There are several advantages and disadvantages of link-state routing protocols compared to distance vector routing protocols. In this article, we are going to discuss the advantages and disadvantages of a link-state routing protocol.
Advantages of link-state
- Fast Network Convergence– Fast network convergence is the main advantage of the link-state routing protocol. Because on receiving an LSP, link-state routing protocols immediately flood the LSP out all interfaces without any changes except for the interface from which the LSP was received.
- Topological Map– Link-state routing uses a topological map or SPF tree for creating the network topology. Using the SPF tree, each router can separately determine the shortest path to every network.
- Hierarchical Design– Link-state routing protocols use multiple areas and create a hierarchical design to networks areas. The multiple areas allow better route summarization.
- Event-driven Updates– After initial flooding of LSPs, the LSPs are sent only when there is a change in the topology and contain only the information regarding that change. The LSP contains only the information about the affected link. The link-state never sends periodic updates.
Disadvantages of Link-State
The Link-state also have some disadvantages compared to distance vector routing protocols:
- Memory Requirements– the link-state routing protocol create and maintain a database and SPF tree. The database and SPF tree required more memory than distance vector protocol.
- Processing Requirements– Link-state routing protocols also require more CPU processing because the SPF algorithm requires more CPU time than distance vector algorithms just like Bellman-Ford because link-state protocols build a complete map of the topology.
- Bandwidth Requirements–The link-state routing protocol flood link-state packet during initial startup and also at the event like network break down, and network topology changes, which affect the available bandwidth on a network. If the network is not stable it also creates issues on the bandwidth of the network.
The Physical layer is the lowest layer of the OSI Model. It provides the resources to transport the bits; that make up a data link layer frame across the network media. This layer accepts a complete frame from the data link layer and encodes it as a series of signals that transmitted the local media. (see […]
Network Interface Card (NIC) is also referred to as an Ethernet card. It also called network adapter. It is a circuit board that is installed in a computer so that it can be connected to a network. A network interface card provides the computer with a dedicated, full-time connection to a network. Personal computers and workstations on a local […]
Here we will discuss the role of the network layer and data link layer when devices communicating on a remote network. Here is the example of PC1 which is communicating with a web server on a different network. Role of the Network Layer Addresses When the sender of the packet is on a different network […]
To understand how devices communicate within a network. It is important to understand the roles of both the network layer addresses and the data link layer addresses. Role of the Network Layer Addresses The network layer addresses, or IP addresses, show the original source and destination. An IP address has two parts: Network portion The left-most […]
The network and data link layers are responsible for delivering the data from the source device to the destination device. As shown in Figure2-4; protocols at both layers contain a source and destination address, but their addresses have different purposes. Network Layer Addresses Network layer address (source and destination) Responsible for delivering the IP packet […]
What is Encapsulation Encapsulation is the inclusion of one thing within another thing so that the included thing is not apparent. In networking, encapsulation is the process which includes one data structure within another data structure as a result that the first data structure hide for a limited time. As application layer data passed down the […]
Figures 2-2 show the complete communication process using an example of a web server transmitting data to a client. This process and these protocols have covered in more detail in later chapters. 1. Web server is sending data using Hypertext Markup Language (HTML); page to sent to web clients. 2. The application protocol HTTP header added to the […]
Comparison The protocols that make up the TCP/IP protocol suite can also be described in terms of the OSI reference model. Network access layer and Application layer of the TCP/IP models further divided In the OSI model describe discrete functions that must occur at these layers. Network Access layer of TCP/IP model does not specify […]