one blocks port 1, the other blocks port 2)
– Half of the VLANs get mapped to one spanning tree; half get mapped to the other
• PVSTP+
– Less efficient load balancing ; one spanning tree per VLAN
– Half of the VLANs block port 1; the other half block port 2
• RSTP
– Single spanning tree, active/idle configuration, no load balancing
MLS
MSTP = Two Spanning Trees
SWC
SWA
SWD
MLS
SWC
SWA
SWD
Award Solutions Proprietary
22
Award Solutions' eBook is authorized for a single user only. Do not distribute.
While Rapid PVSTP+ achieves the goal of balancing the
traffic load, it does so at a certain cost. SWA needs to
maintain 10 separate spanning tree instances. Each
spanning tree instance introduces some processing,
memory and messaging overhead. Note, however, that in
our sample topology, there are really only two possible
spanning trees. The fact that Rapid PVSTP+ requires one
spanning tree per-VLAN means that it creates five
separate copies of each of the two possible spanning
trees. This is where MSTP offers some advantages over
RSTP and Rapid PVSTP+.
MSTP allows us to define spanning tree instances and
then associate those instances with a set of VLANs. In our
case, we would create the two spanning tree instances,
overriding the port priorities so that they choose different
root ports, and then map five VLANs onto each of the two
instances.
2 | Spanning Tree Protocol
Load Balancing with VLANs (Continued)
• MSTP
– Efficient load balancing
– Two spanning trees (one blocks port 1, the other blocks port 2)
– Half of the VLANs get mapped to one spanning tree; half get mapped to the other
• Rapid PVSTP+
– Less efficient load balancing ; one spanning tree per VLAN
– Half of the VLANs block port 1; the other half block port 2
• RSTP
– Single spanning tree, active/idle configuration, no load balancing
MLS
MSTP = Two Spanning Trees
SWC
SWA
SWD
MLS
SWC
SWA
SWD
Award Solutions Proprietary
23
Award Solutions' eBook is authorized for a single user only. Do not distribute.
MSTP supports a form of hierarchical network design by
introducing the concept of a region. A region is a collection
of switches that share a common view of their physical
and logical topology. Collectively, the switches in the
region appear as a single, virtual switch to the switches
outside of the region. When a topology change occurs
within the region, the switches inside the region re-
converge on the new topology. The switches outside the
region remain unaware of, and unaffected by, the topology
change.
MSTP regions allow the Ethernet LAN to grow in scale and
complexity without adversely affecting the performance of
the error detection and recovery procedures.
2 | Spanning Tree Protocol
MSTP Regions
Award Solutions Proprietary
24
Award Solutions' eBook is authorized for a single user only. Do not distribute.
2 | Spanning Tree Protocol
Summary
• Spanning Tree Protocol (STP) prevents loops
from triggering broadcast storms in Layer 2
networks.
• Rapid Spanning Tree Protocol (RSTP)
significantly reduces the time to detect and
recover from a failure.
• Multiple Spanning Tree Protocol (MSTP) adds
support for VLANs.
• MSTP provides an efficient means to load
balance VLAN traffic across multiple links.
Award Solutions Proprietary
25
Award Solutions' eBook is authorized for a single user only. Do not distribute.
The figure illustrates a hypothetical Ethernet backhaul
network. Based on the priority and addresses shown,
which switch is selected as root switch by the Spanning
Tree Protocol? What could you do to ensure that the MLS
becomes the root switch?
2 | Spanning Tree Protocol
Review Exercise
MLS
SWC
SWD
SWA
32768 + e05f:b903:5280
32768 + e05f:b903:535a
32768 + e05f:b903:4653
SWB
32768 + e05f:b903:1121
32768 + e05f:b903:9863
32768 + e05f:b903:af3c
32768 + e05f:b903:753a
32768 + e05f:b903:5280
32768 + e05f:b9c3:a2d0
32768 + e05f:b93f:d9ea
32768 + e05f:b9c3:7719
Award Solutions Proprietary
26
Award Solutions' eBook is authorized for a single user only. Do not distribute.
3 | Routing Table
Chapter 3:
Routing Table
Award Solutions Proprietary
27
Award Solutions' eBook is authorized for a single user only. Do not distribute.
3 | Routing Table
Objectives
After completing this module, you will be able to:
• Read and understand IP routing tables
• Understand the factors that go into the route
selection algorithm
• Identify the preferred route from a set of
alternates
• Employ recursive routing techniques
• Explain how black holes impact routing and why
a packet might be deliberately discarded
Award Solutions Proprietary
28
Award Solutions' eBook is authorized for a single user only. Do not distribute.
3 | Routing Table
Routing Table
Concepts
Award Solutions Proprietary
29
Award Solutions' eBook is authorized for a single user only. Do not distribute.
The routing table is essentially a collection of network
addresses that the router knows how to reach. For a given
inbound packet, the routing table indicates to which node
it should forward the packet (the next hop) and/or the
outbound interface it should use to get there. The routing
table entries may contain additional information used to
prioritize routes, indicate their origin and how long they’ve
been around.
Routing table entries come from one of three possible
sources. The most straightforward source of routes are
the router’s own network interfaces. If we configure an
interface with the address 192.168.1.1/24, then it stands
to reason that the router knows how to reach the nodes
on the 192.168.1.0/24 subnet. Similarly, so-called static
routes can be created by explicitly configuring the routes
on the router. Finally, the router can use a dynamic routing
protocol such as OSPF and BGPv4 to exchange routing
information with other routers.
It’s worth noting that the routing table is only one
repository of routing information. Individual routing
protocols maintain databases that contain routing
information they’ve learned from neighboring routers. And
while it’s convenient to talk about the router searching the
routing table when it receives a packet, modern routers
copy the contents of the routing table into a more
optimized data structure, typically called the Forwarding
Information Base (FIB).
3 | Routing Table
Routing Table Concepts
Routing Table
Destination Source Cost Next Hop
0.0.0.0/0 Static 1 192.168.1.1
192.168.1.0/24 Connected 2 Gi 0/0
10.1.1.0/22 OSPF 10 10.5.3.8
172.16.0.0/16 BGP 20 192.168.7.30
Forwarding
Information
Base
Sources
Static
Connected
Dynamic
Award Solutions Proprietary
30
Award Solutions' eBook is authorized for a single user only. Do not distribute.
This sample routing table is used to discuss the concepts
and structure that make up the routing table.
3 | Routing Table
Routing Table Example
R1# show ip route
B 216.238.54.0/24 [20/0] via 12.123.1.236, 4w4d
O 216.221.5.0/24 [110/1] via 12.123.1.236, 7w0d
136.141.0.0/24 is subnetted, 2 subnets
S 136.141.6.0 [1/0] via 12.122.125.4, 7w0d
R 136.141.2.0 [120/0] via 12.122.125.4, 7w0d
170.162.0.0/19 is subnetted, 1 subnets
B 170.162.32.0 [20/0] via 12.123.1.236, 7w0d
170.160.0.0/20 is subnetted, 2 subnets
O 170.160.32.0 [110/1] via 12.122.125.4, 7w0d
O 170.160.64.0 [110/1] via 12.123.1.236, 3d15h, fa0/1/1
187.179.0.0/16 is variably subnetted, 3 subnets, 2 masks
B 187.179.0.0/19 [20/0] via 12.123.1.236, 13:51:40, gi0/1
B 187.179.32.0/19 [20/0] via 12.123.1.236, 4w3d
S 187.179.64.0/18 [1/0] via 12.123.1.236, 4w3d
34.0.0.0/8 is variably subnetted, 3 subnets, 3 masks
S 34.254.244.0/22 [1/0] via 12.122.125.4, 7w0d
S 34.254.112.0/21 [1/0] via 12.122.125.4, 7w0d
S 34.253.0.0/19 [1/0] via 12.123.1.236, 7w0d
Award Solutions Proprietary
31
Award Solutions' eBook is authorized for a single user only. Do not distribute.
The routing table is organized into two tiers.
Level 1 routes serve as routes only as shown in the first
line of the example above or they may serve as indexes to
the Level 2 routes listed below them as seen in the third
line of our example. When a router searches for a match
to a particular destination address, it first searches the
Level 1 routes. If it finds a match, then it searches the
Level 2 routes for a more specific match.
A Parent Route is a Level 1 route that has Level 2 routes
beneath it. A Child Route is a Level 2 route. The router
automatically adds Parent Routes to the routing table
when Child Routes are created.
The basis of this two-tier hierarchy is classful routing which
has been replaced by Classless Inter-Domain Routing
(CIDR). This hierarchy is useful for quickly searching the
routing table and does not mean that the network
employs classful addressing or that the router uses
classful routing.
3 | Routing Table
Parent and Child Routes
R1# show ip route
B 216.238.54.0/24 [20/0] via 12.123.1.236, 4w4d
O 216.221.5.0/24 [110/1] via 12.123.1.236, 7w0d
136.141.0.0/24 is subnetted, 2 subnets
S 136.141.6.0 [1/0] via 12.122.125.4, 7w0d
R 136.141.2.0 [120/0] via 12.122.125.4, 7w0d
170.162.0.0/19 is subnetted, 1 subnets
B 170.162.32.0 [20/0] via 12.123.1.236, 7w0d
170.160.0.0/20 is subnetted, 2 subnets
O 170.160.32.0 [110/1] via 12.122.125.4, 7w0d
O 170.160.64.0 [110/1] via 12.123.1.236, 3d15h, fa0/1/1
187.179.0.0/16 is variably subnetted, 3 subnets, 2 masks
B 187.179.0.0/19 [20/0] via 12.123.1.236, 13:51:40, gi0/1
B 187.179.32.0/19 [20/0] via 12.123.1.236, 4w3d
S 187.179.64.0/18 [1/0] via 12.123.1.236, 4w3d
34.0.0.0/8 is variably subnetted, 3 subnets, 3 masks
S 34.254.244.0/22 [1/0] via 12.122.125.4, 7w0d
S 34.254.112.0/21 [1/0] via 12.122.125.4, 7w0d
S 34.253.0.0/19 [1/0] via 12.123.1.236, 7w0d
Level 1 Route
Level 1/Parent Route
Level 2/Child Route
Award Solutions Proprietary
32
Award Solutions' eBook is authorized for a single user only. Do not distribute.
The prefix length sets the range of addresses that a route
applies to. For example, if a network is listed as
10.10.10.0/24, the route applies to destination IP
addresses in the range from 10.10.10.0 to
10.10.10.255. If the network is listed as 10.10.10.0/28,
the route applies to IP addresses in the range of
10.10.10.0 – 10.10.10. 15. All routes in a routing table
must have a prefix length in order to determine the range
of addresses that the route applies to. The range for each
route is not necessarily unique. The ranges for
10.10.10.0/28 is wholly contained in the range for
10.10.10.0/24. If you examine the sample routing table,
some routes do not have route prefixes, for example,
136.141.6.0 [1/0] via 12.122.125.4, 7w0d and
136.141.2.0 [120/0] via 12.122.125.4, 7w0d.
<COLUMN BREAK HERE>
The presence or absence of the prefix length in the
example table is determined by the rules below.
Level 1 with no Children
Level 1 route has its own prefix length.
Level 1 with Children
• Case 1: All Children have same prefix length.
― Level 1 route lists the prefix length, Child Routes
do not list prefix lengths.
• Case 2: Children have different prefixes.
― Prefix lengths are listed for each Child and the
Level 1 route uses the classful prefix for the
network.
3 | Routing Table
Prefix Length
R1# show ip route
B 216.238.54.0/24 [20/0] via 12.123.1.236, 4w4d
O 216.221.5.0/24 [110/1] via 12.123.1.236, 7w0d
136.141.0.0/24 is subnetted, 2 subnets
S 136.141.6.0 [1/0] via 12.122.125.4, 7w0d
R 136.141.2.0 [120/0] via 12.122.125.4, 7w0d
170.162.0.0/19 is subnetted, 1 subnets
B 170.162.32.0 [20/0] via 12.123.1.236, 7w0d
170.160.0.0/20 is subnetted, 2 subnets
O 170.160.32.0 [110/1] via 12.122.125.4, 7w0d
O 170.160.64.0 [110/1] via 12.123.1.236, 3d15h, fa0/1/1
187.179.0.0/16 is variably subnetted, 3 subnets, 2 masks
B 187.179.0.0/19 [20/0] via 12.123.1.236, 13:51:40, gi0/1
B 187.179.32.0/19 [20/0] via 12.123.1.236, 4w3d
S 187.179.64.0/18 [1/0] via 12.123.1.236, 4w3d
34.0.0.0/8 is variably subnetted, 3 subnets, 3 masks
S 34.254.244.0/22 [1/0] via 12.122.125.4, 7w0d
S 34.254.112.0/21 [1/0] via 12.122.125.4, 7w0d
S 34.253.0.0/19 [1/0] via 12.123.1.236, 7w0d
Prefix in Level 1 Route
Prefix in Level 2 Route
Award Solutions Proprietary
33
Award Solutions' eBook is authorized for a single user only. Do not distribute.
Route Code
The route code indicates the source of the routing
information. The meaning of the codes is given at the top
of the routing table when working with the device. In our
example here, B=BGP, O=OSPF, S=Static, and R=RIP.
Connected routes (not shown here) are listed with a C and
Local routes (AKA Host routes) are listed with an L. Host
routes represent the router’s own IP addresses and carry
a 32-bit prefix length.
Administrative Distance
The administrative distance is a precedence value
assigned to the route, based on the source of the routing
information. Some sources of routing information are
considered more trustworthy than others, and have a
lower administrative distance. If the same route is learned
through multiple sources, the one with the lowest
administrative distance gets installed into the routing
table.
Metric
Each route is assigned a metric to show the relative cost
of using the particular route. Metrics act as tie breakers
when the router must select between routes for the same
destination network, which were learned from the same
dynamic routing protocol. Most routing protocols allow
Equal Cost Multi-Path (ECMP) and allow multiple routes to
the same destination network having the same metric to
be installed in the routing table. Traffic matching these
routes is load-balanced across the ECMP routes. ECMP
adds overhead to the forwarding function of a router as
the router must track which data stream is using which of
the routes. Administrators can set the maximum number
of ECMP routes that are allowed per destination network.
The metric may also be manipulated by an administrator
to prefer one ECMP route over another.
Next-Hop Address
The next-hop address identifies the IP address of the
device to which the router sends packets that match the
route. The next-hop address is typically the IP address of
the router that provided the route.
3 | Routing Table
What’s in a Route?
R1# show ip route
B 216.238.54.0/24 [20/0] via 12.123.1.236, 4w4d
O 216.221.5.0/24 [110/1] via 12.123.1.236, 7w0d
136.141.0.0/24 is subnetted, 2 subnets
S 136.141.6.0 [1/0] via 12.122.125.4, 7w0d
R 136.141.2.0 [120/0] via 12.122.125.4, 7w0d
170.162.0.0/19 is subnetted, 1 subnets
B 170.162.32.0 [20/0] via 12.123.1.236, 7w0d
170.160.0.0/20 is subnetted, 2 subnets
O 170.160.32.0 [110/1] via 12.122.125.4, 7w0d
O 170.160.64.0 [110/1] via 12.123.1.236, 3d15h, fa0/1/1
187.179.0.0/16 is variably subnetted, 3 subnets, 2 masks
B 187.179.0.0/19 [20/0] via 12.123.1.236, 13:51:40, gi0/1
B 187.179.32.0/19 [20/0] via 12.123.1.236, 4w3d
S 187.179.64.0/18 [1/0] via 12.123.1.236, 4w3d
34.0.0.0/8 is variably subnetted, 3 subnets, 3 masks
S 34.254.244.0/22 [1/0] via 12.122.125.4, 7w0d
S 34.254.112.0/21 [1/0] via 12.122.125.4, 7w0d
S 34.253.0.0/19 [1/0] via 12.123.1.236, 7w0d
Route Code
Admin.Distance/Metric
Next-Hop Address
Award Solutions Proprietary
34
Award Solutions' eBook is authorized for a single user only. Do not distribute.
In general, when a router knows more than one route to a
particular destination, it prefers the one with the lowest
metric. This can be a problem when the routes were
learned from different sources because the metrics that
one routing protocol uses may not be consistent with the
metrics used by other routing protocols. For example, BGP
uses the number of Autonomous Systems (ASs) in its Path
Vector as a metric, while OSPF metrics are based on
bandwidth. Relying solely on route metrics, the router
would not be able to select the best possible routes.
The router uses the Administrative Distance to select the
best possible route from among a set of alternate routes
that were learned from different routing sources. The
administrative distance is determined by the source of
routing information. Routing information sources with
lower administrative distance values are preferred over
those with higher administrative distance values.
Unlike the route metric, the administrative distance is not
set on a per-route basis. All routes from a particular
routing information source share the same administrative
distance value. For example, all routes learned by OSPF
have 110 as the administrative distance value. The
administrative value is a configuration parameter set
within the router and is not exchanged by the routing
protocols (also unlike the route metrics).
Routing protocols with lower administrative distances are
deemed to be more reliable, accurate or trustworthy than
those with higher administrative distances. The table
shown here lists the default administrative values used by
Cisco routers. The defaults can be overridden, however, if
one wishes to change the relative rankings.
Finally, it’s worth noting that the administrative distance
determines which routes actually get installed in the
routing table. Typically multiple routes to the same
destination network (as specified by network address and
prefix length) from different routing protocols are not
found in routing tables. Whichever one has the lower
administrative distance causes the others to be bumped
from the routing table.
Source: “What is Administrative Distance?”, Document ID:
15986, Cisco.
3 | Routing Table
Administrative Distance
Source Administrative Distance
Connected 0
Static 1
EIGRP summary route 5
eBGP 20
Internal EIGRP 90
IGRP 100
OSPF 110
IS-IS 115
RIP 120
EGP 140
ODR 160
External EIGRP 170
iBGP 200
<Unknown> 255
Award Solutions Proprietary
35
Award Solutions' eBook is authorized for a single user only. Do not distribute.
3 | Routing Table
The Longest Match
Award Solutions Proprietary
36
Award Solutions' eBook is authorized for a single user only. Do not distribute.
A packet has arrived with destination address
66.134.50.11. The router has the following three routes
installed in its routing table.
• 66.0.0.0/8 next-hop 10.10.10.1 gi0/1
• 66.134.0.0/18 next-hop 12.13.14.5 gi0/22
• 66.134.48.0/20 next-hop 62.34.24.33 gi0/3
The prefix length indicates the range of addresses
covered by the route. Here is the range for each of the
routes.
• 66.0.0.0/8 has range 66.0.0.0 – 66.255.255.255
• 66.134.0.0/18 has range 66.134.0.0 –
66.134.63.255
• 66.134.48.0/20 has range 66.134.48.0 –
66.134.63.255
Our destination address, 66.134.50.11 falls into each of
these three ranges. When a router discovers more than
one possible route for the packet it bases the forwarding
decision on the Longest-Match Rule.
3 | Routing Table
Finding the Right Route
Route
Prefix
Length
Range of Addresses
Is
66.134.50.11
in this range?
66.0.0.0 /8 66.0.0.0 – 66.255.255.255
66.134.0.0 /18 66.134.0.0 – 66.134.63.255
66.134.48.0 /20 66.134.48.0 – 66.134.63.255
Source IP: 12.12.134.19
Destination IP: 66.134.50.11
Award Solutions Proprietary
37
Award Solutions' eBook is authorized for a single user only. Do not distribute.
The Longest-Match Rule says that when multiple routes
contain the destination address in their ranges, the one
with the longest prefix length is the route to use.
Examining our prefix lengths we have /8, /18/ and /20.
The /20 is the longest prefix length and the route
66.134.48.0/20 is the route used for forwarding the
packet.
A route is said to match the packet’s destination address
if the packet’s destination address has the same network
prefix as the route. In other words, the route matches if
the first n bits of the packet’s destination address match
the first n bits of the route entry, where n is the route’s
prefix length. The bits in the destination address must
match exactly the bits in the network prefix of the route.
3 | Routing Table
Longest-Match Rule
Destination IP
66.134.50.11
01000010 10000110 00110010 00001011
S 66.0.0.0/8 01000010 00000000 00000000 00000000
Destination matches 8 bits
