SlideShare a Scribd company logo
CCNA 3 Week 2
Link State Protocols
OSPF
Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton
Distance Vector vs Link State
Distance Vector
– Copies Routing Table to
neighbours
– Updates frequently
– Distance metrics e.g. hop count
– Views network from prospective
of neighbours
– Slow to converge
– Loops a problem
– Easy to configure
– Consumes bandwidth
Link State
– Uses shortest path
– Updates event triggered
– Sends link-state packets to all
– Common view of network
– Fast convergence
– Less vulnerable to loops
– Harder to Configure
– Requires more memory and
CPU power
Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton
Link State Features
Router learn network info from ALL routers in a net
Routers multicast frequent hello packets
containing details of directly connected networks
Link-State Advertisments keep track of other
routers
Information used by router to calculate Shortest
Path to each network
Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton
Example Topology
Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton
Maintaining Routing Information
When a failure occurs, LSAs are multicast
– Routers forward multicasts on all ports except receiver
Each Link-State router updates its topology database with
new network state and recalculates
A link = an interface
Link-State info includes: IP Addr & subnet, net type,
connected routers
Best routes calculated from topology database and placed
in routing table
Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton
Network View
Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton
Advantages & Disadvantages
Advantages
– Fast convergence: changes
reported at once
– Robust against loops
– Routers all know topology
– Link-state packets
sequenced and aged
– Careful design minimises
link-state table size
Disadvantages
– Significant RAM and CPU
– Network design follows strict
rules
– Network admin must be
knowledgable (you guys!)
– Initial flooding impedes
performance
Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton
Comparison
After initial flood, routing table only changes if net
conditions change
– The partial update only contains information about links that have
changed.
– Reduces network load, faster propagation of changes
Link-state protocols support CIDR and VLSM.
In fact, link-state protocols generally outperform distance
vector protocols on any size network.
– Not always implemented due to hardware requirements and
admin expertise
OSPF
Open Shortest Path First
Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton
Introduction
Open non-proprietary standard protocol for TCP/IP
Widely used in industry
Preferable to RIP v1 or v2 because metrics are
better than simple hop count
Uses a hierarchical approach, with different areas
defined within a network
Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton
OSPF Terminology
Link: an interface on a routerLink-state: The status of the link between two routersTopological Database: The status of all routers on the
network
Area: each router within an area has the same link-state
information
Cost: assigned to each link, based on bandwidthRouting Table: generated when routing algorithm runs on
topological database
Adjacency Database: List of routers communicating directlyDesignated Router (DR): Elected to represent all routers
on the network
Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton
OSPF vs Distance Vector
Speed of convergence
Support for Variable Length Subnet Mask (VLSM)
Network size
Path selection
Grouping of members
Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton
SPF Algorithm
Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton
SPF Algorithm
Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton
OSPF Network Types
OSPF interfaces automatically recognize 3 types
of networks:
– Broadcast multi-access, such as Ethernet
– Point-to-point networks
– Nonbroadcast multi-access (NBMA), e.g. Frame Relay
Not desirable for every router to be adjacent to
every other in a broadcast network – overhead
Pick Designated Router (and Backup)
Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton
Use of Designated Router
Routers send their updates to the designated
router (Multicast to 224.0.0.6)
Designated Router updates all routers on network
using 224.0.0.5
As Designated Router is single point of failure,
Backup is also established
Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton
Hello Packets
Small layer 3 packets
Sent every 10 seconds to multicast 224.0.0.5
Used to ensure neighbours still running
Protocol used in election of DR
Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton
Protocol Steps
Use hello packets to announce selves
Develop adjacency relationships with neighbours
Use LSA and LSU packets to learn about topology
Calculate routing tables from topology
If changes occur, recalculate
Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton
Configure
R1(config)# router ospf <proc_id>
R1(config-router)# network <addr> <wildcard>
area <area>
Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton
Need to add loopback address
No active interfaces means router drops out of
OSPF
Logical loopback keeps process available
If present, loopback used as router ID
R1(config)# interface loopback 1
R1(config-if)# ip address <addr> <subnet>
Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton
Link costs
OSPF uses 108
/bandwidth as link cost
Set bandwidth of interface if needed:
R1(config-if)# bandwidth 56
May be necessary if mixed network uses other
calculations
R1(config-if)# ip ospf cost <number>
Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton
Authentication
Can require common password for updates
May be encrypted using MD5
See lab for details
Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton
Timers
OSPF routers must use the same timer values
Router(config-if)#ip ospf hello-intervalseconds
Router(config-if)#ip ospf dead-intervalseconds
Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton
Default Route
On the router connected to default connection:
Router(config)#ip route 0.0.0.0 0.0.0.0 [interface |
next-hop address ]
Must then instruct router to propagate default route
Router(config-router)#default-information
originate

