OSPF Version 2
OSPF Version 2
April 1998
RFC: 2328
Network Dictionary
http://www.javvin.com/networkdictionary.html
Network Working Group Request for Comments: 2328 STD: 54 Obsoletes: Category: Standards Track
http://www.javvin.com/securitymap. html
OSPF Version 2
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
[ Page 1 ]
OSPF Version 2
April 1998
Network Dictionary
http://www.javvin.com/networkdictionary.html
Copyright Notice
Copyright (C) The Internet Society (1998). All Rights Reserved.
http://www.javvin.com/securitymap. html
Abstract
This memo documents version 2 of the OSPF protocol. OSPF is a link-state routing protocol. It is designed to be run internal to a single Autonomous System. Each OSPF router maintains an identical database describing the Autonomous System's topology. From this database, a routing table is calculated by constructing a shortest- path tree. OSPF recalculates routes quickly in the face of topological changes, utilizing a minimum of routing protocol traffic. OSPF provides support for equal-cost multipath. An area routing capability is provided, enabling an additional level of routing protection and a reduction in routing protocol traffic. In addition, all OSPF routing protocol exchanges are authenticated. The differences between this memo and RFC 2178 are explained in Appendix G. All differences are backward-compatible in nature. Implementations of this memo and of RFCs 2178, 1583, and 1247 will interoperate. Please send comments to [email protected].
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
[ Page 2 ]
OSPF Version 2
April 1998
Table of Contents
1 Introduction ......................................................................................... 6 1.1 Protocol Overview ..................................................................... 6 1.2 Definitions of commonly used terms ......................................... 8 1.3 Brief history of link-state routing technology .......................... 11 1.4 Organization of this document ................................................. 12 1.5 Acknowledgments .................................................................... 12 The link-state database: organization and calculations..................... 13 2.1 Representation of routers and networks ................................... 13 2.1.1 Representation of non-broadcast networks ............................. 15 2.1.2 An example link-state database ............................................... 18 2.2 The shortest-path tree ............................................................... 21 2.3 Use of external routing information ......................................... 23 2.4 Equal-cost multipath ................................................................ 26 Splitting the AS into Areas ................................................................ 26 3.1 The backbone of the Autonomous System ............................... 27 3.2 Inter-area routing ...................................................................... 27 3.3 Classification of routers ............................................................ 28 3.4 A sample area configuration ..................................................... 29 3.5 IP subnetting support ................................................................ 35 3.6 Supporting stub areas ............................................................... 37 3.7 Partitions of areas ..................................................................... 38 Functional Summary ......................................................................... 40 4.1 Inter-area routing ...................................................................... 41 4.2 AS external routes .................................................................... 41 4.3 Routing protocol packets .......................................................... 42 4.4 Basic implementation requirements ........................................ 43 4.5 Optional OSPF capabilities ...................................................... 46 Protocol data structures ..................................................................... 47 The Area Data Structure .................................................................... 49 Bringing Up Adjacencies .................................................................. 52 7.1 The Hello Protocol ................................................................... 52 7.2 The Synchronization of Databases ........................................... 53 7.3 The Designated Router ............................................................. 54 7.4 The Backup Designated Router ................................................ 56 7.5 The graph of adjacencies .......................................................... 56 Protocol Packet Processing ............................................................... 58 8.1 Sending protocol packets ......................................................... 58 8.2 Receiving protocol packets ...................................................... 61 The Interface Data Structure ............................................................. 63 9.1 Interface states .......................................................................... 67
[ Page 3 ]
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
5 6 7
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
Events causing interface state changes .................................... 70 The Interface state machine ...................................................... 72 Electing the Designated Router ................................................ 75 Sending Hello packets .............................................................. 77 Sending Hello packets on NBMA networks ........................... 79
Network Dictionary
http://www.javvin.com/networkdictionary.html
The Neighbor Data Structure ........................................................... 80 10.1 Neighbor states ........................................................................ 83 10.2 Events causing neighbor state changes ................................... 87 10.3 The Neighbor state machine .................................................... 89 10.4 Whether to become adjacent ................................................... 95 10.5 Receiving Hello Packets ......................................................... 96 10.6 Receiving Database Description Packets ................................ 99 10.7 Receiving Link State Request Packets .................................. 102 10.8 Sending Database Description Packets ................................. 103 10.9 Sending Link State Request Packets ..................................... 104 10.10 An Example .......................................................................... 105 The Routing Table Structure ........................................................... 107 11.1 Routing table lookup ............................................................. 111 11.2 Sample routing table, without areas ...................................... 111 11.3 Sample routing table, with areas ........................................... 112 Link State Advertisements (LSAs) ................................................. 115 12.1 The LSA Header .................................................................... 116 12.1.1 LS age ................................................................................... 116 12.1.2 Options ................................................................................. 117 12.1.3 LS type ................................................................................. 117 12.1.4 Link State ID ........................................................................ 117 12.1.5 Advertising Router ............................................................... 119 12.1.6 LS sequence number ............................................................ 120 12.1.7 LS checksum ........................................................................ 121 12.2 The link state database .......................................................... 121 12.3 Representation of TOS .......................................................... 122 12.4 Originating LSAs .................................................................. 123 12.4.1 Router-LSAs ......................................................................... 126 12.4.1.1 Describing point-to-point interfaces ................................... 130 12.4.1.2 Describing broadcast and NBMA interfaces ....................... 130 12.4.1.3 Describing virtual links ....................................................... 131 12.4.1.4 Describing Point-to-MultiPoint interfaces .......................... 131 12.4.1.5 Examples of router-LSAs .................................................... 132 12.4.2 Network-LSAs ..................................................................... 133 12.4.2.1 Examples of network-LSAs ................................................ 134 12.4.3 Summary-LSAs .................................................................... 135 12.4.3.1 Originating summary-LSAs into stub areas ........................ 137 12.4.3.2 Examples of summary-LSAs .............................................. 138 12.4.4 AS-external-LSAs ................................................................ 139 12.4.4.1 Examples of AS-external-LSAs .......................................... 140 The Flooding Procedure ................................................................. 143
[ Page 4 ]
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
11
12
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
13
www.networkdictionary. com
OSPF Version 2
April 1998
Determining which LSA is newer ......................................... 146 Installing LSAs in the database ............................................. 147 Next step in the flooding procedure ...................................... 148 Receiving self-originated LSAs ............................................ 151 Sending Link State Acknowledgment packets ...................... 152 Retransmitting LSAs ............................................................. 154 Receiving link state acknowledgments ................................. 155
Network Dictionary
http://www.javvin.com/networkdictionary.html
Aging The Link State Database ...................................................... 156 14.1 Premature aging of LSAs ...................................................... 157 Virtual Links ................................................................................... 158 Calculation of the routing table ...................................................... 160 16.1 Calculating the shortest-path tree for an area ........................ 161 16.1.1 The next hop calculation ...................................................... 167 16.2 Calculating the inter-area routes ........................................... 178 16.3 Examining transit areas' summary-LSAs .............................. 170 16.4 Calculating AS external routes .............................................. 173 16.4.1 External path preferences ..................................................... 175 16.5 Incremental updates -- summary-LSAs ................................ 175 16.6 Incremental updates -- AS-external-LSAs ............................ 177 16.7 Events generated as a result of routing table changes........... 177 16.8 Equal-cost multipath ............................................................. 178
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
Footnotes ................................................................................................... 179 References ................................................................................................. 183 A OSPF data formats .......................................................................... 185 A.1 Encapsulation of OSPF packets ............................................ 185 A.2 The Options field ................................................................... 187 A.3 OSPF Packet Formats ............................................................ 189 A.3.1 The OSPF packet header ...................................................... 190 A.3.2 The Hello packet .................................................................. 193 A.3.3 The Database Description packet ......................................... 195 A.3.4 The Link State Request packet ............................................. 197 A.3.5 The Link State Update packet .............................................. 199 A.3.6 The Link State Acknowledgment packet .............................. 201 A.4 LSA formats .......................................................................... 203 A.4.1 The LSA header .................................................................... 204 A.4.2 Router-LSAs ......................................................................... 206 A.4.3 Network-LSAs ..................................................................... 210 A.4.4 Summary-LSAs .................................................................... 212 A.4.5 AS-external-LSAs ................................................................ 214 Architectural Constants .................................................................. 217 Configurable Constants .................................................................. 219 C.1 Global parameters .................................................................. 219
