SlideShare a Scribd company logo
1 of 32
Respa Peter
Routing protocol
 A routing protocol specifies how routers communicate with each
other
 Routing algorithms determine the specific choice of route.
Suffered from problems of Distance Vector Protocol
Count to Infinity Problem
Slow Convergence
Large update packets
Slow response to topological changes
 Need for a Link State Protocol.
OSPFOSPF Open Shortest Path First is a link-state routing protocol that
was developed in 1991.
OSPF was developed as a replacement for the distance vector
routing protocol RIP .
Based on Bellman-Ford Algorithm
Worked well in small systems
Areas
An OSPF network can be divided into sub-domains called areas.
 An area is a logical collection of OSPF networks, routers, and links
that have the same area identification.
Areas limit the scope of route information distribution. It is not
possible to do route update filtering within an area.
The main benefit of creating areas is a reduction in the number of
routes to propagate—by the filtering and the summarization of routes.
 Areas are identified by an area ID.
 All network inside an area must be connected.
 At the border of an area, special router called area border routers.
 It summarize the information and send to other areas
Backbone Area
 A backbone area—which combines a set of independent areas into
a single domain.
The backbone has the reserved area ID of 0.0.0.0. The OSPF backbone
area is also known as area 0.
The backbone acts as a hub for inter-area transit traffic and the
distribution of routing information between areas
Each non-backbone area must be directly connected to the backbone
area.
The backbone area must not be partitioned—divided into smaller
pieces—under any failure conditions
The backbone serves as primary area and the other areas as
secondary areas.
The router inside backbone area is known as backbone routers.
OSPF (type of links)
•In OSPF , a connection called a link.
•Four types of links have been defined they are:
Point-to-Point Link
A point-to-point link is a dedicated link that connects exactly two
communication facilities.
It connect two routers without any other host or router in between.
Eg : Telephone line .
No need to assign a network address to this type of link.
Router - Nodes
Link – Bidirectional edge
 Transient link
•Several routers attached to it.
•Data can enter or retrive
through any routers.
•Each routers have many no: of
neighbors.
 Stub Link
•Connected only to one router.
•Data enter and leave through this single router.
•Only one direction
 Virtual Link
 When link between two routers are broken, the administrator
create a virtual link between them
Using a longer path, which pass through several routers.
Graphical Representation
 An AS can represent graphically.
OSPF Packets
 It uses five different packets:
 hello
 database description
 link state acknowledgment
Common Header
 All packets have common headers.
Version 8 bit field define the version of OSPF
protocol
Type 8 bit field
Define type of packet
Message length 16 bit field,
define length of total length including
header
Source router IP address 32 bit field
define IP address of router that send
packets
Area identification 32 bit field
Checksum Used for error detection on entire packet
excluding authentication type and
authentication data field
Authentication type 16 bit
Define authentication protocol used in
this area; two types
0 – none
1 – password
Authentication 64 bit
Link State Update Packet
 Heart of the OSPF operation.
 Used by a router to advertise the state of its links.
•Each update packet contain several different LSAs.
•All having same general headers
Link state age Received E T Link state type
Link state ID
Advertisement Router
Link state Sequence number
Link state checksum Length
Other Packets
A. OSPF Hello Protocol
Hello subprotocol is intended to perform the following tasks
within OSPF:
Dynamic neighbor discovery
Detect unreachable neighbors
Ensure two-way communications between neighbors
Ensure correctness of basic interface parameters between
neighbors
Provide necessary information for the election of the Designated
and Backup Designated routers on a LAN segment (coming)
B. Database Description Message
 Is used mostly during the database exchange
 The first DBD packet is used to elect the master and slave
relationship and to set the initial sequence number elected by the
master.
The router with the highest router ID becomes the master and
initiates the database synchronization.
The master sends the sequence number, and the slave
acknowledges it.
 After the master and the slave are elected, the database
synchronization starts; in this process, the headers of all the LSAs
are exchanged with neighbors.
The DBD packet format.
I Bit— When set to 1, this means that this is the first packet in DBD exchange.
M Bit— When set to 1, this means that more packets will follow.
MS Bit— Use this for master and slave. When this bit is set, it means that the
router is a master in the DBD exchange process. If this bit is set to 0, it means
that the router is the slave.
DBD Sequence Number— This field contains a unique value set by the
master. This sequence number is used during database exchange. Only a
master can increment the sequence number.
LSA Header— This field consists of a list of the link-state database headers.
C. Link-State Request Packets
A link-state request packet, is sent if part of the database is missing or
out-of-date.
The link-state request packet is used to retrieve that precise piece of
database information that is missing.
Link-state packets are also used after the DBD exchange is finished to
request the LSAs that have been seen during the DBD exchange.
Fig illustrates the link-state request packet format.
LS Type— Identifies what type of LSA is being requested.
Link-State ID— Represents the link-state ID of that specific LSA.
Link-state ID is discussed later in this chapter.
Advertising Router— Contains the router ID of the router that is
originating this LSA.
D. Link-State Acknowledgment
PacketThe link-state acknowledgment packet, is used to acknowledge each
LSA.
This packet is sent in response to link-state update packets.
 Multiple LSAs can be acknowledged in a single link-state
acknowledgment packet.
This packet is responsible for the reliable delivery of link-state update
packets.
Figure illustrates the link-state acknowledgment packet format.
Thank You