B 66.134.0.0/18 01000010 10000110 00000000 00000000
Destination matches 18 bits
O 66.134.48.0/20 01000010 10000110 00110000 00000000
Destination matches 20 bits
Longest-Match Rule: the route matches if the first n bits of the
packet’s destination address match the first n bits of the route
entry, where n is the route’s prefix length.
Award Solutions Proprietary
38
Award Solutions' eBook is authorized for a single user only. Do not distribute.
The Longest-Match requires that the destination’s prefix
match the network prefix exactly. Enter the route number
in the space provided for each of the destination IP
addresses.
What happens if there is no matching route for the
destination IP address?
3 | Routing Table
Longest-Match Exercise
1 66.0.0.0/8 0100 0010 0000 0000 0000 0000 0000 0000
2 66.134.0.0/18 0100 0010 1000 0110 0000 0000 0000 0000
3 66.134.48.0/20 0100 0010 1000 0110 0011 0000 0000 0000
Which Route (above) do these Destination IPs use?
66.128.12.31 0100 0010 1000 0000 0000 1100 0001 1111
66.134.64.222 0100 0010 1000 0110 0100 0000 1101 1110
66.134.46.76 0100 0010 1000 0110 0010 1110 0100 1100
Award Solutions Proprietary
39
Award Solutions' eBook is authorized for a single user only. Do not distribute.
3 | Routing Table
Recursive Routing
Award Solutions Proprietary
40
Award Solutions' eBook is authorized for a single user only. Do not distribute.
The router needs two pieces of information to forward a
packet to the next device in the path toward its
destination: the next-hop address and the exit interface. If,
after searching the routing table, the preferred route
identifies only the next-hop address, but not the exit
interface, the router searches the routing table a second
time to locate a suitable exit interface.
In the example given above, the router receives a packet
with a destination address of 10.1.0.5. Its first pass
through the routing table selects the 10.1.0.4/30 route as
the preferred route. This entry includes the next-hop
address, 172.16.4.2, but not the exit interface. The router
searches the routing table a second time for a route to
172.16.4.2. It finds the 172.16.4.0/30 route and
determines that fa0/1/2 is the exit interface.
This recursive search could have been avoided if the
10.1.0.4/30 route had included both a next-hop address
and an exit interface. This is useful to remember,
especially when configuring static routes. Specifying both
the next-hop address and the exit interface reduces the
amount of processing required to forward the packets.
3 | Routing Table
Recursive Routing
P1#show ip route
10.0.0.0/30 is subnetted, 2 subnets, 2 masks
10.1.0.4 [110/2] via 172.16.4.2, 00:02:56
172.16.0.0/30 is subnetted, 8 subnets
172.16.4.0 is directly connected, fa0/1/2
P1#show ip route
10.0.0.0/30 is subnetted, 2 subnets, 2 masks
10.1.0.4 [110/2] via 172.16.4.2, 00:02:56, fa0/1/2
172.16.0.0/30 is subnetted, 8 subnets
172.16.4.0 is directly connected, fa0/1/2
fa 0/1/2
Dst: 10.1.0.5
172.16.4.2 10.1.0.5
1
2
1
Next Hop
address
Exit
Interface
Next Hop
address
Exit
Interface
Award Solutions Proprietary
41
Award Solutions' eBook is authorized for a single user only. Do not distribute.
3 | Routing Table
Black Holes
Award Solutions Proprietary
42
Award Solutions' eBook is authorized for a single user only. Do not distribute.
The term black hole refers to the case when a router
receives a packet, but cannot forward the packet and the
packet is dropped. This action results in a routing black
hole, analogous to the theoretical astronomical
phenomenon of a region in space with a gravitational pull
such that nothing, not even light, can escape.
There are several reasons why black holes – in the IP
networking sense – might occur.
• Routing Errors – A packet arrives, the router finds no
route and discards the packet. If the router is allowed
to send ICMP messages, it notifies the sender using
an Internet Control Message Protocol (ICMP)
“Destination Network Unreachable” message.
• MTU Problems – If the Maximum Transmission Unit
(MTU) of the outbound link is too small to
accommodate the packet, and if the packet’s “Don’t
Fragment” bit is set, the router drops the packet and
send an ICMP “Fragmentation Required” message
indicating what the MTU must be to send the packet
through the interface.
• Intentional Discard – In some circumstances, the
routing table includes a null route (also known as
black hole route). Any incoming packets that that
match that route are discarded. This is an appropriate
way to deal with malicious traffic, for example. An
Intrusion Prevention System (IPS) may dynamically
create a null route when it detects suspect activity.
ICMP messages are usually suppressed in this case,
so as to conceal the countermeasures from the
attacker.
3 | Routing Table
Black Holes
• Network forwards
packets to a router
• Router drops the
packets
• Possible reasons:
– Routing Error
– MTU Error
– Intentional Discard
• “Black Hole” Route:
R(config)#ip route 10.1.1.1 255.255.255.0 null0
Award Solutions Proprietary
43
Award Solutions' eBook is authorized for a single user only. Do not distribute.
3 | Routing Table
Summary
• There are three sources of routes: directly connected
interfaces, static routes, and dynamic routing protocols.
• Routing table organization is as follows: Level 1 and Level 2
routes; Parent and Child Routes.
• Administrative distance, the longest-match rule and route
metrics are used to select from among multiple alternate
routes.
• Routing table entries have a next-hop address, metric and
(optionally) exit interface.
• Recursive routing may be used when the route table entry
does not specify an exit interface.
Award Solutions Proprietary
44
Award Solutions' eBook is authorized for a single user only. Do not distribute.
3 | Routing Table
Review Questions
Use the table on the following page to answer the
questions below.
1. How many Level 1 routes are in this table?
2. How many routes were learned through dynamic
routing protocols?
3. The router receives a packet with the destination
address 172.16.0.1. Which interface does the
router send the packet out?
4. The router receives a packet with destination
address 20.15.0.4 Which interface does the
router send the packet out?
Award Solutions Proprietary
45
Award Solutions' eBook is authorized for a single user only. Do not distribute.
3 | Routing Table
Review
P1#show ip route
Codes: C - connected, S - static, R - RIP, B – BGP, O - OSPF
140.30.0.0/25 is subnetted, 1 subnets
C 140.30.19.0 is directly connected, gi0/1
B 20.0.0.0/8 [20/0] via 140.30.19.110, 00:04:17
66.0.0.0/20 is subnetted, 1 subnets
C 66.134.48.0 is directly connected, gi0/0
172.16.0.0/30 is subnetted, 8 subnets
C 172.16.60.0 is directly connected, fa0/1/6
C 172.16.56.0 is directly connected, fa0/1/2
C 172.16.52.0 is directly connected, fa0/1/3
C 172.16.24.0 is directly connected, fa0/1/5
C 172.16.16.0 is directly connected, fa0/1/4
C 172.16.8.0 is directly connected, fa0/1/1
C 172.16.4.0 is directly connected, fa0/1/0
O 172.16.0.0 [110/2] via 172.16.4.2, 00:02:56, fa0/1/0
10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
O 10.1.4.1/32 [110/2] via 172.16.4.2, 00:02:56, fa0/1/0
O 10.1.0.4/30 [110/2] via 172.16.4.2, 00:02:56, fa0/1/0
Award Solutions Proprietary
46
Award Solutions' eBook is authorized for a single user only. Do not distribute.
4 | OSPF Key Concepts
Chapter 4:
OSPF Key Concepts
Award Solutions Proprietary
47
Award Solutions' eBook is authorized for a single user only. Do not distribute.
4 | OSPF Key Concepts
Objectives
After completing the module, you will be able to:
• Describe how OSPF relates to Autonomous
Systems and other routing protocols.
• Describe the design of scalable networks using
OSPF areas
• Describe the role of Area Border Routers (ABRs)
• List the types of Link-State Advertisements that
OSPF uses to communicate routing information
Award Solutions Proprietary
48
Award Solutions' eBook is authorized for a single user only. Do not distribute.
The Open Shortest Path First (OSPF) protocol is a widely
used interior gateway protocol. It is a mature protocol,
defined by the Internet Engineering Task Force (IETF)
standard specification, Request for Comment (RFC) 2328.
OSPF runs within a single Autonomous System (AS). OSPF
routers collect information about the AS topology, known
generically as Link State Advertisements (LSAs). The
routers store this information in a Link State Database
(LSDB) and use it to calculate least-cost routes to each of
the destinations in the AS. These routes loaded into
routing tables.
OSPF quickly detects changes to the AS topology (such as
interface failures), updates the LSDB, recalculates the
cost of the routes and updates the routing tables.
OSPF Areas allows OSPF to perform more efficiently over
large networks. Without OSPF areas, OSPF would not scale
well as the size and complexity of the Autonomous System
grows. The Link State Database (LSDB) would expand,
increasing the amount of memory that OSPF needs to
function. The number of Link State Advertisements (LSA)
sent would increase, worsening the messaging overhead
added by the protocol. The Shortest Path First algorithm
would run more frequently and need to consider greater
numbers of alternate paths, increasing the amount of
processing that OSPF performs.
OSPF areas provide scalability by dividing the autonomous
system into logical subsystems. Each router learns the
detailed topology of its own area, but not that of other
areas. Instead, the Area Border Router (ABR) originates a
Summary-LSA into the area on behalf of all the routers
outside of the area.
All routers in a single area have identical LSDBs. ABRs
have a LSDB for each area that they participate in.
4 | OSPF Key Concepts
Open Shortest Path First (OSPF)
• Interior Gateway Protocol
• Link State Protocol
• Bandwidth → Link cost
• IETF Standard (RFC 2328)
• Uses Areas to subdivide the
autonomous system
OSPF Area 1
OSPF Area 0
OSPF Area 2
AS 100
BGP
AS 300
BGP
Award Solutions Proprietary
49
Award Solutions' eBook is authorized for a single user only. Do not distribute.
4 | OSPF Key Concepts
Areas and Router
Types
Award Solutions Proprietary
50
Award Solutions' eBook is authorized for a single user only. Do not distribute.
OSPF defines a special area called the backbone. The
backbone is always be area 0 (alternately written as
0.0.0.0). All other areas must connect to the backbone.
This acts as a transit network for inter-area traffic. The
non-backbone areas send routing information to the
backbone, which in turn distributes the information to the
other non-backbone areas.
If an area does not contain a physical interface to the
backbone network, a logical backbone connection may be
formed by configuring what’s called a virtual link.
4 | OSPF Key Concepts
The Backbone Area: Area 0
• Backbone Area = Area 0
• All areas must connect to backbone area
• Distribute inter-area routes
Area 1
Area 0
Area 2
Award Solutions Proprietary
51
Award Solutions' eBook is authorized for a single user only. Do not distribute.
OSPF defines four types of routers: Internal Routers,
Backbone Routers, Area Border Routers, and Autonomous
System Boundary Routers. Depending on their function, a
given router may be of one or more of these types.
The simplest type of router is an internal router. If all of a
router’s interfaces are part of the same area, then that
router is said to be an internal router.
A router with at least one interface that is part of the
backbone area is a backbone router. If all of the router’s
interface are part of the backbone area, then that router
could be considered both a backbone and internal router.
The Area Border Router (ABR) contains interfaces on at
least two different areas. The ABR originates Summary-
LSAs into the backbone containing a summary of the non-
zero area’s intra-area routes. It originates Summary-LSAs
into the non-zero area containing a summary of the AS’s
inter-area routes.
The Autonomous System Boundary Router (ASBR)
exchanges routing information with other Autonomous
Systems (ASs). This may be through a different routing
protocol, such as the Border Gateway Protocol (BGP) or
through static configuration. They originate External-AS
Link State Advertisements (LSAs) to communicate these
external routes throughout the AS.
4 | OSPF Key Concepts
OSPF Router Types
AS 300
Area Border Router
(ABR)
Internal Router
ASBR, ABR and
Backbone Router
Backbone Router
AS 400
AS 100
Backbone Router
Internal and
Autonomous
System Boundary
Router (ASBR)
ASBR and
Backbone Router
Area 1 Area 2
Area 0
AS 200
Award Solutions Proprietary
52
Award Solutions' eBook is authorized for a single user only. Do not distribute.
4 | OSPF Key Concepts
Link State
Advertisements (LSA)
Award Solutions Proprietary
53
Award Solutions' eBook is authorized for a single user only. Do not distribute.
The router maintains a Link State Database (LSDB) for
each area to which it belongs. The contents of the LSDB
are flooded to all of the routers in the area. Each of the
routers in the area eventually build an exact replica of the
area’s LSDB. The LSDB is a representation of the topology
of the area. It identifies the routers and networks in the
area, the links that interconnect them and the cost of
those links.
The contents of the LSDB are Link State Advertisements
(LSA). The LSDB holds four types of LSAs:
1. Router-LSAs. Each router originates a Router-LSA that
describes the state of the its interfaces.
2. Networks-LSAs. The network’s designated router
originates a Network-LSA that contains a list of
routers connected to that network.
3. Summary-LSAs. The area border router originates a
Summary-LSA that contains routes to destinations
outside the area, but inside the autonomous system.
4. External-LSAs. The autonomous system boundary
router originates an External-LSA that contains routes
to destinations outside the autonomous system.
Using the information in the chart, draw the network
topology for the local area that contains 11 routers and
three networks. The numbers indicate the metrics on the
given links between the connected nodes or networks. For
example, the 0 in the row and column that link Network 3
with Router 7 indicate that Router 7 connects to Network
3 and from Network 3 to Router 7 the cost is 0. However,
look at the link from Router 7 to Network 3 and the cost is
2. There is no cost associated with coming out of a
network. Costs are incurred when leaving routers.
4 | OSPF Key Concepts
Link State Database
R1 R2 R3 R4 R5 R6 R7 R8 R9 R10 R11 N1 N2 N3
R1 3 0 0
R2 5 5 5 0
R3 5
R4 5
R5 5
R6 3 0 0
R7 4 4 4 0
R8 4
R9 4
R10 4
R11 3 3
N1 3 3
N2 1 1
N3 2 2
Using the information in
this LSDB, draw the
topology of the local
network.
Award Solutions Proprietary
54
Award Solutions' eBook is authorized for a single user only. Do not distribute.
Draw the network based on the LSDB on the previous
page.
4 | OSPF Key Concepts
Draw the Network
Award Solutions Proprietary
55
Award Solutions' eBook is authorized for a single user only. Do not distribute.
This network is based on the LSDB given in the exercise. It
is in an OSPF network. Your drawing on the previous page
should look similar.
4 | OSPF Key Concepts
The Network
N3 2
2 4
4
4
1
R2
R4
R3
R1
R5
R7 R9
R8
R6
R10
N2
N1 3
3
5
5
5
1
R11
3 3
Award Solutions Proprietary
56
Award Solutions' eBook is authorized for a single user only. Do not distribute.
4 | OSPF Key Concepts
Link State
Advertisements
Award Solutions Proprietary
57
Award Solutions' eBook is authorized for a single user only. Do not distribute.
All OSPF routing information is exchanged in the form of a
Link State Advertisements (LSA). An LSA is a piece of
routing information that may describe a router, a physical
interface or a range of addresses, along with an
associated cost. The LSA specifies its originating router, its
age in seconds (which allows old routing information to
expire) and a sequence number (used to detect duplicate
LSAs).
There are 11 types of LSAs. The type of LSA depends on
the type of router creating the LSA.
4 | OSPF Key Concepts
Link State Advertisement
Link State
Advertisement
(LSA)
Router-LSA
(Type 1)
Network-LSA
(Type 2)
Summary-LSA
(Type 3, 4)
External-LSA
(Type 5, 7)
Opaque-LSA
(Type 9,10,11)
Award Solutions Proprietary
58
Award Solutions' eBook is authorized for a single user only. Do not distribute.
Each router in the Autonomous System originates a
Router-LSA. The Router-LSA indicates whether the router
is an ASBR or ABR. It includes a list of the router’s links,
the cost of each link, as well as other information such as
the link’s address. The Router-LSA gets distributed to
each of the routers in the area, but the ABR does not
forward the Router-LSA across area boundaries.
4 | OSPF Key Concepts
Type 1 Router-LSA
Area 1
Router-LSA = Type 1
Link State ID: 192.168.50.1
No of Links=2
Link 1 Cost , Type and other Details
Link 2 Cost , Type and other Details
Neighbor List
Generated by each router in the AS Area-scope
Link State ID is set to Router ID
Award Solutions Proprietary
59
Award Solutions' eBook is authorized for a single user only. Do not distribute.
A Network-LSA is originated for each broadcast or Non-
Broadcast Multiple Access (NBMA) network in the
autonomous system (but not for point-to-point links). It
includes a list of routers attached to the network and the
subnet address and mask assigned to the network. When
there are multiple OSPF router connected to the network,
only one of them, the Designated Router, sends the
Network-LSA. The Network-LSA gets distributed to each of
the routers in the area, but the Area Border Router (ABR)
does not forward the Network-LSA across area
boundaries.
4 | OSPF Key Concepts
Type 2 Network-LSA
Area 1
Network-LSA = Type 2
Link State ID: 10.2.1.100
Subnet Mask = 255.255.255.0
RID of Attached Router-R1
RID of Attached Router-R2
RID of Attached Router-R3
RID of Attached Router-R4
Generated by Designated Router Area-scope
Link State ID is set to DR Interface Address
R1 (DR)
R3 R4
Point-to-Point Link
Network-LSA = Type 2
Link State ID: 10.2.1.100
Subnet Mask = 255.255.255.0
RID of Attached Router-R1
RID of Attached Router-R2
RID of Attached Router-R3
RID of Attached Router-R4
R2
10.2.1.100/24
NW: 10.2.1.0/24
Award Solutions Proprietary
60
Award Solutions' eBook is authorized for a single user only. Do not distribute.
The Area Border Router (ABR) does not forward Router-
LSAs or Network-LSAs from one area to the next. Instead,
the ABR originates a Summary-LSA that, as its name
implies, summarizes the routing information for that area.
The ABR may originate separate Summary-LSAs for each
of the networks to be advertised, or it may condense
multiple networks into a single Summary-LSA by
advertising a single network address with a shorter
network prefix. When a router receives a Summary-LSA, it
computes a new cost to the target by adding in the cost of
the path between that router and the ABR. When an ABR
receives a Summary-LSA sent from some other ABR, it
does not forward the Summary-LSA across area
boundaries.
In the example shown, the ABR receives four Network-
LSAs from within Area 1. The ABR has been configured to
condense these into a single Summary-LSA that it
originates into Area 0. It sets the cost of the summary
route to be the largest cost of its individual component.
4 | OSPF Key Concepts
Type 3 Summary-LSA
Area 0
Summary-LSA = Type 3
Link State ID: 10.1.0.0
Subnet Mask = 255.255.252.0
Metric = 10
Generated by ABR Area-scope
Link State ID is set to Advertised Network Address
Cost = Advertised Cost + Cost to ABR
Area 1
10.1.1.0/24 Cost: 3
10.1.2.0/24 Cost: 5
10.1.3.0/24 Cost: 10
10.1.4.0/24 Cost 8
Network-LSA
Link State ID: 10.1.1.0
Subnet Mask = 255.255.255.0
ABR
Award Solutions Proprietary
61
Award Solutions' eBook is authorized for a single user only. Do not distribute.