[ Page 5 ]
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
B C
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
Area parameters ..................................................................... 220 Router interface parameters ................................................... 221 Virtual link parameters .......................................................... 224 NBMA network parameters ................................................... 224 Point-to-MultiPoint network parameters ............................... 225 Host route parameters ............................................................ 226
Network Dictionary
http://www.javvin.com/networkdictionary.html
Authentication ................................................................................ 227 D.1 Null authentication ................................................................ 227 D.2 Simple password authentication ............................................ 228 D.3 Cryptographic authentication ................................................ 228 D.4 Message generation ............................................................... 231 D.4.1 Generating Null authentication ............................................ 231 D.4.2 Generating Simple password authentication ........................ 232 D.4.3 Generating Cryptographic authentication ............................ 232 D.5 Message verification .............................................................. 234 D.5.1 Verifying Null authentication ............................................... 234 D.5.2 Verifying Simple password authentication ........................... 234 D.5.3 Verifying Cryptographic authentication ............................... 235 An algorithm for assigning Link State IDs ..................................... 236 Multiple interfaces to the same network/subnet ............................. 239 Differences from RFC 2178 ........................................................... 240 G.1 Flooding modifications .......................................................... 240 G.2 Changes to external path preferences .................................... 241 G.3 Incomplete resolution of virtual next hops ............................ 241 G.4 Routing table lookup ............................................................. 241
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
E F G
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
Security Considerations ............................................................................ 243 Author's Address ....................................................................................... 243 Full Copyright Statement ......................................................................... 244
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
[ Page 6 ]
OSPF Version 2
April 1998
1. Introduction
This document is a specification of the Open Shortest Path First (OSPF) TCP/IP internet routing protocol. OSPF is classified as an Interior Gateway Protocol (IGP). This means that it distributes routing information between routers belonging to a single Autonomous System. The OSPF protocol is based on link-state or SPF technology. This is a departure from the Bellman-Ford base used by traditional TCP/IP internet routing protocols. The OSPF protocol was developed by the OSPF working group of the Internet Engineering Task Force. It has been designed expressly for the TCP/IP internet environment, including explicit support for CIDR and the tagging of externally-derived routing information. OSPF also provides for the authentication of routing updates, and utilizes IP multicast when sending/receiving the updates. In addition, much work has been done to produce a protocol that responds quickly to topology changes, yet involves small amounts of routing protocol traffic.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
Autonomous System A group of routers exchanging routing information via a common routing protocol. Abbreviated as AS. Interior Gateway Protocol The routing protocol spoken by the routers belonging to an Autonomous system. Abbreviated as IGP. Each Autonomous System has a single IGP. Separate Autonomous Systems may be running different IGPs. Router ID A 32-bit number assigned to each router running the OSPF protocol. This number uniquely identifies the router within an Autonomous System. Network In this memo, an IP network/subnet/supernet. It is possible for one physical network to be assigned multiple IP network/subnet numbers. We consider these to be separate networks. Point-to-point physical networks are an exception - they are considered a single network no matter how many (if any at all) IP network/subnet numbers are assigned to them. Network mask A 32-bit number indicating the range of IP addresses residing on a single IP network/subnet/supernet. This specification displays network masks as hexadecimal numbers. For example, the network mask for a class C IP network is displayed as 0xffffff00. Such a mask is often displayed elsewhere in the literature as 255.255.255.0. Point-to-point networks A network that joins a single pair of routers. A 56Kb serial line is an example of a point-to-point network. Broadcast networks Networks supporting many (more than two) attached routers, together with the capability to address a single physical message to all of the attached routers (broadcast). Neighboring routers are discovered dynamically on these nets using OSPF's Hello Protocol. The Hello Protocol itself takes advantage of the broadcast capability. The OSPF protocol makes further use of multicast capabilities, if they exist. Each pair of routers on a broadcast network is assumed to be able to communicate directly. An ethernet is an example of a broadcast network. Non-broadcast networks Networks supporting many (more than two) routers, but having no broadcast capability. Neighboring routers are maintained on these nets using OSPF's Hello Protocol. However, due to the lack of broadcast capability, some configuration information may be necessary to aid in the discovery of neighbors. On non-broadcast networks, OSPF protocol packets that are normally multicast need to be sent to each neighboring router, in turn. An X.25 Public Data Network (PDN) is an example of a non-broadcast network. OSPF runs in one of two modes over non-broadcast networks. The first mode, called non-broadcast multi-access or NBMA, simulates the operation of OSPF on a broadcast network. The second mode, called Point-to-MultiPoint, treats the non- broadcast network as a collection of point-to-point links. Non-broadcast networks are referred to as NBMA networks or Point-to-MultiPoint networks, depending on OSPF's mode of operation over the network. Interface The connection between a router and one of its attached networks. An interface has state information associated with it, which is obtained from the underlying lower level protocols and the routing protocol itself. An interface to a network has associated with it a single IP address and mask (unless the network is an unnumbered point-to-point network). An interface is sometimes also referred to as a link. Neighboring routers Two routers that have interfaces to a common network. Neighbor relationships are maintained by, and usually dynamically discovered by, OSPF's Hello Protocol. Adjacency A relationship formed between selected neighboring routers for the purpose of exchanging routing information. Not every pair of neighboring routers become adjacent. Link state advertisement Unit of data describing the local state of a router or network. For a router, this includes the state of the [ Page 8 ]
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
router's interfaces and adjacencies. Each link state advertisement is flooded throughout the routing domain. The collected link state advertisements of all routers and networks forms the protocol's link state database. Throughout this memo, link state advertisement is abbreviated as LSA. Hello Protocol The part of the OSPF protocol used to establish and maintain neighbor relationships. On broadcast networks the Hello Protocol can also dynamically discover neighboring routers. Flooding The part of the OSPF protocol that distributes and synchronizes the link-state database between OSPF routers. Designated Router Each broadcast and NBMA network that has at least two attached routers has a Designated Router. The Designated Router generates an LSA for the network and has other special responsibilities in the running of the protocol. The Designated Router is elected by the Hello Protocol. The Designated Router concept enables a reduction in the number of adjacencies required on a broadcast or NBMA network. This in turn reduces the amount of routing protocol traffic and the size of the link-state database. Lower-level protocols The underlying network access protocols that provide services to the Internet Protocol and in turn the OSPF protocol. Examples of these are the X.25 packet and frame levels for X.25 PDNs, and the ethernet data link layer for ethernets.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
make the explanation more precise. Implementations of the protocol are required to support the functionality described, but need not use the precise data structures that appear in this memo.
Network Dictionary
1.5. Acknowledgments
The author would like to thank Ran Atkinson, Fred Baker, Jeffrey Burgan, Rob Coltun, Dino Farinacci, Vince Fuller, Phanindra Jujjavarapu, Milo Medin, Tom Pusateri, Kannan Varadhan, Zhaohui Zhang and the rest of the OSPF Working Group for the ideas and support they have given to this project. The OSPF Point-to-MultiPoint interface is based on work done by Fred Baker. The OSPF Cryptographic Authentication option was developed by Fred Baker and Ran Atkinson.
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
[ Page 10 ]
OSPF Version 2
April 1998
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
April 1998
Network Dictionary
NBMA mode is the most efficient way to run OSPF over non- broadcast networks, both in terms of linkstate database size and in terms of the amount of routing protocol traffic. However, it has one significant restriction: it requires all routers attached to the NBMA network to be able to communicate directly. This restriction may be met on some non-broadcast networks, such as an ATM subnet utilizing SVCs. But it is often not met on other non-broadcast networks, such as PVC-only Frame Relay networks. On non- broadcast networks where not all routers can communicate directly you can break the non-broadcast network into logical subnets, with the routers on each subnet being able to communicate directly, and then run each separate subnet as an NBMA network (see [Ref15]). This however requires quite a bit of administrative overhead, and is prone to misconfiguration. It is probably better to run such a non- broadcast network in Point-to-Multipoint mode. In Point-to-MultiPoint mode, OSPF treats all router-to- router connections over the non-broadcast network as if they were point-to-point links. No Designated Router is elected for the network, nor is there an LSA generated for the network. In fact, a vertex for the Point-to-MultiPoint network does not appear in the graph of the link-state database. Figure 1b illustrates the link-state database representation of a Point-to-MultiPoint network. On the left side of the figure, a Point-to-MultiPoint network is pictured. It is assumed that all routers can communicate directly, except for routers RT4 and RT5. I3 though I6 indicate the routers' IP interface addresses on the Point-to-MultiPoint network. In the graphical representation of the link-state database, routers that can communicate directly over the Point-to- MultiPoint network are joined by bidirectional edges, and each router also has a stub connection to its own IP interface address (which is in contrast to the representation of real point-to-point links; see Figure 1a). On some non-broadcast networks, use of Point-to-MultiPoint mode and data-link protocols such as Inverse ARP (see [Ref14]) will allow autodiscovery of OSPF neighbors even though broadcast support is not available.
