SlideShare a Scribd company logo
OPEN SHORTEST PATH
FIRST (OSPF)
ROUTING PROTOCOL
A routing protocol specifies
how routers communicate with each other.
 Routing algorithms determine the specific
choice of route.
Suffered from problems of Distance Vector
Protocol
• Count to Infinity Problem
• Slow Convergence
• Large update packets
• Slow response to topological changes
Need for a Link State Protocol.
OSPF
• OSPF Open Shortest Path First (std protocol)
• Intra domain routing protocol based on
link-state routing protocol
• It uses SPF or dijkistra algorithm
• Unlimited hop count
• It’s a classless routing protocol
• Only equal cost load balancing
• Provides authentication of routing
messages
AREAS
AREAS
An OSPF network can be divided into sub-
domains called areas.
 An area is a logical collection of OSPF networks,
routers, and links that have the same area
identification.
Areas limit the scope of route information
distribution.
 Benefit of creating areas is to reduce the number
of routes to propagate—by the filtering and the
summarization of routes.
 Areas are identified by an area ID.
 All network inside an area must be
connected.
 At the border of an area, special router called
area border routers.
 It summarize the information and send to
other areas
BACKBONE AREA
 A backbone area—which combines a set of independent
areas into a single domain.
 The backbone has the reserved area ID of 0.0.0.0. The OSPF
backbone area is also known as area 0.
 The backbone acts as a hub for inter-area transit traffic and
the distribution of routing information between areas
 Each non-backbone area must be directly connected to the
backbone area.
 The backbone area must not be partitioned—divided into
smaller pieces—under any failure conditions
 The backbone serves as primary area and the other areas as
secondary areas.
 The router inside backbone area is known as backbone
routers.
OSPF (type of links)
• In OSPF , a connection called a link.
• Four types of links have been defined they
are:
COMMON HEADER
OSPF Packet Types
Hello subprotocol is intended to perform the following tasks
within OSPF:
Dynamic neighbor discovery
Detect unreachable neighbors
Ensure two-way communications between neighbors
Ensure correctness of basic interface parameters between
neighbors
Provide necessary information for the election of the Designated
and Backup Designated routers on a LAN segment (coming)
B. Database Description Message
 Is used mostly during the database exchange
 The first DBD packet is used to elect the master and slave relationship
and to set the initial sequence number elected by the master.
The router with the highest router ID becomes the master and initiates
the database synchronization.
The master sends the sequence number, and the slave acknowledges it.
 After the master and the slave are elected, the database synchronization
starts; in this process, the headers of all the LSAs are exchanged with
neighbors.
I Bit— When set to 1, this means that this is the first packet in DBD exchange.
M Bit— When set to 1, this means that more packets will follow.
MS Bit— Use this for master and slave. When this bit is set, it means that the
router is a master in the DBD exchange process. If this bit is set to 0, it means
that the router is the slave.
DBD Sequence Number— This field contains a unique value set by the
master. This sequence number is used during database exchange. Only a
master can increment the sequence number.
LSA Header— This field consists of a list of the link-state database headers.
C. Link-State Request Packets
 A link-state request packet, is sent if part of the database is
missing or out-of-date.
 The link-state request packet is used to retrieve that precise
piece of database information that is missing.
 Link-state packets are also used after the DBD exchange is
finished to request the LSAs that have been seen during the DBD
exchange.
D. Link-State Acknowledgment Packet
The link-state acknowledgment packet, is used to acknowledge each
LSA.
This packet is sent in response to link-state update packets.
 Multiple LSAs can be acknowledged in a single link-state
acknowledgment packet.
This packet is responsible for the reliable delivery of link-state update
packets.
Figure illustrates the link-state acknowledgment packet format.
ADVANTAGES OF OSPF
• Unlimited hop count
• Open standard
• Loop free
• Fast convergence
DISADVANTAGES OF OSPF
• Complex design
• Supports only equal cost balancing
• Consumes a lot of CPU resources
OPEN SHORTEST PATH FIRST (OSPF)

