OSPF is a link-state interior gateway protocol that uses shortest path first algorithm to calculate routes. It elects a designated router that exchanges link-state advertisements and database information with other routers to choose the best routes. OSPF supports equal cost multi-path routing, uses different types of link-state advertisements, and allows dividing networks into areas to reduce routing overhead. It authenticates messages to prevent routing attacks.
This slide contains the basic and advanced concept of OSPF routing protocol, according to the latest version of Cisco books, and I presented it at IRAN TIC company. In the next slide, I will upload an attractive advanced feature about OSPF.
This slide contains the basic and advanced concept of OSPF routing protocol, according to the latest version of Cisco books, and I presented it at IRAN TIC company. In the next slide, I will upload an attractive advanced feature about OSPF.
ospf is routing protocol.The OSPF protocol is a link state Protocol that handles routing for IP traffic.The two important concepts in case of OSPF are Autonomous Systems and Areas.
VPN mainly depends on :-
different geographical area.
different service providers.
For this, VPN information has to mutually redistributed.
VPN mainly depends on :-
different geographical area.
different service providers.
For this, VPN information has to mutually redistributed.
Inter ISP’s. allow VPN information to redistributed between adjacent MPLS.
So client sites communicate with each other across multiple ISP’s
he Associate level of Cisco Certifications can begin directly with CCNA for network installation, operations and troubleshooting or CCDA for network design. Think of the Associate Level as the foundation level of networking certification.
A PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
2. INTRODUCTION
TO OSPF
• Developed by IETF – RFC1247
• OSPF v2 described in RFC2328/STD54
• OSPF v3 described in RFC2740 - IPv6
• Link state/Shortest Path First Technology
• Dynamic Routing
• Interior gateway protocol
• Fast Convergence
• ECMP
• Route authentication
3. HOW IT WORKS
Become neighbours - Two routers
running OSPF on the same link agree to
form a neighbour relationship
Exchange database information - The
neighbouring routers exchange their
LSDB information with each other
Choose the best routes – Each router
chooses the best routes to add to its
routing table based on the learned LSDB
information
4. OSPF METRIC
• It is calculated by dividing reference bandwidth (100 mbps
by default) value by interface’s bandwidth
• Anything faster than Fast Ethernet will be a cost of 1.
• It can be changed using the command : auto-cost refence-
bandwidth mbps or ip ospf cost
5. ECMP
• Equal Cost Multi-Path or ECMP is a
routing strategy where packets
towards a single destination IP
address are load-balanced over
multiple best paths with equal
metrics.
6. HELLO MESSAGES
• When OSPF is activated on an interface , the router starts
sending OSPF hello messages out of the interface at regular
intervals (10 s by default)
• They are multicast to 224.0.0.5
• Dead timer - how long the router will wait without hearing a
HELLO message before it assumes the neighbor is dead (40 s
by default)
• The passive interface command tells the router to stop
sending OSPF HELLO messages out of the interface
7. LOOPBACK INTERFACE
• It is a virtual interface in the router .
• It is always up/up .
• It provides a consistent IP address that can be used to reach the router .
11. DR AND BDR
• Only DR and BDR form full
adjacencies with other routers
• The remaining routers remain in a “2-
way” state with each other
• If DR or BDR “disappear”, re-election
of missing router takes place
12. OSPF NEIGHBOR REQUIREMENTS
Area must
match
Interfaces must
be in the same
subnet
OSPF process
must not be
shutdown
Hello and Dead
timers must
match
Authentification
settings must
match
IP MTU settings
must match
OSPf network
type must
match
13. OSPF AREAS
• It is uses to divide up the network
• Small networks can be single-areas without any negative effects on performance .
• In Larger networks , a single-area design can have negative effects :
SFP algorithm takes more time to calculate routes
Larger LSDB takes up memory
Any small change in the network causes every router to flood LSAs and run the SPF algorithm again
• The backbone area is an area that all other areas must connect to .
15. LSA 1
• This LSA contains a list with all the directly
connected links of this route , it always
stays within the area
16. LSA 2
• The network LSA or type 2 is created
for each multi-access network ,
generated by the DR , In this LSA we
will find all the routers that are
connected to the multi-access
network, the DR and of course the
prefix and subnet mask , the network
LSA always stays within the area
17. LSA 3 SUMMARY
• This LSA generated by the ABR will
flood into all the other areas of our
OSPF network. This way all the
routers in other areas will know
about the prefixes from other areas.
18. TYPE 4 SUMMARY
ASBR LSA
• This LSA will also be flooded in all
other areas and is required so all
OSPF routers know where to find the
ASBR
19. LSA TYPE 5
• Generated by the ASBR to advertise
external redistributed routes into the
OSPF’s AS.
20. STANDARD AREA
• OSPF packets can be normally
transmitted. It supports 1, 2, 3, 4, and
5 LSAs
21. STUB AREA
• This area does not accept any
external routes of non-OSPF network
, this area supports 1, 2, and 3 LSAs
22. TOTALLY STUBBY
AREA
• this area does not accept external
routes and does not accept routes
from other areas , This area supports
Type 1, Type 2 LSAs, and Type 3 LSAs
with default routes
23. NO SO STUBBY AREA
• this mode allows the introduction of
external routes in a completely stub
area environment
24. OSPF NETWORK TYPES
• Broadcast : enabled by default on
Ethernet and FDDI interfaces .
• Point to point : enabled by default on
PPP and HDLC interfaces (no DR/DBR
election).
25. VIRTUAL LINK
• By using a virtual link, we can extend area
0 through area 1 so area 2 will be “directly
connected” to area 0
26. OSPF AUTHENTIFICATION
• OSPF can be configured to authenticate every OSPF message. This is usually done to prevent
a rogue router from injecting false routing information and therefore causing a Denial-of-Service
attack.
• Two types of authentication can be used
clear text authentication
MD5 authentication