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
Figure 1b: Network map components Point-to-MultiPoint networks All routers can communicate directly over N2, except routers RT4 and RT5. I3 through I6 indicate IP interface addresses
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
The link-state database is pieced together from LSAs generated by the routers. In the associated graphical representation, the neighborhood of each router or transit network is represented in a single, separate LSA. Figure 4 shows these LSAs graphically. Router RT12 has an interface to two broadcast networks and a SLIP line to a host. Network N6 is a broadcast network with three attached routers. The cost of all links from Network N6 to its attached routers is 0. Note that the LSA for Network N6 is actually generated by one of the network's attached routers: the router that has been elected Designated Router for the network.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
Figure 2: A sample Autonomous System **FROM**
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
[ Page 13 ]
OSPF Version 2
April 1998
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
DiskShare
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
Figure 4: Individual link state components Networks and routers are represented by vertices. An edge of cost X connects Vertex A to Vertex B iff the intersection of Column A and Row B is marked with an X.
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
April 1998
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
External routing information is flooded unaltered throughout the AS. In our example, all the routers in the Autonomous System know that Router RT7 has two external routes, with metrics 2 and 9. OSPF supports two types of external metrics. Type 1 external metrics are expressed in the same units as OSPF interface cost (i.e., in terms of the link state metric). Type 2 external metrics are an order of magnitude larger; any Type 2 metric is considered greater than the cost of any path internal to the AS. Use of Type 2 external metrics assumes that routing between AS'es is the major cost of routing a packet, and eliminates the need for conversion of external costs to internal link state metrics. As an example of Type 1 external metric processing, suppose that the Routers RT7 and RT5 in Figure 2 are advertising Type 1 external metrics. For each advertised external route, the total cost from Router RT6 is calculated as the sum of the external route's advertised cost and the distance from Router RT6 to the advertising router. When two routers are advertising the same external destination, RT6 picks the advertising router providing the minimum total cost. RT6 then sets the next hop to the external destination equal to the next hop that would be used when routing packets to the chosen advertising router. In Figure 2, both Router RT5 and RT7 are advertising an external route to destination Network N12. Router RT7 is preferred since it is advertising N12 at a distance of 10 (8+2) to Router RT6, which is better than Router RT5's 14 (6+8). Table 3 shows the entries that are added to the routing table when external routes are examined: Destination Next Hop Distance __________________________________ N12 RT10 10 N13 RT5 14 N14 RT5 14 N15 RT10 17 Table 3: The portion of Router RT6's routing table listing external destinations. Processing of Type 2 external metrics is simpler. The AS boundary router advertising the smallest external metric is chosen, regardless of the internal distance to the AS boundary router. Suppose in our example both Router RT5 and Router RT7 were advertising Type 2 external routes. Then all traffic destined for Network N12 would be forwarded to Router RT7, since 2 < 8. When several equal-cost Type 2 routes exist, the internal distance to the advertising routers is used to break the tie. Both Type 1 and Type 2 external metrics can be present in the AS at the same time. In that event, Type 1 external metrics always take precedence. This section has assumed that packets destined for external destinations are always routed through the advertising AS boundary router. This is not always desirable. For example, suppose in Figure 2 there is an additional router attached to Network N6, called Router RTX. Suppose further that RTX does not participate in OSPF routing, but does exchange BGP information with the AS boundary router RT7. Then, Router RT7 would end up advertising OSPF external routes for all destinations that should be routed to RTX. An extra hop will sometimes be introduced if packets for these destinations need always be routed first to Router RT7 (the advertising router). To deal with this situation, the OSPF protocol allows an AS boundary router to specify a "forwarding address" in its AS- external-LSAs. In the above example, Router RT7 would specify RTX's IP address as the "forwarding address" for all those destinations whose packets should be routed directly to RTX. The "forwarding address" has one other application. It enables routers in the Autonomous System's interior to function as "route servers". For example, in Figure 2 the router RT6 could become a route server, gaining external routing information through a combination of static configuration and external routing protocols. RT6 would then start advertising itself as an AS boundary router, and would originate a collection of OSPF AS-external-LSAs. In each AS-external-LSA, Router RT6 would specify the correct Autonomous System exit point to use for the destination through appropriate setting of the LSA's "forwarding address" field.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
With equal cost multipath, a router potentially has several available next hops towards any given destination.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
Internal routers A router with all directly connected networks belonging to the same area. These routers run a single copy of the basic routing algorithm. Area border routers A router that attaches to multiple areas. Area border routers run multiple copies of the basic algorithm, one copy for each attached area. Area border routers condense the topological information of their attached areas for distribution to the backbone. The backbone in turn distributes the information to the other areas. Backbone routers A router that has an interface to the backbone area. This includes all routers that interface to more than one area (i.e., area border routers). However, backbone routers do not have to be area border routers. Routers with all interfaces connecting to the backbone area are supported. AS boundary routers A router that exchanges routing information with routers belonging to other Autonomous Systems. Such a router advertises AS external routing information throughout the Autonomous System. The paths to each AS boundary router are known by every router in the AS. This classification is completely independent of the previous classifications: AS boundary routers may be internal or area border routers, and may or may not participate in the backbone.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
[ Page 18 ]
OSPF Version 2
April 1998
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
Figure 6: A sample OSPF area configuration distribution to the backbone. Their backbone LSAs are shown in Table 4. These summaries show which networks are contained in Area 1 (i.e., Networks N1-N4), and the distance to these networks from the routers RT3 and RT4 respectively. The link-state database for the backbone is shown in Figure 8. The set of routers pictured are the backbone routers. Router RT11 is a backbone router because it belongs to two areas. In order to make the backbone connected, a virtual link has been configured between Routers R10 and R11. The area border routers RT3, RT4, RT7, RT10 and RT11 condense the routing information of their attached non-backbone areas for distribution via the backbone; these are the dashed stubs that appear in Figure 8. Remember that the third area has been configured to condense Networks N9-N11 and Host H1 into a single route. This yields a single dashed line for networks N9-N11 and Host H1 in Figure 8. Routers RT5 and RT7 are AS boundary routers; their externally derived information also appears on the graph in Figure 8 as stubs. Network RT3 adv. RT4 adv. _____________________________ N1 4 4 N2 4 4 N3 1 1 N4 2 3 [ Page 19 ]
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2 Table 4: Networks advertised to the backbone by Routers RT3 and RT4. **FROM**
April 1998
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/ethernetguide. html
http://www.javvin.com/packet.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
[ Page 20 ]
OSPF Version 2 dist from dist from RT3 RT4 __________________________________ to RT3 * 21 to RT4 22 * to RT7 20 14 to RT10 15 22 to RT11 18 25 __________________________________ to Ia 20 27 to Ib 15 22 __________________________________ to RT5 14 8 to RT7 20 14 Table 5: Backbone distances calculated by Routers RT3 and RT4. Destination RT3 adv. RT4 adv. _________________________________ Ia,Ib 20 27 N6 16 15 N7 20 19 N8 18 18 N9-N11,H1 29 36 _________________________________ RT5 14 8 RT7 20 14 Table 6: Destinations advertised into Area 1 by Routers RT3 and RT4. load share between the two for traffic to Network N8.
April 1998
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
Router RT1 can also determine in this manner the shortest path to the AS boundary routers RT5 and RT7. Then, by looking at RT5 and RT7's AS-external-LSAs, Router RT1 can decide between RT5 or RT7 when sending to a destination in another Autonomous System (one of the networks N12-N15). Note that a failure of the line between Routers RT6 and RT10 will cause the backbone to become disconnected. Configuring a virtual link between Routers RT7 and RT10 will give the backbone more connectivity and more resistance to such failures.
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
the best match for the packet's destination. Here best match is synonymous with the longest or most specific match. For example, the default route with destination of 0.0.0.0 and mask 0x00000000 is always a match for every IP destination. Yet it is always less specific than any other match. Subnet masks must be assigned so that the best match for any IP destination is unambiguous. Attaching an address mask to each route also enables the support of IP supernetting. For example, a single physical network segment could be assigned the [address,mask] pair [192.9.4.0,0xfffffc00]. The segment would then be single IP network, containing addresses from the four consecutive class C network numbers 192.9.4.0 through 192.9.7.0. Such addressing is now becoming commonplace with the advent of CIDR (see [Ref10]). In order to get better aggregation at area boundaries, area address ranges can be employed (see Section C.2 for more details). Each address range is defined as an [address,mask] pair. Many separate networks may then be contained in a single address range, just as a subnetted network is composed of many separate subnets. Area border routers then summarize the area contents (for distribution to the backbone) by advertising a single route for each address range. The cost of the route is the maximum cost to any of the networks falling in the specified range. For example, an IP subnetted network might be configured as a single OSPF area. In that case, a single address range could be configured: a class A, B, or C network number along with its natural IP mask. Inside the area, any number of variable sized subnets could be defined. However, external to the area a single route for the entire subnetted network would be distributed, hiding even the fact that the network is subnetted at all. The cost of this route is the maximum of the set of costs to the component subnets.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
A group of edges, all having the same color, and interconnected by vertices, represents an area. If the topology of the Autonomous System is intact, the graph will have several regions of color, each color being a distinct Area ID. When the AS topology changes, one of the areas may become partitioned. The graph of the AS will then have multiple regions of the same color (Area ID). The routing in the Autonomous System will continue to function as long as these regions of same color are connected by the single backbone region.