The Area Border Router (ABR) generates an Autonomous
System Boundary Router (ASBR) Summary-LSA for each
ASBR in its area. This includes the cost of the path from
the ABR to the ASBR. The router may choose to use this
information to calculate the total cost to reach a
destination outside of the Autonomous System. When an
ABR receives an ASBR Summary-LSA from some other
ABR, it does not forward it across area boundaries.
4 | OSPF Key Concepts
Type 4 ASBR Summary-LSA
Area 1
ASBR Summary-LSA = Type 4
Link State ID: 192.168.50.7
Subnet Mask = 0.0.0.0
Metric = 22
Generated by ABR Area-scope
Link State ID is set to ASBR Router ID
For External Type 1 routes, add cost to ASBR
For External Type 2 routes, store as-is in Routing Table
Area 0
R7
(RID 192.168.50.7)
AS 100
ASBR
Award Solutions Proprietary
62
Award Solutions' eBook is authorized for a single user only. Do not distribute.
When the Autonomous System Boundary Router (ASBR)
wants to import a route from other routing processes to an
external destination into the Autonomous System (AS), it
originates an AS-External-LSA. This includes the network
address and mask of the external destination and the next
hop address of the external link. The AS-External-LSA gets
flooded throughout the AS.
The cost of the external route may be one of two types.
Type 1 costs use the same units as other OSPF LSAs. The
Shortest Path First algorithm may make a meaningful
comparison between the Type 1 cost of the AS-External-
LSA and the costs learned through other types of LSAs.
Type 2 costs are expressed using some other type of units
that are not compatible with the metrics used by the AS.
These other units are assumed to be significantly larger
than those used by the AS, such that the Shortest Path
First algorithm always selects a path with a cost expressed
in Type 1 units over a path expressed in Type 2 units.
4 | OSPF Key Concepts
Type 5 AS-External-LSA
AS External-LSA = Type 5
Link State ID: 10.0.0.0/16
Metric = 20
AS External-LSA = Type 5
Link State ID: 10.1.0.0/16
Metric = 20
Area 0
AS External-LSA = Type 5
Link State ID: 10.2.0.0/15
Metric = 20
Link State ID is set to Advertised Network Address
ASBR generates 1 AS External-LSA per route imported for the whole AS
Distributed transparently without any modification within AS
Includes the Next Hop IP address of the external link in the LSA
Area 1
AS 100
eBGP
10.0.0.0/16
10.1.0.0/16
10.2.0.0/15
ASBR
AS External-LSA = Type 5
Link State ID: 10.0.0.0/16
Metric = 20
AS External-LSA = Type 5
Link State ID: 10.1.0.0/16
Metric = 20
AS External-LSA = Type 5
Link State ID: 10.2.0.0/15
Metric = 20
Award Solutions Proprietary
63
Award Solutions' eBook is authorized for a single user only. Do not distribute.
The Opaque-LSA type was introduced as a means to
extend OSPF to carry application-specific data. It provides
the means to carry a generic chunk of data, the exact
form and function of which is known only to the
application that defines it. For example, the Traffic
Engineering application defines a type of Opaque-LSA. In
this application, the LSA carries bandwidth reservation
information associated with the link.
Three types of Opaque-LSAs have been defined. Link-local
opaque-LSAs (type 9) is sent to routers attached to the
specified network and not forwarded beyond that point.
Area-Local opaque-LSAs (Type 10) are forwarded to all
routers in the area, but not forwarded across area
boundaries. AS-local opaque-LSAs (Type 11) are
forwarded to all routers in the Autonomous System.
4 | OSPF Key Concepts
Types 9 – 11 Opaque-LSA
AS 300
AS 400
AS 100
Area 1
Area 2
Area 0
AS 200
N1
Opaque-LSA
Network-scope
Opaque-LSA
Area-scope
Opaque-LSA
AS-scope
Award Solutions Proprietary
64
Award Solutions' eBook is authorized for a single user only. Do not distribute.
4 | OSPF Key Concepts
Summary
• OSPF is used to exchange routing information
between routers within an Autonomous System.
• OSPF uses Link-State Advertisements to
communicate information about the topology of the
network.
• Routers store Link-State Advertisements in the
Link-State Database.
• Each router in an area maintains its own copy of
the Link-State Database.
• OSPF routers learn details about the topology of
their area, but not that of other areas.
Award Solutions Proprietary
65
Award Solutions' eBook is authorized for a single user only. Do not distribute.
The figure illustrates a sample OSPF network. It highlights
four of the routers (R4, R8, R12 and R13). What type of
routers are these? (Hint: a single router may be of more
than one type.)
Your choices are: internal router, backbone router, Area
Border Router (ABR), Autonomous System Boundary
Router (ASBR).
4 | OSPF Key Concepts
Orlando St. Petersburg
Tampa
Review Exercise
R1
R4
R6
R5
R3
R7
N1 N2 R9 R11
R10
R8
R12
R2
R14
R16
R15
R13
R17
N3 R18
Area 1 Area 2
Area 3
BGP
R8:
R13:
BGP
R19
R12:
R4:
Award Solutions Proprietary
66
Award Solutions' eBook is authorized for a single user only. Do not distribute.
5 | OSPF in Wireless Networks
Chapter 5:
OSPF in Wireless
Networks
Award Solutions Proprietary
67
Award Solutions' eBook is authorized for a single user only. Do not distribute.
5 | OSPF in Wireless Networks
Objectives
After completing the module, you will be able to:
• Describe the operations of an OSPF router
• Troubleshoot OSPF adjacency issues
• Analyze the contents of the link-state database
• Calculate OSPF link metrics to influence routing
decisions
• Use OSPF areas to build scalable networks
Award Solutions Proprietary
68
Award Solutions' eBook is authorized for a single user only. Do not distribute.
An OSPF-capable router spends its life performing the
following functions.
• OSPF routers automatically discover the existence of
neighboring routers.
• Having discovered a new neighbor, the two routers
synchronize their Link State Databases (LSDBs).
• Once the topology of the network is known (through
the LSDB), the router runs a Shortest Path First (SPF)
algorithm to calculate the optimal path to reach each
of the known destinations in the network.
• The “best” path information is merged with other
routing information (e.g., static routes and other
dynamic routing protocols) to create routing table.
• When changes occur in the network topology (e.g.,
links are enabled or shutdown), the router updates its
neighbors by sending a Link State Advertisement
(LSA). Of course, the router may also re-run the SPF
calculations to determine the impact of the topology
change and update the routing table accordingly.
• OSPF routers keep tabs on their neighbors. If the
router suddenly stops receiving keep-alive messages,
it assumes that the neighbor has gone off-line,
updates the LSDB accordingly, re-runs the SPF
algorithm and adjusts the routing table as necessary.
5 | OSPF in Wireless Networks
Life of an OSPF Router
Neighbor
Discovery
Synchronize
LSDB
Compute SPF
Populate
Routing Table
Send LSA
Keep-Alive
Award Solutions Proprietary
69
Award Solutions' eBook is authorized for a single user only. Do not distribute.
5 | OSPF in Wireless Networks
Neighbor Discovery
Award Solutions Proprietary
70
Award Solutions' eBook is authorized for a single user only. Do not distribute.
Whenever possible, OSPF relies on the automatic
discovery of neighboring routers, rather than having them
administratively configured. An OSPF router periodically
sends a “Hello” message to the multi-cast address
224.0.0.5. This is a well-known address to which all OSPF
routers are supposed to be listening.
The router does not necessarily exchange routing
information with each one of its neighbors. It only does so
with so-called adjacent neighbors. The Hello message
includes several configuration data: the router identifier,
area identifier, hello interval, dead interval and subnet
prefix. The two neighboring routers must agree on each of
these parameters if they are to form an adjacency and
exchange routing information. The Hello message also
includes the list of neighboring routers that are already
known to this router. This is used to confirm that the
neighbor heard your Hello message (i.e., to confirm that
two-way communication exists).
5 | OSPF in Wireless Networks
Neighbor Discovery
• Hello message
– Send periodically
– Multicast: 224.0.0.5
• Includes
– Router ID
– Area ID
– Hello Interval
– Dead Interval
– Subnet Prefix
– Neighbor List
Award Solutions Proprietary
71
Award Solutions' eBook is authorized for a single user only. Do not distribute.
The Hello protocol is used to discover new OSPF
neighbors, verify that two-way communication is in place,
communicate information about the router’s configuration
and confirm that the neighbor remains active over time.
The router sends a Hello message every HelloInterval
seconds (10 seconds is typical). The router sends the
Hello message to the well-known multicast address
224.0.0.5. The router includes the Area ID, the sending
router’s own Router ID and a list of Router IDs from whom
the sending router has received a Hello message. The
message also contains authentication credentials, the
network mask of the interface, the value of the
HelloInterval and RouterDeadInterval timers, the Router ID
of the Designated Router and a priority value used in the
Designated Router election procedure.
In the example shown, Router R1 has been sending Hello
messages every HelloInterval seconds. Router R2 comes
online starts running OSPF. It starts sending its own Hello
messages. Router R1 hears the Hello message that
Router R2 has sent. It adds R2 to its list of neighbors and
includes R2’s Router ID when it sends its next Hello
message. Likewise, Router R2 hears the Hello message
that Router R1 has sent. It notes that its own Router Id
was included in the message. Router R2 now knows that
two-way communication is possible with this neighbor. R2
adds R1 to its list of the neighbors and includes R1’s
Router Id in the next Hello message that it sends. Router
R1 notes that its Router ID has been included in Router
R2’s hello message. Router R1 now knows that two-way
communication is possible with R2.
The two routers analyze the fields in the Hello messages.
If their respective area ID, network mask, HelloInterval,
and RouterDeadInterval fields match, they may attempt to
form an adjacency with each other and begin to
synchronize their Link State Databases.
5 | OSPF in Wireless Networks
Hello Protocol
R1 R2
Hello
Area ID, Router ID, Neighbor List
Hello
Area ID, Router ID, Neighbor List (R2)
Hello
Area ID, Router ID, Neighbor List
R2 powers on and
sends first Hello
R1 hears Hello
and adds R2 to
neighbor list
Hello
Area ID, Router ID, Neighbor List (R1)
R2 hears Hello
and adds R1 to
neighbor list
Hello
Area ID, Router ID, Neighbor List
Award Solutions Proprietary
72
Award Solutions' eBook is authorized for a single user only. Do not distribute.
Having established an adjacency with each other, the two
neighboring routers synchronize their LSDBs. They first
send a series of Database Description messages. These
messages summarize the contents of the LSDB and
include enough information for the neighbor to determine
whether it already knows the Link State Advertisements
(LSAs) contained within. If the router learns about a new
LSA that is not in its LSDB, or sees that a more recent
copy of an LSA is available, it sends a Link State Request
message, indicating that it wants to know the details
about the LSAs. The first router then sends the requested
LSAs in a Link State Update message.
The figure illustrates the process by which router R1
synchronizes its database with router R2. Router R2 also
synchronizes its database with router R1, but this is not
shown in the illustration.
5 | OSPF in Wireless Networks
Database Synchronization
Link State Request
Please send me these LSAs…
R1 R2
LSDB LSDB
Database Description
These are the LSAs in my LSDB
Link State Update
Here are the LSAs you asked for…
Award Solutions Proprietary
73
Award Solutions' eBook is authorized for a single user only. Do not distribute.
Consider the effects of the neighbor discovery procedure
on a multiple-access network with six routers. Each router
would discover five neighbors and form five adjacencies.
Fifteen adjacencies would be formed overall. The
Designated Router (DR) concept reduces the number of
adjacencies required in this circumstance, and by
extension reduces the size of the Link State Database
(LSDB) and the number of OSPF messages sent over the
network.
The Hello protocol includes a mechanism by which the
routers autonomously determine which router functions as
the DR. The administrator can influence this decision by
assigning certain priorities to each of the routers. Once a
DR has been elected for the network, it generally does not
change unless the DR goes out of service. To facilitate a
fast recovery from that circumstance a Backup
Designated Router (BDR) is elected at the same time as
the DR. If the DR should go out of service, the BDR takes
over as DR and a new BDR is elected.
Instead of forming adjacency with every neighbor on the
network, a router instead forms an adjacency with only the
DR and BDR. In the example configuration shown, the
total number of adjacencies that form is reduced from 15
to 9.
5 | OSPF in Wireless Networks
Designated Router (DR)
R1 R2 R3
R4 R5 R6
R1 (DR) R2 (BDR)
R3
R4
R5 R6
Multi-Access
Network with
6 OSPF
Routers
With DR and BDR Election
Adjacencies = 2N-3
Adjacencies = (2*6)-3=9
R1 R2
R3
R4
R5 R6
Designated Router is
Elected to Reduce
Adjacencies
Backup Designated Router
is also elected for fast
takeover from DR’s Failure
No DR and BDR Election
Adjacencies = N*(N-1)/2
Adjacencies = 6*(6-1)/2 = 15
Award Solutions Proprietary
74
Award Solutions' eBook is authorized for a single user only. Do not distribute.
5 | OSPF in Wireless Networks
Metrics
Award Solutions Proprietary
75
Award Solutions' eBook is authorized for a single user only. Do not distribute.
OSPF automatically assigns a cost to each of the links in
the network based on the bandwidth of the link. It
calculates this cost by selecting a fixed value known as
the reference bandwidth, and then dividing the reference
bandwidth by the bandwidth of the link. The minimum cost
that can be assigned to a link is 1. It is important that
each of the routers in the network use the same reference
bandwidth in order to accurately compare routes.
5 | OSPF in Wireless Networks
OSPF Metric
Interface
Type
Speed
(Mbps)
Cost
ref = 100 Mbps ref = 1 Gbps ref = 10 Gbps
10GE 10000 1 1 1
OC-192c 9953.28 1 1 1
OC-48c 2488.32 1 1 4
GigE 1000 1 1 10
OC-12c 622.08 1 1 16
OC-3c 155.52 1 6 64
Fast Ethernet 100 1 10 100
Ethernet 10 10 100 1000
Reference Bandwidth
Link Speed
OSPF Cost =
Award Solutions Proprietary
76
Award Solutions' eBook is authorized for a single user only. Do not distribute.
5 | OSPF in Wireless Networks
Exercise
Calculate the cost for the T3 and T1 links.
Interface Type
Speed
(Mbps)
Cost
ref = 100 Mbps ref = 1 Gbps ref = 10 Gbps
10GE 10000 1 1 1
OC-192c 9953.28 1 1 1
OC-48c 2488.32 1 1 4
GigE 1000 1 1 10
OC-12c 622.08 1 1 16
OC-3c 155.52 1 6 64
Fast Ethernet 100 1 10 100
Ethernet 10 10 100 1000
T3 44.736
T1 1.544
Award Solutions Proprietary
77
Award Solutions' eBook is authorized for a single user only. Do not distribute.
Each router in the network uses the information in its link
state database to execute the Shortest Path First (SPF)
algorithm and calculate the most optimal route to each
destination in the network. The SPF algorithm uses the
costs that were assigned to each of the links. The cost of
the route is the sum of the link costs that make up the
route.
The figure illustrates four switching offices: Orlando, St.
Petersburg, Tampa and Boca. Each switching office has
an edge router (R3, R8, R13 and R18) that connects to
the backbone for the region (R1 and R2). Additionally,
each edge router connects directly to two neighboring
offices (for example, R3 in Orlando connects to R8 in St.
Petersburg and R13 in Tampa).
5 | OSPF in Wireless Networks
Shortest Path First
Orlando
1
R4
R6
R5
R3
R7
N1 3
3
5
5
5
1
St. Petersburg
N2 2
2 4
4
4
R9 R11
R10
R8
R12
2
Tampa
1
R14
R16
R15
R13
R17
N3 3
3
5
5
5
Boca
2
2 4
4
4
N4 R19 R21
R20
R18
R22
1 1
1 1
2
R1
R2
Award Solutions Proprietary
78
Award Solutions' eBook is authorized for a single user only. Do not distribute.
The Shortest Path First algorithm produces a tree of
shortest paths to each router and network in the area,
with the router itself as the root of the tree. The router
only needs to know the next hop for each of the
destinations to forward packets. These next hops are
loaded into the routing table.
The figure illustrates the results of the Shortest Path First
algorithm when run on router R3 (we’ve also abbreviated
the diagram by only showing the paths to each office’s
edge router). The table illustrates the set of next hops that
are loaded into the routing table.
5 | OSPF in Wireless Networks
Shortest Path First
R3
1
R18
R13
R8
R2
R1
1
1
2
1
1
2
1
1
R3
1
R18
R13
R8
R2
R1
1
1
1
1
Before After
Destination Next Hop
R8 R8
R1 R1
R13 R13
R2 R13
R18 R13
Award Solutions Proprietary
79
Award Solutions' eBook is authorized for a single user only. Do not distribute.
It is possible that the Shortest Path First algorithm
identifies multiple paths to a destination with the same
cost value. When that happens, multiple paths may be
loaded into the routing table (assuming they have
different next hops) and traffic is distributed equally
across each of them.
We can illustrate this by changing the cost of the R1-R2
and R8-R18 links. If these two links each have a cost of
one, then router R3 calculates multiple equal-cost paths
to routers R2 and R18. To send packets to router R2, R3
could forward packets to router R1 or R13. Each path has
a cost of two. To send packets to R18, R3 could forward
packets to R8 or R13. Each path has a cost of two.
5 | OSPF in Wireless Networks
Equal-Cost Multipath
After
R3
1
R18
R13
R8
R2
R1
1
1
1
1
1
1
Destination Next Hop
R8 R8
R1 R1
R13 R13
R2 R13
R2 R1
R18 R13
R18 R8
Award Solutions Proprietary
80
Award Solutions' eBook is authorized for a single user only. Do not distribute.
The figure illustrates four switching offices: Orlando, St.
Petersburg, Tampa and Boca. Each switching office has
an edge router (R3, R8, R13 and R18) that connects to
the backbone for the region (R1 and R2). Additionally,
each edge router connects directly to two neighboring
offices (for example, R3 in Orlando connects to R8 in St.
Petersburg and R13 in Tampa).
Assign a cost to each of the links indicated such that the
following two conditions are met:
1. Each edge router (R3, R8, R13 and R18) processes
only traffic that originates or terminates inside its
respective office. They do not process so-called
transit traffic that both originates and terminates
outside their respective offices.
2. Each edge router shall direct traffic destined for an
adjacent office over the direct link to that office.
When properly configured, traffic that runs from Orlando
to St. Petersburg goes over the R3-R8 link. Traffic that
runs from Orlando to Tampa traverses the R3-R13 link.
Traffic that runs from Orlando to Boca passes through the
backbone, R3-R1-R2-R18.
5 | OSPF in Wireless Networks
Orlando St. Petersburg
Tampa Boca
SPF Exercise
R1
R4
R6
R5
R3
R7
N1 3
3
5
5
5
N2 2
2 4
4
4
R9 R11
R10
R8
R12
R2
R14
R16
R15
R13
R17
N3 3
3
5
5
5
2
2 4
4
4
N4 R19 R21
R20
R18
R22
Award Solutions Proprietary
81
Award Solutions' eBook is authorized for a single user only. Do not distribute.
5 | OSPF in Wireless Networks
Areas
Award Solutions Proprietary
82
Award Solutions' eBook is authorized for a single user only. Do not distribute.
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf
Exploring IP Routing and Ethernet Bridging.pdf

