Link State Routing. Link state routing principles Dijkstra s shortest-path-first algorithm The OSPF protocol. (Chapter 6 in Huitema) E7310/Comnet 1
|
|
- Roderick Webster
- 5 years ago
- Views:
Transcription
1 Link State Routing Link state routing principles Dijkstra s shortest-path-first algorithm The OSPF protocol (Chapter 6 in Huitema) 7310/Comnet 1
2 Link State Routing Principles 7310/Comnet 2
3 Link state routing The goal is to avoid the routing loops typical of DV routing and to scale to bigger networks and to varying topologies. A link state protocol maintains the topology map, i.e. the link state database of the network. Same map in every node When the topology changes, the maps are updated quickly OSPF (Open Shortest Path First) is the ITF specified link state protocol for the Internet. OSPF is recommended as the follower of RIP More complex than RIP Other link state routing protocols include IS-IS and PNNI Intermediate System to Intermediate System (IS-IS) Private Network-to-Network Interface (PNNI) 7310/Comnet 3
4 The map is the complete list of all links xample network A D 1 2 B One node is responsible for a particular entry Link directions are separate entries Same map in every node No loops C Link state database: From To Link Cost A B 1 1 A D 3 1 B A 1 1 B C 2 1 B 4 1 C B 2 1 C 5 1 D A 3 1 D 6 1 B 4 1 C 5 1 D /Comnet 4
5 The routing table is generated from the link state database From To Link Cost A B 1 1 A D 3 1 B A 1 1 B C 2 1 B 4 1 C B 2 1 C 5 1 D A 3 1 D 6 1 B 4 1 C 5 1 D 6 1 Link state database Dijkstra s shortest-path-first algorithm From To Link Cost A A local 0 A B 1 1 A C 1 2 A D 3 1 A 3 2 Routing table of node A Note: ach node generates a different routing table using the same link state database! Distribution by parallel computation 7310/Comnet 5
6 The flooding protocol distributes information about topology changes The updates, link state advertisements, are distributed to the whole network A 1 B 2 C 4 5 D 6 From To Link Cost Seq.num A B 1 inf 2 From To Link Cost Seq.num B A 1 inf 2 Sequence number indicates that the updated entry is newer 7310/Comnet 6
7 Flooding algorithm Receive M Find entry L in link DB for which L.link = M.link Found? no Create entry L = M Broadcast M on all interfaces M.seq > L.seq? Update entry L = M Broadcast M on all interfaces M L L.link L.seq no M.seq < L.seq received and forwarded entry corresponding entry in link DB link id of entry L sequence number of entry L Create message M = L Send M to sender no nd 7310/Comnet 7
8 Properties of flooding Previous algorithm guarantees that each node will receive each update at least once. xactly once would be optimal but this can not be guaranteed Flooding will stop when each node has received the update: a node will just drop an update that it already has. Additional protection against looping: TTL on IP layer. While the flooding is ongoing, network state is inconsistent in different nodes this period (including route calculations and update of FIB) is called routing convergence. 7310/Comnet 8
9 Link database after distribution of failure of link AB A D 1 B From To Link Cost Seq.num A B 1 inf 2 A D B A 1 inf 2 B C B C B C D A D B C D C Sequence number starts from 1 on node restart. Modulo arithmetic is used to determine what is a little bigger than message numbering can overflow without problems = 0 OSPF uses a slightly different numbering, as will be discussed later. 7310/Comnet 9
10 If network splits into islands, the databases in the islands may diverge A 1 B C Databases in A and D: From To Link Cost Seq.num A B 1 inf 2 A D B A 1 inf 2 B C B C B C D A D 6 inf 2 B C D D 6 Databases in B, C and : From To Link Cost Seq.num A B 1 inf 2 A D B A 1 inf 2 B C B C B C D A D B C D 6 inf /Comnet 10
11 Link 2 fails the databases diverge more 1 2 A B D 6 C Databases in B, C and : From To Link Cost Seq.num. A B 1 inf 2 A D B A 1 inf 2 B C 2 inf 2 B C B 2 inf 2 C D A D B C D 6 inf /Comnet 11
12 Databases may diverge while the network is split, but there is no immediate problem A 1 B C Databases in A and D: From To Link Cost Seq.num A B 1 inf 2 A D B A 1 inf 2 B C B C B C D A D 6 inf 2 B C D D 6 Databases in B, C and : From To Link Cost Seq.num A B 1 inf 2 A D B A 1 inf 2 B C 2 inf 2 B C B 2 inf 2 C D A D B C D 6 inf /Comnet 12
13 When link 1 goes up, the databases must be synchronized 1 2 A B D 6 C A simple method would be to send all entries over the link but fortunately we can do it in a more efficient way From To Link Cost Seq.num A B A D B A B C B C B C D A D 6 inf 2 B C D From To Link Cost Seq.num From To Link Cost Seq.num A B A D B A B C 2 inf 2 B C B 2 inf 2 C D A D B C D 6 inf 2 A B A D B A B C 2 inf 2 B C B 2 inf 2 C D A D 6 inf 2 B C D 6 inf /Comnet 13
14 Bringing up adjacencies: first databases are compared, then differing entries are requested A B DB description <id=m.link, seq=m.seq> DB descriptions from B More DB descriptions from A More DB descriptions from B M.link not in L or M.seq > L.seq Link state request <id=m.link> All information about link M.link Yes OSPF implementation details discussed later Note: synchonization is performed every time a link is established, not only when the network has been divided Update link in L with M Flood M to all neighbors 7310/Comnet 14
15 What happens if a router is restarted? When router A is restarted, it has forgotten its last used number, and numbers its LSA again with the initial sequence number There may be LSAs in the network that were distributed by A before the restart The neighbor B then replies that it has newer information. If router A wants to keep it own LSAs alive, it increases the sequence number by 1 and redistributes. If the information of the neighbor is no longer valid, A removes it by distributing the same entry with the age = MaxAge. A B restart LSA <seq = n> LSA <seq = 1> LSA <seq = n> LSA <seq = n+1> 7310/Comnet 15
16 Integrity of the link DB must be secured Protection: Flooding messages are acknowledged link by link. DB description messages are acknowledged. ach DB entry is protected by obsolescence timer. If an update does not arrive in time, the entry is removed. ach entry is protected by a checksum. Messages also carry authentication info. But: while update is in progress, some nodes receive info earlier than others routing mistakes happen. 7310/Comnet 16
17 Dijkstra s shortest-path-first algorithm 7310/Comnet 17
18 OSPF is based on Dijkstra s shortest-path-first algorithm Purpose: create a routing table from the link-state database. The algorithm computes the shortest path from source node S to all the other nodes. Dijkstra s algorithm converges faster than Bellman-Ford. O(M log M) < O(MN 2 ) (compared to centralized B-F) O(M log M) < O(MN) (compared to distributed B-F) M is number of links, N is number of nodes, Both of the same order of magnitude Nodes are divided into evaluated nodes, the paths from which are known, and other nodes R. In addition an ordered list of paths O is needed. 7310/Comnet 18
19 Dijkstra s shortest-path-first algorithm ={S}, R={other nodes}, P = O={paths starting from S with length 1}, sort O = or O[1].cost= no p=o[1]; O = O \ p; V=p.to V? no = V, R = R \V P = P p nd: P contains the paths R=unreachable nodes S R O P L start node evaluated nodes other nodes ordered list of paths <from, to, cost> paths (result) link state database <from, to, cost> For all links L starting from V: O = O V, L.to, p.cost + L.cost sort O (shortest path first) Note: the loops are removed here 7310/Comnet 19
20 Dijkstra s shortest-path-first algorithm 1. Initialize ={S}, R={N-S}, O={all one-hop paths starting from S} 2. If O is empty or is the first path in O has infinite length: then mark all the remaining nodes in R as unreachable and stop 3. p is the first (=shortest) path in O. Remove p from O. V is the last or end node of p. 4. Is V in? then go to step 2 5. Create a set of paths by adding to P all links starting from V. The length is the cost of previous path + the cost of the link. Add these paths to O in length order. Move V from R to. 6. Go to step /Comnet 20
21 Dijkstra s shortest-path-first algorithm example LS DB A D 1 B S From To Link Cost A B 1 4 A D 3 1 B A 1 4 B C 2 1 B 4 1 C B 2 1 C 5 1 D A 3 1 D 6 1 B 4 1 C 5 1 D 6 1 C ={B}, R={A, C, D, }, P = O={<B,C,1>,<B,,1>,<B,A,4>} sort O= or O[1].cost= p= O[1]; O = O \ p; V=p.to V = V, R = R \V P = P p nd: P contains the paths R=unreachable nodes For all links L starting from V: O = O V, L.to, p.cost + L.cost sort O 7310/Comnet 21