Network Dictionary
http://www.javvin.com/networkdictionary.html
4. Functional Summary
A separate copy of OSPF's basic routing algorithm runs in each area. Routers having interfaces to multiple areas run multiple copies of the algorithm. A brief summary of the routing algorithm follows. When a router starts, it first initializes the routing protocol data structures. The router then waits for indications from the lower- level protocols that its interfaces are functional. A router then uses the OSPF's Hello Protocol to acquire neighbors. The router sends Hello packets to its neighbors, and in turn receives their Hello packets. On broadcast and point-to-point networks, the router dynamically detects its neighboring routers by sending its Hello packets to the multicast address AllSPFRouters. On non-broadcast networks, some configuration information may be necessary in order to discover neighbors. On broadcast and NBMA networks the Hello Protocol also elects a Designated router for the network. The router will attempt to form adjacencies with some of its newly acquired neighbors. Link-state databases are synchronized between pairs of adjacent routers. On broadcast and NBMA networks, the Designated Router determines which routers should become adjacent. Adjacencies control the distribution of routing information. Routing updates are sent and received only on adjacencies. A router periodically advertises its state, which is also called link state. Link state is also advertised when a router's state changes. A router's adjacencies are reflected in the contents of its LSAs. This relationship between adjacencies and link state allows the protocol to detect dead routers in a timely fashion. LSAs are flooded throughout the area. The flooding algorithm is reliable, ensuring that all routers in an area have exactly the same link-state database. This database consists of the collection of LSAs originated by each router belonging to the area. From this database each router calculates a shortest-path tree, with itself as root. This shortest-path tree in turn yields a routing table for the protocol.
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
[ Page 24 ]
OSPF Version 2 LS LSA LSA description type name ________________________________________________________ 1 Router-LSAs Originated by all routers. This LSA describes the collected states of the router's interfaces to an area. Flooded throughout a single area only. ________________________________________________________ 2 Network-LSAs Originated for broadcast and NBMA networks by the Designated Router. This LSA contains the list of routers connected to the network. Flooded throughout a single area only. ________________________________________________________ 3,4 Summary-LSAs Originated by area border routers, and flooded throughout the LSA's associated area. Each summary-LSA describes a route to a destination outside the area, yet still inside the AS (i.e., an inter-area route). Type 3 summary-LSAs describe routes to networks. Type 4 summary-LSAs describe routes to AS boundary routers. ________________________________________________________ 5 AS-external-LSAs Originated by AS boundary routers, and flooded throughout the AS. Each AS-external-LSA describes a route to a destination in another Autonomous System. Default routes for the AS can also be described by AS-external-LSAs. Table 9: OSPF link state advertisements (LSAs).
April 1998
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
IP multicast Certain OSPF packets take the form of IP multicast datagrams. Support for receiving and sending IP multicast datagrams, along with the appropriate lower-level protocol support, is required. The IP multicast datagrams used by OSPF never travel more than one hop. For this reason, the ability to forward IP multicast datagrams is not required. For information on IP multicast, see [Ref7]. Variable-length subnet support The router's IP protocol support must include the ability to divide a single IP class A, B, or C network number into many subnets of various sizes. This is commonly called variable-length subnetting; see Section 3.5 for details. IP supernetting support The router's IP protocol support must include the ability to aggregate contiguous collections of IP class A, B, and C networks into larger quantities called supernets. Supernetting has been proposed as one way to improve the scaling of IP routing in the worldwide Internet. For more information on IP supernetting, see [Ref10]. Lower-level protocol support The lower level protocols referred to here are the network access protocols, such as the Ethernet data link layer. Indications must be passed from these protocols to OSPF as the network interface goes up and down. For example, on an ethernet it would be valuable to know when the ethernet transceiver cable becomes unplugged. [ Page 25 ]
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
Non-broadcast lower-level protocol support On non-broadcast networks, the OSPF Hello Protocol can be aided by providing an indication when an attempt is made to send a packet to a dead or non-existent router. For example, on an X.25 PDN a dead neighboring router may be indicated by the reception of a X.25 clear with an appropriate cause and diagnostic, and this information would be passed to OSPF. List manipulation primitives Much of the OSPF functionality is described in terms of its operation on lists of LSAs. For example, the collection of LSAs that will be retransmitted to an adjacent router until acknowledged are described as a list. Any particular LSA may be on many such lists. An OSPF implementation needs to be able to manipulate these lists, adding and deleting constituent LSAs as necessary. Tasking support Certain procedures described in this specification invoke other procedures. At times, these other procedures should be executed in-line, that is, before the current procedure is finished. This is indicated in the text by instructions to execute a procedure. At other times, the other procedures are to be executed only when the current procedure has finished. This is indicated by instructions to schedule a task.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
Backbone (area) structure The OSPF backbone area is responsible for the dissemination of inter-area routing information. Virtual links configured The virtual links configured with this router as one endpoint. In order to have configured virtual links, the router itself must be an area border router. Virtual links are identified by the Router ID of the other endpoint -- which is another area border router. These two endpoint routers must be attached to a common area, called the virtual link's Transit area. Virtual links are part of the backbone, and behave as if they were unnumbered point-to-point networks between the two routers. A virtual link uses the intraarea routing of its Transit area to forward packets. Virtual links are brought up and down through the building of the shortest-path trees for the Transit area. List of external routes These are routes to destinations external to the Autonomous System, that have been gained either through direct experience with another routing protocol (such as BGP), or through configuration information, or through a combination of the two (e.g., dynamic external information to be advertised by OSPF with configured metric). Any router having these external routes is called an AS boundary router. These routes are advertised by the router into the OSPF routing domain via AS-external-LSAs. List of AS-external-LSAs Part of the link-state database. These have originated from the AS boundary routers. They comprise routes to destinations external to the Autonomous System. Note that, if the router is itself an AS boundary router, some of these AS-external-LSAs have been self-originated. The routing table Derived from the link-state database. Each entry in the routing table is indexed by a destination, and contains the destination's cost and a set of paths to use in forwarding packets to the destination. A path is described by its type and next hop. For more information, see Section 11. Figure 9 shows the collection of data structures present in a typical router. The router pictured is RT10, from the map in Figure 6. Note that Router RT10 has a virtual link configured to Router RT11, with Area 2 as the link's Transit area. This is indicated by the dashed line in Figure 9. When the virtual link becomes active, through the building of the shortest path tree for Area 2, it becomes an interface to the backbone (see the two backbone interfaces depicted in Figure 9).
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
[ Page 27 ]
OSPF Version 2
April 1998
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
Unless otherwise specified, the remaining sections of this document refer to the operation of the OSPF protocol within a single area.
Network Dictionary
7. Bringing Up Adjacencies
OSPF creates adjacencies between neighboring routers for the purpose of exchanging routing information. Not every two neighboring routers will become adjacent. This section covers the generalities involved in creating adjacencies. For further details consult Section 10.
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
The adjacency is used by the flooding procedure as soon as the Database Exchange Process begins. This simplifies database synchronization, and guarantees that it finishes in a predictable period of time.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
An adjacency is bound to the network that the two routers have in common. If two routers have multiple networks in common, they may have multiple adjacencies between them. One can picture the collection of adjacencies on a network as forming an undirected graph. The vertices consist of routers, with an edge joining two routers if they are adjacent. The graph of adjacencies describes the flow of routing protocol packets, and in particular Link State Update Packets, through the Autonomous System. Two graphs are possible, depending on whether a Designated Router is elected for the network. On physical point-to-point networks, Point-to-MultiPoint networks and virtual links, neighboring routers become adjacent whenever they can communicate directly. In contrast, on broadcast and NBMA networks only the Designated Router and the Backup Designated Router become adjacent to all other routers attached to the network.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2 Packet length The length of the entire OSPF packet in bytes, including the standard OSPF packet header. Router ID The identity of the router itself (who is originating the packet). Area ID The OSPF area that the packet is being sent into.