More Related Content

What's hot

Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
Kashif Latif
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
Muuluu
 

What's hot (20)

Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Ospf
 Ospf Ospf
Ospf
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
Rip presentation
Rip presentationRip presentation
Rip presentation
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
EIGRP Overview
EIGRP OverviewEIGRP Overview
EIGRP Overview
 
Ethernet
EthernetEthernet
Ethernet
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithm
 
Routing ppt
Routing pptRouting ppt
Routing ppt
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-ca
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing Protocols
 
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
OSPF Basics
OSPF BasicsOSPF Basics
OSPF Basics
 

Viewers also liked

Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPF
arpit
 
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway Protocol
Kashif Latif
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
CAVC
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil Nembang
Anil Nembang
 
An Overview of Border Gateway Protocol (BGP)
An Overview of Border Gateway Protocol (BGP)An Overview of Border Gateway Protocol (BGP)
An Overview of Border Gateway Protocol (BGP)
Jasim Alam
 
Carátula
CarátulaCarátula
Carátula
1 2d
 

Viewers also liked (20)

OSPF - Routing Protocol
OSPF - Routing ProtocolOSPF - Routing Protocol
OSPF - Routing Protocol
 
Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPF
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
 
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway Protocol
 
Protocole OSPF
Protocole OSPFProtocole OSPF
Protocole OSPF
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
 
bgp protocol
 bgp protocol bgp protocol
bgp protocol
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
 
Module 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerModule 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layer
 
Ospf
OspfOspf
Ospf
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil Nembang
 
Dynamic routing OSPF 1
Dynamic routing OSPF 1Dynamic routing OSPF 1
Dynamic routing OSPF 1
 
Electronic Mail
Electronic MailElectronic Mail
Electronic Mail
 
Bgp
BgpBgp
Bgp
 
CCNA pptCCNA ppt Day 6
CCNA pptCCNA ppt Day 6CCNA pptCCNA ppt Day 6
CCNA pptCCNA ppt Day 6
 
FTP & TFTP
FTP & TFTPFTP & TFTP
FTP & TFTP
 
Email
EmailEmail
Email
 
An Overview of Border Gateway Protocol (BGP)
An Overview of Border Gateway Protocol (BGP)An Overview of Border Gateway Protocol (BGP)
An Overview of Border Gateway Protocol (BGP)
 
Carátula
CarátulaCarátula
Carátula
 

Similar to Open shortest path first (ospf)

Similar to Open shortest path first (ospf) (20)

Osp fv3 cs
Osp fv3 csOsp fv3 cs
Osp fv3 cs
 
Ospf
OspfOspf
Ospf
 
C C N A Day3
C C N A  Day3C C N A  Day3
C C N A Day3
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
OSPF.pptx
OSPF.pptxOSPF.pptx
OSPF.pptx
 
Ospf routing protocol
Ospf routing protocolOspf routing protocol
Ospf routing protocol
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
OSPF.pdf
OSPF.pdfOSPF.pdf
OSPF.pdf
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
 
Ospf
OspfOspf
Ospf
 
Ospf infinite skills
Ospf infinite skillsOspf infinite skills
Ospf infinite skills
 
Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocols
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
 
ch2_p3_ospf.pptx
ch2_p3_ospf.pptxch2_p3_ospf.pptx
ch2_p3_ospf.pptx
 
CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
 
OSPF Overview
OSPF OverviewOSPF Overview
OSPF Overview
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 

More from Respa Peter

More from Respa Peter (14)

Tpes of Softwares
Tpes of SoftwaresTpes of Softwares
Tpes of Softwares
 
Information technology for business
Information technology for business Information technology for business
Information technology for business
 
Types of sql injection attacks
Types of sql injection attacksTypes of sql injection attacks
Types of sql injection attacks
 
DataMining Techniq
DataMining TechniqDataMining Techniq
DataMining Techniq
 
Database
DatabaseDatabase
Database
 
software failures
 software failures software failures
software failures
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Managing software development
Managing software developmentManaging software development
Managing software development
 
Data mining
Data miningData mining
Data mining
 
Knime
KnimeKnime
Knime
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
 
Matrix multiplicationdesign
Matrix multiplicationdesignMatrix multiplicationdesign
Matrix multiplicationdesign
 
Web services have made the development of mobile Web applications much easier...
Web services have made the development of mobile Web applications much easier...Web services have made the development of mobile Web applications much easier...
Web services have made the development of mobile Web applications much easier...
 