22 Dijkstra s shortest-path-first algorithm example A 4 S B C ={B}, R={A, C, D, }, P = B R D A, C, D, O <B,C,1> <B,,1> <B,A,4> O={<B,C,1>,<B,,1>,<B,A,4>} sort O= or O[1].cost= p= O[1]; O = O \ p; V=p.to V = V, R = R \V nd: P contains the paths R=unreachable nodes P = P p For all links L starting from V: O = O V, L.to, p.cost + L.cost sort O 7310/Comnet 22
23 Dijkstra s shortest-path-first algorithm example A 4 S B C ={B}, R={A, C, D, }, P = B R D A, C, D, O O={<B,C,1>,<B,,1>,<B,A,4>} sort O= or O[1].cost= p= O[1]; O = O \ p; V=p.to nd: P contains the paths R=unreachable nodes <B,,1> <B,A,4> V = V, R = R \V P = P p For all links L starting from V: O = O V, L.to, p.cost + L.cost sort O 7310/Comnet 23 X
24 Dijkstra s shortest-path-first algorithm example A 4 S B C 1 ={B}, R={A, C, D, }, P = B, C R D A, D, O O={<B,C,1>,<B,,1>,<B,A,4>} sort O= or O[1].cost= p= O[1]; O = O \ p; V=p.to nd: P contains the paths R=unreachable nodes <B,,1> <B,A,4> V = V, R = R \V P = P p For all links L starting from V: O = O V, L.to, p.cost + L.cost sort O 7310/Comnet 24
25 Dijkstra s shortest-path-first algorithm example A 4 S B C 1 ={B}, R={A, C, D, }, P = B, C R D A, D, O <B,,1> <C,,2> <B,A,4> O={<B,C,1>,<B,,1>,<B,A,4>} sort O= or O[1].cost= p= O[1]; O = O \ p; V=p.to V = V, R = R \V nd: P contains the paths R=unreachable nodes Not marked links P = P p For all links L starting from V: O = O V, L.to, p.cost + L.cost sort O 7310/Comnet 25
26 Dijkstra s shortest-path-first algorithm example A 4 S B C 1 ={B}, R={A, C, D, }, P = B, C R D A, D, O <B,,1> <C,,2> <B,A,4> O={<B,C,1>,<B,,1>,<B,A,4>} sort O= or O[1].cost= p= O[1]; O = O \ p; V=p.to V = V, R = R \V nd: P contains the paths R=unreachable nodes P = P p For all links L starting from V: O = O V, L.to, p.cost + L.cost sort O 7310/Comnet 26
27 Dijkstra s shortest-path-first algorithm example A 4 S B C 1 ={B}, R={A, C, D, }, P = B, C R D A, D, O O={<B,C,1>,<B,,1>,<B,A,4>} sort O= or O[1].cost= p= O[1]; O = O \ p; V=p.to nd: P contains the paths R=unreachable nodes <C,,2> <B,A,4> V = V, R = R \V P = P p For all links L starting from V: O = O V, L.to, p.cost + L.cost sort O 7310/Comnet 27
28 Dijkstra s shortest-path-first algorithm example A 4 S B C 1 ={B}, R={A, C, D, }, P = A, D D B, C, R O 1 O={<B,C,1>,<B,,1>,<B,A,4>} sort O= or O[1].cost= p= O[1]; O = O \ p; V=p.to nd: P contains the paths R=unreachable nodes <C,,2> <B,A,4> V = V, R = R \V P = P p For all links L starting from V: O = O V, L.to, p.cost + L.cost sort O 7310/Comnet 28
29 Dijkstra s shortest-path-first algorithm example A 4 S B C 1 ={B}, R={A, C, D, }, P = A, D D B, C, R O <C,,2> <,D,2> <B,A,4> 1 O={<B,C,1>,<B,,1>,<B,A,4>} sort O= or O[1].cost= p= O[1]; O = O \ p; V=p.to V = V, R = R \V nd: P contains the paths R=unreachable nodes P = P p For all links L starting from V: O = O V, L.to, p.cost + L.cost sort O 7310/Comnet 29
30 Dijkstra s shortest-path-first algorithm example A 4 S B C 1 ={B}, R={A, C, D, }, P = A, D D B, C, R O <C,,2> <,D,2> <B,A,4> 1 O={<B,C,1>,<B,,1>,<B,A,4>} sort O= or O[1].cost= p= O[1]; O = O \ p; V=p.to V = V, R = R \V nd: P contains the paths R=unreachable nodes P = P p For all links L starting from V: O = O V, L.to, p.cost + L.cost sort O 7310/Comnet 30
31 Dijkstra s shortest-path-first algorithm example A 4 S B C 1 ={B}, R={A, C, D, }, P = A, D D B, C, R O 1 O={<B,C,1>,<B,,1>,<B,A,4>} sort O= or O[1].cost= p= O[1]; O = O \ p; V=p.to nd: P contains the paths R=unreachable nodes <,D,2> <B,A,4> V = V, R = R \V P = P p For all links L starting from V: O = O V, L.to, p.cost + L.cost sort O 7310/Comnet 31
32 Dijkstra s shortest-path-first algorithm example A 4 S B C 1 ={B}, R={A, C, D, }, P = A, D D B, C, R O <,D,2> <B,A,4> 1 O={<B,C,1>,<B,,1>,<B,A,4>} sort O= or O[1].cost= p= O[1]; O = O \ p; V=p.to V nd: P contains the paths R=unreachable nodes = V, R = R \V P = P p For all links L starting from V: O = O V, L.to, p.cost + L.cost sort O 7310/Comnet 32
33 Dijkstra s shortest-path-first algorithm example A 4 S B C 1 ={B}, R={A, C, D, }, P = A, D D B, C, R O 1 O={<B,C,1>,<B,,1>,<B,A,4>} sort O= or O[1].cost= p= O[1]; O = O \ p; V=p.to nd: P contains the paths R=unreachable nodes <B,A,4> V = V, R = R \V P = P p For all links L starting from V: O = O V, L.to, p.cost + L.cost sort O 7310/Comnet 33
34 Dijkstra s shortest-path-first algorithm example A 4 S B C 1 ={B}, R={A, C, D, }, P = A D B, C,, D R O 2 1 O={<B,C,1>,<B,,1>,<B,A,4>} sort O= or O[1].cost= p= O[1]; O = O \ p; V=p.to nd: P contains the paths R=unreachable nodes <B,A,4> V = V, R = R \V P = P p For all links L starting from V: O = O V, L.to, p.cost + L.cost sort O 7310/Comnet 34
35 Dijkstra s shortest-path-first algorithm example A 4 S B C 1 ={B}, R={A, C, D, }, P = A D B, C,, D R O 2 <D,A,3> <B,A,4> 1 O={<B,C,1>,<B,,1>,<B,A,4>} sort O= or O[1].cost= p= O[1]; O = O \ p; V=p.to V nd: P contains the paths R=unreachable nodes = V, R = R \V P = P p For all links L starting from V: O = O V, L.to, p.cost + L.cost sort O 7310/Comnet 35
36 Dijkstra s shortest-path-first algorithm example A 4 S B C 1 ={B}, R={A, C, D, }, P = A D B, C,, D R O 2 <D,A,3> <B,A,4> 1 O={<B,C,1>,<B,,1>,<B,A,4>} sort O= or O[1].cost= p= O[1]; O = O \ p; V=p.to V nd: P contains the paths R=unreachable nodes = V, R = R \V P = P p For all links L starting from V: O = O V, L.to, p.cost + L.cost sort O 7310/Comnet 36
37 Dijkstra s shortest-path-first algorithm example A 4 S B C 1 ={B}, R={A, C, D, }, P = A D B, C,, D R O 2 1 O={<B,C,1>,<B,,1>,<B,A,4>} sort O= or O[1].cost= p= O[1]; O = O \ p; V=p.to nd: P contains the paths R=unreachable nodes <B,A,4> V = V, R = R \V P = P p For all links L starting from V: O = O V, L.to, p.cost + L.cost sort O 7310/Comnet 37
38 Dijkstra s shortest-path-first algorithm example A 4 S B C 1 ={B}, R={A, C, D, }, P = D B, C,, D, A R 2 1 O={<B,C,1>,<B,,1>,<B,A,4>} sort O= or O[1].cost= nd: P contains the paths R=unreachable nodes O <B,A,4> p= O[1]; O = O \ p; V=p.to V = V, R = R \V P = P p For all links L starting from V: O = O V, L.to, p.cost + L.cost sort O 7310/Comnet 38
39 Dijkstra s shortest-path-first algorithm example S B A C ={B}, R={A, C, D, }, P = D B, C,, D, A R 2 1 O={<B,C,1>,<B,,1>,<B,A,4>} sort O= or O[1].cost= nd: P contains the paths R=unreachable nodes O <B,A,4> p= O[1]; O = O \ p; V=p.to V = V, R = R \V P = P p For all links L starting from V: O = O V, L.to, p.cost + L.cost sort O 7310/Comnet 39
40 Dijkstra s shortest-path-first algorithm example S B A C ={B}, R={A, C, D, }, P = D B, C,, D, A R 2 1 O={<B,C,1>,<B,,1>,<B,A,4>} sort O= or O[1].cost= nd: P contains the paths R=unreachable nodes O p= O[1]; O = O \ p; V=p.to V = V, R = R \V P = P p For all links L starting from V: O = O V, L.to, p.cost + L.cost sort O 7310/Comnet 40
41 Dijkstra s shortest-path-first algorithm example S B A C ={B}, R={A, C, D, }, P = D B, C,, D, A R 2 1 O={<B,C,1>,<B,,1>,<B,A,4>} sort O= or O[1].cost= nd: P contains the paths R=unreachable nodes O p= O[1]; O = O \ p; V=p.to V = V, R = R \V P = P p For all links L starting from V: O = O V, L.to, p.cost + L.cost sort O 7310/Comnet 41
42 Advantages of Link State Protocols Link State DBs converge quickly, no loops are formed O(M log M) M = number of links Metrics can be quite accurate. In DV-protocols, counting-to-infinity limits (inf=16) One protocol can easily support several metrics: A routing table for each metric: throughput, delay, cost, reliability. Can maintain several routes to a destination. Load balancing xterior routes can have their own representation. Slide 42 Slide 44 Slide /Comnet 42
43 Using several metrics (1) Using several metrics requires: Several metrics must be stored for each link L metric1, L metric2,... The protocol must transport all metrics Computing separate routing tables for each metric P metric1, P metric2,... User packets must be marked with the required metric. Type-of-service field in IP packet header 7310/Comnet 43
44 Using several metrics (2) A routing loop is possible if different nodes use different metrics for one user packet 1500 kbps 300 ms A 1500 kbps 300 ms B 64 kbps 20 ms C 1500 kbps 300 ms D 64 kbps 20 ms User packets must be marked with the required metric 7310/Comnet 44