April 1998
Network Dictionary
http://www.javvin.com/networkdictionary.html
Checksum The standard IP 16-bit one's complement checksum of the entire OSPF packet, excluding the 64-bit authentication field. This checksum is calculated as part of the appropriate authentication procedure; for some OSPF authentication types, the checksum calculation is omitted. See Section D.4 for details. AuType and Authentication Each OSPF packet exchange is authenticated. Authentication types are assigned by the protocol and are documented in Appendix D. A different authentication procedure can be used for each IP network/subnet. Autype indicates the type of authentication procedure in use. The 64-bit authentication field is then for use by the chosen authentication procedure. This procedure should be the last called when forming the packet to be sent. See Section D.4 for details. The IP destination address for the packet is selected as follows. On physical point-to-point networks, the IP destination is always set to the address AllSPFRouters. On all other network types (including virtual links), the majority of OSPF packets are sent as unicasts, i.e., sent directly to the other end of the adjacency. In this case, the IP destination is just the Neighbor IP address associated with the other end of the adjacency (see Section 10). The only packets not sent as unicasts are on broadcast networks; on these networks Hello packets are sent to the multicast destination AllSPFRouters, the Designated Router and its Backup send both Link State Update Packets and Link State Acknowledgment Packets to the multicast address AllSPFRouters, while all other routers send both their Link State Update and Link State Acknowledgment Packets to the multicast address AllDRouters. Retransmissions of Link State Update packets are ALWAYS sent directly to the neighbor. On multi-access networks, this means that retransmissions should be sent to the neighbor's IP address. The IP source address should be set to the IP address of the sending interface. Interfaces to unnumbered point-to-point networks have no associated IP address. On these interfaces, the IP source should be set to any of the other IP addresses belonging to the router. For this reason, there must be at least one IP address assigned to the router.[2] Note that, for most purposes, virtual links act precisely the same as unnumbered point-to-point networks. However, each virtual link does have an IP interface address (discovered during the routing table build process) which is used as the IP source when sending packets over the virtual link. For more information on the format of specific OSPF packet types, consult the sections listed in Table 10. Type Packet name detailed section (transmit) _________________________________________________________ 1 Hello Section 9.5 2 Database description Section 10.8 3 Link state request Section 10.9 4 Link state update Section 13.3 5 Link state ack Section 13.5 Table 10: Sections describing OSPF protocol packet transmission.
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
April 1998
Network Dictionary
o The packet's IP destination address must be the IP address of the receiving interface, or one of the IP multicast addresses AllSPFRouters or AllDRouters. o The IP protocol specified must be OSPF (89). o Locally originated packets should not be passed on to OSPF. That is, the source IP address should be examined to make sure this is not a multicast packet that the router itself generated. Next, the OSPF packet header is verified. The fields specified in the header must match those configured for the receiving interface. If they do not, the packet should be discarded: o The version number field must specify protocol version 2. o The Area ID found in the OSPF header must be verified. If both of the following cases fail, the packet should be discarded. The Area ID specified in the header must either: (1) Match the Area ID of the receiving interface. In this case, the packet has been sent over a single hop. Therefore, the packet's IP source address is required to be on the same network as the receiving interface. This can be verified by comparing the packet's IP source address to the interface's IP address, after masking both addresses with the interface mask. This comparison should not be performed on point-to-point networks. On point-to-point networks, the interface addresses of each end of the link are assigned independently, if they are assigned at all. (2) Indicate the backbone. In this case, the packet has been sent over a virtual link. The receiving router must be an area border router, and the Router ID specified in the packet (the source router) must be the other end of a configured virtual link. The receiving interface must also attach to the virtual link's configured Transit area. If all of these checks succeed, the packet is accepted and is from now on associated with the virtual link (and the backbone area). o Packets whose IP destination is AllDRouters should only be accepted if the state of the receiving interface is DR or Backup (see Section 9.1). o The AuType specified in the packet must match the AuType specified for the associated area. o The packet must be authenticated. The authentication procedure is indicated by the setting of AuType (see Appendix D). The authentication procedure may use one or more Authentication keys, which can be configured on a per- interface basis. The authentication procedure may also verify the checksum field in the OSPF packet header (which, when used, is set to the standard IP 16-bit one's complement checksum of the OSPF packet's contents after excluding the 64-bit authentication field). If the authentication procedure fails, the packet should be discarded. If the packet type is Hello, it should then be further processed by the Hello Protocol (see Section 10.5). All other packet types are sent/received only on adjacencies. This means that the packet must have been sent by one of the router's active neighbors. If the receiving interface connects to a broadcast network, Point-to-MultiPoint network or NBMA network the sender is identified by the IP source address found in the packet's IP header. If the receiving interface connects to a point-to-point network or a virtual link, the sender is identified by the Router ID (source router) found in the packet's OSPF header. The data structure associated with the receiving interface contains the list of active neighbors. Packets not matching any active neighbor are discarded. At this point all received protocol packets are associated with an active neighbor. For the further input processing of specific packet types, consult the sections listed in Table 11. Type Packet name detailed section (receive) ________________________________________________________ 1 Hello Section 10.5 2 Database description Section 10.6 3 Link state request Section 10.7 4 Link state update Section 13 5 Link state ack Section 13.7 Table 11: Sections describing OSPF protocol packet reception.
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
An OSPF interface is the connection between a router and a network. We assume a single OSPF interface to each attached network/subnet, although supporting multiple interfaces on a single network is considered in Appendix F. Each interface structure has at most one IP interface address. An OSPF interface can be considered to belong to the area that contains the attached network. All routing protocol packets originated by the router over this interface are labelled with the interface's Area ID. One or more router adjacencies may develop over an interface. A router's LSAs reflect the state of its interfaces and their associated adjacencies. The following data items are associated with an interface. Note that a number of these items are actually configuration for the attached network; such items must be the same for all routers connected to the network. Type The OSPF interface type is either point-to-point, broadcast, NBMA, Point-to-MultiPoint or virtual link. State The functional level of an interface. State determines whether or not full adjacencies are allowed to form over the interface. State is also reflected in the router's LSAs. IP interface address The IP address associated with the interface. This appears as the IP source address in all routing protocol packets originated over this interface. Interfaces to unnumbered point-to-point networks do not have an associated IP address. IP interface mask Also referred to as the subnet mask, this indicates the portion of the IP interface address that identifies the attached network. Masking the IP interface address with the IP interface mask yields the IP network number of the attached network. On point-to-point networks and virtual links, the IP interface mask is not defined. On these networks, the link itself is not assigned an IP network number, and so the addresses of each side of the link are assigned independently, if they are assigned at all. Area ID The Area ID of the area to which the attached network belongs. All routing protocol packets originating from the interface are labelled with this Area ID. HelloInterval The length of time, in seconds, between the Hello packets that the router sends on the interface. Advertised in Hello packets sent out this interface. RouterDeadInterval The number of seconds before the router's neighbors will declare it down, when they stop hearing the router's Hello Packets. Advertised in Hello packets sent out this interface. InfTransDelay The estimated number of seconds it takes to transmit a Link State Update Packet over this interface. LSAs contained in the Link State Update packet will have their age incremented by this amount before transmission. This value should take into account transmission and propagation delays; it must be greater than zero. Router Priority An 8-bit unsigned integer. When two routers attached to a network both attempt to become Designated Router, the one with the highest Router Priority takes precedence. A router whose Router Priority is set to 0 is ineligible to become Designated Router on the attached network. Advertised in Hello packets sent out this interface. Hello Timer An interval timer that causes the interface to send a Hello packet. This timer fires every HelloInterval seconds. Note that on non-broadcast networks a separate Hello packet is sent to each qualified neighbor. Wait Timer A single shot timer that causes the interface to exit the Waiting state, and as a consequence select a Designated Router on the network. The length of the timer is RouterDeadInterval seconds. [ Page 34 ]
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
List of neighboring routers The other routers attached to this network. This list is formed by the Hello Protocol. Adjacencies will be formed to some of these neighbors. The set of adjacent neighbors can be determined by an examination of all of the neighbors' states. Designated Router The Designated Router selected for the attached network. The Designated Router is selected on all broadcast and NBMA networks by the Hello Protocol. Two pieces of identification are kept for the Designated Router: its Router ID and its IP interface address on the network. The Designated Router advertises link state for the network; this network-LSA is labelled with the Designated Router's IP address. The Designated Router is initialized to 0.0.0.0, which indicates the lack of a Designated Router. Backup Designated Router The Backup Designated Router is also selected on all broadcast and NBMA networks by the Hello Protocol. All routers on the attached network become adjacent to both the Designated Router and the Backup Designated Router. The Backup Designated Router becomes Designated Router when the current Designated Router fails. The Backup Designated Router is initialized to 0.0.0.0, indicating the lack of a Backup Designated Router. Interface output cost(s) The cost of sending a data packet on the interface, expressed in the link state metric. This is advertised as the link cost for this interface in the router-LSA. The cost of an interface must be greater than zero. RxmtInterval The number of seconds between LSA retransmissions, for adjacencies belonging to this interface. Also used when retransmitting Database Description and Link State Request Packets. AuType The type of authentication used on the attached network/subnet. Authentication types are defined in Appendix D. All OSPF packet exchanges are authenticated. Different authentication schemes may be used on different networks/subnets. Authentication key This configured data allows the authentication procedure to generate and/or verify OSPF protocol packets. The Authentication key can be configured on a per-interface basis. For example, if the AuType indicates simple password, the Authentication key would be a 64-bit clear password which is inserted into the OSPF packet header. If instead Autype indicates Cryptographic authentication, then the Authentication key is a shared secret which enables the generation/verification of message digests which are appended to the OSPF protocol packets. When Cryptographic authentication is used, multiple simultaneous keys are supported in order to achieve smooth key transition (see Section D.3).