More Related Content

What's hot

Self-Configuration and Self-Optimization Network
Self-Configuration and Self-Optimization NetworkSelf-Configuration and Self-Optimization Network
Self-Configuration and Self-Optimization Network
Praveen Kumar
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture
Raj vardhan
 
Mobile Ad-hoc and Sensor Networks
Mobile Ad-hoc and Sensor NetworksMobile Ad-hoc and Sensor Networks
Mobile Ad-hoc and Sensor Networks
Sushant Kushwaha
 
ZigBee
ZigBee ZigBee
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
Ramasubbu .P
 
Lte rrc-connection-setup-messaging
Lte rrc-connection-setup-messagingLte rrc-connection-setup-messaging
Lte rrc-connection-setup-messaging
Prashant Sengar
 
Chapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network DesignChapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network Design
nakomuri
 
12 wireless la-ns
12 wireless la-ns12 wireless la-ns
12 wireless la-ns
Hattori Sidek
 
high speed network
high speed networkhigh speed network
high speed network
John Berkmans
 
AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing)
ArunChokkalingam
 
802.15.5 mesh topology
802.15.5  mesh topology802.15.5  mesh topology
802.15.5 mesh topology
sunil raj kumar
 
Ethernet Frames Explained
Ethernet Frames ExplainedEthernet Frames Explained
Ethernet Frames Explained
Joshua Kathiravan
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
IJTET Journal
 
Token bus
Token busToken bus
Token bus
Denver Rockfreak
 
Wired LANs
Wired LANsWired LANs
Wired LANs
Meenakshi Paul
 
An access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la nsAn access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la ns
IEEEFINALYEARPROJECTS
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
Kathirvel Ayyaswamy
 
Network Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - EthernetNetwork Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - Ethernet
Abdelkhalik Mosa
 
802.11 Protocol Map
802.11 Protocol Map802.11 Protocol Map
802.11 Protocol Map
Chris x-MS
 
Iso layer detail
Iso layer detailIso layer detail
Iso layer detail
Palani Chinnasamy ☁
 

What's hot (20)

Self-Configuration and Self-Optimization Network
Self-Configuration and Self-Optimization NetworkSelf-Configuration and Self-Optimization Network
Self-Configuration and Self-Optimization Network
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture
 
Mobile Ad-hoc and Sensor Networks
Mobile Ad-hoc and Sensor NetworksMobile Ad-hoc and Sensor Networks
Mobile Ad-hoc and Sensor Networks
 
ZigBee
ZigBee ZigBee
ZigBee
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Lte rrc-connection-setup-messaging
Lte rrc-connection-setup-messagingLte rrc-connection-setup-messaging
Lte rrc-connection-setup-messaging
 
Chapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network DesignChapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network Design
 
12 wireless la-ns
12 wireless la-ns12 wireless la-ns
12 wireless la-ns
 
high speed network
high speed networkhigh speed network
high speed network
 
AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing)
 
802.15.5 mesh topology
802.15.5  mesh topology802.15.5  mesh topology
802.15.5 mesh topology
 
Ethernet Frames Explained
Ethernet Frames ExplainedEthernet Frames Explained
Ethernet Frames Explained
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
 
Token bus
Token busToken bus
Token bus
 
Wired LANs
Wired LANsWired LANs
Wired LANs
 
An access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la nsAn access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la ns
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Network Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - EthernetNetwork Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - Ethernet
 