45 Spreading load to alternative equidistant paths improves network efficiency CMP = qual Cost Multipath ? More bandwidth Shorter queues in routers Average delay is decreased nd-to-end jitter decreases Less traffic to reroute under failure conditions overload would take the alternative path stability is a problem When are paths equidistant enough? A D 1 2 B May change packet order because paths may have different delay (different queue lengths in nodes) keep the same path for a connection (hash from address & port) xisting traffic can not be pinned down to primary path so that only 6 C 7310/Comnet 45
46 When are paths equidistant enough? What happens if the traffic to C is divided between two alternative paths? A D 1 2 B /3 1/3 2/3 2/3 C The packet to X can be sent through Y only if Y is closer to the destination than the current node Rule A Y... X, if distance(y X) < distance(a X) accepts only monotonic alternative routes 7310/Comnet 46
47 Dijkstra s shortest-path-first algorithm that finds alternative paths ={S}, R={other nodes}, P = O={paths starting from S with length 1} sort O = or O[1].cost= no p=o[1]; O = O \ p; V=p.to nd: P contains the paths R=unreachable nodes V? no = V, R = R \V P = P p For all links L starting from V: O = O V, L.to, p.cost + L.cost sort O W = (p\v).to dist(s W)=dist(S V)? p is a alternative path to V 7310/Comnet 47
48 Dijkstra s shortest-path-first algorithm that finds alternative paths 1. ={S}, R={N-S}, O={all one-hop paths starting from S} 2. If O is empty or is the first path in O has infinite length: Mark all the remaining nodes in R as unreachable Stop 3. p is the shortest path in O. Remove p from O. V is the last node of p. 4. If V is in : Go to step 6 5. Create a set of paths by adding to P all links starting from V. The path is the previous path + the cost of the link. Add these paths to O in length order. Go to step If the distance of path p from S to V is the same as previously calculated distance from S to V Add the alternative path to V. 7. Go to step /Comnet 48
49 Link state protocol can describe several external routes with accurate metrics DV-protocol s capability to describe external routes is limited due to the counting-to-infinity problem and due to complexity of Bellman-Ford algorithm Inf = 16 maximum distance limited Bellman-Ford complexity is O(N 2 ) Link state protocol is free from those limitations Distance is not limited Dijkstra complexity is O(N log N) where N = number of external routes.g. complexity of external routes (in 2012): vs /Comnet 49
50 The OSPF protocol 7310/Comnet 50
51 OSPF sees the network as a graph Stub network OSPF router xternal destination Transit network xternal destination xternal destination Stub network OSPF router Stub network Summary network OSPF router Stub network Stub network 7310/Comnet 51
52 OSPF separates between a router and a host A strict link state protocol would separately describe the link between each host and router OSPF uses IP subnet mask and advertises only a single (sub)net This creates a single link state record: A router with one port connected to a stub network OSPF router Host A Host B Host A stub network 7310/Comnet 52
53 OSPF supports broadcast networks (1) In a broadcast network (e.g. thernet, Token ring, FDDI) ach device can send to each other (unicast) One can send to all (broadcast) or to a subset (local multicast) of connected devices If there are N routers, they have N (N-1)/2 adjacencies ach router would advertise N-1 routes to other routers N (N-1) A B N (N-1)/2 adjacencies C F D (adjacencies are the neighbors, with which the router communicates) 7310/Comnet 53
54 OSPF supports broadcast networks (2) Designated router A B Backup designated router A B C C D (X) Virtual router Adjacencies are formed only with the designated router (A) Must be selected using the Hello protocol Synchronization of link DBs becomes simpler Backup designated router (B) is selected together with the designated. F Note the difference between adjacencies and the link model! D The broadcast network is modeled using a virtual router The links from the virtual router to the routers are network links Advertised by the designated router Cost = 0 The links from the routers to the virtual router Advertised by the routers 7310/Comnet 54 F
55 OSPF flooding protocol in a broadcast network Router X,... Advertisement (all designated routers) Designated router Backup designated router Distribution (all OSPF routers) Other links Other links No need to process acks from all other routers in the subnet Backup designated stays as silent as possible 7310/Comnet 55
56 OSPF flooding protocol in a non-broadcast network In non-broadcast networks (e.g. X.25, ATM, frame relay), OSPF works in the same way except that broadcasts are replaced by point-to-point messages Designated A B Backup Router X,... Advertisement Designated Backup C D Distribution F Permanent connection with designated Permanent connection with backup designated Dial-up connection with other routers (used for packets, not for OSPF messages) Other links NB: it makes sense to minimize permanent connections due to their cost 7310/Comnet 56
57 The purpose of hierarchical routing in OSPF is to reduce routing table growth Size of routing table Flat routing linear growth Logarithmic growth using areas etc. Number of network segments The cost is: sometimes suboptimal routes. 7310/Comnet 57
58 OSPF supports a 4 level routing hierarchy Area 3 Internet Backbone Level Description 1 Intra-area routing 2 Inter-area routing 3 xternal Type 1 metrics 4 xternal Type 2 metrics Area 2 Area 1 RIP cloud Type 1 metrics are of the same order as OSPF metrics, e.g. hop count (for RIP and OSPF) Type 2 metrics are always more significant than OSPF internal metrics (e.g. BGP-4) 7310/Comnet 58
59 By breaking down a large network into areas, OSPF eases flooding and reduces the size of link DBs Area 5 Area 1 Area Border Router Flooding protocol stops at the area boundary Area Border Router Backbone Area Area Border Router Area 4 Area Border Router Area 2 Area Border Router All OSPF routers within an area have identical link databases Area border router has two link DBs: one for the area, another for the backbone Area 3 ach area comprises of a set of sub-networks very area must be connected to the backbone area 7310/Comnet 59
60 (Sub)networks of other areas are described in summary records the metric is computed like in DV routing Link DB for Area A: a1, a2, a3 Summary records of the subnets in the backbone and Area C AB2, AB4 Distance ABx to bz, ABx to BC3 to cy (metrics are summed). xternal records AB2, AB4 A1 Same information in all areas Also summary Area A a1 records for BB0 and BB1 are required Hierarchy: areas are only connected through the backbone No loops A3 a2 a3 BB0 b2 AB2 b3 AB4 Backbone b1 b4 BB1 b6 BC1 b5 BC3 c1 c3 C2 c2 Area C C4 7310/Comnet 60
61 OSPF easily recovers from failures in areas A1 a1 A3 a2 Area A a3 BB0 b2 AB2 b3 AB4 b1 Backbone b4 BB1 b6 BC1 b5 BC3 c1 Area C c3 C2 c2 C4 AB2 and AB4 advertise only those subnets which they can reach: AB2: a2 AB4: a3 Backbone does not know the exact structure of area A but it knows identities of all reachable subnets. 7310/Comnet 61
62 A virtual link can help if backbone splits into isolated segments due to a failure BB0 b1 BB1 A1 a2 b2 AB2 b6 BC1 c1 C2 Virtual link through Area C: metric=c1+c2+c3 a1 A3 Area A a3 b3 AB4 Backbone b4 b5 BC3 Area C c3 c2 C4 Must be configured by administrator A virtual link can also be used to connect an area to the backbone via another area 7310/Comnet 62
63 There is no point in advertising all external routes to an area with a single area border router A Stub Area is an area where all external routes are replaced by a default route If an OSPF area has only one area border router (ABR), all traffic to and from the Internet goes through this ABR. It is not useful to advertise all Internet routes separately towards such an area. There can even be several ABRs, but it is not possible to select the best of them based on destination prefix (leading bits of IP address) A Not So Stubby Area (NSSA) is an area, in which all external routes have been summarized into the default route except for some. A type of stub area that can import AS external routes and send them to other areas, but still cannot receive AS-external routes from other areas. Internet Border Router Backbone Area Border Router Stub Area 7310/Comnet 63