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
[ Page 35 ]
OSPF Version 2
April 1998
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
State changes can be effected by a number of events. These events are pictured as the labelled arcs in Figure 11. The label definitions are listed below. For a detailed explanation of the effect of these events on OSPF protocol operation, consult Section 9.3. InterfaceUp Lower-level protocols have indicated that the network interface is operational. This enables the interface to transition out of Down state. On virtual links, the interface operational indication is actually a result of the shortest path calculation (see Section 16.7). WaitTimer The Wait Timer has fired, indicating the end of the waiting period that is required before electing a (Backup) Designated Router. BackupSeen The router has detected the existence or non-existence of a Backup Designated Router for the network. This is done in one of two ways. First, an Hello Packet may be received from a neighbor claiming to be itself the Backup Designated Router. Alternatively, an Hello Packet may be received from a neighbor claiming to be itself the Designated Router, and indicating that there is no Backup Designated Router. In either case there must be bidirectional communication with the neighbor, i.e., the router must also appear in the neighbor's Hello Packet. This event signals an end to the Waiting state. NeighborChange There has been a change in the set of bidirectional neighbors associated with the interface. The (Backup) Designated Router needs to be recalculated. The following neighbor changes lead to the NeighborChange event. For an explanation of neighbor states, see Section 10.1. o Bidirectional communication has been established to a neighbor. In other words, the state of the neighbor has transitioned to 2-Way or higher. o There is no longer bidirectional communication with a neighbor. In other words, the state of the neighbor has transitioned to Init or lower. o One of the bidirectional neighbors is newly declaring itself as either Designated Router or Backup Designated Router. This is detected through examination of that neighbor's Hello Packets. o One of the bidirectional neighbors is no longer declaring itself as Designated Router, or is no longer declaring itself as Backup Designated Router. This is again detected through examination of that neighbor's Hello Packets. o The advertised Router Priority for a bidirectional neighbor has changed. This is again detected through examination of that neighbor's Hello Packets. LoopInd An indication has been received that the interface is now looped back to itself. This indication can be received either from network management or from the lower level protocols. UnloopInd An indication has been received that the interface is no longer looped back. As with the LoopInd event, this indication can be received either from network management or from the lower level protocols. InterfaceDown Lower-level protocols indicate that this interface is no longer functional. No matter what the current interface state is, the new interface state will be Down.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
when an interface becomes inoperative, all neighbor connections associated with the interface must be destroyed. For more information on the neighbor state machine, see Section 10.3. State(s): Event: New state: Action: Down InterfaceUp Depends upon action routine Start the interval Hello Timer, enabling the periodic sending of Hello packets out the interface. If the attached network is a physical point-to-point network, Point-toMultiPoint network or virtual link, the interface state transitions to Point-to- Point. Else, if the router is not eligible to become Designated Router the interface state transitions to DR Other. Otherwise, the attached network is a broadcast or NBMA network and the router is eligible to become Designated Router. In this case, in an attempt to discover the attached network's Designated Router the interface state is set to Waiting and the single shot Wait Timer is started. Additionally, if the network is an NBMA network examine the configured list of neighbors for this interface and generate the neighbor event Start for each neighbor that is also eligible to become Designated Router. State(s): Event: New state: Action: Waiting BackupSeen Depends upon action routine. Calculate the attached network's Backup Designated Router and Designated Router, as shown in Section 9.4. As a result of this calculation, the new state of the interface will be either DR Other, Backup or DR. Waiting WaitTimer Depends upon action routine. Calculate the attached network's Backup Designated Router and Designated Router, as shown in Section 9.4. As a result of this calculation, the new state of the interface will be either DR Other, Backup or DR. DR Other, Backup or DR NeighborChange Depends upon action routine. Recalculate the attached network's Backup Designated Router and Designated Router, as shown in Section 9.4. As a result of this calculation, the new state of the interface will be either DR Other, Backup or DR. Any State InterfaceDown Down All interface variables are reset, and interface timers disabled. Also, all neighbor connections associated with the interface are destroyed. This is done by generating the event KillNbr on all associated neighbors (see Section 10.2). Any State [ Page 38 ]
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
State(s):
www.networkdictionary. com
April 1998
Network Dictionary
http://www.javvin.com/networkdictionary.html
Since this interface is no longer connected to the attached network the actions associated with the above InterfaceDown event are executed. Loopback UnloopInd Down No actions are necessary. For example, the interface variables have already been reset upon entering the Loopback state. Note that reception of an InterfaceUp event is necessary before the interface again becomes fully functional.
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
eligible to become Designated Router (see Section 9.5.1). This is done by invoking the neighbor event Start for each neighbor having a Router Priority of 0. (7) If the above calculations have caused the identity of either the Designated Router or Backup Designated Router to change, the set of adjacencies associated with this interface will need to be modified. Some adjacencies may need to be formed, and others may need to be broken. To accomplish this, invoke the event AdjOK? on all neighbors whose state is at least 2-Way. This will cause their eligibility for adjacency to be reexamined (see Sections 10.3 and 10.4). The reason behind the election algorithm's complexity is the desire for an orderly transition from Backup Designated Router to Designated Router, when the current Designated Router fails. This orderly transition is ensured through the introduction of hysteresis: no new Backup Designated Router can be chosen until the old Backup accepts its new Designated Router responsibilities. The above procedure may elect the same router to be both Designated Router and Backup Designated Router, although that router will never be the calculating router (Router X) itself. The elected Designated Router may not be the router having the highest Router Priority, nor will the Backup Designated Router necessarily have the second highest Router Priority. If Router X is not itself eligible to become Designated Router, it is possible that neither a Backup Designated Router nor a Designated Router will be selected in the above procedure. Note also that if Router X is the only attached router that is eligible to become Designated Router, it will select itself as Designated Router and there will be no Backup Designated Router for the network.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
router's hello- sending behavior varies depending on whether the router itself is eligible to become Designated Router. If the router is eligible to become Designated Router, it must periodically send Hello Packets to all neighbors that are also eligible. In addition, if the router is itself the Designated Router or Backup Designated Router, it must also send periodic Hello Packets to all other neighbors. This means that any two eligible routers are always exchanging Hello Packets, which is necessary for the correct operation of the Designated Router election algorithm. To minimize the number of Hello Packets sent, the number of eligible routers on an NBMA network should be kept small. If the router is not eligible to become Designated Router, it must periodically send Hello Packets to both the Designated Router and the Backup Designated Router (if they exist). It must also send an Hello Packet in reply to an Hello Packet received from any eligible neighbor (other than the current Designated Router and Backup Designated Router). This is needed to establish an initial bidirectional relationship with any potential Designated Router. When sending Hello packets periodically to any neighbor, the interval between Hello Packets is determined by the neighbor's state. If the neighbor is in state Down, Hello Packets are sent every PollInterval seconds. Otherwise, Hello Packets are sent every HelloInterval seconds.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
as the Link ID for the attached network if the neighboring router is selected to be Designated Router (see Section 12.4.1). The Neighbor IP address is learned when Hello packets are received from the neighbor. For virtual links, the Neighbor IP address is learned during the routing table build process (see Section 15). Neighbor Options The optional OSPF capabilities supported by the neighbor. Learned during the Database Exchange process (see Section 10.6). The neighbor's optional OSPF capabilities are also listed in its Hello packets. This enables received Hello Packets to be rejected (i.e., neighbor relationships will not even start to form) if there is a mismatch in certain crucial OSPF capabilities (see Section 10.5). The optional OSPF capabilities are documented in Section 4.5. Neighbor's Designated Router The neighbor's idea of the Designated Router. If this is the neighbor itself, this is important in the local calculation of the Designated Router. Defined only on broadcast and NBMA networks. Neighbor's Backup Designated Router The neighbor's idea of the Backup Designated Router. If this is the neighbor itself, this is important in the local calculation of the Backup Designated Router. Defined only on broadcast and NBMA networks. The next set of variables are lists of LSAs. These lists describe subsets of the area link-state database. This memo defines five distinct types of LSAs, all of which may be present in an area link-state database: router-LSAs, network-LSAs, and Type 3 and 4 summary-LSAs (all stored in the area data structure), and AS- external-LSAs (stored in the global data structure). Link state retransmission list The list of LSAs that have been flooded but not acknowledged on this adjacency. These will be retransmitted at intervals until they are acknowledged, or until the adjacency is destroyed. Database summary list The complete list of LSAs that make up the area link-state database, at the moment the neighbor goes into Database Exchange state. This list is sent to the neighbor in Database Description packets. Link state request list The list of LSAs that need to be received from this neighbor in order to synchronize the two neighbors' link-state databases. This list is created as Database Description packets are received, and is then sent to the neighbor in Link State Request packets. The list is depleted as appropriate Link State Update packets are received.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
received from the neighbor. On NBMA networks, Hello packets may still be sent to "Down" neighbors, although at a reduced frequency (see Section 9.5.1).