Matrix chain multiplication
Matrix chain multiplicationMatrix chain multiplication
Matrix chain multiplication
 

Recently uploaded

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 

Recently uploaded (20)

Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 

Open shortest path first (ospf)

  • 2. Routing protocol  A routing protocol specifies how routers communicate with each other  Routing algorithms determine the specific choice of route.
  • 3. Suffered from problems of Distance Vector Protocol Count to Infinity Problem Slow Convergence Large update packets Slow response to topological changes  Need for a Link State Protocol.
  • 4. OSPFOSPF Open Shortest Path First is a link-state routing protocol that was developed in 1991. OSPF was developed as a replacement for the distance vector routing protocol RIP . Based on Bellman-Ford Algorithm Worked well in small systems
  • 5. Areas An OSPF network can be divided into sub-domains called areas.  An area is a logical collection of OSPF networks, routers, and links that have the same area identification. Areas limit the scope of route information distribution. It is not possible to do route update filtering within an area.
  • 6. The main benefit of creating areas is a reduction in the number of routes to propagate—by the filtering and the summarization of routes.  Areas are identified by an area ID.  All network inside an area must be connected.  At the border of an area, special router called area border routers.  It summarize the information and send to other areas
  • 7. Backbone Area  A backbone area—which combines a set of independent areas into a single domain. The backbone has the reserved area ID of 0.0.0.0. The OSPF backbone area is also known as area 0. The backbone acts as a hub for inter-area transit traffic and the distribution of routing information between areas Each non-backbone area must be directly connected to the backbone area. The backbone area must not be partitioned—divided into smaller pieces—under any failure conditions
  • 8. The backbone serves as primary area and the other areas as secondary areas. The router inside backbone area is known as backbone routers.
  • 9.
  • 10. OSPF (type of links) •In OSPF , a connection called a link. •Four types of links have been defined they are:
  • 11. Point-to-Point Link A point-to-point link is a dedicated link that connects exactly two communication facilities. It connect two routers without any other host or router in between. Eg : Telephone line . No need to assign a network address to this type of link. Router - Nodes Link – Bidirectional edge
  • 12.  Transient link •Several routers attached to it. •Data can enter or retrive through any routers. •Each routers have many no: of neighbors.
  • 13.  Stub Link •Connected only to one router. •Data enter and leave through this single router. •Only one direction
  • 14.  Virtual Link  When link between two routers are broken, the administrator create a virtual link between them Using a longer path, which pass through several routers.
  • 15. Graphical Representation  An AS can represent graphically.
  • 16. OSPF Packets  It uses five different packets:  hello  database description  link state acknowledgment
  • 17.
  • 18. Common Header  All packets have common headers.
  • 19. Version 8 bit field define the version of OSPF protocol Type 8 bit field Define type of packet Message length 16 bit field, define length of total length including header Source router IP address 32 bit field define IP address of router that send packets Area identification 32 bit field Checksum Used for error detection on entire packet excluding authentication type and authentication data field Authentication type 16 bit Define authentication protocol used in this area; two types 0 – none 1 – password Authentication 64 bit
  • 21.  Heart of the OSPF operation.  Used by a router to advertise the state of its links. •Each update packet contain several different LSAs. •All having same general headers
  • 22. Link state age Received E T Link state type Link state ID Advertisement Router Link state Sequence number Link state checksum Length
  • 23. Other Packets A. OSPF Hello Protocol
  • 24. Hello subprotocol is intended to perform the following tasks within OSPF: Dynamic neighbor discovery Detect unreachable neighbors Ensure two-way communications between neighbors Ensure correctness of basic interface parameters between neighbors Provide necessary information for the election of the Designated and Backup Designated routers on a LAN segment (coming)
  • 25. B. Database Description Message  Is used mostly during the database exchange  The first DBD packet is used to elect the master and slave relationship and to set the initial sequence number elected by the master. The router with the highest router ID becomes the master and initiates the database synchronization. The master sends the sequence number, and the slave acknowledges it.  After the master and the slave are elected, the database synchronization starts; in this process, the headers of all the LSAs are exchanged with neighbors.
  • 26. The DBD packet format.
  • 27. I Bit— When set to 1, this means that this is the first packet in DBD exchange. M Bit— When set to 1, this means that more packets will follow. MS Bit— Use this for master and slave. When this bit is set, it means that the router is a master in the DBD exchange process. If this bit is set to 0, it means that the router is the slave. DBD Sequence Number— This field contains a unique value set by the master. This sequence number is used during database exchange. Only a master can increment the sequence number. LSA Header— This field consists of a list of the link-state database headers.
  • 28. C. Link-State Request Packets A link-state request packet, is sent if part of the database is missing or out-of-date. The link-state request packet is used to retrieve that precise piece of database information that is missing. Link-state packets are also used after the DBD exchange is finished to request the LSAs that have been seen during the DBD exchange.
  • 29. Fig illustrates the link-state request packet format. LS Type— Identifies what type of LSA is being requested. Link-State ID— Represents the link-state ID of that specific LSA. Link-state ID is discussed later in this chapter. Advertising Router— Contains the router ID of the router that is originating this LSA.
  • 30. D. Link-State Acknowledgment PacketThe link-state acknowledgment packet, is used to acknowledge each LSA. This packet is sent in response to link-state update packets.  Multiple LSAs can be acknowledged in a single link-state acknowledgment packet. This packet is responsible for the reliable delivery of link-state update packets. Figure illustrates the link-state acknowledgment packet format.
  • 31.