64 OSPF link state records 7310/Comnet 64
65 Link State Advertisement (LSA) types in OSPF LS Type = 1 Router LSA Describes a set of links starting from a router LS Type = 2 Network LSA describes a network segment (Broadcast or NBMA) along with the IDs of currently attached routers LS Type = 3 Summary LSA for IP Network LS Type = 4 Summary LSA for Border Router LS Type = 5 xternal LSA describes external routes LS Type = 6 Group Membership LSA used in MOSPF for multicast routing LS Type = 7 Not So Stubby Area LSA to import limited external info LS Type = 8 (proposed) external attributes LSA in lieu of Internal BGP Hierarchical Routing BC = Broadcast, e.g. thernet NBMA = Non-Broadcast Multiple Access, e.g. ATM 7310/Comnet 65
66 Common header of Link State Advertisement (LSA) 32 bits LS age options LS type Link state ID Advertising router LS sequence number LS checksum length Key LS age: Seconds from first advertisement Options: -bit = external links T-bit = type of service support when many metrics are in use LS checksum: Protects header and content Length: Total length of the record Link state ID: Depends on LS type 7310/Comnet 66
67 for each link Router LSA (type 1) Describes links starting from a router. RouterType 0 Number of links Link ID Link data LinkType # TOS TOS 0 metric TOS=x 0 TOS x metric TOS=y 0 TOS y metric... TOS=z 0 TOS z metric Router type -bit (xternal) This router is an area-border router B-bit (Border) This router is a border router Link type 1. Link is a point-to-point link to another router Link ID = neighboring router s OSPF ID Link data = router s interface ID 2. Link connects to a transit network Link ID = IP address of designated router s interface Link data = router s interface ID 3. Link connects to a stub network Link ID = Network/subnet number Link data = network/subnet mask 7310/Comnet 67
68 (1,5) (3,1) (1,1) (3,10) Router LSA example exterior protocol (2,5) (1,3) (1,3) (3,3) (2,3) (2,1) (1,1) (3,3) (2,3) (2,6) (1,6) (2,10) =ordinary 1=pt-to-pt 1=pt-to-pt 3=stub network Router s router-lsa: LS Age = 0 seconds Options LS type=1 Link State ID = Advertising Router = LS Sequence Number = 0x Checksum= 0x9b47 Length = 60 bytes 0 Nr of links = 3 Link ID = (neighb) Link Data = IF-index 1 (unnum) Type=1 #TOS=0 Metric=3 Link ID = (neighb) Link Data = IF-index 2 (unnum) Type=1 #TOS=0 Metric=5 Link ID = Link Data = Type=3 #TOS=0 Metric=0 RouterType=0 -bit in options 1=Router LSA MIB-II IF-index Output Cost Length = * 12 = 60 bytes Router with 100 interfaces: Length = * 12 = 1224 bytes 7310/Comnet 68
69 Network LSA (type 2) Network mask Attached router Attached router... Attached router A C B (x) Virtual router D Advertised by designated routers for transit networks Link state ID (in header) = interface ID of designated router Attached router = OSPF identifier of the attached router LS Type = 2 Network LSA describes a network segment (Broadcast or NBMA) along with the IDs of currently attached routers 7310/Comnet 69
70 Network LSA example Designated router (DR) Backup-DR Link to transit network in all Router LSAs: (header) Flags=0 0 Number of links Link ID = Link Data = Type=2 #TOS=0 Metric = 1 (more links) Network LSA is generated by DR: (header) Mask = Router1 = Router2 = Router3 = Router4 = Router5 = Corresponds to the virtual router Network LSA reduces number of link records from O(n (n-1)) to 2 n. Particularly important if the network is ATM or Frame Relay with a lot of routers attached! Same for a CG network connecting many routers 7310/Comnet 70
71 Summary Link LSA (type 3,4) 0 TOS=x TOS=y TOS=z Network mask 0 TOS 0 metric 0 TOS x metric 0 TOS y metric... 0 TOS z metric For IP networks (type 3) Network mask of network/subnet Link state ID (in header) = IP network/subnet number For border routers (type 4) Network mask = 0xFFFFFFFF Link state ID (in header) = IP address of border router One separate advertisement for each destination 7310/Comnet 71
72 xternal Link LSA (type 5) Network mask,tos=0 0 TOS 0 metric xternal route tag (0),TOS=x 0 TOS x metric xternal route tag (x)...,tos=z 0 TOS z metric xternal route tag (z) Advertised by border routers Information from external gateway protocols (BGP-4) One destination per record Link state ID (in header) = IP network/subnet of destination Network mask = network/subnet mask -bit indicates that distance is not comparable to internal metrics Larger than any internal metric Route tag is only used by border routers (not used by OSPF) 7310/Comnet 72
73 Routes are computed after a change in the topology stub network external destination OSPF router OSPF router transit network stub network D external destination X D X (X) D D OSPF router OSPF router summarized network X X D stub network summarized network D D 7310/Comnet 73
74 Separate routes are calculated for each TOS TOS defined by OSPF 0000 normal service Defined as number of hops 0001 minimize monetary cost 0010 maximize reliability 0100 maximize throughput Defined as / interface speed ( 1 for a 100 Mbps link) 1000 minimize delay.g. units of 10 μs (microsecond) For a nonzero-tos route, only routers supporting TOS are used Some destinations may be unreachable for some TOS if not all routers support TOS routed with TOS 0 (no loops because same decision in all nodes) 7310/Comnet 74
75 Nonbroadcast multiaccess (NBMA) subnets support many routers communicating directly but do not have broadcast capability xamples are ATM, Frame Relay, X.25, CG IP routing requires more manual configuration Designated router and backup DR concept reduce the number of adjacencies The model is prone to failures that may be hard to track 7310/Comnet 75
76 Point-to-multipoint subnet is more robust but less efficient / There is no DR nor backup DR very OSPF router maintains adjacencies with all neighbors with whom it has direct connectivity Alternative is a set of NBMA networks Next hop routing protocol improves scalability 7310/Comnet 76
77 OSPF protocol operation 7310/Comnet 77
78 OSPF packets the protocol itself OSPF works directly on top of IP. OSPF protocol number is 89. Destination address in IP header is Neighbors IP address AllOSPFRouters ( ) AllDesignatedRouters ( ) Peer IP address (on virtual links) OSPF has 3 sub-protocols: Hello protocol xchange protocol Flooding protocol 7310/Comnet 78
79 The common OSPF message header Version=2 Type Packet length Router ID Area ID Checksum Authentic. type Authentication Authentication Type differentiates messages 1 = Hello 2 = Database Description 3 = Link State Request 4 = Link State Update 5 = Link State Ack Current version of OSPF is 2 Area ID Usually a (sub)network number 0 = Backbone Authentication type 0 = No authentication 1 = Password Limited protection 2 = Cryptographic authentication MD5 0 Key ID Length Cryptographic sequence number 7310/Comnet 79
80 The Hello protocol ensures that links are working and selects the Designated Router and Backup DR R1 R2 OSPF packet header type = 1 Hello ( to all OSPF routers) Network mask Hello interval Options Priority Dead interval Designated router Backup designated router Neighbor --- Neighbors a list of neighbors that have sent a hello packet during last dead interval seconds. Hello interval how often hello packets are sent (in seconds). Priority the eligibility for the role of designated router. A hello packet must be sent in both directions before a link is considered operational Neighbor Options = external route capability. T = TOS routing capability. M = Multicast capability (MOSPF). DR and Backup DR = 0 if not known 7310/Comnet 80
81 The Hello protocol selects the Designated Router and Backup DR ligibility is achieved after one dead interval provided two-way reachability is OK. 1. If one or several neighbors proposed themselves as backup designated router, the one with highest priority is elected as backup DR. Tie is broken by electing the one with highest ID. 2. If no neighbor proposed itself to backup DR, the neighbor with the highest priority is selected. Tie is broken by selecting the one with highest ID. 3. If one or several neighbors proposed themselves as designated router, the one with the highest priority is selected. Tie is broken by selecting the one with highest ID. 4. If none proposed itself to DR, the backup DR is promoted. Actions 1 and 2 are repeated to re-select the backup DR. To minimize changes, a high priority former DR postpones its proposal to retake the position of DR after recovery. Actions 1-4 are continuous. 7310/Comnet 81
