SlideShare a Scribd company logo
© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
ITE PC v4.0
Chapter 1 1
Link-State Routing
Protocols
Routing Protocols and Concepts – Chapter 10
Modified by Tony Chen
04/01/2008
ITE PC v4.0
Chapter 1 2© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Notes:
 If you see any mistake on my PowerPoint slides or if
you have any questions about the materials, please
feel free to email me at chento@cod.edu.
Thanks!
Tony Chen
College of DuPage
Cisco Networking Academy
ITE PC v4.0
Chapter 1 3© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Objectives
 Describe the basic features & concepts of link-state
routing protocols.
– Distance vector routing protocols are like road signs
because routers must make preferred path decisions based
on a distance or metric to a network.
– Link-state routing protocols are more like a road map
because they create a topological map of the network and
each router uses this map to determine the shortest path to
each network.
– The ultimate objective is that every router receives all of the
link-state information about all other routers in the routing
area. With this link-state information, each router can create
its own topological map of the network and independently
calculate the shortest path to every network.
 List the benefits and requirements of link-state routing
protocols.
ITE PC v4.0
Chapter 1 4© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Link-State Routing
 Link state routing protocols
-Also known as shortest path first algorithms
-These protocols built around Dijkstra’s SPF
OSPF will be discussed in Chapter 11, and IS-IS will be discussed in CCNP.
ITE PC v4.0
Chapter 1 5© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Link-State Routing
 Dikjstra’s algorithm also known as the shortest path first
(SPF) algorithm
–This algorithm accumulates costs along each path, from
source to destination.
ITE PC v4.0
Chapter 1 6© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Link-State Routing
 The shortest path to a destination is not necessarily the
path with the least number of hops
ITE PC v4.0
Chapter 1 7© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Link-State Routing Process
 How routers using Link State Routing Protocols reach convergence
1. Each routers learns about its own directly connected networks
– interface is in the up state
1. Each router is responsible for meeting its neighbors on directly
connected networks
– exchange hello packet to other directly connected link state routers.
1. Each router builds a Link-State Packet (LSP) containing the state of
each directly connected link
– recording all the pertinent information about each neighbor, including
neighbor ID, link type, and bandwidth.
1. Each router floods the LSP to all neighbors, who then store all LSPs
received in a database.
– Each router stores a copy of each LSP received from its neighbors in
a local database.
1. Each router uses the database to construct a complete map of the
topology and computes the best path to each destination network.
– The SPF algorithm is used to construct the map of the topology and
to determine the best path to each network.
ITE PC v4.0
Chapter 1 8© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Link-State Routing:
Step 1 – Learn about directly connected Networks
 Link
This is an interface on a
router
 Link state
This is the information
about the state of the links
ITE PC v4.0
Chapter 1 9© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Link-State Routing:
step 2 - Sending Hello Packets to Neighbors
 Link state routing protocols use a hello protocol
Purpose of a hello protocol:
-To discover neighbors (that use the same
link state routing protocol) on its link
ITE PC v4.0
Chapter 1 10© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
 Connected interfaces that are
using the same link state
routing protocols will exchange
hello packets.
 Once routers learn it has
neighbors they form an
adjacency
– 2 adjacent neighbors will
exchange hello packets
– These packets will serve as a
keep alive function
Link-State Routing:
step 2 - Sending Hello Packets to Neighbors
ITE PC v4.0
Chapter 1 11© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
 Contents of LSP:
– State of each directly connected link
– Includes information about
neighbors such as neighbor ID, link
type, & bandwidth.
 A simplified version of the LSPs from
R1 is:
1. R1; Ethernet network 10.1.0.0/16;
Cost 2
2. R1 -> R2; Serial point-to-point
network; 10.2.0.0/16; Cost 20
3. R1 -> R3; Serial point-to-point
network; 10.3.0.0/16; Cost 5
4. R1 -> R4; Serial point-to-point
network; 10.4.0.0/16; Cost 20
Link-State Routing:
step 3 - Building the Link State Packet (LSP)
ITE PC v4.0
Chapter 1 12© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
 Once LSP are created they are
forwarded out to neighbors.
–Each router floods its link-state
information to all other link-state
routers in the routing area.
–Whenever a router receives an LSP
from a neighboring router, it
immediately sends that LSP out all