802.11 Protocol Map
802.11 Protocol Map802.11 Protocol Map
802.11 Protocol Map
 
Iso layer detail
Iso layer detailIso layer detail
Iso layer detail
 

Similar to Ccna 3 week 2

CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
muazumuhammad6
 
Brkmpl 2333
Brkmpl 2333Brkmpl 2333
Brkmpl 2333
ronsito
 
Ospf
OspfOspf
Ospf
gopi1985
 
Routing Protocols
Routing Protocols Routing Protocols
Routing Protocols
KhushbirSinghSandhu
 
Mpls Traffic Engineering ppt
Mpls Traffic Engineering pptMpls Traffic Engineering ppt
Mpls Traffic Engineering ppt
Nitin Gehlot
 
Arun project-Final
Arun project-FinalArun project-Final
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ans
Ravi Kodoli
 
Mikrotik load balansing
Mikrotik load balansingMikrotik load balansing
Mikrotik load balansing
Кирилл Кекер
 
Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011
Dân Chơi
 
CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1
Chaing Ravuth
 
Ospf
OspfOspf
Ospf
OspfOspf
MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)
Vipin Sahu
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
Unni Kannan VijayaKumar
 
PLNOG 5: Emil Gągała - ADVANCED VPLS
PLNOG 5: Emil Gągała -  ADVANCED VPLSPLNOG 5: Emil Gągała -  ADVANCED VPLS
PLNOG 5: Emil Gągała - ADVANCED VPLS
PROIDEA
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
Pankaj Verma
 
Comprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTComprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoT
sulaiman_karim
 
CCNA3 Verson6 Chapter5
CCNA3 Verson6 Chapter5CCNA3 Verson6 Chapter5
CCNA3 Verson6 Chapter5
Chaing Ravuth
 
Lecture number 5 Theory.pdf(machine learning)
Lecture  number  5 Theory.pdf(machine learning)Lecture  number  5 Theory.pdf(machine learning)
Lecture number 5 Theory.pdf(machine learning)
ZainabShahzad9
 
ENCOR_Capitulo 2.pptx
ENCOR_Capitulo 2.pptxENCOR_Capitulo 2.pptx
ENCOR_Capitulo 2.pptx
ManuelRojas960410
 

Similar to Ccna 3 week 2 (20)

CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
 
Brkmpl 2333
Brkmpl 2333Brkmpl 2333
Brkmpl 2333
 
Ospf
OspfOspf
Ospf
 
Routing Protocols
Routing Protocols Routing Protocols
Routing Protocols
 
Mpls Traffic Engineering ppt
Mpls Traffic Engineering pptMpls Traffic Engineering ppt
Mpls Traffic Engineering ppt
 
Arun project-Final
Arun project-FinalArun project-Final
Arun project-Final
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ans
 
Mikrotik load balansing
Mikrotik load balansingMikrotik load balansing
Mikrotik load balansing
 
Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011
 
CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1
 
Ospf
OspfOspf
Ospf
 
Ospf
OspfOspf
Ospf
 
MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
 
PLNOG 5: Emil Gągała - ADVANCED VPLS
PLNOG 5: Emil Gągała -  ADVANCED VPLSPLNOG 5: Emil Gągała -  ADVANCED VPLS
PLNOG 5: Emil Gągała - ADVANCED VPLS
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
Comprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTComprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoT
 
CCNA3 Verson6 Chapter5
CCNA3 Verson6 Chapter5CCNA3 Verson6 Chapter5
CCNA3 Verson6 Chapter5
 
Lecture number 5 Theory.pdf(machine learning)
Lecture  number  5 Theory.pdf(machine learning)Lecture  number  5 Theory.pdf(machine learning)
Lecture number 5 Theory.pdf(machine learning)
 
ENCOR_Capitulo 2.pptx
ENCOR_Capitulo 2.pptxENCOR_Capitulo 2.pptx
ENCOR_Capitulo 2.pptx
 

Recently uploaded

Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 

Recently uploaded (20)

Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 

Ccna 3 week 2

  • 1. CCNA 3 Week 2 Link State Protocols OSPF
  • 2. Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton Distance Vector vs Link State Distance Vector – Copies Routing Table to neighbours – Updates frequently – Distance metrics e.g. hop count – Views network from prospective of neighbours – Slow to converge – Loops a problem – Easy to configure – Consumes bandwidth Link State – Uses shortest path – Updates event triggered – Sends link-state packets to all – Common view of network – Fast convergence – Less vulnerable to loops – Harder to Configure – Requires more memory and CPU power
  • 3. Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton Link State Features Router learn network info from ALL routers in a net Routers multicast frequent hello packets containing details of directly connected networks Link-State Advertisments keep track of other routers Information used by router to calculate Shortest Path to each network
  • 4. Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton Example Topology
  • 5. Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton Maintaining Routing Information When a failure occurs, LSAs are multicast – Routers forward multicasts on all ports except receiver Each Link-State router updates its topology database with new network state and recalculates A link = an interface Link-State info includes: IP Addr & subnet, net type, connected routers Best routes calculated from topology database and placed in routing table
  • 6. Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton Network View
  • 7. Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton Advantages & Disadvantages Advantages – Fast convergence: changes reported at once – Robust against loops – Routers all know topology – Link-state packets sequenced and aged – Careful design minimises link-state table size Disadvantages – Significant RAM and CPU – Network design follows strict rules – Network admin must be knowledgable (you guys!) – Initial flooding impedes performance
  • 8. Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton Comparison After initial flood, routing table only changes if net conditions change – The partial update only contains information about links that have changed. – Reduces network load, faster propagation of changes Link-state protocols support CIDR and VLSM. In fact, link-state protocols generally outperform distance vector protocols on any size network. – Not always implemented due to hardware requirements and admin expertise
  • 10. Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton Introduction Open non-proprietary standard protocol for TCP/IP Widely used in industry Preferable to RIP v1 or v2 because metrics are better than simple hop count Uses a hierarchical approach, with different areas defined within a network
  • 11. Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton OSPF Terminology Link: an interface on a routerLink-state: The status of the link between two routersTopological Database: The status of all routers on the network Area: each router within an area has the same link-state information Cost: assigned to each link, based on bandwidthRouting Table: generated when routing algorithm runs on topological database Adjacency Database: List of routers communicating directlyDesignated Router (DR): Elected to represent all routers on the network
  • 12. Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton OSPF vs Distance Vector Speed of convergence Support for Variable Length Subnet Mask (VLSM) Network size Path selection Grouping of members
  • 13. Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton SPF Algorithm
  • 14. Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton SPF Algorithm
  • 15. Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton OSPF Network Types OSPF interfaces automatically recognize 3 types of networks: – Broadcast multi-access, such as Ethernet – Point-to-point networks – Nonbroadcast multi-access (NBMA), e.g. Frame Relay Not desirable for every router to be adjacent to every other in a broadcast network – overhead Pick Designated Router (and Backup)
  • 16. Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton Use of Designated Router Routers send their updates to the designated router (Multicast to 224.0.0.6) Designated Router updates all routers on network using 224.0.0.5 As Designated Router is single point of failure, Backup is also established
  • 17. Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton Hello Packets Small layer 3 packets Sent every 10 seconds to multicast 224.0.0.5 Used to ensure neighbours still running Protocol used in election of DR
  • 18. Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton Protocol Steps Use hello packets to announce selves Develop adjacency relationships with neighbours Use LSA and LSU packets to learn about topology Calculate routing tables from topology If changes occur, recalculate
  • 19. Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton Configure R1(config)# router ospf <proc_id> R1(config-router)# network <addr> <wildcard> area <area>
  • 20. Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton Need to add loopback address No active interfaces means router drops out of OSPF Logical loopback keeps process available If present, loopback used as router ID R1(config)# interface loopback 1 R1(config-if)# ip address <addr> <subnet>
  • 21. Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton Link costs OSPF uses 108 /bandwidth as link cost Set bandwidth of interface if needed: R1(config-if)# bandwidth 56 May be necessary if mixed network uses other calculations R1(config-if)# ip ospf cost <number>
  • 22. Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton Authentication Can require common password for updates May be encrypted using MD5 See lab for details
  • 23. Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton Timers OSPF routers must use the same timer values Router(config-if)#ip ospf hello-intervalseconds Router(config-if)#ip ospf dead-intervalseconds
  • 24. Copyright © 2005 University of BoltonCopyright © 2005 University of Bolton Default Route On the router connected to default connection: Router(config)#ip route 0.0.0.0 0.0.0.0 [interface | next-hop address ] Must then instruct router to propagate default route Router(config-router)#default-information originate