SlideShare a Scribd company logo
1 of 14
Link-state routing
Protocol
Aung Thu Rha Hein
Chinnawat Noosrikong
Outline
•   Overview
•   Features of Link-State routing protocols
•   link-state routing algorithm
•   Dijkstra’s algorithm
•   OSPF
•   IS-IS
• Advantages and Disadvantages of LS routing protocols
Overview
• One of two main classes of interior gateway routing protocols
  • OSPF, IS-IS
• Performed by every switching node in the network

Basic Concept
• every node creates a map of the connectivity to the network
  • This graph shows which nodes are connected to which other
    nodes
  • Each node calculates the next best logical path to the destination
  • Collection of best paths form the routing table of the node
Features of Link-state routing
protocols
Link-state advertisement (LSA) or Link-state Packet(LSP)
• a small packet of routing information that is sent between
  routers
Topological database or Link-state Database
• a collection of information gathered from LSAs
SPF algorithm
• a calculation performed on the database that results in the
  SPF tree
Routing table
• a list of the known paths and interfaces
link-state routing algorithm
1.   Each router is responsible for meeting its neighbors and
     learning their names.
       •     Used a Hello Protocol, which send a data packet contains RID
             and address of the network on which the packet is being sent
2.   Each router constructs a LSP/LSA which consists of a list of
     names and cost for each of its neighbors.
3.   The LSP/LSA is transmitted to all other routers. Each router
     stores the most recently generated LSP/LSA from each
     other router.
       •     Link-state flooding: Sequencing and Aging procedures
       •     Each routers store the identical Link State Database
4.   Each router uses complete information on the network
     topology to compute the shortest path route to each
     destination node.
       •     Use SPF or Dijkstra’s algorithm to calculate the shortest path
Dijkstra’s algorithm
  Also known as the shortest path first (SPF) algorithm

Nodes    2      3        4       5(b)      6



1(a)     7      9        ∞        ∞       14



  2      7    9<7+10   7+15       ∞       14



  3      7      9      22<11+     ∞      14<7+1
                        10+7              0+2


  6      7      9       22      9+2+10    14
                                  +7
Dijkstra’s algorithm(Cont.)
Open Shortest Path First (OSPF)
• A routing protocol developed for Internet Protocol
  networks by the Interior Gateway Protocol (IGP)
• Based on the Dijkstra’s Algorithm
• Serving large, heterogeneous internetworks



• OSPF Version 1 (1988)
• OSPF Version 2 (1998) Supported IPv4
• OSPF Version 3 (2008) Supported IPv6
Open Shortest Path First
(OSPF)




OSPF can operate within a hierarchy
Collection of networks under a common administration that share a
common routing strategy
Additional OSPF Features
• Equal-cost
• Multipath routing
• Routing based on upper-layer type-of-service (TOS) requests
IS-IS
• Intermediate System-to-Intermediate System (IS-IS)
• That floods the network with link-state information to build a
  complete, consistent picture of network topology
  • Each IS-IS router independently builds a database of the
    network's topology
• IS-IS uses Dijkstra's algorithm for computing the best path
  through the network
• IS-IS Metrics
• A single required default metric with a maximum path value of
  1024
• Three optional metrics (costs):
  • Delay
  • Expense
  • Error
Integrated IS-IS
•   Integrated IS-IS is a version of the OSI IS-IS
•   To support more network layer protocols than just CLNP
•   Dual IS-IS
•   Implementations send only one set of routing updates
•   Supporting multiple network layer protocols in a router
Advantages and Disadvantages of LS
routing protocols
Advantages
• Smaller routing tables
      • Only a single optimal route for each network ID is stored in
        the routing table.
• Low network overhead
      • do not exchange any routing information when the
        internetwork has converged.
• Ability to scale.
      • scale well to large and very large internetworks.
• Lower convergence time.
      • have a much lower convergence time and the internetwork is
        converged without routing loops.
Advantages and Disadvantages of LS
routing protocols(cont.)
Disadvantages
• Complex
      • much more complex and difficult to understand than DV
        routing protocols.
• More difficult to configure.
      • implementation requires additional planning and
        configuration.
• Resource intensive.
      • For very large internetworks, the LS database and the
        calculation of routing table entries can be memory and
        processor intensive.