other interfaces except the interface
that received the LSP.
–This process creates a flooding
effect of LSPs from all routers
throughout the routing area.
Link-State Routing:
step 4 - Flooding LSPs to Neighbors
ITE PC v4.0
Chapter 1 13© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
 LSPs are sent out under the following conditions
– Initial router start up or routing process
– When there is a change in topology
• including a link going down or coming up, or a neighbor
adjacency being established or broken
Link-State Routing:
step 4 - Flooding LSPs to Neighbors
ITE PC v4.0
Chapter 1 14© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
 Routers use a database to
construct a topology map of the
network
–After each router has propagated
its own LSPs using the link-state
flooding process, each router will
then have an LSP from every link-
state router in the routing area.
–These LSPs are stored in the link-
state database.
–Each router in the routing area can
now use the SPF algorithm to
construct the SPF trees that you saw
earlier.
Link-State Routing:
step 5 - Constructing a link state data base
ITE PC v4.0
Chapter 1 15© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Link-State Routing:
step 5 - Constructing a link state data base
router R1 has learned the link-state
information for each router in its
routing area.
With a complete link-state database, R1
can now use the database and the
shortest path first (SPF) algorithm to
calculate the preferred path or shortest
path to each network.
ITE PC v4.0
Chapter 1 16© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
 Process begins by examining R2’s LSP information
–R1 can ignore the first LSP, because R1 already knows that it is
connected to R2 on network 10.2.0.0/16 with a cost of 20.
–R1 can use the second LSP and create a link from R2 to another
router, R5, with the network 10.9.0.0/16 and a cost of 10. This
information is added to the SPF tree.
–Using the third LSP, R1 has learned that R2 has a network
10.5.0.0/16 with a cost of 2 and with no neighbors. This link is
added to R1's SPF tree.
Link-State Routing:
Example - How R1 constructs its SPF tree.
ITE PC v4.0
Chapter 1 17© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
 Process begins by examining R3’s LSP information
–R1 can ignore the first LSP, because R1 already knows that it is
connected to R3 on network 10.3.0.0/16 with a cost of 5.
–R1 can use the second LSP and create a link from R3 to the
router R4, with the network 10.7.0.0/16 and a cost of 10. This
information is added to the SPF tree.
–Using the third LSP, R1 has learned that R3 has a network
10.6.0.0/16 with a cost of 2 and with no neighbors. This link is
added to R1's SPF tree.
Link-State Routing:
Example - How R1 constructs its SPF tree.
ITE PC v4.0
Chapter 1 18© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
 Process begins by examining R4’s LSP information
–R1 can ignore the first LSP because R1 already knows that it is
connected to R4 on network 10.4.0.0/16 with a cost of 20.
–R1 can also ignore the second LSP because SPF has already learned
about the network 10.6.0.0/16 with a cost of 10 from R3.
–However, R1 can use the third LSP to create a link from R4 to the router
R5, with the network 10.10.0.0/16 and a cost of 10. This information is
added to the SPF tree.
–Using the fourth LSP, R1 learns that R4 has a network 10.8.0.0/16 with a
cost of 2 and with no neighbors. This link is added to R1's SPF tree.
Link-State Routing:
Example - How R1 constructs its SPF tree.
ITE PC v4.0
Chapter 1 19© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
 Process begins by examining R5’s LSP information
–R1 can ignore the first two LSPs (for the networks 10.9.0.0/16 and
10.10.0.0/16), because SPF has already learned about these links
and added them to the SPF tree.
–R1 can process the third LSP learning that R5 has a network
10.11.0.0/16 with a cost of 2 and with no neighbors. This link is
added to the SPF tree for R1.
Link-State Routing:
Example - How R1 constructs its SPF tree.
ITE PC v4.0
Chapter 1 20© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Link-State Routing
 Determining the shortest path
–The shortest path to a destination
determined by adding the costs & finding the
lowest cost
•Network 10.5.0.0/16 via R2 serial 0/0/0
at a cost of 22
•Network 10.6.0.0/16 via R3 serial 0/0/1
at a cost of 7
•Network 10.7.0.0/16 via R3 serial 0/0/1
at a cost of 15
•Network 10.8.0.0/16 via R3 serial 0/0/1
at a cost of 17
•Network 10.9.0.0/16 via R2 serial 0/0/0
at a cost of 30
•Network 10.10.0.0/16 via R3 serial 0/0/1
at a cost of 25
•Network 10.11.0.0/16 via R3 serial 0/0/1
at a cost of 27
Only the LANs are shown in
the table, but SPF can also be
used to determine the shortest
path to each WAN link
network.
ITE PC v4.0
Chapter 1 21© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Link-State Routing
 Once the SPF algorithm has
determined the shortest path
routes, these routes are placed in
the routing table.
 The routing table will also include
all directly connected networks
