链路状态路由协议(PPT讲稿)LINK STATE ROUTING PROTOCOLS

LINK STATE ROUTING PROTOCOLS Dr. Rocky K C Chang 22 November 2010
LINK STATE ROUTING PROTOCOLS Dr. Rocky K. C. Chang 22 November 2010 1

nk state approac o In the dv approach, each router discovers the network topology through the distance vectors received from its neighbors. o In the ls approach each router discovers the network topology through link state advertisements (LSAS) n Each router is responsible for discovering its neighbors and the states of the links between them, and informs other routers a Upon receiving all the link states, a router can form a local view of the entire network
Link state approach 2 In the DV approach, each router discovers the network topology through the distance vectors received from its neighbors. In the LS approach, each router discovers the network topology through link state advertisements (LSAs). Each router is responsible for discovering its neighbors and the states of the links between them, and informs other routers. Upon receiving all the link states, a router can form a local view of the entire network

An example [from [3]) 口R。 outers connected by point-to- point links a Networ ks connected to the routers are omitted a Link states are generally asymmetric 5 A C D E
An example [from [3]) 3 Routers connected by point-to-point links Networks connected to the routers are omitted. Link states are generally asymmetric. A B C E D 4 3 1 1 5 2 3

After exchanging LSAs with neighbors (from [1]) 口 For router a B Link a4 A c Link b4 HA3 C|3 E1 E Link A|1
After exchanging LSAs with neighbors (from [1]) 4 For router A 4 3 1 A Link B C E 4 3 1 E Link A 1 C Link A 3 B Link A 4

After receiving all LSAs(from [1]) 5 o After the protocol converges the routers' link state databases are identical B Link a 4 D 2 A D Link BCE 431 3 ADE B 5 E 253 E C 1 D|3
After receiving all LSAs (from [1]) 5 After the protocol converges, the routers’ link state databases are identical. 4 3 1 1 5 2 3 A Link B C E 4 3 1 E Link A C D 1 1 3 C Link A D E 3 5 1 D Link B C E 2 5 3 B Link A D 4 2

nk state routing protocols 6 a Therefore there are two main parts in a link state routing protocol a(Topology dissemination) Construct and maintain a consistent link state database in all routers n( Route computation) Each router computes minimum-cost paths to all destinations in the network
Link state routing protocols 6 Therefore, there are two main parts in a link state routing protocol. (Topology dissemination) Construct and maintain a consistent link state database in all routers. (Route computation) Each router computes minimum-cost paths to all destinations in the network

Topology dissemination 口 Neighbor discovery a Use hello protocols to discover neighbors and to elect a designated router on a shared medium. a Bringing up adjacencies in a point-to-point network n a set of protocols database description, link state request update)to synchronize the link state databases of the two routers o On a shared medium, a designated router a forms adjacency with other routers and a responsible for advertising the link states
Topology dissemination 7 Neighbor discovery Use Hello protocols to discover neighbors and to elect a designated router on a shared medium. Bringing up adjacencies in a point-to-point network A set of protocols (database description, link state request/update) to synchronize the link state databases of the two routers On a shared medium, a designated router forms adjacency with other routers, and responsible for advertising the link states

Topology dissemination 8 A B A D D Shared medium N(N12 adjacencies A A B LAN D D adjacencies advertisements
Topology dissemination 8 A B C D A B C D A B C D LAN Shared medium N(N-1)/2 adjacencies A B C D (N-1) adjacencies Link advertisements

Link state advertisements o A link-state router generates a link state advertisement(LSA)when discovering aa new neighbor router, or the cost of the link to an existing neighbor changes (including link failure). a The lsa describes the latest changes in the network topology and must be transmitted to all other routers as soon as possible a Dissemination cannot be based on the routing information. Why not?
Link state advertisements 9 A link-state router generates a link state advertisement (LSA) when discovering a new neighbor router, or the cost of the link to an existing neighbor changes (including link failure). The LSA describes the latest changes in the network topology and must be transmitted to all other routers as soon as possible. Dissemination cannot be based on the routing information. Why not?

