<?xml version="1.0" encoding="utf-8"?>
<!-- generator="" -->
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
	<title type="text">Routing</title>
	<subtitle type="text">Leading Network Security &amp; Cyber Security site. Cisco Routing/Switching, VPN, Microsoft, SASE, SSE, F5, PaloAlto Firewalls, Protocol Analysis, Tips &amp; more.</subtitle>
	<link rel="alternate" type="text/html" href="https://www.firewall.cx"/>
	<id>https://www.firewall.cx/networking/routing-protocols.feed</id>
	<updated>2026-04-11T12:40:39+10:00</updated>
	<author>
		<name>Firewall.cx Website</name>
	</author>
	<generator uri="https://www.joomla.org"></generator>
	<link rel="self" type="application/atom+xml" href="https://www.firewall.cx/networking/routing-protocols.feed?type=atom"/>
	<entry>
		<title>OSPF - Part 6: OSPF LSA Types - Purpose and Function of Every OSPF LSA</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/routing-protocols/ospf-lsa-types-explained.html"/>
		<published>2016-11-24T10:26:24+11:00</published>
		<updated>2016-11-24T10:26:24+11:00</updated>
		<id>https://www.firewall.cx/networking/routing-protocols/ospf-lsa-types-explained.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ospf-part6-intro.webp&quot; alt=&quot;OSPF LSA Types - Purpose and Function of Every OSPF LSA&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Our previous article explained the purpose of &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html&quot; target=&quot;_blank&quot; title=&quot;Link State Update (LSU) packets&quot;&gt;Link State Update (LSU) packets&lt;/a&gt; and examined the &lt;strong&gt;Link State Advertisement&lt;/strong&gt; (&lt;strong&gt;LSA&lt;/strong&gt;) information contained within &lt;strong&gt;LSU packets&lt;/strong&gt;. We also saw the most common LSA packets found in OSPF networks. In this article we’ll be diving deeper to analyse all eleven &lt;strong&gt;OSPF LSA Types&lt;/strong&gt; using network network diagrams and examples to help understand when each &lt;strong&gt;LSA type&lt;/strong&gt; is used and how they keep the OSPF network updated.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;LSA Types - Quick Overview&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Before we begin, let’s take a quick look at the different type of OSPF LSA packets we’ll cover:&lt;/p&gt;
&lt;ul class=&quot;check&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;LSA Type 1: OSPF Router LSA&lt;/li&gt;
&lt;li&gt;LSA Type 2: OSPF Network LSA&lt;/li&gt;
&lt;li&gt;LSA Type 3: OSPF Summary LSA&lt;/li&gt;
&lt;li&gt;LSA Type 4: OSPF ASBR Summary LSA&lt;/li&gt;
&lt;li&gt;LSA Type 5: OSPF ASBR External LSA&lt;/li&gt;
&lt;li&gt;LSA Type 6: OSPF Group Membership LSA&lt;/li&gt;
&lt;li&gt;LSA Type 7: OSPF Not So Stubby Area (NSSA) External LSA&lt;/li&gt;
&lt;li&gt;LSA Type 8: OSPF External Attributes LSA (OSPFv2) / Link Local LSA (OSPFv3)&lt;/li&gt;
&lt;li&gt;LSA Type 9: OSPF Link Scope Opaque (OSPFv2) / Intra Area Prefix LSA (OSPFv3)&lt;/li&gt;
&lt;li&gt;LSA Type 10: OSPF Area Scope Opaque LSA&lt;/li&gt;
&lt;li&gt;LSA Type 11:OSPF AS (Autonomous System) Scope Opaque LSA&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Below is a complete list of articles covering our &lt;strong&gt;OSPF Series&lt;/strong&gt;:&lt;/p&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; title=&quot;Introduction, OSPF Packet Structure, OSPF Messages and Characteristics&quot;&gt;Part 1: Introduction, OSPF Packet Structure, OSPF Messages and Characteristics&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; title=&quot;How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&quot;&gt;Part 2: How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu.html&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; title=&quot;OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU)&quot;&gt;Part 3: OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU)&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-states-forming-process.html&quot; target=&quot;_blank&quot; title=&quot;Part 4: OSPF Neighbor States – OSPF Neighbor Forming Process&quot;&gt;Part 4: OSPF Neighbor States – OSPF Neighbor Forming Process&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; title=&quot;Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types&quot;&gt;Part 5: Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;-&amp;nbsp;Part 6 (This article) - OSPF LSA Types - Purpose and Function of Every OSPF LSA.&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html&quot; target=&quot;_blank&quot; title=&quot;LSA payload&quot;&gt;LSA payload&lt;/a&gt; varies in size according to the LSA type and the information it includes. The diagram below clearly shows how LSAs are contained within LSUs:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-lsa-types-explained-1.png&quot; alt=&quot;OSPF LSA Types&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;OSPF LSA Types&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. LSA Types contained within an OSPF LSU packet&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As mentioned, OSPF currently supports 11 types of LSAs. Each LSA is used within specific boundaries of an OSPF network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;OSPF concepts, including router roles such as &lt;strong&gt;Designated Router&lt;/strong&gt; (&lt;strong&gt;DR&lt;/strong&gt;), &lt;strong&gt;Area Border Router&lt;/strong&gt; (&lt;strong&gt;ABR&lt;/strong&gt;), &lt;strong&gt;Autonomous System Border Router&lt;/strong&gt; (&lt;strong&gt;ASBR&lt;/strong&gt;), &lt;strong&gt;OSPF Areas&lt;/strong&gt; and more, are analyzed in great depth in our article &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; title=&quot;OSPF Basic Concepts – OSPF Areas – Router Roles&quot;&gt;OSPF Basic Concepts – OSPF Areas – Router Roles&lt;/a&gt;. This article assumes the reader has a good understanding of &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; title=&quot;basic OSPF theory&quot;&gt;basic OSPF theory&lt;/a&gt; and is comfortable with OSPF concepts.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;LSA Type 1 – OSPF Router LSA&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;LSA Type 1&lt;/strong&gt; (&lt;strong&gt;Router LSA&lt;/strong&gt;) packets are sent between routers within the same area of origin and do not leave the area. An OSPF router uses &lt;strong&gt;LSA Type 1&lt;/strong&gt; packets to describe its own interfaces but also carries information about its neighbors to adjacent routers in the same area.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-lsa-types-explained-2.jpg&quot; alt=&quot;LSA Type 1 Packets exchanged between OSPF routers within the same area&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;LSA Type 1 Packets exchanged between OSPF routers within the same area&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 2. LSA Type 1 Packets exchanged between OSPF routers within the same area&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;LSA Type 2 – OSPF Network LSA&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;LSA Type 2&lt;/strong&gt; (&lt;strong&gt;Network LSA&lt;/strong&gt;) packets are generated by the &lt;strong&gt;Designated Router&lt;/strong&gt; (&lt;strong&gt;DR&lt;/strong&gt;) to describe all routers connected to its segment directly. &lt;strong&gt;LSA Type 2&lt;/strong&gt; packets are flooded between neighbors in the same area of origin and remain within that area.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-lsa-types-explained-3.jpg&quot; alt=&quot;LSA Type 2 Packets exchanged between OSPF DR and neighbor routers&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;LSA Type 2 Packets exchanged between OSPF DR and neighbor routers&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 3. LSA Type 2 Packets exchanged between OSPF DR and neighbor routers&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;LSA Type 3 – OSPF Summary LSA&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;LSA Type 3&lt;/strong&gt; (&lt;strong&gt;Summary LSA&lt;/strong&gt;) packets are generated by &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; title=&quot;Area Border Routers&quot;&gt;Area Border Routers&lt;/a&gt; (&lt;strong&gt;ABR&lt;/strong&gt;) to summarize its directly connected area, and advertise inter-area router information to other areas the &lt;strong&gt;ABR&lt;/strong&gt; is connected to, with the use of a summary prefix (e.g 192.168.0.0/22). &lt;strong&gt;LSA Type 3&lt;/strong&gt; packets are flooded to multiple areas throughout the network and help with OSPF’s scalability with the use of summary prefixes.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-lsa-types-explained-4.jpg&quot; alt=&quot;LSA Type 3 - An OSPF ABR router advertises the summarized route 192.168.2.0/24 to Area 0&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;LSA Type 3 - An OSPF ABR router advertises the summarized route 192.168.2.0/24 to Area 0&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 4. LSA Type 3 - An OSPF ABR router advertises the summarized route 192.168.2.0/24 to Area 0&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Looking at the diagram above, &lt;strong&gt;ABR&lt;/strong&gt; router &lt;strong&gt;R2&lt;/strong&gt; creates a &lt;strong&gt;Type 3 Summary LSA&lt;/strong&gt; and floods it into &lt;strong&gt;Area 0&lt;/strong&gt;. In a similar way, &lt;strong&gt;ABR&lt;/strong&gt; router &lt;strong&gt;R3&lt;/strong&gt; creates a &lt;strong&gt;Type 3 Summary LSA&lt;/strong&gt; and floods it into &lt;strong&gt;Area 2&lt;/strong&gt;. &lt;strong&gt;Type 3 Summary LSAs&lt;/strong&gt; appear as &lt;strong&gt;O IA&lt;/strong&gt; entries in the router routing table.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;LSA Type 4 – OSPF ASBR Summary LSA&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;LSA Type 4&lt;/strong&gt; (&lt;strong&gt;ASBR Summary LSA&lt;/strong&gt;) packets are the LSAs that advertise the presence of an &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; title=&quot;Autonomous System Border Router&quot;&gt;Autonomous System Border Router&lt;/a&gt; (&lt;strong&gt;ASBR&lt;/strong&gt;) to other areas. In the example below when &lt;strong&gt;R2&lt;/strong&gt; (&lt;strong&gt;ABR&lt;/strong&gt;) receives the &lt;strong&gt;LSA Type 1&lt;/strong&gt; packet from &lt;strong&gt;R1&lt;/strong&gt; it will create a &lt;strong&gt;LSA Type 4&lt;/strong&gt; (&lt;strong&gt;Summary ASBR LSA&lt;/strong&gt;) packet, which advertises the &lt;strong&gt;ASBR&lt;/strong&gt; route received from &lt;strong&gt;Area 1&lt;/strong&gt;, and inject it into &lt;strong&gt;Area 0&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-lsa-types-explained-5.jpg&quot; alt=&quot;LSA Type 4 packets injected into Area 0 &amp;amp; 2 by the R2 ABR and R3 ABR&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;LSA Type 4 packets injected into Area 0 &amp;amp; 2 by the R2 ABR and R3 ABR&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 5. LSA Type 4 packets injected into Area 0 &amp;amp; 2 by the R2 ABR and R3 ABR&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While &lt;strong&gt;LSA Type 4&lt;/strong&gt; packets are used by &lt;strong&gt;ABRs&lt;/strong&gt; to advertise the &lt;strong&gt;ASBR&lt;/strong&gt; route through their areas, it will not be used by the &lt;strong&gt;ASBR&lt;/strong&gt; itself within its local area (&lt;strong&gt;Area 1&lt;/strong&gt;); &lt;strong&gt;ASBR&lt;/strong&gt; uses &lt;strong&gt;LSA Type 1&lt;/strong&gt; to inform its neighbors (&lt;strong&gt;R2&lt;/strong&gt; in this case) within its networks.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;LSA Type 5 – OSPF ASBR External LSA&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;LSA Type 5&lt;/strong&gt; (&lt;strong&gt;ASBR External LSA&lt;/strong&gt;) packets are generated by the &lt;strong&gt;ASBR&lt;/strong&gt; to advertise external redistributed routes into the OSPF’s &lt;strong&gt;AS&lt;/strong&gt;. A typical example of an &lt;strong&gt;LSA Type 5&lt;/strong&gt; would be an &lt;strong&gt;external prefix&lt;/strong&gt; e.g &lt;strong&gt;192.168.10.0/24&lt;/strong&gt; or &lt;strong&gt;default route&lt;/strong&gt; (internet) as shown below:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-lsa-types-explained-6.jpg&quot; alt=&quot;LSA Type 5 packets advertise the default route to all OSPF routers&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;LSA Type 5 packets advertise the default route to all OSPF routers&quot; /&gt;Figure 6. LSA Type 5 packets advertise the default route to all OSPF routers&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This external route/prefix is redistributed in to the OSPF network by the &lt;strong&gt;ASBR&lt;/strong&gt; (&lt;strong&gt;R1&lt;/strong&gt;) and seen&amp;nbsp;as &lt;strong&gt;O E1&lt;/strong&gt; or &lt;strong&gt;E2&amp;nbsp;&lt;/strong&gt;entries in other OSPF routers routing tables.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;LSA Type 6 – OSPF Group Membership LSA&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;LSA Type 6&lt;/strong&gt; (&lt;strong&gt;Group Membership LSA&lt;/strong&gt;) packets were designed for Multicast OSPF (MOSPF), a protocol that supports multicast routing through OSPF. MOSPF is not supported by Cisco and is not widely used and is expected to be retired soon.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;LSA Type 7 – OSPF Not So Stubby Area (NSSA) External LSA&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;LSA Type 7&lt;/strong&gt; (&lt;strong&gt;NSSA External LSA&lt;/strong&gt;) packets are used for some special area types that do not allow external distributed routes to go through and thus block &lt;strong&gt;LSA Type 5&lt;/strong&gt; packets from flooding through them, &lt;strong&gt;LSA Type 7&lt;/strong&gt; packets act as a mask for &lt;strong&gt;LSA Type 5&lt;/strong&gt; packets to allow them to move through these special areas and reach the &lt;strong&gt;ABR&lt;/strong&gt; that is able to translate &lt;strong&gt;LSA Type 7&lt;/strong&gt; packets back to &lt;strong&gt;LSA Type 5&lt;/strong&gt; packets.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-lsa-types-explained-7.jpg&quot; alt=&quot;LSA Type 7 packets passing through an NSSA and being transformed into LSA Type 5 by the ABR&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;LSA Type 7 packets passing through an NSSA and being transformed into LSA Type 5 by the ABR&quot; /&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Figure 7. LSA Type 7 packets passing through an NSSA and being transformed into LSA Type 5 by the ABR&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In the above example, &lt;strong&gt;ABR R2&lt;/strong&gt; translates &lt;strong&gt;&lt;strong&gt;LSA&lt;/strong&gt; &lt;/strong&gt;&lt;strong&gt;Type 7 &lt;/strong&gt;into a &lt;strong&gt;LSA Type 5&lt;/strong&gt; and floods it into the OSPF network.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;LSA Type 8 - OSPF External Attributes LSA (OSPFv2) / Link Local LSA (OSPFv3)&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;LSA Type 8&lt;/strong&gt; packets (&lt;strong&gt;External Attributes LSA -OSPFv2-/ Link Local LSA -OSPFv3-&lt;/strong&gt;) in OSPFv2 (IPv4) are called &lt;strong&gt;External Attribute LSAs&lt;/strong&gt;, and are used to transit BGP attributes through an OSPF network while BGP destinations are conveyed via &lt;strong&gt;LSA Type 5&lt;/strong&gt; packets, however, this feature isn’t supported by most routers. With OSPFv3 IPv6), &lt;strong&gt;LSA Type 8&lt;/strong&gt; is redefined to carry &lt;strong&gt;IPv6&lt;/strong&gt; information through OSPF network.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;LSA Type 9, 10 &amp;amp; 11&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Generally &lt;strong&gt;Opaque LSAs&lt;/strong&gt; (&lt;strong&gt;LSA Type 9, 10 &amp;amp; 11&lt;/strong&gt;) are used to extend the capabilities of OSPF allowing the protocol to carry information OSPF doesn’t necessarily care about. Practical application of &lt;strong&gt;Opaque LSAs&lt;/strong&gt; is in MPLS traffic engineering where they are used to communicate interface parameters such as maximum bandwidth, unreserved bandwidth, etc. Following is a short analysis of each of the three Opaque LSAs.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;LSA Type 9 – OSPF Link Scope Opaque (OSPFv2) / Intra Area Prefix LSA (OSPFv3)&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;LSA Type 9&lt;/strong&gt; in &lt;strong&gt;OSPFv2&lt;/strong&gt; (&lt;strong&gt;IPv4&lt;/strong&gt;) is defined as a &lt;strong&gt;Link Scope Opaque LSA&lt;/strong&gt; for carrying OSPF information. For OSPFv3 it’s redefined to handle a communication prefix for a special area type called &lt;strong&gt;Stub Area&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;LSA Type 10 – OSPF Area Scope Opaque LSA&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;LSA Type 10&lt;/strong&gt; packets are used to flood OSPF information through other area routers even if these routers do not process this information in order to extend OSPF functionality, this LSA is used for traffic engineering to advertise MPLS and other protocols.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;LSA Type 11 – OSPF AS Scope Opaque LSA&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;LSA Type 11&lt;/strong&gt; packets serve the same purpose as &lt;strong&gt;LSA Type 10&lt;/strong&gt; packets but are not flooded into special area types (Stub areas).&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article we examined all &lt;strong&gt;11 OSPF LSA packet types&lt;/strong&gt; and explained their purposes. We also examined the &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html&quot; target=&quot;_blank&quot; title=&quot;structure of an LSA packet&quot;&gt;structure of an LSA packet&lt;/a&gt; and used network diagrams to help illustrate how LSA packets flow between routers &amp;amp; OSPF Areas. For more high-quality OSPF articles visit our &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html&quot; title=&quot;OSPF Section&quot;&gt;OSPF Section&lt;/a&gt;.&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ospf-part6-intro.webp&quot; alt=&quot;OSPF LSA Types - Purpose and Function of Every OSPF LSA&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Our previous article explained the purpose of &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html&quot; target=&quot;_blank&quot; title=&quot;Link State Update (LSU) packets&quot;&gt;Link State Update (LSU) packets&lt;/a&gt; and examined the &lt;strong&gt;Link State Advertisement&lt;/strong&gt; (&lt;strong&gt;LSA&lt;/strong&gt;) information contained within &lt;strong&gt;LSU packets&lt;/strong&gt;. We also saw the most common LSA packets found in OSPF networks. In this article we’ll be diving deeper to analyse all eleven &lt;strong&gt;OSPF LSA Types&lt;/strong&gt; using network network diagrams and examples to help understand when each &lt;strong&gt;LSA type&lt;/strong&gt; is used and how they keep the OSPF network updated.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;LSA Types - Quick Overview&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Before we begin, let’s take a quick look at the different type of OSPF LSA packets we’ll cover:&lt;/p&gt;
&lt;ul class=&quot;check&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;LSA Type 1: OSPF Router LSA&lt;/li&gt;
&lt;li&gt;LSA Type 2: OSPF Network LSA&lt;/li&gt;
&lt;li&gt;LSA Type 3: OSPF Summary LSA&lt;/li&gt;
&lt;li&gt;LSA Type 4: OSPF ASBR Summary LSA&lt;/li&gt;
&lt;li&gt;LSA Type 5: OSPF ASBR External LSA&lt;/li&gt;
&lt;li&gt;LSA Type 6: OSPF Group Membership LSA&lt;/li&gt;
&lt;li&gt;LSA Type 7: OSPF Not So Stubby Area (NSSA) External LSA&lt;/li&gt;
&lt;li&gt;LSA Type 8: OSPF External Attributes LSA (OSPFv2) / Link Local LSA (OSPFv3)&lt;/li&gt;
&lt;li&gt;LSA Type 9: OSPF Link Scope Opaque (OSPFv2) / Intra Area Prefix LSA (OSPFv3)&lt;/li&gt;
&lt;li&gt;LSA Type 10: OSPF Area Scope Opaque LSA&lt;/li&gt;
&lt;li&gt;LSA Type 11:OSPF AS (Autonomous System) Scope Opaque LSA&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Below is a complete list of articles covering our &lt;strong&gt;OSPF Series&lt;/strong&gt;:&lt;/p&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; title=&quot;Introduction, OSPF Packet Structure, OSPF Messages and Characteristics&quot;&gt;Part 1: Introduction, OSPF Packet Structure, OSPF Messages and Characteristics&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; title=&quot;How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&quot;&gt;Part 2: How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu.html&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; title=&quot;OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU)&quot;&gt;Part 3: OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU)&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-states-forming-process.html&quot; target=&quot;_blank&quot; title=&quot;Part 4: OSPF Neighbor States – OSPF Neighbor Forming Process&quot;&gt;Part 4: OSPF Neighbor States – OSPF Neighbor Forming Process&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; title=&quot;Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types&quot;&gt;Part 5: Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;-&amp;nbsp;Part 6 (This article) - OSPF LSA Types - Purpose and Function of Every OSPF LSA.&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html&quot; target=&quot;_blank&quot; title=&quot;LSA payload&quot;&gt;LSA payload&lt;/a&gt; varies in size according to the LSA type and the information it includes. The diagram below clearly shows how LSAs are contained within LSUs:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-lsa-types-explained-1.png&quot; alt=&quot;OSPF LSA Types&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;OSPF LSA Types&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. LSA Types contained within an OSPF LSU packet&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As mentioned, OSPF currently supports 11 types of LSAs. Each LSA is used within specific boundaries of an OSPF network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;OSPF concepts, including router roles such as &lt;strong&gt;Designated Router&lt;/strong&gt; (&lt;strong&gt;DR&lt;/strong&gt;), &lt;strong&gt;Area Border Router&lt;/strong&gt; (&lt;strong&gt;ABR&lt;/strong&gt;), &lt;strong&gt;Autonomous System Border Router&lt;/strong&gt; (&lt;strong&gt;ASBR&lt;/strong&gt;), &lt;strong&gt;OSPF Areas&lt;/strong&gt; and more, are analyzed in great depth in our article &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; title=&quot;OSPF Basic Concepts – OSPF Areas – Router Roles&quot;&gt;OSPF Basic Concepts – OSPF Areas – Router Roles&lt;/a&gt;. This article assumes the reader has a good understanding of &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; title=&quot;basic OSPF theory&quot;&gt;basic OSPF theory&lt;/a&gt; and is comfortable with OSPF concepts.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;LSA Type 1 – OSPF Router LSA&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;LSA Type 1&lt;/strong&gt; (&lt;strong&gt;Router LSA&lt;/strong&gt;) packets are sent between routers within the same area of origin and do not leave the area. An OSPF router uses &lt;strong&gt;LSA Type 1&lt;/strong&gt; packets to describe its own interfaces but also carries information about its neighbors to adjacent routers in the same area.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-lsa-types-explained-2.jpg&quot; alt=&quot;LSA Type 1 Packets exchanged between OSPF routers within the same area&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;LSA Type 1 Packets exchanged between OSPF routers within the same area&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 2. LSA Type 1 Packets exchanged between OSPF routers within the same area&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;LSA Type 2 – OSPF Network LSA&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;LSA Type 2&lt;/strong&gt; (&lt;strong&gt;Network LSA&lt;/strong&gt;) packets are generated by the &lt;strong&gt;Designated Router&lt;/strong&gt; (&lt;strong&gt;DR&lt;/strong&gt;) to describe all routers connected to its segment directly. &lt;strong&gt;LSA Type 2&lt;/strong&gt; packets are flooded between neighbors in the same area of origin and remain within that area.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-lsa-types-explained-3.jpg&quot; alt=&quot;LSA Type 2 Packets exchanged between OSPF DR and neighbor routers&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;LSA Type 2 Packets exchanged between OSPF DR and neighbor routers&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 3. LSA Type 2 Packets exchanged between OSPF DR and neighbor routers&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;LSA Type 3 – OSPF Summary LSA&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;LSA Type 3&lt;/strong&gt; (&lt;strong&gt;Summary LSA&lt;/strong&gt;) packets are generated by &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; title=&quot;Area Border Routers&quot;&gt;Area Border Routers&lt;/a&gt; (&lt;strong&gt;ABR&lt;/strong&gt;) to summarize its directly connected area, and advertise inter-area router information to other areas the &lt;strong&gt;ABR&lt;/strong&gt; is connected to, with the use of a summary prefix (e.g 192.168.0.0/22). &lt;strong&gt;LSA Type 3&lt;/strong&gt; packets are flooded to multiple areas throughout the network and help with OSPF’s scalability with the use of summary prefixes.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-lsa-types-explained-4.jpg&quot; alt=&quot;LSA Type 3 - An OSPF ABR router advertises the summarized route 192.168.2.0/24 to Area 0&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;LSA Type 3 - An OSPF ABR router advertises the summarized route 192.168.2.0/24 to Area 0&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 4. LSA Type 3 - An OSPF ABR router advertises the summarized route 192.168.2.0/24 to Area 0&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Looking at the diagram above, &lt;strong&gt;ABR&lt;/strong&gt; router &lt;strong&gt;R2&lt;/strong&gt; creates a &lt;strong&gt;Type 3 Summary LSA&lt;/strong&gt; and floods it into &lt;strong&gt;Area 0&lt;/strong&gt;. In a similar way, &lt;strong&gt;ABR&lt;/strong&gt; router &lt;strong&gt;R3&lt;/strong&gt; creates a &lt;strong&gt;Type 3 Summary LSA&lt;/strong&gt; and floods it into &lt;strong&gt;Area 2&lt;/strong&gt;. &lt;strong&gt;Type 3 Summary LSAs&lt;/strong&gt; appear as &lt;strong&gt;O IA&lt;/strong&gt; entries in the router routing table.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;LSA Type 4 – OSPF ASBR Summary LSA&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;LSA Type 4&lt;/strong&gt; (&lt;strong&gt;ASBR Summary LSA&lt;/strong&gt;) packets are the LSAs that advertise the presence of an &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; title=&quot;Autonomous System Border Router&quot;&gt;Autonomous System Border Router&lt;/a&gt; (&lt;strong&gt;ASBR&lt;/strong&gt;) to other areas. In the example below when &lt;strong&gt;R2&lt;/strong&gt; (&lt;strong&gt;ABR&lt;/strong&gt;) receives the &lt;strong&gt;LSA Type 1&lt;/strong&gt; packet from &lt;strong&gt;R1&lt;/strong&gt; it will create a &lt;strong&gt;LSA Type 4&lt;/strong&gt; (&lt;strong&gt;Summary ASBR LSA&lt;/strong&gt;) packet, which advertises the &lt;strong&gt;ASBR&lt;/strong&gt; route received from &lt;strong&gt;Area 1&lt;/strong&gt;, and inject it into &lt;strong&gt;Area 0&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-lsa-types-explained-5.jpg&quot; alt=&quot;LSA Type 4 packets injected into Area 0 &amp;amp; 2 by the R2 ABR and R3 ABR&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;LSA Type 4 packets injected into Area 0 &amp;amp; 2 by the R2 ABR and R3 ABR&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 5. LSA Type 4 packets injected into Area 0 &amp;amp; 2 by the R2 ABR and R3 ABR&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While &lt;strong&gt;LSA Type 4&lt;/strong&gt; packets are used by &lt;strong&gt;ABRs&lt;/strong&gt; to advertise the &lt;strong&gt;ASBR&lt;/strong&gt; route through their areas, it will not be used by the &lt;strong&gt;ASBR&lt;/strong&gt; itself within its local area (&lt;strong&gt;Area 1&lt;/strong&gt;); &lt;strong&gt;ASBR&lt;/strong&gt; uses &lt;strong&gt;LSA Type 1&lt;/strong&gt; to inform its neighbors (&lt;strong&gt;R2&lt;/strong&gt; in this case) within its networks.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;LSA Type 5 – OSPF ASBR External LSA&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;LSA Type 5&lt;/strong&gt; (&lt;strong&gt;ASBR External LSA&lt;/strong&gt;) packets are generated by the &lt;strong&gt;ASBR&lt;/strong&gt; to advertise external redistributed routes into the OSPF’s &lt;strong&gt;AS&lt;/strong&gt;. A typical example of an &lt;strong&gt;LSA Type 5&lt;/strong&gt; would be an &lt;strong&gt;external prefix&lt;/strong&gt; e.g &lt;strong&gt;192.168.10.0/24&lt;/strong&gt; or &lt;strong&gt;default route&lt;/strong&gt; (internet) as shown below:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-lsa-types-explained-6.jpg&quot; alt=&quot;LSA Type 5 packets advertise the default route to all OSPF routers&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;LSA Type 5 packets advertise the default route to all OSPF routers&quot; /&gt;Figure 6. LSA Type 5 packets advertise the default route to all OSPF routers&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This external route/prefix is redistributed in to the OSPF network by the &lt;strong&gt;ASBR&lt;/strong&gt; (&lt;strong&gt;R1&lt;/strong&gt;) and seen&amp;nbsp;as &lt;strong&gt;O E1&lt;/strong&gt; or &lt;strong&gt;E2&amp;nbsp;&lt;/strong&gt;entries in other OSPF routers routing tables.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;LSA Type 6 – OSPF Group Membership LSA&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;LSA Type 6&lt;/strong&gt; (&lt;strong&gt;Group Membership LSA&lt;/strong&gt;) packets were designed for Multicast OSPF (MOSPF), a protocol that supports multicast routing through OSPF. MOSPF is not supported by Cisco and is not widely used and is expected to be retired soon.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;LSA Type 7 – OSPF Not So Stubby Area (NSSA) External LSA&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;LSA Type 7&lt;/strong&gt; (&lt;strong&gt;NSSA External LSA&lt;/strong&gt;) packets are used for some special area types that do not allow external distributed routes to go through and thus block &lt;strong&gt;LSA Type 5&lt;/strong&gt; packets from flooding through them, &lt;strong&gt;LSA Type 7&lt;/strong&gt; packets act as a mask for &lt;strong&gt;LSA Type 5&lt;/strong&gt; packets to allow them to move through these special areas and reach the &lt;strong&gt;ABR&lt;/strong&gt; that is able to translate &lt;strong&gt;LSA Type 7&lt;/strong&gt; packets back to &lt;strong&gt;LSA Type 5&lt;/strong&gt; packets.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-lsa-types-explained-7.jpg&quot; alt=&quot;LSA Type 7 packets passing through an NSSA and being transformed into LSA Type 5 by the ABR&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;LSA Type 7 packets passing through an NSSA and being transformed into LSA Type 5 by the ABR&quot; /&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Figure 7. LSA Type 7 packets passing through an NSSA and being transformed into LSA Type 5 by the ABR&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In the above example, &lt;strong&gt;ABR R2&lt;/strong&gt; translates &lt;strong&gt;&lt;strong&gt;LSA&lt;/strong&gt; &lt;/strong&gt;&lt;strong&gt;Type 7 &lt;/strong&gt;into a &lt;strong&gt;LSA Type 5&lt;/strong&gt; and floods it into the OSPF network.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;LSA Type 8 - OSPF External Attributes LSA (OSPFv2) / Link Local LSA (OSPFv3)&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;LSA Type 8&lt;/strong&gt; packets (&lt;strong&gt;External Attributes LSA -OSPFv2-/ Link Local LSA -OSPFv3-&lt;/strong&gt;) in OSPFv2 (IPv4) are called &lt;strong&gt;External Attribute LSAs&lt;/strong&gt;, and are used to transit BGP attributes through an OSPF network while BGP destinations are conveyed via &lt;strong&gt;LSA Type 5&lt;/strong&gt; packets, however, this feature isn’t supported by most routers. With OSPFv3 IPv6), &lt;strong&gt;LSA Type 8&lt;/strong&gt; is redefined to carry &lt;strong&gt;IPv6&lt;/strong&gt; information through OSPF network.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;LSA Type 9, 10 &amp;amp; 11&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Generally &lt;strong&gt;Opaque LSAs&lt;/strong&gt; (&lt;strong&gt;LSA Type 9, 10 &amp;amp; 11&lt;/strong&gt;) are used to extend the capabilities of OSPF allowing the protocol to carry information OSPF doesn’t necessarily care about. Practical application of &lt;strong&gt;Opaque LSAs&lt;/strong&gt; is in MPLS traffic engineering where they are used to communicate interface parameters such as maximum bandwidth, unreserved bandwidth, etc. Following is a short analysis of each of the three Opaque LSAs.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;LSA Type 9 – OSPF Link Scope Opaque (OSPFv2) / Intra Area Prefix LSA (OSPFv3)&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;LSA Type 9&lt;/strong&gt; in &lt;strong&gt;OSPFv2&lt;/strong&gt; (&lt;strong&gt;IPv4&lt;/strong&gt;) is defined as a &lt;strong&gt;Link Scope Opaque LSA&lt;/strong&gt; for carrying OSPF information. For OSPFv3 it’s redefined to handle a communication prefix for a special area type called &lt;strong&gt;Stub Area&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;LSA Type 10 – OSPF Area Scope Opaque LSA&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;LSA Type 10&lt;/strong&gt; packets are used to flood OSPF information through other area routers even if these routers do not process this information in order to extend OSPF functionality, this LSA is used for traffic engineering to advertise MPLS and other protocols.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;LSA Type 11 – OSPF AS Scope Opaque LSA&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;LSA Type 11&lt;/strong&gt; packets serve the same purpose as &lt;strong&gt;LSA Type 10&lt;/strong&gt; packets but are not flooded into special area types (Stub areas).&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article we examined all &lt;strong&gt;11 OSPF LSA packet types&lt;/strong&gt; and explained their purposes. We also examined the &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html&quot; target=&quot;_blank&quot; title=&quot;structure of an LSA packet&quot;&gt;structure of an LSA packet&lt;/a&gt; and used network diagrams to help illustrate how LSA packets flow between routers &amp;amp; OSPF Areas. For more high-quality OSPF articles visit our &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html&quot; title=&quot;OSPF Section&quot;&gt;OSPF Section&lt;/a&gt;.&lt;/p&gt;</content>
		<category term="Routing" />
	</entry>
	<entry>
		<title>OSPF - Part 5: Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html"/>
		<published>2016-04-10T10:00:00+10:00</published>
		<updated>2016-04-10T10:00:00+10:00</updated>
		<id>https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ospf-part5-intro.webp&quot; alt=&quot;Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;This article explains how OSPF uses &lt;strong&gt;Link State Advertisement&lt;/strong&gt; (&lt;strong&gt;LSA&lt;/strong&gt;) to &lt;strong&gt;exchange information&lt;/strong&gt; about the network topology between routers. When a router receives an &lt;strong&gt;LSA&lt;/strong&gt;, it is stored in the &lt;strong&gt;Link-State DataBase &lt;/strong&gt;(&lt;strong&gt;LSDB&lt;/strong&gt;). Once the &lt;strong&gt;LSDBs&lt;/strong&gt; between routers are in sync, &lt;strong&gt;OSPF&lt;/strong&gt; uses the &lt;strong&gt;Shortest Path First&lt;/strong&gt; (&lt;strong&gt;SPF&lt;/strong&gt;) algorithm to calculate the &lt;strong&gt;best routes&lt;/strong&gt; for &lt;strong&gt;each network&lt;/strong&gt;. It is important to understand that &lt;strong&gt;LSAs&lt;/strong&gt; are information about a route that is transported inside &lt;strong&gt;Link State Update&lt;/strong&gt; (&lt;strong&gt;LSU&lt;/strong&gt;) packets.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Each single &lt;strong&gt;Link State Update&lt;/strong&gt; (&lt;strong&gt;LSU&lt;/strong&gt;) packet can contain one or more &lt;strong&gt;LSAs&lt;/strong&gt; inside it and when an &lt;strong&gt;LSU&lt;/strong&gt; is sent between OSPF routers, it floods the &lt;strong&gt;LSA information&lt;/strong&gt; through the network.&lt;/p&gt;
&lt;p&gt;Below is a complete list of articles covering our &lt;strong&gt;OSPF Series&lt;/strong&gt;:&lt;/p&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html&quot; target=&quot;_blank&quot; title=&quot;Part 1: Introduction, OSPF Packet Structure, OSPF Messages and Characteristics&quot;&gt;Part 1: Introduction, OSPF Packet Structure, OSPF Messages and Characteristics&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; title=&quot;Part 2: How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&quot;&gt;Part 2: How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu.html&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; title=&quot;Part 3: OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU)&quot;&gt;Part 3: OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU)&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-states-forming-process.html&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; title=&quot;Part 4: OSPF Neighbor States – OSPF Neighbor Forming Process&quot;&gt;Part 4: OSPF Neighbor States – OSPF Neighbor Forming Process&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- Part 5 (This article): Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types.&lt;/div&gt;
&lt;div&gt;-&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsa-types-explained.html&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; title=&quot;Part 6: OSPF LSA Types - Purpose and Function of Every OSPF LSA&quot;&gt;Part 6: OSPF LSA Types - Purpose and Function of Every OSPF LSA&lt;/a&gt;.&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It is very important for any network engineer to understand how &lt;strong&gt;LSAs&lt;/strong&gt; are contained within an &lt;strong&gt;LSU&lt;/strong&gt;. We’ll use the example below, where an OSPF router sends an &lt;strong&gt;LSU&lt;/strong&gt; to the &lt;strong&gt;OSPF Designated Router&lt;/strong&gt; (&lt;strong&gt;DR&lt;/strong&gt;) containing &lt;strong&gt;LSA information&lt;/strong&gt; about a new network:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-lsu-lsa-packet-structure-lsa-types-overview-1.png&quot; alt=&quot;OSPF Link State Update (LSU) packet containing a Link State Advertisement (LSA)&quot; title=&quot;OSPF Link State Update (LSU) packet containing a Link State Advertisement (LSA)&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. OSPF Link State Multicast Update (LSU) packet containing a Link State Advertisement (LSA)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As shown above, &lt;strong&gt;LSAs&lt;/strong&gt; are &lt;strong&gt;contained within LSUs&lt;/strong&gt;, which are all part of an &lt;strong&gt;OSPF packet&lt;/strong&gt; encapsulated within an Ethernet frame (assuming an Ethernet network).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Our diagram of the LSU/LSA packet structure is confirmed by capturing an &lt;strong&gt;OSPF Ethernet frame&lt;/strong&gt; below. We’ve highlighted each section (LSA, LSU, OSPF Header) using the same colors:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-lsu-lsa-packet-structure-lsa-types-overview-2.png&quot; alt=&quot;OSPF Link State Update and List State Advertisement within an Ethernet frame&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;OSPF Link State Update and List State Advertisement within an Ethernet frame&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 2. OSPF Link State Update and List State Advertisement within an Ethernet frame&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Notice that the destination IP address is &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-multicast.html&quot; target=&quot;_blank&quot; title=&quot;How Multicast Works&quot;&gt;&lt;strong&gt;multicast address 224.0.0.6&lt;/strong&gt;&lt;/a&gt;, as expected since routers send updates to the &lt;strong&gt;Designated Router&lt;/strong&gt; (&lt;strong&gt;DR&lt;/strong&gt;) using this multicast address. This is also analyzed under the &lt;strong&gt;Working Inside a Single Area&lt;/strong&gt; section in our article &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; title=&quot;How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&quot;&gt;How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Most Popular OSPF LSA Types&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;OSPF currently defines 11 different LSA types, however, despite the large variety of LSAs only around half of them are commonly found in OSPF networks. &lt;strong&gt;Table 1&lt;/strong&gt; below shows the most popular LSA types, the &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; title=&quot;type of OSPF routers&quot;&gt;type of OSPF routers&lt;/a&gt; (DR, ABR, ASBR etc) that generate them along with their function and the OSPF areas they affect:&lt;/p&gt;
&lt;table border=&quot;0&quot; style=&quot;width: 813px; margin-left: 4.65pt; border-collapse: collapse;&quot; cellspacing=&quot;0&quot; cellpadding=&quot;0&quot;&gt;
&lt;tbody&gt;
&lt;tr style=&quot;height: 37.5pt;&quot;&gt;
&lt;td style=&quot;width: 125px; border-width: 1pt 1pt 1.5pt; border-style: solid; border-color: windowtext; background: #95b3d7; padding: 0cm 5.4pt; height: 37.5pt;&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;LSA &lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 213px; border-width: 1pt 1pt 1.5pt medium; border-style: solid solid solid none; background: #95b3d7; padding: 0cm 5.4pt; height: 37.5pt;&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;Generated by&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 243px; border-width: 1pt 1pt 1.5pt medium; border-style: solid solid solid none; background: #95b3d7; padding: 0cm 5.4pt; height: 37.5pt;&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;Function&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 232px; border-width: 1pt 1pt 1.5pt medium; border-style: solid solid solid none; background: #95b3d7; padding: 0cm 5.4pt; height: 37.5pt;&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;Flooding Map&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 36.75pt;&quot;&gt;