82 The xchange protocol initially synchronizes link DB with the designated router (1) R1 dd_req (I=1,M=1,Ms=1) dd_req (I=1,M=1,Ms=0) dd_req (I=0,M=1,Ms=1) R2 Select the master OSPF packet header type = 2 (dd) 0 0 Options 0 I,M,Ms dd sequence number dd_req (I=0,M=1,Ms=0) dd = data description M = more xchange of descriptions I = initialize Ms = Master/slave xchange protocol uses database description packets First the master and slave are selected If both want to be masters, the highest address wins Retransmission if the packet is lost The same sequence number in the replies 7310/Comnet 82
83 The xchange protocol initially synchronizes link DB with the designated router (2) R1 dd_req (I=1,M=1,Ms=1) dd_req (I=1,M=1,Ms=0) dd_req (I=0,M=1,Ms=1) dd_req (I=0,M=1,Ms=0) dd = data description M = more R2 Select the master xchange of descriptions I = initialize Ms = Master/slave Master sends its Link DB description in sequence numbered packets Slave acknowledges by sending its corresponding description packets. key OSPF packet header type = 2 (dd) 0 0 Options 0 I,M,Ms dd sequence number Link state type Link state ID Advertising router Link state sequence number Link state checksum Link state age... xchange continues until all descriptions are sent and acknowledged. (M=0) Differences are recorded on the list of records-to-request. 7310/Comnet 83
84 Request packets are used to get record contents R1 request Advertisement as in flooding protocol R2 key OSPF packet header type = 3 (rq) Link state type Link state ID Advertising router --- Requests are acknowledged by flooding protocol packets Router waits for ack for resend interval. If no response, the request is repeated. If there are too many records to request, several rq messages are sent. If something goes wrong, the typical remedy is to restart role negotiation. The first request can be sent immediately when the first differing record has been detected. Then dd-packet exchange and rq-packet exchange take place in parallel. 7310/Comnet 84
85 The Flooding protocol continuously maintains the area s Link DB integrity Router X,... Advertisement Ack Designated Router Backup DR OSPF packet header type = 4 (upd.) Number of advertisements Link State Advertisements (see LSA format) --- Flooding OSPF packet header type = 5 (ack.) LSA headers --- Original LSA is always sent by the router responsible for that link. Advertisement is distributed according to flooding rules to the area (age=age+1). Ack of a new record by DR can be replaced in Broadcast network by update message. One ack packet can acknowledge many LSAs. By delaying, several acks are collected to a single packet 7310/Comnet 85
86 Summary of OSPF subprotocols Protocol Message Hello (1) DD (2) LS rq (3) LS upd (4) LS ack (5) Hello protocol X Database exchange X X X X Flooding protocol X X Server Cache Synchronization Protocol (SCSP) is OSPF without Dijkstra s algorithm and with more generic data objects. 7310/Comnet 86
87 LSA Sequence Numbers The initial sequence number - N + 1 (where N =2 31 ) is used the first time the LSA is originated Incremented each time a new version is sent When the max sequence number N-1 is reached The last version of the LSA is aged and removed from all routers Counting starts from the initial sequence number again Note that the lollipop sequence numbering (in the book) is not used any longer Replaced with a linear numbering space, with special rules for what happens when the sequence numbers reach the end of the numbering space 7310/Comnet 87
88 Link records have an age, old/dead ones are removed from Link DB (1) Old information must be removed from DB very node must use the same information The removals must be synchronized The LSAs of OSPF have an age Age = 0 when the advertisement is created Age = number of hops through which the advertisement has traveled + seconds from reception Max age is 1 hour Not used in the calculation of routes Must be removed very entry must be advertised at a 30 min interval. The new advertisement zeroes the age and increments the sequence number. 7310/Comnet 88
89 Link records have an age, old/dead ones are removed from Link DB (2) When the age reaches MaxAge (= 1 h) the entry is removed The router must send an advertisement to the neighbors when the aged entry is removed The flooding algorithm examines the age of the received advertisement 1. MaxAge advertisement is accepted and flooded this removes obsolete info. 2. If the age difference of the advertisement to the DB is small, the advertisement is not flooded to avoid overloading the network with multiple copies of the same info. This is due to normal routing when the entry is received on different paths. 3. If the age difference is large (>MaxAgeDiff), the newest advertisement is accepted and distributed. In this case, the router has probably been restarted. 4. If a MaxAge record is not found, advertisement has no impact. The router most likely has already removed the dead LSA. 7310/Comnet 89
90 Updated flooding algorithm Receive M Find entry L in link DB for which L.link = M.link Found? no Create entry L = M Broadcast M on all interfaces L.seq < M.seq? Update entry L = M Broadcast M on all interfaces nd no L.seq > M.seq M L L.link L.seq L.age Create message M = L Send M to sender no received and forwarded entry corresponding entry in link DB link id of entry L sequence number of entry L age of entry L M.age= MaxAge? no M.age-L.age no >MaxAgeDiff? Update entry L = M Broadcast M on all interfaces Delete entry L 7310/Comnet 90
91 OSPF timeouts LS Age field Constant Value Action of OSPF router MinLSArrival 1 second Max rate at which a router will accept updates of any LSA via flooding MinLSInterval CheckAge MaxAgeDiff LSRefreshTime MaxAge 5 seconds 5 min 15 min 30 min 1 hour Max rate at which a router can update an LSA Rate to verify an LSA Checksum in DB When Ages differ more than 15 min, they are considered separate. Smaller LS age - newer! A Router must refresh any self-originated LSA whose age has reached 30 min. LSA is removed from DB. 7310/Comnet 91
92 xample of routing hierarchy xample: / segments in each lowest level network Flat routing: RTsize= 16*9=144 Areas : 16 local routes / / / /16 = 20 RT entries! Summary records of the subnets in the backbone and other areas xternal records 7310/Comnet 92
93 Why is it difficult to route packets around network congestion? BBN ARPANT link state metric varied with the length of the output queue of the link lead to route trashing. The problem is there is no route pin-down for existing traffic. By limiting the range of the metric changes, an equilibrium could be reached. Nevertheless routing instability is the problem. When QoS or Class of Service a la DiffServ is introduced this problem again becomes important. 7310/Comnet 93
94 OSPF development history CIDR OSPF Group formed OSPFv1 published RFC 1131 OSPFv2 published RFC 1247 RFC 1583 OSPF update Becomes recommended Cryptographic authentication Point-to-multipoint interfaces MOSPF OSPFv2 updated RFC /Comnet 94
OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP
OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP Agenda OSPF Principles Introduction The Dijkstra Algorithm Communication Procedures LSA Broadcast Handling Splitted Area
More informationOSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database
OSPF - Open Shortest Path First OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP distance vector protocols like RIP have several dramatic disadvantages: slow adaptation
More informationLink State Routing. In particular OSPF. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. March 4, 2008
Link State Routing In particular OSPF dr. C. P. J. Koymans Informatics Institute University of Amsterdam March 4, 2008 dr. C. P. J. Koymans (UvA) Link State Routing March 4, 2008 1 / 70 1 Link State Protocols
More informationLink-state protocols and Open Shortest Path First (OSPF)
Fixed Internetworking Protocols and Networks Link-state protocols and Open Shortest Path First (OSPF) Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 0 ITIFN Objectives Describe the basic
More informationOSPF Domain / OSPF Area. OSPF Advanced Topics. OSPF Domain / OSPF Area. Agenda