More Related Content

What's hot

Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
asimnawaz54
 
Internetworking
InternetworkingInternetworking
Internetworking
Raghu nath
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
extraganesh
 

What's hot (20)

IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Ch 20 UNICAST ROUTING SECTION 2
Ch 20   UNICAST ROUTING  SECTION  2Ch 20   UNICAST ROUTING  SECTION  2
Ch 20 UNICAST ROUTING SECTION 2
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Internetworking
InternetworkingInternetworking
Internetworking
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
What Is Sliding Window Protocol?
What Is Sliding Window Protocol?What Is Sliding Window Protocol?
What Is Sliding Window Protocol?
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
 

Similar to Link state routing protocol

TechWiseTV Workshop: Segment Routing for the Datacenter
TechWiseTV Workshop: Segment Routing for the DatacenterTechWiseTV Workshop: Segment Routing for the Datacenter
TechWiseTV Workshop: Segment Routing for the Datacenter
Robb Boyd
 

Similar to Link state routing protocol (20)

Computer networks unit iii
Computer networks    unit iiiComputer networks    unit iii
Computer networks unit iii
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
 
OSPF Configuration
OSPF ConfigurationOSPF Configuration
OSPF Configuration
 
Dynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And BasicsDynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And Basics
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layer
 
1Routing Basics.pdf
1Routing Basics.pdf1Routing Basics.pdf
1Routing Basics.pdf
 
CCNA3 Verson6 Chapter5
CCNA3 Verson6 Chapter5CCNA3 Verson6 Chapter5
CCNA3 Verson6 Chapter5
 
CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
 
Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocols
 
Chapter07
Chapter07Chapter07
Chapter07
 
ch2_p3_ospf.pptx
ch2_p3_ospf.pptxch2_p3_ospf.pptx
ch2_p3_ospf.pptx
 
ROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptx
 
SEGMENT Routing
SEGMENT RoutingSEGMENT Routing
SEGMENT Routing
 
Routing Protocols
Routing Protocols Routing Protocols
Routing Protocols
 
Ccna routing
Ccna routingCcna routing
Ccna routing
 
MPLS Tutorial
MPLS TutorialMPLS Tutorial
MPLS Tutorial
 
MPLS Tutorial2
MPLS Tutorial2MPLS Tutorial2
MPLS Tutorial2
 
CCNP Route
CCNP Route CCNP Route
CCNP Route
 
TechWiseTV Workshop: Segment Routing for the Datacenter
TechWiseTV Workshop: Segment Routing for the DatacenterTechWiseTV Workshop: Segment Routing for the Datacenter
TechWiseTV Workshop: Segment Routing for the Datacenter
 
Performance Analysis of Dynamic Routing Protocols using OPNET
Performance Analysis of Dynamic Routing Protocols using OPNETPerformance Analysis of Dynamic Routing Protocols using OPNET
Performance Analysis of Dynamic Routing Protocols using OPNET
 

More from Aung Thu Rha Hein

Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & Countermeasures
Aung Thu Rha Hein
 
Fuzzy logic based students’ learning assessment
Fuzzy logic based students’ learning assessmentFuzzy logic based students’ learning assessment
Fuzzy logic based students’ learning assessment
Aung Thu Rha Hein
 

More from Aung Thu Rha Hein (19)

Writing with ease
Writing with easeWriting with ease
Writing with ease
 
Bioinformatics for Computer Scientists
Bioinformatics for Computer Scientists Bioinformatics for Computer Scientists
Bioinformatics for Computer Scientists
 
Analysis of hybrid image with FFT (Fast Fourier Transform)
Analysis of hybrid image with FFT (Fast Fourier Transform)Analysis of hybrid image with FFT (Fast Fourier Transform)
Analysis of hybrid image with FFT (Fast Fourier Transform)
 
Introduction to Common Weakness Enumeration (CWE)
Introduction to Common Weakness Enumeration (CWE)Introduction to Common Weakness Enumeration (CWE)
Introduction to Common Weakness Enumeration (CWE)
 
Private Browsing: A Window of Forensic Opportunity
Private Browsing: A Window of Forensic OpportunityPrivate Browsing: A Window of Forensic Opportunity
Private Browsing: A Window of Forensic Opportunity
 
Network switching
Network switchingNetwork switching
Network switching
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Survey & Review of Digital Forensic
Survey & Review of Digital ForensicSurvey & Review of Digital Forensic
Survey & Review of Digital Forensic
 
Partitioned Based Regression Verification
Partitioned Based Regression VerificationPartitioned Based Regression Verification
Partitioned Based Regression Verification
 
CRAXweb: Automatic Exploit Generation for Web Applications
CRAXweb: Automatic Exploit Generation for Web ApplicationsCRAXweb: Automatic Exploit Generation for Web Applications
CRAXweb: Automatic Exploit Generation for Web Applications
 
Botnets 101
Botnets 101Botnets 101
Botnets 101
 
Session initiation protocol
Session initiation protocolSession initiation protocol
Session initiation protocol
 