&lt;td style=&quot;width: 125px; border-width: medium 1pt 1pt; border-style: none solid solid; padding: 0cm 5.4pt; height: 36.75pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 12pt; color: red;&quot;&gt;Type 1&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 213px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 36.75pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Normal Area Routers&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 243px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 36.75pt;&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Advertising router's interface &lt;br /&gt; and status to neighbors&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 232px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 36.75pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Intra-Area&lt;br /&gt; (Area of origin)&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 31.5pt;&quot;&gt;
&lt;td style=&quot;width: 125px; border-width: medium 1pt 1pt; border-style: none solid solid; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 12pt; color: red;&quot;&gt;Type 2&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 213px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;DR&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 243px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Advertising DRs direct &lt;br /&gt; connected neighbors &lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 232px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Intra-Area &lt;br /&gt; (Area of origin)&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 31.5pt;&quot;&gt;
&lt;td style=&quot;width: 125px; border-width: medium 1pt 1pt; border-style: none solid solid; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 12pt; color: red;&quot;&gt;Type 3&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 213px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;ABR&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 243px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Advertising ABRs areas&lt;br /&gt; summary&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 232px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Inter-Area &lt;br /&gt; (Multiple Areas)&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 31.5pt;&quot;&gt;
&lt;td style=&quot;width: 125px; border-width: medium 1pt 1pt; border-style: none solid solid; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 12pt; color: red;&quot;&gt;Type 4&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 213px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;ABR&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 243px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Advertising the presence &lt;br /&gt; of ASBRs&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 232px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Inter-Area &lt;br /&gt; (Multiple Areas)&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 31.5pt;&quot;&gt;
&lt;td style=&quot;width: 125px; border-width: medium 1pt 1pt; border-style: none solid solid; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 12pt; color: red;&quot;&gt;Type 5&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 213px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;ASBR&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 243px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Advertising external routes &lt;br /&gt; to internet&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 232px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Inter-Area &lt;br /&gt; (Multiple Areas)&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 31.5pt;&quot;&gt;
&lt;td style=&quot;width: 125px; border-width: medium 1pt 1pt; border-style: none solid solid; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 12pt; color: red;&quot;&gt;Type 7&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 213px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;ASBR&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 243px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Advertising external routes &lt;br /&gt; to internet to NSSA areas&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 232px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Inter-Area &lt;br /&gt; (Multiple Areas)&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Table 1. Most often used LSA Types, router origin type, their function and Areas affected&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Looking at the OSPF packet captured with our network analyzer, we can now understand that the specific &lt;strong&gt;LSA&lt;/strong&gt; was a &lt;strong&gt;Type-3 LSA&lt;/strong&gt; (&lt;strong&gt;LS Type&lt;/strong&gt;: Summary-LSA IP network &lt;strong&gt;3&lt;/strong&gt;) which means it was generated by an &lt;strong&gt;ABR OSPF router&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;Link State Advertisement (LSA) Packet Structure (Within a Link State Update - LSU)&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Each &lt;strong&gt;LSA&lt;/strong&gt; packet consists of a header and a body that contains all the information needed to exchange network information within an OSPF network. The diagram below shows the structure of an &lt;strong&gt;OSPF LSA packet&lt;/strong&gt;:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-lsu-lsa-packet-structure-lsa-types-overview-3.png&quot; alt=&quot;OSPF LSA Packet structure and fields&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;OSPF LSA Packet structure and fields&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 3. OSPF LSA Packet structure and fields&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;LSA header&lt;/strong&gt; is a &lt;strong&gt;20 byte&lt;/strong&gt; (&lt;strong&gt;32x5 = 160 bits&lt;/strong&gt;) section that consists of the following fields:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;LS Age&lt;/strong&gt; (2 Bytes): Time passed since the LSA was generated (in seconds).&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Options&lt;/strong&gt; (1 Byte): Indicates the OSPF features and options the origin can support.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;LS Type&lt;/strong&gt; (1 Byte): Defines the LSA type (all types will be explained later).&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Link State ID&lt;/strong&gt; (4 Bytes): Identifies the network link between OSPF routers (usually IP address).&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Advertising Router&lt;/strong&gt; (4 Bytes): Indicates the origin router’s ID.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;LS Sequence Number&lt;/strong&gt; (4 Bytes): A specific digit on each LSA packet to filter old and repeated&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;LS Checksum&lt;/strong&gt; (2 Bytes): A certain digit given to LS to compare and detect errors.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Length&lt;/strong&gt; (2 Bytes): Represents LSA packet length.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;LSA body&lt;/strong&gt; varies in size according to the &lt;strong&gt;LS type&lt;/strong&gt; and the details it identifies, LSA types are explained in great detail in our upcoming article.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article explained &lt;strong&gt;OSPF Link State Update &lt;/strong&gt;(&lt;strong&gt;LSA&lt;/strong&gt;)&lt;strong&gt; packets&lt;/strong&gt; and showed how they contain &lt;strong&gt;Link State Advertisements &lt;/strong&gt;(&lt;strong&gt;LSAs&lt;/strong&gt;). We also &lt;strong&gt;analyzed OSPF LSU &amp;amp; LSAs packet structure&lt;/strong&gt; and explained each field in an &lt;strong&gt;OSPF LSA packet&lt;/strong&gt;. Finally, we spoke about the most common &lt;strong&gt;LSA Types&lt;/strong&gt;, &lt;strong&gt;router origin type&lt;/strong&gt; (&lt;strong&gt;ABR&lt;/strong&gt;, &lt;strong&gt;ASBR&lt;/strong&gt;, &lt;strong&gt;DR&lt;/strong&gt; etc), their function and Areas affected. Read more on OSPF by visiting any of the below articles:&lt;/p&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html&quot; target=&quot;_blank&quot; title=&quot;Introduction, OSPF Packet Structure, OSPF Messages and Characteristics&quot;&gt;Part 1: Introduction, OSPF Packet Structure, OSPF Messages and Characteristics&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; title=&quot;How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&quot;&gt;Part 2: How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu.html&quot; target=&quot;_blank&quot; title=&quot;OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU)&quot;&gt;Part 3 - OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU)&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-states-forming-process.html&quot; target=&quot;_blank&quot; title=&quot;OSPF Neighbor States – OSPF Neighbor Forming Process&quot;&gt;Part 4 - OSPF Neighbor States – OSPF Neighbor Forming Process&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;-&amp;nbsp;Part 5 - (This article) Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types&amp;nbsp;&lt;/div&gt;
&lt;div&gt;-&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsa-types-explained.html&quot; target=&quot;_blank&quot; title=&quot;OSPF LSA Types - Purpose and Function of Every OSPF LSA&quot;&gt;Part 6 - OSPF LSA Types - Purpose and Function of Every OSPF LSA&lt;/a&gt;&amp;nbsp;&lt;/div&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ospf-part5-intro.webp&quot; alt=&quot;Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;This article explains how OSPF uses &lt;strong&gt;Link State Advertisement&lt;/strong&gt; (&lt;strong&gt;LSA&lt;/strong&gt;) to &lt;strong&gt;exchange information&lt;/strong&gt; about the network topology between routers. When a router receives an &lt;strong&gt;LSA&lt;/strong&gt;, it is stored in the &lt;strong&gt;Link-State DataBase &lt;/strong&gt;(&lt;strong&gt;LSDB&lt;/strong&gt;). Once the &lt;strong&gt;LSDBs&lt;/strong&gt; between routers are in sync, &lt;strong&gt;OSPF&lt;/strong&gt; uses the &lt;strong&gt;Shortest Path First&lt;/strong&gt; (&lt;strong&gt;SPF&lt;/strong&gt;) algorithm to calculate the &lt;strong&gt;best routes&lt;/strong&gt; for &lt;strong&gt;each network&lt;/strong&gt;. It is important to understand that &lt;strong&gt;LSAs&lt;/strong&gt; are information about a route that is transported inside &lt;strong&gt;Link State Update&lt;/strong&gt; (&lt;strong&gt;LSU&lt;/strong&gt;) packets.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Each single &lt;strong&gt;Link State Update&lt;/strong&gt; (&lt;strong&gt;LSU&lt;/strong&gt;) packet can contain one or more &lt;strong&gt;LSAs&lt;/strong&gt; inside it and when an &lt;strong&gt;LSU&lt;/strong&gt; is sent between OSPF routers, it floods the &lt;strong&gt;LSA information&lt;/strong&gt; through the network.&lt;/p&gt;
&lt;p&gt;Below is a complete list of articles covering our &lt;strong&gt;OSPF Series&lt;/strong&gt;:&lt;/p&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html&quot; target=&quot;_blank&quot; title=&quot;Part 1: Introduction, OSPF Packet Structure, OSPF Messages and Characteristics&quot;&gt;Part 1: Introduction, OSPF Packet Structure, OSPF Messages and Characteristics&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; title=&quot;Part 2: How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&quot;&gt;Part 2: How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu.html&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; title=&quot;Part 3: OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU)&quot;&gt;Part 3: OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU)&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-states-forming-process.html&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; title=&quot;Part 4: OSPF Neighbor States – OSPF Neighbor Forming Process&quot;&gt;Part 4: OSPF Neighbor States – OSPF Neighbor Forming Process&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- Part 5 (This article): Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types.&lt;/div&gt;
&lt;div&gt;-&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsa-types-explained.html&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot; title=&quot;Part 6: OSPF LSA Types - Purpose and Function of Every OSPF LSA&quot;&gt;Part 6: OSPF LSA Types - Purpose and Function of Every OSPF LSA&lt;/a&gt;.&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It is very important for any network engineer to understand how &lt;strong&gt;LSAs&lt;/strong&gt; are contained within an &lt;strong&gt;LSU&lt;/strong&gt;. We’ll use the example below, where an OSPF router sends an &lt;strong&gt;LSU&lt;/strong&gt; to the &lt;strong&gt;OSPF Designated Router&lt;/strong&gt; (&lt;strong&gt;DR&lt;/strong&gt;) containing &lt;strong&gt;LSA information&lt;/strong&gt; about a new network:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-lsu-lsa-packet-structure-lsa-types-overview-1.png&quot; alt=&quot;OSPF Link State Update (LSU) packet containing a Link State Advertisement (LSA)&quot; title=&quot;OSPF Link State Update (LSU) packet containing a Link State Advertisement (LSA)&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. OSPF Link State Multicast Update (LSU) packet containing a Link State Advertisement (LSA)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As shown above, &lt;strong&gt;LSAs&lt;/strong&gt; are &lt;strong&gt;contained within LSUs&lt;/strong&gt;, which are all part of an &lt;strong&gt;OSPF packet&lt;/strong&gt; encapsulated within an Ethernet frame (assuming an Ethernet network).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Our diagram of the LSU/LSA packet structure is confirmed by capturing an &lt;strong&gt;OSPF Ethernet frame&lt;/strong&gt; below. We’ve highlighted each section (LSA, LSU, OSPF Header) using the same colors:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-lsu-lsa-packet-structure-lsa-types-overview-2.png&quot; alt=&quot;OSPF Link State Update and List State Advertisement within an Ethernet frame&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;OSPF Link State Update and List State Advertisement within an Ethernet frame&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 2. OSPF Link State Update and List State Advertisement within an Ethernet frame&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Notice that the destination IP address is &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-multicast.html&quot; target=&quot;_blank&quot; title=&quot;How Multicast Works&quot;&gt;&lt;strong&gt;multicast address 224.0.0.6&lt;/strong&gt;&lt;/a&gt;, as expected since routers send updates to the &lt;strong&gt;Designated Router&lt;/strong&gt; (&lt;strong&gt;DR&lt;/strong&gt;) using this multicast address. This is also analyzed under the &lt;strong&gt;Working Inside a Single Area&lt;/strong&gt; section in our article &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; title=&quot;How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&quot;&gt;How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Most Popular OSPF LSA Types&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;OSPF currently defines 11 different LSA types, however, despite the large variety of LSAs only around half of them are commonly found in OSPF networks. &lt;strong&gt;Table 1&lt;/strong&gt; below shows the most popular LSA types, the &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; title=&quot;type of OSPF routers&quot;&gt;type of OSPF routers&lt;/a&gt; (DR, ABR, ASBR etc) that generate them along with their function and the OSPF areas they affect:&lt;/p&gt;
&lt;table border=&quot;0&quot; style=&quot;width: 813px; margin-left: 4.65pt; border-collapse: collapse;&quot; cellspacing=&quot;0&quot; cellpadding=&quot;0&quot;&gt;
&lt;tbody&gt;
&lt;tr style=&quot;height: 37.5pt;&quot;&gt;
&lt;td style=&quot;width: 125px; border-width: 1pt 1pt 1.5pt; border-style: solid; border-color: windowtext; background: #95b3d7; padding: 0cm 5.4pt; height: 37.5pt;&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;LSA &lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 213px; border-width: 1pt 1pt 1.5pt medium; border-style: solid solid solid none; background: #95b3d7; padding: 0cm 5.4pt; height: 37.5pt;&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;Generated by&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 243px; border-width: 1pt 1pt 1.5pt medium; border-style: solid solid solid none; background: #95b3d7; padding: 0cm 5.4pt; height: 37.5pt;&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;Function&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 232px; border-width: 1pt 1pt 1.5pt medium; border-style: solid solid solid none; background: #95b3d7; padding: 0cm 5.4pt; height: 37.5pt;&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;Flooding Map&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 36.75pt;&quot;&gt;
&lt;td style=&quot;width: 125px; border-width: medium 1pt 1pt; border-style: none solid solid; padding: 0cm 5.4pt; height: 36.75pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 12pt; color: red;&quot;&gt;Type 1&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 213px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 36.75pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Normal Area Routers&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 243px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 36.75pt;&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Advertising router's interface &lt;br /&gt; and status to neighbors&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 232px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 36.75pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Intra-Area&lt;br /&gt; (Area of origin)&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 31.5pt;&quot;&gt;
&lt;td style=&quot;width: 125px; border-width: medium 1pt 1pt; border-style: none solid solid; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 12pt; color: red;&quot;&gt;Type 2&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 213px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;DR&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 243px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Advertising DRs direct &lt;br /&gt; connected neighbors &lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 232px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Intra-Area &lt;br /&gt; (Area of origin)&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 31.5pt;&quot;&gt;
&lt;td style=&quot;width: 125px; border-width: medium 1pt 1pt; border-style: none solid solid; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 12pt; color: red;&quot;&gt;Type 3&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 213px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;ABR&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 243px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Advertising ABRs areas&lt;br /&gt; summary&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 232px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Inter-Area &lt;br /&gt; (Multiple Areas)&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 31.5pt;&quot;&gt;
&lt;td style=&quot;width: 125px; border-width: medium 1pt 1pt; border-style: none solid solid; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 12pt; color: red;&quot;&gt;Type 4&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 213px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;ABR&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 243px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Advertising the presence &lt;br /&gt; of ASBRs&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 232px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Inter-Area &lt;br /&gt; (Multiple Areas)&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 31.5pt;&quot;&gt;
&lt;td style=&quot;width: 125px; border-width: medium 1pt 1pt; border-style: none solid solid; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 12pt; color: red;&quot;&gt;Type 5&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 213px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;ASBR&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 243px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Advertising external routes &lt;br /&gt; to internet&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 232px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Inter-Area &lt;br /&gt; (Multiple Areas)&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style=&quot;height: 31.5pt;&quot;&gt;
&lt;td style=&quot;width: 125px; border-width: medium 1pt 1pt; border-style: none solid solid; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 12pt; color: red;&quot;&gt;Type 7&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 213px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;ASBR&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 243px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Advertising external routes &lt;br /&gt; to internet to NSSA areas&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style=&quot;width: 232px; border-width: medium 1pt 1pt medium; border-style: none solid solid none; padding: 0cm 5.4pt; height: 31.5pt;&quot; nowrap=&quot;nowrap&quot;&gt;
&lt;p style=&quot;margin-bottom: 0.0001pt; text-align: justify; line-height: normal;&quot;&gt;&lt;span style=&quot;font-size: 12pt; color: black;&quot;&gt;Inter-Area &lt;br /&gt; (Multiple Areas)&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Table 1. Most often used LSA Types, router origin type, their function and Areas affected&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Looking at the OSPF packet captured with our network analyzer, we can now understand that the specific &lt;strong&gt;LSA&lt;/strong&gt; was a &lt;strong&gt;Type-3 LSA&lt;/strong&gt; (&lt;strong&gt;LS Type&lt;/strong&gt;: Summary-LSA IP network &lt;strong&gt;3&lt;/strong&gt;) which means it was generated by an &lt;strong&gt;ABR OSPF router&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;Link State Advertisement (LSA) Packet Structure (Within a Link State Update - LSU)&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Each &lt;strong&gt;LSA&lt;/strong&gt; packet consists of a header and a body that contains all the information needed to exchange network information within an OSPF network. The diagram below shows the structure of an &lt;strong&gt;OSPF LSA packet&lt;/strong&gt;:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-lsu-lsa-packet-structure-lsa-types-overview-3.png&quot; alt=&quot;OSPF LSA Packet structure and fields&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;OSPF LSA Packet structure and fields&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 3. OSPF LSA Packet structure and fields&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;LSA header&lt;/strong&gt; is a &lt;strong&gt;20 byte&lt;/strong&gt; (&lt;strong&gt;32x5 = 160 bits&lt;/strong&gt;) section that consists of the following fields:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;LS Age&lt;/strong&gt; (2 Bytes): Time passed since the LSA was generated (in seconds).&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Options&lt;/strong&gt; (1 Byte): Indicates the OSPF features and options the origin can support.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;LS Type&lt;/strong&gt; (1 Byte): Defines the LSA type (all types will be explained later).&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Link State ID&lt;/strong&gt; (4 Bytes): Identifies the network link between OSPF routers (usually IP address).&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Advertising Router&lt;/strong&gt; (4 Bytes): Indicates the origin router’s ID.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;LS Sequence Number&lt;/strong&gt; (4 Bytes): A specific digit on each LSA packet to filter old and repeated&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;LS Checksum&lt;/strong&gt; (2 Bytes): A certain digit given to LS to compare and detect errors.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Length&lt;/strong&gt; (2 Bytes): Represents LSA packet length.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;LSA body&lt;/strong&gt; varies in size according to the &lt;strong&gt;LS type&lt;/strong&gt; and the details it identifies, LSA types are explained in great detail in our upcoming article.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article explained &lt;strong&gt;OSPF Link State Update &lt;/strong&gt;(&lt;strong&gt;LSA&lt;/strong&gt;)&lt;strong&gt; packets&lt;/strong&gt; and showed how they contain &lt;strong&gt;Link State Advertisements &lt;/strong&gt;(&lt;strong&gt;LSAs&lt;/strong&gt;). We also &lt;strong&gt;analyzed OSPF LSU &amp;amp; LSAs packet structure&lt;/strong&gt; and explained each field in an &lt;strong&gt;OSPF LSA packet&lt;/strong&gt;. Finally, we spoke about the most common &lt;strong&gt;LSA Types&lt;/strong&gt;, &lt;strong&gt;router origin type&lt;/strong&gt; (&lt;strong&gt;ABR&lt;/strong&gt;, &lt;strong&gt;ASBR&lt;/strong&gt;, &lt;strong&gt;DR&lt;/strong&gt; etc), their function and Areas affected. Read more on OSPF by visiting any of the below articles:&lt;/p&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html&quot; target=&quot;_blank&quot; title=&quot;Introduction, OSPF Packet Structure, OSPF Messages and Characteristics&quot;&gt;Part 1: Introduction, OSPF Packet Structure, OSPF Messages and Characteristics&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; title=&quot;How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&quot;&gt;Part 2: How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu.html&quot; target=&quot;_blank&quot; title=&quot;OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU)&quot;&gt;Part 3 - OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU)&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-states-forming-process.html&quot; target=&quot;_blank&quot; title=&quot;OSPF Neighbor States – OSPF Neighbor Forming Process&quot;&gt;Part 4 - OSPF Neighbor States – OSPF Neighbor Forming Process&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;-&amp;nbsp;Part 5 - (This article) Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types&amp;nbsp;&lt;/div&gt;
&lt;div&gt;-&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsa-types-explained.html&quot; target=&quot;_blank&quot; title=&quot;OSPF LSA Types - Purpose and Function of Every OSPF LSA&quot;&gt;Part 6 - OSPF LSA Types - Purpose and Function of Every OSPF LSA&lt;/a&gt;&amp;nbsp;&lt;/div&gt;</content>
		<category term="Routing" />
	</entry>
	<entry>
		<title>OSPF - Part 4: OSPF Neighbor States – OSPF Neighbor Forming Process</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-states-forming-process.html"/>
		<published>2016-03-20T16:54:13+11:00</published>
		<updated>2016-03-20T16:54:13+11:00</updated>
		<id>https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-states-forming-process.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ospf-part4-intro.webp&quot; alt=&quot;OSPF Neighbor States – OSPF Neighbor Forming Process&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;This is the third article of our &lt;strong&gt;OSPF series&lt;/strong&gt; which analyzes the &lt;strong&gt;different OSPF States&lt;/strong&gt; routers go through during the &lt;strong&gt;OSPF discovery&lt;/strong&gt; and &lt;strong&gt;neighbor forming process&lt;/strong&gt;. We analyze &lt;strong&gt;OSPF states&lt;/strong&gt; (&lt;strong&gt;Init state&lt;/strong&gt;, &lt;strong&gt;2-way state&lt;/strong&gt;, &lt;strong&gt;Exstart state&lt;/strong&gt;, &lt;strong&gt;Exchange state&lt;/strong&gt;, &lt;strong&gt;Loading state&lt;/strong&gt; &lt;strong&gt;Full state&lt;/strong&gt;, &lt;strong&gt;Down state&lt;/strong&gt;), &lt;strong&gt;LSA Hello messages&lt;/strong&gt; and more.&lt;/p&gt;
&lt;p&gt;Below is a complete list of articles covering our &lt;strong&gt;OSPF Series&lt;/strong&gt;:&lt;/p&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html&quot; target=&quot;_blank&quot; title=&quot;Part 1: Introduction, OSPF Packet Structure, OSPF Messages and Characteristics&quot;&gt;Part 1: Introduction, OSPF Packet Structure, OSPF Messages and Characteristics&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; title=&quot;Part 2: How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&quot;&gt;Part 2: How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu.html&quot; target=&quot;_blank&quot; title=&quot;Part 3: OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU)&quot;&gt;Part 3: OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU)&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- Part 4 (This article): OSPF Neighbor States – OSPF Neighbor Forming Process.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html&quot; target=&quot;_blank&quot; title=&quot;Part 5: Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types&quot;&gt;Part 5: Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;-&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsa-types-explained.html&quot; target=&quot;_blank&quot; title=&quot;Part 6: OSPF LSA Types - Purpose and Function of Every OSPF LSA&quot;&gt;Part 6: OSPF LSA Types - Purpose and Function of Every OSPF LSA&lt;/a&gt;.&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;OSPF Neighbor States&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When OSPF forms adjacency with neighbors, the connection goes through several states before the routers are fully adjacent with each other, this section describes each state in detail. Following are the OSPF States we'll be examining:&lt;/p&gt;
&lt;ul class=&quot;check&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;color: #365f91;&quot;&gt;Down state&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #365f91;&quot;&gt;Attempt state&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #365f91;&quot;&gt;Init state&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #365f91;&quot;&gt;2-Way state&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #365f91;&quot;&gt;Exstart state&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #365f91;&quot;&gt;Exchange state&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #365f91;&quot;&gt;Loading state&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #365f91;&quot;&gt;Full state&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The diagram below shows the different states OSPF routers will go through when discovering their OSPF neighbors:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-adjacency-neighbor-states-forming-process-1.png&quot; alt=&quot;ospf-adjacency-neighbor-states-forming-process-1&quot; width=&quot;656&quot; height=&quot;586&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;OSPF Neighbor States &amp;amp; Neighbor Forming Process. Down State, Attempt State, Init State, 2-Way State, Exstart State, Exchange State, Full State&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. OSPF Neighbor States &amp;amp; OSPF Neighbor Forming Process&lt;/p&gt;
&lt;h2&gt;Down State&lt;/h2&gt;
&lt;p&gt;The &lt;strong&gt;Down&lt;/strong&gt;&lt;strong&gt; State&lt;/strong&gt; is the first OSPF neighbor state and means &lt;strong&gt;no &lt;/strong&gt;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu.html&quot; target=&quot;_blank&quot; title=&quot;Hello Packets&quot;&gt;&lt;strong&gt;Hello packets&lt;/strong&gt;&lt;/a&gt; have been received from a neighbor. In an already established OSPF adjacency, an OSPF state will transition from a &lt;strong&gt;FULL&lt;/strong&gt; or &lt;strong&gt;2-Way State&lt;/strong&gt; to the &lt;strong&gt;Down State&lt;/strong&gt; when the router &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu.html&quot; target=&quot;_blank&quot; title=&quot;Dead Interval Timers&quot;&gt;&lt;strong&gt;Dead Interval Timer&lt;/strong&gt;&lt;/a&gt; expires (4 x Hello Interval timer), which means OSPF has lost communication with its neighbor and is now considered non-reachable or dead.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This is a special state used only for manually configured neighbors in a &lt;strong&gt;Non-Broadcast MultiAccess&lt;/strong&gt; (&lt;strong&gt;NBMA&lt;/strong&gt;) network, it indicates that the router is sending &lt;strong&gt;Hello&lt;/strong&gt; packets to its neighbor in a &lt;strong&gt;Non-Broadcast MultiAccess&lt;/strong&gt; (&lt;strong&gt;NBMA&lt;/strong&gt;) environment via &lt;strong&gt;unicast&lt;/strong&gt; but no reply is received within the &lt;strong&gt;Dead Interval&lt;/strong&gt; (4 x Hello Interval).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;An example of an &lt;strong&gt;NBMA network&lt;/strong&gt; is a &lt;strong&gt;Frame Relay&lt;/strong&gt; network where there are no intrinsic &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-broadcast.html&quot; target=&quot;_blank&quot; title=&quot;Broadcast packets&quot;&gt;broadcast&lt;/a&gt; and &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-multicast.html&quot; target=&quot;_blank&quot; title=&quot;Multicast Packets&quot;&gt;multicast&lt;/a&gt; capabilities.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;2-Way State&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This state indicates that a &lt;strong&gt;Hello&lt;/strong&gt; packet was received from a neighbor router but the receiving Router’s ID wasn’t listed in the &lt;strong&gt;Hello&lt;/strong&gt; packet. When a router receives a &lt;strong&gt;Hello&lt;/strong&gt; packet from a neighbor, it should list the sender's &lt;strong&gt;Router ID&lt;/strong&gt; as an acknowledgment that it previously received a valid &lt;strong&gt;Hello&lt;/strong&gt; packet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This state describes the Bi-Directional communication state, Bi- Directional means that each router has received the other’s &lt;strong&gt;Hello&lt;/strong&gt; packet and that each router can see its own Router ID included within the &lt;strong&gt;Hello&lt;/strong&gt; packet’s neighbor field.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;On &lt;strong&gt;broadcast&lt;/strong&gt; media (e.g LAN) and &lt;strong&gt;Non-Broadcast MultiAccess&lt;/strong&gt; (&lt;strong&gt;NBMA&lt;/strong&gt;) networks (e.g Frame Relay, ATM, X.25), a router becomes &lt;strong&gt;full state&lt;/strong&gt; (analyzed below) only with the &lt;strong&gt;Designated Router&lt;/strong&gt; (&lt;strong&gt;DR&lt;/strong&gt;) and the &lt;strong&gt;Backup Designated Router&lt;/strong&gt; (&lt;strong&gt;BDR&lt;/strong&gt;). It will, however, stay in the 2-way state with all other neighbors.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When the &lt;strong&gt;2-Way state&lt;/strong&gt; is complete, the &lt;strong&gt;DR&lt;/strong&gt; and &lt;strong&gt;DBR&lt;/strong&gt; routers are elected, considering they are on a &lt;strong&gt;broadcast&lt;/strong&gt; or &lt;strong&gt;NBMA network&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Exstart State&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This state specifies that &lt;strong&gt;DR&lt;/strong&gt; and &lt;strong&gt;BDR&lt;/strong&gt; have been elected and master-slave relation is determined. An initial sequence number for adjacency formation is also selected. The router with the highest &lt;strong&gt;router ID&lt;/strong&gt; becomes the master and begins to exchange &lt;strong&gt;Link&lt;/strong&gt;&lt;strong&gt; State&lt;/strong&gt; data. Only the Master router is able to increment the sequence number.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Exchange State&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this state, OSPF routers exchange &lt;strong&gt;DataBase Descriptor&lt;/strong&gt; (&lt;strong&gt;DBD&lt;/strong&gt;) packets. These contain &lt;strong&gt;Link State Advertisement&lt;/strong&gt; (&lt;strong&gt;LSA&lt;/strong&gt;) headers describing the content of the entire &lt;strong&gt;Link State Database&lt;/strong&gt; (&lt;strong&gt;LSD&lt;/strong&gt;). The contents of the &lt;strong&gt;DataBase Descriptor&lt;/strong&gt; (&lt;strong&gt;DBD&lt;/strong&gt;) received by the router are compared with its own &lt;strong&gt;Link State Database&lt;/strong&gt; (&lt;strong&gt;LSD&lt;/strong&gt;) to check if changes or additional link-state information is available from its neighbor.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Loading State&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this state, routers exchange full Link State information based on &lt;strong&gt;DataBase Descriptor&lt;/strong&gt; (&lt;strong&gt;DBD&lt;/strong&gt;) provided by neighbors, the OSPF router sends &lt;strong&gt;Link State Request&lt;/strong&gt; (&lt;strong&gt;LSR&lt;/strong&gt;) and receives &lt;strong&gt;Link State Update&lt;/strong&gt; (&lt;strong&gt;LSU&lt;/strong&gt;) containing all &lt;strong&gt;Link State Advertisements&lt;/strong&gt; (&lt;strong&gt;LSAs&lt;/strong&gt;).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Link&lt;/strong&gt;&lt;strong&gt; State&lt;/strong&gt;&lt;strong&gt; Updates&lt;/strong&gt; (&lt;strong&gt;LSU&lt;/strong&gt;) actually act as an envelope that contains all the &lt;strong&gt;Link State Advertisements&lt;/strong&gt; (&lt;strong&gt;LSAs&lt;/strong&gt;) – that have been sent to neighbors with new changes or new networks learned.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Full State&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Full state&lt;/strong&gt; is the normal operating state of OSPF that indicates everything is functioning normally. In this state, routers are fully adjacent with each other and all the router and network &lt;strong&gt;Link State Advertisements&lt;/strong&gt; (&lt;strong&gt;LSAs&lt;/strong&gt;) are exchanged and the routers' databases are fully synchronized.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For &lt;strong&gt;Broadcast&lt;/strong&gt; and &lt;strong&gt;NBMA media&lt;/strong&gt;, routers will achieve the &lt;strong&gt;Full State&lt;/strong&gt; with their &lt;strong&gt;DR&lt;/strong&gt; and &lt;strong&gt;BDR&lt;/strong&gt; router only, while for &lt;strong&gt;Point-to-point&lt;/strong&gt; and &lt;strong&gt;Point-to-multipoint&lt;/strong&gt; networks a router should be in the &lt;strong&gt;Full&lt;/strong&gt;&lt;strong&gt; State&lt;/strong&gt; with &lt;strong&gt;every neighboring router&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article analyzed the states &lt;strong&gt;OSPF&lt;/strong&gt; routers go through during OSPF &lt;strong&gt;neighbor discovery and adjacency process&lt;/strong&gt;. We examined in detail each OSPF State including: &lt;strong&gt;Down state&lt;/strong&gt;, &lt;strong&gt;Attempt state&lt;/strong&gt;, &lt;strong&gt;Init state&lt;/strong&gt;, &lt;strong&gt;2-way state&lt;/strong&gt;, &lt;strong&gt;Exstart state&lt;/strong&gt;, &lt;strong&gt;Exchange state&lt;/strong&gt;, &lt;strong&gt;Loading state&lt;/strong&gt; and &lt;strong&gt;Full state&lt;/strong&gt;.&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ospf-part4-intro.webp&quot; alt=&quot;OSPF Neighbor States – OSPF Neighbor Forming Process&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;This is the third article of our &lt;strong&gt;OSPF series&lt;/strong&gt; which analyzes the &lt;strong&gt;different OSPF States&lt;/strong&gt; routers go through during the &lt;strong&gt;OSPF discovery&lt;/strong&gt; and &lt;strong&gt;neighbor forming process&lt;/strong&gt;. We analyze &lt;strong&gt;OSPF states&lt;/strong&gt; (&lt;strong&gt;Init state&lt;/strong&gt;, &lt;strong&gt;2-way state&lt;/strong&gt;, &lt;strong&gt;Exstart state&lt;/strong&gt;, &lt;strong&gt;Exchange state&lt;/strong&gt;, &lt;strong&gt;Loading state&lt;/strong&gt; &lt;strong&gt;Full state&lt;/strong&gt;, &lt;strong&gt;Down state&lt;/strong&gt;), &lt;strong&gt;LSA Hello messages&lt;/strong&gt; and more.&lt;/p&gt;
&lt;p&gt;Below is a complete list of articles covering our &lt;strong&gt;OSPF Series&lt;/strong&gt;:&lt;/p&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html&quot; target=&quot;_blank&quot; title=&quot;Part 1: Introduction, OSPF Packet Structure, OSPF Messages and Characteristics&quot;&gt;Part 1: Introduction, OSPF Packet Structure, OSPF Messages and Characteristics&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; title=&quot;Part 2: How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&quot;&gt;Part 2: How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu.html&quot; target=&quot;_blank&quot; title=&quot;Part 3: OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU)&quot;&gt;Part 3: OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU)&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- Part 4 (This article): OSPF Neighbor States – OSPF Neighbor Forming Process.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html&quot; target=&quot;_blank&quot; title=&quot;Part 5: Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types&quot;&gt;Part 5: Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;-&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsa-types-explained.html&quot; target=&quot;_blank&quot; title=&quot;Part 6: OSPF LSA Types - Purpose and Function of Every OSPF LSA&quot;&gt;Part 6: OSPF LSA Types - Purpose and Function of Every OSPF LSA&lt;/a&gt;.&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;OSPF Neighbor States&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When OSPF forms adjacency with neighbors, the connection goes through several states before the routers are fully adjacent with each other, this section describes each state in detail. Following are the OSPF States we'll be examining:&lt;/p&gt;
&lt;ul class=&quot;check&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;color: #365f91;&quot;&gt;Down state&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #365f91;&quot;&gt;Attempt state&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #365f91;&quot;&gt;Init state&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #365f91;&quot;&gt;2-Way state&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #365f91;&quot;&gt;Exstart state&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #365f91;&quot;&gt;Exchange state&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #365f91;&quot;&gt;Loading state&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #365f91;&quot;&gt;Full state&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The diagram below shows the different states OSPF routers will go through when discovering their OSPF neighbors:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-adjacency-neighbor-states-forming-process-1.png&quot; alt=&quot;ospf-adjacency-neighbor-states-forming-process-1&quot; width=&quot;656&quot; height=&quot;586&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;OSPF Neighbor States &amp;amp; Neighbor Forming Process. Down State, Attempt State, Init State, 2-Way State, Exstart State, Exchange State, Full State&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. OSPF Neighbor States &amp;amp; OSPF Neighbor Forming Process&lt;/p&gt;
&lt;h2&gt;Down State&lt;/h2&gt;