and routes from any other
sources, such as static routes.
Packets will now be forwarded
according to these entries in the
routing table.
ITE PC v4.0
Chapter 1 22© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Link-State Routing Protocols
Advantages of a Link-State Routing Protocol
Routing
protocol
Builds
Topological
map
Router can
independently
determine the
shortest path
to every
network.
Convergence
Event driven
routing
updates
Use
of
LSP
Distance
vector
No No Slow Generally No No
Link State Yes Yes Fast Generally Yes Yes
ITE PC v4.0
Chapter 1 23© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Link-State Routing Protocols
 There are several advantages of link-state routing protocols compared to distance vector
routing protocols.
 Builds a Topological Map
• Link-state routing protocols create a topological map, or SPF tree of the network topology.
•Using the SPF tree, each router can independently determine the shortest path to every network.
• Distance vector routing protocols do not have a topological map of the network.
•Routers implementing a distance vector routing protocol only have a list of networks, which includes
the cost (distance) and next-hop routers (direction) to those networks.
 Fast Convergence
• When receiving a Link-state Packet (LSP), link-state routing protocols immediately flood the LSP out all
interfaces except for the interface from which the LSP was received.
• A router using a distance vector routing protocol needs to process each routing update and update its
routing table before flooding them out other interfaces, even with triggered updates.
 Event-driven Updates
• After the initial flooding of LSPs, link-state routing protocols only send out an LSP when there is a change
in the topology. The LSP contains only the information regarding the affected link.
• Unlike some distance vector routing protocols, link-state routing protocols do not send periodic updates.
 Hierarchical Design
• Link-state routing protocols such as OSPF and IS-IS use the concept of areas. Multiple areas create a
hierarchical design to networks, allowing for better route aggregation (summarization) and the isolation of
routing issues within an area.
ITE PC v4.0
Chapter 1 24© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Link-State Routing Protocols
Requirements for using a link state routing protocol
 Memory requirements
– Typically link state routing protocols use more memory
 Processing Requirements
– More CPU processing is required of link state routing
protocols
 Bandwidth Requirements
– Initial startup of link state routing protocols can consume lots
of bandwidth
– This should only occur during initial startup of routers, but can
also be an issue on unstable networks.
ITE PC v4.0
Chapter 1 25© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Link-State Routing Protocols
 Modern link-state routing protocols are designed to
minimize the effects on memory, CPU, and
bandwidth.
• The use and configuration of multiple areas can reduce
the size of the link-state databases. Multiple areas can
also limit the amount of link-state information flooding
in a routing domain and send LSPs only to those
routers that need them.
• For example, when there is a change in the topology,
only those routers in the affected area receive the LSP
and run the SPF algorithm.
• This can help isolate an unstable link to a specific area
in the routing domain.
 In the figure, If a network in Area 51 goes down, the
LSP with the information about this downed link is
only flooded to other routers in that area.
• Routers in other areas will learn that this route is down,
but this will be done with a type of link-state packet that
does not cause them to rerun their SPF algorithm.
Note: Multiple areas
with OSPF and IS-IS
are discussed in
CCNP
ITE PC v4.0
Chapter 1 26© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Link-State Routing Protocols
 2 link state routing protocols used for routing IP
-Open Shortest Path First (OSPF)
-Intermediate System-Intermediate System (IS-IS)
ITE PC v4.0
Chapter 1 27© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Summary
 Link State Routing protocols are also known as
Shortest Path First protocols
 Summarizing the link state process
-Routers 1ST learn of directly connected networks
-Routers then say “hello” to neighbors
-Routers then build link state packets
-Routers then flood LSPs to all neighbors
-Routers use LSP database to build a network topology
map & calculate the best path to each destination
ITE PC v4.0
Chapter 1 28© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Summary
 Link
An interface on the router
 Link State
Information about an interface such as
-IP address
-Subnet mask
-Type of network
-Cost associated with link
-Neighboring routers on the link
ITE PC v4.0
Chapter 1 29© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Summary
 Link State Packets
After initial flooding, additional LSP are sent out
when a change in topology occurs
 Examples of link state routing protocols
-Open shortest path first
-IS-IS