More Related Content

Similar to Exploring IP Routing and Ethernet Bridging.pdf

Router_ Connecting Students through Explaining.pptx
Router_ Connecting Students through Explaining.pptxRouter_ Connecting Students through Explaining.pptx
Router_ Connecting Students through Explaining.pptx
ssuser5a964f
 
Arrow ECS Learning Solutions
Arrow ECS Learning SolutionsArrow ECS Learning Solutions
Arrow ECS Learning Solutions
Vivastream
 
Power your future presentation for ms ps
Power your future presentation for ms psPower your future presentation for ms ps
Power your future presentation for ms ps
Saroj Poudel
 
New alliance presentation
New alliance presentationNew alliance presentation
New alliance presentation
Jody Freeman
 
Token Deployment Services Offerings from Rational Lab Services
Token Deployment Services Offerings from Rational Lab ServicesToken Deployment Services Offerings from Rational Lab Services
Token Deployment Services Offerings from Rational Lab Services
IBM Rational software
 
New Horizons Capabilities Overview
New Horizons Capabilities OverviewNew Horizons Capabilities Overview
New Horizons Capabilities Overview
winwithneeraj
 

Similar to Exploring IP Routing and Ethernet Bridging.pdf (20)

Router_ Connecting Students through Explaining.pptx
Router_ Connecting Students through Explaining.pptxRouter_ Connecting Students through Explaining.pptx
Router_ Connecting Students through Explaining.pptx
 
Router_ Connecting Students through Explaining.pptx
Router_ Connecting Students through Explaining.pptxRouter_ Connecting Students through Explaining.pptx
Router_ Connecting Students through Explaining.pptx
 
Arrow ECS Learning Solutions
Arrow ECS Learning SolutionsArrow ECS Learning Solutions
Arrow ECS Learning Solutions
 
Help desk system report
Help desk system reportHelp desk system report
Help desk system report
 
Kats Infotech Pvt Ltd
Kats Infotech Pvt LtdKats Infotech Pvt Ltd
Kats Infotech Pvt Ltd
 
Microsoft SQL Server Training, ASP.NET Training, SQL Server, .NET 4.0 - Syner...
Microsoft SQL Server Training, ASP.NET Training, SQL Server, .NET 4.0 - Syner...Microsoft SQL Server Training, ASP.NET Training, SQL Server, .NET 4.0 - Syner...
Microsoft SQL Server Training, ASP.NET Training, SQL Server, .NET 4.0 - Syner...
 
MEHBOOB QURESHI
MEHBOOB QURESHIMEHBOOB QURESHI
MEHBOOB QURESHI
 
ACADEMY BROCHURE 2016
ACADEMY BROCHURE 2016ACADEMY BROCHURE 2016
ACADEMY BROCHURE 2016
 
Power your future presentation for ms ps
Power your future presentation for ms psPower your future presentation for ms ps
Power your future presentation for ms ps
 
Judge Overview
Judge OverviewJudge Overview
Judge Overview
 
CloudCircle AWS Training
CloudCircle AWS Training CloudCircle AWS Training
CloudCircle AWS Training
 
Bob Tech Solutions Company Reviews
Bob Tech Solutions Company ReviewsBob Tech Solutions Company Reviews
Bob Tech Solutions Company Reviews
 
Hspice proposal workshop
Hspice proposal workshopHspice proposal workshop
Hspice proposal workshop
 
New alliance presentation
New alliance presentationNew alliance presentation
New alliance presentation
 
Web Based Training System
Web Based Training SystemWeb Based Training System
Web Based Training System
 
Advance E-Learning
Advance E-LearningAdvance E-Learning
Advance E-Learning
 
Token Deployment Services Offerings from Rational Lab Services
Token Deployment Services Offerings from Rational Lab ServicesToken Deployment Services Offerings from Rational Lab Services
Token Deployment Services Offerings from Rational Lab Services
 
Bob Tech Solutions Pvt Ltd Bangalore Reviews
Bob Tech Solutions Pvt Ltd Bangalore ReviewsBob Tech Solutions Pvt Ltd Bangalore Reviews
Bob Tech Solutions Pvt Ltd Bangalore Reviews
 
New Horizons Capabilities Overview
New Horizons Capabilities OverviewNew Horizons Capabilities Overview
New Horizons Capabilities Overview
 
IT Short Courses
IT Short CoursesIT Short Courses
IT Short Courses
 

More from RandyDookheran1 (6)

ODC010001 MPLS Basic Knowledge ISSUE1.5.ppt
ODC010001 MPLS Basic Knowledge ISSUE1.5.pptODC010001 MPLS Basic Knowledge ISSUE1.5.ppt
ODC010001 MPLS Basic Knowledge ISSUE1.5.ppt
 
HCIA-HNTD Intermediate Training Materials V2.2.pdf
HCIA-HNTD Intermediate Training Materials V2.2.pdfHCIA-HNTD Intermediate Training Materials V2.2.pdf
HCIA-HNTD Intermediate Training Materials V2.2.pdf
 
2) Routing Protocol Basis.pdf
2) Routing Protocol Basis.pdf2) Routing Protocol Basis.pdf
2) Routing Protocol Basis.pdf
 
Configuration Guide - IP Multicast(V600R001C00_04) - NE80E40E.pdf
Configuration Guide - IP Multicast(V600R001C00_04) - NE80E40E.pdfConfiguration Guide - IP Multicast(V600R001C00_04) - NE80E40E.pdf
Configuration Guide - IP Multicast(V600R001C00_04) - NE80E40E.pdf
 
acl configuration
acl configurationacl configuration
acl configuration
 
ospf initial configuration
ospf initial configurationospf initial configuration
ospf initial configuration
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Exploring IP Routing and Ethernet Bridging.pdf