&lt;p&gt;The &lt;strong&gt;Down&lt;/strong&gt;&lt;strong&gt; State&lt;/strong&gt; is the first OSPF neighbor state and means &lt;strong&gt;no &lt;/strong&gt;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu.html&quot; target=&quot;_blank&quot; title=&quot;Hello Packets&quot;&gt;&lt;strong&gt;Hello packets&lt;/strong&gt;&lt;/a&gt; have been received from a neighbor. In an already established OSPF adjacency, an OSPF state will transition from a &lt;strong&gt;FULL&lt;/strong&gt; or &lt;strong&gt;2-Way State&lt;/strong&gt; to the &lt;strong&gt;Down State&lt;/strong&gt; when the router &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu.html&quot; target=&quot;_blank&quot; title=&quot;Dead Interval Timers&quot;&gt;&lt;strong&gt;Dead Interval Timer&lt;/strong&gt;&lt;/a&gt; expires (4 x Hello Interval timer), which means OSPF has lost communication with its neighbor and is now considered non-reachable or dead.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This is a special state used only for manually configured neighbors in a &lt;strong&gt;Non-Broadcast MultiAccess&lt;/strong&gt; (&lt;strong&gt;NBMA&lt;/strong&gt;) network, it indicates that the router is sending &lt;strong&gt;Hello&lt;/strong&gt; packets to its neighbor in a &lt;strong&gt;Non-Broadcast MultiAccess&lt;/strong&gt; (&lt;strong&gt;NBMA&lt;/strong&gt;) environment via &lt;strong&gt;unicast&lt;/strong&gt; but no reply is received within the &lt;strong&gt;Dead Interval&lt;/strong&gt; (4 x Hello Interval).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;An example of an &lt;strong&gt;NBMA network&lt;/strong&gt; is a &lt;strong&gt;Frame Relay&lt;/strong&gt; network where there are no intrinsic &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-broadcast.html&quot; target=&quot;_blank&quot; title=&quot;Broadcast packets&quot;&gt;broadcast&lt;/a&gt; and &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-multicast.html&quot; target=&quot;_blank&quot; title=&quot;Multicast Packets&quot;&gt;multicast&lt;/a&gt; capabilities.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;2-Way State&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This state indicates that a &lt;strong&gt;Hello&lt;/strong&gt; packet was received from a neighbor router but the receiving Router’s ID wasn’t listed in the &lt;strong&gt;Hello&lt;/strong&gt; packet. When a router receives a &lt;strong&gt;Hello&lt;/strong&gt; packet from a neighbor, it should list the sender's &lt;strong&gt;Router ID&lt;/strong&gt; as an acknowledgment that it previously received a valid &lt;strong&gt;Hello&lt;/strong&gt; packet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This state describes the Bi-Directional communication state, Bi- Directional means that each router has received the other’s &lt;strong&gt;Hello&lt;/strong&gt; packet and that each router can see its own Router ID included within the &lt;strong&gt;Hello&lt;/strong&gt; packet’s neighbor field.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;On &lt;strong&gt;broadcast&lt;/strong&gt; media (e.g LAN) and &lt;strong&gt;Non-Broadcast MultiAccess&lt;/strong&gt; (&lt;strong&gt;NBMA&lt;/strong&gt;) networks (e.g Frame Relay, ATM, X.25), a router becomes &lt;strong&gt;full state&lt;/strong&gt; (analyzed below) only with the &lt;strong&gt;Designated Router&lt;/strong&gt; (&lt;strong&gt;DR&lt;/strong&gt;) and the &lt;strong&gt;Backup Designated Router&lt;/strong&gt; (&lt;strong&gt;BDR&lt;/strong&gt;). It will, however, stay in the 2-way state with all other neighbors.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When the &lt;strong&gt;2-Way state&lt;/strong&gt; is complete, the &lt;strong&gt;DR&lt;/strong&gt; and &lt;strong&gt;DBR&lt;/strong&gt; routers are elected, considering they are on a &lt;strong&gt;broadcast&lt;/strong&gt; or &lt;strong&gt;NBMA network&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Exstart State&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This state specifies that &lt;strong&gt;DR&lt;/strong&gt; and &lt;strong&gt;BDR&lt;/strong&gt; have been elected and master-slave relation is determined. An initial sequence number for adjacency formation is also selected. The router with the highest &lt;strong&gt;router ID&lt;/strong&gt; becomes the master and begins to exchange &lt;strong&gt;Link&lt;/strong&gt;&lt;strong&gt; State&lt;/strong&gt; data. Only the Master router is able to increment the sequence number.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Exchange State&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this state, OSPF routers exchange &lt;strong&gt;DataBase Descriptor&lt;/strong&gt; (&lt;strong&gt;DBD&lt;/strong&gt;) packets. These contain &lt;strong&gt;Link State Advertisement&lt;/strong&gt; (&lt;strong&gt;LSA&lt;/strong&gt;) headers describing the content of the entire &lt;strong&gt;Link State Database&lt;/strong&gt; (&lt;strong&gt;LSD&lt;/strong&gt;). The contents of the &lt;strong&gt;DataBase Descriptor&lt;/strong&gt; (&lt;strong&gt;DBD&lt;/strong&gt;) received by the router are compared with its own &lt;strong&gt;Link State Database&lt;/strong&gt; (&lt;strong&gt;LSD&lt;/strong&gt;) to check if changes or additional link-state information is available from its neighbor.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Loading State&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this state, routers exchange full Link State information based on &lt;strong&gt;DataBase Descriptor&lt;/strong&gt; (&lt;strong&gt;DBD&lt;/strong&gt;) provided by neighbors, the OSPF router sends &lt;strong&gt;Link State Request&lt;/strong&gt; (&lt;strong&gt;LSR&lt;/strong&gt;) and receives &lt;strong&gt;Link State Update&lt;/strong&gt; (&lt;strong&gt;LSU&lt;/strong&gt;) containing all &lt;strong&gt;Link State Advertisements&lt;/strong&gt; (&lt;strong&gt;LSAs&lt;/strong&gt;).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Link&lt;/strong&gt;&lt;strong&gt; State&lt;/strong&gt;&lt;strong&gt; Updates&lt;/strong&gt; (&lt;strong&gt;LSU&lt;/strong&gt;) actually act as an envelope that contains all the &lt;strong&gt;Link State Advertisements&lt;/strong&gt; (&lt;strong&gt;LSAs&lt;/strong&gt;) – that have been sent to neighbors with new changes or new networks learned.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Full State&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Full state&lt;/strong&gt; is the normal operating state of OSPF that indicates everything is functioning normally. In this state, routers are fully adjacent with each other and all the router and network &lt;strong&gt;Link State Advertisements&lt;/strong&gt; (&lt;strong&gt;LSAs&lt;/strong&gt;) are exchanged and the routers' databases are fully synchronized.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For &lt;strong&gt;Broadcast&lt;/strong&gt; and &lt;strong&gt;NBMA media&lt;/strong&gt;, routers will achieve the &lt;strong&gt;Full State&lt;/strong&gt; with their &lt;strong&gt;DR&lt;/strong&gt; and &lt;strong&gt;BDR&lt;/strong&gt; router only, while for &lt;strong&gt;Point-to-point&lt;/strong&gt; and &lt;strong&gt;Point-to-multipoint&lt;/strong&gt; networks a router should be in the &lt;strong&gt;Full&lt;/strong&gt;&lt;strong&gt; State&lt;/strong&gt; with &lt;strong&gt;every neighboring router&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article analyzed the states &lt;strong&gt;OSPF&lt;/strong&gt; routers go through during OSPF &lt;strong&gt;neighbor discovery and adjacency process&lt;/strong&gt;. We examined in detail each OSPF State including: &lt;strong&gt;Down state&lt;/strong&gt;, &lt;strong&gt;Attempt state&lt;/strong&gt;, &lt;strong&gt;Init state&lt;/strong&gt;, &lt;strong&gt;2-way state&lt;/strong&gt;, &lt;strong&gt;Exstart state&lt;/strong&gt;, &lt;strong&gt;Exchange state&lt;/strong&gt;, &lt;strong&gt;Loading state&lt;/strong&gt; and &lt;strong&gt;Full state&lt;/strong&gt;.&lt;/p&gt;</content>
		<category term="Routing" />
	</entry>
	<entry>
		<title>OSPF - Part 3: OSPF Adjacency &amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp; LSU)</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu.html"/>
		<published>2016-01-15T10:19:03+11:00</published>
		<updated>2016-01-15T10:19:03+11:00</updated>
		<id>https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ospf-part3-intro.webp&quot; alt=&quot;OSPF Adjacency &amp;amp; Neighbor Forming Process&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu-1a.jpg&quot; alt=&quot;ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu-1a&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;OSPF Adjacency &amp;amp; Neighbor Forming Process&quot; /&gt;This is the thrid article of our 6-part OSPF series (see below) that describes how &lt;strong&gt;OSPF routers&lt;/strong&gt; perform &lt;strong&gt;neighbor relationship and adjacency&lt;/strong&gt;. We’ll examine &lt;strong&gt;how OSPF discovers neighbors&lt;/strong&gt; by sending &lt;strong&gt;Hello packets&lt;/strong&gt; through the &lt;strong&gt;router interfaces&lt;/strong&gt; and how it shares &lt;strong&gt;Link State Advertisements&lt;/strong&gt; (&lt;strong&gt;LSAs&lt;/strong&gt;) to &lt;strong&gt;form adjacencies&lt;/strong&gt; and &lt;strong&gt;build its topology table&lt;/strong&gt;. We’ll also examine the &lt;strong&gt;contents of OSPF Hello packets&lt;/strong&gt; (&lt;strong&gt;Router ID&lt;/strong&gt;, &lt;strong&gt;Hello/Dead Intervals&lt;/strong&gt;, &lt;strong&gt;Subnet Mask&lt;/strong&gt;, &lt;strong&gt;Router Priority&lt;/strong&gt;, &lt;strong&gt;Area ID&lt;/strong&gt;, &lt;strong&gt;DB &amp;amp; BDR IP Address&lt;/strong&gt;, &lt;strong&gt;Authentication information&lt;/strong&gt;) and more.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Below is a complete list of articles covering our &lt;strong&gt;OSPF Series&lt;/strong&gt;:&lt;/p&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html&quot; target=&quot;_blank&quot; title=&quot;Part 1: Introduction, OSPF Packet Structure, OSPF Messages and Characteristics&quot;&gt;Part 1: Introduction, OSPF Packet Structure, OSPF Messages and Characteristics&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; title=&quot;Part 2: How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&quot;&gt;Part 2: How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- Part 3 (This article): OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU).&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-states-forming-process.html&quot; target=&quot;_blank&quot; title=&quot;Part 4: OSPF Neighbor States – OSPF Neighbor Forming Process&quot;&gt;Part 4: OSPF Neighbor States – OSPF Neighbor Forming Process&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html&quot; target=&quot;_blank&quot; title=&quot;Part 5: Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types&quot;&gt;Part 5: Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;-&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsa-types-explained.html&quot; target=&quot;_blank&quot; title=&quot;Part 6: OSPF LSA Types - Purpose and Function of Every OSPF LSA&quot;&gt;Part 6: OSPF LSA Types - Purpose and Function of Every OSPF LSA&lt;/a&gt;.&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;How OSPF Forms Neighbor Relations&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once OSPF is enabled on a router interface, a &lt;strong&gt;Link State Database&lt;/strong&gt; (&lt;strong&gt;LSD&lt;/strong&gt;) is established and all interfaces running OSPF are added to this table to be used in &lt;strong&gt;Link State Advertisements&lt;/strong&gt; (&lt;strong&gt;LSAs&lt;/strong&gt;), OSPF then the begins neighbor discovery and forming adjacency process.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We’ll now take a closer look at both, neighbor discover and adjacency forming process:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu-1.png&quot; alt=&quot;R1 sends an initial OSPF Hello packet. R2 responds with an OSPF Reply Hello packet.&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Router R1 sends an initial OSPF Hello packet. R2 responds with an OSPF Reply Hello packet.&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. R1 sends an initial OSPF Hello packet. R2 responds with an OSPF Reply Hello packet.&lt;/p&gt;
&lt;h2&gt;Sending &amp;amp; Receiving OSPF Hello Messages&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;center&quot;&gt;An OSPF router generates a Hello packet every poll interval -10 seconds for Peer-to-Peer (P2P) networks and 30 seconds for Non-Broadcast-Multiple-Access (NBMA) networks by default- and advertises it through multicast address 224.0.0.5 to all routers connected to its interfaces while it searches for potential OSPF neighbors. The Hello message contains a list of information needed to form an OSPF neighbor relation between two neighboring routers, the following a list of information contained the &lt;strong&gt;Hello messages&lt;/strong&gt;:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li&gt;&lt;strong&gt;OSPF Router ID&lt;/strong&gt;. The router’s ID which is configured or automatically selected by OSPF (analyzed below)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hello Interval Timer&lt;/strong&gt;. Frequency upon which Hello packets are sent.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Dead Interval Timer&lt;/strong&gt;. Defines how long we should wait for hello packets before we declare the neighbor dead.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Subnet Mask&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Router Priority&lt;/strong&gt;. Used to help determine the Designated Router (DR). Higher priority takes precedence. A configured Priority of 0 means the router will not become a DR or BDR.&lt;/li&gt;
&lt;li&gt;List of reachable OSPF neighbors in the network.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Area ID&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;DR &amp;amp; BDR’s&lt;/strong&gt; IP addresses (if exists)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Authentication Password&lt;/strong&gt; (if configured)&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once a neighbor router (R2) running OSPF receives the &lt;strong&gt;Hello message&lt;/strong&gt;, it runs a check on the above list.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The following conditions must be met for two routers to become neighbors:&lt;/p&gt;
&lt;ol style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;They must have the same &lt;strong&gt;IP network/subnet&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;The &lt;strong&gt;Hello&lt;/strong&gt; and &lt;strong&gt;Dead Interval timers&lt;/strong&gt; must be identical&lt;/li&gt;
&lt;li&gt;Router interfaces connecting two routers must have the same &lt;strong&gt;Area ID&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Type of area must be identical (&lt;strong&gt;normal&lt;/strong&gt; or &lt;strong&gt;stub area&lt;/strong&gt;)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Authentication password&lt;/strong&gt; (if used) must be identical&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Hello Parameters Mismatch&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If there’s a mismatch between some of the items (Hello/Dead interval, Subnetmask, Area ID etc), a &lt;strong&gt;Bouncing Relation&lt;/strong&gt; case occurs as this potential neighbor (R2) keeps flapping on the router’s OSPF topology, indicating a mismatch with the &lt;strong&gt;Hello message&lt;/strong&gt; information.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Note: &lt;strong&gt;Router ID&lt;/strong&gt; can be a name, a number or an IP address. By default, OSPF will choose the highest active interface’s IP address as the Router ID. In case the interface does down (e.g Ethernet interface begin disconnected), it can create problems with the OSPF process. For this reason, it is always recommended to either configure a suitable IP address on a &lt;strong&gt;Loopback interface&lt;/strong&gt; (virtual interface that is always ‘Up’) or manually configure the &lt;strong&gt;Router ID&lt;/strong&gt; to something suitable for the OSPF network.&lt;/p&gt;
&lt;h2&gt;Hello Parameters Match - Replying Hello messages&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When &lt;strong&gt;R2&lt;/strong&gt; receives the &lt;strong&gt;OSPF Hello message&lt;/strong&gt; from &lt;strong&gt;R1&lt;/strong&gt; and all necessary &lt;strong&gt;Hello&lt;/strong&gt; parameters match, &lt;strong&gt;R2&lt;/strong&gt; will send a &lt;strong&gt;Reply Hello packet&lt;/strong&gt; back to &lt;strong&gt;R1&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Reply Hello&lt;/strong&gt; allows the &lt;strong&gt;R1&lt;/strong&gt; (who sent the original &lt;strong&gt;Hello&lt;/strong&gt; message) to investigate if the neighboring router &lt;strong&gt;R2&lt;/strong&gt; is listed in its &lt;strong&gt;neighbor list&lt;/strong&gt; or not.&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;If the neighboring router &lt;strong&gt;R2&lt;/strong&gt; is listed as a neighbor already, then &lt;strong&gt;R1 resets&lt;/strong&gt; its &lt;strong&gt;dead timer&lt;/strong&gt; and the &lt;strong&gt;Reply Hello&lt;/strong&gt; messages act as a &lt;strong&gt;Keep Alive&lt;/strong&gt; mechanism.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;If the neighboring router &lt;strong&gt;R2&lt;/strong&gt; is not listed in &lt;strong&gt;R1’s&lt;/strong&gt; neighbor database, it will add the newly discovered neighbor &lt;strong&gt;R2&lt;/strong&gt; router to its OSPF neighbor database. All further &lt;strong&gt;OSPF Hello&lt;/strong&gt; and &lt;strong&gt;Hello Reply&lt;/strong&gt; messages will act as a &lt;strong&gt;Keep Alive&lt;/strong&gt; mechanism.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Establishing Master-Slave Relation&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When a neighbor relation is formed between two routers running OSPF, a hierarchy order of exchanging information must be established, which determines which router sends &lt;strong&gt;DataBase Descriptor&lt;/strong&gt; (&lt;strong&gt;DBD&lt;/strong&gt;) updates first (Master) while the other router (Slave) listens. Once the &lt;strong&gt;Master&lt;/strong&gt; sends the &lt;strong&gt;DBD packets&lt;/strong&gt;, the &lt;strong&gt;Slave&lt;/strong&gt; follows by sending its &lt;strong&gt;DataBase Descriptor&lt;/strong&gt; (&lt;strong&gt;DBD&lt;/strong&gt;) packets next.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;OSPF elects master router based on &lt;strong&gt;highest priority&lt;/strong&gt; -which can be configured manually-, however if priority is not configured, OSPF will use the router ID as a reference.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Note that the &lt;strong&gt;Designated Router&lt;/strong&gt; (&lt;strong&gt;DR&lt;/strong&gt;) is doesn’t have to be the master, it’s only a router priority based relation to arrange the exchanging data between neighbors but doesn’t affect the role of &lt;strong&gt;DR&lt;/strong&gt; &amp;amp; &lt;strong&gt;BDR&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;Exchanging DataBase Descriptor (DBD's) - DBD Acknowledgement &amp;amp; Review&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;OSPF neighbors follow a strict process of exchanging routing information and updates to prevent fault containment caused by updates flood, this process follows the order described below:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu-2.png&quot; alt=&quot;ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu-2&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;R1 sends a DBD Packet while R2 replies with a Link State Request (LSR)&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 2. Steps 1 &amp;amp; 2: R1 sends a DBD Packet while R2 replies with a Link State Request (LSR)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;1. Master sends &lt;strong&gt;DataBase Descriptor&lt;/strong&gt; (&lt;strong&gt;DBD&lt;/strong&gt;) update packet first.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;2. Slave checks &lt;strong&gt;DataBase Descriptor&lt;/strong&gt; (&lt;strong&gt;DBD&lt;/strong&gt;) and finds new routes information, it then requests updates by sending a &lt;strong&gt;Link State Request&lt;/strong&gt; (&lt;strong&gt;LSR&lt;/strong&gt;) packet.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu-3.png&quot; alt=&quot;R1 replies with a Link State Update (LSU) and R2 Acknowledges with a LSAck&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;R1 replies with a Link State Update (LSU) and R2 Acknowledges with a LSAck&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Figure 3. Steps 3 &amp;amp; 4. R1 replies with a Link State Update (LSU) and R2 Acknowledges with a LSAck&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;3. Master sends back updates through &lt;strong&gt;Link State Updates&lt;/strong&gt; (&lt;strong&gt;LSU&lt;/strong&gt;) packets.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;4. Slave acknowledges the reception of updates by sending a &lt;strong&gt;Link State Acknowledge&lt;/strong&gt; (&lt;strong&gt;LSAck&lt;/strong&gt;) packet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;5. Slave sends &lt;strong&gt;DataBase Descriptor&lt;/strong&gt; (&lt;strong&gt;DBD&lt;/strong&gt;) update packet next.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;6. Master requests updates by sending a &lt;strong&gt;Link State Request&lt;/strong&gt; (&lt;strong&gt;LSR&lt;/strong&gt;) packet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;7. Slave sends updates through the &lt;strong&gt;Link State Update&lt;/strong&gt; (&lt;strong&gt;LSU&lt;/strong&gt;) packets.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;8. Master acknowledges receiving updates by sending a &lt;strong&gt;Link State Acknowledge&lt;/strong&gt; (&lt;strong&gt;LSAck&lt;/strong&gt;) packet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are no diagrams showing steps 5 to 8, however these are similar to the first 4 steps, but with the Master router requesting the &lt;strong&gt;Link State Request &lt;/strong&gt;(&lt;strong&gt;LSR&lt;/strong&gt;).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article explained how &lt;strong&gt;OSPF&lt;/strong&gt; routers &lt;strong&gt;build neighbor relationships and adjacencies&lt;/strong&gt;. We saw the &lt;strong&gt;OSPF neighbor discovering process&lt;/strong&gt; via&lt;strong&gt; OSPF Hello packets&lt;/strong&gt; and the role of &lt;strong&gt;Link State Requests&lt;/strong&gt; (&lt;strong&gt;LSR&lt;/strong&gt;)&lt;strong&gt; and Link State Updates &lt;/strong&gt;(&lt;strong&gt;LSU&lt;/strong&gt;). We also examined the contents of OSPF Hello packets and which fields are necessary to ensure an OSPF adjacency is formed. Finally, we saw how OSPF routers exchange information and update their database via DataBase Descriptor (DBD) packets.&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ospf-part3-intro.webp&quot; alt=&quot;OSPF Adjacency &amp;amp; Neighbor Forming Process&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu-1a.jpg&quot; alt=&quot;ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu-1a&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;OSPF Adjacency &amp;amp; Neighbor Forming Process&quot; /&gt;This is the thrid article of our 6-part OSPF series (see below) that describes how &lt;strong&gt;OSPF routers&lt;/strong&gt; perform &lt;strong&gt;neighbor relationship and adjacency&lt;/strong&gt;. We’ll examine &lt;strong&gt;how OSPF discovers neighbors&lt;/strong&gt; by sending &lt;strong&gt;Hello packets&lt;/strong&gt; through the &lt;strong&gt;router interfaces&lt;/strong&gt; and how it shares &lt;strong&gt;Link State Advertisements&lt;/strong&gt; (&lt;strong&gt;LSAs&lt;/strong&gt;) to &lt;strong&gt;form adjacencies&lt;/strong&gt; and &lt;strong&gt;build its topology table&lt;/strong&gt;. We’ll also examine the &lt;strong&gt;contents of OSPF Hello packets&lt;/strong&gt; (&lt;strong&gt;Router ID&lt;/strong&gt;, &lt;strong&gt;Hello/Dead Intervals&lt;/strong&gt;, &lt;strong&gt;Subnet Mask&lt;/strong&gt;, &lt;strong&gt;Router Priority&lt;/strong&gt;, &lt;strong&gt;Area ID&lt;/strong&gt;, &lt;strong&gt;DB &amp;amp; BDR IP Address&lt;/strong&gt;, &lt;strong&gt;Authentication information&lt;/strong&gt;) and more.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Below is a complete list of articles covering our &lt;strong&gt;OSPF Series&lt;/strong&gt;:&lt;/p&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html&quot; target=&quot;_blank&quot; title=&quot;Part 1: Introduction, OSPF Packet Structure, OSPF Messages and Characteristics&quot;&gt;Part 1: Introduction, OSPF Packet Structure, OSPF Messages and Characteristics&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; title=&quot;Part 2: How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&quot;&gt;Part 2: How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- Part 3 (This article): OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU).&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-states-forming-process.html&quot; target=&quot;_blank&quot; title=&quot;Part 4: OSPF Neighbor States – OSPF Neighbor Forming Process&quot;&gt;Part 4: OSPF Neighbor States – OSPF Neighbor Forming Process&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html&quot; target=&quot;_blank&quot; title=&quot;Part 5: Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types&quot;&gt;Part 5: Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;-&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsa-types-explained.html&quot; target=&quot;_blank&quot; title=&quot;Part 6: OSPF LSA Types - Purpose and Function of Every OSPF LSA&quot;&gt;Part 6: OSPF LSA Types - Purpose and Function of Every OSPF LSA&lt;/a&gt;.&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;How OSPF Forms Neighbor Relations&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once OSPF is enabled on a router interface, a &lt;strong&gt;Link State Database&lt;/strong&gt; (&lt;strong&gt;LSD&lt;/strong&gt;) is established and all interfaces running OSPF are added to this table to be used in &lt;strong&gt;Link State Advertisements&lt;/strong&gt; (&lt;strong&gt;LSAs&lt;/strong&gt;), OSPF then the begins neighbor discovery and forming adjacency process.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We’ll now take a closer look at both, neighbor discover and adjacency forming process:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu-1.png&quot; alt=&quot;R1 sends an initial OSPF Hello packet. R2 responds with an OSPF Reply Hello packet.&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Router R1 sends an initial OSPF Hello packet. R2 responds with an OSPF Reply Hello packet.&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. R1 sends an initial OSPF Hello packet. R2 responds with an OSPF Reply Hello packet.&lt;/p&gt;
&lt;h2&gt;Sending &amp;amp; Receiving OSPF Hello Messages&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;center&quot;&gt;An OSPF router generates a Hello packet every poll interval -10 seconds for Peer-to-Peer (P2P) networks and 30 seconds for Non-Broadcast-Multiple-Access (NBMA) networks by default- and advertises it through multicast address 224.0.0.5 to all routers connected to its interfaces while it searches for potential OSPF neighbors. The Hello message contains a list of information needed to form an OSPF neighbor relation between two neighboring routers, the following a list of information contained the &lt;strong&gt;Hello messages&lt;/strong&gt;:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li&gt;&lt;strong&gt;OSPF Router ID&lt;/strong&gt;. The router’s ID which is configured or automatically selected by OSPF (analyzed below)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hello Interval Timer&lt;/strong&gt;. Frequency upon which Hello packets are sent.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Dead Interval Timer&lt;/strong&gt;. Defines how long we should wait for hello packets before we declare the neighbor dead.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Subnet Mask&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Router Priority&lt;/strong&gt;. Used to help determine the Designated Router (DR). Higher priority takes precedence. A configured Priority of 0 means the router will not become a DR or BDR.&lt;/li&gt;
&lt;li&gt;List of reachable OSPF neighbors in the network.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Area ID&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;DR &amp;amp; BDR’s&lt;/strong&gt; IP addresses (if exists)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Authentication Password&lt;/strong&gt; (if configured)&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once a neighbor router (R2) running OSPF receives the &lt;strong&gt;Hello message&lt;/strong&gt;, it runs a check on the above list.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The following conditions must be met for two routers to become neighbors:&lt;/p&gt;
&lt;ol style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;They must have the same &lt;strong&gt;IP network/subnet&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;The &lt;strong&gt;Hello&lt;/strong&gt; and &lt;strong&gt;Dead Interval timers&lt;/strong&gt; must be identical&lt;/li&gt;
&lt;li&gt;Router interfaces connecting two routers must have the same &lt;strong&gt;Area ID&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Type of area must be identical (&lt;strong&gt;normal&lt;/strong&gt; or &lt;strong&gt;stub area&lt;/strong&gt;)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Authentication password&lt;/strong&gt; (if used) must be identical&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Hello Parameters Mismatch&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If there’s a mismatch between some of the items (Hello/Dead interval, Subnetmask, Area ID etc), a &lt;strong&gt;Bouncing Relation&lt;/strong&gt; case occurs as this potential neighbor (R2) keeps flapping on the router’s OSPF topology, indicating a mismatch with the &lt;strong&gt;Hello message&lt;/strong&gt; information.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Note: &lt;strong&gt;Router ID&lt;/strong&gt; can be a name, a number or an IP address. By default, OSPF will choose the highest active interface’s IP address as the Router ID. In case the interface does down (e.g Ethernet interface begin disconnected), it can create problems with the OSPF process. For this reason, it is always recommended to either configure a suitable IP address on a &lt;strong&gt;Loopback interface&lt;/strong&gt; (virtual interface that is always ‘Up’) or manually configure the &lt;strong&gt;Router ID&lt;/strong&gt; to something suitable for the OSPF network.&lt;/p&gt;
&lt;h2&gt;Hello Parameters Match - Replying Hello messages&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When &lt;strong&gt;R2&lt;/strong&gt; receives the &lt;strong&gt;OSPF Hello message&lt;/strong&gt; from &lt;strong&gt;R1&lt;/strong&gt; and all necessary &lt;strong&gt;Hello&lt;/strong&gt; parameters match, &lt;strong&gt;R2&lt;/strong&gt; will send a &lt;strong&gt;Reply Hello packet&lt;/strong&gt; back to &lt;strong&gt;R1&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Reply Hello&lt;/strong&gt; allows the &lt;strong&gt;R1&lt;/strong&gt; (who sent the original &lt;strong&gt;Hello&lt;/strong&gt; message) to investigate if the neighboring router &lt;strong&gt;R2&lt;/strong&gt; is listed in its &lt;strong&gt;neighbor list&lt;/strong&gt; or not.&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;If the neighboring router &lt;strong&gt;R2&lt;/strong&gt; is listed as a neighbor already, then &lt;strong&gt;R1 resets&lt;/strong&gt; its &lt;strong&gt;dead timer&lt;/strong&gt; and the &lt;strong&gt;Reply Hello&lt;/strong&gt; messages act as a &lt;strong&gt;Keep Alive&lt;/strong&gt; mechanism.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;If the neighboring router &lt;strong&gt;R2&lt;/strong&gt; is not listed in &lt;strong&gt;R1’s&lt;/strong&gt; neighbor database, it will add the newly discovered neighbor &lt;strong&gt;R2&lt;/strong&gt; router to its OSPF neighbor database. All further &lt;strong&gt;OSPF Hello&lt;/strong&gt; and &lt;strong&gt;Hello Reply&lt;/strong&gt; messages will act as a &lt;strong&gt;Keep Alive&lt;/strong&gt; mechanism.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Establishing Master-Slave Relation&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When a neighbor relation is formed between two routers running OSPF, a hierarchy order of exchanging information must be established, which determines which router sends &lt;strong&gt;DataBase Descriptor&lt;/strong&gt; (&lt;strong&gt;DBD&lt;/strong&gt;) updates first (Master) while the other router (Slave) listens. Once the &lt;strong&gt;Master&lt;/strong&gt; sends the &lt;strong&gt;DBD packets&lt;/strong&gt;, the &lt;strong&gt;Slave&lt;/strong&gt; follows by sending its &lt;strong&gt;DataBase Descriptor&lt;/strong&gt; (&lt;strong&gt;DBD&lt;/strong&gt;) packets next.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;OSPF elects master router based on &lt;strong&gt;highest priority&lt;/strong&gt; -which can be configured manually-, however if priority is not configured, OSPF will use the router ID as a reference.&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Note that the &lt;strong&gt;Designated Router&lt;/strong&gt; (&lt;strong&gt;DR&lt;/strong&gt;) is doesn’t have to be the master, it’s only a router priority based relation to arrange the exchanging data between neighbors but doesn’t affect the role of &lt;strong&gt;DR&lt;/strong&gt; &amp;amp; &lt;strong&gt;BDR&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;Exchanging DataBase Descriptor (DBD's) - DBD Acknowledgement &amp;amp; Review&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;OSPF neighbors follow a strict process of exchanging routing information and updates to prevent fault containment caused by updates flood, this process follows the order described below:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu-2.png&quot; alt=&quot;ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu-2&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;R1 sends a DBD Packet while R2 replies with a Link State Request (LSR)&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 2. Steps 1 &amp;amp; 2: R1 sends a DBD Packet while R2 replies with a Link State Request (LSR)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;1. Master sends &lt;strong&gt;DataBase Descriptor&lt;/strong&gt; (&lt;strong&gt;DBD&lt;/strong&gt;) update packet first.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;2. Slave checks &lt;strong&gt;DataBase Descriptor&lt;/strong&gt; (&lt;strong&gt;DBD&lt;/strong&gt;) and finds new routes information, it then requests updates by sending a &lt;strong&gt;Link State Request&lt;/strong&gt; (&lt;strong&gt;LSR&lt;/strong&gt;) packet.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu-3.png&quot; alt=&quot;R1 replies with a Link State Update (LSU) and R2 Acknowledges with a LSAck&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;R1 replies with a Link State Update (LSU) and R2 Acknowledges with a LSAck&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Figure 3. Steps 3 &amp;amp; 4. R1 replies with a Link State Update (LSU) and R2 Acknowledges with a LSAck&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;3. Master sends back updates through &lt;strong&gt;Link State Updates&lt;/strong&gt; (&lt;strong&gt;LSU&lt;/strong&gt;) packets.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;4. Slave acknowledges the reception of updates by sending a &lt;strong&gt;Link State Acknowledge&lt;/strong&gt; (&lt;strong&gt;LSAck&lt;/strong&gt;) packet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;5. Slave sends &lt;strong&gt;DataBase Descriptor&lt;/strong&gt; (&lt;strong&gt;DBD&lt;/strong&gt;) update packet next.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;6. Master requests updates by sending a &lt;strong&gt;Link State Request&lt;/strong&gt; (&lt;strong&gt;LSR&lt;/strong&gt;) packet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;7. Slave sends updates through the &lt;strong&gt;Link State Update&lt;/strong&gt; (&lt;strong&gt;LSU&lt;/strong&gt;) packets.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;8. Master acknowledges receiving updates by sending a &lt;strong&gt;Link State Acknowledge&lt;/strong&gt; (&lt;strong&gt;LSAck&lt;/strong&gt;) packet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are no diagrams showing steps 5 to 8, however these are similar to the first 4 steps, but with the Master router requesting the &lt;strong&gt;Link State Request &lt;/strong&gt;(&lt;strong&gt;LSR&lt;/strong&gt;).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article explained how &lt;strong&gt;OSPF&lt;/strong&gt; routers &lt;strong&gt;build neighbor relationships and adjacencies&lt;/strong&gt;. We saw the &lt;strong&gt;OSPF neighbor discovering process&lt;/strong&gt; via&lt;strong&gt; OSPF Hello packets&lt;/strong&gt; and the role of &lt;strong&gt;Link State Requests&lt;/strong&gt; (&lt;strong&gt;LSR&lt;/strong&gt;)&lt;strong&gt; and Link State Updates &lt;/strong&gt;(&lt;strong&gt;LSU&lt;/strong&gt;). We also examined the contents of OSPF Hello packets and which fields are necessary to ensure an OSPF adjacency is formed. Finally, we saw how OSPF routers exchange information and update their database via DataBase Descriptor (DBD) packets.&lt;/p&gt;</content>
		<category term="Routing" />
	</entry>
	<entry>
		<title>OSPF - Part 2: How OSPF Protocol Works &amp; Basic Concepts: OSPF Neighbor, Topology &amp; Routing Table, OSPF Areas &amp; Router Roles, Theory &amp; Overview</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html"/>
		<published>2015-10-02T17:00:00+10:00</published>
		<updated>2015-10-02T17:00:00+10:00</updated>
		<id>https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ospf-part2-intro.webp&quot; alt=&quot;How OSPF Works - OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-part2-intro.webp&quot; alt=&quot;ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview &quot; width=&quot;320&quot; height=&quot;200&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;OSPF Concepts - ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview &quot; /&gt;This article covers &lt;strong&gt;basic OSPF concepts&lt;/strong&gt; and &lt;strong&gt;operation&lt;/strong&gt;. We explain &lt;strong&gt;how OSPF works&lt;/strong&gt;, &lt;strong&gt;how OSPF tables are built&lt;/strong&gt; on an &lt;strong&gt;OSPF-enabled router&lt;/strong&gt; and their &lt;strong&gt;purpose (Neighbour Table, Topology Table, Routing Table), OSPF areas&lt;/strong&gt; and their importance. Next we cover &lt;strong&gt;OSPF Link State Packet types&lt;/strong&gt; used to exchange data between OSPF routers: &lt;strong&gt;Link State Advertisement&lt;/strong&gt; (&lt;strong&gt;LSA&lt;/strong&gt;), &lt;strong&gt;Link State Database&lt;/strong&gt; (&lt;strong&gt;LSDB&lt;/strong&gt;), &lt;strong&gt;Link State Request&lt;/strong&gt; (&lt;strong&gt;LSR&lt;/strong&gt;), &lt;strong&gt;Link State Update&lt;/strong&gt; (&lt;strong&gt;LSU&lt;/strong&gt;) and &lt;strong&gt;Link State Acknowledgment&lt;/strong&gt; (&lt;strong&gt;LSAcK&lt;/strong&gt;).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finally, we take a look at the &lt;strong&gt;OSPF roles: Area Boarder Router (ABR), Autonomous System Boundary Router (ASBR), Designated Router (DR), Backup DR&lt;/strong&gt; and more.&lt;/p&gt;
&lt;p&gt;Below is a complete list of articles covering our &lt;strong&gt;OSPF Series&lt;/strong&gt;:&lt;/p&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html&quot; target=&quot;_blank&quot; title=&quot;Part 1: Introduction, OSPF Packet Structure, OSPF Messages and Characteristics&quot;&gt;Part 1: Introduction, OSPF Packet Structure, OSPF Messages and Characteristics&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- Part 2 (This article): How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu.html&quot; target=&quot;_blank&quot; title=&quot;Part 3: OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU)&quot;&gt;Part 3: OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU)&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-states-forming-process.html&quot; target=&quot;_blank&quot; title=&quot;Part 4: OSPF Neighbor States – OSPF Neighbor Forming Process&quot;&gt;Part 4: OSPF Neighbor States – OSPF Neighbor Forming Process&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html&quot; target=&quot;_blank&quot; title=&quot;Part 5: Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types&quot;&gt;Part 5: Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;-&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsa-types-explained.html&quot; target=&quot;_blank&quot; title=&quot;Part 6: OSPF LSA Types - Purpose and Function of Every OSPF LSA&quot;&gt;Part 6: OSPF LSA Types - Purpose and Function of Every OSPF LSA&lt;/a&gt;.&lt;/div&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;What Is OSPF &amp;amp; How Does It Work?&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;OSPF is a &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/link-state-routing.html&quot; target=&quot;_blank&quot; title=&quot;Link State protocol&quot;&gt;Link State protocol&lt;/a&gt; that’s considered may be the most famous protocol among the Interior Gateway Protocol (IGP) family, developed in the mid 1980’s by the OSPF working group of the IETF.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When configured, OSPF will listen to neighbors and gather all link state data available to build a topology map of all available paths in its network and then save the information in its topology&amp;nbsp; database, also known as its &lt;strong&gt;Link-State Database&lt;/strong&gt; (&lt;strong&gt;LSDB&lt;/strong&gt;). Using the information from its topology database. From the information gathered, it will calculate the best shortest path to each reachable subnet/network using an algorithm called &lt;strong&gt;Shortest Path First&lt;/strong&gt; (&lt;strong&gt;SFP&lt;/strong&gt;) that was developed by the computer scientist&lt;em&gt; Edsger W. Dijkstra&lt;/em&gt; in 1956. OSPF will then construct &lt;strong&gt;three tables&lt;/strong&gt; to store the following information:&lt;/p&gt;
