SlideShare a Scribd company logo
2
Most read
3
Most read
ASSIGNMENT # 1
SUBMITTED TO:
SIR HANNAN
SUBMITTED BY:
RABIA ZAFAR
17581556-045
BS IT 5TH
SEMESTER
SECTION ‘A’
TOPIC:
LINK STATE ROUTING PROTOCOL
Link state routing protocol:
Link-state routing protocols are one of the two main classes of routing protocols used in packet
switching networks for computer communications, the other being distance-vector routing
protocols. Examples of link-state routing protocols include Open Shortest Path First (OSPF)
and Intermediate System to Intermediate System (ISIS).
The link-state protocol is performed by every switching node in the network .Link-state routing is
that every node constructs a map of the connectivity to the network, in the form of a graph,
showing which nodes are connected to which other nodes. Each node then independently
calculates the next best logical path from it to every possible destination in the network. Each
collection of best paths will then form each node's routing table.
This contrasts with distance-vector routing protocols, which work by having each node share its
routing table with its neighbors in a link-state protocol the only information passed between
nodes is connectivity related.
Determining the neighbors of each node
First, each node needs to determine what other ports it is connected to, over fully working links;
it does this using a reachability protocol which it runs periodically and separately with each of
its directly connected neighbors.
Distributing the information for the map
Next, each node a short message, the link-state advertisement, which:
 Identifies the node which is producing it.
 Identifies all the other nodes to which it is directly connected.
 Includes a sequence number, which increases every time the source node makes up a new
version of the message.
This message is sent to all the nodes on a network. As a necessary precursor, each node in the
network remembers, for every one of its neighbors, the sequence number of the last link-state
message which it received from that node. When a link-state advertisement is received at a node,
the node looks up the sequence number it has stored for the source of that link-state message: if
this message is newer it is saved, the sequence number is updated, and a copy is sent in turn to
each of that node's neighbors. This procedure rapidly gets a copy of the latest version of each
node's link-state advertisement to every node in the network.
Some actions are required to ensure that each node has the routing table are:
1- Creation of the state of the link by each node called link state packet.
2- Dissemination of LSPs to every router called flooding.
3- Formation of shortest path tree for each node.
4- Calculation of routing table based on the shortest path tree.
Calculating the shortest paths
Each node independently runs an algorithm over the map to determine the shortest path from
itself to every other node in the network.
Dijkstra algorithm:
Generally some variant of Dijkstra's algorithm is used. This is based around a link cost across
each path which includes available bandwidth among other things.
A node maintains two data structures: a tree containing nodes which are "done", and a list
of candidates. The algorithm starts with both structures empty; it then adds to the first one the
node itself. The variant of a Greedy Algorithm then repetitively does the following:
 All neighbor nodes which are directly connected to the node are just added to the tree.
Excepting any nodes which are already in either the tree or the candidate list. The rest are
added to the second list.
 Each node in the candidate list is compared to each of the nodes already in the tree. The
candidate node which is closest to any of the nodes already in the tree is itself moved into the
tree and attached to the appropriate neighbor node. When a node is moved from the
candidate list into the tree, it is removed from the candidate list and is not considered in
subsequent iterations of the algorithm.
Filling the routing table
With the shortest paths in hand, the next step is to fill in the routing table. For any given
destination node, the best path for that destination is the node which is the first step from the
root node, down the branch in the shortest-path tree which leads toward the desired destination
node.
To create the routing table, it is only necessary to walk the tree, remembering the identity of the
node at the head of each branch, and filling in the routing table entry for each node one comes
across with that identity.

More Related Content

PPTX
Link state routing protocol
PPSX
Congestion control in TCP
PPTX
Transport layer
PPTX
OPEN SHORTEST PATH FIRST (OSPF)
PPTX
Cyclic Redundancy Check in Computers Network
PPTX
PPTX
Turing Machine
PPTX
Dependencies
Link state routing protocol
Congestion control in TCP
Transport layer
OPEN SHORTEST PATH FIRST (OSPF)
Cyclic Redundancy Check in Computers Network
Turing Machine
Dependencies

What's hot (20)

