OSPF is an intra-domain routing protocol that uses a link-state algorithm to calculate the shortest path to destinations within an autonomous system. It divides an autonomous system into areas to limit routing updates and allows for route summarization between areas. OSPF uses hello packets to discover neighbors, database description packets to exchange routing information, link-state request packets to request updates, and link-state acknowledgment packets to acknowledge receipt of updates.
Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet.
IP multicast is a method of sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission. It is often employed for streaming media applications on the Internet and private networks.(wikipedia)
Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet.
IP multicast is a method of sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission. It is often employed for streaming media applications on the Internet and private networks.(wikipedia)
OSPF is an IGP standardized by the IETF and commonly used in large Enterprise networks. OSPF is a link-state routing protocol providing fast convergence and excellent scalability. Basically this presentation contains information about the OSPF routing protocol. As much as possible the information was tried to be summarized and a slideshow of visual weight was made.
he Associate level of Cisco Certifications can begin directly with CCNA for network installation, operations and troubleshooting or CCDA for network design. Think of the Associate Level as the foundation level of networking certification.
This document describes the features of the operation of the OSPF routing protocol in general. In some subjects, theoretical information that was explained by establishing lab environments was reinforced by applications.
The purpose of this document is not to analyze OSPF from start to finish, but to create a simple quick learning booklet. For this reason, some topics are described only superficially, while some topics details are covered. Also, some concepts such as Sham Link or FRR are not included in the document.
A PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
OSPF Open Shortest Path First protocol full detailsVignesh kumar
Open Shortest Path First (OSPF) is a link-state routing protocol that was developed for IP networks and is based on the Shortest Path First (SPF) algorithm. OSPF is an Interior Gateway Protocol (IGP).
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
2. ROUTING PROTOCOL
A routing protocol specifies
how routers communicate with each other.
Routing algorithms determine the specific
choice of route.
3. Suffered from problems of Distance Vector
Protocol
• Count to Infinity Problem
• Slow Convergence
• Large update packets
• Slow response to topological changes
Need for a Link State Protocol.
4. OSPF
• OSPF Open Shortest Path First (std protocol)
• Intra domain routing protocol based on
link-state routing protocol
• It uses SPF or dijkistra algorithm
• Unlimited hop count
• It’s a classless routing protocol
• Only equal cost load balancing
• Provides authentication of routing
messages
6. AREAS
An OSPF network can be divided into sub-
domains called areas.
An area is a logical collection of OSPF networks,
routers, and links that have the same area
identification.
Areas limit the scope of route information
distribution.
Benefit of creating areas is to reduce the number
of routes to propagate—by the filtering and the
summarization of routes.
7. Areas are identified by an area ID.
All network inside an area must be
connected.
At the border of an area, special router called
area border routers.
It summarize the information and send to
other areas
8. BACKBONE AREA
A backbone area—which combines a set of independent
areas into a single domain.
The backbone has the reserved area ID of 0.0.0.0. The OSPF
backbone area is also known as area 0.
The backbone acts as a hub for inter-area transit traffic and
the distribution of routing information between areas
Each non-backbone area must be directly connected to the
backbone area.
9. The backbone area must not be partitioned—divided into
smaller pieces—under any failure conditions
The backbone serves as primary area and the other areas as
secondary areas.
The router inside backbone area is known as backbone
routers.
10.
11. OSPF (type of links)
• In OSPF , a connection called a link.
• Four types of links have been defined they
are:
25. Hello subprotocol is intended to perform the following tasks
within OSPF:
Dynamic neighbor discovery
Detect unreachable neighbors
Ensure two-way communications between neighbors
Ensure correctness of basic interface parameters between
neighbors
Provide necessary information for the election of the Designated
and Backup Designated routers on a LAN segment (coming)
26. B. Database Description Message
Is used mostly during the database exchange
The first DBD packet is used to elect the master and slave relationship
and to set the initial sequence number elected by the master.
The router with the highest router ID becomes the master and initiates
the database synchronization.
The master sends the sequence number, and the slave acknowledges it.
After the master and the slave are elected, the database synchronization
starts; in this process, the headers of all the LSAs are exchanged with
neighbors.
27.
28. I Bit— When set to 1, this means that this is the first packet in DBD exchange.
M Bit— When set to 1, this means that more packets will follow.
MS Bit— Use this for master and slave. When this bit is set, it means that the
router is a master in the DBD exchange process. If this bit is set to 0, it means
that the router is the slave.
DBD Sequence Number— This field contains a unique value set by the
master. This sequence number is used during database exchange. Only a
master can increment the sequence number.
LSA Header— This field consists of a list of the link-state database headers.
29. C. Link-State Request Packets
A link-state request packet, is sent if part of the database is
missing or out-of-date.
The link-state request packet is used to retrieve that precise
piece of database information that is missing.
Link-state packets are also used after the DBD exchange is
finished to request the LSAs that have been seen during the DBD
exchange.
30.
31. D. Link-State Acknowledgment Packet
The link-state acknowledgment packet, is used to acknowledge each
LSA.
This packet is sent in response to link-state update packets.
Multiple LSAs can be acknowledged in a single link-state
acknowledgment packet.
This packet is responsible for the reliable delivery of link-state update
packets.
Figure illustrates the link-state acknowledgment packet format.
32.
33. ADVANTAGES OF OSPF
• Unlimited hop count
• Open standard
• Loop free
• Fast convergence
DISADVANTAGES OF OSPF
• Complex design
• Supports only equal cost balancing
• Consumes a lot of CPU resources