&lt;ul&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Neighbor Table:&lt;/strong&gt; Contains all discovered OSPF neighbors&amp;nbsp; with whom routing information will be interchanged&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Topology Table:&lt;/strong&gt; Contains the entire road map of the network with all available OSPF routers and calculated best and alternative paths.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Routing Table:&lt;/strong&gt; Contain the current working best paths that will be used to forward data traffic between neighbors.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Understanding OSPF Areas&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;OSPF offers a very distinguishable feature named: &lt;strong&gt;Routing Areas&lt;/strong&gt;. It means dividing routers inside a single autonomous system running OSPF, into areas where each area consists of a group of connected routers.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The idea of dividing the OSPF network into areas is to simplify administration and optimize available resources. Resource optimization is especially important for large enterprise networks with a plethora of network and links.&amp;nbsp; Having many routers exchange the link state database could flood the network and reduce its efficiency – this was the need that led to the creation of concept Areas.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Areas are a logical collection of routers that carry the same &lt;strong&gt;Area ID&lt;/strong&gt; or number inside of an OSPF network, the OSPF network itself can contain multiple areas, the first and main Area is called the backbone area &lt;strong&gt;“Area 0”&lt;/strong&gt;, all other areas must connect to &lt;strong&gt;Area 0&lt;/strong&gt; as shown in the diagram below:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview1.png&quot; alt=&quot;ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview1&quot; style=&quot;margin: 0px; vertical-align: bottom;&quot; title=&quot;OSPF Areas, Area 0 (Backbone Area), ABR and ASBR OSPF routers&quot; /&gt;&lt;br /&gt;Figure 1. OSPF Areas, Area 0 (Backbone Area), ABR and ASBR OSPF routers&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;All routers within the same &lt;strong&gt;Area&lt;/strong&gt; have the &lt;strong&gt;same topology table&lt;/strong&gt; -&lt;strong&gt;Link State Database&lt;/strong&gt;- but different &lt;strong&gt;routing table&lt;/strong&gt; as OSPF calculates different best paths for each router depending on its location within the network topology while they will all share the same &lt;strong&gt;Link State topology&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The goal of having an &lt;strong&gt;Area&lt;/strong&gt; is to localize the network as follow:&lt;/p&gt;
&lt;ul&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Area boundaries&lt;/strong&gt; will give the opportunity of using&lt;strong&gt; summarization&lt;/strong&gt;, as it’s not possible to summarize network prefixes in normal link state protocols because routers are supposed to have the same map topology of the entire network coincide in all neighbors.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Area boundaries&lt;/strong&gt; will also help preventing fault containment by suppressing updates that take place when a change occurs in the network causing a flood of updates between routers. This also happens to be a weakness of link state protocols: When connecting large sized networks it is very difficult to avoid link state database floods.&lt;/li&gt;
&lt;/ul&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;With &lt;strong&gt;Area boundaries&lt;/strong&gt;, updates are kept only &lt;strong&gt;inside the same area&lt;/strong&gt;, while other areas remain completely unaware of the update.&lt;/p&gt;
&lt;h2&gt;OSPF Link State Packet Types&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;OSPF routers generate packets of information that are exchaged with neighboring routers. These packets are designed for several purposes such as forming neighbor relations between routers, calculating cost and best path for a specific route and more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The following is a list of the most frequently used OSPF packets:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Link State Advertisement (LSA)&lt;/strong&gt;: The primary mean of communication between OSPF routers, it's the packet that &lt;strong&gt;carries all fundamental information about the topology&lt;/strong&gt; and is flooded between areas to perform different functions, there are &lt;strong&gt;11 types of LSA packets&lt;/strong&gt; that will be covred in great depth in future OSPF articles here on Firewall.cx&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Link State DataBase (LSDB)&lt;/strong&gt;: &lt;strong&gt;LSDB&lt;/strong&gt; packet contains all updated link-state information exchanged among the network, and all routers within the same area have i&lt;strong&gt;dentical LSDB&lt;/strong&gt;, and when two routers form new neighbor adjacency, they sync their &lt;strong&gt;LSDB&lt;/strong&gt; to be &lt;strong&gt;fully adjacent&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Link State Request (LSR)&lt;/strong&gt;: Once neighbor adjacency is formed and &lt;strong&gt;LSDB&lt;/strong&gt; is exchanged, neighbor routers may locate a missing LSDB information, they then send a request packet to claim the missing piece, neighbors receive this packet and respond with &lt;strong&gt;LSU&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Link State Update (LSU)&lt;/strong&gt;: A response packet sends a specific piece of &lt;strong&gt;LSDB&lt;/strong&gt; information requested by an OSPF neighbor via &lt;strong&gt;LSR&lt;/strong&gt; packet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Link State Acknowledgment (LSAcK)&lt;/strong&gt;: The router that sends the &lt;strong&gt;LSR&lt;/strong&gt; packet confirms receiving the &lt;strong&gt;LSU&lt;/strong&gt; from neighbor by sending a confirmation packet acknowledging receiving the requested &lt;strong&gt;LSUs&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;Working Inside Of A Single Area&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Working inside of an Area is hierarchically organized among routers that share this area and are categorized as:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Area Boarder Routers (ABR):&lt;/strong&gt;&lt;br /&gt;Routers located on the borders of each &lt;strong&gt;Area&lt;/strong&gt; connect to more than one OSPF area, are called &lt;strong&gt;ABR Routers.&lt;/strong&gt; &lt;strong&gt;ABR Routers&lt;/strong&gt; are responsible for &lt;strong&gt;summarizing IP addresses&lt;/strong&gt; of each area and &lt;strong&gt;suppressing updates&lt;/strong&gt; among areas to prevent fault containment.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Autonomous System Boundary Router (ASBR):&lt;/strong&gt;&lt;br /&gt;An &lt;strong&gt;ASBR&lt;/strong&gt; is a router that has interfaces connected to one or more OSPF areas, similarly as the &lt;strong&gt;ABR&lt;/strong&gt;, however the difference with an &lt;strong&gt;ASBR&lt;/strong&gt; is that it also connects to &lt;strong&gt;other routing systems&lt;/strong&gt; such as &lt;strong&gt;BGP&lt;/strong&gt;, &lt;strong&gt;EIGRP&lt;/strong&gt;, &lt;strong&gt;Internet&lt;/strong&gt; and others. An &lt;strong&gt;ASBR&lt;/strong&gt; router normally advertises routes from other routing systems&lt;strong&gt; into the OSPF area&lt;/strong&gt; to which it belongs.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Designated Router (DR):&lt;/strong&gt;&lt;br /&gt;A &lt;strong&gt;Designated Router&lt;/strong&gt; is elected by the routers on multi-access segments (e.g Local Area Network), based on its priority (Router ID, priority). The &lt;strong&gt;DR&lt;/strong&gt; router performs special functions such as generating &lt;strong&gt;Link State Advertisements&lt;/strong&gt; (&lt;strong&gt;LSAs&lt;/strong&gt;) and exchanging information with all other routers in the same &lt;strong&gt;Area&lt;/strong&gt;.&amp;nbsp; Every router in the same &lt;strong&gt;Area&lt;/strong&gt; will create an adjacency with the &lt;strong&gt;DR&lt;/strong&gt; and &lt;strong&gt;BDR&lt;/strong&gt; (analysed below).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The DR sends updates to all &lt;strong&gt;Area&lt;/strong&gt; routers using the &lt;strong&gt;Multicast address 224.0.0.5&lt;/strong&gt;. All OSPF routers except the &lt;strong&gt;DR&lt;/strong&gt; use &lt;strong&gt;Multicast address 224.0.0.6&lt;/strong&gt; to send &lt;strong&gt;Link State Update&lt;/strong&gt; (&lt;strong&gt;LSU&lt;/strong&gt;) and &lt;strong&gt;Link State Advertisements &lt;/strong&gt;(&lt;strong&gt;LSAs&lt;/strong&gt;) packets to the &lt;strong&gt;DR&lt;/strong&gt;. &amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Backup Designated Router (BDR):&lt;/strong&gt;&lt;br /&gt;The &lt;strong&gt;BDR&lt;/strong&gt; is a router that becomes the &lt;strong&gt;DR&lt;/strong&gt; should the existing &lt;strong&gt;DR&lt;/strong&gt; fail. The BDR has the second highest priority (the DR having the highest priority) in the OSPF network. When the &lt;strong&gt;BDR&lt;/strong&gt; becomes a &lt;strong&gt;DR&lt;/strong&gt;, a new election is made to find a new &lt;strong&gt;BDR&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article introduced the OSPF protocol and examined &lt;strong&gt;how OSPF works&lt;/strong&gt;. We covered important &lt;strong&gt;OSPF concepts&lt;/strong&gt; such as &lt;strong&gt;OSPF areas&lt;/strong&gt;, &lt;strong&gt;OSPF Neighbour Table&lt;/strong&gt;, &lt;strong&gt;Topology Table&lt;/strong&gt; and &lt;strong&gt;Routing Table&lt;/strong&gt;, plus &lt;strong&gt;OSPF Link State packet types&lt;/strong&gt; (&lt;strong&gt;LSA&lt;/strong&gt;, &lt;strong&gt;LSDB&lt;/strong&gt;, &lt;strong&gt;LSR&lt;/strong&gt;, &lt;strong&gt;LSU&lt;/strong&gt; &amp;amp; &lt;strong&gt;LSAcK&lt;/strong&gt;). To complete our introduction, we analysed the &lt;strong&gt;OSPF roles&lt;/strong&gt; &lt;strong&gt;Area Boarder Router (ABR), Autonomous System Boundary Router (ASBR), Designated Router (DR), Backup DR.&lt;/strong&gt;&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ospf-part2-intro.webp&quot; alt=&quot;How OSPF Works - OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-part2-intro.webp&quot; alt=&quot;ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview &quot; width=&quot;320&quot; height=&quot;200&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;OSPF Concepts - ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview &quot; /&gt;This article covers &lt;strong&gt;basic OSPF concepts&lt;/strong&gt; and &lt;strong&gt;operation&lt;/strong&gt;. We explain &lt;strong&gt;how OSPF works&lt;/strong&gt;, &lt;strong&gt;how OSPF tables are built&lt;/strong&gt; on an &lt;strong&gt;OSPF-enabled router&lt;/strong&gt; and their &lt;strong&gt;purpose (Neighbour Table, Topology Table, Routing Table), OSPF areas&lt;/strong&gt; and their importance. Next we cover &lt;strong&gt;OSPF Link State Packet types&lt;/strong&gt; used to exchange data between OSPF routers: &lt;strong&gt;Link State Advertisement&lt;/strong&gt; (&lt;strong&gt;LSA&lt;/strong&gt;), &lt;strong&gt;Link State Database&lt;/strong&gt; (&lt;strong&gt;LSDB&lt;/strong&gt;), &lt;strong&gt;Link State Request&lt;/strong&gt; (&lt;strong&gt;LSR&lt;/strong&gt;), &lt;strong&gt;Link State Update&lt;/strong&gt; (&lt;strong&gt;LSU&lt;/strong&gt;) and &lt;strong&gt;Link State Acknowledgment&lt;/strong&gt; (&lt;strong&gt;LSAcK&lt;/strong&gt;).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finally, we take a look at the &lt;strong&gt;OSPF roles: Area Boarder Router (ABR), Autonomous System Boundary Router (ASBR), Designated Router (DR), Backup DR&lt;/strong&gt; and more.&lt;/p&gt;
&lt;p&gt;Below is a complete list of articles covering our &lt;strong&gt;OSPF Series&lt;/strong&gt;:&lt;/p&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html&quot; target=&quot;_blank&quot; title=&quot;Part 1: Introduction, OSPF Packet Structure, OSPF Messages and Characteristics&quot;&gt;Part 1: Introduction, OSPF Packet Structure, OSPF Messages and Characteristics&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- Part 2 (This article): How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu.html&quot; target=&quot;_blank&quot; title=&quot;Part 3: OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU)&quot;&gt;Part 3: OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU)&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-states-forming-process.html&quot; target=&quot;_blank&quot; title=&quot;Part 4: OSPF Neighbor States – OSPF Neighbor Forming Process&quot;&gt;Part 4: OSPF Neighbor States – OSPF Neighbor Forming Process&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html&quot; target=&quot;_blank&quot; title=&quot;Part 5: Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types&quot;&gt;Part 5: Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;-&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsa-types-explained.html&quot; target=&quot;_blank&quot; title=&quot;Part 6: OSPF LSA Types - Purpose and Function of Every OSPF LSA&quot;&gt;Part 6: OSPF LSA Types - Purpose and Function of Every OSPF LSA&lt;/a&gt;.&lt;/div&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;What Is OSPF &amp;amp; How Does It Work?&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;OSPF is a &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/link-state-routing.html&quot; target=&quot;_blank&quot; title=&quot;Link State protocol&quot;&gt;Link State protocol&lt;/a&gt; that’s considered may be the most famous protocol among the Interior Gateway Protocol (IGP) family, developed in the mid 1980’s by the OSPF working group of the IETF.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When configured, OSPF will listen to neighbors and gather all link state data available to build a topology map of all available paths in its network and then save the information in its topology&amp;nbsp; database, also known as its &lt;strong&gt;Link-State Database&lt;/strong&gt; (&lt;strong&gt;LSDB&lt;/strong&gt;). Using the information from its topology database. From the information gathered, it will calculate the best shortest path to each reachable subnet/network using an algorithm called &lt;strong&gt;Shortest Path First&lt;/strong&gt; (&lt;strong&gt;SFP&lt;/strong&gt;) that was developed by the computer scientist&lt;em&gt; Edsger W. Dijkstra&lt;/em&gt; in 1956. OSPF will then construct &lt;strong&gt;three tables&lt;/strong&gt; to store the following information:&lt;/p&gt;
&lt;ul&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Neighbor Table:&lt;/strong&gt; Contains all discovered OSPF neighbors&amp;nbsp; with whom routing information will be interchanged&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Topology Table:&lt;/strong&gt; Contains the entire road map of the network with all available OSPF routers and calculated best and alternative paths.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Routing Table:&lt;/strong&gt; Contain the current working best paths that will be used to forward data traffic between neighbors.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Understanding OSPF Areas&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;OSPF offers a very distinguishable feature named: &lt;strong&gt;Routing Areas&lt;/strong&gt;. It means dividing routers inside a single autonomous system running OSPF, into areas where each area consists of a group of connected routers.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The idea of dividing the OSPF network into areas is to simplify administration and optimize available resources. Resource optimization is especially important for large enterprise networks with a plethora of network and links.&amp;nbsp; Having many routers exchange the link state database could flood the network and reduce its efficiency – this was the need that led to the creation of concept Areas.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Areas are a logical collection of routers that carry the same &lt;strong&gt;Area ID&lt;/strong&gt; or number inside of an OSPF network, the OSPF network itself can contain multiple areas, the first and main Area is called the backbone area &lt;strong&gt;“Area 0”&lt;/strong&gt;, all other areas must connect to &lt;strong&gt;Area 0&lt;/strong&gt; as shown in the diagram below:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview1.png&quot; alt=&quot;ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview1&quot; style=&quot;margin: 0px; vertical-align: bottom;&quot; title=&quot;OSPF Areas, Area 0 (Backbone Area), ABR and ASBR OSPF routers&quot; /&gt;&lt;br /&gt;Figure 1. OSPF Areas, Area 0 (Backbone Area), ABR and ASBR OSPF routers&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;All routers within the same &lt;strong&gt;Area&lt;/strong&gt; have the &lt;strong&gt;same topology table&lt;/strong&gt; -&lt;strong&gt;Link State Database&lt;/strong&gt;- but different &lt;strong&gt;routing table&lt;/strong&gt; as OSPF calculates different best paths for each router depending on its location within the network topology while they will all share the same &lt;strong&gt;Link State topology&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The goal of having an &lt;strong&gt;Area&lt;/strong&gt; is to localize the network as follow:&lt;/p&gt;
&lt;ul&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Area boundaries&lt;/strong&gt; will give the opportunity of using&lt;strong&gt; summarization&lt;/strong&gt;, as it’s not possible to summarize network prefixes in normal link state protocols because routers are supposed to have the same map topology of the entire network coincide in all neighbors.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Area boundaries&lt;/strong&gt; will also help preventing fault containment by suppressing updates that take place when a change occurs in the network causing a flood of updates between routers. This also happens to be a weakness of link state protocols: When connecting large sized networks it is very difficult to avoid link state database floods.&lt;/li&gt;
&lt;/ul&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;With &lt;strong&gt;Area boundaries&lt;/strong&gt;, updates are kept only &lt;strong&gt;inside the same area&lt;/strong&gt;, while other areas remain completely unaware of the update.&lt;/p&gt;
&lt;h2&gt;OSPF Link State Packet Types&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;OSPF routers generate packets of information that are exchaged with neighboring routers. These packets are designed for several purposes such as forming neighbor relations between routers, calculating cost and best path for a specific route and more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The following is a list of the most frequently used OSPF packets:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Link State Advertisement (LSA)&lt;/strong&gt;: The primary mean of communication between OSPF routers, it's the packet that &lt;strong&gt;carries all fundamental information about the topology&lt;/strong&gt; and is flooded between areas to perform different functions, there are &lt;strong&gt;11 types of LSA packets&lt;/strong&gt; that will be covred in great depth in future OSPF articles here on Firewall.cx&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Link State DataBase (LSDB)&lt;/strong&gt;: &lt;strong&gt;LSDB&lt;/strong&gt; packet contains all updated link-state information exchanged among the network, and all routers within the same area have i&lt;strong&gt;dentical LSDB&lt;/strong&gt;, and when two routers form new neighbor adjacency, they sync their &lt;strong&gt;LSDB&lt;/strong&gt; to be &lt;strong&gt;fully adjacent&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Link State Request (LSR)&lt;/strong&gt;: Once neighbor adjacency is formed and &lt;strong&gt;LSDB&lt;/strong&gt; is exchanged, neighbor routers may locate a missing LSDB information, they then send a request packet to claim the missing piece, neighbors receive this packet and respond with &lt;strong&gt;LSU&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Link State Update (LSU)&lt;/strong&gt;: A response packet sends a specific piece of &lt;strong&gt;LSDB&lt;/strong&gt; information requested by an OSPF neighbor via &lt;strong&gt;LSR&lt;/strong&gt; packet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Link State Acknowledgment (LSAcK)&lt;/strong&gt;: The router that sends the &lt;strong&gt;LSR&lt;/strong&gt; packet confirms receiving the &lt;strong&gt;LSU&lt;/strong&gt; from neighbor by sending a confirmation packet acknowledging receiving the requested &lt;strong&gt;LSUs&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;Working Inside Of A Single Area&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Working inside of an Area is hierarchically organized among routers that share this area and are categorized as:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Area Boarder Routers (ABR):&lt;/strong&gt;&lt;br /&gt;Routers located on the borders of each &lt;strong&gt;Area&lt;/strong&gt; connect to more than one OSPF area, are called &lt;strong&gt;ABR Routers.&lt;/strong&gt; &lt;strong&gt;ABR Routers&lt;/strong&gt; are responsible for &lt;strong&gt;summarizing IP addresses&lt;/strong&gt; of each area and &lt;strong&gt;suppressing updates&lt;/strong&gt; among areas to prevent fault containment.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Autonomous System Boundary Router (ASBR):&lt;/strong&gt;&lt;br /&gt;An &lt;strong&gt;ASBR&lt;/strong&gt; is a router that has interfaces connected to one or more OSPF areas, similarly as the &lt;strong&gt;ABR&lt;/strong&gt;, however the difference with an &lt;strong&gt;ASBR&lt;/strong&gt; is that it also connects to &lt;strong&gt;other routing systems&lt;/strong&gt; such as &lt;strong&gt;BGP&lt;/strong&gt;, &lt;strong&gt;EIGRP&lt;/strong&gt;, &lt;strong&gt;Internet&lt;/strong&gt; and others. An &lt;strong&gt;ASBR&lt;/strong&gt; router normally advertises routes from other routing systems&lt;strong&gt; into the OSPF area&lt;/strong&gt; to which it belongs.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Designated Router (DR):&lt;/strong&gt;&lt;br /&gt;A &lt;strong&gt;Designated Router&lt;/strong&gt; is elected by the routers on multi-access segments (e.g Local Area Network), based on its priority (Router ID, priority). The &lt;strong&gt;DR&lt;/strong&gt; router performs special functions such as generating &lt;strong&gt;Link State Advertisements&lt;/strong&gt; (&lt;strong&gt;LSAs&lt;/strong&gt;) and exchanging information with all other routers in the same &lt;strong&gt;Area&lt;/strong&gt;.&amp;nbsp; Every router in the same &lt;strong&gt;Area&lt;/strong&gt; will create an adjacency with the &lt;strong&gt;DR&lt;/strong&gt; and &lt;strong&gt;BDR&lt;/strong&gt; (analysed below).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The DR sends updates to all &lt;strong&gt;Area&lt;/strong&gt; routers using the &lt;strong&gt;Multicast address 224.0.0.5&lt;/strong&gt;. All OSPF routers except the &lt;strong&gt;DR&lt;/strong&gt; use &lt;strong&gt;Multicast address 224.0.0.6&lt;/strong&gt; to send &lt;strong&gt;Link State Update&lt;/strong&gt; (&lt;strong&gt;LSU&lt;/strong&gt;) and &lt;strong&gt;Link State Advertisements &lt;/strong&gt;(&lt;strong&gt;LSAs&lt;/strong&gt;) packets to the &lt;strong&gt;DR&lt;/strong&gt;. &amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Backup Designated Router (BDR):&lt;/strong&gt;&lt;br /&gt;The &lt;strong&gt;BDR&lt;/strong&gt; is a router that becomes the &lt;strong&gt;DR&lt;/strong&gt; should the existing &lt;strong&gt;DR&lt;/strong&gt; fail. The BDR has the second highest priority (the DR having the highest priority) in the OSPF network. When the &lt;strong&gt;BDR&lt;/strong&gt; becomes a &lt;strong&gt;DR&lt;/strong&gt;, a new election is made to find a new &lt;strong&gt;BDR&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article introduced the OSPF protocol and examined &lt;strong&gt;how OSPF works&lt;/strong&gt;. We covered important &lt;strong&gt;OSPF concepts&lt;/strong&gt; such as &lt;strong&gt;OSPF areas&lt;/strong&gt;, &lt;strong&gt;OSPF Neighbour Table&lt;/strong&gt;, &lt;strong&gt;Topology Table&lt;/strong&gt; and &lt;strong&gt;Routing Table&lt;/strong&gt;, plus &lt;strong&gt;OSPF Link State packet types&lt;/strong&gt; (&lt;strong&gt;LSA&lt;/strong&gt;, &lt;strong&gt;LSDB&lt;/strong&gt;, &lt;strong&gt;LSR&lt;/strong&gt;, &lt;strong&gt;LSU&lt;/strong&gt; &amp;amp; &lt;strong&gt;LSAcK&lt;/strong&gt;). To complete our introduction, we analysed the &lt;strong&gt;OSPF roles&lt;/strong&gt; &lt;strong&gt;Area Boarder Router (ABR), Autonomous System Boundary Router (ASBR), Designated Router (DR), Backup DR.&lt;/strong&gt;&lt;/p&gt;</content>
		<category term="Routing" />
	</entry>
	<entry>
		<title>Introduction to Routing Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/routing-protocols/introduction-to-routing-protocols.html"/>
		<published>2011-05-30T00:32:23+10:00</published>
		<updated>2011-05-30T00:32:23+10:00</updated>
		<id>https://www.firewall.cx/networking/routing-protocols/introduction-to-routing-protocols.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/introduction-to-routing-protocols-intro.webp&quot; alt=&quot;Introduction to Routing Protocols&quot;&gt;&lt;/p&gt;&lt;div class=&quot;description&quot;&gt;
&lt;h2&gt;Distance Vector, Link State RIP, IGRP, EIGRP, OSPF&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Routing protocols were created for routers. These protocols have been designed to allow the exchange of routing tables, or known networks, between routers. There are a lot of different routing protocols, each one designed for specific network sizes, so I am not going to be able to mention and analyse them all, but I will focus on the most popular.&lt;/p&gt;
&lt;h2&gt;The Two Main Types of Routing: Static Routing &amp;amp; Dynamic Routing&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The router learns about remote networks from neighbor routers or from an administrator. The router then builds a routing table, the creation of which I will explain in detail, that describes how to find the remote networks. If the network is directly connected then the router already knows how to get to the network. If the networks are not attached, the router must learn how to get to the remote network with either static routing (administrator manualy enters the routes in the router's table) or dynamic routing (happens automaticlly using routing protocols).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The routers then update each other about all the networks they know. If a change occurs e.g a router goes down, the dynamic routing protocols automatically inform all routers about the change. If static routing is used, then the administrator has to update all changes into all routers and therefore no routing protocol is used.&lt;/p&gt;
&lt;p&gt;Only Dynamic routing uses routing protocols, which enable routers to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Dynamically discover and maintain routes&lt;/li&gt;
&lt;li&gt;Calculate routes&lt;/li&gt;
&lt;li&gt;Distribute routing updates to other routers&lt;/li&gt;
&lt;li&gt;Reach agreement with other routers about the network topology&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Statically programmed routers are unable to discover routes, or send routing information to other routers. They send data over routes defined by the network Administrator.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A Stub network is so called because it is a dead end in the network. There is only one route in and one route out and, because of this, they can be reached using static routing, thus saving valuable bandwidth.&lt;/p&gt;
&lt;h2&gt;Dynamic Routing Protocols&lt;/h2&gt;
&lt;p&gt;There are 3 types of Dynamic routing protocols, these differ mainly in the way that they discover and make calculations about routes:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/distance-vector.html&quot; target=&quot;_blank&quot; title=&quot;Distance Vector Routing Protocols&quot;&gt;Distance Vector&lt;/a&gt; routing protocols. Distance Vector routers compute the best path from information passed to them from neighbors&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/link-state-routing.html&quot; target=&quot;_blank&quot; title=&quot;Link State Routing Protocols&quot;&gt;Link State&lt;/a&gt; routing protocols. Link State routers each have a copy of the entire network map and compute best routes from this local map&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/hybrid-routing.html&quot; target=&quot;_blank&quot; title=&quot;Hybrid Routing Protocols&quot;&gt;Hybrid&lt;/a&gt; routing protocols. A combination of Distance Vector &amp;amp; Link State protocols.&lt;/li&gt;
&lt;/ol&gt;
&lt;p align=&quot;left&quot;&gt;The table below shows the main characteristics of a few different types of dynamic routing protocols:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/routing-protocols-1.gif&quot; alt=&quot;routing-protocols-1&quot; usemap=&quot;#Map&quot; width=&quot;624&quot; height=&quot;207&quot; /&gt;&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;You can also clasify the routing protocols in terms of their location on a network. For example, routing protocols can exist in, or between, autonomous systems.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;Exterior Gateway Protocols (EGP's) are found between autonomous systems, whereas &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-igrp.html&quot; target=&quot;_blank&quot; title=&quot;Interior Gateway Protocols (IGP's)&quot;&gt;Interior Gateway Protocols (IGP's)&lt;/a&gt; are found within autonomous systems:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/routing-protocols-2.gif&quot; alt=&quot;routing-protocols-2&quot; width=&quot;553&quot; height=&quot;283&quot; /&gt;&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;Example of an &lt;strong&gt;EGP&lt;/strong&gt; is the &lt;strong&gt;Border Gateway Protocol&lt;/strong&gt; (&lt;strong&gt;BGP&lt;/strong&gt;) which is also used amongst the Internet routers, whereas examples of &lt;strong&gt;IGP&lt;/strong&gt; protocols are &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-rip.html&quot; target=&quot;_blank&quot; title=&quot;RIP&quot;&gt;RIP&lt;/a&gt;, &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-igrp.html&quot; target=&quot;_blank&quot; title=&quot;IGRP&quot;&gt;IGRP&lt;/a&gt;, &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocols-eigrp.html&quot; target=&quot;_self&quot; title=&quot;EIGRP&quot;&gt;EIGRP&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/introduction-to-routing-protocols-intro.webp&quot; alt=&quot;Introduction to Routing Protocols&quot;&gt;&lt;/p&gt;&lt;div class=&quot;description&quot;&gt;
&lt;h2&gt;Distance Vector, Link State RIP, IGRP, EIGRP, OSPF&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Routing protocols were created for routers. These protocols have been designed to allow the exchange of routing tables, or known networks, between routers. There are a lot of different routing protocols, each one designed for specific network sizes, so I am not going to be able to mention and analyse them all, but I will focus on the most popular.&lt;/p&gt;
&lt;h2&gt;The Two Main Types of Routing: Static Routing &amp;amp; Dynamic Routing&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The router learns about remote networks from neighbor routers or from an administrator. The router then builds a routing table, the creation of which I will explain in detail, that describes how to find the remote networks. If the network is directly connected then the router already knows how to get to the network. If the networks are not attached, the router must learn how to get to the remote network with either static routing (administrator manualy enters the routes in the router's table) or dynamic routing (happens automaticlly using routing protocols).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The routers then update each other about all the networks they know. If a change occurs e.g a router goes down, the dynamic routing protocols automatically inform all routers about the change. If static routing is used, then the administrator has to update all changes into all routers and therefore no routing protocol is used.&lt;/p&gt;
&lt;p&gt;Only Dynamic routing uses routing protocols, which enable routers to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Dynamically discover and maintain routes&lt;/li&gt;
&lt;li&gt;Calculate routes&lt;/li&gt;
&lt;li&gt;Distribute routing updates to other routers&lt;/li&gt;
&lt;li&gt;Reach agreement with other routers about the network topology&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Statically programmed routers are unable to discover routes, or send routing information to other routers. They send data over routes defined by the network Administrator.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A Stub network is so called because it is a dead end in the network. There is only one route in and one route out and, because of this, they can be reached using static routing, thus saving valuable bandwidth.&lt;/p&gt;
&lt;h2&gt;Dynamic Routing Protocols&lt;/h2&gt;
&lt;p&gt;There are 3 types of Dynamic routing protocols, these differ mainly in the way that they discover and make calculations about routes:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/distance-vector.html&quot; target=&quot;_blank&quot; title=&quot;Distance Vector Routing Protocols&quot;&gt;Distance Vector&lt;/a&gt; routing protocols. Distance Vector routers compute the best path from information passed to them from neighbors&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/link-state-routing.html&quot; target=&quot;_blank&quot; title=&quot;Link State Routing Protocols&quot;&gt;Link State&lt;/a&gt; routing protocols. Link State routers each have a copy of the entire network map and compute best routes from this local map&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/hybrid-routing.html&quot; target=&quot;_blank&quot; title=&quot;Hybrid Routing Protocols&quot;&gt;Hybrid&lt;/a&gt; routing protocols. A combination of Distance Vector &amp;amp; Link State protocols.&lt;/li&gt;
&lt;/ol&gt;
&lt;p align=&quot;left&quot;&gt;The table below shows the main characteristics of a few different types of dynamic routing protocols:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/routing-protocols-1.gif&quot; alt=&quot;routing-protocols-1&quot; usemap=&quot;#Map&quot; width=&quot;624&quot; height=&quot;207&quot; /&gt;&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;You can also clasify the routing protocols in terms of their location on a network. For example, routing protocols can exist in, or between, autonomous systems.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;Exterior Gateway Protocols (EGP's) are found between autonomous systems, whereas &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-igrp.html&quot; target=&quot;_blank&quot; title=&quot;Interior Gateway Protocols (IGP's)&quot;&gt;Interior Gateway Protocols (IGP's)&lt;/a&gt; are found within autonomous systems:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/routing-protocols-2.gif&quot; alt=&quot;routing-protocols-2&quot; width=&quot;553&quot; height=&quot;283&quot; /&gt;&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;Example of an &lt;strong&gt;EGP&lt;/strong&gt; is the &lt;strong&gt;Border Gateway Protocol&lt;/strong&gt; (&lt;strong&gt;BGP&lt;/strong&gt;) which is also used amongst the Internet routers, whereas examples of &lt;strong&gt;IGP&lt;/strong&gt; protocols are &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-rip.html&quot; target=&quot;_blank&quot; title=&quot;RIP&quot;&gt;RIP&lt;/a&gt;, &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-igrp.html&quot; target=&quot;_blank&quot; title=&quot;IGRP&quot;&gt;IGRP&lt;/a&gt;, &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocols-eigrp.html&quot; target=&quot;_self&quot; title=&quot;EIGRP&quot;&gt;EIGRP&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;</content>
		<category term="Routing" />
	</entry>
	<entry>
		<title>Enhanced Interior Gateway Routing Protocol - EIGRP</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/routing-protocols/routing-protocols-eigrp.html"/>
		<published>2011-05-26T08:48:14+10:00</published>
		<updated>2011-05-26T08:48:14+10:00</updated>
		<id>https://www.firewall.cx/networking/routing-protocols/routing-protocols-eigrp.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/eigrp-intro.webp&quot; alt=&quot;Enhanced Interior Gateway Routing Protocol - EIGRP&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Enhanced Interior Gateway Routing Protocol&lt;/strong&gt; (&lt;strong&gt;EIGRP&lt;/strong&gt;), similar to &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-igrp.html&quot; target=&quot;_blank&quot; title=&quot;IGRP&quot;&gt;IGRP&lt;/a&gt;, is a Cisco proprietary routing protocol that is used to exchange routing information between different routers within a network. &lt;strong&gt;EIGRP&lt;/strong&gt; is an &lt;strong&gt;advanced routing protocol&lt;/strong&gt; that combines the features of both &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/distance-vector.html&quot; target=&quot;_blank&quot; title=&quot;distance vector&quot;&gt;distance vector&lt;/a&gt; and &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/link-state-routing.html&quot; target=&quot;_blank&quot; title=&quot;link-state&quot;&gt;link-state&lt;/a&gt; routing protocols. This protocol is used to provide faster convergence times and improved scalability. &lt;strong&gt;EIGRP&lt;/strong&gt; uses a &lt;strong&gt;composite metric&lt;/strong&gt; composed of &lt;strong&gt;Bandwidth&lt;/strong&gt;, &lt;strong&gt;Delay&lt;/strong&gt;, &lt;strong&gt;Reliability&lt;/strong&gt;, and &lt;strong&gt;Loading&lt;/strong&gt; to determine the &lt;strong&gt;best path&lt;/strong&gt; between two locations.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;Article Key Topics:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#eigrp-key-points&quot;&gt;Key Points of EIGRP&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#eigrp-dual&quot;&gt;Diffusing Update Algorithm (DUAL)&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#eigrp-and-multicast&quot;&gt;EIGRP and Multicast&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#classless-operation&quot;&gt;Classless Operation&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#eigrp-limitations&quot;&gt;EIGRP Limitations&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;&lt;a href=&quot;https://www.firewall.cx/#eigrp-disadvantages&quot;&gt;EIGRP Disadvantages&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot;&gt;Summary&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a id=&quot;eigrp-key-points&quot;&gt;Key Points of EIGRP&lt;/a&gt;&lt;/h2&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Fast convergence times&lt;/strong&gt;: EIGRP has a fast convergence time, which means that it can quickly adapt to changes in the network topology.&lt;/p&gt;
&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;
&lt;p&gt;&lt;strong&gt;Loop-free paths&lt;/strong&gt;: EIGRP provides loop-free paths. This helps prevent routing loops and ensures the integrity and convergence stability of the network.&lt;/p&gt;
&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;