More Related Content

What's hot

Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information ProtocolKashif Latif
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path FirstKashif Latif
 
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)
NetProtocol Xpert
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
sarasanandam
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
Sourabh Goyal
 
IS-IS Protocol Introduction
IS-IS Protocol IntroductionIS-IS Protocol Introduction
IS-IS Protocol Introduction
NetProtocol Xpert
 
Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP)Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP)
Nutan Singh
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
NetProtocol Xpert
 
EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)
NetProtocol Xpert
 
IP Multicasting
IP MulticastingIP Multicasting
IP Multicasting
Tharindu Kumara
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
Muuluu
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
NetProtocol Xpert
 
Bgp
BgpBgp
Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD) Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD)
KHNOG
 
BGP protocol presentation
BGP protocol  presentationBGP protocol  presentation
BGP protocol presentation
Gorantla Mohanavamsi
 
Layer 2 switching
Layer 2 switchingLayer 2 switching
Layer 2 switching
NetProtocol Xpert
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
techbed
 
Router & functionality
Router & functionalityRouter & functionality
Router & functionality
AmzadKhn
 

What's hot (20)

Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
 
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
IS-IS Protocol Introduction
IS-IS Protocol IntroductionIS-IS Protocol Introduction
IS-IS Protocol Introduction
 
Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP)Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP)
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
 
EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)
 
IP Multicasting
IP MulticastingIP Multicasting
IP Multicasting
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
Bgp
BgpBgp
Bgp
 
Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD) Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD)
 
BGP protocol presentation
BGP protocol  presentationBGP protocol  presentation
BGP protocol presentation
 
Layer 2 switching
Layer 2 switchingLayer 2 switching
Layer 2 switching
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
 
Router & functionality
Router & functionalityRouter & functionality
Router & functionality
 

Similar to OPEN SHORTEST PATH FIRST (OSPF)

Osp fv3 cs
Osp fv3 csOsp fv3 cs
Osp fv3 cs
Fred Bovy
 
Ospf
OspfOspf
OSPF.pptx
OSPF.pptxOSPF.pptx
OSPF.pptx
Atakan ATAK
 
Ospf infinite skills
Ospf infinite skillsOspf infinite skills
Ospf infinite skills
ssarachman1
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
Reetesh Gupta
 
Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01
Sachin Morya
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
Atakan ATAK
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
AIRTEL
 
C C N A Day3
C C N A  Day3C C N A  Day3
C C N A Day3
darulquthni
 
Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocols
assinha
 
OSPF Open Shortest Path First protocol full details
OSPF Open Shortest Path First  protocol full detailsOSPF Open Shortest Path First  protocol full details
OSPF Open Shortest Path First protocol full details
Vignesh kumar
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
sarasanandam
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
N.Jagadish Kumar
 
Ospf and eigrp concepts and configuration
Ospf and eigrp concepts and configurationOspf and eigrp concepts and configuration
Ospf and eigrp concepts and configurationIT Tech
 
CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
muazumuhammad6
 

Similar to OPEN SHORTEST PATH FIRST (OSPF) (20)

Osp fv3 cs
Osp fv3 csOsp fv3 cs
Osp fv3 cs
 
Ospf
OspfOspf
Ospf
 
OSPF.pptx
OSPF.pptxOSPF.pptx
OSPF.pptx
 
Ospf infinite skills
Ospf infinite skillsOspf infinite skills
Ospf infinite skills
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
 
C C N A Day3
C C N A  Day3C C N A  Day3
C C N A Day3
 
Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocols
 
OSPF Open Shortest Path First protocol full details
OSPF Open Shortest Path First  protocol full detailsOSPF Open Shortest Path First  protocol full details
OSPF Open Shortest Path First protocol full details
 
Ospf routing protocol
Ospf routing protocolOspf routing protocol
Ospf routing protocol
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
ch2_p3_ospf.pptx
ch2_p3_ospf.pptxch2_p3_ospf.pptx
ch2_p3_ospf.pptx
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Ospf and eigrp concepts and configuration
Ospf and eigrp concepts and configurationOspf and eigrp concepts and configuration
Ospf and eigrp concepts and configuration
 
CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
 

Recently uploaded

Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 

Recently uploaded (20)

Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 

OPEN SHORTEST PATH FIRST (OSPF)

  • 2. ROUTING PROTOCOL A routing protocol specifies how routers communicate with each other.  Routing algorithms determine the specific choice of route.
  • 3. Suffered from problems of Distance Vector Protocol • Count to Infinity Problem • Slow Convergence • Large update packets • Slow response to topological changes Need for a Link State Protocol.
  • 4. OSPF • OSPF Open Shortest Path First (std protocol) • Intra domain routing protocol based on link-state routing protocol • It uses SPF or dijkistra algorithm • Unlimited hop count • It’s a classless routing protocol • Only equal cost load balancing • Provides authentication of routing messages
  • 6. AREAS An OSPF network can be divided into sub- domains called areas.  An area is a logical collection of OSPF networks, routers, and links that have the same area identification. Areas limit the scope of route information distribution.  Benefit of creating areas is to reduce the number of routes to propagate—by the filtering and the summarization of routes.
  • 7.  Areas are identified by an area ID.  All network inside an area must be connected.  At the border of an area, special router called area border routers.  It summarize the information and send to other areas
  • 8. BACKBONE AREA  A backbone area—which combines a set of independent areas into a single domain.  The backbone has the reserved area ID of 0.0.0.0. The OSPF backbone area is also known as area 0.  The backbone acts as a hub for inter-area transit traffic and the distribution of routing information between areas  Each non-backbone area must be directly connected to the backbone area.
  • 9.  The backbone area must not be partitioned—divided into smaller pieces—under any failure conditions  The backbone serves as primary area and the other areas as secondary areas.  The router inside backbone area is known as backbone routers.
  • 10.
  • 11. OSPF (type of links) • In OSPF , a connection called a link. • Four types of links have been defined they are:
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 18.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. Hello subprotocol is intended to perform the following tasks within OSPF: Dynamic neighbor discovery Detect unreachable neighbors Ensure two-way communications between neighbors Ensure correctness of basic interface parameters between neighbors Provide necessary information for the election of the Designated and Backup Designated routers on a LAN segment (coming)
  • 26. B. Database Description Message  Is used mostly during the database exchange  The first DBD packet is used to elect the master and slave relationship and to set the initial sequence number elected by the master. The router with the highest router ID becomes the master and initiates the database synchronization. The master sends the sequence number, and the slave acknowledges it.  After the master and the slave are elected, the database synchronization starts; in this process, the headers of all the LSAs are exchanged with neighbors.
  • 27.
  • 28. I Bit— When set to 1, this means that this is the first packet in DBD exchange. M Bit— When set to 1, this means that more packets will follow. MS Bit— Use this for master and slave. When this bit is set, it means that the router is a master in the DBD exchange process. If this bit is set to 0, it means that the router is the slave. DBD Sequence Number— This field contains a unique value set by the master. This sequence number is used during database exchange. Only a master can increment the sequence number. LSA Header— This field consists of a list of the link-state database headers.
  • 29. C. Link-State Request Packets  A link-state request packet, is sent if part of the database is missing or out-of-date.  The link-state request packet is used to retrieve that precise piece of database information that is missing.  Link-state packets are also used after the DBD exchange is finished to request the LSAs that have been seen during the DBD exchange.
  • 30.
  • 31. D. Link-State Acknowledgment Packet The link-state acknowledgment packet, is used to acknowledge each LSA. This packet is sent in response to link-state update packets.  Multiple LSAs can be acknowledged in a single link-state acknowledgment packet. This packet is responsible for the reliable delivery of link-state update packets. Figure illustrates the link-state acknowledgment packet format.
  • 32.
  • 33. ADVANTAGES OF OSPF • Unlimited hop count • Open standard • Loop free • Fast convergence DISADVANTAGES OF OSPF • Complex design • Supports only equal cost balancing • Consumes a lot of CPU resources