More Related Content

What's hot

Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPFarpit
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangAnil Nembang
 
Communities and DDoS Mitigation at CATNIX
Communities and DDoS Mitigation at CATNIXCommunities and DDoS Mitigation at CATNIX
Communities and DDoS Mitigation at CATNIX
CSUC - Consorci de Serveis Universitaris de Catalunya
 
IP Routing
IP RoutingIP Routing
IP Routing
Peter R. Egli
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
darulquthni
 
Ccna3 ospf
Ccna3 ospfCcna3 ospf
Ccna3 ospf1 2d
 
Ospf
OspfOspf
Enrutamiento en solaris 10
Enrutamiento en solaris 10Enrutamiento en solaris 10
Enrutamiento en solaris 10Andrés Jeff
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
danishrafiq
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
Aung Thu Rha Hein
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
Atakan ATAK
 
Spaning Tree Protocol
Spaning Tree ProtocolSpaning Tree Protocol
Spaning Tree Protocol
Atakan ATAK
 
Distance vector and link state routing protocol
Distance vector and link state routing protocolDistance vector and link state routing protocol
Distance vector and link state routing protocol
CCNAStudyGuide
 
200-125-ccna-v3
200-125-ccna-v3200-125-ccna-v3
200-125-ccna-v3Ibby Nuj
 
OSPF Basics
OSPF BasicsOSPF Basics
OSPF Basics
Martin Bratina
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
Shubham Khedekar
 

What's hot (19)

Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPF
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil Nembang
 
Ospf routing protocol
Ospf routing protocolOspf routing protocol
Ospf routing protocol
 
Communities and DDoS Mitigation at CATNIX
Communities and DDoS Mitigation at CATNIXCommunities and DDoS Mitigation at CATNIX
Communities and DDoS Mitigation at CATNIX
 
IP Routing
IP RoutingIP Routing
IP Routing
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Ccna3 ospf
Ccna3 ospfCcna3 ospf
Ccna3 ospf
 
Ospf
OspfOspf
Ospf
 
CCNA TCP/IP
CCNA TCP/IPCCNA TCP/IP
CCNA TCP/IP
 
Enrutamiento en solaris 10
Enrutamiento en solaris 10Enrutamiento en solaris 10
Enrutamiento en solaris 10
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
 
Spaning Tree Protocol
Spaning Tree ProtocolSpaning Tree Protocol
Spaning Tree Protocol
 
Distance vector and link state routing protocol
Distance vector and link state routing protocolDistance vector and link state routing protocol
Distance vector and link state routing protocol
 
Mpls 1
Mpls 1Mpls 1
Mpls 1
 
200-125-ccna-v3
200-125-ccna-v3200-125-ccna-v3
200-125-ccna-v3
 
OSPF Basics
OSPF BasicsOSPF Basics
OSPF Basics
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 

Similar to Routing Protocols

Exploration routing chapter_10
Exploration routing chapter_10Exploration routing chapter_10
Exploration routing chapter_10Joshua Torres
 
CCNA Exploration 2 - Chapter 10
CCNA Exploration 2 - Chapter 10CCNA Exploration 2 - Chapter 10
CCNA Exploration 2 - Chapter 10Irsandi Hasan
 