OSPF Domain / OSPF Area OSPF Advanced Topics Areas,, Backbone, Summary-LSA, ASBR, Stub Area, Route Summarization, Virtual Links, Header Details OSPF domain can be divided in multiple OSPF areas to improve
More informationTable of Contents. OSPF Configuration 1
Table of Contents OSPF Configuration 1 Introduction to OSPF 1 Basic Concepts 2 Area Based OSPF Network Partition 3 Router Types 7 Classification of OSPF Networks 9 DR and BDR 9 OSPF Packet Formats 11 Supported
More informationLink State Routing. In particular OSPF. Karst Koymans. Informatics Institute University of Amsterdam. (version 16.3, 2017/03/09 11:25:31)
Link State Routing In particular OSPF Karst Koymans Informatics Institute University of Amsterdam (version 16.3, 2017/03/09 11:25:31) Tuesday, March 7, 2017 Karst Koymans (UvA) Link State Routing Tuesday,
More informationConfiguring the maximum number of external LSAs in LSDB 27 Configuring OSPF exit overflow interval 28 Enabling compatibility with RFC Logging
Contents Configuring OSPF 1 Overview 1 OSPF packets 1 LSA types 1 OSPF areas 2 Router types 4 Route types 5 Route calculation 6 OSPF network types 6 DR and BDR 6 Protocols and standards 8 OSPF configuration
More informationLink State Routing. In particular OSPF. Karst Koymans. Informatics Institute University of Amsterdam. (version 17.4, 2017/11/30 12:33:57)
Link State Routing In particular OSPF Karst Koymans Informatics Institute University of Amsterdam (version 17.4, 2017/11/30 12:33:57) Tuesday, November 28, 2017 Karst Koymans (UvA) Link State Routing Tuesday,
More informationConfiguring OSPF. The Cisco OSPF Implementation
Configuring OSPF This chapter describes how to configure Open Shortest Path First (OSPF). For a complete description of the OSPF commands in this chapter, refer to the OSPF s chapter of the Cisco IOS IP
More informationConfiguring OSPF. Information About OSPF CHAPTER
CHAPTER 22 This chapter describes how to configure the ASASM to route data, perform authentication, and redistribute routing information using the Open Shortest Path First (OSPF) routing protocol. The
More informationIntroduction to Local and Wide Area Networks
Introduction to Local and Wide Area Networks Lecturers Amnach Khawne Jirasak Sittigorn Chapter 1 1 Routing Protocols and Concepts Chapter 10 : Link-State Routing Protocols Chapter 11 : OSPF Chapter 1 2
More informationJunos Intermediate Routing
Junos Intermediate Routing Chapter 4: Open Shortest Path First 2012 Juniper Networks, Inc. All rights reserved. www.juniper.net Worldwide Education Services Chapter Objectives After successfully completing
More informationITE PC v4.0. Chapter Cisco Systems, Inc. All rights reserved. Cisco Public
OSPF Routing Protocols and Concepts Chapter 11 1 Objectives Describe the background and basic features of OSPF Identify and apply the basic OSPF configuration commands Describe, modify and calculate l
More informationIP Routing: OSPF Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
IP Routing: OSPF Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) First Published: dd, yyyy Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706
More informationIP Routing: OSPF Configuration Guide, Cisco IOS Release 12.2SX
IP Routing: OSPF Configuration Guide, Cisco IOS Release 12.2SX Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS
More informationQuestion No: 2 In an OSPF Hello packet, which of the following fields must match for all neighbor routers on the segment? Choose three answers.
Volume: 335 Questions Question No: 1 What is the default preference value for a static route in the Alcatel-Lucent 7750 SR? A. 0 B. 5 C. 10 D. 15 Answer: B Question No: 2 In an OSPF Hello packet, which
More informationOSPF. Routing Protocols and Concepts Chapter 11. ITE PC v4.0 Chapter Cisco Systems, Inc. All rights reserved. Cisco Public
OSPF Routing Protocols and Concepts Chapter 11 1 Objectives Describe the background and basic features of OSPF Identify and apply the basic OSPF configuration commands Describe, modify and calculate the
More informationIntroduction to OSPF. ISP Workshops. Last updated 11 November 2013
Introduction to OSPF ISP Workshops Last updated 11 November 2013 1 OSPF p Open Shortest Path First p Open: n Meaning an Open Standard n Developed by IETF (OSPF Working Group) for IP RFC1247 n Current standard
More informationIP Routing: OSPF Configuration Guide, Cisco IOS Release 12.4
IP Routing: OSPF Configuration Guide, Cisco IOS Release 12.4 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS
More informationIP Routing: OSPF Configuration Guide, Cisco IOS XE Release 2
IP Routing: OSPF Configuration Guide, Cisco IOS XE Release 2 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS
More informationCS 457 Lecture 16 Routing Continued. Spring 2010
CS 457 Lecture 16 Routing Continued Spring 2010 Scaling Link-State Routing Overhead of link-state routing Flooding link-state packets throughout the network Running Dijkstra s shortest-path algorithm Introducing
More informationOSPF for IPv6. ISP Workshops
OSPF for IPv6 ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated 17
More informationOSPF. OSPF Areas. BSCI Module Cisco Systems, Inc. All rights reserved. Cisco Public. Review of OSPF area characteristics:
OSPF BSCI Module 3 1 Minimizes routing table entries Localizes impact of a topology change within an area Detailed LSA flooding stops at the area boundary Requires a hierarchical network design OSPF Areas
More informationGuide to OSPF Application on the CSS 11000
Guide to OSPF Application on the CSS 11000 Document ID: 12638 Contents Introduction Before You Begin Conventions Prerequisites Components Used Description OSPF Configuration Task List Configuration Global
More informationLink State Routing. Stefano Vissicchio UCL Computer Science CS 3035/GZ01
Link State Routing Stefano Vissicchio UCL Computer Science CS 335/GZ Reminder: Intra-domain Routing Problem Shortest paths problem: What path between two vertices offers minimal sum of edge weights? Classic
More informationCisco IOS IP Routing: OSPF Command Reference
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION
More informationOSPF. Routing Protocols and Concepts Chapter 11
OSPF Routing Protocols and Concepts Chapter 11 Objectives Describe the background and basic features of OSPF Identify and apply the basic OSPF configuration commands Describe, modify and calculate the
More informationhttp://www.expertnetworkconsultant.com/configuring/ospf-neighbor-adjacency/ Brought to you by Expert Network Consultant.com OSPF Neighbor Adjacency Once upon a time, we walked together holding hands, we
More informationKillTest *KIJGT 3WCNKV[ $GVVGT 5GTXKEG Q&A NZZV ]]] QORRZKYZ IUS =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX
KillTest Q&A Exam : JN0-643 Title : Enterprise Routing and Switching, Professional (JNCIP-ENT) Version : Demo 1 / 10 1.Which connection method do OSPF routers use to communicate with each other? A. IP
More informationOSPF Mechanism to Exclude Connected IP Prefixes from LSA Advertisements
OSPF Mechanism to Exclude Connected IP Prefixes from LSA Advertisements This document describes the Open Shortest Path First (OSPF) mechanism to exclude IP prefixes of connected networks from link-state
More informationLecture 8 Link-State Routing
6998-02: Internet Routing Lecture 8 Link-State Routing John Ioannidis AT&T Labs Research ji+ir@cs.columbia.edu Copyright 2002 by John Ioannidis. All Rights Reserved. Announcements Lectures 1-5, 7-8 are
More informationROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724
ROUTING PROTOCOLS Dr. Ahmed Khattab EECE Department Cairo University Fall 2012 ELC 659/ELC724 Dr. Ahmed Khattab Fall 2012 2 Routing Network-wide process the determine the end to end paths that packets
More informationLink State Routing. Brad Karp UCL Computer Science. CS 3035/GZ01 3 rd December 2013
Link State Routing Brad Karp UCL Computer Science CS 33/GZ 3 rd December 3 Outline Link State Approach to Routing Finding Links: Hello Protocol Building a Map: Flooding Protocol Healing after Partitions:
More informationOSPF Enhanced Traffic Statistics for OSPFv2 and OSPFv3
OSPF Enhanced Traffic Statistics for OSPFv2 and OSPFv3 This document describes new and modified commands that provide enhanced OSPF traffic statistics for OSPFv2 and OSPFv3. The ability to collect and
More informationmaterial. For more information on how to get additional questions, please see a.