  • 1. EXPLORING IP ROUTING AND ETHERNET BRIDGING IPC_207 IP CONVERGENCE & IMS CURRICULUM Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 2. © 2016 Award Solutions, Inc. All Rights Reserved. This course book and the material and information contained in it are owned by Award Solutions, Inc. (“Award Solu- tions”) and Award Solutions reserves for itself and successors and assigns all right, title and interest in and to the Award Content, Award Solutions’ logos and other trademarks, including all copyrights, authorship rights, moral rights, publication and distribution rights, trademarks and other intellectual property rights. Award grants no license or other rights in the contents of the course book or course, except as may be expressly set forth in a duly executed written agreement between Award Solutions and the authorized user of this course book or the user’s employee or principal. This course book shall not be modified, reproduced, disseminated, or transmitted by or in any medium, form or means, electronic or mechanical, including photocopying, recording or any information retrieval system, in whole or in part, without Award Solutions, Inc.’s express, prior written consent signed by an authorized officer whose authority is evidenced by a duly signed corporate resolution. This course book was designed for use as a student guide with the subject matter course taught by Award Solu- tions’ authorized employees and contractors. It was not designed to be a standalone textbook. Award Solutions makes no representations or warranties and disclaims all implied warranties with respect to the information con- tained herein or products derived from use of such information and Award Solutions undertakes no obligation to update or otherwise modify the information or to notify the purchaser or any user of any update or obsolescence. To the extent permitted by applicable law, Award’s total liability in connection with the course and/or course materi- al is the amount actually received by Award from the purchaser/user for the purchase or license of the course and course material. This course book is not made for publication or distribution in the public domain and shall not be published or placed in the public domain, in whole or in part, without Award Solutions, Inc.’s express, prior written consent signed by an authorized officer whose authority is evidenced by a duly signed corporate resolution. 2100 Lakeside Blvd., Suite 300 Richardson, TX 75082 USA Phone: +1.972.664.0727 Website: www.awardsolutions.com If you have any questions, concerns or comments regarding this course please write to us at: friends@awardsolutions.com The 3GPP, LTE and LTE-Advanced logos are the property of Third Generation Partnership Project (3GPP). The 3GPP2 logo is property of Third Generation Partnership Project (3GPP2) and its organization partners. The content of this document is based on 3GPP/LTE and 3GPP2 specifications which are available at www.3gpp.org, and www.3gpp2.org.
  • 3. Award Solutions, Inc. www.awardsolutions.com +1.972.664.0727 v16.0 About Award Solutions AWARD SOLUTIONS, INC. has over 18 years of training excellence in advanced wireless, IP, and network virtualization technologies. Our products and services provide our customers with innovative, flexible, and cost- effective solutions that help rapidly boost workforce productivity to more quickly meet market demands. Our areas of expertise include: • 4G • OpenStack • LTE • SDN • VoLTE • NFV • LTE-Advanced • IP Convergence • IMS • IPv6 • TD-LTE • Cloud • Small Cells • M2M • DAS • Technology Trends The level of technical depth in our training programs gives students unique benefits that they can apply immediately. We offer a range of courses appropriate for audiences needing a high-level overview, engineers looking for technical details as well as sales and marketing teams needing a different point of view. Our Subject Matter Experts (SMEs) and consultants are best-in-class, having achieved substantial industry experience in areas such as product definition and development, network deployment, and network and systems engineering. We strive to help our students and customers “become an expert”. Award Solutions constantly keeps a finger on the pulse of the industry, always researching new technologies, and updating our curriculums to stay on the cutting edge. Whether you are a training manager responsible for a large organization, or a team lead responsible for enhancing your team’s skills, Award Solutions can meet your technology training needs. We offer a multitude of delivery methods and services: ON-SITE TRAINING: Our Subject Matter Experts travel to your facility to engage the students in an interactive learning experience. This is a great option for teams with 12 or more people. VIRTUAL TRAINING: Award Solutions embraces different learning styles and preferences. Our virtual trainings are conducted by our Subject Matter Experts in real-time. This is a great option for teams geographically dispersed. PUBLIC TRAINING EVENTS: Award Solutions hosts a subset of our courses in our office and in conjunction with Industry events. This expert-led sessions are ideal for individuals and small groups. Visit our website at for the latest schedule. SELF-PACED eLEARNING: An engaging, cost- effective solution, allowing individuals to take training online at their own pace when their schedule permits. CERTIFICATIONS: Becoming an Award Certified Expert (A.C.E.) is the best way to for a student to demonstrate expertise, prove their ability to use real-world industry tools, and validate that they have the required knowledge to implement and/ or run a successful network. If you are interested in or have any questions regarding Award Solutions training or services, please visit Award’s website at www.awardsolutions.com or contact us at +1-972-664-0727 ext. 306. OUR PROMISE To continually demonstrate our core values: Integrity, Expertise, Flexibility, Teamwork and Excellent Return on Investment.
  • 4. Award Solutions, Inc. www.awardsolutions.com +1.972.664.0727 v16.0 Instructor Led Training Wireless Landscape [FUND204] Fundamentals of RF Engineering..................2 days 4G LTE [LTE_101] LTE Essentials.................................................... 1 day [LTE_114] LTE-Advanced Essentials.................................. 1 day [LTE_115] LTE RAN Performance Essentials.................... 1 day [LTE_116] VoLTE Essentials............................................... 1 day [LTE_205] LTE Technology Overview.................................2 days [LTE_209] LTE Technology Overview with Public Safety Features....2.5 days [LTE_203] VoLTE and IMS in LTE-EPC Networks.................... 3 days [LTE_207] Exploring IMS/VoLTE Networks.......................2 days [LTE_301] Mastering LTE Air Interface.............................2 days [[LTE_309] Mastering TD-LTE Air Interface......................2 days [LTE_302] LTE Protocols and Signaling............................3 days [LTE_305] LTE-EPC Networks and Signaling....................3 days [LTE_313] LTE-EPC Networks and Signaling (Architecture, Attach)....2 days [LTE_310] LTE-Advanced Technical Overview..................2 days [LTE_401] LTE RF Planning and Design Certification Workshop...5 days [LTE_405] LTE RAN Signaling and Operations Certification....5 days [LTE_408] LTE RAN Capacity Planning Certification Workshop....3 days [LTE_427] VoLTE Signaling and Operations.....................3 days [LTE_425] eMBMS Protocols and Signaling................... 1.5 days [LTE_428] LTE Broadcast eMBMS in LTE Networks.....................1 day [LTE_424]SON:SelfOrganizingNetworkFeaturesinLTEandLTE-Advanced...1.5days [LTE_415] RF Design Workshop: Part 1 - LTE...................2 days [LTE_416] RF Design Workshop: Part 2 - VoLTE and Small Cells...2 days [LTE_418] LTE RAN Signaling and Operations: Part 1 - Attach...1.5 days [LTE_419]LTERANSignalingandOperations:Part2–Mobility,QoS,Traffic.....1.5days [LTE_420]LTERANSignalingandOperations:Part3-Interworking(GSM/UMTS)....1.5days [LTE_412] LTE RF Optimization Certification Workshop (UE Based)....5 days [LTE_421]LTERFOptimization:Part1 – CoverageandAccessibility....1.5 days [LTE_422]LTERFOptimization:Part2–DownlinkandUplinkThroughput...1.5days [LTE_423] LTE RF Optimization: Part 3 – Mobility and Inter-RAT...1.5 days [LTE_413]SmallCellandVoLTERFPlanningandDesignCertificationWorkshop...4days * * IP Convergence & IMS [IPC_202] Exploring IPv6.................................................... 1 day [IPC_203] Exploring MPLS................................................2 days [IPC_405] IP Networking Workshop for LTE.....................4 days [IPC_406] IP Networking Workshop for 4G Backhaul.....4 days [IPC_407] IP Routing and Ethernet Bridging Workshop...4 days [IPC_409] IPv6 Networking Workshop for LTE Networks....3 days Network Virtualization NWV_103] Big Data Essentials.......................................... 1 day [NWV_110] API Essentials.................................................. 1 day [NWV_120] SDN and NFV Essentials................................ 1 day [NWV_122] SDN Essentials............................................... 1 day OpenStack Cloud IaaS Essentials...................................... 1 day Virtualization and Cloud Computing Essentials................ 1 day [NWV_203] Exploring Network Functions Virtualization (NFV)....2 days [NWV_204] Exploring Cloud, SDN, NFV............................2 days [NWV_205] Exploring Network Virtualization, NFV, SDN, Orchestration, Cloud, and Big Data... 5 days [NWV_206] Exploring OpenStack.....................................2 days [NWV_704] Exploring Software-Defined Networking (SDN) for Network Operators....2 days Exploring Virtualization and Cloud Computing.................2 days [NWV_304] SDN and NFV Architecture and Operations...3 days [NWV_402] Software-Defined Networking (SDN) Workshop..3 days [NWV_403] SDN in Carrier Networks Workshop..............3 days [NWV_406] OpenStack Workshop for SDN and NFV.......4 days [NWV_407] NFV Application Planning and Design Workshop...3 days [NWV_408] Scripting Workshop for SDN and NFV..........2 days Software-Defined Networking (SDN) Troubleshooting Workshop.....2 days Linux SysAdmin Workshop for NFV...................................3 days [NWV_404] OpenStack Networking Troubleshooting Workshop...3 days NFV Application Troubleshooting Workshop.....................3 days [NWV_113] Overview of Mobile CSP Network................... 1 day [NWV_112] Introduction to Mobile CSP Network..........0.5 day [NWV_705] Mobile CSP Network Architecture and Operations...2 days * New Course TECHNOLOGY PRIMERS [TPR1001] IoT in Wireless Networks..............................0.5 day [TPR1002] C-RAN.............................................................0.5 day [TPR1003] 5G Use Cases and Technology Options.......0.5 day [TPR1004] Wi-Fi Offload, LTE-U, and LAA.......................... 0.5 day [TPR1005] SON: Self Organzing Networks.....................0.5 day [TPR1006] Voice over Wi-Fi (VoWiFi)..............................0.5 day [TPR1007] Proximity Services, LTE Direct, D2D Communications....0.5 day [TPR1008] LTE Broadcast/eMBMS................................0.5 day * * * * * * * *
  • 5. Award Solutions, Inc. www.awardsolutions.com +1.972.664.0727 v16.0 Self-paced eLearning (e) eLearning Course IP Convergence & IMS [IPC_103] Welcome to IP Networking (e)...........................3 hrs [IPC_104] IP Convergence Overview (e).............................4 hrs [IPC_106] Overview of MPLS (e)......................................3.5 hrs [IPC_107] Overview of IMS (e)..........................................2.5 hrs [IPC_108] Voice and Video over IP (VoIP) Overview (e).....3 hrs [IPC_109] IP Quality of Service (QoS) (e)............................3 hrs [IPC_110] Session Initiation Protocol (SIP) (e)...................2 hrs [IPC_114] IP Basics (e)..........................................................1 hr [IPC_113] IP Routing (e)........................................................1 hr [IPC_115] QoS in IP Networks (e).........................................1 hr [IPC_117] TCP and Transport Layer Protocols (e)................1 hr [IPC_119] Ethernet Basics (e)...............................................1 hr [IPC_118] Ethernet VLANs (e)...............................................1 hr [IPC_116] Ethernet Bridging (e)............................................1 hr [IPC_122] Ethernet Backhaul Overview (e)........................3 hrs [IPC_120] Interconnecting IP Networks (e)..........................1 hr [IPC_121] Welcome to IPv6 (e).............................................1 hr 4G LTE [LTE_109] Welcome to LTE (e)..............................................1 hr [LTE_102] LTE Overview (e).................................................3 hrs [LTE_103] LTE SAE Evolved Packet Core (EPC) Overview (e).... 3 hrs [LTE_111] LTE Air Interface Signaling Overview (e)...........3 hrs [LTE_113] Overview of IPv6 for LTE Networks (e)...............3hrs [LTE_117] eMBMS Overview (e)............................................1 hr [LTE_118] Welcome to VoLTE (e)..........................................1 hr [LTE_112] VoLTE Overview (e)..........................................1.5 hrs [TRND103] Overview of OFDM (e)......................................2 hrs [TRND104] Multiple Antenna Techniques (e).....................3 hrs Network Virtualization [NWTF101] Welcome to SDN (Software-Defined Networks) (e)...1 hr [NWTF104]WelcometoMobileCSPNetworkTransformation(e)....1hr [NWTF105] SDN Overview (e)...............................................1 hr [NWTF106] NFV Overview (e)................................................1 hr [NWTF107] OpenStack Cloud Overview (e)..........................1 hr [NWTF108] API Overview (e).................................................1 hr [NWTF109] Big Data Overview (e)........................................1 hr [NWTF111] Cloud RAN Overview (e).....................................1 hr [NWTF114] CSP Network Performance Overview (e)..........1 hr [NWTF115] OpenStack IaaS Overview (e)............................1 hr [NWTF116] Welcome to SDN and NFV I - Introductions (e).... 1 hr [NWTF117] Welcome to SDN and NFV II - Foundations (e).... 1 hr [NWTF118] Welcome to SDN and NFV I - Technologies (e).... 1 hr * * *
  • 6. API [Application Program Interface] A programmatic interface that makes resources software-accessible BIG DATA Finding insights by analyzing volumes of diverse data ORCHESTRATION Automating workflow to coordinate network functions and services NFV [Network Functions Virtualization] Running virtualized network nodes on commoditized hardware SDN [Software-Defined Networking] Making networking capabilities elastic through centralized control SOFTWARE-DEFINED NETWORKS Orchestrating elastic network functions and services through software AWARD SOLUTIONS’ NETWORK VIRTUALIZATION CURRICULUM focuses on preparing you for the evolution of virtualization and the cloud-based network world. CLOUD COMPUTING Pooled computing resources accessed in a self-serve way
  • 7. Table of Contents Chapter 1: Prologue 1 Chapter 2: Spanning Tree Protocol 7 Broadcast Storms and STP 9 Rapid Spanning Tree Protocol (RSTP) 14 Multiple Spanning Tree Protocol (MSTP) 19 Chapter 3: Routing Table 27 Routing Table Concepts 29 The Longest Match 36 Recursive Routing 40 Black Holes 42 Chapter 4: OSPF Key Concepts 47 Areas and Router Types 50 Link State Advertisements (LSA) 53 Link State Advertisements 57 Chapter 5: OSPF in Wireless Networks 67 Neighbor Discovery 70 Metrics 75 Areas 82 Chapter 6: BGPv4 Key Concepts 89 Autonomous Systems 92 BGP Messages 96 BGP Attributes and Routing Policy 100 Route Reflectors 111 Chapter 7: BGPv4 in Wireless Networks 117 Chapter 8: L3VPN in Wireless Networks 129 Interconnecting MTSOs 131 L3VPN Architecture 135 High-Level Operations 138 Chapter 9: L3VPN Routing 147 Provider-Customer Model 149 MPLS Router 151 VPN Routing and Forwarding 154 VPN Route Distribution using MP-iBGP 160 Route Distinguisher 162 VPNv4 and IPv4 Address Families 167 Route Target 169 IPC_207 Version 2.2c
  • 8. L3VPN Routing 172 Acronyms 185 References 189
  • 9. 1 | Prologue Chapter 1: Prologue Award Solutions Proprietary 1 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 10. 1 | Prologue Objectives After completing this module, you will be able to: • Explain why IP is the data transport of choice for today’s carrier networks • Explain the Customer-Provider Model and its use of Layer 3 VPNs • Describe the customers found in a carrier’s implementation of the Customer-Provider Model • List the routing protocols used in the typical implementation of L3VPNs Award Solutions Proprietary 2 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 11. The Customer-Provider model uses Layer 3 Virtual Private Network (L3VPNs) to provide private network services to a set of customers. The customer networks include a Customer Edge (CE) router that connects to the service provider’s Provider Edge (PE) router. The CE and PE routers exchange routing information, using Border Gateway Protocol (BGP). The PE routers use MPLS to forward packets through the backbone and BGP to distribute the customer routes to other VPN locations. The L3VPN solution is widely deployed. It is easy for customers to send data throughout their respective sites, while at the same time being scalable and manageable for the service provider. For these reasons, L3VPNs are used in carrier networks to isolate traffic between customers and services. While the terms customer and provider evoke a commercial relationship, this is not necessarily the case in a carrier environment. The customer networks represent subsystems within the larger network, interconnected through a transport backbone. 1 | Prologue Site A Customer 1 CE Customer 2 CE Customer 3 CE Site C Site B Site D Customer-Provider Model Customer 1 CE Customer 2 CE Customer 3 CE Provider PE PE Customer 1 CE Customer 2 CE Customer 3 CE PE Customer 1 CE Customer 2 CE Customer 3 CE PE P P P P Award Solutions Proprietary 3 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 12. Wireless service providers adopt the L3VPN solution as a means to manage their networks. The makeup of the customer networks varies according to service provider policies, but some generalities may be discussed. The service provider may choose to implement different wireless network technologies (e.g., UMTS, EVDO, LTE) as customer networks. They may also choose to implement different network services (e.g., voice, Internet access, IP Multimedia Subsystem (IMS)) as customer networks. Or they may also use them to segregate Operations, Administration and Maintenance (OAM) connections or inter-connectivity with Internet peering or roaming partners. The customer networks are present throughout the service provider’s facilities, including local Mobile Telephone Switching Offices (MTSO), regional Network or Data Centers and national Network or Data Centers. 1 | Prologue MTSO MTSO MTSO MTSO 3G Voice CE 3G Data CE 4G Data CE Segregating Services Core PE PE PE PE P P P P IMS CE OAM CE Peering CE 3G Voice CE 3G Data CE 4G Data CE IMS CE OAM CE Peering CE Award Solutions Proprietary 4 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 13. The customer networks run an interior gateway routing protocol such as the Open Shortest Path First (OSPF). The Core runs an interior gateway routing protocol as well to distribute routes between the PE and P routers. The CE and PE routers run eBGP to exchange customer routing information. This routing information is subsequently passed from one PE router to another PE using Multi- Protocol BGP (MP-BGP) to distribute customer routes throughout the network. 1 | Prologue L3VPN Routing Protocols Award Solutions Proprietary 5 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 14. 1 | Prologue Summary • Wireless equipment at the cell site used T1s as transport before the use of IP. • IP interfaces in wireless networks carry user data, OA&M data and signaling data. • The Customer-Provider Model implements L3VPNs to segregate the data traffic of individual customers. • The customer networks found in a carrier’s network can include networks belonging to individual customers, networks belonging to technologies such as LTE and UMTS, and networks belonging to particular traffic types such as OA&M. • In a network that implements Layer 3 VPNs (L3VPNs), eBGP is used between CEs and PEs to exchange customer routes, MP-BGP is used between PEs to distribute the customer routes, and OSPF is used between the PEs and P for internal core routing exchanges. Award Solutions Proprietary 6 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 15. 2 | Spanning Tree Protocol Chapter 2: Spanning Tree Protocol Award Solutions Proprietary 7 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 16. 2 | Spanning Tree Protocol Objectives After completing this module, you will be able to: • Explain how the Spanning Tree Protocol protects networks from broadcast storms • Select the best Spanning Tree Protocol for a given network • List the differences between STP, RSTP, and MSTP • Describe the significance of the root switch to the Spanning Tree Protocol Award Solutions Proprietary 8 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 17. 2 | Spanning Tree Protocol Broadcast Storms and STP Award Solutions Proprietary 9 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 18. Several version of spanning tree protocols have been developed over the years. The most significant are: Spanning Tree Protocol (STP) The first Spanning Tree Protocol published as a standard by the Institute of Electrical and Electronic Engineering (IEEE) in 802.1d-1990. It is generally no longer used in service provider environments as it takes too long to discover and react to changes in the network topology. It also predates the existence of virtual LANs (VLANs). Rapid Spanning Tree Protocol (RSTP) As its name implies, RSTP revamps the operation of the spanning tree protocol to reduce the time it takes to detect and react to changes in the topology. It does not, however, incorporate support for VLANs. RSTP was first published in 802.1w-2001, but was later incorporated into 802.1d-2004. Rapid Per-VLAN Spanning Tree Protocol Plus (Rapid- PVST+) Rapid-PVST+ represents the an evolution in a series of spanning tree protocols developed by Cisco Systems, Inc. It incorporates the performance improvements of RSTP and includes support for VLANs. It is used in networks that run only Cisco equipment, and is not widely supported by other equipment vendors. Multiple Spanning Tree Protocol (MSTP) The latest version of the spanning tree protocol standardized by the IEEE, originally published as 802.1s- 2002 and later incorporated into 802.1q-2005. MSTP builds on the capabilities of RSTP and includes support for multiple VLANs. One notable difference between MSTP and Rapid-PVST+ regards the number of spanning tree instances that run in the switch. Rapid-PVST+ requires one spanning tree instance per VLAN, while MSTP allows many VLANs to be mapped onto a single spanning tree. MSTP therefore operates more efficiently when large numbers of VLANs are configured. MSTP also supports hierarchical network design with the concept of a region. Topology changes affect the switches in the region, but are invisible to switches outside of the region. This allows for more efficient operation in large-scale networks. 2 | Spanning Tree Protocol Spanning Tree Protocols •Legacy STP, now obsolete •Recovery time < 1 minute •Does not support VLANs STP •Recovery time < 1 second •Does not support VLANs RSTP •Cisco proprietary •One spanning tree per VLAN Rapid-PVST+ •Latest open standard •Multiple VLANs share one spanning tree •Supports hierarchical network design MSTP Award Solutions Proprietary 10 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 19. Broadcast storms may occur whenever a loop exists in the Ethernet LAN topology. The figure illustrates a simple case in which a loop exists between two Ethernet switches. The sequence of events unfolds as follows: 1. The node on the left sends a broadcast frame. SW1 receives it on port gi0/1. 