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Sachii Dosti
 
CCNA3 Verson6 Chapter5
CCNA3 Verson6 Chapter5CCNA3 Verson6 Chapter5
CCNA3 Verson6 Chapter5
Chaing Ravuth
 
Exploration routing chapter_4
Exploration routing chapter_4Exploration routing chapter_4
Exploration routing chapter_4Joshua Torres
 
CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
muazumuhammad6
 
Distance Vector Routing Protocols.ppt
Distance Vector Routing Protocols.pptDistance Vector Routing Protocols.ppt
Distance Vector Routing Protocols.ppt
Sunny1710
 
Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011Dân Chơi
 
CCNA Exploration 2 - Chapter 8
CCNA Exploration 2 - Chapter 8CCNA Exploration 2 - Chapter 8
CCNA Exploration 2 - Chapter 8Irsandi Hasan
 
Exploration routing chapter_1
Exploration routing chapter_1Exploration routing chapter_1
Exploration routing chapter_1Joshua Torres
 
Week3 part 2
Week3  part 2Week3  part 2
Week3 part 2
trayyoo
 
CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4Irsandi Hasan
 
CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1Irsandi Hasan
 
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOTIMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IRJET Journal
 
OSPF Open Shortest Path First protocol full details
OSPF Open Shortest Path First  protocol full detailsOSPF Open Shortest Path First  protocol full details
OSPF Open Shortest Path First protocol full details
Vignesh kumar
 
35d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b8935d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b89
Abdisalam A. Mohamed
 
Exploration routing chapter 4
Exploration routing chapter 4Exploration routing chapter 4
Exploration routing chapter 4
Sachii Dosti
 
Exploration routing chapter_8
Exploration routing chapter_8Exploration routing chapter_8
Exploration routing chapter_8Joshua Torres
 

Similar to Routing Protocols (20)

Exploration routing chapter_10
Exploration routing chapter_10Exploration routing chapter_10
Exploration routing chapter_10
 
CCNA Exploration 2 - Chapter 10
CCNA Exploration 2 - Chapter 10CCNA Exploration 2 - Chapter 10
CCNA Exploration 2 - Chapter 10
 
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11
 
CCNA3 Verson6 Chapter5
CCNA3 Verson6 Chapter5CCNA3 Verson6 Chapter5
CCNA3 Verson6 Chapter5
 
Exploration routing chapter_4
Exploration routing chapter_4Exploration routing chapter_4
Exploration routing chapter_4
 
CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
 
Distance Vector Routing Protocols.ppt
Distance Vector Routing Protocols.pptDistance Vector Routing Protocols.ppt
Distance Vector Routing Protocols.ppt
 
Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011
 
Arun project-Final
Arun project-FinalArun project-Final
Arun project-Final
 
CCNA Exploration 2 - Chapter 8
CCNA Exploration 2 - Chapter 8CCNA Exploration 2 - Chapter 8
CCNA Exploration 2 - Chapter 8
 
Exploration routing chapter_1
Exploration routing chapter_1Exploration routing chapter_1
Exploration routing chapter_1
 
Week3 part 2
Week3  part 2Week3  part 2
Week3 part 2
 
CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4
 
CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1
 
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOTIMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
 
OSPF Open Shortest Path First protocol full details
OSPF Open Shortest Path First  protocol full detailsOSPF Open Shortest Path First  protocol full details
OSPF Open Shortest Path First protocol full details
 
Ch5
Ch5Ch5
Ch5
 
35d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b8935d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b89
 
Exploration routing chapter 4
Exploration routing chapter 4Exploration routing chapter 4
Exploration routing chapter 4
 
Exploration routing chapter_8
Exploration routing chapter_8Exploration routing chapter_8
Exploration routing chapter_8
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 