Review Questions The following questions are designed to test your understanding of this chapter s material. For more information on how to get additional questions, please see www.lammle.com/ccn a. You
More informationNetwork Layer (Routing)
Network Layer (Routing) Where we are in the ourse Moving on up to the Network Layer! Application Transport Network Link Physical SE 61 University of Washington Topics Network service models Datagrams (packets),
More informationCSE/EE 461. Link State Routing. Last Time. This Lecture. Routing Algorithms Introduction Distance Vector routing (RIP)
CSE/EE 46 Link State Routing Last Time Routing Algorithms Introduction Distance Vector routing (RIP) Application Presentation Session Transport Network Data Link Physical This Lecture Routing Algorithms
More informationCCNA Routing and Switching Study Guide Chapters 5 & 19: Multi-Area OSPF
CCNA Routing and Switching Study Guide Chapters 5 & 19: Multi-Area OSPF Instructor & Todd Lammle Chapter 20 objectives The ICND2 topics covered in this chapter include: IP Routing Technologies Configure
More informationOSPF Enhanced Traffic Statistics
This document describes new and modified commands that provide enhanced OSPF traffic statistics for OSPFv2 and OSPFv3. The ability to collect and display more detailed traffic statistics increases high
More informationNetwork Working Group Request for Comments: Category: Standards Track A. Zinin Alcatel-Lucent R. Coltun Acoustra Productions July 2008
Network Working Group Request for Comments: 5250 Obsoletes: 2370 Category: Standards Track L. Berger LabN I. Bryskin Adva A. Zinin Alcatel-Lucent R. Coltun Acoustra Productions July 2008 The OSPF Opaque
More informationRev a. Single-Area OSPF. c cnac o okbook.com
Rev. 00.00 a. Single-Area OSPF c cnac o okbook.com C O N F I G U R A T I O N Technically, we're using OSPFv for IPv, but that only matters because IPv uses OSPFv. Wildcard a bitmask controlling address
More informationComputer Networks II
ipartimento di Informatica e Sistemistica omputer Networks II Routing protocols Overview Luca Becchetti Luca.Becchetti@dis.uniroma.it.. 2009/200 Goals escribe approaches and give overview of mechanisms
More informationZebra MCR Software 1.0 Manual Yin Wang Networking Laboratory of Helsinki University of Technology
Zebra MCR Software 1.0 Manual Yin Wang Networking Laboratory of Helsinki University of Technology yinwang@netlab.hut.fi Please note: operating system requirement: Linux 2.4.20-30.9 (at least) 1. Configure
More informationOSPF Nonstop Routing. Finding Feature Information. Prerequisites for OSPF NSR
The feature allows a device with redundant Route Processors (RPs) to maintain its Open Shortest Path First (OSPF) state and adjacencies across planned and unplanned RP switchovers. The OSPF state is maintained
More informationSybex ICND Chapter 4 and 18: OSPF. Instructor & Todd Lammle
Sybex ICND2 200-105 Chapter 4 and 18: OSPF Instructor & Todd Lammle Chapter 4 objectives The ICND2 topics covered in this chapter include: 2 OSPF design example. An OSPF hierarchical design minimizes routing
More informationSimulative Comparison of MPLS Protection Switching vs. OSPF Re-routing
C O R P O R A T E T E C H N O L O Y Simulative Comparison of MPLS Protection Switching vs. OSPF Re-routing nformation & Sandrine PASQUALINI Antoine FROT Andreas Iselt Andreas Kirstädter C O R P O R A T
More informationOSPF Inbound Filtering Using Route Maps with
OSPF Inbound Filtering Using Route Maps with a Distribute List Finding Feature Information OSPF Inbound Filtering Using Route Maps with a Distribute List Last Updated: July 19, 2011 The OSPF Inbound Filtering
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University
More informationM U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic
M U LT I C A S T C O M M U N I C AT I O N S Tarik Cicic 9..08 O V E R V I E W One-to-many communication, why and how Algorithmic approach: Steiner trees Practical algorithms Multicast tree types Basic
More informationScalable Routing Protocols for Mobile Ad Hoc Networks
Helsinki University of Technology T-79.300 Postgraduate Course in Theoretical Computer Science Scalable Routing Protocols for Mobile Ad Hoc Networks Hafeth Hourani hafeth.hourani@nokia.com Contents Overview
More informationEnergy-Efficient MANET Routing: Ideal vs. Realistic Performance
Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Paper by: Thomas Knuz IEEE IWCMC Conference Aug. 2008 Presented by: Farzana Yasmeen For : CSE 6590 2013.11.12 Contents Introduction Review:
More informationA Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks
A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elisabeth M. Royer, Chai-Keong Toh IEEE Personal Communications, April 1999 Presented by Hannu Vilpponen 1(15) Hannu_Vilpponen.PPT
More informationolsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra
olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra www.scii.nl/~elektra Introduction Olsr.org is aiming to an efficient opensource routing solution for wireless networks Work
More informationDistance-Vector Routing
Distance-Vector Routing Antonio Carzaniga Faculty of Informatics University of Lugano June 8, 2007 c 2005 2007 Antonio Carzaniga 1 Recap on link-state routing Distance-vector routing Bellman-Ford equation
More informationOSPF Per-Interface Link-Local Signaling
OSPF Per-Interface Link-Local Signaling The OSPF Per-Interface Link-Local Signaling feature allows you to selectively enable or disable Link-Local Signaling (LLS) for a specific interface regardless of
More informationCSE 123: Computer Networks
Total Points = 27 CSE 123: Computer Networks Homework 3 Solutions Out: 5/11, Due: 5/18 Problems 1. Distance Vector Routing [9 points] For the network shown below, give the global distance vector tables
More informationBabel A flexible routing protocol
Babel A flexible routing protocol Juliusz Chroboczek PPS Université Paris-Diderot (Paris 7) 11 March 2014 1/33 The story In December 2006, I started on a quest to bring wifi to the Ph.D. students couch:
More informationAdvanced Modeling and Simulation of Mobile Ad-Hoc Networks
Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Prepared For: UMIACS/LTS Seminar March 3, 2004 Telcordia Contact: Stephanie Demers Robert A. Ziegler ziegler@research.telcordia.com 732.758.5494
More informationWireless Internet Routing. IEEE s
Wireless Internet Routing IEEE 802.11s 1 Acknowledgments Cigdem Sengul, Deutsche Telekom Laboratories 2 Outline Introduction Interworking Topology discovery Routing 3 IEEE 802.11a/b/g /n /s IEEE 802.11s:
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationOSPF Link-State Database Overload Protection
OSPF Link-State Database Overload Protection The OSPF Link-State Database Overload Protection feature allows you to limit the number of nonself-generated link-state advertisements (LSAs) for a given Open
More informationInterlayer routing issues for wireless networks
NRL Cross-Layer Workshop Interlayer routing issues for wireless networks June 2, 2004 Tom Henderson Marcelo Albuquerque Phil Spagnolo Jae H. Kim Boeing Phantom Works 1 Report Documentation Page Form Approved
More informationC Commands. Send comments to
This chapter describes the Cisco NX-OS Open Shortest Path First (OSPF) commands that begin with C. UCR-583 clear ip ospf neighbor clear ip ospf neighbor To clear neighbor statistics and reset adjacencies
More informationOSPF Version 3 for IPv6
OSPF Version 3 for IPv6 Modified: 2017-01-23 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks, Junos, Steel-Belted
More informationOverview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network
Ad Hoc and Wireless Mesh Networking Laura Marie Feeney lmfeeney@sics.se Datakommunikation III, HT 00 Overview Ad hoc and wireless mesh networks Ad hoc network (MANet) operates independently of network
More informationFoundations of Distributed Systems: Tree Algorithms
Foundations of Distributed Systems: Tree Algorithms Stefan Schmid @ T-Labs, 2011 Broadcast Why trees? E.g., efficient broadcast, aggregation, routing,... Important trees? E.g., breadth-first trees, minimal
More informationRouting and Wavelength Assignment in All-Optical DWDM Transport Networks with Sparse Wavelength Conversion Capabilities. Ala I. Al-Fuqaha, Ph.D.