2. Whenever an Ethernet switch receives a broadcast frame, it forwards the frame out all active ports, except the one on which the frame was received. In this case, SW1 forwards the frame out ports gi0/2 (shown in red) and gi0/3 (shown in green). 3. SW2 receives two broadcast frames. Ethernet does not provide any means to determine that these are, in fact, two copies of the same original frame, so SW2 must process each one independently. It receives one frame (red) on port gi0/7 and forwards it out ports gi0/6 and gi0/8. It receives the other frame (green) on port gi0/8 and forwards it out gi0/6 and gi0/7. The node on the right receives two copies of the frame. 4. SW1 receives two broadcast frames. Ethernet provides no means to determine that these are copies of the frames that it recently forwarded on to SW1, so it must process them again. It receives one frame (green) on port gi0/2 and forwards it out ports gi0/1 and gi0/3. It receives the other frame (red) on port gi0/3 and forwards it out ports gi0/1 and gi0/2. The node on the left receives two copies of the frame that it originally sent. The frames are now stuck in the loop. Ethernet has no concept of a frame identifier, so the switches do not recognize that they are processing the same frame again and again. Ethernet also does not have a timeout mechanism, so the switches continue processing the frames in this manner forever. And each iteration through the loop causes additional copies of the frame to be made, so the storm consumes an increasing amount of bandwidth, buffer space and processing time. 2 | Spanning Tree Protocol Broadcast Storms Loops cause broadcast storms bcast bcast bcast bcast bcast bcast bcast bcast bcast bcast bcast bcast gi0/2 gi0/1 gi0/3 gi0/7 gi0/6 gi0/8 bcast bcast bcast bcast bcast bcast bcast bcast bcast bcast bcast bcast bcast SW1 SW2 Award Solutions Proprietary 11 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 20. Broadcast storms may be prevented (or managed) by avoiding large, complex Ethernet networks in the first place. Service providers may choose to strategically deploy IP and MPLS to minimize the reach of the Ethernet topology. Where Ethernet is used, designing loop-free networks (i.e., tree topology) also eliminates the conditions in which storms may occur. Most Ethernet switches also implement some form of storm control mechanisms wherein the broadcast traffic gets throttled. Storm control features minimize the damage caused by broadcast storms, but do not prevent them outright. Finally, spanning tree protocols can also be used to automatically patrol the network for loops. When a loop is detected, the spanning tree protocol automatically disables some links in order to break the loop. 2 | Spanning Tree Protocol Broadcast Storm Prevention 1. Prefer IP and MPLS over Ethernet for large networks 2. Avoid loops in Ethernet topology 3. Storm Control 4. Spanning Tree Protocols Backhaul Router CE CE CE CE PE PE Award Solutions Proprietary 12 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 21. When Spanning Tree Protocol is used, the switches in the network exchange messages that enable them to detect loops that would otherwise cause broadcast storms. They then select one or more ports to be blocked in order to simplify the logical topology of the network such that it resembles a tree. The switches do not forward user traffic through a blocked port. The net result is that the loop is broken and the conditions for a broadcast storm are eliminated. 2 | Spanning Tree Protocol Spanning Tree Protocol Before After Award Solutions Proprietary 13 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 22. 2 | Spanning Tree Protocol Rapid Spanning Tree Protocol (RSTP) Award Solutions Proprietary 14 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 23. The Spanning Tree Protocol selects one switch to serve as the root of the logical tree topology. The root switch election process governs which switch gets selected as the root and ensures that all switches make the same selection. The procedure is relatively straightforward. Each switch has a unique identifier. The switch with the lowest identifier becomes the root. The identifier is a combination of a priority value and the switch’s MAC address. By default, all switches use the same priority value, so the root switch election boils down to which switch has the numerically lowest MAC address. Choosing the root switch based solely on the MAC address is fairly arbitrary, but the loop detection procedures work regardless of which switch gets elected to be the root. The administrator may influence the outcome, however, by overriding the default priority value and setting it to something lower than the default value. The other switches then select it as the root switch. The figure illustrates the process of overriding the default priority value to select the root switch. If we let all of the switches use the default priority value of 32768, then the switch in the center would become the root switch, since it has the numerically lowest address. By changing the priority of the switch at the top of the figure, we ensure that it wins the root switch election. 2 | Spanning Tree Protocol The Root Switch Root Switch Election • ID = Priority + Address • By default, all switches use same priority value • Override default priority value to specify root switch 32768 + AABB:1122:0001 32768 + AABB:1122:0003 32768 + AABB:1122:0002 32768 + AABB:1122:0005 32768 + AABB:1122:0004 32768 + AABB:1122:0006 8192 32768 + AABB:1122:0007 Award Solutions Proprietary 15 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 24. The spanning tree algorithm assigns a cost to each switch port based on the speed of the link. Faster links cost less. The spanning tree algorithm also calculates the root path cost for each switch port. This is defined as the sum of the port costs between it and the root switch. When the spanning tree detects a loop, it uses the root path cost to determine which ports should carry traffic and which should be blocked. 2 | Spanning Tree Protocol Shortest Path Selection Shortest Path Selection • Port Cost = assigned based on link speed (range: 1 to 200M) • Root Path Cost = sum of port costs of shortest path to root switch 1 Cost: 2000 Cost: 2000 Cost: 2000 Cost: 2000 Root Path Cost: 6000 Root Path Cost: 6000 Root Path Cost: 4000 Award Solutions Proprietary 16 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 25. The spanning tree algorithm assigns each switch port a specific role to play. It selects one port on each switch to be the root port for that switch. This port provides the most optimal path to the root switch (i.e., the lowest root- path cost). The algorithm also selects one port on each LAN segment to be the designated port for that segment. Any remaining ports are designated alternate ports. Root ports and designated ports forward user traffic. Alternate ports discard user traffic. The spanning tree algorithm only assigns the alternate port role when a loop exists in the network’s topology. This is the heart of the algorithm’s loop-detection function. The loop is broken because the alternate port discards user traffic. When a node in the LAN sends a broadcast frame, it floods the network through root and designated ports, but gets dropped by alternate ports. 2 | Spanning Tree Protocol Port Role Assignment Port Roles • Root Port = per switch, shortest path to root switch; forwards traffic • Designated Port = per segment, shortest path to root; forwards traffic • Alternate Port = alternate, but less optimal path to root switch; discards traffic 1 Designated Port Root Port Alternate Port 32768 + AABB:1122:0001 32768 + AABB:1122:0003 32768 + AABB:1122:0002 32768 + AABB:1122:0005 32768 + AABB:1122:0004 32768 + AABB:1122:0006 8192 + AABB:1122:0007 Award Solutions Proprietary 17 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 26. When a switch detects the loss of a Physical Layer signal, the spanning tree algorithm re-assesses the port role assignments in light of the new connectivity. If it determines that a change is necessary, it sends a proposal of the new role to its neighboring switch. The neighboring switch re-assesses its own port roles based on this new information and may agree or, if it believes it has better insight into the topology, issue a counter- proposal. Changing the role of one port on the switch may cause a ripple effect throughout the network. The proposal/agreement exchanges propagate in a link-by-link fashion away from the failure toward the root switch until it reaches a switch for whom the new proposal does not require any changes. In the figure shown, the link that connects the center switch to the root switch fails. This had been the center switch’s root port. The precise details of the operation go beyond the scope of this discussion, but the loss of the root port forces the center switch to change the remaining port’s role from designated port to root port. The bottom- most switch changes its root port to a designated port and must therefore unblock one of its alternate ports. In this example, the root path cost is the same for both alternate ports, so the port priorities are considered. Similar to the root switch priority, the administrator can influence the selection of the root switch by modifying the default priority value. If both ports have the same priority value, then the numerical port identifier is used to break the tie. The bottom-most switch sends a proposal to the neighboring switch (on its left in the figure). The proposal does not require it to change any of its port roles, so the configuration changes stop there. The network has re- converged on the new topology. One task remains, however. Remember that each of the switches in the network maintains a MAC table that associated MAC addresses with port numbers. Some of that information is now out of date. The root switch sends a Topology Change Notification, which the other switches use as a signal to flush stale data from their MAC tables. 2 | Spanning Tree Protocol Topology Changes Topology Changes • Nodes detect link failure through Physical Layer, or message timeout • Proposal and agreement process updates port roles • Topology Change Notification tells switches to flush MAC tables 1 Designated Port Root Port Alternate Port Link Fails DP becomes RP RP becomes DP AP becomes RP Proposal/ Agreement Proposal/ Agreement Award Solutions Proprietary 18 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 27. 2 | Spanning Tree Protocol Multiple Spanning Tree Protocol (MSTP) Award Solutions Proprietary 19 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 28. The figure illustrates a hypothetical Ethernet backhaul network design. In this design, each cell site is assigned a unique VLAN ID. The cell site links enter the Mobile Telephone Switching Office (MTSO) and connect to a set of access switches. Each access switch carries traffic for ten cell sites. Two access switches, designated SWA and SWB are shown in the diagram. The others are omitted due to lack of space. The access switches connect to a pair of aggregation switches, SWC and SWD, which in turn connect to a Multi-Layer Switch (MLS) that acts as backhaul router. The spanning tree protocol manages the redundant links between the access and aggregation switches. 2 | Spanning Tree Protocol Multiple VLAN Sample Topology MLS SWC SWA SWB SWD Aggregation switches Access switches Spanning Tree manages redundant links Award Solutions Proprietary 20 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 29. Let’s assume that the MLS is the root switch in our sample topology. When the spanning tree algorithm runs, each access switch selects a root port and an alternate port. The root path costs are the same for both ports (assuming of the same links are the same speed), so the selection of the root and alternate ports is fairly arbitrary. In the figure shown, the top-most port on SWA remains active, while the bottom-most port gets blocked. SWB does just the opposite of this. 2 | Spanning Tree Protocol Spanning Tree Results MLS SWC SWA SWB SWD Designated Port Root Port Alternate Port Award Solutions Proprietary 21 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 30. When redundant links are deployed in the network, service providers often prefer a load-balancing solution to a strict active/standby scheme. When multiple VLANs are used, this can be accomplished by directing some VLAN traffic (for example, the even-numbered VLANs) across one of the redundant links and other VLAN traffic (for example, the odd-numbered VLANs) across the other redundant link. Referring back to our sample topology, let us focus on the links that connect access switch SWA to the aggregation switches SWC and SWD. SWA carries traffic for 10 VLANs (one per cell site). If RSTP is used to manage these links, then load balancing is not possible. When RSTP computes the spanning tree, the traffic for all 10 VLANs is carried over the active link. The blocked link remains idle. This is because RSTP does not support the notion of computing multiple spanning trees. Alternatively, one could use PVSTP+ instead. As its name implies, Rapid PVSTP+ computes one spanning tree solution for each VLAN configured on the switch. There would therefore be 10 spanning trees in our example. By overriding the default port priorities, we could arrange for half of the spanning trees to select the top-most port to be the root port and the bottom-most port to be the alternate port. We could configure the other half of the spanning trees to do just the opposite. The net effect is that the traffic would be evenly divided (assuming the cell sites were equally loaded) across the two links. If either of the links failed, then the spanning trees would react by unblocking the alternate port and all traffic would be directed over the remaining link. 2 | Spanning Tree Protocol Load Balancing with VLANs • MSTP – Efficient load balancing – Two spanning trees (one blocks port 1, the other blocks port 2) – Half of the VLANs get mapped to one spanning tree; half get mapped to the other • PVSTP+ – Less efficient load balancing ; one spanning tree per VLAN – Half of the VLANs block port 1; the other half block port 2 • RSTP – Single spanning tree, active/idle configuration, no load balancing MLS MSTP = Two Spanning Trees SWC SWA SWD MLS SWC SWA SWD Award Solutions Proprietary 22 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 31. While Rapid PVSTP+ achieves the goal of balancing the traffic load, it does so at a certain cost. SWA needs to maintain 10 separate spanning tree instances. Each spanning tree instance introduces some processing, memory and messaging overhead. Note, however, that in our sample topology, there are really only two possible spanning trees. The fact that Rapid PVSTP+ requires one spanning tree per-VLAN means that it creates five separate copies of each of the two possible spanning trees. This is where MSTP offers some advantages over RSTP and Rapid PVSTP+. MSTP allows us to define spanning tree instances and then associate those instances with a set of VLANs. In our case, we would create the two spanning tree instances, overriding the port priorities so that they choose different root ports, and then map five VLANs onto each of the two instances. 2 | Spanning Tree Protocol Load Balancing with VLANs (Continued) • MSTP – Efficient load balancing – Two spanning trees (one blocks port 1, the other blocks port 2) – Half of the VLANs get mapped to one spanning tree; half get mapped to the other • Rapid PVSTP+ – Less efficient load balancing ; one spanning tree per VLAN – Half of the VLANs block port 1; the other half block port 2 • RSTP – Single spanning tree, active/idle configuration, no load balancing MLS MSTP = Two Spanning Trees SWC SWA SWD MLS SWC SWA SWD Award Solutions Proprietary 23 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 32. MSTP supports a form of hierarchical network design by introducing the concept of a region. A region is a collection of switches that share a common view of their physical and logical topology. Collectively, the switches in the region appear as a single, virtual switch to the switches outside of the region. When a topology change occurs within the region, the switches inside the region re- converge on the new topology. The switches outside the region remain unaware of, and unaffected by, the topology change. MSTP regions allow the Ethernet LAN to grow in scale and complexity without adversely affecting the performance of the error detection and recovery procedures. 2 | Spanning Tree Protocol MSTP Regions Award Solutions Proprietary 24 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 33. 2 | Spanning Tree Protocol Summary • Spanning Tree Protocol (STP) prevents loops from triggering broadcast storms in Layer 2 networks. • Rapid Spanning Tree Protocol (RSTP) significantly reduces the time to detect and recover from a failure. • Multiple Spanning Tree Protocol (MSTP) adds support for VLANs. • MSTP provides an efficient means to load balance VLAN traffic across multiple links. Award Solutions Proprietary 25 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 34. The figure illustrates a hypothetical Ethernet backhaul network. Based on the priority and addresses shown, which switch is selected as root switch by the Spanning Tree Protocol? What could you do to ensure that the MLS becomes the root switch? 2 | Spanning Tree Protocol Review Exercise MLS SWC SWD SWA 32768 + e05f:b903:5280 32768 + e05f:b903:535a 32768 + e05f:b903:4653 SWB 32768 + e05f:b903:1121 32768 + e05f:b903:9863 32768 + e05f:b903:af3c 32768 + e05f:b903:753a 32768 + e05f:b903:5280 32768 + e05f:b9c3:a2d0 32768 + e05f:b93f:d9ea 32768 + e05f:b9c3:7719 Award Solutions Proprietary 26 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 35. 3 | Routing Table Chapter 3: Routing Table Award Solutions Proprietary 27 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 36. 3 | Routing Table Objectives After completing this module, you will be able to: • Read and understand IP routing tables • Understand the factors that go into the route selection algorithm • Identify the preferred route from a set of alternates • Employ recursive routing techniques • Explain how black holes impact routing and why a packet might be deliberately discarded Award Solutions Proprietary 28 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 37. 3 | Routing Table Routing Table Concepts Award Solutions Proprietary 29 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 38. The routing table is essentially a collection of network addresses that the router knows how to reach. For a given inbound packet, the routing table indicates to which node it should forward the packet (the next hop) and/or the outbound interface it should use to get there. The routing table entries may contain additional information used to prioritize routes, indicate their origin and how long they’ve been around. Routing table entries come from one of three possible sources. The most straightforward source of routes are the router’s own network interfaces. If we configure an interface with the address 192.168.1.1/24, then it stands to reason that the router knows how to reach the nodes on the 192.168.1.0/24 subnet. Similarly, so-called static routes can be created by explicitly configuring the routes on the router. Finally, the router can use a dynamic routing protocol such as OSPF and BGPv4 to exchange routing information with other routers. It’s worth noting that the routing table is only one repository of routing information. Individual routing protocols maintain databases that contain routing information they’ve learned from neighboring routers. And while it’s convenient to talk about the router searching the routing table when it receives a packet, modern routers copy the contents of the routing table into a more optimized data structure, typically called the Forwarding Information Base (FIB). 3 | Routing Table Routing Table Concepts Routing Table Destination Source Cost Next Hop 0.0.0.0/0 Static 1 192.168.1.1 192.168.1.0/24 Connected 2 Gi 0/0 10.1.1.0/22 OSPF 10 10.5.3.8 172.16.0.0/16 BGP 20 192.168.7.30 Forwarding Information Base Sources Static Connected Dynamic Award Solutions Proprietary 30 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 39. This sample routing table is used to discuss the concepts and structure that make up the routing table. 3 | Routing Table Routing Table Example R1# show ip route B 216.238.54.0/24 [20/0] via 12.123.1.236, 4w4d O 216.221.5.0/24 [110/1] via 12.123.1.236, 7w0d 136.141.0.0/24 is subnetted, 2 subnets S 136.141.6.0 [1/0] via 12.122.125.4, 7w0d R 136.141.2.0 [120/0] via 12.122.125.4, 7w0d 170.162.0.0/19 is subnetted, 1 subnets B 170.162.32.0 [20/0] via 12.123.1.236, 7w0d 170.160.0.0/20 is subnetted, 2 subnets O 170.160.32.0 [110/1] via 12.122.125.4, 7w0d O 170.160.64.0 [110/1] via 12.123.1.236, 3d15h, fa0/1/1 187.179.0.0/16 is variably subnetted, 3 subnets, 2 masks B 187.179.0.0/19 [20/0] via 12.123.1.236, 13:51:40, gi0/1 B 187.179.32.0/19 [20/0] via 12.123.1.236, 4w3d S 187.179.64.0/18 [1/0] via 12.123.1.236, 4w3d 34.0.0.0/8 is variably subnetted, 3 subnets, 3 masks S 34.254.244.0/22 [1/0] via 12.122.125.4, 7w0d S 34.254.112.0/21 [1/0] via 12.122.125.4, 7w0d S 34.253.0.0/19 [1/0] via 12.123.1.236, 7w0d Award Solutions Proprietary 31 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 40. The routing table is organized into two tiers. Level 1 routes serve as routes only as shown in the first line of the example above or they may serve as indexes to the Level 2 routes listed below them as seen in the third line of our example. When a router searches for a match to a particular destination address, it first searches the Level 1 routes. If it finds a match, then it searches the Level 2 routes for a more specific match. A Parent Route is a Level 1 route that has Level 2 routes beneath it. A Child Route is a Level 2 route. The router automatically adds Parent Routes to the routing table when Child Routes are created. The basis of this two-tier hierarchy is classful routing which has been replaced by Classless Inter-Domain Routing (CIDR). This hierarchy is useful for quickly searching the routing table and does not mean that the network employs classful addressing or that the router uses classful routing. 3 | Routing Table Parent and Child Routes R1# show ip route B 216.238.54.0/24 [20/0] via 12.123.1.236, 4w4d O 216.221.5.0/24 [110/1] via 12.123.1.236, 7w0d 136.141.0.0/24 is subnetted, 2 subnets S 136.141.6.0 [1/0] via 12.122.125.4, 7w0d R 136.141.2.0 [120/0] via 12.122.125.4, 7w0d 170.162.0.0/19 is subnetted, 1 subnets B 170.162.32.0 [20/0] via 12.123.1.236, 7w0d 170.160.0.0/20 is subnetted, 2 subnets O 170.160.32.0 [110/1] via 12.122.125.4, 7w0d O 170.160.64.0 [110/1] via 12.123.1.236, 3d15h, fa0/1/1 187.179.0.0/16 is variably subnetted, 3 subnets, 2 masks B 187.179.0.0/19 [20/0] via 12.123.1.236, 13:51:40, gi0/1 B 187.179.32.0/19 [20/0] via 12.123.1.236, 4w3d S 187.179.64.0/18 [1/0] via 12.123.1.236, 4w3d 34.0.0.0/8 is variably subnetted, 3 subnets, 3 masks S 34.254.244.0/22 [1/0] via 12.122.125.4, 7w0d S 34.254.112.0/21 [1/0] via 12.122.125.4, 7w0d S 34.253.0.0/19 [1/0] via 12.123.1.236, 7w0d Level 1 Route Level 1/Parent Route Level 2/Child Route Award Solutions Proprietary 32 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 41. The prefix length sets the range of addresses that a route applies to. For example, if a network is listed as 10.10.10.0/24, the route applies to destination IP addresses in the range from 10.10.10.0 to 10.10.10.255. If the network is listed as 10.10.10.0/28, the route applies to IP addresses in the range of 10.10.10.0 – 10.10.10. 