Routing Protocols

  • 1. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.0 Chapter 1 1 Link-State Routing Protocols Routing Protocols and Concepts – Chapter 10 Modified by Tony Chen 04/01/2008
  • 2. ITE PC v4.0 Chapter 1 2© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Notes:  If you see any mistake on my PowerPoint slides or if you have any questions about the materials, please feel free to email me at chento@cod.edu. Thanks! Tony Chen College of DuPage Cisco Networking Academy
  • 3. ITE PC v4.0 Chapter 1 3© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives  Describe the basic features & concepts of link-state routing protocols. – Distance vector routing protocols are like road signs because routers must make preferred path decisions based on a distance or metric to a network. – Link-state routing protocols are more like a road map because they create a topological map of the network and each router uses this map to determine the shortest path to each network. – The ultimate objective is that every router receives all of the link-state information about all other routers in the routing area. With this link-state information, each router can create its own topological map of the network and independently calculate the shortest path to every network.  List the benefits and requirements of link-state routing protocols.
  • 4. ITE PC v4.0 Chapter 1 4© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Link-State Routing  Link state routing protocols -Also known as shortest path first algorithms -These protocols built around Dijkstra’s SPF OSPF will be discussed in Chapter 11, and IS-IS will be discussed in CCNP.
  • 5. ITE PC v4.0 Chapter 1 5© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Link-State Routing  Dikjstra’s algorithm also known as the shortest path first (SPF) algorithm –This algorithm accumulates costs along each path, from source to destination.
  • 6. ITE PC v4.0 Chapter 1 6© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Link-State Routing  The shortest path to a destination is not necessarily the path with the least number of hops
  • 7. ITE PC v4.0 Chapter 1 7© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Link-State Routing Process  How routers using Link State Routing Protocols reach convergence 1. Each routers learns about its own directly connected networks – interface is in the up state 1. Each router is responsible for meeting its neighbors on directly connected networks – exchange hello packet to other directly connected link state routers. 1. Each router builds a Link-State Packet (LSP) containing the state of each directly connected link – recording all the pertinent information about each neighbor, including neighbor ID, link type, and bandwidth. 1. Each router floods the LSP to all neighbors, who then store all LSPs received in a database. – Each router stores a copy of each LSP received from its neighbors in a local database. 1. Each router uses the database to construct a complete map of the topology and computes the best path to each destination network. – The SPF algorithm is used to construct the map of the topology and to determine the best path to each network.
  • 8. ITE PC v4.0 Chapter 1 8© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Link-State Routing: Step 1 – Learn about directly connected Networks  Link This is an interface on a router  Link state This is the information about the state of the links
  • 9. ITE PC v4.0 Chapter 1 9© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Link-State Routing: step 2 - Sending Hello Packets to Neighbors  Link state routing protocols use a hello protocol Purpose of a hello protocol: -To discover neighbors (that use the same link state routing protocol) on its link
  • 10. ITE PC v4.0 Chapter 1 10© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public  Connected interfaces that are using the same link state routing protocols will exchange hello packets.  Once routers learn it has neighbors they form an adjacency – 2 adjacent neighbors will exchange hello packets – These packets will serve as a keep alive function Link-State Routing: step 2 - Sending Hello Packets to Neighbors
  • 11. ITE PC v4.0 Chapter 1 11© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public  Contents of LSP: – State of each directly connected link – Includes information about neighbors such as neighbor ID, link type, & bandwidth.  A simplified version of the LSPs from R1 is: 1. R1; Ethernet network 10.1.0.0/16; Cost 2 2. R1 -> R2; Serial point-to-point network; 10.2.0.0/16; Cost 20 3. R1 -> R3; Serial point-to-point network; 10.3.0.0/16; Cost 5 4. R1 -> R4; Serial point-to-point network; 10.4.0.0/16; Cost 20 Link-State Routing: step 3 - Building the Link State Packet (LSP)
  • 12. ITE PC v4.0 Chapter 1 12© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public  Once LSP are created they are forwarded out to neighbors. –Each router floods its link-state information to all other link-state routers in the routing area. –Whenever a router receives an LSP from a neighboring router, it immediately sends that LSP out all other interfaces except the interface that received the LSP. –This process creates a flooding effect of LSPs from all routers throughout the routing area. Link-State Routing: step 4 - Flooding LSPs to Neighbors