&lt;p&gt;&lt;strong&gt;Support for VLSM&lt;/strong&gt;: EIGRP supports variable length subnet masks (VLSM), therefore allowing for more efficient use of IP address space.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Scalability&lt;/strong&gt;: EIGRP can scale to support almost any size network but is usually found in small to large networks.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a id=&quot;eigrp-dual&quot;&gt;Diffusing Update Algorithm (DUAL)&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Diffusing Update Algorithm&lt;/strong&gt; (&lt;strong&gt;DUAL&lt;/strong&gt;) is the core of EIGRP's operation. DUAL is responsible for calculating the shortest path to a network destination and for selecting the best path among multiple paths. DUAL is also responsible for providing &lt;strong&gt;loop-free paths&lt;/strong&gt;, &lt;strong&gt;reducing network convergence times&lt;/strong&gt;, and &lt;strong&gt;minimizing&lt;/strong&gt; the &lt;strong&gt;use of network bandwidth&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;DUAL uses three tables: the &lt;strong&gt;neighbor table&lt;/strong&gt;, the &lt;strong&gt;topology table&lt;/strong&gt;, and the &lt;strong&gt;routing table&lt;/strong&gt;. The &lt;strong&gt;neighbor table&lt;/strong&gt; keeps track of &lt;strong&gt;neighboring routers&lt;/strong&gt;, the &lt;strong&gt;topology table&lt;/strong&gt; contains information about &lt;strong&gt;network topology&lt;/strong&gt;, and the &lt;strong&gt;routing table&lt;/strong&gt; contains the &lt;strong&gt;best paths&lt;/strong&gt; to &lt;strong&gt;network destinations&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;eigrp-and-multicast&quot;&gt;EIGRP and Multicast&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;EIGRP uses &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-multicast.html&quot; target=&quot;_blank&quot; title=&quot;multicast addresses&quot;&gt;multicast addresses&lt;/a&gt; to distribute routing updates and queries to its neighboring routers. The &lt;strong&gt;multicast address&lt;/strong&gt; used by &lt;strong&gt;EIGRP&lt;/strong&gt; is &lt;strong&gt;224.0.0.10&lt;/strong&gt;. This address is used by EIGRP routers to send &lt;strong&gt;hello messages&lt;/strong&gt; to each other and also to send &lt;strong&gt;updates&lt;/strong&gt; and &lt;strong&gt;queries&lt;/strong&gt; to their neighbors.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When a router sends a multicast update to its neighbors, it includes only the routes that have changed since the last update. This helps to &lt;strong&gt;reduce&lt;/strong&gt; the amount of &lt;strong&gt;traffic&lt;/strong&gt; on the network and also &lt;strong&gt;reduces&lt;/strong&gt; the &lt;strong&gt;processing power&lt;/strong&gt; required by the routers. EIGRP also supports &lt;strong&gt;incremental updates&lt;/strong&gt;, which means that only the changes to the routing table are sent, &lt;strong&gt;not the entire routing table&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;EIGRP's use of multicast communication is also advantageous because it enables routers to discover new neighbors quickly. When a router sends a &lt;strong&gt;hello message&lt;/strong&gt; to the multicast address, any neighboring routers that receive it will respond with their own hello messages. This allows routers to quickly learn about the topology of the network and update their routing tables accordingly.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, there are some potential &lt;strong&gt;limitations&lt;/strong&gt; to using &lt;strong&gt;multicast communication&lt;/strong&gt; with &lt;strong&gt;EIGRP&lt;/strong&gt;. One potential issue is that the multicast packets can be &lt;strong&gt;dropped&lt;/strong&gt; or &lt;strong&gt;delayed&lt;/strong&gt; on networks with &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-performance-testing.html&quot; target=&quot;_blank&quot; title=&quot;high congestion&quot;&gt;high congestion&lt;/a&gt;. Additionally, if there are any network segments that &lt;strong&gt;do not support multicast&lt;/strong&gt; communication, EIGRP may &lt;strong&gt;not be able to communicate&lt;/strong&gt; with routers on those segments.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Despite these potential limitations, EIGRP's use of multicast communication remains a &lt;strong&gt;powerful tool&lt;/strong&gt; for efficiently sharing routing information in large networks. By using a combination of &lt;strong&gt;distance-vector&lt;/strong&gt; and &lt;strong&gt;link-state technologies&lt;/strong&gt;, EIGRP is able to provide &lt;strong&gt;fast convergence times&lt;/strong&gt; and &lt;strong&gt;efficient&lt;/strong&gt; use of network resources.&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;classless-operation&quot;&gt;Classless Operation&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;EIGRP&lt;/strong&gt; is a &lt;strong&gt;classless routing protocol&lt;/strong&gt;. This means that it supports &lt;strong&gt;variable length subnet masks&lt;/strong&gt; (&lt;strong&gt;VLSM&lt;/strong&gt;), which means it includes &lt;strong&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/subnetting.html&quot; target=&quot;_blank&quot; title=&quot;subnet mask&quot;&gt;subnet mask&lt;/a&gt; information&lt;/strong&gt; in its &lt;strong&gt;routing updates&lt;/strong&gt; and &lt;strong&gt;enables&lt;/strong&gt; network administrators to use subnets of different sizes within a network. This allows for more efficient use of &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/ip-protocol.html&quot; target=&quot;_blank&quot; title=&quot;IP address&quot;&gt;IP address&lt;/a&gt; space.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Since an EIGRP update it includes the &lt;strong&gt;IP address&lt;/strong&gt; of the &lt;strong&gt;destination network&lt;/strong&gt; along with its, it enables the receiving routers to calculate the &lt;strong&gt;correct network address&lt;/strong&gt; and determine the &lt;strong&gt;length&lt;/strong&gt; of the &lt;strong&gt;prefix&lt;/strong&gt; for the network, allowing them to &lt;strong&gt;support VLSMs&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In addition to supporting VLSMs, EIGRP also &lt;strong&gt;supports automatic summarization of routes&lt;/strong&gt; at network boundaries. This means that EIGRP routers &lt;strong&gt;will automatically summarize the routes within their own networks&lt;/strong&gt; and advertise the &lt;strong&gt;summary&lt;/strong&gt; to &lt;strong&gt;neighboring routers&lt;/strong&gt;. This reduces the amount of routing information that needs to be transmitted across the network and improves network efficiency.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, there are some &lt;strong&gt;potential disadvantages&lt;/strong&gt; to using &lt;strong&gt;classless operation&lt;/strong&gt; with &lt;strong&gt;EIGRP&lt;/strong&gt;. One potential issue is that it can &lt;strong&gt;increase&lt;/strong&gt; the &lt;strong&gt;complexity&lt;/strong&gt; of &lt;strong&gt;network designs&lt;/strong&gt; and &lt;strong&gt;configurations&lt;/strong&gt;. Additionally, &lt;strong&gt;classless operation&lt;/strong&gt; can also increase the &lt;strong&gt;size of routing tables&lt;/strong&gt;, which can impact the &lt;strong&gt;performance&lt;/strong&gt; of routers with limited memory or processing power.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Despite these potential challenges, EIGRP's support for &lt;strong&gt;classless operation&lt;/strong&gt; remains a valuable feature that enables network administrators to create more &lt;strong&gt;efficient&lt;/strong&gt; and &lt;strong&gt;flexible network designs&lt;/strong&gt;. By using &lt;strong&gt;VLSMs&lt;/strong&gt; and &lt;strong&gt;automatic summarization&lt;/strong&gt;, EIGRP is able to provide more &lt;strong&gt;granular control&lt;/strong&gt; over &lt;strong&gt;network subnets&lt;/strong&gt; and &lt;strong&gt;reduce&lt;/strong&gt; the amount of &lt;strong&gt;routing traffic&lt;/strong&gt; on the network.&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;eigrp-limitations&quot;&gt;EIGRP Limitations&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One of the &lt;strong&gt;main limitations&lt;/strong&gt; of &lt;strong&gt;EIGRP&lt;/strong&gt; is that it is a &lt;strong&gt;proprietary protocol&lt;/strong&gt; that is &lt;strong&gt;only supported by Cisco networking equipment&lt;/strong&gt;. This means that it cannot be used in networks that include &lt;strong&gt;non-Cisco devices&lt;/strong&gt;, and can limit the ability to interoperate with other routing protocols.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Another limitation of EIGRP is that it requires a certain amount of &lt;strong&gt;resources&lt;/strong&gt; to &lt;strong&gt;operate efficiently&lt;/strong&gt;. Specifically, EIGRP requires a &lt;strong&gt;significant amount of CPU&lt;/strong&gt; and &lt;strong&gt;memory resources&lt;/strong&gt; to calculate and maintain its routing tables. As a result, it may not be the best choice for networks with limited resources or older equipment.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;EIGRP&lt;/strong&gt; also has limitations when it comes to &lt;strong&gt;scalability&lt;/strong&gt;. While EIGRP can scale well within an &lt;strong&gt;autonomous system&lt;/strong&gt; (&lt;strong&gt;AS&lt;/strong&gt;), it may not be the best choice for very large networks or networks with many ASs. In these cases, other &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols.html&quot; target=&quot;_blank&quot; title=&quot;routing protocols&quot;&gt;routing protocols&lt;/a&gt; like &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html&quot; target=&quot;_blank&quot; title=&quot;OSPF&quot;&gt;OSPF&lt;/a&gt; (&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html&quot; target=&quot;_blank&quot; title=&quot;Open Shortest Path First&quot;&gt;Open Shortest Path First&lt;/a&gt;) may be a better choice.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finally, EIGRP's &lt;strong&gt;default metrics&lt;/strong&gt; may &lt;strong&gt;not&lt;/strong&gt; always be the &lt;strong&gt;most appropriate&lt;/strong&gt; for certain types of networks or traffic patterns. While EIGRP allows for the tuning of its metrics, this can be a complex and time-consuming process, and may not always result in optimal performance.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Despite these limitations, &lt;strong&gt;EIGRP&lt;/strong&gt; remains a &lt;strong&gt;popular&lt;/strong&gt; and &lt;strong&gt;effective routing protocol&lt;/strong&gt; in many networks, especially those that are primarily composed of &lt;strong&gt;Cisco equipment&lt;/strong&gt;. However, network administrators should carefully evaluate the specific needs and limitations of their networks before selecting EIGRP as their routing protocol of choice.&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;eigrp-disadvantages&quot;&gt;EIGRP Disadvantages&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Proprietary protocol&lt;/strong&gt;: EIGRP is a proprietary protocol, which means that it is only supported on Cisco routers.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Limited support for non-Cisco devices&lt;/strong&gt;: EIGRP has limited support for non-Cisco devices, which makes it difficult to use in heterogeneous network environments.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a id=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;EIGRP&lt;/strong&gt; is an advanced &lt;strong&gt;Cisco proprietary routing protocol&lt;/strong&gt; that combines the features of both&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/distance-vector.html&quot; target=&quot;_blank&quot; title=&quot;distance vector&quot;&gt;distance vector&lt;/a&gt; and &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/link-state-routing.html&quot; target=&quot;_blank&quot; title=&quot;link-state&quot;&gt;link-state&lt;/a&gt; routing protocols. EIGRP uses the &lt;strong&gt;Diffusing Update Algorithm&lt;/strong&gt; (&lt;strong&gt;DUAL&lt;/strong&gt;) to provide &lt;strong&gt;loop-free paths&lt;/strong&gt;, &lt;strong&gt;fast convergence times&lt;/strong&gt;, and &lt;strong&gt;scalability&lt;/strong&gt;. EIGRP uses &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-multicast.html&quot; target=&quot;_blank&quot; title=&quot;multicast&quot;&gt;multicast&lt;/a&gt; to &lt;strong&gt;distribute routing updates&lt;/strong&gt;, which &lt;strong&gt;reduces network traffic&lt;/strong&gt; and &lt;strong&gt;improves scalability&lt;/strong&gt;. EIGRP is a &lt;strong&gt;classless routing protocol&lt;/strong&gt; that supports VLSM.&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/eigrp-intro.webp&quot; alt=&quot;Enhanced Interior Gateway Routing Protocol - EIGRP&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Enhanced Interior Gateway Routing Protocol&lt;/strong&gt; (&lt;strong&gt;EIGRP&lt;/strong&gt;), similar to &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-igrp.html&quot; target=&quot;_blank&quot; title=&quot;IGRP&quot;&gt;IGRP&lt;/a&gt;, is a Cisco proprietary routing protocol that is used to exchange routing information between different routers within a network. &lt;strong&gt;EIGRP&lt;/strong&gt; is an &lt;strong&gt;advanced routing protocol&lt;/strong&gt; that combines the features of both &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/distance-vector.html&quot; target=&quot;_blank&quot; title=&quot;distance vector&quot;&gt;distance vector&lt;/a&gt; and &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/link-state-routing.html&quot; target=&quot;_blank&quot; title=&quot;link-state&quot;&gt;link-state&lt;/a&gt; routing protocols. This protocol is used to provide faster convergence times and improved scalability. &lt;strong&gt;EIGRP&lt;/strong&gt; uses a &lt;strong&gt;composite metric&lt;/strong&gt; composed of &lt;strong&gt;Bandwidth&lt;/strong&gt;, &lt;strong&gt;Delay&lt;/strong&gt;, &lt;strong&gt;Reliability&lt;/strong&gt;, and &lt;strong&gt;Loading&lt;/strong&gt; to determine the &lt;strong&gt;best path&lt;/strong&gt; between two locations.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;Article Key Topics:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#eigrp-key-points&quot;&gt;Key Points of EIGRP&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#eigrp-dual&quot;&gt;Diffusing Update Algorithm (DUAL)&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#eigrp-and-multicast&quot;&gt;EIGRP and Multicast&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#classless-operation&quot;&gt;Classless Operation&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#eigrp-limitations&quot;&gt;EIGRP Limitations&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;&lt;a href=&quot;https://www.firewall.cx/#eigrp-disadvantages&quot;&gt;EIGRP Disadvantages&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot;&gt;Summary&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a id=&quot;eigrp-key-points&quot;&gt;Key Points of EIGRP&lt;/a&gt;&lt;/h2&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Fast convergence times&lt;/strong&gt;: EIGRP has a fast convergence time, which means that it can quickly adapt to changes in the network topology.&lt;/p&gt;
&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;
&lt;p&gt;&lt;strong&gt;Loop-free paths&lt;/strong&gt;: EIGRP provides loop-free paths. This helps prevent routing loops and ensures the integrity and convergence stability of the network.&lt;/p&gt;
&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;
&lt;p&gt;&lt;strong&gt;Support for VLSM&lt;/strong&gt;: EIGRP supports variable length subnet masks (VLSM), therefore allowing for more efficient use of IP address space.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Scalability&lt;/strong&gt;: EIGRP can scale to support almost any size network but is usually found in small to large networks.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a id=&quot;eigrp-dual&quot;&gt;Diffusing Update Algorithm (DUAL)&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Diffusing Update Algorithm&lt;/strong&gt; (&lt;strong&gt;DUAL&lt;/strong&gt;) is the core of EIGRP's operation. DUAL is responsible for calculating the shortest path to a network destination and for selecting the best path among multiple paths. DUAL is also responsible for providing &lt;strong&gt;loop-free paths&lt;/strong&gt;, &lt;strong&gt;reducing network convergence times&lt;/strong&gt;, and &lt;strong&gt;minimizing&lt;/strong&gt; the &lt;strong&gt;use of network bandwidth&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;DUAL uses three tables: the &lt;strong&gt;neighbor table&lt;/strong&gt;, the &lt;strong&gt;topology table&lt;/strong&gt;, and the &lt;strong&gt;routing table&lt;/strong&gt;. The &lt;strong&gt;neighbor table&lt;/strong&gt; keeps track of &lt;strong&gt;neighboring routers&lt;/strong&gt;, the &lt;strong&gt;topology table&lt;/strong&gt; contains information about &lt;strong&gt;network topology&lt;/strong&gt;, and the &lt;strong&gt;routing table&lt;/strong&gt; contains the &lt;strong&gt;best paths&lt;/strong&gt; to &lt;strong&gt;network destinations&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;eigrp-and-multicast&quot;&gt;EIGRP and Multicast&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;EIGRP uses &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-multicast.html&quot; target=&quot;_blank&quot; title=&quot;multicast addresses&quot;&gt;multicast addresses&lt;/a&gt; to distribute routing updates and queries to its neighboring routers. The &lt;strong&gt;multicast address&lt;/strong&gt; used by &lt;strong&gt;EIGRP&lt;/strong&gt; is &lt;strong&gt;224.0.0.10&lt;/strong&gt;. This address is used by EIGRP routers to send &lt;strong&gt;hello messages&lt;/strong&gt; to each other and also to send &lt;strong&gt;updates&lt;/strong&gt; and &lt;strong&gt;queries&lt;/strong&gt; to their neighbors.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When a router sends a multicast update to its neighbors, it includes only the routes that have changed since the last update. This helps to &lt;strong&gt;reduce&lt;/strong&gt; the amount of &lt;strong&gt;traffic&lt;/strong&gt; on the network and also &lt;strong&gt;reduces&lt;/strong&gt; the &lt;strong&gt;processing power&lt;/strong&gt; required by the routers. EIGRP also supports &lt;strong&gt;incremental updates&lt;/strong&gt;, which means that only the changes to the routing table are sent, &lt;strong&gt;not the entire routing table&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;EIGRP's use of multicast communication is also advantageous because it enables routers to discover new neighbors quickly. When a router sends a &lt;strong&gt;hello message&lt;/strong&gt; to the multicast address, any neighboring routers that receive it will respond with their own hello messages. This allows routers to quickly learn about the topology of the network and update their routing tables accordingly.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, there are some potential &lt;strong&gt;limitations&lt;/strong&gt; to using &lt;strong&gt;multicast communication&lt;/strong&gt; with &lt;strong&gt;EIGRP&lt;/strong&gt;. One potential issue is that the multicast packets can be &lt;strong&gt;dropped&lt;/strong&gt; or &lt;strong&gt;delayed&lt;/strong&gt; on networks with &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-performance-testing.html&quot; target=&quot;_blank&quot; title=&quot;high congestion&quot;&gt;high congestion&lt;/a&gt;. Additionally, if there are any network segments that &lt;strong&gt;do not support multicast&lt;/strong&gt; communication, EIGRP may &lt;strong&gt;not be able to communicate&lt;/strong&gt; with routers on those segments.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Despite these potential limitations, EIGRP's use of multicast communication remains a &lt;strong&gt;powerful tool&lt;/strong&gt; for efficiently sharing routing information in large networks. By using a combination of &lt;strong&gt;distance-vector&lt;/strong&gt; and &lt;strong&gt;link-state technologies&lt;/strong&gt;, EIGRP is able to provide &lt;strong&gt;fast convergence times&lt;/strong&gt; and &lt;strong&gt;efficient&lt;/strong&gt; use of network resources.&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;classless-operation&quot;&gt;Classless Operation&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;EIGRP&lt;/strong&gt; is a &lt;strong&gt;classless routing protocol&lt;/strong&gt;. This means that it supports &lt;strong&gt;variable length subnet masks&lt;/strong&gt; (&lt;strong&gt;VLSM&lt;/strong&gt;), which means it includes &lt;strong&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/subnetting.html&quot; target=&quot;_blank&quot; title=&quot;subnet mask&quot;&gt;subnet mask&lt;/a&gt; information&lt;/strong&gt; in its &lt;strong&gt;routing updates&lt;/strong&gt; and &lt;strong&gt;enables&lt;/strong&gt; network administrators to use subnets of different sizes within a network. This allows for more efficient use of &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/ip-protocol.html&quot; target=&quot;_blank&quot; title=&quot;IP address&quot;&gt;IP address&lt;/a&gt; space.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Since an EIGRP update it includes the &lt;strong&gt;IP address&lt;/strong&gt; of the &lt;strong&gt;destination network&lt;/strong&gt; along with its, it enables the receiving routers to calculate the &lt;strong&gt;correct network address&lt;/strong&gt; and determine the &lt;strong&gt;length&lt;/strong&gt; of the &lt;strong&gt;prefix&lt;/strong&gt; for the network, allowing them to &lt;strong&gt;support VLSMs&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In addition to supporting VLSMs, EIGRP also &lt;strong&gt;supports automatic summarization of routes&lt;/strong&gt; at network boundaries. This means that EIGRP routers &lt;strong&gt;will automatically summarize the routes within their own networks&lt;/strong&gt; and advertise the &lt;strong&gt;summary&lt;/strong&gt; to &lt;strong&gt;neighboring routers&lt;/strong&gt;. This reduces the amount of routing information that needs to be transmitted across the network and improves network efficiency.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, there are some &lt;strong&gt;potential disadvantages&lt;/strong&gt; to using &lt;strong&gt;classless operation&lt;/strong&gt; with &lt;strong&gt;EIGRP&lt;/strong&gt;. One potential issue is that it can &lt;strong&gt;increase&lt;/strong&gt; the &lt;strong&gt;complexity&lt;/strong&gt; of &lt;strong&gt;network designs&lt;/strong&gt; and &lt;strong&gt;configurations&lt;/strong&gt;. Additionally, &lt;strong&gt;classless operation&lt;/strong&gt; can also increase the &lt;strong&gt;size of routing tables&lt;/strong&gt;, which can impact the &lt;strong&gt;performance&lt;/strong&gt; of routers with limited memory or processing power.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Despite these potential challenges, EIGRP's support for &lt;strong&gt;classless operation&lt;/strong&gt; remains a valuable feature that enables network administrators to create more &lt;strong&gt;efficient&lt;/strong&gt; and &lt;strong&gt;flexible network designs&lt;/strong&gt;. By using &lt;strong&gt;VLSMs&lt;/strong&gt; and &lt;strong&gt;automatic summarization&lt;/strong&gt;, EIGRP is able to provide more &lt;strong&gt;granular control&lt;/strong&gt; over &lt;strong&gt;network subnets&lt;/strong&gt; and &lt;strong&gt;reduce&lt;/strong&gt; the amount of &lt;strong&gt;routing traffic&lt;/strong&gt; on the network.&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;eigrp-limitations&quot;&gt;EIGRP Limitations&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One of the &lt;strong&gt;main limitations&lt;/strong&gt; of &lt;strong&gt;EIGRP&lt;/strong&gt; is that it is a &lt;strong&gt;proprietary protocol&lt;/strong&gt; that is &lt;strong&gt;only supported by Cisco networking equipment&lt;/strong&gt;. This means that it cannot be used in networks that include &lt;strong&gt;non-Cisco devices&lt;/strong&gt;, and can limit the ability to interoperate with other routing protocols.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Another limitation of EIGRP is that it requires a certain amount of &lt;strong&gt;resources&lt;/strong&gt; to &lt;strong&gt;operate efficiently&lt;/strong&gt;. Specifically, EIGRP requires a &lt;strong&gt;significant amount of CPU&lt;/strong&gt; and &lt;strong&gt;memory resources&lt;/strong&gt; to calculate and maintain its routing tables. As a result, it may not be the best choice for networks with limited resources or older equipment.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;EIGRP&lt;/strong&gt; also has limitations when it comes to &lt;strong&gt;scalability&lt;/strong&gt;. While EIGRP can scale well within an &lt;strong&gt;autonomous system&lt;/strong&gt; (&lt;strong&gt;AS&lt;/strong&gt;), it may not be the best choice for very large networks or networks with many ASs. In these cases, other &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols.html&quot; target=&quot;_blank&quot; title=&quot;routing protocols&quot;&gt;routing protocols&lt;/a&gt; like &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html&quot; target=&quot;_blank&quot; title=&quot;OSPF&quot;&gt;OSPF&lt;/a&gt; (&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html&quot; target=&quot;_blank&quot; title=&quot;Open Shortest Path First&quot;&gt;Open Shortest Path First&lt;/a&gt;) may be a better choice.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finally, EIGRP's &lt;strong&gt;default metrics&lt;/strong&gt; may &lt;strong&gt;not&lt;/strong&gt; always be the &lt;strong&gt;most appropriate&lt;/strong&gt; for certain types of networks or traffic patterns. While EIGRP allows for the tuning of its metrics, this can be a complex and time-consuming process, and may not always result in optimal performance.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Despite these limitations, &lt;strong&gt;EIGRP&lt;/strong&gt; remains a &lt;strong&gt;popular&lt;/strong&gt; and &lt;strong&gt;effective routing protocol&lt;/strong&gt; in many networks, especially those that are primarily composed of &lt;strong&gt;Cisco equipment&lt;/strong&gt;. However, network administrators should carefully evaluate the specific needs and limitations of their networks before selecting EIGRP as their routing protocol of choice.&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;eigrp-disadvantages&quot;&gt;EIGRP Disadvantages&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Proprietary protocol&lt;/strong&gt;: EIGRP is a proprietary protocol, which means that it is only supported on Cisco routers.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Limited support for non-Cisco devices&lt;/strong&gt;: EIGRP has limited support for non-Cisco devices, which makes it difficult to use in heterogeneous network environments.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a id=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;EIGRP&lt;/strong&gt; is an advanced &lt;strong&gt;Cisco proprietary routing protocol&lt;/strong&gt; that combines the features of both&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/distance-vector.html&quot; target=&quot;_blank&quot; title=&quot;distance vector&quot;&gt;distance vector&lt;/a&gt; and &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/link-state-routing.html&quot; target=&quot;_blank&quot; title=&quot;link-state&quot;&gt;link-state&lt;/a&gt; routing protocols. EIGRP uses the &lt;strong&gt;Diffusing Update Algorithm&lt;/strong&gt; (&lt;strong&gt;DUAL&lt;/strong&gt;) to provide &lt;strong&gt;loop-free paths&lt;/strong&gt;, &lt;strong&gt;fast convergence times&lt;/strong&gt;, and &lt;strong&gt;scalability&lt;/strong&gt;. EIGRP uses &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-multicast.html&quot; target=&quot;_blank&quot; title=&quot;multicast&quot;&gt;multicast&lt;/a&gt; to &lt;strong&gt;distribute routing updates&lt;/strong&gt;, which &lt;strong&gt;reduces network traffic&lt;/strong&gt; and &lt;strong&gt;improves scalability&lt;/strong&gt;. EIGRP is a &lt;strong&gt;classless routing protocol&lt;/strong&gt; that supports VLSM.&lt;/p&gt;</content>
		<category term="Routing" />
	</entry>
	<entry>
		<title>Interior Gateway Protocol - IGRP</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/routing-protocols/routing-protocol-igrp.html"/>
		<published>2011-05-26T08:45:42+10:00</published>
		<updated>2011-05-26T08:45:42+10:00</updated>
		<id>https://www.firewall.cx/networking/routing-protocols/routing-protocol-igrp.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/routing-protocol-igrp-intro.webp&quot; alt=&quot;Interior Gateway Protocol - IGRP&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;IGRP (Interior Gateway Routing Protocol)&lt;/strong&gt; is a Cisco proprietary &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/distance-vector.html&quot; target=&quot;_blank&quot; title=&quot;distance-vector&quot;&gt;distance-vector&lt;/a&gt; routing protocol used in enterprise networks to exchange routing information between routers. &lt;strong&gt;IGRP&lt;/strong&gt; is a predecessor to the more advanced &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocols-eigrp.html&quot; target=&quot;_blank&quot; title=&quot;Enhanced Interior Gateway Routing Protocol (EIGRP)&quot;&gt;Enhanced Interior Gateway Routing Protocol (EIGRP)&lt;/a&gt; but is still used in some legacy networks. &lt;strong&gt;IGRP&lt;/strong&gt; is a &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/subnetting/subnetting-mask.html&quot; target=&quot;_blank&quot; title=&quot;classful protocol&quot;&gt;classful protocol&lt;/a&gt;, which means it &lt;strong&gt;does not support variable-length subnet masks (VLSMs)&lt;/strong&gt; and is limited to &lt;strong&gt;classful addressing&lt;/strong&gt;. In this article, we will explore IGRP in more detail, covering its &lt;strong&gt;hop counts&lt;/strong&gt;, &lt;strong&gt;IGRP timers&lt;/strong&gt;, &lt;strong&gt;limitations&lt;/strong&gt;, &lt;strong&gt;advantages&lt;/strong&gt;, and &lt;strong&gt;disadvantages&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Article Key Topics:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#igrp-hop-count&quot;&gt;IGRP Hop Count&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#igrp-timers&quot;&gt;IGRP Timers&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#igrp-limitations&quot;&gt;IGRP Limitations&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#igrp-advantages-disadvantages&quot;&gt;IGRP Advantages &amp;amp; Disadvantages&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot;&gt;Summary&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;igrp-hop-count&quot;&gt;IGRP Hop Count&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;IGRP&lt;/strong&gt; uses a &lt;strong&gt;maximum hop count&lt;/strong&gt; of &lt;strong&gt;100&lt;/strong&gt; by &lt;strong&gt;default&lt;/strong&gt;, meaning that any destination beyond 100 hops is considered &lt;strong&gt;unreachable&lt;/strong&gt;. IGRP allows network administrators to set a &lt;strong&gt;maximum hop count (255)&lt;/strong&gt; for each network, which can be customized based on the network topology. A higher hop count limit allows packets to reach more remote networks but increases the time required to route the packets.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;igrp-timers&quot;&gt;IGRP Timers&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;IGRP uses several timers to control its operation and prevent routing loops. The main IGRP timers are the update timer, hold-down timer, flush timer, and invalid timer.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Update Timer&lt;/strong&gt;: The update timer controls how often IGRP routers send routing updates to their neighboring routers. By default, the &lt;strong&gt;update timer&lt;/strong&gt; is set to &lt;strong&gt;90 seconds&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Hold-Down Timer&lt;/strong&gt;: The &lt;strong&gt;hold-down timer&lt;/strong&gt; prevents routers from accepting routing information about a network that is not available. This timer is activated when a router detects that a network is down, preventing other routers from advertising the same network for a set period.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Flush Timer&lt;/strong&gt;: The flush timer removes a route from the routing table when it has not been updated for a certain period, preventing outdated information from being used.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Invalid Timer&lt;/strong&gt;: The invalid timer is used to determine when a route should be marked as invalid. If a router has not received an update about a particular route after the invalid timer expires, the route is marked as invalid and removed from the routing table.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;igrp-limitations&quot;&gt;IGRP Limitations&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One of the main limitations of IGRP is its classful addressing scheme, which does not support VLSMs. This means that network administrators must use subnets of the same size across the entire network, limiting the network's scalability. Additionally, IGRP has a limited hop count of 100, which can prevent packets from reaching remote networks. IGRP is also &lt;strong&gt;susceptible&lt;/strong&gt; to &lt;strong&gt;routing loops&lt;/strong&gt;, where packets are sent in a loop between routers, leading to congestion and delays. Finally, IGRP is a &lt;strong&gt;proprietary protocol&lt;/strong&gt; that is &lt;strong&gt;only compatible with Cisco routers&lt;/strong&gt;, limiting interoperability with routers from other vendors.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;igrp-advantages-disadvantages&quot;&gt;IGRP Advantages and Disadvantages&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One of the main advantages of IGRP is its ease of use and configuration. IGRP is relatively easy to set up and configure, making it a good choice for small to medium-sized networks. Additionally, IGRP has lower bandwidth usage compared to other routing protocols, making it ideal for networks with limited bandwidth. IGRP also supports unequal-cost load balancing, which allows routers to use multiple paths to reach a destination, improving network efficiency.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, IGRP also has several disadvantages. One of the main disadvantages of IGRP is its &lt;strong&gt;limited scalability&lt;/strong&gt;, due to its classful addressing scheme and &lt;strong&gt;maximum hop count of 100&lt;/strong&gt;. This makes it unsuitable for large networks that require VLSMs and the ability to reach remote networks. Additionally, IGRP is prone to routing loops and convergence issues, which can lead to network congestion and delays. Finally, IGRP is a proprietary protocol, meaning that it is not an open standard and is only compatible with Cisco routers, limiting interoperability with other vendors' routers.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article we talked about &lt;strong&gt;IGRP&lt;/strong&gt;, explained&amp;nbsp; a Cisco proprietary &lt;strong&gt;distance-vector routing protocol&lt;/strong&gt; used in enterprise networks to exchange routing information between routers. We talked about it being a &lt;strong&gt;classful protocol&lt;/strong&gt;, analyzed its four different timers (&lt;strong&gt;update timer&lt;/strong&gt;, &lt;strong&gt;hold-down timer&lt;/strong&gt;, &lt;strong&gt;flush timer&lt;/strong&gt;, and &lt;strong&gt;invalid timer&lt;/strong&gt;), &lt;strong&gt;hop counts&lt;/strong&gt; and more. Finally, we talked about the &lt;strong&gt;advantages&lt;/strong&gt; and &lt;strong&gt;disadvantages&lt;/strong&gt; of the &lt;strong&gt;IGRP protocol&lt;/strong&gt;.&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/routing-protocol-igrp-intro.webp&quot; alt=&quot;Interior Gateway Protocol - IGRP&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;IGRP (Interior Gateway Routing Protocol)&lt;/strong&gt; is a Cisco proprietary &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/distance-vector.html&quot; target=&quot;_blank&quot; title=&quot;distance-vector&quot;&gt;distance-vector&lt;/a&gt; routing protocol used in enterprise networks to exchange routing information between routers. &lt;strong&gt;IGRP&lt;/strong&gt; is a predecessor to the more advanced &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocols-eigrp.html&quot; target=&quot;_blank&quot; title=&quot;Enhanced Interior Gateway Routing Protocol (EIGRP)&quot;&gt;Enhanced Interior Gateway Routing Protocol (EIGRP)&lt;/a&gt; but is still used in some legacy networks. &lt;strong&gt;IGRP&lt;/strong&gt; is a &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/subnetting/subnetting-mask.html&quot; target=&quot;_blank&quot; title=&quot;classful protocol&quot;&gt;classful protocol&lt;/a&gt;, which means it &lt;strong&gt;does not support variable-length subnet masks (VLSMs)&lt;/strong&gt; and is limited to &lt;strong&gt;classful addressing&lt;/strong&gt;. In this article, we will explore IGRP in more detail, covering its &lt;strong&gt;hop counts&lt;/strong&gt;, &lt;strong&gt;IGRP timers&lt;/strong&gt;, &lt;strong&gt;limitations&lt;/strong&gt;, &lt;strong&gt;advantages&lt;/strong&gt;, and &lt;strong&gt;disadvantages&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Article Key Topics:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#igrp-hop-count&quot;&gt;IGRP Hop Count&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#igrp-timers&quot;&gt;IGRP Timers&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#igrp-limitations&quot;&gt;IGRP Limitations&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#igrp-advantages-disadvantages&quot;&gt;IGRP Advantages &amp;amp; Disadvantages&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot;&gt;Summary&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;igrp-hop-count&quot;&gt;IGRP Hop Count&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;IGRP&lt;/strong&gt; uses a &lt;strong&gt;maximum hop count&lt;/strong&gt; of &lt;strong&gt;100&lt;/strong&gt; by &lt;strong&gt;default&lt;/strong&gt;, meaning that any destination beyond 100 hops is considered &lt;strong&gt;unreachable&lt;/strong&gt;. IGRP allows network administrators to set a &lt;strong&gt;maximum hop count (255)&lt;/strong&gt; for each network, which can be customized based on the network topology. A higher hop count limit allows packets to reach more remote networks but increases the time required to route the packets.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;igrp-timers&quot;&gt;IGRP Timers&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;IGRP uses several timers to control its operation and prevent routing loops. The main IGRP timers are the update timer, hold-down timer, flush timer, and invalid timer.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Update Timer&lt;/strong&gt;: The update timer controls how often IGRP routers send routing updates to their neighboring routers. By default, the &lt;strong&gt;update timer&lt;/strong&gt; is set to &lt;strong&gt;90 seconds&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Hold-Down Timer&lt;/strong&gt;: The &lt;strong&gt;hold-down timer&lt;/strong&gt; prevents routers from accepting routing information about a network that is not available. This timer is activated when a router detects that a network is down, preventing other routers from advertising the same network for a set period.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Flush Timer&lt;/strong&gt;: The flush timer removes a route from the routing table when it has not been updated for a certain period, preventing outdated information from being used.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Invalid Timer&lt;/strong&gt;: The invalid timer is used to determine when a route should be marked as invalid. If a router has not received an update about a particular route after the invalid timer expires, the route is marked as invalid and removed from the routing table.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;igrp-limitations&quot;&gt;IGRP Limitations&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One of the main limitations of IGRP is its classful addressing scheme, which does not support VLSMs. This means that network administrators must use subnets of the same size across the entire network, limiting the network's scalability. Additionally, IGRP has a limited hop count of 100, which can prevent packets from reaching remote networks. IGRP is also &lt;strong&gt;susceptible&lt;/strong&gt; to &lt;strong&gt;routing loops&lt;/strong&gt;, where packets are sent in a loop between routers, leading to congestion and delays. Finally, IGRP is a &lt;strong&gt;proprietary protocol&lt;/strong&gt; that is &lt;strong&gt;only compatible with Cisco routers&lt;/strong&gt;, limiting interoperability with routers from other vendors.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;igrp-advantages-disadvantages&quot;&gt;IGRP Advantages and Disadvantages&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One of the main advantages of IGRP is its ease of use and configuration. IGRP is relatively easy to set up and configure, making it a good choice for small to medium-sized networks. Additionally, IGRP has lower bandwidth usage compared to other routing protocols, making it ideal for networks with limited bandwidth. IGRP also supports unequal-cost load balancing, which allows routers to use multiple paths to reach a destination, improving network efficiency.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;However, IGRP also has several disadvantages. One of the main disadvantages of IGRP is its &lt;strong&gt;limited scalability&lt;/strong&gt;, due to its classful addressing scheme and &lt;strong&gt;maximum hop count of 100&lt;/strong&gt;. This makes it unsuitable for large networks that require VLSMs and the ability to reach remote networks. Additionally, IGRP is prone to routing loops and convergence issues, which can lead to network congestion and delays. Finally, IGRP is a proprietary protocol, meaning that it is not an open standard and is only compatible with Cisco routers, limiting interoperability with other vendors' routers.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article we talked about &lt;strong&gt;IGRP&lt;/strong&gt;, explained&amp;nbsp; a Cisco proprietary &lt;strong&gt;distance-vector routing protocol&lt;/strong&gt; used in enterprise networks to exchange routing information between routers. We talked about it being a &lt;strong&gt;classful protocol&lt;/strong&gt;, analyzed its four different timers (&lt;strong&gt;update timer&lt;/strong&gt;, &lt;strong&gt;hold-down timer&lt;/strong&gt;, &lt;strong&gt;flush timer&lt;/strong&gt;, and &lt;strong&gt;invalid timer&lt;/strong&gt;), &lt;strong&gt;hop counts&lt;/strong&gt; and more. Finally, we talked about the &lt;strong&gt;advantages&lt;/strong&gt; and &lt;strong&gt;disadvantages&lt;/strong&gt; of the &lt;strong&gt;IGRP protocol&lt;/strong&gt;.&lt;/p&gt;</content>
		<category term="Routing" />
	</entry>
	<entry>
		<title>OSPF - Part 1: Introduction, OSPF Packet Structure, OSPF Messages and Characteristics</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html"/>
		<published>2011-05-26T08:38:57+10:00</published>
		<updated>2011-05-26T08:38:57+10:00</updated>
		<id>https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ospf-part1-intro.webp&quot; alt=&quot;OSPF - Part 1&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Open Shortest Path First (OSPF)&lt;/strong&gt; is a popular &lt;strong&gt;routing protocol&lt;/strong&gt; developed for Internet Protocol (IP) networks by the &lt;strong&gt;Interior Gateway Protocol&lt;/strong&gt; (&lt;strong&gt;IGP&lt;/strong&gt;) working group of the Internet Engineering Task Force (IETF). The working group was formed in 1988 to design an IGP based on the shortest path first (SPF) algorithm for use in the Internet. Similar to the &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-igrp.html&quot; target=&quot;_blank&quot; title=&quot;Interior Gateway Routing Protocol (IGRP)&quot;&gt;Interior Gateway Routing Protocol (IGRP)&lt;/a&gt;, OSPF was created because in the mid-1980s, the &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-rip.html&quot; target=&quot;_blank&quot; title=&quot;Routing Information Protocol (RIP)&quot;&gt;Routing Information Protocol (RIP)&lt;/a&gt; was increasingly unable to serve large, heterogeneous internetworks.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Article Key Topics:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#ospf-packet-structure-analysis&quot;&gt;OSPF Packet Structure &amp;amp; Analysis&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#ospf-type-field&quot;&gt;OSPF 'Type' Field&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#ospf-open-routing-protocol&quot;&gt;OSPF - The Open Routing Protocol&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;&lt;a href=&quot;https://www.firewall.cx/#ospf-dijkstra-spf-algorithm&quot;&gt;OSPF - Dijkstra SPF Algorithm&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;&lt;a href=&quot;https://www.firewall.cx/#ospf-link-state-routing-protocol&quot;&gt;OSPF - A Link State Routing Protocol&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot;&gt;Summary&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Below is a complete list of articles covering our &lt;strong&gt;OSPF Series&lt;/strong&gt;:&lt;/p&gt;
&lt;div&gt;- Part 1 (This article): Introduction, OSPF Packet Structure, OSPF Messages and Characteristics.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; title=&quot;Part 2: How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&quot;&gt;Part 2: How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu.html&quot; target=&quot;_blank&quot; title=&quot;Part 3: OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU)&quot;&gt;Part 3: OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU)&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-states-forming-process.html&quot; target=&quot;_blank&quot; title=&quot;Part 4: OSPF Neighbor States – OSPF Neighbor Forming Process&quot;&gt;Part 4: OSPF Neighbor States – OSPF Neighbor Forming Process&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html&quot; target=&quot;_blank&quot; title=&quot;Part 5: Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types&quot;&gt;Part 5: Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;-&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsa-types-explained.html&quot; target=&quot;_blank&quot; title=&quot;Part 6: OSPF LSA Types - Purpose and Function of Every OSPF LSA&quot;&gt;Part 6: OSPF LSA Types - Purpose and Function of Every OSPF LSA&lt;/a&gt;.&lt;/div&gt;