15. All routes in a routing table must have a prefix length in order to determine the range of addresses that the route applies to. The range for each route is not necessarily unique. The ranges for 10.10.10.0/28 is wholly contained in the range for 10.10.10.0/24. If you examine the sample routing table, some routes do not have route prefixes, for example, 136.141.6.0 [1/0] via 12.122.125.4, 7w0d and 136.141.2.0 [120/0] via 12.122.125.4, 7w0d. <COLUMN BREAK HERE> The presence or absence of the prefix length in the example table is determined by the rules below. Level 1 with no Children Level 1 route has its own prefix length. Level 1 with Children • Case 1: All Children have same prefix length. ― Level 1 route lists the prefix length, Child Routes do not list prefix lengths. • Case 2: Children have different prefixes. ― Prefix lengths are listed for each Child and the Level 1 route uses the classful prefix for the network. 3 | Routing Table Prefix Length R1# show ip route B 216.238.54.0/24 [20/0] via 12.123.1.236, 4w4d O 216.221.5.0/24 [110/1] via 12.123.1.236, 7w0d 136.141.0.0/24 is subnetted, 2 subnets S 136.141.6.0 [1/0] via 12.122.125.4, 7w0d R 136.141.2.0 [120/0] via 12.122.125.4, 7w0d 170.162.0.0/19 is subnetted, 1 subnets B 170.162.32.0 [20/0] via 12.123.1.236, 7w0d 170.160.0.0/20 is subnetted, 2 subnets O 170.160.32.0 [110/1] via 12.122.125.4, 7w0d O 170.160.64.0 [110/1] via 12.123.1.236, 3d15h, fa0/1/1 187.179.0.0/16 is variably subnetted, 3 subnets, 2 masks B 187.179.0.0/19 [20/0] via 12.123.1.236, 13:51:40, gi0/1 B 187.179.32.0/19 [20/0] via 12.123.1.236, 4w3d S 187.179.64.0/18 [1/0] via 12.123.1.236, 4w3d 34.0.0.0/8 is variably subnetted, 3 subnets, 3 masks S 34.254.244.0/22 [1/0] via 12.122.125.4, 7w0d S 34.254.112.0/21 [1/0] via 12.122.125.4, 7w0d S 34.253.0.0/19 [1/0] via 12.123.1.236, 7w0d Prefix in Level 1 Route Prefix in Level 2 Route Award Solutions Proprietary 33 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 42. Route Code The route code indicates the source of the routing information. The meaning of the codes is given at the top of the routing table when working with the device. In our example here, B=BGP, O=OSPF, S=Static, and R=RIP. Connected routes (not shown here) are listed with a C and Local routes (AKA Host routes) are listed with an L. Host routes represent the router’s own IP addresses and carry a 32-bit prefix length. Administrative Distance The administrative distance is a precedence value assigned to the route, based on the source of the routing information. Some sources of routing information are considered more trustworthy than others, and have a lower administrative distance. If the same route is learned through multiple sources, the one with the lowest administrative distance gets installed into the routing table. Metric Each route is assigned a metric to show the relative cost of using the particular route. Metrics act as tie breakers when the router must select between routes for the same destination network, which were learned from the same dynamic routing protocol. Most routing protocols allow Equal Cost Multi-Path (ECMP) and allow multiple routes to the same destination network having the same metric to be installed in the routing table. Traffic matching these routes is load-balanced across the ECMP routes. ECMP adds overhead to the forwarding function of a router as the router must track which data stream is using which of the routes. Administrators can set the maximum number of ECMP routes that are allowed per destination network. The metric may also be manipulated by an administrator to prefer one ECMP route over another. Next-Hop Address The next-hop address identifies the IP address of the device to which the router sends packets that match the route. The next-hop address is typically the IP address of the router that provided the route. 3 | Routing Table What’s in a Route? R1# show ip route B 216.238.54.0/24 [20/0] via 12.123.1.236, 4w4d O 216.221.5.0/24 [110/1] via 12.123.1.236, 7w0d 136.141.0.0/24 is subnetted, 2 subnets S 136.141.6.0 [1/0] via 12.122.125.4, 7w0d R 136.141.2.0 [120/0] via 12.122.125.4, 7w0d 170.162.0.0/19 is subnetted, 1 subnets B 170.162.32.0 [20/0] via 12.123.1.236, 7w0d 170.160.0.0/20 is subnetted, 2 subnets O 170.160.32.0 [110/1] via 12.122.125.4, 7w0d O 170.160.64.0 [110/1] via 12.123.1.236, 3d15h, fa0/1/1 187.179.0.0/16 is variably subnetted, 3 subnets, 2 masks B 187.179.0.0/19 [20/0] via 12.123.1.236, 13:51:40, gi0/1 B 187.179.32.0/19 [20/0] via 12.123.1.236, 4w3d S 187.179.64.0/18 [1/0] via 12.123.1.236, 4w3d 34.0.0.0/8 is variably subnetted, 3 subnets, 3 masks S 34.254.244.0/22 [1/0] via 12.122.125.4, 7w0d S 34.254.112.0/21 [1/0] via 12.122.125.4, 7w0d S 34.253.0.0/19 [1/0] via 12.123.1.236, 7w0d Route Code Admin.Distance/Metric Next-Hop Address Award Solutions Proprietary 34 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 43. In general, when a router knows more than one route to a particular destination, it prefers the one with the lowest metric. This can be a problem when the routes were learned from different sources because the metrics that one routing protocol uses may not be consistent with the metrics used by other routing protocols. For example, BGP uses the number of Autonomous Systems (ASs) in its Path Vector as a metric, while OSPF metrics are based on bandwidth. Relying solely on route metrics, the router would not be able to select the best possible routes. The router uses the Administrative Distance to select the best possible route from among a set of alternate routes that were learned from different routing sources. The administrative distance is determined by the source of routing information. Routing information sources with lower administrative distance values are preferred over those with higher administrative distance values. Unlike the route metric, the administrative distance is not set on a per-route basis. All routes from a particular routing information source share the same administrative distance value. For example, all routes learned by OSPF have 110 as the administrative distance value. The administrative value is a configuration parameter set within the router and is not exchanged by the routing protocols (also unlike the route metrics). Routing protocols with lower administrative distances are deemed to be more reliable, accurate or trustworthy than those with higher administrative distances. The table shown here lists the default administrative values used by Cisco routers. The defaults can be overridden, however, if one wishes to change the relative rankings. Finally, it’s worth noting that the administrative distance determines which routes actually get installed in the routing table. Typically multiple routes to the same destination network (as specified by network address and prefix length) from different routing protocols are not found in routing tables. Whichever one has the lower administrative distance causes the others to be bumped from the routing table. Source: “What is Administrative Distance?”, Document ID: 15986, Cisco. 3 | Routing Table Administrative Distance Source Administrative Distance Connected 0 Static 1 EIGRP summary route 5 eBGP 20 Internal EIGRP 90 IGRP 100 OSPF 110 IS-IS 115 RIP 120 EGP 140 ODR 160 External EIGRP 170 iBGP 200 <Unknown> 255 Award Solutions Proprietary 35 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 44. 3 | Routing Table The Longest Match Award Solutions Proprietary 36 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 45. A packet has arrived with destination address 66.134.50.11. The router has the following three routes installed in its routing table. • 66.0.0.0/8 next-hop 10.10.10.1 gi0/1 • 66.134.0.0/18 next-hop 12.13.14.5 gi0/22 • 66.134.48.0/20 next-hop 62.34.24.33 gi0/3 The prefix length indicates the range of addresses covered by the route. Here is the range for each of the routes. • 66.0.0.0/8 has range 66.0.0.0 – 66.255.255.255 • 66.134.0.0/18 has range 66.134.0.0 – 66.134.63.255 • 66.134.48.0/20 has range 66.134.48.0 – 66.134.63.255 Our destination address, 66.134.50.11 falls into each of these three ranges. When a router discovers more than one possible route for the packet it bases the forwarding decision on the Longest-Match Rule. 3 | Routing Table Finding the Right Route Route Prefix Length Range of Addresses Is 66.134.50.11 in this range? 66.0.0.0 /8 66.0.0.0 – 66.255.255.255 66.134.0.0 /18 66.134.0.0 – 66.134.63.255 66.134.48.0 /20 66.134.48.0 – 66.134.63.255 Source IP: 12.12.134.19 Destination IP: 66.134.50.11 Award Solutions Proprietary 37 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 46. The Longest-Match Rule says that when multiple routes contain the destination address in their ranges, the one with the longest prefix length is the route to use. Examining our prefix lengths we have /8, /18/ and /20. The /20 is the longest prefix length and the route 66.134.48.0/20 is the route used for forwarding the packet. A route is said to match the packet’s destination address if the packet’s destination address has the same network prefix as the route. In other words, the route matches if the first n bits of the packet’s destination address match the first n bits of the route entry, where n is the route’s prefix length. The bits in the destination address must match exactly the bits in the network prefix of the route. 3 | Routing Table Longest-Match Rule Destination IP 66.134.50.11 01000010 10000110 00110010 00001011 S 66.0.0.0/8 01000010 00000000 00000000 00000000 Destination matches 8 bits B 66.134.0.0/18 01000010 10000110 00000000 00000000 Destination matches 18 bits O 66.134.48.0/20 01000010 10000110 00110000 00000000 Destination matches 20 bits Longest-Match Rule: the route matches if the first n bits of the packet’s destination address match the first n bits of the route entry, where n is the route’s prefix length. Award Solutions Proprietary 38 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 47. The Longest-Match requires that the destination’s prefix match the network prefix exactly. Enter the route number in the space provided for each of the destination IP addresses. What happens if there is no matching route for the destination IP address? 3 | Routing Table Longest-Match Exercise 1 66.0.0.0/8 0100 0010 0000 0000 0000 0000 0000 0000 2 66.134.0.0/18 0100 0010 1000 0110 0000 0000 0000 0000 3 66.134.48.0/20 0100 0010 1000 0110 0011 0000 0000 0000 Which Route (above) do these Destination IPs use? 66.128.12.31 0100 0010 1000 0000 0000 1100 0001 1111 66.134.64.222 0100 0010 1000 0110 0100 0000 1101 1110 66.134.46.76 0100 0010 1000 0110 0010 1110 0100 1100 Award Solutions Proprietary 39 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 48. 3 | Routing Table Recursive Routing Award Solutions Proprietary 40 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 49. The router needs two pieces of information to forward a packet to the next device in the path toward its destination: the next-hop address and the exit interface. If, after searching the routing table, the preferred route identifies only the next-hop address, but not the exit interface, the router searches the routing table a second time to locate a suitable exit interface. In the example given above, the router receives a packet with a destination address of 10.1.0.5. Its first pass through the routing table selects the 10.1.0.4/30 route as the preferred route. This entry includes the next-hop address, 172.16.4.2, but not the exit interface. The router searches the routing table a second time for a route to 172.16.4.2. It finds the 172.16.4.0/30 route and determines that fa0/1/2 is the exit interface. This recursive search could have been avoided if the 10.1.0.4/30 route had included both a next-hop address and an exit interface. This is useful to remember, especially when configuring static routes. Specifying both the next-hop address and the exit interface reduces the amount of processing required to forward the packets. 3 | Routing Table Recursive Routing P1#show ip route 10.0.0.0/30 is subnetted, 2 subnets, 2 masks 10.1.0.4 [110/2] via 172.16.4.2, 00:02:56 172.16.0.0/30 is subnetted, 8 subnets 172.16.4.0 is directly connected, fa0/1/2 P1#show ip route 10.0.0.0/30 is subnetted, 2 subnets, 2 masks 10.1.0.4 [110/2] via 172.16.4.2, 00:02:56, fa0/1/2 172.16.0.0/30 is subnetted, 8 subnets 172.16.4.0 is directly connected, fa0/1/2 fa 0/1/2 Dst: 10.1.0.5 172.16.4.2 10.1.0.5 1 2 1 Next Hop address Exit Interface Next Hop address Exit Interface Award Solutions Proprietary 41 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 50. 3 | Routing Table Black Holes Award Solutions Proprietary 42 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 51. The term black hole refers to the case when a router receives a packet, but cannot forward the packet and the packet is dropped. This action results in a routing black hole, analogous to the theoretical astronomical phenomenon of a region in space with a gravitational pull such that nothing, not even light, can escape. There are several reasons why black holes – in the IP networking sense – might occur. • Routing Errors – A packet arrives, the router finds no route and discards the packet. If the router is allowed to send ICMP messages, it notifies the sender using an Internet Control Message Protocol (ICMP) “Destination Network Unreachable” message. • MTU Problems – If the Maximum Transmission Unit (MTU) of the outbound link is too small to accommodate the packet, and if the packet’s “Don’t Fragment” bit is set, the router drops the packet and send an ICMP “Fragmentation Required” message indicating what the MTU must be to send the packet through the interface. • Intentional Discard – In some circumstances, the routing table includes a null route (also known as black hole route). Any incoming packets that that match that route are discarded. This is an appropriate way to deal with malicious traffic, for example. An Intrusion Prevention System (IPS) may dynamically create a null route when it detects suspect activity. ICMP messages are usually suppressed in this case, so as to conceal the countermeasures from the attacker. 3 | Routing Table Black Holes • Network forwards packets to a router • Router drops the packets • Possible reasons: – Routing Error – MTU Error – Intentional Discard • “Black Hole” Route: R(config)#ip route 10.1.1.1 255.255.255.0 null0 Award Solutions Proprietary 43 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 52. 3 | Routing Table Summary • There are three sources of routes: directly connected interfaces, static routes, and dynamic routing protocols. • Routing table organization is as follows: Level 1 and Level 2 routes; Parent and Child Routes. • Administrative distance, the longest-match rule and route metrics are used to select from among multiple alternate routes. • Routing table entries have a next-hop address, metric and (optionally) exit interface. • Recursive routing may be used when the route table entry does not specify an exit interface. Award Solutions Proprietary 44 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 53. 3 | Routing Table Review Questions Use the table on the following page to answer the questions below. 1. How many Level 1 routes are in this table? 2. How many routes were learned through dynamic routing protocols? 3. The router receives a packet with the destination address 172.16.0.1. Which interface does the router send the packet out? 4. The router receives a packet with destination address 20.15.0.4 Which interface does the router send the packet out? Award Solutions Proprietary 45 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 54. 3 | Routing Table Review P1#show ip route Codes: C - connected, S - static, R - RIP, B – BGP, O - OSPF 140.30.0.0/25 is subnetted, 1 subnets C 140.30.19.0 is directly connected, gi0/1 B 20.0.0.0/8 [20/0] via 140.30.19.110, 00:04:17 66.0.0.0/20 is subnetted, 1 subnets C 66.134.48.0 is directly connected, gi0/0 172.16.0.0/30 is subnetted, 8 subnets C 172.16.60.0 is directly connected, fa0/1/6 C 172.16.56.0 is directly connected, fa0/1/2 C 172.16.52.0 is directly connected, fa0/1/3 C 172.16.24.0 is directly connected, fa0/1/5 C 172.16.16.0 is directly connected, fa0/1/4 C 172.16.8.0 is directly connected, fa0/1/1 C 172.16.4.0 is directly connected, fa0/1/0 O 172.16.0.0 [110/2] via 172.16.4.2, 00:02:56, fa0/1/0 10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks O 10.1.4.1/32 [110/2] via 172.16.4.2, 00:02:56, fa0/1/0 O 10.1.0.4/30 [110/2] via 172.16.4.2, 00:02:56, fa0/1/0 Award Solutions Proprietary 46 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 55. 4 | OSPF Key Concepts Chapter 4: OSPF Key Concepts Award Solutions Proprietary 47 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 56. 4 | OSPF Key Concepts Objectives After completing the module, you will be able to: • Describe how OSPF relates to Autonomous Systems and other routing protocols. • Describe the design of scalable networks using OSPF areas • Describe the role of Area Border Routers (ABRs) • List the types of Link-State Advertisements that OSPF uses to communicate routing information Award Solutions Proprietary 48 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 57. The Open Shortest Path First (OSPF) protocol is a widely used interior gateway protocol. It is a mature protocol, defined by the Internet Engineering Task Force (IETF) standard specification, Request for Comment (RFC) 2328. OSPF runs within a single Autonomous System (AS). OSPF routers collect information about the AS topology, known generically as Link State Advertisements (LSAs). The routers store this information in a Link State Database (LSDB) and use it to calculate least-cost routes to each of the destinations in the AS. These routes loaded into routing tables. OSPF quickly detects changes to the AS topology (such as interface failures), updates the LSDB, recalculates the cost of the routes and updates the routing tables. OSPF Areas allows OSPF to perform more efficiently over large networks. Without OSPF areas, OSPF would not scale well as the size and complexity of the Autonomous System grows. The Link State Database (LSDB) would expand, increasing the amount of memory that OSPF needs to function. The number of Link State Advertisements (LSA) sent would increase, worsening the messaging overhead added by the protocol. The Shortest Path First algorithm would run more frequently and need to consider greater numbers of alternate paths, increasing the amount of processing that OSPF performs. OSPF areas provide scalability by dividing the autonomous system into logical subsystems. Each router learns the detailed topology of its own area, but not that of other areas. Instead, the Area Border Router (ABR) originates a Summary-LSA into the area on behalf of all the routers outside of the area. All routers in a single area have identical LSDBs. ABRs have a LSDB for each area that they participate in. 4 | OSPF Key Concepts Open Shortest Path First (OSPF) • Interior Gateway Protocol • Link State Protocol • Bandwidth → Link cost • IETF Standard (RFC 2328) • Uses Areas to subdivide the autonomous system OSPF Area 1 OSPF Area 0 OSPF Area 2 AS 100 BGP AS 300 BGP Award Solutions Proprietary 49 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 58. 4 | OSPF Key Concepts Areas and Router Types Award Solutions Proprietary 50 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 59. OSPF defines a special area called the backbone. The backbone is always be area 0 (alternately written as 0.0.0.0). All other areas must connect to the backbone. This acts as a transit network for inter-area traffic. The non-backbone areas send routing information to the backbone, which in turn distributes the information to the other non-backbone areas. If an area does not contain a physical interface to the backbone network, a logical backbone connection may be formed by configuring what’s called a virtual link. 4 | OSPF Key Concepts The Backbone Area: Area 0 • Backbone Area = Area 0 • All areas must connect to backbone area • Distribute inter-area routes Area 1 Area 0 Area 2 Award Solutions Proprietary 51 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 60. OSPF defines four types of routers: Internal Routers, Backbone Routers, Area Border Routers, and Autonomous System Boundary Routers. Depending on their function, a given router may be of one or more of these types. The simplest type of router is an internal router. If all of a router’s interfaces are part of the same area, then that router is said to be an internal router. A router with at least one interface that is part of the backbone area is a backbone router. If all of the router’s interface are part of the backbone area, then that router could be considered both a backbone and internal router. The Area Border Router (ABR) contains interfaces on at least two different areas. The ABR originates Summary- LSAs into the backbone containing a summary of the non- zero area’s intra-area routes. It originates Summary-LSAs into the non-zero area containing a summary of the AS’s inter-area routes. The Autonomous System Boundary Router (ASBR) exchanges routing information with other Autonomous Systems (ASs). This may be through a different routing protocol, such as the Border Gateway Protocol (BGP) or through static configuration. They originate External-AS Link State Advertisements (LSAs) to communicate these external routes throughout the AS. 4 | OSPF Key Concepts OSPF Router Types AS 300 Area Border Router (ABR) Internal Router ASBR, ABR and Backbone Router Backbone Router AS 400 AS 100 Backbone Router Internal and Autonomous System Boundary Router (ASBR) ASBR and Backbone Router Area 1 Area 2 Area 0 AS 200 Award Solutions Proprietary 52 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 61. 4 | OSPF Key Concepts Link State Advertisements (LSA) Award Solutions Proprietary 53 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 62. The router maintains a Link State Database (LSDB) for each area to which it belongs. The contents of the LSDB are flooded to all of the routers in the area. Each of the routers in the area eventually build an exact replica of the area’s LSDB. The LSDB is a representation of the topology of the area. It identifies the routers and networks in the area, the links that interconnect them and the cost of those links. The contents of the LSDB are Link State Advertisements (LSA). The LSDB holds four types of LSAs: 1. Router-LSAs. Each router originates a Router-LSA that describes the state of the its interfaces. 2. Networks-LSAs. The network’s designated router originates a Network-LSA that contains a list of routers connected to that network. 3. Summary-LSAs. The area border router originates a Summary-LSA that contains routes to destinations outside the area, but inside the autonomous system. 4. External-LSAs. The autonomous system boundary router originates an External-LSA that contains routes to destinations outside the autonomous system. Using the information in the chart, draw the network topology for the local area that contains 11 routers and three networks. The numbers indicate the metrics on the given links between the connected nodes or networks. For example, the 0 in the row and column that link Network 3 with Router 7 indicate that Router 7 connects to Network 3 and from Network 3 to Router 7 the cost is 0. However, look at the link from Router 7 to Network 3 and the cost is 2. There is no cost associated with coming out of a network. Costs are incurred when leaving routers. 4 | OSPF Key Concepts Link State Database R1 R2 R3 R4 R5 R6 R7 R8 R9 R10 R11 N1 N2 N3 R1 3 0 0 R2 5 5 5 0 R3 5 R4 5 R5 5 R6 3 0 0 R7 4 4 4 0 R8 4 R9 4 R10 4 R11 3 3 N1 3 3 N2 1 1 N3 2 2 Using the information in this LSDB, draw the topology of the local network. Award Solutions Proprietary 54 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 63. Draw the network based on the LSDB on the previous page. 4 | OSPF Key Concepts Draw the Network Award Solutions Proprietary 55 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 64. This network is based on the LSDB given in the exercise. It is in an OSPF network. Your drawing on the previous page should look similar. 