An example 10 a If b fails, a needs to update the link state for a->B a But the spanning tree computed based on the original topology does not reach all nodes. A
An example 10 A B If B fails, A needs to update the link state for A->B. But the spanning tree computed based on the original topology does not reach all nodes
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 《程序设计》课程教学资源(PPT课件讲稿)第五章 函数式程序设计语言.ppt
- 《微型计算机接口技术》课程教学资源(PPT课件讲稿)第2章 16位和32位微处理器.ppt
- 淮阴工学院:《数据库原理》课程教学资源(PPT课件讲稿)第1章 数据库概论(主讲:冯万利).pps
- 操作系统原理(PPT讲稿)Windows OS Principles(Windows XP).pps
- 《单片机应用技术》课程PPT教学课件(C语言版)第8章 MCS-51单片机串行通信接口.ppt
- 电子工业出版社:《计算机网络》课程教学资源(第五版,PPT课件讲稿)第三章 数据链路层.ppt
- 《数字图像处理》课程教学资源(PPT课件)第6章 图像复原.ppt
- 微软分布式计算技术(PPT讲稿)Dryad and DryadLINQ.ppt
- P2P Tutorial(PPT讲稿).ppt
- 北京大学:网络信息体系结构(PPT讲稿)Web-based Information Architecture.ppt
- 信息和通信技术ICT(PPT讲稿)浅谈信息技术和低碳经济(中国科学技术大学:王煦法).ppt
- 山东大学:《微机原理及单片机接口技术》课程教学资源(PPT课件讲稿)第八章 数据通信.ppt
- 《人工智能技术导论》课程教学资源(PPT课件讲稿)第1章 人工智能概述.ppt
- 河南中医药大学(河南中医学院):《计算机文化》课程教学资源(PPT课件讲稿)第四章 计算机软件系统(主讲:许成刚、阮晓龙).ppt
- 清华大学:A Pivotal Prefix Based Filtering Algorithm for String Similarity Search(PPT讲稿).pptx
- 《数据结构》课程教学资源(PPT课件讲稿)第十章 内部排序.ppt
- 《C语言教程》课程教学资源(PPT课件讲稿)第三章 C语言程序设计初步.ppt
- 电子科技大学:《计算机操作系统》课程教学资源(PPT课件讲稿)第三章 存储管理 Memory Management.ppt
- 中国科学技术大学:《计算机体系结构》课程教学资源(PPT课件讲稿)RISC-V指令集及简单实现.pptx
- 《信息安全工程》课程教学资源(PPT课件讲稿)第3章 密码学基础.ppt
- 厦门大学:《大数据技术原理与应用》课程教学资源(PPT课件讲稿,2016)第5章 NoSQL数据库.ppt
- 北京师范大学:《多媒体技术与网页制作》课程教学资源(PPT课件)课程总复习(主讲:赵国庆).ppt
- 《数据结构》课程教学资源(PPT课件讲稿)第一章 绪论 Data Structure.ppt
- 微软应用软件架构设计指南2.0 Application Architecture Guide 2.0 Designing Application on the .NET Platform.ppt
- 软件建模与UML(PPT讲稿).ppt
- 长春大学:《大学计算机基础》课程电子教案(PPT教学课件)第4章 电子表格软件(Excel2003).ppt
- 东北大学:《可信计算基础》课程教学资源(PPT课件讲稿)第6讲 可信计算基础.pptx
- 上海立信会计金融学院:《机器学习与金融应用实践 Machine Study and Financial Practice》课程教学资源(教学大纲).pdf
- 香港科技大学:Overview of the Internet of Things(IoTs).ppsx
- 《微机原理与接口技术》课程教学资源(PPT课件讲稿)第2章 AT89S52单片机硬件结构.ppt
- 《计算机网络》教程资源(PPT课件讲稿)第13章 IPv6协议.ppt
- MSC Software Corporation:Modeling and Simulation of Fluid Power Systems Using MSC.EASY5.ppt
- 《计算机组成原理》课程教学资源(PPT课件讲稿)第11章 设备管理 Device Management.ppt
- 《软件工程导论》课程教学资源(PPT课件讲稿)第10章 面向对象的分析.ppt
- 《Web编程实用技术》课程教学课件(网站开发)第2章 静态网页开发技术.ppt
- 《局域网组建与管理》课程教学资源(PPT课件讲稿)第五章 组建家庭或学生宿舍局域网.ppt
- 电子科技大学:《现代密码学》课程教学资源(PPT课件讲稿)第5章 数字签名.ppt
- 南京航空航天大学:《数据结构》课程教学资源(PPT课件讲稿)第三章 栈和队列.ppt
- 《计算机文化基础 Computer Culture Foundation》课程教学资源(实验教学大纲).pdf
- Trichromatic Online Matching in Real-time Spatial Crowdsourcing.pptx