Routing and Wavelength Assignment in All-Optical DWDM Transport Networks with Sparse Wavelength Conversion Capabilities Ala I. Al-Fuqaha, Ph.D. Overview Transport Network Architectures: Current Vs. IP
More informationLab Topology R16 R12 R15. Lo R /32 R /32 R /32 R /32 R / /
Lab Topology R16 So-5/0/0 So-4/2/0 100.3.0/30 100.5.0/30 So-1/3/0 100.0/30 So-1/0/0 So-2/0/0 So-2/1/0 Ge-2/3/0 Ge-1/2/0 R6 So-0/3/0 100.0/30 So-4/0/0 R12 So-3/0/0 100.4.0/30 So-1/0/0 R15 100.6.0/30 R7
More informationWireless Mesh Networks
Wireless Mesh Networks Renato Lo Cigno www.disi.unitn.it/locigno/teaching Part of this material (including some pictures) features and are freely reproduced from: Ian F.Akyildiz, Xudong Wang,Weilin Wang,
More informationaccurate as possible, the enclosed material is presented on an as is basis. Neither the authors nor
OSPF Disclaimer This Configuration Guide is designed to assist members to enhance their skills in particular technology area. While every effort has been made to ensure that all material is as complete
More informationLAB15: OSPF IPv6. OSPF: Not So Stubby Area. Disclaimer
Page1 LAB15: OSPF IPv6 Disclaimer This Configuration Guide is designed to assist members to enhance their skills in respective technology area. While every effort has been made to ensure that all material
More informationDepartment of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009.
Department of Computer Science and Engineering CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009 Final Examination Instructions: Examination time: 180 min. Print your name
More informationGrundlagen der Rechnernetze. Introduction
Grundlagen der Rechnernetze Introduction Overview Building blocks and terms Basics of communication Addressing Protocols and Layers Performance Historical development Grundlagen der Rechnernetze Introduction
More informationVulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR
5 th Scandinavian Workshop on Wireless Ad-hoc Networks May 3-4, 2005 Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR Mikael Fredin - Ericsson Microwave Systems, Sweden
More informationEnergy Saving Routing Strategies in IP Networks
Energy Saving Routing Strategies in IP Networks M. Polverini; M. Listanti DIET Department - University of Roma Sapienza, Via Eudossiana 8, 84 Roma, Italy 2 june 24 [scale=.8]figure/logo.eps M. Polverini
More informationPapers. Ad Hoc Routing. Outline. Motivation
CS 15-849E: Wireless Networks (Spring 2006) Ad Hoc Routing Discussion Leads: Abhijit Deshmukh Sai Vinayak Srinivasan Seshan Dave Andersen Papers Outdoor Experimental Comparison of Four Ad Hoc Routing Algorithms
More informationJunos OS. OSPF Version 3 for IPv6 Feature Guide. Release Published: Copyright 2011, Juniper Networks, Inc.
Junos OS OSPF Version 3 for IPv6 Feature Guide Release 11.4 Published: 2011-11-08 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net This product
More informationInternational Journal of Advance Engineering and Research Development (IJAERD) Volume 1,Issue 5,May 2014, e-issn: , print-issn:
Modified Route Maintenance in AODV Routing Protocol ChiragBhalodia (M.Tech, Research Scholar) 1, Prof. Amit M. Lathigara 2 Pg Scholar, Computer Engineering Department & R K University, chiragsbhalodia@gmail.com
More informationLecture 18: Network Layer Link State and Distance Vector Routing
Lecture 8: Network Laer Link State and Distance Vector Routing COMP 33, Spring 08 Victoria Manfredi Acknowledgements: materials adapted Computer Networking: A Top Down Approach 7 th edition: 996-06, J.F
More informationISP Operations Troubleshooting OSPF for IPv4 and IPv6
www.iparchitechs.com ISP Operations Troubleshooting OSPF for IPv4 and IPv6 P R E S E N T E D BY: KEVIN MYERS, NETWORK ARCHITECT Profile: About Kevin Myers Background: 19+ years in Networking Designed/Built
More informationThe Pennsylvania State University. The Graduate School. College of Engineering PERFORMANCE ANALYSIS OF END-TO-END
The Pennsylvania State University The Graduate School College of Engineering PERFORMANCE ANALYSIS OF END-TO-END SMALL SEQUENCE NUMBERS ROUTING PROTOCOL A Thesis in Computer Science and Engineering by Jang
More informationOSPF Sham-Link MIB Support
This feature introduces MIB support for the OSPF Sham-Link feature through the addition of new tables and trap MIB objects to the Cisco OSPF MIB (CISCO-OSPF-MIB) and the Cisco OSPF Trap MIB (CISCO-OSPF-TRAP-MIB).
More informationAnalysis and Design of Link Metrics for Quality Routing in Wireless Multi-hop Networks
Analysis and Design of Link Metrics for Quality Routing PhD Thesis Defense by Nadeem JAVAID Dec 15, 2010 Thesis Director Prof. Karim DJOUANI Jury : Rapporteur B.J. VAN WYK Prof. Tshwane University of Technology
More informationRequest for Comments: 4750
Network Working Group Request for Comments: 4750 Obsoletes: 1850 Category: Standards Track D. Joyal, Ed. Nortel P. Galecki, Ed. Airvana S. Giacalone, Ed. CSFB Original Authors: R. Coltun Touch Acoustra
More informationRouting Algorithm Classification. A Distance Vector Routing Algorithm
Routing lgorithm lassification Global or decentralied information? Global: ll routers have complete topolog, link cost info Link state algorithms Decentralied: Router knows phsicallconnected neighbors,
More informationRobonet - MANET for Robot Communication
Robonet - MANET for Robot Communication Authors: Stiven Andre Supervisor: Aram Movsisian Motivation Robotic developers need a way for robots to communicate. Swarm of robots want to communicate in a constantly
More informationNetworks: how Information theory met the space and time. Philippe Jacquet INRIA Ecole Polytechnique France
Networks: how Information theory met the space and time Philippe Jacquet INRIA Ecole Polytechnique France Plan of the talk History of networking and telecommunication Physics, mathematics, computer science
More informationCS649 Sensor Networks IP Lecture 9: Synchronization
CS649 Sensor Networks IP Lecture 9: Synchronization I-Jeng Wang http://hinrg.cs.jhu.edu/wsn06/ Spring 2006 CS 649 1 Outline Description of the problem: axes, shortcomings Reference-Broadcast Synchronization
More informationA Study of Dynamic Routing and Wavelength Assignment with Imprecise Network State Information
A Study of Dynamic Routing and Wavelength Assignment with Imprecise Network State Information Jun Zhou Department of Computer Science Florida State University Tallahassee, FL 326 zhou@cs.fsu.edu Xin Yuan
More informationQUIZ : oversubscription
QUIZ : oversubscription A telco provider sells 5 Mpbs DSL service to 50 customers in a neighborhood. The DSLAM connects to the central office via one T3 and two T1 lines. What is the oversubscription factor?
More informationPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR 802.11P INCLUDING PROPAGATION MODELS Mit Parmar 1, Kinnar Vaghela 2 1 Student M.E. Communication Systems, Electronics & Communication Department, L.D. College
More informationAd Hoc Networks - Routing and Security Issues
Ad Hoc Networks - Routing and Security Issues Mahalingam Ramkumar Mississippi State University, MS January 25, 2005 1 2 Some Basic Terms Basic Terms Ad Hoc vs Infrastructured AHN MANET (Mobile Ad hoc NETwork)
More informationFiber Distributed Data Interface
Fiber istributed ata Interface FI: is a 100 Mbps fiber optic timed token ring LAN Standard, over distance up to 200 km with up to 1000 stations connected, and is useful as backbone Token bus ridge FI uses
More informationIX Series 2. Description. IX Series 2 System Features
IX Series 2 Description The IX Series 2 is a network-based video intercom platform. It is designed for access entry, internal communication, audio paging, and emergency calling applications. The IX Series
More informationOSPF and MANET WG meetings, IETF64. OSPF MANET Design Team outbrief. November, Tom Henderson
OSPF and MANET WG meetings, IETF64 OSPF MANET Design Team outbrief November, 2005 Tom Henderson {thomas.r.henderson@boeing.com} Design team members: Emmanuel Baccelli, Madhavi Chandra, Thomas Clausen,
More informationUCS-805 MOBILE COMPUTING NIT Agartala, Dept of CSE Jan-May,2011
Location Management for Mobile Cellular Systems SLIDE #3 UCS-805 MOBILE COMPUTING NIT Agartala, Dept of CSE Jan-May,2011 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com
More informationVolume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 6.047 Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey
More informationSourceSync. Exploiting Sender Diversity
SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored
More informationUtilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks
Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,
More information