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
Figure 13: Neighbor state changes (Database Exchange) In addition to the state transitions pictured, Event SeqNumberMismatch forces ExStart state, Event BadLSReq forces ExStart state, Event 1-Way forces Init state, Event KillNbr always forces Down State, Event InactivityTimer always forces Down State, Event LLDown always forces Down State, Event AdjOK? leads to adjacency forming/breaking Attempt This state is only valid for neighbors attached to NBMA networks. It indicates that no recent information has been received from the neighbor, but that a more concerted effort should be made to contact the neighbor. This is done by sending the neighbor Hello packets at intervals of HelloInterval (see Section 9.5.1). Init In this state, an Hello packet has recently been seen from the neighbor. However, bidirectional communication has not yet been established with the neighbor (i.e., the router itself did not appear in the neighbor's Hello packet). All neighbors in this state (or higher) are listed in the Hello packets sent from the associated interface. [ Page 43 ]
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
2-Way In this state, communication between the two routers is bidirectional. This has been assured by the operation of the Hello Protocol. This is the most advanced state short of beginning adjacency establishment. The (Backup) Designated Router is selected from the set of neighbors in state 2-Way or greater. ExStart This is the first step in creating an adjacency between the two neighboring routers. The goal of this step is to decide which router is the master, and to decide upon the initial DD sequence number. Neighbor conversations in this state or greater are called adjacencies. Exchange In this state the router is describing its entire link state database by sending Database Description packets to the neighbor. Each Database Description Packet has a DD sequence number, and is explicitly acknowledged. Only one Database Description Packet is allowed outstanding at any one time. In this state, Link State Request Packets may also be sent asking for the neighbor's more recent LSAs. All adjacencies in Exchange state or greater are used by the flooding procedure. In fact, these adjacencies are fully capable of transmitting and receiving all types of OSPF routing protocol packets. Loading In this state, Link State Request packets are sent to the neighbor asking for the more recent LSAs that have been discovered (but not yet received) in the Exchange state. Full In this state, the neighboring routers are fully adjacent. These adjacencies will now appear in routerLSAs and network-LSAs.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
SeqNumberMismatch A Database Description packet has been received that either a) has an unexpected DD sequence number, b) unexpectedly has the Init bit set or c) has an Options field differing from the last Options field received in a Database Description packet. Any of these conditions indicate that some error has occurred during adjacency establishment. 1-Way An Hello packet has been received from the neighbor, in which the router is not mentioned. This indicates that communication with the neighbor is not bidirectional. KillNbr This is an indication that all communication with the neighbor is now impossible, forcing the neighbor to revert to Down state. InactivityTimer The inactivity Timer has fired. This means that no Hello packets have been seen recently from the neighbor. The neighbor reverts to Down state. LLDown This is an indication from the lower level protocols that the neighbor is now unreachable. For example, on an X.25 network this could be indicated by an X.25 clear indication with appropriate cause and diagnostic fields. This event forces the neighbor into Down state.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
April 1998 Start the Inactivity Timer for the neighbor. The timer's later firing would indicate that the neighbor is dead. Init or greater HelloReceived No state change. Restart the Inactivity Timer for the neighbor, since the neighbor has again been heard from. Init 2-WayReceived Depends upon action routine. Determine whether an adjacency should be established with the neighbor (see Section 10.4). If not, the new neighbor state is 2-Way. Otherwise (an adjacency should be established) the neighbor state transitions to ExStart. Upon entering this state, the router increments the DD sequence number in the neighbor data structure. If this is the first time that an adjacency has been attempted, the DD sequence number should be assigned some unique value (like the time of day clock). It then declares itself master (sets the master/slave bit to master), and starts sending Database Description Packets, with the initialize (I), more (M) and master (MS) bits set. This Database Description Packet should be otherwise empty. This Database Description Packet should be retransmitted at intervals of RxmtInterval until the next state is entered (see Section 10.8).
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
ExStart NegotiationDone Exchange The router must list the contents of its entire area link state database in the neighbor Database summary list. The area link state database consists of the routerLSAs, network-LSAs and summary-LSAs contained in the area structure, along with the AS-external- LSAs contained in the global structure. AS- external-LSAs are omitted from a virtual neighbor's Database summary list. AS-external-LSAs are omitted from the Database summary list if the area has been configured as a stub (see Section 3.6). LSAs whose age is equal to MaxAge are instead added to the neighbor's Link state retransmission list. A summary of the Database summary list will be sent to the neighbor in Database Description packets. Each Database Description Packet has a DD sequence number, and is explicitly acknowledged. Only one Database Description Packet is allowed outstanding at any one time. For more detail on the sending and receiving of Database Description packets, see Sections 10.8 and 10.6. Exchange ExchangeDone Depends upon action routine. If the neighbor Link state request list is empty, the new neighbor state is Full. No other action is required. This is an adjacency's final state. Otherwise, the new neighbor state is Loading. Start (or continue) sending Link State Request packets to the neighbor (see Section 10.9). These are requests for the neighbor's more recent LSAs (which were discovered but not yet received in the Exchange state). [ Page 46 ]
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998 These LSAs are listed in the Link state request list associated with the neighbor.
Network Dictionary
State(s): Event: New state: Action: State(s): Event: New state: Action:
Loading Loading Done Full No action required. This is an adjacency's final state. 2-Way AdjOK? Depends upon action routine. Determine whether an adjacency should be formed with the neighboring router (see Section 10.4). If not, the neighbor state remains at 2-Way. Otherwise, transition the neighbor state to ExStart and perform the actions associated with the above state machine entry for state Init and event 2-WayReceived. ExStart or greater AdjOK? Depends upon action routine. Determine whether the neighboring router should still be adjacent. If yes, there is no state change and no further action is necessary. Otherwise, the (possibly partially formed) adjacency must be destroyed. The neighbor state transitions to 2-Way. The Link state retransmission list, Database summary list and Link state request list are cleared of LSAs.
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
Exchange or greater SeqNumberMismatch ExStart The (possibly partially formed) adjacency is torn down, and then an attempt is made at reestablishment. The neighbor state first transitions to ExStart. The Link state retransmission list, Database summary list and Link state request list are cleared of LSAs. Then the router increments the DD sequence number in the neighbor data structure, declares itself master (sets the master/slave bit to master), and starts sending Database Description Packets, with the initialize (I), more (M) and master (MS) bits set. This Database Description Packet should be otherwise empty (see Section 10.8). Exchange or greater BadLSReq ExStart The action for event BadLSReq is exactly the same as for the neighbor event SeqNumberMismatch. The (possibly partially formed) adjacency is torn down, and then an attempt is made at reestablishment. For more information, see the neighbor state machine entry that is invoked when event SeqNumberMismatch is generated in state Exchange or greater. Any state KillNbr [ Page 47 ]
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
State(s): Event:
www.networkdictionary. com
OSPF Version 2 New state: Action: State(s): Event: New state: Action: State(s): Event: New state: Action: State(s): Event: New state: Action: Down
April 1998
Network Dictionary
The Link state retransmission list, Database summary list and Link state request list are cleared of LSAs. Also, the Inactivity Timer is disabled. Any state LLDown Down The Link state retransmission list, Database summary list and Link state request list are cleared of LSAs. Also, the Inactivity Timer is disabled. Any state InactivityTimer Down The Link state retransmission list, Database summary list and Link state request list are cleared of LSAs. 2-Way or greater 1-WayReceived Init The Link state retransmission list, Database summary list and Link state request list are cleared of LSAs. 2-Way or greater 2-WayReceived No state change. No action required. Init 1-WayReceived No state change. No action required.
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html State(s): Event: New state: Action: State(s): Event: New state: Action:
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2 o The underlying network type is Point-to-MultiPoint o The underlying network type is virtual link o The router itself is the Designated Router o The router itself is the Backup Designated Router o The neighboring router is the Designated Router o The neighboring router is the Backup Designated Router
April 1998
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2 receiving interface's state machine is scheduled with the event NeighborChange.
April 1998
Network Dictionary
o If the neighbor is declaring itself to be Backup Designated Router (Hello Packet's Backup Designated Router field = Neighbor IP address) and the receiving interface is in state Waiting, the receiving interface's state machine is scheduled with the event BackupSeen. Otherwise, if the neighbor is declaring itself to be Backup Designated Router and it had not previously, or the neighbor is not declaring itself Backup Designated Router where it had previously, the receiving interface's state machine is scheduled with the event NeighborChange. On NBMA networks, receipt of an Hello Packet may also cause an Hello Packet to be sent back to the neighbor in response. See Section 9.5.1 for more details.