  • 13. ITE PC v4.0 Chapter 1 13© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public  LSPs are sent out under the following conditions – Initial router start up or routing process – When there is a change in topology • including a link going down or coming up, or a neighbor adjacency being established or broken Link-State Routing: step 4 - Flooding LSPs to Neighbors
  • 14. ITE PC v4.0 Chapter 1 14© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public  Routers use a database to construct a topology map of the network –After each router has propagated its own LSPs using the link-state flooding process, each router will then have an LSP from every link- state router in the routing area. –These LSPs are stored in the link- state database. –Each router in the routing area can now use the SPF algorithm to construct the SPF trees that you saw earlier. Link-State Routing: step 5 - Constructing a link state data base
  • 15. ITE PC v4.0 Chapter 1 15© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Link-State Routing: step 5 - Constructing a link state data base router R1 has learned the link-state information for each router in its routing area. With a complete link-state database, R1 can now use the database and the shortest path first (SPF) algorithm to calculate the preferred path or shortest path to each network.
  • 16. ITE PC v4.0 Chapter 1 16© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public  Process begins by examining R2’s LSP information –R1 can ignore the first LSP, because R1 already knows that it is connected to R2 on network 10.2.0.0/16 with a cost of 20. –R1 can use the second LSP and create a link from R2 to another router, R5, with the network 10.9.0.0/16 and a cost of 10. This information is added to the SPF tree. –Using the third LSP, R1 has learned that R2 has a network 10.5.0.0/16 with a cost of 2 and with no neighbors. This link is added to R1's SPF tree. Link-State Routing: Example - How R1 constructs its SPF tree.
  • 17. ITE PC v4.0 Chapter 1 17© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public  Process begins by examining R3’s LSP information –R1 can ignore the first LSP, because R1 already knows that it is connected to R3 on network 10.3.0.0/16 with a cost of 5. –R1 can use the second LSP and create a link from R3 to the router R4, with the network 10.7.0.0/16 and a cost of 10. This information is added to the SPF tree. –Using the third LSP, R1 has learned that R3 has a network 10.6.0.0/16 with a cost of 2 and with no neighbors. This link is added to R1's SPF tree. Link-State Routing: Example - How R1 constructs its SPF tree.
  • 18. ITE PC v4.0 Chapter 1 18© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public  Process begins by examining R4’s LSP information –R1 can ignore the first LSP because R1 already knows that it is connected to R4 on network 10.4.0.0/16 with a cost of 20. –R1 can also ignore the second LSP because SPF has already learned about the network 10.6.0.0/16 with a cost of 10 from R3. –However, R1 can use the third LSP to create a link from R4 to the router R5, with the network 10.10.0.0/16 and a cost of 10. This information is added to the SPF tree. –Using the fourth LSP, R1 learns that R4 has a network 10.8.0.0/16 with a cost of 2 and with no neighbors. This link is added to R1's SPF tree. Link-State Routing: Example - How R1 constructs its SPF tree.
  • 19. ITE PC v4.0 Chapter 1 19© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public  Process begins by examining R5’s LSP information –R1 can ignore the first two LSPs (for the networks 10.9.0.0/16 and 10.10.0.0/16), because SPF has already learned about these links and added them to the SPF tree. –R1 can process the third LSP learning that R5 has a network 10.11.0.0/16 with a cost of 2 and with no neighbors. This link is added to the SPF tree for R1. Link-State Routing: Example - How R1 constructs its SPF tree.
  • 20. ITE PC v4.0 Chapter 1 20© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Link-State Routing  Determining the shortest path –The shortest path to a destination determined by adding the costs & finding the lowest cost •Network 10.5.0.0/16 via R2 serial 0/0/0 at a cost of 22 •Network 10.6.0.0/16 via R3 serial 0/0/1 at a cost of 7 •Network 10.7.0.0/16 via R3 serial 0/0/1 at a cost of 15 •Network 10.8.0.0/16 via R3 serial 0/0/1 at a cost of 17 •Network 10.9.0.0/16 via R2 serial 0/0/0 at a cost of 30 •Network 10.10.0.0/16 via R3 serial 0/0/1 at a cost of 25 •Network 10.11.0.0/16 via R3 serial 0/0/1 at a cost of 27 Only the LANs are shown in the table, but SPF can also be used to determine the shortest path to each WAN link network.
  • 21. ITE PC v4.0 Chapter 1 21© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Link-State Routing  Once the SPF algorithm has determined the shortest path routes, these routes are placed in the routing table.  The routing table will also include all directly connected networks and routes from any other sources, such as static routes. Packets will now be forwarded according to these entries in the routing table.