4 | OSPF Key Concepts The Network N3 2 2 4 4 4 1 R2 R4 R3 R1 R5 R7 R9 R8 R6 R10 N2 N1 3 3 5 5 5 1 R11 3 3 Award Solutions Proprietary 56 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 65. 4 | OSPF Key Concepts Link State Advertisements Award Solutions Proprietary 57 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 66. All OSPF routing information is exchanged in the form of a Link State Advertisements (LSA). An LSA is a piece of routing information that may describe a router, a physical interface or a range of addresses, along with an associated cost. The LSA specifies its originating router, its age in seconds (which allows old routing information to expire) and a sequence number (used to detect duplicate LSAs). There are 11 types of LSAs. The type of LSA depends on the type of router creating the LSA. 4 | OSPF Key Concepts Link State Advertisement Link State Advertisement (LSA) Router-LSA (Type 1) Network-LSA (Type 2) Summary-LSA (Type 3, 4) External-LSA (Type 5, 7) Opaque-LSA (Type 9,10,11) Award Solutions Proprietary 58 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 67. Each router in the Autonomous System originates a Router-LSA. The Router-LSA indicates whether the router is an ASBR or ABR. It includes a list of the router’s links, the cost of each link, as well as other information such as the link’s address. The Router-LSA gets distributed to each of the routers in the area, but the ABR does not forward the Router-LSA across area boundaries. 4 | OSPF Key Concepts Type 1 Router-LSA Area 1 Router-LSA = Type 1 Link State ID: 192.168.50.1 No of Links=2 Link 1 Cost , Type and other Details Link 2 Cost , Type and other Details Neighbor List Generated by each router in the AS Area-scope Link State ID is set to Router ID Award Solutions Proprietary 59 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 68. A Network-LSA is originated for each broadcast or Non- Broadcast Multiple Access (NBMA) network in the autonomous system (but not for point-to-point links). It includes a list of routers attached to the network and the subnet address and mask assigned to the network. When there are multiple OSPF router connected to the network, only one of them, the Designated Router, sends the Network-LSA. The Network-LSA gets distributed to each of the routers in the area, but the Area Border Router (ABR) does not forward the Network-LSA across area boundaries. 4 | OSPF Key Concepts Type 2 Network-LSA Area 1 Network-LSA = Type 2 Link State ID: 10.2.1.100 Subnet Mask = 255.255.255.0 RID of Attached Router-R1 RID of Attached Router-R2 RID of Attached Router-R3 RID of Attached Router-R4 Generated by Designated Router Area-scope Link State ID is set to DR Interface Address R1 (DR) R3 R4 Point-to-Point Link Network-LSA = Type 2 Link State ID: 10.2.1.100 Subnet Mask = 255.255.255.0 RID of Attached Router-R1 RID of Attached Router-R2 RID of Attached Router-R3 RID of Attached Router-R4 R2 10.2.1.100/24 NW: 10.2.1.0/24 Award Solutions Proprietary 60 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 69. The Area Border Router (ABR) does not forward Router- LSAs or Network-LSAs from one area to the next. Instead, the ABR originates a Summary-LSA that, as its name implies, summarizes the routing information for that area. The ABR may originate separate Summary-LSAs for each of the networks to be advertised, or it may condense multiple networks into a single Summary-LSA by advertising a single network address with a shorter network prefix. When a router receives a Summary-LSA, it computes a new cost to the target by adding in the cost of the path between that router and the ABR. When an ABR receives a Summary-LSA sent from some other ABR, it does not forward the Summary-LSA across area boundaries. In the example shown, the ABR receives four Network- LSAs from within Area 1. The ABR has been configured to condense these into a single Summary-LSA that it originates into Area 0. It sets the cost of the summary route to be the largest cost of its individual component. 4 | OSPF Key Concepts Type 3 Summary-LSA Area 0 Summary-LSA = Type 3 Link State ID: 10.1.0.0 Subnet Mask = 255.255.252.0 Metric = 10 Generated by ABR Area-scope Link State ID is set to Advertised Network Address Cost = Advertised Cost + Cost to ABR Area 1 10.1.1.0/24 Cost: 3 10.1.2.0/24 Cost: 5 10.1.3.0/24 Cost: 10 10.1.4.0/24 Cost 8 Network-LSA Link State ID: 10.1.1.0 Subnet Mask = 255.255.255.0 ABR Award Solutions Proprietary 61 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 70. The Area Border Router (ABR) generates an Autonomous System Boundary Router (ASBR) Summary-LSA for each ASBR in its area. This includes the cost of the path from the ABR to the ASBR. The router may choose to use this information to calculate the total cost to reach a destination outside of the Autonomous System. When an ABR receives an ASBR Summary-LSA from some other ABR, it does not forward it across area boundaries. 4 | OSPF Key Concepts Type 4 ASBR Summary-LSA Area 1 ASBR Summary-LSA = Type 4 Link State ID: 192.168.50.7 Subnet Mask = 0.0.0.0 Metric = 22 Generated by ABR Area-scope Link State ID is set to ASBR Router ID For External Type 1 routes, add cost to ASBR For External Type 2 routes, store as-is in Routing Table Area 0 R7 (RID 192.168.50.7) AS 100 ASBR Award Solutions Proprietary 62 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 71. When the Autonomous System Boundary Router (ASBR) wants to import a route from other routing processes to an external destination into the Autonomous System (AS), it originates an AS-External-LSA. This includes the network address and mask of the external destination and the next hop address of the external link. The AS-External-LSA gets flooded throughout the AS. The cost of the external route may be one of two types. Type 1 costs use the same units as other OSPF LSAs. The Shortest Path First algorithm may make a meaningful comparison between the Type 1 cost of the AS-External- LSA and the costs learned through other types of LSAs. Type 2 costs are expressed using some other type of units that are not compatible with the metrics used by the AS. These other units are assumed to be significantly larger than those used by the AS, such that the Shortest Path First algorithm always selects a path with a cost expressed in Type 1 units over a path expressed in Type 2 units. 4 | OSPF Key Concepts Type 5 AS-External-LSA AS External-LSA = Type 5 Link State ID: 10.0.0.0/16 Metric = 20 AS External-LSA = Type 5 Link State ID: 10.1.0.0/16 Metric = 20 Area 0 AS External-LSA = Type 5 Link State ID: 10.2.0.0/15 Metric = 20 Link State ID is set to Advertised Network Address ASBR generates 1 AS External-LSA per route imported for the whole AS Distributed transparently without any modification within AS Includes the Next Hop IP address of the external link in the LSA Area 1 AS 100 eBGP 10.0.0.0/16 10.1.0.0/16 10.2.0.0/15 ASBR AS External-LSA = Type 5 Link State ID: 10.0.0.0/16 Metric = 20 AS External-LSA = Type 5 Link State ID: 10.1.0.0/16 Metric = 20 AS External-LSA = Type 5 Link State ID: 10.2.0.0/15 Metric = 20 Award Solutions Proprietary 63 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 72. The Opaque-LSA type was introduced as a means to extend OSPF to carry application-specific data. It provides the means to carry a generic chunk of data, the exact form and function of which is known only to the application that defines it. For example, the Traffic Engineering application defines a type of Opaque-LSA. In this application, the LSA carries bandwidth reservation information associated with the link. Three types of Opaque-LSAs have been defined. Link-local opaque-LSAs (type 9) is sent to routers attached to the specified network and not forwarded beyond that point. Area-Local opaque-LSAs (Type 10) are forwarded to all routers in the area, but not forwarded across area boundaries. AS-local opaque-LSAs (Type 11) are forwarded to all routers in the Autonomous System. 4 | OSPF Key Concepts Types 9 – 11 Opaque-LSA AS 300 AS 400 AS 100 Area 1 Area 2 Area 0 AS 200 N1 Opaque-LSA Network-scope Opaque-LSA Area-scope Opaque-LSA AS-scope Award Solutions Proprietary 64 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 73. 4 | OSPF Key Concepts Summary • OSPF is used to exchange routing information between routers within an Autonomous System. • OSPF uses Link-State Advertisements to communicate information about the topology of the network. • Routers store Link-State Advertisements in the Link-State Database. • Each router in an area maintains its own copy of the Link-State Database. • OSPF routers learn details about the topology of their area, but not that of other areas. Award Solutions Proprietary 65 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 74. The figure illustrates a sample OSPF network. It highlights four of the routers (R4, R8, R12 and R13). What type of routers are these? (Hint: a single router may be of more than one type.) Your choices are: internal router, backbone router, Area Border Router (ABR), Autonomous System Boundary Router (ASBR). 4 | OSPF Key Concepts Orlando St. Petersburg Tampa Review Exercise R1 R4 R6 R5 R3 R7 N1 N2 R9 R11 R10 R8 R12 R2 R14 R16 R15 R13 R17 N3 R18 Area 1 Area 2 Area 3 BGP R8: R13: BGP R19 R12: R4: Award Solutions Proprietary 66 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 75. 5 | OSPF in Wireless Networks Chapter 5: OSPF in Wireless Networks Award Solutions Proprietary 67 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 76. 5 | OSPF in Wireless Networks Objectives After completing the module, you will be able to: • Describe the operations of an OSPF router • Troubleshoot OSPF adjacency issues • Analyze the contents of the link-state database • Calculate OSPF link metrics to influence routing decisions • Use OSPF areas to build scalable networks Award Solutions Proprietary 68 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 77. An OSPF-capable router spends its life performing the following functions. • OSPF routers automatically discover the existence of neighboring routers. • Having discovered a new neighbor, the two routers synchronize their Link State Databases (LSDBs). • Once the topology of the network is known (through the LSDB), the router runs a Shortest Path First (SPF) algorithm to calculate the optimal path to reach each of the known destinations in the network. • The “best” path information is merged with other routing information (e.g., static routes and other dynamic routing protocols) to create routing table. • When changes occur in the network topology (e.g., links are enabled or shutdown), the router updates its neighbors by sending a Link State Advertisement (LSA). Of course, the router may also re-run the SPF calculations to determine the impact of the topology change and update the routing table accordingly. • OSPF routers keep tabs on their neighbors. If the router suddenly stops receiving keep-alive messages, it assumes that the neighbor has gone off-line, updates the LSDB accordingly, re-runs the SPF algorithm and adjusts the routing table as necessary. 5 | OSPF in Wireless Networks Life of an OSPF Router Neighbor Discovery Synchronize LSDB Compute SPF Populate Routing Table Send LSA Keep-Alive Award Solutions Proprietary 69 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 78. 5 | OSPF in Wireless Networks Neighbor Discovery Award Solutions Proprietary 70 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 79. Whenever possible, OSPF relies on the automatic discovery of neighboring routers, rather than having them administratively configured. An OSPF router periodically sends a “Hello” message to the multi-cast address 224.0.0.5. This is a well-known address to which all OSPF routers are supposed to be listening. The router does not necessarily exchange routing information with each one of its neighbors. It only does so with so-called adjacent neighbors. The Hello message includes several configuration data: the router identifier, area identifier, hello interval, dead interval and subnet prefix. The two neighboring routers must agree on each of these parameters if they are to form an adjacency and exchange routing information. The Hello message also includes the list of neighboring routers that are already known to this router. This is used to confirm that the neighbor heard your Hello message (i.e., to confirm that two-way communication exists). 5 | OSPF in Wireless Networks Neighbor Discovery • Hello message – Send periodically – Multicast: 224.0.0.5 • Includes – Router ID – Area ID – Hello Interval – Dead Interval – Subnet Prefix – Neighbor List Award Solutions Proprietary 71 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 80. The Hello protocol is used to discover new OSPF neighbors, verify that two-way communication is in place, communicate information about the router’s configuration and confirm that the neighbor remains active over time. The router sends a Hello message every HelloInterval seconds (10 seconds is typical). The router sends the Hello message to the well-known multicast address 224.0.0.5. The router includes the Area ID, the sending router’s own Router ID and a list of Router IDs from whom the sending router has received a Hello message. The message also contains authentication credentials, the network mask of the interface, the value of the HelloInterval and RouterDeadInterval timers, the Router ID of the Designated Router and a priority value used in the Designated Router election procedure. In the example shown, Router R1 has been sending Hello messages every HelloInterval seconds. Router R2 comes online starts running OSPF. It starts sending its own Hello messages. Router R1 hears the Hello message that Router R2 has sent. It adds R2 to its list of neighbors and includes R2’s Router ID when it sends its next Hello message. Likewise, Router R2 hears the Hello message that Router R1 has sent. It notes that its own Router Id was included in the message. Router R2 now knows that two-way communication is possible with this neighbor. R2 adds R1 to its list of the neighbors and includes R1’s Router Id in the next Hello message that it sends. Router R1 notes that its Router ID has been included in Router R2’s hello message. Router R1 now knows that two-way communication is possible with R2. The two routers analyze the fields in the Hello messages. If their respective area ID, network mask, HelloInterval, and RouterDeadInterval fields match, they may attempt to form an adjacency with each other and begin to synchronize their Link State Databases. 5 | OSPF in Wireless Networks Hello Protocol R1 R2 Hello Area ID, Router ID, Neighbor List Hello Area ID, Router ID, Neighbor List (R2) Hello Area ID, Router ID, Neighbor List R2 powers on and sends first Hello R1 hears Hello and adds R2 to neighbor list Hello Area ID, Router ID, Neighbor List (R1) R2 hears Hello and adds R1 to neighbor list Hello Area ID, Router ID, Neighbor List Award Solutions Proprietary 72 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 81. Having established an adjacency with each other, the two neighboring routers synchronize their LSDBs. They first send a series of Database Description messages. These messages summarize the contents of the LSDB and include enough information for the neighbor to determine whether it already knows the Link State Advertisements (LSAs) contained within. If the router learns about a new LSA that is not in its LSDB, or sees that a more recent copy of an LSA is available, it sends a Link State Request message, indicating that it wants to know the details about the LSAs. The first router then sends the requested LSAs in a Link State Update message. The figure illustrates the process by which router R1 synchronizes its database with router R2. Router R2 also synchronizes its database with router R1, but this is not shown in the illustration. 5 | OSPF in Wireless Networks Database Synchronization Link State Request Please send me these LSAs… R1 R2 LSDB LSDB Database Description These are the LSAs in my LSDB Link State Update Here are the LSAs you asked for… Award Solutions Proprietary 73 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 82. Consider the effects of the neighbor discovery procedure on a multiple-access network with six routers. Each router would discover five neighbors and form five adjacencies. Fifteen adjacencies would be formed overall. The Designated Router (DR) concept reduces the number of adjacencies required in this circumstance, and by extension reduces the size of the Link State Database (LSDB) and the number of OSPF messages sent over the network. The Hello protocol includes a mechanism by which the routers autonomously determine which router functions as the DR. The administrator can influence this decision by assigning certain priorities to each of the routers. Once a DR has been elected for the network, it generally does not change unless the DR goes out of service. To facilitate a fast recovery from that circumstance a Backup Designated Router (BDR) is elected at the same time as the DR. If the DR should go out of service, the BDR takes over as DR and a new BDR is elected. Instead of forming adjacency with every neighbor on the network, a router instead forms an adjacency with only the DR and BDR. In the example configuration shown, the total number of adjacencies that form is reduced from 15 to 9. 5 | OSPF in Wireless Networks Designated Router (DR) R1 R2 R3 R4 R5 R6 R1 (DR) R2 (BDR) R3 R4 R5 R6 Multi-Access Network with 6 OSPF Routers With DR and BDR Election Adjacencies = 2N-3 Adjacencies = (2*6)-3=9 R1 R2 R3 R4 R5 R6 Designated Router is Elected to Reduce Adjacencies Backup Designated Router is also elected for fast takeover from DR’s Failure No DR and BDR Election Adjacencies = N*(N-1)/2 Adjacencies = 6*(6-1)/2 = 15 Award Solutions Proprietary 74 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 83. 5 | OSPF in Wireless Networks Metrics Award Solutions Proprietary 75 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 84. OSPF automatically assigns a cost to each of the links in the network based on the bandwidth of the link. It calculates this cost by selecting a fixed value known as the reference bandwidth, and then dividing the reference bandwidth by the bandwidth of the link. The minimum cost that can be assigned to a link is 1. It is important that each of the routers in the network use the same reference bandwidth in order to accurately compare routes. 5 | OSPF in Wireless Networks OSPF Metric Interface Type Speed (Mbps) Cost ref = 100 Mbps ref = 1 Gbps ref = 10 Gbps 10GE 10000 1 1 1 OC-192c 9953.28 1 1 1 OC-48c 2488.32 1 1 4 GigE 1000 1 1 10 OC-12c 622.08 1 1 16 OC-3c 155.52 1 6 64 Fast Ethernet 100 1 10 100 Ethernet 10 10 100 1000 Reference Bandwidth Link Speed OSPF Cost = Award Solutions Proprietary 76 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 85. 5 | OSPF in Wireless Networks Exercise Calculate the cost for the T3 and T1 links. Interface Type Speed (Mbps) Cost ref = 100 Mbps ref = 1 Gbps ref = 10 Gbps 10GE 10000 1 1 1 OC-192c 9953.28 1 1 1 OC-48c 2488.32 1 1 4 GigE 1000 1 1 10 OC-12c 622.08 1 1 16 OC-3c 155.52 1 6 64 Fast Ethernet 100 1 10 100 Ethernet 10 10 100 1000 T3 44.736 T1 1.544 Award Solutions Proprietary 77 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 86. Each router in the network uses the information in its link state database to execute the Shortest Path First (SPF) algorithm and calculate the most optimal route to each destination in the network. The SPF algorithm uses the costs that were assigned to each of the links. The cost of the route is the sum of the link costs that make up the route. The figure illustrates four switching offices: Orlando, St. Petersburg, Tampa and Boca. Each switching office has an edge router (R3, R8, R13 and R18) that connects to the backbone for the region (R1 and R2). Additionally, each edge router connects directly to two neighboring offices (for example, R3 in Orlando connects to R8 in St. Petersburg and R13 in Tampa). 5 | OSPF in Wireless Networks Shortest Path First Orlando 1 R4 R6 R5 R3 R7 N1 3 3 5 5 5 1 St. Petersburg N2 2 2 4 4 4 R9 R11 R10 R8 R12 2 Tampa 1 R14 R16 R15 R13 R17 N3 3 3 5 5 5 Boca 2 2 4 4 4 N4 R19 R21 R20 R18 R22 1 1 1 1 2 R1 R2 Award Solutions Proprietary 78 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 87. The Shortest Path First algorithm produces a tree of shortest paths to each router and network in the area, with the router itself as the root of the tree. The router only needs to know the next hop for each of the destinations to forward packets. These next hops are loaded into the routing table. The figure illustrates the results of the Shortest Path First algorithm when run on router R3 (we’ve also abbreviated the diagram by only showing the paths to each office’s edge router). The table illustrates the set of next hops that are loaded into the routing table. 5 | OSPF in Wireless Networks Shortest Path First R3 1 R18 R13 R8 R2 R1 1 1 2 1 1 2 1 1 R3 1 R18 R13 R8 R2 R1 1 1 1 1 Before After Destination Next Hop R8 R8 R1 R1 R13 R13 R2 R13 R18 R13 Award Solutions Proprietary 79 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 88. It is possible that the Shortest Path First algorithm identifies multiple paths to a destination with the same cost value. When that happens, multiple paths may be loaded into the routing table (assuming they have different next hops) and traffic is distributed equally across each of them. We can illustrate this by changing the cost of the R1-R2 and R8-R18 links. If these two links each have a cost of one, then router R3 calculates multiple equal-cost paths to routers R2 and R18. To send packets to router R2, R3 could forward packets to router R1 or R13. Each path has a cost of two. To send packets to R18, R3 could forward packets to R8 or R13. Each path has a cost of two. 5 | OSPF in Wireless Networks Equal-Cost Multipath After R3 1 R18 R13 R8 R2 R1 1 1 1 1 1 1 Destination Next Hop R8 R8 R1 R1 R13 R13 R2 R13 R2 R1 R18 R13 R18 R8 Award Solutions Proprietary 80 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 89. The figure illustrates four switching offices: Orlando, St. Petersburg, Tampa and Boca. Each switching office has an edge router (R3, R8, R13 and R18) that connects to the backbone for the region (R1 and R2). Additionally, each edge router connects directly to two neighboring offices (for example, R3 in Orlando connects to R8 in St. Petersburg and R13 in Tampa). Assign a cost to each of the links indicated such that the following two conditions are met: 1. Each edge router (R3, R8, R13 and R18) processes only traffic that originates or terminates inside its respective office. They do not process so-called transit traffic that both originates and terminates outside their respective offices. 2. Each edge router shall direct traffic destined for an adjacent office over the direct link to that office. When properly configured, traffic that runs from Orlando to St. Petersburg goes over the R3-R8 link. Traffic that runs from Orlando to Tampa traverses the R3-R13 link. Traffic that runs from Orlando to Boca passes through the backbone, R3-R1-R2-R18. 5 | OSPF in Wireless Networks Orlando St. Petersburg Tampa Boca SPF Exercise R1 R4 R6 R5 R3 R7 N1 3 3 5 5 5 N2 2 2 4 4 4 R9 R11 R10 R8 R12 R2 R14 R16 R15 R13 R17 N3 3 3 5 5 5 2 2 4 4 4 N4 R19 R21 R20 R18 R22 Award Solutions Proprietary 81 Award Solutions' eBook is authorized for a single user only. Do not distribute.
  • 90. 5 | OSPF in Wireless Networks Areas Award Solutions Proprietary 82 Award Solutions' eBook is authorized for a single user only. Do not distribute.