After building the LSP each router flood the LSP to all neighbors in the link-state routing process. This is the fourth in step link-state routing process. The neighbor routers receive the LSP and save it in the database. All routers in the same routing area flood the link-state information to each other. When a router receives the LSP from any of its interfaces, then the receiving router immediately sends that LSP to out to all interfaces except the receiving interface. This process continues from the router to router in the same area until all router receives the LSP. When flooding LSP is completed then the link-state routing protocol calculates the SPF algorithm, thus the link-state routing convergence speed is very high.
The routers do not send LSPs periodically like the hello packet. It is only sent during the initial startup of the routing protocol on the router. After that, the LSPs is needed to flood when there are network changes occur in the topology. It is also needed when there are network breakdown occurs or after the network coming back.
The LSPs also included information, such as sequence numbers and aging information, to help manage the flooding LSP process. Each router uses this information to determine if it has already received the LSP from another router or if the LSP has new and updated information than LSP already contained in the link-state database. This process allows a router to keep only the most current information in its link-state database. If we discuss the topology in the previous lesson building the Link State Packet. The R1 will flood the LSP packet to all it interfaces containing the following data.
- R1; FastEthernet network 192.168.0.0/24; Cost 1
- R1 -> R2; Serial point-to-point network; 192.168.1.0/24; Cost 1
- R1 -> R3; Serial point-to-point network; 192.168.3.0/24; Cost 1
Hazards Anything that can cause harm is called hazard. A hazard is any source of potential damage, harm or adverse health effects on something or someone under certain conditions at work Basically, a hazard can cause harm or adverse effects (to individuals as health effects or to organizations as property or equipment losses) Slips Slips […]
Hubs and switch are devices that let you connect one or more computers to other computers, networked devices, or even other networks. Each has two or more ports into which you plug in the cables to make the connection. There are some differences between switch vs hub. I often see the terms misused, so let’s clarify what each one […]
Router and switch are the most important devices in computer networking here we give a comparison between router vs switch which is most important to understand for the student of networking. If somebody understands the router vs switch comparison, he can manage network easily. Definition of Router A network device that forwards data packets from one […]
Windows Firewall filters incoming traffic to help block unwanted network traffic. Optionally, Windows Firewall can also filter outgoing traffic to help limit the risk of malware. Although Windows Firewall’s default settings will work well with components built into Windows, they might prevent other applications from functioning correctly. Windows Firewall’s default settings can also be significantly […]
There are several different types of a computer network such as local area network, Metropolitan area network and wide area network. We can characterize network with following:- Size of the area covered Number of users connected Number and types of services available Area of responsibility Following are the different network types Local Area Network (LAN) A […]
Any network infrastructure has three types of the component which is Devices, Media, and Services. Data takes a path from source to destination can be simple as a single connecting one device to another. Devices and media are the physical elements, or hardware, of the network. Hardware is visible components of the network. we can touch […]
A network is a group of multiple networking devices connected together for data sharing. As a group networking devices have a single purpose which securely transfers data as fast as possible. To meet this goal there are several networking devices like bridge, hub, switch, and the router is being used. Here in this article, we […]
Computer Virus A computer virus is a program, script, and macro which planned to cause harm; steal private information, change data, send e-mail and display messages. More importantly, when the virus executed then it spreads by copying itself into or over the following:- Data files Programs Boot sector of a computer’s Hard drive Potentially anything else writable. Virus writers use detail […]