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
o If the initialize(I) bit is set, generate the neighbor event SeqNumberMismatch and stop processing the packet. o If the packet's Options field indicates a different set of optional OSPF capabilities than were previously received from the neighbor (recorded in the Neighbor Options field of the neighbor structure), generate the neighbor event SeqNumberMismatch and stop processing the packet. o Database Description packets must be processed in sequence, as indicated by the packets' DD sequence numbers. If the router is master, the next packet received should have DD sequence number equal to the DD sequence number in the neighbor data structure. If the router is slave, the next packet received should have DD sequence number equal to one more than the DD sequence number stored in the neighbor data structure. In either case, if the packet is the next in sequence it should be accepted and its contents processed as specified below. o Else, generate the neighbor event SeqNumberMismatch and stop processing the packet. Loading or Full In this state, the router has sent and received an entire sequence of Database Description Packets. The only packets received should be duplicates (see above). In particular, the packet's Options field should match the set of optional OSPF capabilities previously indicated by the neighbor (stored in the neighbor structure's Neighbor Options field). Any other packets received, including the reception of a packet with the Initialize(I) bit set, should generate the neighbor event SeqNumberMismatch.[8] Duplicates should be discarded by the master. The slave must respond to duplicates by repeating the last Database Description packet that it had sent. When the router accepts a received Database Description Packet as the next in sequence the packet contents are processed as follows. For each LSA listed, the LSA's LS type is checked for validity. If the LS type is unknown (e.g., not one of the LS types 1-5 defined by this specification), or if this is an AS- external-LSA (LS type = 5) and the neighbor is associated with a stub area, generate the neighbor event SeqNumberMismatch and stop processing the packet. Otherwise, the router looks up the LSA in its database to see whether it also has an instance of the LSA. If it does not, or if the database copy is less recent (see Section 13.1), the LSA is put on the Link state request list so that it can be requested (immediately or at some later time) in Link State Request Packets. When the router accepts a received Database Description Packet as the next in sequence, it also performs the following actions, depending on whether it is master or slave: Master Increments the DD sequence number in the neighbor data structure. If the router has already sent its entire sequence of Database Description Packets, and the just accepted packet has the more bit (M) set to 0, the neighbor event ExchangeDone is generated. Otherwise, it should send a new Database Description to the slave. Slave Sets the DD sequence number in the neighbor data structure to the DD sequence number appearing in the received packet. The slave must send a Database Description Packet in reply. If the received packet has the more bit (M) set to 0, and the packet to be sent by the slave will also have the M-bit set to 0, the neighbor event ExchangeDone is generated. Note that the slave always generates this event before the master.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
This section describes how Database Description Packets are sent to a neighbor. The Database Description packet's Interface MTU field is set to the size of the largest IP datagram that can be sent out the sending interface, without fragmentation. Common MTUs in use in the Internet can be found in Table 7-1 of [Ref22]. Interface MTU should be set to 0 in Database Description packets sent over virtual links. The router's optional OSPF capabilities (see Section 4.5) are transmitted to the neighbor in the Options field of the Database Description packet. The router should maintain the same set of optional capabilities throughout the Database Exchange and flooding procedures. If for some reason the router's optional capabilities change, the Database Exchange procedure should be restarted by reverting to neighbor state ExStart. One optional capability is defined in this specification (see Sections 4.5 and A.2). The E-bit should be set if and only if the attached network belongs to a non-stub area. Unrecognized bits in the Options field should be set to zero. The sending of Database Description packets depends on the neighbor's state. In state ExStart the router sends empty Database Description packets, with the initialize (I), more (M) and master (MS) bits set. These packets are retransmitted every RxmtInterval seconds. In state Exchange the Database Description Packets actually contain summaries of the link state information contained in the router's database. Each LSA in the area's link-state database (at the time the neighbor transitions into Exchange state) is listed in the neighbor Database summary list. Each new Database Description Packet copies its DD sequence number from the neighbor data structure and then describes the current top of the Database summary list. Items are removed from the Database summary list when the previous packet is acknowledged. In state Exchange, the determination of when to send a Database Description packet depends on whether the router is master or slave: Master Database Description packets are sent when either a) the slave acknowledges the previous Database Description packet by echoing the DD sequence number or b) RxmtInterval seconds elapse without an acknowledgment, in which case the previous Database Description packet is retransmitted. Slave Database Description packets are sent only in response to Database Description packets received from the master. If the Database Description packet received from the master is new, a new Database Description packet is sent, otherwise the previous Database Description packet is resent. In states Loading and Full the slave must resend its last Database Description packet in response to duplicate Database Description packets received from the master. For this reason the slave must wait RouterDeadInterval seconds before freeing the last Database Description packet. Reception of a Database Description packet from the master after this interval will generate a SeqNumberMismatch neighbor event.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
10.10. An Example
Figure 14 shows an example of an adjacency forming. Routers RT1 and RT2 are both connected to a broadcast network. It is assumed that RT2 is the Designated Router for the network, and that RT2 has a higher Router ID than Router RT1. The neighbor state changes realized by each router are listed on the sides of the figure. [ Page 52 ]
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
At the beginning of Figure 14, Router RT1's interface to the network becomes operational. It begins sending Hello Packets, although it doesn't know the identity of the Designated Router or of any other neighboring routers. Router RT2 hears this hello (moving the neighbor to Init state), and in its next Hello Packet indicates that it is itself the Designated Router and that it has heard Hello Packets from RT1. This in turn causes RT1 to go to state ExStart, as it starts to bring up the adjacency. RT1 begins by asserting itself as the master. When it sees that RT2 is indeed the master (because of RT2's higher Router ID), RT1 transitions to slave state and adopts its neighbor's DD sequence number. Database Description packets are then exchanged, with polls coming from the master (RT2) and responses from the slave (RT1). This sequence of Database Description
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
Figure 14: An adjacency bring-up example Packets ends when both the poll and associated response has the M-bit off. In this example, it is assumed that RT2 has a completely up to date database. In that case, RT2 goes immediately into Full state. RT1 will go into Full state after updating the necessary parts of its database. This is done by sending Link State Request Packets, and receiving Link State Update Packets in response. Note that, while RT1 has waited until a complete set of Database Description Packets has been received (from RT2) before sending any Link State Request Packets, this need not be the case. RT1 could have interleaved the sending of Link State Request Packets with the reception of Database Description Packets.
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
other matching entry is a better match). Finding the routing table entry that best matches an IP destination is further described in Section 11.1. There is a single routing table in each router. Two sample routing tables are described in Sections 11.2 and 11.3. The building of the routing table is discussed in Section 16. The rest of this section defines the fields found in a routing table entry. The first set of fields describes the routing table entry's destination. Destination Type Destination type is either "network" or "router". Only network entries are actually used when forwarding IP data traffic. Router routing table entries are used solely as intermediate steps in the routing table build process. A network is a range of IP addresses, to which IP data traffic may be forwarded. This includes IP networks (class A, B, or C), IP subnets, IP supernets and single IP hosts. The default route also falls into this category. Router entries are kept for area border routers and AS boundary routers. Routing table entries for area border routers are used when calculating the inter-area routes (see Section 16.2), and when maintaining configured virtual links (see Section 15). Routing table entries for AS boundary routers are used when calculating the AS external routes (see Section 16.4). Destination ID The destination's identifier or name. This depends on the Destination Type. For networks, the identifier is their associated IP address. For routers, the identifier is the OSPF Router ID.[9] Address Mask Only defined for networks. The network's IP address together with its address mask defines a range of IP addresses. For IP subnets, the address mask is referred to as the subnet mask. For host routes, the mask is "all ones" (0xffffffff). Optional Capabilities When the destination is a router this field indicates the optional OSPF capabilities supported by the destination router. The only optional capability defined by this specification is the ability to process AS-external-LSAs. For a further discussion of OSPF's optional capabilities, see Section 4.5. The set of paths to use for a destination may vary based on the OSPF area to which the paths belong. This means that there may be multiple routing table entries for the same destination, depending on the values of the next field. Area This field indicates the area whose link state information has led to the routing table entry's collection of paths. This is called the entry's associated area. For sets of AS external paths, this field is not defined. For destinations of type "router", there may be separate sets of paths (and therefore separate routing table entries) associated with each of several areas. For example, this will happen when two area border routers share multiple areas in common. For destinations of type "network", only the set of paths associated with the best area (the one providing the preferred route) is kept. The rest of the routing table entry describes the set of paths to the destination. The following fields pertain to the set of paths as a whole. In other words, each one of the paths contained in a routing table entry is of the same path-type and cost (see below). