0 ratings0% found this document useful (0 votes) 41 views3 pagesBorder Gateway Protocol Notes
Border Gateway Protocol (BGP) Notes Computer Network
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
out em canbe imine’ |
Tne ge on wes ano
Teva spss! ype toes wih ee
ea Tee roster sna terra
‘ystems shown Fi
Disadvantages of the RIP protceat:
~The maumam datance between any two sors he
‘ei, messed in osterhop) is 15 hops
TWwoi9h the ink saw information exh ra
copy ote nator tpt
base. 6 posible to fd af
stones tr pat
© scanned with OKEN ScannerSe
3.44.2 Motee :
rave oy 09 OF
tat ue 1
ase on #9
= The cont tgs eh
miineter i caes 38 et
(SF proach meni co BE
=A rover cn pve mile roving be
tated on etre pet en.
whi 98
3.44. Types af Links
scaled
= Inthe 096 pretest ting. connect
be SF defines or pes of ed POM?
Prin ase ek st nk vuln 53400"
fg 21430,
mine sent t
nec
- pit oot nk df a the ek omen |
at res canects mo ote wilou ayo hot
orrovter pent in betacen. samp of sch nk
I wo eens connate by» tegen ie
Each rower as bone ibaa atthe ote sie of
the nk Ts shown fig 3142 ls et neces,
to aug any retrace oi The meee
are shown atthe 00 td a he Unk and thay a |
srry tome
(seu Fig. 2442: Pelt to pol ik
‘Teantent nk:
[tsa netucrk having many roster ached t ae
‘Shown in Fig. 3143, Al LANs and sme WANG ae of | —
‘he ype
A.C. le the outs Each router hes seta
neighbours,
@Q @ @
one
© @:
(500 Fg. 3243 nk
~ el sj. 14ia} Each router 9s been,
a
Trpeenen the mEDNLOHng ga
oe
reeaitow. ts
cert ard note
ed 9 ogee
ate ed. This is kr ie
pot be wt Ths bony
a he dsinaed ate aig
ea or HST ge
Seat
1 arangement of Fi. 3144p,
fone raghbout Le the dy
eee
ue eves ‘
reve fas
vr ew, nee te SEIN re pe
il nt cs APD
a A,
ewes (9) REI ep resettg
comp, 148 j
he vealaie arangement reduces the number g
Tourcrment tha 90h 2s COOKE go
ber av compare tothe urreshisic arrangement
fate Bat there a ee fom each node
espe rover and theres no. metre rm th
figted tert ay other rode
| su inks # peor at it eonneted to ony oe
toateros honing 345.
roms @ rows
sneer (o Reprsrtaton
son 345
The etc of i. 345) 8 sec ene
‘transient network. The data packets use the sarne link
cota ene Pe evo
Tsuen cane peed by sng te kat
tode ad ylang the metvar by 2 ipa
‘ee ab om in Fig. 32450) Th En connec
‘outer A and the desigrated router is unidivectons
tometer nwo.
‘When this Erk gets damaged the administration oF
‘ete eal ink botngen he two outs
atest
ee acu core Sem ss
a7
ira Virtual Lin cat uncat Raing Prom
‘he ariitoo 8 ae» Wal ak tne
oats when ok Setcen en gestern
such +l I Cut be O48 oro gah wi,
sould go ugh MAY outer,
1.145 Graphleal Representation :
Let us ow scus ‘about mepretning ania.
srapiely. Conser Fg 3440) wich ia sat AS,
ih ple retwors andr
here some pint 1 pl mets, nd ter
swelas stb netwots,
‘he symbols such 86 Mand Ny me Wied for the
trnint and sb netoeks. No inty should be
chee tothe pont point neta
the aptcl verano of the AS ab see by
(SPF has Ben shown in Fig 3346,
S446 Link State Advertisements (LSAs) :
Fach emty network derbies the Unk Ste
Aaveritaiet (SA) An SA aang the sats of
cy nk
= fren pes of is depending on he pe af etty
sve asshonn inFg 3167,
VIR eens cae eomat
Somat Simm, ST
(8g 247 trae tS
1. Ror tink
The router proce a star rt adertzamen ris
(om area. The sfrsement dere the colected
ies of the rouers Unke to the aes Tis
variant 2b ines he ype he reve.
wheter tic an aren bere eter oan AS boundary
2 Network tnt
(A esr Kk abriemant i protueed for evey
nt mutiacers twa Tie adveiemen 6
rohied by the deine vse for he at
rework ecieal the OSE ewes uly adacent
te aeigrced tee,
3. Summary inka
Summary tn aderierens describe a sng ete fo
‘deca, To einatoneercrbed are eter 10
the are but neato the Adonareus Ste. Some
cendeng of out infomation ocars when ceang
‘het summary sae ademas
pic rgrcension
eatin Fig, S246:AS. ands graphical pretation
@ scanned with OKEN Scanner[AS Summary Links:
These ae He summary fink adversemer
describe routes 10 Autonomous Sem
routers.
AS Exteral Links:
AS external advertisements describe
the Autonomous System.
3.14.7 OSPF Packet Types:
bundy
routes external 10
in
Different types of OSPF packets are 35 shown
Fig 3148."
(OSPF pacts
S.Unistate A Linkete 5 Unkstate
quest upaate
}
Roe ok
ewer ok
Summary rk to netnceh
1 Surmary Ea i AS bouncy rote
1 Exeral ek
‘Hato 2.Daabe
esztpton
(6-506) Fig, 3.14.8: OSPF packet types
= The OSPF protocol runs directly over IP, and uses the
assigned number 89. Each OSPF packet consists of an
OSPF header followed by the body of particular
packet type. OSPF packets need to be sent to specifi IP
addresses in nonbroadcast muti-access networks
~The OSPF operation consist of following stages
~ Neighbours are discovered by means of sending
The Hello messages and designated routers are
elected in muti-access networks.
Adjacent routers are identified and link state
databases are synchronized.
~ Link State Advertisements (LSA) are exchanged
among the adjacent routers so as to maintain the
topological databases and also. to advertise
interarea and interAS routes. The routers use the
information in the database to generate routing
tables.
~ _AILOSPE packets have the same common header which
is as shown in Fig, 3.149. This headers same for all the
five packet types of OSPF.
ig. 3.14.9 OSPF common header
omoF
the OSPF packet header ae a5 fotoy,
various felds in
Version :
sre contents ofthis S-bit field tells us about the ven
ofthe OSPF protocol. It is currently version 2,
Type:
this 8-bit field defines the type of the packet. There ay
five types of OSPF packets and they can defined b
‘adjusting the contents of the type field from 1 to 5.
Message length :
This 16-bit field defines the length of the total mesay
which includes the header as well as the body.
Source router IP address
This 32-bit field defines the IP address of the router tht
sends the packet
Area identification :
This 32-bit field defines the area within which t
‘outing takes place
Checksum ;
Ts fed is used for error detection on the ene P20"
excluding the
Feld “UEMtcation type and authentication 2
we .
© scanned with OKEN Scanner