TPC-H in MongoDB
TPC-H in MongoDBTPC-H in MongoDB
TPC-H in MongoDB
 
Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & Countermeasures
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Can the elephants handle the no sql onslaught
Can the elephants handle the no sql onslaughtCan the elephants handle the no sql onslaught
Can the elephants handle the no sql onslaught
 
Fuzzy logic based students’ learning assessment
Fuzzy logic based students’ learning assessmentFuzzy logic based students’ learning assessment
Fuzzy logic based students’ learning assessment
 
Chat bot analysis
Chat bot analysisChat bot analysis
Chat bot analysis
 
Data mining & column stores
Data mining & column storesData mining & column stores
Data mining & column stores
 

Recently uploaded

Recently uploaded (20)

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Link state routing protocol

  • 1. Link-state routing Protocol Aung Thu Rha Hein Chinnawat Noosrikong
  • 2. Outline • Overview • Features of Link-State routing protocols • link-state routing algorithm • Dijkstra’s algorithm • OSPF • IS-IS • Advantages and Disadvantages of LS routing protocols
  • 3. Overview • One of two main classes of interior gateway routing protocols • OSPF, IS-IS • Performed by every switching node in the network Basic Concept • every node creates a map of the connectivity to the network • This graph shows which nodes are connected to which other nodes • Each node calculates the next best logical path to the destination • Collection of best paths form the routing table of the node
  • 4. Features of Link-state routing protocols Link-state advertisement (LSA) or Link-state Packet(LSP) • a small packet of routing information that is sent between routers Topological database or Link-state Database • a collection of information gathered from LSAs SPF algorithm • a calculation performed on the database that results in the SPF tree Routing table • a list of the known paths and interfaces
  • 5. link-state routing algorithm 1. Each router is responsible for meeting its neighbors and learning their names. • Used a Hello Protocol, which send a data packet contains RID and address of the network on which the packet is being sent 2. Each router constructs a LSP/LSA which consists of a list of names and cost for each of its neighbors. 3. The LSP/LSA is transmitted to all other routers. Each router stores the most recently generated LSP/LSA from each other router. • Link-state flooding: Sequencing and Aging procedures • Each routers store the identical Link State Database 4. Each router uses complete information on the network topology to compute the shortest path route to each destination node. • Use SPF or Dijkstra’s algorithm to calculate the shortest path
  • 6. Dijkstra’s algorithm Also known as the shortest path first (SPF) algorithm Nodes 2 3 4 5(b) 6 1(a) 7 9 ∞ ∞ 14 2 7 9<7+10 7+15 ∞ 14 3 7 9 22<11+ ∞ 14<7+1 10+7 0+2 6 7 9 22 9+2+10 14 +7
  • 8. Open Shortest Path First (OSPF) • A routing protocol developed for Internet Protocol networks by the Interior Gateway Protocol (IGP) • Based on the Dijkstra’s Algorithm • Serving large, heterogeneous internetworks • OSPF Version 1 (1988) • OSPF Version 2 (1998) Supported IPv4 • OSPF Version 3 (2008) Supported IPv6
  • 9. Open Shortest Path First (OSPF) OSPF can operate within a hierarchy Collection of networks under a common administration that share a common routing strategy
  • 10. Additional OSPF Features • Equal-cost • Multipath routing • Routing based on upper-layer type-of-service (TOS) requests
  • 11. IS-IS • Intermediate System-to-Intermediate System (IS-IS) • That floods the network with link-state information to build a complete, consistent picture of network topology • Each IS-IS router independently builds a database of the network's topology • IS-IS uses Dijkstra's algorithm for computing the best path through the network • IS-IS Metrics • A single required default metric with a maximum path value of 1024 • Three optional metrics (costs): • Delay • Expense • Error
  • 12. Integrated IS-IS • Integrated IS-IS is a version of the OSI IS-IS • To support more network layer protocols than just CLNP • Dual IS-IS • Implementations send only one set of routing updates • Supporting multiple network layer protocols in a router
  • 13. Advantages and Disadvantages of LS routing protocols Advantages • Smaller routing tables • Only a single optimal route for each network ID is stored in the routing table. • Low network overhead • do not exchange any routing information when the internetwork has converged. • Ability to scale. • scale well to large and very large internetworks. • Lower convergence time. • have a much lower convergence time and the internetwork is converged without routing loops.
  • 14. Advantages and Disadvantages of LS routing protocols(cont.) Disadvantages • Complex • much more complex and difficult to understand than DV routing protocols. • More difficult to configure. • implementation requires additional planning and configuration. • Resource intensive. • For very large internetworks, the LS database and the calculation of routing table entries can be memory and processor intensive.