&lt;h2&gt;&lt;a id=&quot;ospf-packet-structure-analysis&quot;&gt;OSPF Packet Structure &amp;amp; Analysis&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;OSPF is a &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/subnetting/subnetting-mask.html&quot; target=&quot;_blank&quot; title=&quot;classless&quot;&gt;classless&lt;/a&gt; routing protocol, which means that in its updates, it includes the subnet of each route it knows about, thus, enabling variable-length subnet masks. With variable-length subnet masks, an IP network can be broken into many subnets of various sizes. This provides network administrators with extra network-configuration flexibility.These updates are &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-multicast.html&quot; target=&quot;_blank&quot; title=&quot;what is multicast and how does it work?&quot;&gt;multicasts&lt;/a&gt; at specific addresses (224.0.0.5 and 224.0.0.6).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The diagram below shows us the information that each field of an &lt;strong&gt;OSPF packet&lt;/strong&gt; contains:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-1.gif&quot; alt=&quot;ospf-1&quot; width=&quot;630&quot; height=&quot;226&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; align=&quot;center&quot;&gt;The numbers shown inside the coloured blocks represent the field length in bytes.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-2.gif&quot; alt=&quot;ospf-2&quot; width=&quot;283&quot; height=&quot;539&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;All OSPF packets&lt;/strong&gt; begin with a &lt;strong&gt;24-byte header&lt;/strong&gt;, which is shown right above.&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;ospf-type-field&quot;&gt;OSPF 'Type' Field&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The '&lt;strong&gt;Type&lt;/strong&gt;' field (1-byte long) is a critical component of an &lt;strong&gt;OSPF&lt;/strong&gt; (&lt;strong&gt;Open Shortest Path First&lt;/strong&gt;) package. It indicates the &lt;strong&gt;type of OSPF message&lt;/strong&gt; contained within the package, such as a &lt;strong&gt;Hello message&lt;/strong&gt;, &lt;strong&gt;Link State Request message&lt;/strong&gt;, &lt;strong&gt;Link State Update message&lt;/strong&gt;, or &lt;strong&gt;Link State Acknowledgment message&lt;/strong&gt;. The type field plays a crucial role in the OSPF protocol by helping to ensure that routers exchange the correct types of messages with each other, enabling them to learn about the network topology and establish the shortest path to the destination network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Understanding the significance of the &quot;&lt;strong&gt;Type&lt;/strong&gt;&quot; field is essential for network administrators to troubleshoot OSPF network issues and optimize the performance of their networks. Below are the &lt;strong&gt;Type&lt;/strong&gt; field messages contained with a bit more information about their purpose and role:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;strong&gt;Hello&lt;/strong&gt;: Establishes and maintains neighbor relationships.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Database Description&lt;/strong&gt;: Describes the contents of the topological database. These messages are exchanged when an adjacency is initialized.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Link-state Request&lt;/strong&gt;: Requests pieces of the topological database from neighbor routers. These messages are exchanged after a router discovers (by examining database-description packets) that parts of its topological database are out of date.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Link-state Update&lt;/strong&gt;: Responds to a link-state request packet. These messages also are used for the regular dispersal of Link-State Acknowledgments (LSA). Several LSAs can be included within a single link-state update packet.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Link-state Acknowledgment&lt;/strong&gt;: Acknowledges link-state update packets.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;OSPF's Primary Characteristics&lt;/h2&gt;
&lt;h4&gt;&lt;a id=&quot;ospf-open-routing-protocol&quot;&gt;OSPF - The Open Routing Protocol&lt;/a&gt;&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The protocol is open (non proprietary), which means that its specification is in the public domain. The OSPF specification is published as &lt;strong&gt;Request For Comments (RFC) 1247&lt;/strong&gt;. This has allowed vendors around the world to produce products and devices that fully support OSPF, without the need of paying any royalty licenses. This also played a major role in making OSPF as a widely acceptable routing protocol for small, medium and large networks.&lt;/p&gt;
&lt;h4&gt;&lt;a id=&quot;ospf-dijkstra-spf-algorithm&quot;&gt;OSPF - Dijkstra SPF Algorithm&lt;/a&gt;&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The second principal characteristic is that OSPF is based on the SPF algorithm, which sometimes is referred to as the Dijkstra algorithm, named for the person credited with its creation.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The SPF algorithm calculates the shortest path by constructing a graph of the network, assigning costs to the links based on their bandwidth and determining the shortest path from each router to every other router in the network. The algorithm ensures that the path chosen has the lowest cost and that the route is loop-free, providing fast and efficient communication across the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The SPF algorithm also helps to ensure network stability and performance by quickly detecting changes in the network topology and recalculating the shortest path. When a change occurs, such as a link failure or a new link being added to the network, OSPF sends out Link State Advertisement (LSA) messages to inform all routers in the network of the change. The routers then use the SPF algorithm to recalculate the shortest path to the destination network based on the updated network topology. This ensures that the network continues to operate efficiently and that data is routed along the most optimal path.&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;ospf-link-state-routing-protocol&quot;&gt;OSPF - A Link State Routing Protocol&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;OSPF is a &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/link-state-routing.html&quot; target=&quot;_blank&quot; title=&quot;Link State routing protocol&quot;&gt;Link State routing protocol&lt;/a&gt; that calls for the sending of &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html&quot; target=&quot;_blank&quot; title=&quot;link-state advertisements (LSAs)&quot;&gt;link-state advertisements (LSAs)&lt;/a&gt; to all other routers within the same hierarchical area. Information on attached interfaces, metrics used, and other variables is included in &lt;strong&gt;OSPF LSAs&lt;/strong&gt;. As OSPF routers accumulate link-state information, they use the SPF algorithm to calculate the shortest path to each node.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As a &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/link-state-routing.html&quot; target=&quot;_blank&quot; title=&quot;Link State routing protocol&quot;&gt;Link State routing protocol&lt;/a&gt;, OSPF contrasts with &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-rip.html&quot; target=&quot;_blank&quot; title=&quot;RIP&quot;&gt;RIP &lt;/a&gt;and &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-igrp.html&quot; target=&quot;_blank&quot; title=&quot;IGRP&quot;&gt;IGRP&lt;/a&gt;, which are &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/distance-vector.html&quot; target=&quot;_blank&quot; title=&quot;Distance Vector routing protocols&quot;&gt;Distance Vector routing protocols&lt;/a&gt;. Routers running the Distance Vector algorithm send all or a portion of their routing tables in routing-update messages to their neighbors.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Additional OSPF features include equal-cost, multipath routing, and routing based on upper-layer type-of-service (TOS) requests. TOS-based routing supports those upper-layer protocols that can specify particular types of service. An application, for example, might specify that certain data is urgent. If OSPF has high-priority links at its disposal, these can be used to transport the urgent datagram.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;OSPF supports one or more metrics. If only one metric is used, it is considered to be arbitrary, and TOS is not supported. If more than one metric is used, TOS is optionally supported through the use of a separate metric (and, therefore, a separate routing table) for each of the eight combinations created by the three IP TOS bits (the delay, throughput, and reliability bits). If, for example, the IP TOS bits specify low delay, low throughput, and high reliability, OSPF calculates routes to all destinations based on this TOS designation.&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article introduced the &lt;strong&gt;OSPF routing protocol&lt;/strong&gt;. It provided an overview of the routing protocol, its &lt;strong&gt;purpose&lt;/strong&gt;,&lt;strong&gt; capabilities&lt;/strong&gt;, and analyzed its &lt;strong&gt;structure&lt;/strong&gt; within an &lt;a href=&quot;https://www.firewall.cx/networking/ethernet/ethernet-ii.html&quot; target=&quot;_blank&quot; title=&quot;Ethernet II frame&quot;&gt;Ethernet II frame&lt;/a&gt;. The 'Type' field within the OSPF header was examined and we also saw the &lt;strong&gt;different type of messages&lt;/strong&gt; supported (&lt;strong&gt;Hello&lt;/strong&gt;, &lt;strong&gt;Database description&lt;/strong&gt;, &lt;strong&gt;Link-state Request&lt;/strong&gt;, &lt;strong&gt;Link-state Update&lt;/strong&gt; and &lt;strong&gt;Acknowledgment&lt;/strong&gt;).&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ospf-part1-intro.webp&quot; alt=&quot;OSPF - Part 1&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Open Shortest Path First (OSPF)&lt;/strong&gt; is a popular &lt;strong&gt;routing protocol&lt;/strong&gt; developed for Internet Protocol (IP) networks by the &lt;strong&gt;Interior Gateway Protocol&lt;/strong&gt; (&lt;strong&gt;IGP&lt;/strong&gt;) working group of the Internet Engineering Task Force (IETF). The working group was formed in 1988 to design an IGP based on the shortest path first (SPF) algorithm for use in the Internet. Similar to the &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-igrp.html&quot; target=&quot;_blank&quot; title=&quot;Interior Gateway Routing Protocol (IGRP)&quot;&gt;Interior Gateway Routing Protocol (IGRP)&lt;/a&gt;, OSPF was created because in the mid-1980s, the &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-rip.html&quot; target=&quot;_blank&quot; title=&quot;Routing Information Protocol (RIP)&quot;&gt;Routing Information Protocol (RIP)&lt;/a&gt; was increasingly unable to serve large, heterogeneous internetworks.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Article Key Topics:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#ospf-packet-structure-analysis&quot;&gt;OSPF Packet Structure &amp;amp; Analysis&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#ospf-type-field&quot;&gt;OSPF 'Type' Field&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#ospf-open-routing-protocol&quot;&gt;OSPF - The Open Routing Protocol&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;&lt;a href=&quot;https://www.firewall.cx/#ospf-dijkstra-spf-algorithm&quot;&gt;OSPF - Dijkstra SPF Algorithm&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;&lt;a href=&quot;https://www.firewall.cx/#ospf-link-state-routing-protocol&quot;&gt;OSPF - A Link State Routing Protocol&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot;&gt;Summary&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Below is a complete list of articles covering our &lt;strong&gt;OSPF Series&lt;/strong&gt;:&lt;/p&gt;
&lt;div&gt;- Part 1 (This article): Introduction, OSPF Packet Structure, OSPF Messages and Characteristics.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; title=&quot;Part 2: How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&quot;&gt;Part 2: How OSPF Protocol Works &amp;amp; Basic Concepts: OSPF Neighbor, Topology &amp;amp; Routing Table, OSPF Areas &amp;amp; Router Roles, Theory &amp;amp; Overview&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-forming-process-hello-packets-lsr-lsu.html&quot; target=&quot;_blank&quot; title=&quot;Part 3: OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU)&quot;&gt;Part 3: OSPF Adjacency &amp;amp; Neighbor Forming Process. OSPF Hello Messages, OSPF Database Updates via Link State Requests (LSR &amp;amp; LSU)&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-adjacency-neighbor-states-forming-process.html&quot; target=&quot;_blank&quot; title=&quot;Part 4: OSPF Neighbor States – OSPF Neighbor Forming Process&quot;&gt;Part 4: OSPF Neighbor States – OSPF Neighbor Forming Process&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;- &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html&quot; target=&quot;_blank&quot; title=&quot;Part 5: Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types&quot;&gt;Part 5: Analysis of OSPF Link State Update (LSU) - Link State Advertisement (LSA) Packet Structure. Common LSA Types&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;-&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsa-types-explained.html&quot; target=&quot;_blank&quot; title=&quot;Part 6: OSPF LSA Types - Purpose and Function of Every OSPF LSA&quot;&gt;Part 6: OSPF LSA Types - Purpose and Function of Every OSPF LSA&lt;/a&gt;.&lt;/div&gt;
&lt;h2&gt;&lt;a id=&quot;ospf-packet-structure-analysis&quot;&gt;OSPF Packet Structure &amp;amp; Analysis&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;OSPF is a &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/subnetting/subnetting-mask.html&quot; target=&quot;_blank&quot; title=&quot;classless&quot;&gt;classless&lt;/a&gt; routing protocol, which means that in its updates, it includes the subnet of each route it knows about, thus, enabling variable-length subnet masks. With variable-length subnet masks, an IP network can be broken into many subnets of various sizes. This provides network administrators with extra network-configuration flexibility.These updates are &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-multicast.html&quot; target=&quot;_blank&quot; title=&quot;what is multicast and how does it work?&quot;&gt;multicasts&lt;/a&gt; at specific addresses (224.0.0.5 and 224.0.0.6).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The diagram below shows us the information that each field of an &lt;strong&gt;OSPF packet&lt;/strong&gt; contains:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-1.gif&quot; alt=&quot;ospf-1&quot; width=&quot;630&quot; height=&quot;226&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; align=&quot;center&quot;&gt;The numbers shown inside the coloured blocks represent the field length in bytes.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/ospf-2.gif&quot; alt=&quot;ospf-2&quot; width=&quot;283&quot; height=&quot;539&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;All OSPF packets&lt;/strong&gt; begin with a &lt;strong&gt;24-byte header&lt;/strong&gt;, which is shown right above.&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;ospf-type-field&quot;&gt;OSPF 'Type' Field&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The '&lt;strong&gt;Type&lt;/strong&gt;' field (1-byte long) is a critical component of an &lt;strong&gt;OSPF&lt;/strong&gt; (&lt;strong&gt;Open Shortest Path First&lt;/strong&gt;) package. It indicates the &lt;strong&gt;type of OSPF message&lt;/strong&gt; contained within the package, such as a &lt;strong&gt;Hello message&lt;/strong&gt;, &lt;strong&gt;Link State Request message&lt;/strong&gt;, &lt;strong&gt;Link State Update message&lt;/strong&gt;, or &lt;strong&gt;Link State Acknowledgment message&lt;/strong&gt;. The type field plays a crucial role in the OSPF protocol by helping to ensure that routers exchange the correct types of messages with each other, enabling them to learn about the network topology and establish the shortest path to the destination network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Understanding the significance of the &quot;&lt;strong&gt;Type&lt;/strong&gt;&quot; field is essential for network administrators to troubleshoot OSPF network issues and optimize the performance of their networks. Below are the &lt;strong&gt;Type&lt;/strong&gt; field messages contained with a bit more information about their purpose and role:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;strong&gt;Hello&lt;/strong&gt;: Establishes and maintains neighbor relationships.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Database Description&lt;/strong&gt;: Describes the contents of the topological database. These messages are exchanged when an adjacency is initialized.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Link-state Request&lt;/strong&gt;: Requests pieces of the topological database from neighbor routers. These messages are exchanged after a router discovers (by examining database-description packets) that parts of its topological database are out of date.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Link-state Update&lt;/strong&gt;: Responds to a link-state request packet. These messages also are used for the regular dispersal of Link-State Acknowledgments (LSA). Several LSAs can be included within a single link-state update packet.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Link-state Acknowledgment&lt;/strong&gt;: Acknowledges link-state update packets.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;OSPF's Primary Characteristics&lt;/h2&gt;
&lt;h4&gt;&lt;a id=&quot;ospf-open-routing-protocol&quot;&gt;OSPF - The Open Routing Protocol&lt;/a&gt;&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The protocol is open (non proprietary), which means that its specification is in the public domain. The OSPF specification is published as &lt;strong&gt;Request For Comments (RFC) 1247&lt;/strong&gt;. This has allowed vendors around the world to produce products and devices that fully support OSPF, without the need of paying any royalty licenses. This also played a major role in making OSPF as a widely acceptable routing protocol for small, medium and large networks.&lt;/p&gt;
&lt;h4&gt;&lt;a id=&quot;ospf-dijkstra-spf-algorithm&quot;&gt;OSPF - Dijkstra SPF Algorithm&lt;/a&gt;&lt;/h4&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The second principal characteristic is that OSPF is based on the SPF algorithm, which sometimes is referred to as the Dijkstra algorithm, named for the person credited with its creation.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The SPF algorithm calculates the shortest path by constructing a graph of the network, assigning costs to the links based on their bandwidth and determining the shortest path from each router to every other router in the network. The algorithm ensures that the path chosen has the lowest cost and that the route is loop-free, providing fast and efficient communication across the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The SPF algorithm also helps to ensure network stability and performance by quickly detecting changes in the network topology and recalculating the shortest path. When a change occurs, such as a link failure or a new link being added to the network, OSPF sends out Link State Advertisement (LSA) messages to inform all routers in the network of the change. The routers then use the SPF algorithm to recalculate the shortest path to the destination network based on the updated network topology. This ensures that the network continues to operate efficiently and that data is routed along the most optimal path.&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;ospf-link-state-routing-protocol&quot;&gt;OSPF - A Link State Routing Protocol&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;OSPF is a &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/link-state-routing.html&quot; target=&quot;_blank&quot; title=&quot;Link State routing protocol&quot;&gt;Link State routing protocol&lt;/a&gt; that calls for the sending of &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html&quot; target=&quot;_blank&quot; title=&quot;link-state advertisements (LSAs)&quot;&gt;link-state advertisements (LSAs)&lt;/a&gt; to all other routers within the same hierarchical area. Information on attached interfaces, metrics used, and other variables is included in &lt;strong&gt;OSPF LSAs&lt;/strong&gt;. As OSPF routers accumulate link-state information, they use the SPF algorithm to calculate the shortest path to each node.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As a &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/link-state-routing.html&quot; target=&quot;_blank&quot; title=&quot;Link State routing protocol&quot;&gt;Link State routing protocol&lt;/a&gt;, OSPF contrasts with &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-rip.html&quot; target=&quot;_blank&quot; title=&quot;RIP&quot;&gt;RIP &lt;/a&gt;and &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-igrp.html&quot; target=&quot;_blank&quot; title=&quot;IGRP&quot;&gt;IGRP&lt;/a&gt;, which are &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/distance-vector.html&quot; target=&quot;_blank&quot; title=&quot;Distance Vector routing protocols&quot;&gt;Distance Vector routing protocols&lt;/a&gt;. Routers running the Distance Vector algorithm send all or a portion of their routing tables in routing-update messages to their neighbors.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Additional OSPF features include equal-cost, multipath routing, and routing based on upper-layer type-of-service (TOS) requests. TOS-based routing supports those upper-layer protocols that can specify particular types of service. An application, for example, might specify that certain data is urgent. If OSPF has high-priority links at its disposal, these can be used to transport the urgent datagram.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;OSPF supports one or more metrics. If only one metric is used, it is considered to be arbitrary, and TOS is not supported. If more than one metric is used, TOS is optionally supported through the use of a separate metric (and, therefore, a separate routing table) for each of the eight combinations created by the three IP TOS bits (the delay, throughput, and reliability bits). If, for example, the IP TOS bits specify low delay, low throughput, and high reliability, OSPF calculates routes to all destinations based on this TOS designation.&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article introduced the &lt;strong&gt;OSPF routing protocol&lt;/strong&gt;. It provided an overview of the routing protocol, its &lt;strong&gt;purpose&lt;/strong&gt;,&lt;strong&gt; capabilities&lt;/strong&gt;, and analyzed its &lt;strong&gt;structure&lt;/strong&gt; within an &lt;a href=&quot;https://www.firewall.cx/networking/ethernet/ethernet-ii.html&quot; target=&quot;_blank&quot; title=&quot;Ethernet II frame&quot;&gt;Ethernet II frame&lt;/a&gt;. The 'Type' field within the OSPF header was examined and we also saw the &lt;strong&gt;different type of messages&lt;/strong&gt; supported (&lt;strong&gt;Hello&lt;/strong&gt;, &lt;strong&gt;Database description&lt;/strong&gt;, &lt;strong&gt;Link-state Request&lt;/strong&gt;, &lt;strong&gt;Link-state Update&lt;/strong&gt; and &lt;strong&gt;Acknowledgment&lt;/strong&gt;).&lt;/p&gt;</content>
		<category term="Routing" />
	</entry>
	<entry>
		<title>Routing Information Protocol - RIP</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/routing-protocols/routing-protocol-rip.html"/>
		<published>2011-05-26T08:26:22+10:00</published>
		<updated>2011-05-26T08:26:22+10:00</updated>
		<id>https://www.firewall.cx/networking/routing-protocols/routing-protocol-rip.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/routing-protocol-rip-intro.webp&quot; alt=&quot;Routing Information Protocol - RIP&quot;&gt;&lt;/p&gt;&lt;div class=&quot;flex flex-grow flex-col gap-3&quot;&gt;
&lt;div class=&quot;min-h-[20px] flex flex-col items-start gap-4 whitespace-pre-wrap break-words&quot;&gt;
&lt;div class=&quot;markdown prose w-full break-words dark:prose-invert dark&quot;&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Routing Information Protocol (RIP)&lt;/strong&gt; is a &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/distance-vector.html&quot; target=&quot;_blank&quot; title=&quot;distance-vector routing protocol&quot;&gt;distance-vector routing protocol&lt;/a&gt; that is commonly used in small to medium-sized networks. It is one of the oldest routing protocols still in use today, having been developed in the 1980s. Despite its age, &lt;strong&gt;RIP&lt;/strong&gt; remains a popular choice due to its simplicity and ease of use.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Article Key Topics:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#how-rip-works&quot;&gt;How RIP Works&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#rip-versions&quot;&gt;RIP Versions&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#route-update-timer&quot;&gt;RIP Key Component: Route Update Time&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#route-invalid-timer&quot;&gt;RIP Key Component: Route Invalid Timer&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#route-flush-timer&quot;&gt;RIP Key Component: Route Flush Timer&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#advantages-of-rip&quot;&gt;Advantages of RIP&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#disadvantages-of-rip&quot;&gt;Disadvantages of RIP&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot;&gt;Summary&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;how-rip-works&quot;&gt;How RIP Works&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;RIP works by &lt;strong&gt;exchanging routing information&lt;/strong&gt; between routers using a hop count metric. Each router sends out updates at regular intervals, which contain information about the routes it knows about and the number of hops to reach those routes. Routers then use this information to build their routing tables, which they use to determine the best path to reach a destination network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One of the &lt;strong&gt;key features&lt;/strong&gt; of &lt;strong&gt;RIP&lt;/strong&gt; is that it &lt;strong&gt;limits the number of hops&lt;/strong&gt; a packet can travel, with a &lt;strong&gt;maximum of 15 hops&lt;/strong&gt; allowed. This means that &lt;strong&gt;RIP&lt;/strong&gt; is &lt;strong&gt;not suitable&lt;/strong&gt; for large networks or those with &lt;strong&gt;complex topologies&lt;/strong&gt;, as it may not be able to find the most efficient path to a destination network.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;rip-versions&quot;&gt;RIP Versions&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are two versions of RIP in use today: &lt;strong&gt;RIP version 1&lt;/strong&gt; (&lt;strong&gt;RIPv1&lt;/strong&gt;) and &lt;strong&gt;RIP version 2&lt;/strong&gt; (&lt;strong&gt;RIPv2&lt;/strong&gt;). &lt;strong&gt;RIPv1&lt;/strong&gt; is the original version of the protocol and is limited to &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/subnetting/subnetting-mask.html&quot; target=&quot;_blank&quot; title=&quot;classful&quot;&gt;classful&lt;/a&gt; routing, meaning that it does not support the use of subnet masks. This can cause problems in networks with multiple subnets. &lt;strong&gt;RIPv1&lt;/strong&gt; uses &lt;strong&gt;network broadcasts&lt;/strong&gt; (&lt;strong&gt;255.255.255.255&lt;/strong&gt;) to exchange messages, routes and information between routers.&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;RIPv2&lt;/strong&gt;, on the other hand, is a &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/subnetting/subnetting-mask.html&quot; target=&quot;_blank&quot; title=&quot;Classless&quot;&gt;classless&lt;/a&gt; routing protocol and supports the use of subnet masks. It also includes support for authentication, which helps to prevent unauthorized routers from participating in the network. &lt;strong&gt;RIPv2&lt;/strong&gt; uses multicasts (224.0.0.9) to exchange messages, routes and information between routers.&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;route-update-timer&quot;&gt;RIP Key Component: Route Update Timer&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;RIP Route Update Timer&lt;/strong&gt; is a critical component of the &lt;strong&gt;Routing Information Protocol (RIP)&lt;/strong&gt;. It determines how often routing updates are sent out by a router to inform other routers of the network topology. The default value for the &lt;strong&gt;update timer&lt;/strong&gt; is &lt;strong&gt;30 seconds&lt;/strong&gt;, meaning that &lt;strong&gt;updates&lt;/strong&gt; are sent out &lt;strong&gt;every 30 seconds&lt;/strong&gt;. However, this value can be tweaked to suit the needs of the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A &lt;strong&gt;shorter update timer&lt;/strong&gt; can lead to &lt;strong&gt;more frequent updates&lt;/strong&gt;, resulting in &lt;strong&gt;faster convergence times&lt;/strong&gt;, but can also &lt;strong&gt;increase network traffic&lt;/strong&gt;. A &lt;strong&gt;longer update timer&lt;/strong&gt; can &lt;strong&gt;reduce network traffic&lt;/strong&gt;, but may result in &lt;strong&gt;slower convergence times&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;route-invalid-timer&quot;&gt;RIP Key Component: Route Invalid Timer&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;RIP Route Invalid Timer&lt;/strong&gt; is another important component of the Routing Information Protocol (RIP). It determines how long a router will wait before considering a route as invalid or unusable. The default value for the invalid timer is 180 seconds, meaning that if a router does not receive an update for a route for 180 seconds, it will consider the route as invalid and remove it from its routing table. However, this value can be changed to suit the needs of the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A shorter route invalid timer can lead to more frequent updates, resulting in faster convergence times, but can also increase network traffic. A longer update timer can reduce network traffic, but may result in slower convergence times.&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;route-flush-timer&quot;&gt;RIP Key Component: Route Flush Timer&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;RIP Route Flush Timer&lt;/strong&gt; is a vital component of the Routing Information Protocol (RIP). It determines how long a router will wait before removing a route from its routing table after it has been declared invalid. The default value for the flush timer is 240 seconds, meaning that after a route has been declared invalid, the router will wait for 240 seconds before removing the route from its routing table. This delay ensures that any delayed or out-of-order packets that were en route to the destination can be delivered before the route is removed. However, this value can be changed to suit the needs of the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A shorter &lt;strong&gt;route flush timer&lt;/strong&gt; can lead to more frequent updates, resulting in faster convergence times, but can also increase network traffic. A longer update timer can reduce network traffic, but may result in slower convergence times.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;advantages-of-rip&quot;&gt;Advantages of RIP&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One of the main advantages of RIP is its simplicity. It is easy to configure and can be implemented quickly in small to medium-sized networks. It is also a widely supported protocol, meaning that it can be used with a range of networking equipment from different vendors.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Another advantage of RIP is its stability. The protocol is designed to prevent routing loops from occurring, which can help to ensure the stability and reliability of the network.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;disadvantages-of-rip&quot;&gt;Disadvantages of RIP&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Despite its advantages, RIP has some limitations that can make it unsuitable for larger or more complex networks. One of these limitations is its hop count metric, which can lead to suboptimal routing decisions in networks with &lt;strong&gt;more than 15 hops&lt;/strong&gt; between routers.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Another disadvantage of RIP is its slow convergence time. When a network topology changes, it can take several minutes for the routers to update their routing tables, which can lead to network downtime.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;RIP&lt;/strong&gt; is a simple and easy-to-use routing protocol that is still widely used in &lt;strong&gt;small&lt;/strong&gt; to &lt;strong&gt;medium-sized&lt;/strong&gt; networks today. Its &lt;strong&gt;hop count metric&lt;/strong&gt; and &lt;strong&gt;slow convergence time&lt;/strong&gt; can make it &lt;strong&gt;unsuitable&lt;/strong&gt; for &lt;strong&gt;larger or more complex networks&lt;/strong&gt;, but for smaller networks, it remains a &lt;strong&gt;reliable and stable routing protocol&lt;/strong&gt;. The introduction of &lt;strong&gt;RIPv2&lt;/strong&gt; has addressed some of the limitations of the original protocol, making it a more versatile option for modern networks. Ultimately, the choice of routing protocol will depend on the specific needs of the network and the resources available for implementation and maintenance.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/routing-protocol-rip-intro.webp&quot; alt=&quot;Routing Information Protocol - RIP&quot;&gt;&lt;/p&gt;&lt;div class=&quot;flex flex-grow flex-col gap-3&quot;&gt;
&lt;div class=&quot;min-h-[20px] flex flex-col items-start gap-4 whitespace-pre-wrap break-words&quot;&gt;
&lt;div class=&quot;markdown prose w-full break-words dark:prose-invert dark&quot;&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Routing Information Protocol (RIP)&lt;/strong&gt; is a &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/distance-vector.html&quot; target=&quot;_blank&quot; title=&quot;distance-vector routing protocol&quot;&gt;distance-vector routing protocol&lt;/a&gt; that is commonly used in small to medium-sized networks. It is one of the oldest routing protocols still in use today, having been developed in the 1980s. Despite its age, &lt;strong&gt;RIP&lt;/strong&gt; remains a popular choice due to its simplicity and ease of use.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Article Key Topics:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#how-rip-works&quot;&gt;How RIP Works&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#rip-versions&quot;&gt;RIP Versions&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#route-update-timer&quot;&gt;RIP Key Component: Route Update Time&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#route-invalid-timer&quot;&gt;RIP Key Component: Route Invalid Timer&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#route-flush-timer&quot;&gt;RIP Key Component: Route Flush Timer&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#advantages-of-rip&quot;&gt;Advantages of RIP&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#disadvantages-of-rip&quot;&gt;Disadvantages of RIP&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot;&gt;Summary&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;how-rip-works&quot;&gt;How RIP Works&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;RIP works by &lt;strong&gt;exchanging routing information&lt;/strong&gt; between routers using a hop count metric. Each router sends out updates at regular intervals, which contain information about the routes it knows about and the number of hops to reach those routes. Routers then use this information to build their routing tables, which they use to determine the best path to reach a destination network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One of the &lt;strong&gt;key features&lt;/strong&gt; of &lt;strong&gt;RIP&lt;/strong&gt; is that it &lt;strong&gt;limits the number of hops&lt;/strong&gt; a packet can travel, with a &lt;strong&gt;maximum of 15 hops&lt;/strong&gt; allowed. This means that &lt;strong&gt;RIP&lt;/strong&gt; is &lt;strong&gt;not suitable&lt;/strong&gt; for large networks or those with &lt;strong&gt;complex topologies&lt;/strong&gt;, as it may not be able to find the most efficient path to a destination network.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;rip-versions&quot;&gt;RIP Versions&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are two versions of RIP in use today: &lt;strong&gt;RIP version 1&lt;/strong&gt; (&lt;strong&gt;RIPv1&lt;/strong&gt;) and &lt;strong&gt;RIP version 2&lt;/strong&gt; (&lt;strong&gt;RIPv2&lt;/strong&gt;). &lt;strong&gt;RIPv1&lt;/strong&gt; is the original version of the protocol and is limited to &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/subnetting/subnetting-mask.html&quot; target=&quot;_blank&quot; title=&quot;classful&quot;&gt;classful&lt;/a&gt; routing, meaning that it does not support the use of subnet masks. This can cause problems in networks with multiple subnets. &lt;strong&gt;RIPv1&lt;/strong&gt; uses &lt;strong&gt;network broadcasts&lt;/strong&gt; (&lt;strong&gt;255.255.255.255&lt;/strong&gt;) to exchange messages, routes and information between routers.&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;RIPv2&lt;/strong&gt;, on the other hand, is a &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/subnetting/subnetting-mask.html&quot; target=&quot;_blank&quot; title=&quot;Classless&quot;&gt;classless&lt;/a&gt; routing protocol and supports the use of subnet masks. It also includes support for authentication, which helps to prevent unauthorized routers from participating in the network. &lt;strong&gt;RIPv2&lt;/strong&gt; uses multicasts (224.0.0.9) to exchange messages, routes and information between routers.&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;route-update-timer&quot;&gt;RIP Key Component: Route Update Timer&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;RIP Route Update Timer&lt;/strong&gt; is a critical component of the &lt;strong&gt;Routing Information Protocol (RIP)&lt;/strong&gt;. It determines how often routing updates are sent out by a router to inform other routers of the network topology. The default value for the &lt;strong&gt;update timer&lt;/strong&gt; is &lt;strong&gt;30 seconds&lt;/strong&gt;, meaning that &lt;strong&gt;updates&lt;/strong&gt; are sent out &lt;strong&gt;every 30 seconds&lt;/strong&gt;. However, this value can be tweaked to suit the needs of the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A &lt;strong&gt;shorter update timer&lt;/strong&gt; can lead to &lt;strong&gt;more frequent updates&lt;/strong&gt;, resulting in &lt;strong&gt;faster convergence times&lt;/strong&gt;, but can also &lt;strong&gt;increase network traffic&lt;/strong&gt;. A &lt;strong&gt;longer update timer&lt;/strong&gt; can &lt;strong&gt;reduce network traffic&lt;/strong&gt;, but may result in &lt;strong&gt;slower convergence times&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;route-invalid-timer&quot;&gt;RIP Key Component: Route Invalid Timer&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;RIP Route Invalid Timer&lt;/strong&gt; is another important component of the Routing Information Protocol (RIP). It determines how long a router will wait before considering a route as invalid or unusable. The default value for the invalid timer is 180 seconds, meaning that if a router does not receive an update for a route for 180 seconds, it will consider the route as invalid and remove it from its routing table. However, this value can be changed to suit the needs of the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A shorter route invalid timer can lead to more frequent updates, resulting in faster convergence times, but can also increase network traffic. A longer update timer can reduce network traffic, but may result in slower convergence times.&lt;/p&gt;
&lt;h2&gt;&lt;a id=&quot;route-flush-timer&quot;&gt;RIP Key Component: Route Flush Timer&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;RIP Route Flush Timer&lt;/strong&gt; is a vital component of the Routing Information Protocol (RIP). It determines how long a router will wait before removing a route from its routing table after it has been declared invalid. The default value for the flush timer is 240 seconds, meaning that after a route has been declared invalid, the router will wait for 240 seconds before removing the route from its routing table. This delay ensures that any delayed or out-of-order packets that were en route to the destination can be delivered before the route is removed. However, this value can be changed to suit the needs of the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A shorter &lt;strong&gt;route flush timer&lt;/strong&gt; can lead to more frequent updates, resulting in faster convergence times, but can also increase network traffic. A longer update timer can reduce network traffic, but may result in slower convergence times.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;advantages-of-rip&quot;&gt;Advantages of RIP&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;One of the main advantages of RIP is its simplicity. It is easy to configure and can be implemented quickly in small to medium-sized networks. It is also a widely supported protocol, meaning that it can be used with a range of networking equipment from different vendors.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Another advantage of RIP is its stability. The protocol is designed to prevent routing loops from occurring, which can help to ensure the stability and reliability of the network.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;disadvantages-of-rip&quot;&gt;Disadvantages of RIP&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Despite its advantages, RIP has some limitations that can make it unsuitable for larger or more complex networks. One of these limitations is its hop count metric, which can lead to suboptimal routing decisions in networks with &lt;strong&gt;more than 15 hops&lt;/strong&gt; between routers.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Another disadvantage of RIP is its slow convergence time. When a network topology changes, it can take several minutes for the routers to update their routing tables, which can lead to network downtime.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;RIP&lt;/strong&gt; is a simple and easy-to-use routing protocol that is still widely used in &lt;strong&gt;small&lt;/strong&gt; to &lt;strong&gt;medium-sized&lt;/strong&gt; networks today. Its &lt;strong&gt;hop count metric&lt;/strong&gt; and &lt;strong&gt;slow convergence time&lt;/strong&gt; can make it &lt;strong&gt;unsuitable&lt;/strong&gt; for &lt;strong&gt;larger or more complex networks&lt;/strong&gt;, but for smaller networks, it remains a &lt;strong&gt;reliable and stable routing protocol&lt;/strong&gt;. The introduction of &lt;strong&gt;RIPv2&lt;/strong&gt; has addressed some of the limitations of the original protocol, making it a more versatile option for modern networks. Ultimately, the choice of routing protocol will depend on the specific needs of the network and the resources available for implementation and maintenance.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;</content>