PPT
udp , tcp ,sctp
PPTX
Routing and routing algorithms
PPTX
Presentation on arp protocol
PDF
Transport layer services
PPTX
tic-tac-toe: Game playing
PPT
csma ca
PPTX
Network Layer
PPT
data-link layer protocols
PPTX
Multiprocessor
PPTX
Ip packet delivery
PDF
Collision prevention on computer architecture
PPTX
Inter Process Communication
PPTX
COMPUTER NETWORKS NOTES Unit 4
PPTX
HDLC(high level data link control)
PDF
Transaction TCP
PPTX
Transport layer protocols : TCP and UDP
PPT
Branch prediction
PPTX
Distance Vector & Link state Routing Algorithm
PPT
Unit06 dbms
PPTX
The medium access sublayer
udp , tcp ,sctp
Routing and routing algorithms
Presentation on arp protocol
Transport layer services
tic-tac-toe: Game playing
csma ca
Network Layer
data-link layer protocols
Multiprocessor
Ip packet delivery
Collision prevention on computer architecture
Inter Process Communication
COMPUTER NETWORKS NOTES Unit 4
HDLC(high level data link control)
Transaction TCP
Transport layer protocols : TCP and UDP
Branch prediction
Distance Vector & Link state Routing Algorithm
Unit06 dbms
The medium access sublayer
Ad

Similar to Link state routing protocol (20)

PDF
Routing basics
PPTX
Ch 20 UNICAST ROUTING SECTION 2
PDF
An Insight on Routing
PPTX
Routing Techniques
PDF
E04402030037
PPTX
OSPF Open Shortest Path First protocol full details
PDF
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
PDF
Routing
PPTX
sohini 130180107056(2140709)
PDF
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
PDF
RIP and OSPF
PDF
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PDF
A New Theoretical Approach to Location Based Power Aware Routing
PPSX
OSPF - Routing Protocol
PDF
A Novel Energy Efficient and Administrator Based Secured Routing in MANET
PPTX
Routing algorithm
PDF
Routing Protocols notes document .pptx.pdf
PPTX
Unit 3_Network Layer_Part II.pptx
PDF
CS6003 AD HOC AND SENSOR NETWORKS
PPT
Routing protocols
Routing basics
Ch 20 UNICAST ROUTING SECTION 2
An Insight on Routing
Routing Techniques
E04402030037
OSPF Open Shortest Path First protocol full details
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Routing
sohini 130180107056(2140709)
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
RIP and OSPF
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
A New Theoretical Approach to Location Based Power Aware Routing
OSPF - Routing Protocol
A Novel Energy Efficient and Administrator Based Secured Routing in MANET
Routing algorithm
Routing Protocols notes document .pptx.pdf
Unit 3_Network Layer_Part II.pptx
CS6003 AD HOC AND SENSOR NETWORKS
Routing protocols
Ad

More from university of Gujrat, pakistan (20)

PPTX
Change management
PPTX
Latest Trends in Digital Marketing
PPTX
Code of ethics and professional conduct (1)
PPTX
Certification accreditation and licensure (1)
PPTX
biggest technology trends
PPTX
Freedom of information (1)
PPTX
Individual cognition ppt (1)
PDF
Top 10 highest (1)
PPTX
creativity and imagination
PPTX
Brainstorming 078 (1)
PPTX
speeh-artificial intelligemce
PPTX
Pp dealing with problem complexity (1)
PPTX
Vision of artificial intelligence (1)
PPTX
Entrepreneurship (1)
PPTX
Role of professional societies
PPTX
Dealing with culticultural environment (1)
PPTX
Dealing with problem complexity (1)
PPTX
cyber security and cyber crime
Change management
Latest Trends in Digital Marketing
Code of ethics and professional conduct (1)
Certification accreditation and licensure (1)
biggest technology trends
Freedom of information (1)
Individual cognition ppt (1)
Top 10 highest (1)
creativity and imagination
Brainstorming 078 (1)
speeh-artificial intelligemce
Pp dealing with problem complexity (1)
Vision of artificial intelligence (1)
Entrepreneurship (1)
Role of professional societies
Dealing with culticultural environment (1)
Dealing with problem complexity (1)
cyber security and cyber crime

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
cuic standard and advanced reporting.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Approach and Philosophy of On baking technology
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPT
Teaching material agriculture food technology
PDF
Electronic commerce courselecture one. Pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Empathic Computing: Creating Shared Understanding
PDF
Encapsulation theory and applications.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
Spectral efficient network and resource selection model in 5G networks
The AUB Centre for AI in Media Proposal.docx
Per capita expenditure prediction using model stacking based on satellite ima...
20250228 LYD VKU AI Blended-Learning.pptx
cuic standard and advanced reporting.pdf
Big Data Technologies - Introduction.pptx
Approach and Philosophy of On baking technology
sap open course for s4hana steps from ECC to s4
Advanced methodologies resolving dimensionality complications for autism neur...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
MYSQL Presentation for SQL database connectivity
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Teaching material agriculture food technology
Electronic commerce courselecture one. Pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Empathic Computing: Creating Shared Understanding
Encapsulation theory and applications.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Building Integrated photovoltaic BIPV_UPV.pdf

Link state routing protocol

  • 1. ASSIGNMENT # 1 SUBMITTED TO: SIR HANNAN SUBMITTED BY: RABIA ZAFAR 17581556-045 BS IT 5TH SEMESTER SECTION ‘A’ TOPIC: LINK STATE ROUTING PROTOCOL
  • 2. Link state routing protocol: Link-state routing protocols are one of the two main classes of routing protocols used in packet switching networks for computer communications, the other being distance-vector routing protocols. Examples of link-state routing protocols include Open Shortest Path First (OSPF) and Intermediate System to Intermediate System (ISIS). The link-state protocol is performed by every switching node in the network .Link-state routing is that every node constructs a map of the connectivity to the network, in the form of a graph, showing which nodes are connected to which other nodes. Each node then independently calculates the next best logical path from it to every possible destination in the network. Each collection of best paths will then form each node's routing table. This contrasts with distance-vector routing protocols, which work by having each node share its routing table with its neighbors in a link-state protocol the only information passed between nodes is connectivity related. Determining the neighbors of each node First, each node needs to determine what other ports it is connected to, over fully working links; it does this using a reachability protocol which it runs periodically and separately with each of its directly connected neighbors. Distributing the information for the map Next, each node a short message, the link-state advertisement, which:  Identifies the node which is producing it.  Identifies all the other nodes to which it is directly connected.  Includes a sequence number, which increases every time the source node makes up a new version of the message. This message is sent to all the nodes on a network. As a necessary precursor, each node in the network remembers, for every one of its neighbors, the sequence number of the last link-state
  • 3. message which it received from that node. When a link-state advertisement is received at a node, the node looks up the sequence number it has stored for the source of that link-state message: if this message is newer it is saved, the sequence number is updated, and a copy is sent in turn to each of that node's neighbors. This procedure rapidly gets a copy of the latest version of each node's link-state advertisement to every node in the network. Some actions are required to ensure that each node has the routing table are: 1- Creation of the state of the link by each node called link state packet. 2- Dissemination of LSPs to every router called flooding. 3- Formation of shortest path tree for each node. 4- Calculation of routing table based on the shortest path tree. Calculating the shortest paths Each node independently runs an algorithm over the map to determine the shortest path from itself to every other node in the network. Dijkstra algorithm: Generally some variant of Dijkstra's algorithm is used. This is based around a link cost across each path which includes available bandwidth among other things.
  • 4. A node maintains two data structures: a tree containing nodes which are "done", and a list of candidates. The algorithm starts with both structures empty; it then adds to the first one the node itself. The variant of a Greedy Algorithm then repetitively does the following:  All neighbor nodes which are directly connected to the node are just added to the tree. Excepting any nodes which are already in either the tree or the candidate list. The rest are added to the second list.  Each node in the candidate list is compared to each of the nodes already in the tree. The candidate node which is closest to any of the nodes already in the tree is itself moved into the tree and attached to the appropriate neighbor node. When a node is moved from the candidate list into the tree, it is removed from the candidate list and is not considered in subsequent iterations of the algorithm. Filling the routing table With the shortest paths in hand, the next step is to fill in the routing table. For any given destination node, the best path for that destination is the node which is the first step from the root node, down the branch in the shortest-path tree which leads toward the desired destination node.
  • 5. To create the routing table, it is only necessary to walk the tree, remembering the identity of the node at the head of each branch, and filling in the routing table entry for each node one comes across with that identity.