  • 22. ITE PC v4.0 Chapter 1 22© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Link-State Routing Protocols Advantages of a Link-State Routing Protocol Routing protocol Builds Topological map Router can independently determine the shortest path to every network. Convergence Event driven routing updates Use of LSP Distance vector No No Slow Generally No No Link State Yes Yes Fast Generally Yes Yes
  • 23. ITE PC v4.0 Chapter 1 23© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Link-State Routing Protocols  There are several advantages of link-state routing protocols compared to distance vector routing protocols.  Builds a Topological Map • Link-state routing protocols create a topological map, or SPF tree of the network topology. •Using the SPF tree, each router can independently determine the shortest path to every network. • Distance vector routing protocols do not have a topological map of the network. •Routers implementing a distance vector routing protocol only have a list of networks, which includes the cost (distance) and next-hop routers (direction) to those networks.  Fast Convergence • When receiving a Link-state Packet (LSP), link-state routing protocols immediately flood the LSP out all interfaces except for the interface from which the LSP was received. • A router using a distance vector routing protocol needs to process each routing update and update its routing table before flooding them out other interfaces, even with triggered updates.  Event-driven Updates • After the initial flooding of LSPs, link-state routing protocols only send out an LSP when there is a change in the topology. The LSP contains only the information regarding the affected link. • Unlike some distance vector routing protocols, link-state routing protocols do not send periodic updates.  Hierarchical Design • Link-state routing protocols such as OSPF and IS-IS use the concept of areas. Multiple areas create a hierarchical design to networks, allowing for better route aggregation (summarization) and the isolation of routing issues within an area.
  • 24. ITE PC v4.0 Chapter 1 24© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Link-State Routing Protocols Requirements for using a link state routing protocol  Memory requirements – Typically link state routing protocols use more memory  Processing Requirements – More CPU processing is required of link state routing protocols  Bandwidth Requirements – Initial startup of link state routing protocols can consume lots of bandwidth – This should only occur during initial startup of routers, but can also be an issue on unstable networks.
  • 25. ITE PC v4.0 Chapter 1 25© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Link-State Routing Protocols  Modern link-state routing protocols are designed to minimize the effects on memory, CPU, and bandwidth. • The use and configuration of multiple areas can reduce the size of the link-state databases. Multiple areas can also limit the amount of link-state information flooding in a routing domain and send LSPs only to those routers that need them. • For example, when there is a change in the topology, only those routers in the affected area receive the LSP and run the SPF algorithm. • This can help isolate an unstable link to a specific area in the routing domain.  In the figure, If a network in Area 51 goes down, the LSP with the information about this downed link is only flooded to other routers in that area. • Routers in other areas will learn that this route is down, but this will be done with a type of link-state packet that does not cause them to rerun their SPF algorithm. Note: Multiple areas with OSPF and IS-IS are discussed in CCNP
  • 26. ITE PC v4.0 Chapter 1 26© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Link-State Routing Protocols  2 link state routing protocols used for routing IP -Open Shortest Path First (OSPF) -Intermediate System-Intermediate System (IS-IS)
  • 27. ITE PC v4.0 Chapter 1 27© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Summary  Link State Routing protocols are also known as Shortest Path First protocols  Summarizing the link state process -Routers 1ST learn of directly connected networks -Routers then say “hello” to neighbors -Routers then build link state packets -Routers then flood LSPs to all neighbors -Routers use LSP database to build a network topology map & calculate the best path to each destination
  • 28. ITE PC v4.0 Chapter 1 28© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Summary  Link An interface on the router  Link State Information about an interface such as -IP address -Subnet mask -Type of network -Cost associated with link -Neighboring routers on the link
  • 29. ITE PC v4.0 Chapter 1 29© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Summary  Link State Packets After initial flooding, additional LSP are sent out when a change in topology occurs  Examples of link state routing protocols -Open shortest path first -IS-IS