		<category term="Routing" />
	</entry>
	<entry>
		<title>Hybrid Routing Protocols - Advantages and Disadvantages - Comparison</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/routing-protocols/hybrid-routing.html"/>
		<published>2011-05-26T08:24:10+10:00</published>
		<updated>2011-05-26T08:24:10+10:00</updated>
		<id>https://www.firewall.cx/networking/routing-protocols/hybrid-routing.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/hybrid-routing-intro.webp&quot; alt=&quot;Hybrid Routing Protocols - Advantages &amp;amp; Disadvantages&quot;&gt;&lt;/p&gt;&lt;div class=&quot;flex flex-grow flex-col gap-3&quot;&gt;
&lt;div class=&quot;min-h-[20px] flex flex-col items-start gap-4 whitespace-pre-wrap break-words&quot;&gt;
&lt;div class=&quot;markdown prose w-full break-words dark:prose-invert dark&quot;&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Hybrid routing protocols&lt;/strong&gt; are a combination of &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/distance-vector.html&quot; target=&quot;_blank&quot; title=&quot;distance-vector routing protocols&quot;&gt;distance-vector&lt;/a&gt; and &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/link-state-routing.html&quot; target=&quot;_blank&quot; title=&quot;link-state routing protocols&quot;&gt;link-state&lt;/a&gt; routing protocols, and are used to provide a more efficient and scalable routing solution in larger networks. These protocols are particularly useful in environments where there are multiple paths available between nodes, and the network topology is subject to change.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Article Key Topics:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#how-do-hybrid-routing-protocols-work&quot;&gt;How do Hybrid Routing Protocol Work?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#advantages-of-hybrid-routing-protocols&quot;&gt;Advantages of Hybrid routing protocols&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#disadvantages-of-hybrid-routing-protocols&quot;&gt;Disadvantages of hybrid routing protocols&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#examples-of-hybrid-routing-protocols&quot;&gt;Examples of Hybrid routing protocols&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot;&gt;Summary&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;how-do-hybrid-routing-protocols-work&quot;&gt;How do hybrid routing protocols work?&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As mentioned earlier, &lt;strong&gt;Hybrid routing protocols&lt;/strong&gt; use a combination of &lt;strong&gt;distance-vector&lt;/strong&gt; and &lt;strong&gt;link-state&lt;/strong&gt; routing protocols to provide a more efficient and scalable routing solution, while &lt;strong&gt;distance-vector&lt;/strong&gt; routing protocols, such as &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-rip.html&quot; target=&quot;_blank&quot; title=&quot;Routing Information Protocol (RIP)&quot;&gt;Routing Information Protocol (RIP)&lt;/a&gt;, work by exchanging routing information between neighbors, with each router broadcasting its entire routing table periodically. Link-state routing protocols, such as &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; title=&quot;Open Shortest Path First (OSPF)&quot;&gt;Open Shortest Path First (OSPF)&lt;/a&gt;, work by distributing information about the state of links throughout the network, with routers constructing a complete map of the network topology.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Hybrid routing protocols&lt;/strong&gt; combine the best features of these two protocols. They use distance-vector routing for small, stable networks, and link-state routing for large, complex networks with changing topologies.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;advantages-of-hybrid-routing-protocols&quot;&gt;Advantages of hybrid routing protocols&lt;/a&gt;&lt;/h2&gt;
&lt;ol style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Scalability&lt;/strong&gt;: Hybrid routing protocols are highly scalable and can handle networks with thousands of nodes. This is because they use link-state routing to provide a more accurate view of the network topology, and distance-vector routing to reduce the number of updates required.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Faster convergence&lt;/strong&gt;: Hybrid routing protocols can converge quickly in the event of a network topology change, as they use both distance-vector and link-state routing to update routing tables.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Efficient use of bandwidth&lt;/strong&gt;: Hybrid routing protocols use distance-vector routing to reduce the amount of bandwidth used for updates. Instead of broadcasting the entire routing table, routers only send updates for changed routes.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Load balancing&lt;/strong&gt;: Hybrid routing protocols can distribute traffic across multiple paths, providing load balancing and increased network performance.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;disadvantages-of-hybrid-routing-protocols&quot;&gt;Disadvantages of hybrid routing protocols&lt;/a&gt;&lt;/h2&gt;
&lt;ol style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Complexity&lt;/strong&gt;: Hybrid routing protocols are more complex than either distance-vector or link-state routing protocols alone. This can make them difficult to configure and troubleshoot.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Resource-intensive&lt;/strong&gt;: Hybrid routing protocols require more memory and processing power than distance-vector or link-state routing protocols alone.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Susceptible to routing loops&lt;/strong&gt;: Hybrid routing protocols are susceptible to routing loops, which can occur when there are multiple paths between nodes and the routing protocol is not properly configured.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;examples-of-hybrid-routing-protocols&quot;&gt;Examples of hybrid routing protocols&lt;/a&gt;&lt;/h2&gt;
&lt;ol style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocols-eigrp.html&quot; target=&quot;_blank&quot; title=&quot;Enhanced Interior Gateway Routing Protocol (EIGRP)&quot;&gt;Enhanced Interior Gateway Routing Protocol (EIGRP)&lt;/a&gt;: EIGRP is a Cisco proprietary hybrid routing protocol that combines distance-vector and link-state routing. It uses a modified version of the Diffusing Update Algorithm (DUAL) to calculate routes and has several features that make it efficient and scalable, such as partial updates and route summarization.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Border Gateway Protocol&lt;/strong&gt; (&lt;strong&gt;BGP&lt;/strong&gt;): &lt;strong&gt;BGP&lt;/strong&gt; is an exterior gateway protocol (EGP) used to route traffic between different autonomous systems (AS). It is a hybrid routing protocol that uses both distance-vector and path-vector routing to determine the best path for traffic.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Hybrid routing protocols&lt;/strong&gt; are an effective solution for larger networks that require scalable and efficient routing. By combining distance-vector and link-state routing, hybrid routing protocols offer faster convergence, efficient use of bandwidth, load balancing, and scalability. However, they are also more complex and resource-intensive than either distance-vector or link-state routing protocols alone. Some examples of hybrid routing protocols include &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocols-eigrp.html&quot; title=&quot;EIGRP&quot;&gt;EIGRP&lt;/a&gt; and BGP.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/hybrid-routing-intro.webp&quot; alt=&quot;Hybrid Routing Protocols - Advantages &amp;amp; Disadvantages&quot;&gt;&lt;/p&gt;&lt;div class=&quot;flex flex-grow flex-col gap-3&quot;&gt;
&lt;div class=&quot;min-h-[20px] flex flex-col items-start gap-4 whitespace-pre-wrap break-words&quot;&gt;
&lt;div class=&quot;markdown prose w-full break-words dark:prose-invert dark&quot;&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Hybrid routing protocols&lt;/strong&gt; are a combination of &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/distance-vector.html&quot; target=&quot;_blank&quot; title=&quot;distance-vector routing protocols&quot;&gt;distance-vector&lt;/a&gt; and &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/link-state-routing.html&quot; target=&quot;_blank&quot; title=&quot;link-state routing protocols&quot;&gt;link-state&lt;/a&gt; routing protocols, and are used to provide a more efficient and scalable routing solution in larger networks. These protocols are particularly useful in environments where there are multiple paths available between nodes, and the network topology is subject to change.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Article Key Topics:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#how-do-hybrid-routing-protocols-work&quot;&gt;How do Hybrid Routing Protocol Work?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#advantages-of-hybrid-routing-protocols&quot;&gt;Advantages of Hybrid routing protocols&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#disadvantages-of-hybrid-routing-protocols&quot;&gt;Disadvantages of hybrid routing protocols&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#examples-of-hybrid-routing-protocols&quot;&gt;Examples of Hybrid routing protocols&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/#summary&quot;&gt;Summary&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;how-do-hybrid-routing-protocols-work&quot;&gt;How do hybrid routing protocols work?&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As mentioned earlier, &lt;strong&gt;Hybrid routing protocols&lt;/strong&gt; use a combination of &lt;strong&gt;distance-vector&lt;/strong&gt; and &lt;strong&gt;link-state&lt;/strong&gt; routing protocols to provide a more efficient and scalable routing solution, while &lt;strong&gt;distance-vector&lt;/strong&gt; routing protocols, such as &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-rip.html&quot; target=&quot;_blank&quot; title=&quot;Routing Information Protocol (RIP)&quot;&gt;Routing Information Protocol (RIP)&lt;/a&gt;, work by exchanging routing information between neighbors, with each router broadcasting its entire routing table periodically. Link-state routing protocols, such as &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-operation-basic-advanced-concepts-ospf-areas-roles-theory-overview.html&quot; target=&quot;_blank&quot; title=&quot;Open Shortest Path First (OSPF)&quot;&gt;Open Shortest Path First (OSPF)&lt;/a&gt;, work by distributing information about the state of links throughout the network, with routers constructing a complete map of the network topology.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Hybrid routing protocols&lt;/strong&gt; combine the best features of these two protocols. They use distance-vector routing for small, stable networks, and link-state routing for large, complex networks with changing topologies.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;advantages-of-hybrid-routing-protocols&quot;&gt;Advantages of hybrid routing protocols&lt;/a&gt;&lt;/h2&gt;
&lt;ol style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Scalability&lt;/strong&gt;: Hybrid routing protocols are highly scalable and can handle networks with thousands of nodes. This is because they use link-state routing to provide a more accurate view of the network topology, and distance-vector routing to reduce the number of updates required.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Faster convergence&lt;/strong&gt;: Hybrid routing protocols can converge quickly in the event of a network topology change, as they use both distance-vector and link-state routing to update routing tables.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Efficient use of bandwidth&lt;/strong&gt;: Hybrid routing protocols use distance-vector routing to reduce the amount of bandwidth used for updates. Instead of broadcasting the entire routing table, routers only send updates for changed routes.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Load balancing&lt;/strong&gt;: Hybrid routing protocols can distribute traffic across multiple paths, providing load balancing and increased network performance.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;disadvantages-of-hybrid-routing-protocols&quot;&gt;Disadvantages of hybrid routing protocols&lt;/a&gt;&lt;/h2&gt;
&lt;ol style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Complexity&lt;/strong&gt;: Hybrid routing protocols are more complex than either distance-vector or link-state routing protocols alone. This can make them difficult to configure and troubleshoot.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Resource-intensive&lt;/strong&gt;: Hybrid routing protocols require more memory and processing power than distance-vector or link-state routing protocols alone.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Susceptible to routing loops&lt;/strong&gt;: Hybrid routing protocols are susceptible to routing loops, which can occur when there are multiple paths between nodes and the routing protocol is not properly configured.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;examples-of-hybrid-routing-protocols&quot;&gt;Examples of hybrid routing protocols&lt;/a&gt;&lt;/h2&gt;
&lt;ol style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocols-eigrp.html&quot; target=&quot;_blank&quot; title=&quot;Enhanced Interior Gateway Routing Protocol (EIGRP)&quot;&gt;Enhanced Interior Gateway Routing Protocol (EIGRP)&lt;/a&gt;: EIGRP is a Cisco proprietary hybrid routing protocol that combines distance-vector and link-state routing. It uses a modified version of the Diffusing Update Algorithm (DUAL) to calculate routes and has several features that make it efficient and scalable, such as partial updates and route summarization.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Border Gateway Protocol&lt;/strong&gt; (&lt;strong&gt;BGP&lt;/strong&gt;): &lt;strong&gt;BGP&lt;/strong&gt; is an exterior gateway protocol (EGP) used to route traffic between different autonomous systems (AS). It is a hybrid routing protocol that uses both distance-vector and path-vector routing to determine the best path for traffic.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;&lt;a id=&quot;summary&quot;&gt;Summary&lt;/a&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Hybrid routing protocols&lt;/strong&gt; are an effective solution for larger networks that require scalable and efficient routing. By combining distance-vector and link-state routing, hybrid routing protocols offer faster convergence, efficient use of bandwidth, load balancing, and scalability. However, they are also more complex and resource-intensive than either distance-vector or link-state routing protocols alone. Some examples of hybrid routing protocols include &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocols-eigrp.html&quot; title=&quot;EIGRP&quot;&gt;EIGRP&lt;/a&gt; and BGP.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;</content>
		<category term="Routing" />
	</entry>
	<entry>
		<title>Link State Routing Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/routing-protocols/link-state-routing.html"/>
		<published>2011-05-26T08:17:36+10:00</published>
		<updated>2011-05-26T08:17:36+10:00</updated>
		<id>https://www.firewall.cx/networking/routing-protocols/link-state-routing.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/link-state-routing-protocols-intro.webp&quot; alt=&quot;Link State Routing Protocols&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Link State routing protocols&lt;/strong&gt; do not view networks in terms of adjacent routers and hop counts, but they build a comprehensive view of the overall network which fully describes the all possible routes along with their costs. Using the SPF (Shortest Path First) algorithm, the router creates a &quot;topological database&quot; which is a hierarchy reflecting the network routers it knows about. It then puts it's self on the top of this hierarchy, and has a complete picture from it's own perspective.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Link State protocols, unlike &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/distance-vector.html&quot; target=&quot;_blank&quot; title=&quot;Distance Vector&quot;&gt;Distance Vector&lt;/a&gt; broadcasts, use multicast.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-multicast.html&quot; target=&quot;_blank&quot; title=&quot;Multicast&quot;&gt;Multicast&lt;/a&gt; is a &quot;broadcast&quot; to a group of hosts, in this case routers (Please see the&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-multicast.html&quot; target=&quot;_blank&quot; title=&quot;Multicast&quot;&gt;multicast&lt;/a&gt; page for more information). So if we had 10 router of which 4 where part of a &quot;mutilcast group&quot; then, when we send out a multicast packet to this group, only these 4 routers will receive the updates, while the rest of them will simply ignore the data. The multicast address is usually &lt;strong&gt;224.0.0.5&lt;/strong&gt; &amp;amp; &lt;strong&gt;224.0.0.6&lt;/strong&gt;, this address is defined by the &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-igrp.html&quot; target=&quot;_blank&quot; title=&quot;Interior Gateway Routing Protocol&quot;&gt;Interior Gateway Routing Protocol&lt;/a&gt; (&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-igrp.html&quot; target=&quot;_blank&quot; title=&quot;IGRP&quot;&gt;IGRP&lt;/a&gt;).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When a router using a Link State protocol, such a &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html&quot; target=&quot;_blank&quot; title=&quot;Open Shortest Path First&quot;&gt;Open Shortest Path First&lt;/a&gt; (&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html&quot; target=&quot;_blank&quot; title=&quot;OSPF&quot;&gt;OSPF&lt;/a&gt;) knows about a change on the network, it will multicast this change instantly, there for flooding the network with this information. The information routers require to build their databases is provided in the form of &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html&quot; target=&quot;_blank&quot; title=&quot;Link State Advertisement Packets&quot;&gt;Link State Advertisement Packets&lt;/a&gt; (&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html&quot; target=&quot;_blank&quot; title=&quot;LSAP&quot;&gt;LSAP&lt;/a&gt;). Routers do not advertise their entire routing tables, instead each router advertises only its information regarding immediately adjacent routers.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Link State protocols in comparison to&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/distance-vector.html&quot; target=&quot;_blank&quot; title=&quot;Distance Vector&quot;&gt;Distance Vector&lt;/a&gt; protocols have:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;Big memory requirements&lt;/li&gt;
&lt;li&gt;Shortest path computations require many CPU circles&lt;/li&gt;
&lt;li&gt;If network is stable little bandwidth is used; react quickly to topology changes&lt;/li&gt;
&lt;li&gt;Announcements cannot be “filtered”. All items in the database must be sent to neighbors&lt;/li&gt;
&lt;li&gt;All neighbors must be trusted&lt;/li&gt;
&lt;li&gt;Authentication mechanisms can be used to avoid undesired adjacencies&lt;/li&gt;
&lt;li&gt;No split horizon techniques are possible&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Even though Link State protocols work more efficiently, problem can arise. Usually problems occur cause of changes in the network topology (links go up-down), and all routers don't get updated immediately cause they might be on different line speeds, there for, routers connected via a fast link will receive these changes faster than the others on a slower link.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Different techniques have been developed to deal with these problem and these are :&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;1) Dampen update frequency&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;2) Target link-state updates to multicast&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;3) Use link-state area hierarchy for topology&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;4) Exchange route summaries at area borders&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;5) Use Time-stamps Update numbering &amp;amp; counters&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;6) Manage partitions using a area hierarchy&lt;/p&gt;
&lt;p&gt;This completes out discussion around Link State Routing Protocols.&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/link-state-routing-protocols-intro.webp&quot; alt=&quot;Link State Routing Protocols&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Link State routing protocols&lt;/strong&gt; do not view networks in terms of adjacent routers and hop counts, but they build a comprehensive view of the overall network which fully describes the all possible routes along with their costs. Using the SPF (Shortest Path First) algorithm, the router creates a &quot;topological database&quot; which is a hierarchy reflecting the network routers it knows about. It then puts it's self on the top of this hierarchy, and has a complete picture from it's own perspective.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Link State protocols, unlike &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/distance-vector.html&quot; target=&quot;_blank&quot; title=&quot;Distance Vector&quot;&gt;Distance Vector&lt;/a&gt; broadcasts, use multicast.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-multicast.html&quot; target=&quot;_blank&quot; title=&quot;Multicast&quot;&gt;Multicast&lt;/a&gt; is a &quot;broadcast&quot; to a group of hosts, in this case routers (Please see the&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/network-multicast.html&quot; target=&quot;_blank&quot; title=&quot;Multicast&quot;&gt;multicast&lt;/a&gt; page for more information). So if we had 10 router of which 4 where part of a &quot;mutilcast group&quot; then, when we send out a multicast packet to this group, only these 4 routers will receive the updates, while the rest of them will simply ignore the data. The multicast address is usually &lt;strong&gt;224.0.0.5&lt;/strong&gt; &amp;amp; &lt;strong&gt;224.0.0.6&lt;/strong&gt;, this address is defined by the &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-igrp.html&quot; target=&quot;_blank&quot; title=&quot;Interior Gateway Routing Protocol&quot;&gt;Interior Gateway Routing Protocol&lt;/a&gt; (&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-igrp.html&quot; target=&quot;_blank&quot; title=&quot;IGRP&quot;&gt;IGRP&lt;/a&gt;).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When a router using a Link State protocol, such a &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html&quot; target=&quot;_blank&quot; title=&quot;Open Shortest Path First&quot;&gt;Open Shortest Path First&lt;/a&gt; (&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html&quot; target=&quot;_blank&quot; title=&quot;OSPF&quot;&gt;OSPF&lt;/a&gt;) knows about a change on the network, it will multicast this change instantly, there for flooding the network with this information. The information routers require to build their databases is provided in the form of &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html&quot; target=&quot;_blank&quot; title=&quot;Link State Advertisement Packets&quot;&gt;Link State Advertisement Packets&lt;/a&gt; (&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/ospf-lsu-lsa-packet-structure-lsa-types-overview.html&quot; target=&quot;_blank&quot; title=&quot;LSAP&quot;&gt;LSAP&lt;/a&gt;). Routers do not advertise their entire routing tables, instead each router advertises only its information regarding immediately adjacent routers.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Link State protocols in comparison to&amp;nbsp;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/distance-vector.html&quot; target=&quot;_blank&quot; title=&quot;Distance Vector&quot;&gt;Distance Vector&lt;/a&gt; protocols have:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;Big memory requirements&lt;/li&gt;
&lt;li&gt;Shortest path computations require many CPU circles&lt;/li&gt;
&lt;li&gt;If network is stable little bandwidth is used; react quickly to topology changes&lt;/li&gt;
&lt;li&gt;Announcements cannot be “filtered”. All items in the database must be sent to neighbors&lt;/li&gt;
&lt;li&gt;All neighbors must be trusted&lt;/li&gt;
&lt;li&gt;Authentication mechanisms can be used to avoid undesired adjacencies&lt;/li&gt;
&lt;li&gt;No split horizon techniques are possible&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Even though Link State protocols work more efficiently, problem can arise. Usually problems occur cause of changes in the network topology (links go up-down), and all routers don't get updated immediately cause they might be on different line speeds, there for, routers connected via a fast link will receive these changes faster than the others on a slower link.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Different techniques have been developed to deal with these problem and these are :&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;1) Dampen update frequency&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;2) Target link-state updates to multicast&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;3) Use link-state area hierarchy for topology&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;4) Exchange route summaries at area borders&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;5) Use Time-stamps Update numbering &amp;amp; counters&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;6) Manage partitions using a area hierarchy&lt;/p&gt;
&lt;p&gt;This completes out discussion around Link State Routing Protocols.&lt;/p&gt;</content>
		<category term="Routing" />
	</entry>
	<entry>
		<title>Distance Vector Routing Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/routing-protocols/distance-vector.html"/>
		<published>2011-05-25T06:37:59+10:00</published>
		<updated>2011-05-25T06:37:59+10:00</updated>
		<id>https://www.firewall.cx/networking/routing-protocols/distance-vector.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/distance-vector-routing-protocols-intro.webp&quot; alt=&quot;Distance Vector Routing Protocols&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong style=&quot;text-align: justify;&quot;&gt;Distance Vector&lt;/strong&gt; routing protocols use frequent broadcasts (255.255.255.255 or FF:FF:FF:FF) of their entire routing table every 30 sec. on all their interfaces in order to communicate with their neighbours. The bigger the routing tables, the more broadcasts. This methodology limits significantly the size of network on which Distance Vector can be used.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-rip.html&quot; target=&quot;_blank&quot; title=&quot;Routing Information Protocol (RIP)&quot;&gt;Routing Information Protocol (RIP)&lt;/a&gt; and &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocols-eigrp.html&quot; target=&quot;_blank&quot; title=&quot;Interior Gateway Routing Protocol (IGRP)&quot;&gt;Interior Gateway Routing Protocol (IGRP)&lt;/a&gt; are two very popular Distance Vector routing protocols. You can find links to more information on these protocols at the bottom of the page. (That's if you haven't had enough by the time you get there !)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/distance-vector.html&quot; target=&quot;_blank&quot; title=&quot;Distance Vector&quot;&gt;Distance Vector&lt;/a&gt; protocols view networks in terms of adjacent routers and hop counts, which also happens to be the metric used. The &quot;hop&quot; count (max of 15 for RIP, 16 is deemed unreachable and 255 for IGMP), will increase by one every time the packet transits through a router.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;So the router makes decisions about the way a packet will travel, based on the amount of hops it takes to reach the destination and if it had 2 different ways to get there, it will simply send it via the shortest path, regardless of the connection speed. This is known as pinhole congestion.&lt;/p&gt;
&lt;p&gt;Below is a typical routing table of a router which uses &lt;strong&gt;Distance Vector&lt;/strong&gt; routing protocols:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/distance-vector-1.gif&quot; alt=&quot;distance-vector-1&quot; width=&quot;624&quot; height=&quot;283&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Let's explain what is happening here:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In the above picture, you see 4 routers, each connected with its neighbour via some type of WAN link e.g ISDN.&lt;/p&gt;
&lt;p&gt;Now, when a router is powered on, it will immediately know about the networks to which each interface is directly connected. In this case &lt;strong&gt;Router B&lt;/strong&gt; knows that interface &lt;strong&gt;E0&lt;/strong&gt; is connected to the &lt;strong&gt;192.168.0.0&lt;/strong&gt; network and the &lt;strong&gt;S0&lt;/strong&gt; interface is connected to the &lt;strong&gt;192.168.10.0&lt;/strong&gt; network.&lt;/p&gt;
&lt;p&gt;Looking again at the routing table for &lt;strong&gt;Router B&lt;/strong&gt;, the numbers you see on the right hand side of the interfaces are the &quot;hop counts&quot; which, as mentioned, is the metric that distance vector protocols use to keep track on how far away a particular network is. Since these 2 networks are connected directly to the router's interface, they will have a value of zero (0) in the router's table entry. The same rule applies for every router in our example.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Remember we have &quot;just turn the routers on&quot;, so the network is now converging and that means that there is no data being passed. When I say &quot;no data&quot; I mean data from any computer or server that might be on any of the networks. During this &quot;convergence&quot; time, the only type of data being passed between the routers is that which allows them to populate their routing tables and after that's done, the routers will pass all other types of data between them. That's why a fast convergence time is a big advantage.&lt;/p&gt;
&lt;p&gt;One of the problems with &lt;strong&gt;RIP&lt;/strong&gt; is that it has a slow convergence time.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/distance-vector-2.gif&quot; alt=&quot;distance-vector-2&quot; width=&quot;624&quot; height=&quot;283&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Let's explain the above diagram:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In the above picture, the network is said to have &quot;converged&quot;, in other words, all routers on the network have populated their routing table and are completly aware of the networks they can contact. Since the network is now converged, computers in any of the above networks can contact each other.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Again, looking at one of the routing tables, you will notice the network address with the exit interface on the right and next to that is the hop count to that network. Remember that RIP will only count up to 15 hops, after which the packet is discarded (on hop 16).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Each router will broadcast its entire routing table every 30 seconds.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Routing based on &lt;strong&gt;Distance Vector&lt;/strong&gt; can cause a lot of problems when links go up and down, this could result in infinite loops and can also de-synchronise the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Routing loops can occur when every router is not updated close to the same time.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Let's have a look at the problem before we look at the various solutions:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/distance-vector-3.gif&quot; alt=&quot;distance-vector-3&quot; width=&quot;624&quot; height=&quot;232&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Let's explain the above:&lt;/p&gt;
&lt;p&gt;In the above picture you can see 5 routers of which routers &lt;strong&gt;A&lt;/strong&gt; and &lt;strong&gt;B&lt;/strong&gt; are connected with &lt;strong&gt;Router C&lt;/strong&gt;, and they all end up connecting via routers &lt;strong&gt;D&lt;/strong&gt; and &lt;strong&gt;E&lt;/strong&gt; to &lt;strong&gt;Network 5&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/distance-vector-4.gif&quot; alt=&quot;distance-vector-4&quot; width=&quot;624&quot; height=&quot;232&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As the above diagram shows, Network 5 suddenly fails.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/distance-vector-5.gif&quot; alt=&quot;distance-vector-5&quot; width=&quot;624&quot; height=&quot;232&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p&gt;All routers know about &lt;strong&gt;Network 5&lt;/strong&gt; from &lt;strong&gt;Router E&lt;/strong&gt;. For example, &lt;strong&gt;Router A&lt;/strong&gt;, in its tables, has a path to &lt;strong&gt;Network 5&lt;/strong&gt; through routers &lt;strong&gt;B&lt;/strong&gt;, &lt;strong&gt;D&lt;/strong&gt; and &lt;strong&gt;E&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When Network 5 fails, Router E knows about it since it's directly connected to it and tells Router D about it on its next update (when it will broadcast its entire routing table). This will result in Router D stopping routing data to Network 5 through Router E. But as you can see in the above picture, routers A B and C don't know about Network 5 yet, so they keep sending out update information. Router D will eventually send out its update and cause Router B to stop routing to Network 5, but routers A and C are still not updated. To them, it appear that Network 5 is still available through Router B with a metric of 3 !&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/distance-vector-6.gif&quot; alt=&quot;distance-vector-6&quot; width=&quot;624&quot; height=&quot;255&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now Router A sends its regular broadcast of its entire routing table which includes reachability for Network 5. Routers C and B receive the wonderful news that Network 5 can be reached from Router A, so they send out the information that Network 5 is now available !&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;From now on, any packet with a destination of Network 5 will go to Router A then to Router B and from there back to Router A (remember that Router B got the good news that Network 5 is available via Router A).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;So this is where things get a bit messy and you have that wonderful loop, where data just gets passed around from one router to another. Seems like they are playing ping pong :)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To deal with these problems we use the following techniques:&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Maximum Hop Count&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The routing loop we just looked at is called &quot;&lt;em&gt;counting to infinity&lt;/em&gt;&quot; and it is caused by gossip and wrong information being communicated between the routers. Without something to protect against this type of a loop, the hop count will keep on increasing each time the packet goes through a router ! One way of solving this problem is to define a maximum hop count. Distance Vector (RIP) permits a hop count of up to 15, so anything that needs 16 hops is unreachable. So if a loop occurred, it would go around the network until the packet reached a hop count of 15 and the next router would simply discard the packet.&lt;/p&gt;
&lt;h2&gt;Split Horizon&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Works on the principle that it's never useful to send information about a router back to the destination from which the original packet came. So if for example I told you a joke, it's pointless you telling me that joke again !&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In our example it would have prevented Router A from sending the updated information it received from Router B back to Router B.&lt;/p&gt;
&lt;h2&gt;Route Poisoning&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Alternative to split horizon, when a router receives information about a route from a particular network, the router advertises the route back to that network with the metric of 16, indicating that the destination is unreachable.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In our example, this means that when Network 5 goes down, Router E initiates router poisoning by entering a table entry for Network 5 as 16, which basically means it's unreachable. This way, Router D is not susceptible to any incorrect updates about the route to Network 5. When Router D receives a router poisoning from Router E, it sends an update called a poison reverse, back to Router E. This make sure all routes on the segment have received the poisoned route information.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Route poisoning, used with hold-downs (see section below) will certainly speed up convergence time because the neighboring routers don't have to wait 30 seconds before advertising the poisoned route.&lt;/p&gt;
&lt;h2&gt;Hold-Down Timers&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Routers keep an entry for the network-down state, allowing time for other routers to recompute for this topology change, this way, allowing time for either the downed router to come back or the network to stabilise somewhat before changing to the next best route.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When a router receives an update from a neighbor indicating that a previously accessible network is not working and is inaccessible, the hold-down timer will start. If a new update arrives from a neighbor with a better metric than the original network entry, the hold-down is removed and data is passed. But an update is received from a neighbor router before the hold-down timer expires and it has a lower metric than the previous route, therefore the update is ignored and the hold-down timer keeps ticking. This allows more time for the network to converge.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Hold-down timers use triggered updates, which reset the hold-down timer, to alert the neighbor's routers of a change in the network. Unlike update messages from neighbor routers, triggered updates create a new routing table that is sent immediatley to neighbor routers because a change was detected in the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are three instances when triggered updates will reset the hold-down timer:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;1) The hold-down timer expires&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;2) The router received a processing task proportional to the number of links in the internetwork.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;3) Another update is received indicating the network status has changed.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In our example, any update received by Router B from Router A, would not be accepted until the hold-down timer expires. This will ensure that Router B will not receive a &quot;false&quot; update from any routers that are not aware that Network 5 is unreachable. Router B will then send a update and correct the other routers' tables.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Distance Vector protocol&lt;/strong&gt; covered here on Firewall.cx include:&lt;/p&gt;
&lt;ul class=&quot;checkbox&quot;&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-rip.html&quot; target=&quot;_blank&quot; title=&quot;RIP - Routing Protocol&quot;&gt;Routing Information Protocol - RIP&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-igrp.html&quot; target=&quot;_blank&quot; title=&quot;IGRP - Interior Gateway Routing Protocol&quot;&gt;IGRP - Interior Gateway Routing Protocol&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/distance-vector-routing-protocols-intro.webp&quot; alt=&quot;Distance Vector Routing Protocols&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong style=&quot;text-align: justify;&quot;&gt;Distance Vector&lt;/strong&gt; routing protocols use frequent broadcasts (255.255.255.255 or FF:FF:FF:FF) of their entire routing table every 30 sec. on all their interfaces in order to communicate with their neighbours. The bigger the routing tables, the more broadcasts. This methodology limits significantly the size of network on which Distance Vector can be used.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-rip.html&quot; target=&quot;_blank&quot; title=&quot;Routing Information Protocol (RIP)&quot;&gt;Routing Information Protocol (RIP)&lt;/a&gt; and &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocols-eigrp.html&quot; target=&quot;_blank&quot; title=&quot;Interior Gateway Routing Protocol (IGRP)&quot;&gt;Interior Gateway Routing Protocol (IGRP)&lt;/a&gt; are two very popular Distance Vector routing protocols. You can find links to more information on these protocols at the bottom of the page. (That's if you haven't had enough by the time you get there !)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/distance-vector.html&quot; target=&quot;_blank&quot; title=&quot;Distance Vector&quot;&gt;Distance Vector&lt;/a&gt; protocols view networks in terms of adjacent routers and hop counts, which also happens to be the metric used. The &quot;hop&quot; count (max of 15 for RIP, 16 is deemed unreachable and 255 for IGMP), will increase by one every time the packet transits through a router.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;So the router makes decisions about the way a packet will travel, based on the amount of hops it takes to reach the destination and if it had 2 different ways to get there, it will simply send it via the shortest path, regardless of the connection speed. This is known as pinhole congestion.&lt;/p&gt;
&lt;p&gt;Below is a typical routing table of a router which uses &lt;strong&gt;Distance Vector&lt;/strong&gt; routing protocols:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/distance-vector-1.gif&quot; alt=&quot;distance-vector-1&quot; width=&quot;624&quot; height=&quot;283&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Let's explain what is happening here:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In the above picture, you see 4 routers, each connected with its neighbour via some type of WAN link e.g ISDN.&lt;/p&gt;
&lt;p&gt;Now, when a router is powered on, it will immediately know about the networks to which each interface is directly connected. In this case &lt;strong&gt;Router B&lt;/strong&gt; knows that interface &lt;strong&gt;E0&lt;/strong&gt; is connected to the &lt;strong&gt;192.168.0.0&lt;/strong&gt; network and the &lt;strong&gt;S0&lt;/strong&gt; interface is connected to the &lt;strong&gt;192.168.10.0&lt;/strong&gt; network.&lt;/p&gt;
&lt;p&gt;Looking again at the routing table for &lt;strong&gt;Router B&lt;/strong&gt;, the numbers you see on the right hand side of the interfaces are the &quot;hop counts&quot; which, as mentioned, is the metric that distance vector protocols use to keep track on how far away a particular network is. Since these 2 networks are connected directly to the router's interface, they will have a value of zero (0) in the router's table entry. The same rule applies for every router in our example.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Remember we have &quot;just turn the routers on&quot;, so the network is now converging and that means that there is no data being passed. When I say &quot;no data&quot; I mean data from any computer or server that might be on any of the networks. During this &quot;convergence&quot; time, the only type of data being passed between the routers is that which allows them to populate their routing tables and after that's done, the routers will pass all other types of data between them. That's why a fast convergence time is a big advantage.&lt;/p&gt;
&lt;p&gt;One of the problems with &lt;strong&gt;RIP&lt;/strong&gt; is that it has a slow convergence time.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/distance-vector-2.gif&quot; alt=&quot;distance-vector-2&quot; width=&quot;624&quot; height=&quot;283&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Let's explain the above diagram:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In the above picture, the network is said to have &quot;converged&quot;, in other words, all routers on the network have populated their routing table and are completly aware of the networks they can contact. Since the network is now converged, computers in any of the above networks can contact each other.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Again, looking at one of the routing tables, you will notice the network address with the exit interface on the right and next to that is the hop count to that network. Remember that RIP will only count up to 15 hops, after which the packet is discarded (on hop 16).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Each router will broadcast its entire routing table every 30 seconds.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Routing based on &lt;strong&gt;Distance Vector&lt;/strong&gt; can cause a lot of problems when links go up and down, this could result in infinite loops and can also de-synchronise the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Routing loops can occur when every router is not updated close to the same time.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Let's have a look at the problem before we look at the various solutions:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/distance-vector-3.gif&quot; alt=&quot;distance-vector-3&quot; width=&quot;624&quot; height=&quot;232&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Let's explain the above:&lt;/p&gt;
&lt;p&gt;In the above picture you can see 5 routers of which routers &lt;strong&gt;A&lt;/strong&gt; and &lt;strong&gt;B&lt;/strong&gt; are connected with &lt;strong&gt;Router C&lt;/strong&gt;, and they all end up connecting via routers &lt;strong&gt;D&lt;/strong&gt; and &lt;strong&gt;E&lt;/strong&gt; to &lt;strong&gt;Network 5&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/distance-vector-4.gif&quot; alt=&quot;distance-vector-4&quot; width=&quot;624&quot; height=&quot;232&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As the above diagram shows, Network 5 suddenly fails.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/distance-vector-5.gif&quot; alt=&quot;distance-vector-5&quot; width=&quot;624&quot; height=&quot;232&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p&gt;All routers know about &lt;strong&gt;Network 5&lt;/strong&gt; from &lt;strong&gt;Router E&lt;/strong&gt;. For example, &lt;strong&gt;Router A&lt;/strong&gt;, in its tables, has a path to &lt;strong&gt;Network 5&lt;/strong&gt; through routers &lt;strong&gt;B&lt;/strong&gt;, &lt;strong&gt;D&lt;/strong&gt; and &lt;strong&gt;E&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When Network 5 fails, Router E knows about it since it's directly connected to it and tells Router D about it on its next update (when it will broadcast its entire routing table). This will result in Router D stopping routing data to Network 5 through Router E. But as you can see in the above picture, routers A B and C don't know about Network 5 yet, so they keep sending out update information. Router D will eventually send out its update and cause Router B to stop routing to Network 5, but routers A and C are still not updated. To them, it appear that Network 5 is still available through Router B with a metric of 3 !&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/distance-vector-6.gif&quot; alt=&quot;distance-vector-6&quot; width=&quot;624&quot; height=&quot;255&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now Router A sends its regular broadcast of its entire routing table which includes reachability for Network 5. Routers C and B receive the wonderful news that Network 5 can be reached from Router A, so they send out the information that Network 5 is now available !&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;From now on, any packet with a destination of Network 5 will go to Router A then to Router B and from there back to Router A (remember that Router B got the good news that Network 5 is available via Router A).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;So this is where things get a bit messy and you have that wonderful loop, where data just gets passed around from one router to another. Seems like they are playing ping pong :)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To deal with these problems we use the following techniques:&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Maximum Hop Count&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The routing loop we just looked at is called &quot;&lt;em&gt;counting to infinity&lt;/em&gt;&quot; and it is caused by gossip and wrong information being communicated between the routers. Without something to protect against this type of a loop, the hop count will keep on increasing each time the packet goes through a router ! One way of solving this problem is to define a maximum hop count. Distance Vector (RIP) permits a hop count of up to 15, so anything that needs 16 hops is unreachable. So if a loop occurred, it would go around the network until the packet reached a hop count of 15 and the next router would simply discard the packet.&lt;/p&gt;
&lt;h2&gt;Split Horizon&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Works on the principle that it's never useful to send information about a router back to the destination from which the original packet came. So if for example I told you a joke, it's pointless you telling me that joke again !&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In our example it would have prevented Router A from sending the updated information it received from Router B back to Router B.&lt;/p&gt;
&lt;h2&gt;Route Poisoning&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Alternative to split horizon, when a router receives information about a route from a particular network, the router advertises the route back to that network with the metric of 16, indicating that the destination is unreachable.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In our example, this means that when Network 5 goes down, Router E initiates router poisoning by entering a table entry for Network 5 as 16, which basically means it's unreachable. This way, Router D is not susceptible to any incorrect updates about the route to Network 5. When Router D receives a router poisoning from Router E, it sends an update called a poison reverse, back to Router E. This make sure all routes on the segment have received the poisoned route information.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Route poisoning, used with hold-downs (see section below) will certainly speed up convergence time because the neighboring routers don't have to wait 30 seconds before advertising the poisoned route.&lt;/p&gt;
&lt;h2&gt;Hold-Down Timers&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Routers keep an entry for the network-down state, allowing time for other routers to recompute for this topology change, this way, allowing time for either the downed router to come back or the network to stabilise somewhat before changing to the next best route.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When a router receives an update from a neighbor indicating that a previously accessible network is not working and is inaccessible, the hold-down timer will start. If a new update arrives from a neighbor with a better metric than the original network entry, the hold-down is removed and data is passed. But an update is received from a neighbor router before the hold-down timer expires and it has a lower metric than the previous route, therefore the update is ignored and the hold-down timer keeps ticking. This allows more time for the network to converge.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Hold-down timers use triggered updates, which reset the hold-down timer, to alert the neighbor's routers of a change in the network. Unlike update messages from neighbor routers, triggered updates create a new routing table that is sent immediatley to neighbor routers because a change was detected in the network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There are three instances when triggered updates will reset the hold-down timer:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;1) The hold-down timer expires&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;2) The router received a processing task proportional to the number of links in the internetwork.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;3) Another update is received indicating the network status has changed.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In our example, any update received by Router B from Router A, would not be accepted until the hold-down timer expires. This will ensure that Router B will not receive a &quot;false&quot; update from any routers that are not aware that Network 5 is unreachable. Router B will then send a update and correct the other routers' tables.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Distance Vector protocol&lt;/strong&gt; covered here on Firewall.cx include:&lt;/p&gt;
&lt;ul class=&quot;checkbox&quot;&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-rip.html&quot; target=&quot;_blank&quot; title=&quot;RIP - Routing Protocol&quot;&gt;Routing Information Protocol - RIP&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols/routing-protocol-igrp.html&quot; target=&quot;_blank&quot; title=&quot;IGRP - Interior Gateway Routing Protocol&quot;&gt;IGRP - Interior Gateway Routing Protocol&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content>
		<category term="Routing" />
	</entry>
	<entry>
		<title>The IP Routing Process - Step-by-Step Analysis</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/routing-protocols/routing-process.html"/>
		<published>2011-05-24T07:06:15+10:00</published>
		<updated>2011-05-24T07:06:15+10:00</updated>
		<id>https://www.firewall.cx/networking/routing-protocols/routing-process.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ip-routing-process-intro.webp&quot; alt=&quot;IP Routing Process&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;We are going to analyse what happens when routing occurs on a network (&lt;strong&gt;IP routing process&lt;/strong&gt;). When I was new to the networking area, I thought that all you needed was the IP Address of the machine you wanted to contact but so little did I know. You actually need a bit more information than just the IP Address !&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The process we are going to explain is fairly simple and doesn't really change, no matter how big your network is.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The Example:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In our example, we have 2 networks, Network A and Network B. Both networks are connected via a router (Router A) which has 2 interfaces: E0 and E1. These interfaces are just like the interface on your network card (RJ-45), but built into the router.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Now, we are going to describe step by step what happens when Host A (Network A) wants to communicate with Host B (Network B) which is on a different network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ip-routing-0.gif&quot; alt=&quot;ip-routing-0&quot; width=&quot;624&quot; height=&quot;227&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;1) Host A opens a command prompt and enters &amp;gt;Ping 200.200.200.5.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;2) IP works with the Address Resolution Protocol (ARP) to determine which network this packet is destined for by looking at the &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/ip-protocol.html&quot; target=&quot;_blank&quot; title=&quot;IP address&quot;&gt;IP address&lt;/a&gt; and the subnet mask of Host A. Since this is a request for a remote host, which means it is not destined to be sent to a host on the local network, the packet must be sent to the router (the gateway for Network A) so that it can be routed to the correct remote network (which is Network B).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;3) Now, for Host A to send the packet to the router, it needs to know the hardware address of the router's interface which is connected to its network (Network A), in case you didn't realise, we are talking about the &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/mac-addresses.html&quot; target=&quot;_blank&quot; title=&quot;MAC address (Media Access Control)&quot;&gt;MAC (Media Access Control) address&lt;/a&gt; of interface E0. To get the hardware address, Host A looks in its ARP cache - a memory location where these MAC addresses are stored for a few seconds.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ip-routing-1.gif&quot; alt=&quot;ip-routing-1&quot; width=&quot;624&quot; height=&quot;227&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p&gt;4) If it doesn't find it in there it means that either a long time has passed since it last contacted the router or it simply hasn't resolved the IP address of the router (192.168.0.1) to a hardware address (MAC). So it then sends an ARP broadcast. This broadcast contains the following &quot;What is the hardware (MAC) address for IP 192.168.0.1 ? &quot;. The router identifies that IP address as its own and must answer, so it sends back to Host A a reply, giving it the MAC address of its E0 interface. This is also one of the reasons why sometimes the first &quot;ping&quot; will timeout. Because it takes some time for an ARP to be sent and the requested machine to respond with its MAC address, by the time all that happens, the TTL (Time To Live) of the first ping packet has expired, so it times out!&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ip-routing-2.gif&quot; alt=&quot;ip-routing-2&quot; width=&quot;624&quot; height=&quot;227&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;br /&gt;5) The router responds with the hardware address of its E0 interface, to which the 192.168.0.1 IP is bound. Host A now has everything it needs in order to transmit a packet out on the local network to the router. Now, the Network Layer hands down to the Datalink Layer the packet it generated with the ping (ICMP echo request), along with the hardware address of the router. This packet includes the source and destination IP address as well as the ICMP echo request which was specified in the Network Layer.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ip-routing-3.gif&quot; alt=&quot;ip-routing-3&quot; width=&quot;578&quot; height=&quot;173&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;6)&amp;nbsp;The &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer2.html&quot; target=&quot;_blank&quot; title=&quot;Datalink Layer&quot;&gt;Datalink Layer&lt;/a&gt; of Host A creates a frame, which encapsulates the packet with the information needed to transmit on the local network. This includes the source and destination hardware address (MAC) and the type field which specifies the Network Layer protocol e.g IPv4 (that's the IP version we use), ARP. At the end of the frame, in the FCS portion of the frame, the Datalink Layer will stick a Cyclic Redundancy Check (CRC) to make sure the receiving machine (the router) can figure out if the frame it received has been corrupted. To learn more on how the frame is created, visit the &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-data-encapsulation.html&quot; target=&quot;_blank&quot; title=&quot;Data Encapsulation - Decapsulation&quot;&gt;Data Encapsulation - Decapsulation&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;7) The &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer2.html&quot; target=&quot;_blank&quot; title=&quot;Datalink Layer&quot;&gt;Datalink Layer&lt;/a&gt; of Host A hands the frame to the Physical layer which encodes the 1s and 0s into a digital signal and transmits this out on the local physical network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;8) The signal is picked up by the router's E0 interface and reads the frame. It will first do a CRC check and compare it with the CRC value Host A added to this frame, to make sure the frame is not corrupt.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;9) After that, the destination hardware address (MAC) of the received frame is checked. Since this will be a match, the type field in the frame will be checked to see what the router should do with the data packet. IP is in the type field, and the router hands the packet to the IP protocol running on the router. The frame is stripped and the original packet that was generated by Host A is now in the router's buffer.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ip-routing-8.gif&quot; alt=&quot;ip-routing-8&quot; width=&quot;595&quot; height=&quot;181&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;10) IP looks at the packet's destination IP address to determine if the packet is for the router. Since the destination IP address is 200.200.200.5, the router determines from the routing table that 200.200.200.0 is a directly connected network on interface E1.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ip-routing-7.gif&quot; alt=&quot;ip-routing-7&quot; width=&quot;624&quot; height=&quot;227&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;11) The router places the packet in the buffer of interface &lt;strong&gt;E1&lt;/strong&gt;. The router needs to create a frame to send the packet to the destination host. First, the router looks in the &lt;strong&gt;ARP&lt;/strong&gt; cache to determine whether the hardware address has already been resolved from a prior communication. If it is not in the &lt;strong&gt;ARP&lt;/strong&gt; cache, the router sends an &lt;strong&gt;ARP&lt;/strong&gt; broadcast out&amp;nbsp;&lt;strong&gt;E1&lt;/strong&gt; to find the hardware address of 200.200.200.5&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx//images/stories/ip-routing-4.gif&quot; alt=&quot;ip-routing-4&quot; width=&quot;624&quot; height=&quot;227&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;12) Host B responds with the hardware address of its network interface card with an ARP reply. The router's E1 interface now has everything it needs to send the packet to the final destination.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ip-routing-6.gif&quot; alt=&quot;ip-routing-6&quot; width=&quot;578&quot; height=&quot;198&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;13)The frame generated from the router's E1 interface has the source hardware address of E1 interface and the hardware destination address of Host B's network interface card. However, the most important thing here is that even though the frame's source and destination hardware address changed at every interface of the router it was sent to and from, the IP source and destination addresses never changed. The packet was never modified at all, only the frame changed.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;14) Host B receives the frame and runs a CRC. If that checks out, it discards the frame and hands the packet to IP. IP will then check the destination IP address. Since the IP destination address matches the IP configuration of Host B, it looks in the protocol field of the packet to determine the purpose of the packet.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ip-routing-5.gif&quot; alt=&quot;ip-routing-5&quot; width=&quot;578&quot; height=&quot;198&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;15) Since the packet is an ICMP echo request, Host B generates a new ICMP echo-reply packet with a source IP address of Host B and a destination IP address of Host A. The process starts all over again, except that it goes in the opposite direction. However, the hardware address of each device along the path is already known, so each device only needs to look in its ARP cache to determine the hardware (MAC) address of each interface.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;And that just about covers our routing analysis. If you found it confusing, take a break and come back later on and give it another shot. Its really simple once you grasp the concept of routing.&lt;/p&gt;
&lt;p style=&quot;text-align: right;&quot;&gt;Back to the &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols.html&quot; title=&quot;Routing Section&quot;&gt;Routing Section&lt;/a&gt;&lt;/p&gt;
&lt;div id=&quot;_mcePaste&quot; class=&quot;mcePaste&quot; style=&quot;overflow: hidden; position: absolute; left: -10000px; top: 1870px; width: 1px; height: 1px;&quot;&gt;
&lt;p&gt;10) IP looks at the packet's destination IP address to determine if the packet is for the router. Since the destination IP address is 200.200.200.5, the router determines from the routing table that 200.200.200.0 is a directly connected network on interface &lt;span style=&quot;color: #00ffff;&quot;&gt;E1&lt;/span&gt;.&lt;/p&gt;
&lt;/div&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ip-routing-process-intro.webp&quot; alt=&quot;IP Routing Process&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;We are going to analyse what happens when routing occurs on a network (&lt;strong&gt;IP routing process&lt;/strong&gt;). When I was new to the networking area, I thought that all you needed was the IP Address of the machine you wanted to contact but so little did I know. You actually need a bit more information than just the IP Address !&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The process we are going to explain is fairly simple and doesn't really change, no matter how big your network is.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The Example:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In our example, we have 2 networks, Network A and Network B. Both networks are connected via a router (Router A) which has 2 interfaces: E0 and E1. These interfaces are just like the interface on your network card (RJ-45), but built into the router.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;Now, we are going to describe step by step what happens when Host A (Network A) wants to communicate with Host B (Network B) which is on a different network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ip-routing-0.gif&quot; alt=&quot;ip-routing-0&quot; width=&quot;624&quot; height=&quot;227&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;1) Host A opens a command prompt and enters &amp;gt;Ping 200.200.200.5.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;2) IP works with the Address Resolution Protocol (ARP) to determine which network this packet is destined for by looking at the &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/ip-protocol.html&quot; target=&quot;_blank&quot; title=&quot;IP address&quot;&gt;IP address&lt;/a&gt; and the subnet mask of Host A. Since this is a request for a remote host, which means it is not destined to be sent to a host on the local network, the packet must be sent to the router (the gateway for Network A) so that it can be routed to the correct remote network (which is Network B).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;3) Now, for Host A to send the packet to the router, it needs to know the hardware address of the router's interface which is connected to its network (Network A), in case you didn't realise, we are talking about the &lt;a href=&quot;https://www.firewall.cx/networking/network-fundamentals/mac-addresses.html&quot; target=&quot;_blank&quot; title=&quot;MAC address (Media Access Control)&quot;&gt;MAC (Media Access Control) address&lt;/a&gt; of interface E0. To get the hardware address, Host A looks in its ARP cache - a memory location where these MAC addresses are stored for a few seconds.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ip-routing-1.gif&quot; alt=&quot;ip-routing-1&quot; width=&quot;624&quot; height=&quot;227&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p&gt;4) If it doesn't find it in there it means that either a long time has passed since it last contacted the router or it simply hasn't resolved the IP address of the router (192.168.0.1) to a hardware address (MAC). So it then sends an ARP broadcast. This broadcast contains the following &quot;What is the hardware (MAC) address for IP 192.168.0.1 ? &quot;. The router identifies that IP address as its own and must answer, so it sends back to Host A a reply, giving it the MAC address of its E0 interface. This is also one of the reasons why sometimes the first &quot;ping&quot; will timeout. Because it takes some time for an ARP to be sent and the requested machine to respond with its MAC address, by the time all that happens, the TTL (Time To Live) of the first ping packet has expired, so it times out!&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ip-routing-2.gif&quot; alt=&quot;ip-routing-2&quot; width=&quot;624&quot; height=&quot;227&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;br /&gt;5) The router responds with the hardware address of its E0 interface, to which the 192.168.0.1 IP is bound. Host A now has everything it needs in order to transmit a packet out on the local network to the router. Now, the Network Layer hands down to the Datalink Layer the packet it generated with the ping (ICMP echo request), along with the hardware address of the router. This packet includes the source and destination IP address as well as the ICMP echo request which was specified in the Network Layer.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ip-routing-3.gif&quot; alt=&quot;ip-routing-3&quot; width=&quot;578&quot; height=&quot;173&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;6)&amp;nbsp;The &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer2.html&quot; target=&quot;_blank&quot; title=&quot;Datalink Layer&quot;&gt;Datalink Layer&lt;/a&gt; of Host A creates a frame, which encapsulates the packet with the information needed to transmit on the local network. This includes the source and destination hardware address (MAC) and the type field which specifies the Network Layer protocol e.g IPv4 (that's the IP version we use), ARP. At the end of the frame, in the FCS portion of the frame, the Datalink Layer will stick a Cyclic Redundancy Check (CRC) to make sure the receiving machine (the router) can figure out if the frame it received has been corrupted. To learn more on how the frame is created, visit the &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-data-encapsulation.html&quot; target=&quot;_blank&quot; title=&quot;Data Encapsulation - Decapsulation&quot;&gt;Data Encapsulation - Decapsulation&lt;/a&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;7) The &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer2.html&quot; target=&quot;_blank&quot; title=&quot;Datalink Layer&quot;&gt;Datalink Layer&lt;/a&gt; of Host A hands the frame to the Physical layer which encodes the 1s and 0s into a digital signal and transmits this out on the local physical network.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;8) The signal is picked up by the router's E0 interface and reads the frame. It will first do a CRC check and compare it with the CRC value Host A added to this frame, to make sure the frame is not corrupt.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;9) After that, the destination hardware address (MAC) of the received frame is checked. Since this will be a match, the type field in the frame will be checked to see what the router should do with the data packet. IP is in the type field, and the router hands the packet to the IP protocol running on the router. The frame is stripped and the original packet that was generated by Host A is now in the router's buffer.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ip-routing-8.gif&quot; alt=&quot;ip-routing-8&quot; width=&quot;595&quot; height=&quot;181&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;10) IP looks at the packet's destination IP address to determine if the packet is for the router. Since the destination IP address is 200.200.200.5, the router determines from the routing table that 200.200.200.0 is a directly connected network on interface E1.&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ip-routing-7.gif&quot; alt=&quot;ip-routing-7&quot; width=&quot;624&quot; height=&quot;227&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;11) The router places the packet in the buffer of interface &lt;strong&gt;E1&lt;/strong&gt;. The router needs to create a frame to send the packet to the destination host. First, the router looks in the &lt;strong&gt;ARP&lt;/strong&gt; cache to determine whether the hardware address has already been resolved from a prior communication. If it is not in the &lt;strong&gt;ARP&lt;/strong&gt; cache, the router sends an &lt;strong&gt;ARP&lt;/strong&gt; broadcast out&amp;nbsp;&lt;strong&gt;E1&lt;/strong&gt; to find the hardware address of 200.200.200.5&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align=&quot;left&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx//images/stories/ip-routing-4.gif&quot; alt=&quot;ip-routing-4&quot; width=&quot;624&quot; height=&quot;227&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;12) Host B responds with the hardware address of its network interface card with an ARP reply. The router's E1 interface now has everything it needs to send the packet to the final destination.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ip-routing-6.gif&quot; alt=&quot;ip-routing-6&quot; width=&quot;578&quot; height=&quot;198&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;left&quot;&gt;13)The frame generated from the router's E1 interface has the source hardware address of E1 interface and the hardware destination address of Host B's network interface card. However, the most important thing here is that even though the frame's source and destination hardware address changed at every interface of the router it was sent to and from, the IP source and destination addresses never changed. The packet was never modified at all, only the frame changed.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;14) Host B receives the frame and runs a CRC. If that checks out, it discards the frame and hands the packet to IP. IP will then check the destination IP address. Since the IP destination address matches the IP configuration of Host B, it looks in the protocol field of the packet to determine the purpose of the packet.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/ip-routing-5.gif&quot; alt=&quot;ip-routing-5&quot; width=&quot;578&quot; height=&quot;198&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;15) Since the packet is an ICMP echo request, Host B generates a new ICMP echo-reply packet with a source IP address of Host B and a destination IP address of Host A. The process starts all over again, except that it goes in the opposite direction. However, the hardware address of each device along the path is already known, so each device only needs to look in its ARP cache to determine the hardware (MAC) address of each interface.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;And that just about covers our routing analysis. If you found it confusing, take a break and come back later on and give it another shot. Its really simple once you grasp the concept of routing.&lt;/p&gt;
&lt;p style=&quot;text-align: right;&quot;&gt;Back to the &lt;a href=&quot;https://www.firewall.cx/networking/routing-protocols.html&quot; title=&quot;Routing Section&quot;&gt;Routing Section&lt;/a&gt;&lt;/p&gt;
&lt;div id=&quot;_mcePaste&quot; class=&quot;mcePaste&quot; style=&quot;overflow: hidden; position: absolute; left: -10000px; top: 1870px; width: 1px; height: 1px;&quot;&gt;
&lt;p&gt;10) IP looks at the packet's destination IP address to determine if the packet is for the router. Since the destination IP address is 200.200.200.5, the router determines from the routing table that 200.200.200.0 is a directly connected network on interface &lt;span style=&quot;color: #00ffff;&quot;&gt;E1&lt;/span&gt;.&lt;/p&gt;
&lt;/div&gt;</content>
		<category term="Routing" />
	</entry>
	<entry>
		<title>Routed Protocols </title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/networking/routing-protocols/routed-protocols.html"/>
		<published>2011-05-24T06:52:01+10:00</published>
		<updated>2011-05-24T06:52:01+10:00</updated>
		<id>https://www.firewall.cx/networking/routing-protocols/routed-protocols.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/routed-protocols-intro.webp&quot; alt=&quot;Routed Protocols &quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;We all understand that TCP/IP, IPX-SPX are protocols which are used in a Local Area Network (LAN) so computers can communicate between with each other and with other computers on the Internet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Chances are that in your LAN you are most probably running TCP/IP. This protocol is what we call a &quot;routed&quot; protocol. The term &quot;routed&quot; refers to something which can be passed on from one place (network) to another. In the example of TCP/IP, this is when you construct a data packet and send it across to another computer on the Internet&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This ability to use TCP/IP to send data across networks and the Internet is the main reason it's so popular and dominant. If you're thinking also of NetBeui and IPx/SPX, then note that NetBeui is not a routed protocol, but IPX/SPX is! The reason for this is actually in the information a packet holds when it uses one of the protocols.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If you looked at a TCP/IP or IPX/SPX packet, you will notice that they both contain a &quot;network&quot; layer. For TCP/IP, this translates to the IP layer (Layer 3), as for IPX/SPX, it's the IPX layer (Layer 3). To make it easy to understand, I will use TCP/IP as an example.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In the picture below, you can see a TCP/IP packet within an &lt;a href=&quot;https://www.firewall.cx/networking/ethernet/ethernet-ii.html&quot; target=&quot;_blank&quot; title=&quot;Ethernet II Frame&quot;&gt;Ethernet II Frame&lt;/a&gt; (The frame is like an &quot;envelope&quot; which encapsulates the TCP/IP packet):&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/routed-protocols.gif&quot; alt=&quot;routed-protocols&quot; width=&quot;600&quot; height=&quot;849&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Looking closely, you will notice that &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer3.html&quot; title=&quot;Layer 3&quot;&gt;Layer 3&lt;/a&gt; (Network Layer) contains the &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/ip-protocol/protocols-ip-header.html&quot; target=&quot;_blank&quot; title=&quot;IP header&quot;&gt;IP header&lt;/a&gt;. It is within this section the computer puts the Source and Destination IP number. Thanks to the existence of this IP header, we are able to put a destination IP which can be one that's not on our network, and the computer will figure it out after completing a simple calculation and know if it needs to send this data to the router for it to be sent to its destination. You can read more on Layer 3 by visiting our &lt;a href=&quot;https://www.firewall.cx/networking/osi-model.html&quot; target=&quot;_blank&quot; title=&quot;OSI Model&quot;&gt;OSI Model&lt;/a&gt; section.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;IPX/SPX contains a similar field which gives it the same ability, which is to send packets over to different networks.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;NetBEUI (NetBIOS Extended User Interface) on the other hand has no such information! This means that NetBeui has no information about the destination network to which it needs to send the data, as it was developed for LAN use only, or you could say that all hosts are considered to be on the same logical network and all resources are considered to be local. This classifies NetBeui as a &quot;non routed&quot; protocol.&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx//images/stories/routed-protocols-intro.webp&quot; alt=&quot;Routed Protocols &quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;We all understand that TCP/IP, IPX-SPX are protocols which are used in a Local Area Network (LAN) so computers can communicate between with each other and with other computers on the Internet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Chances are that in your LAN you are most probably running TCP/IP. This protocol is what we call a &quot;routed&quot; protocol. The term &quot;routed&quot; refers to something which can be passed on from one place (network) to another. In the example of TCP/IP, this is when you construct a data packet and send it across to another computer on the Internet&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This ability to use TCP/IP to send data across networks and the Internet is the main reason it's so popular and dominant. If you're thinking also of NetBeui and IPx/SPX, then note that NetBeui is not a routed protocol, but IPX/SPX is! The reason for this is actually in the information a packet holds when it uses one of the protocols.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If you looked at a TCP/IP or IPX/SPX packet, you will notice that they both contain a &quot;network&quot; layer. For TCP/IP, this translates to the IP layer (Layer 3), as for IPX/SPX, it's the IPX layer (Layer 3). To make it easy to understand, I will use TCP/IP as an example.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In the picture below, you can see a TCP/IP packet within an &lt;a href=&quot;https://www.firewall.cx/networking/ethernet/ethernet-ii.html&quot; target=&quot;_blank&quot; title=&quot;Ethernet II Frame&quot;&gt;Ethernet II Frame&lt;/a&gt; (The frame is like an &quot;envelope&quot; which encapsulates the TCP/IP packet):&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/routed-protocols.gif&quot; alt=&quot;routed-protocols&quot; width=&quot;600&quot; height=&quot;849&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Looking closely, you will notice that &lt;a href=&quot;https://www.firewall.cx/networking/osi-model/osi-layer3.html&quot; title=&quot;Layer 3&quot;&gt;Layer 3&lt;/a&gt; (Network Layer) contains the &lt;a href=&quot;https://www.firewall.cx/networking/network-protocols/ip-protocol/protocols-ip-header.html&quot; target=&quot;_blank&quot; title=&quot;IP header&quot;&gt;IP header&lt;/a&gt;. It is within this section the computer puts the Source and Destination IP number. Thanks to the existence of this IP header, we are able to put a destination IP which can be one that's not on our network, and the computer will figure it out after completing a simple calculation and know if it needs to send this data to the router for it to be sent to its destination. You can read more on Layer 3 by visiting our &lt;a href=&quot;https://www.firewall.cx/networking/osi-model.html&quot; target=&quot;_blank&quot; title=&quot;OSI Model&quot;&gt;OSI Model&lt;/a&gt; section.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;IPX/SPX contains a similar field which gives it the same ability, which is to send packets over to different networks.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;NetBEUI (NetBIOS Extended User Interface) on the other hand has no such information! This means that NetBeui has no information about the destination network to which it needs to send the data, as it was developed for LAN use only, or you could say that all hosts are considered to be on the same logical network and all resources are considered to be local. This classifies NetBeui as a &quot;non routed&quot; protocol.&lt;/p&gt;</content>
		<category term="Routing" />
	</entry>
</feed>
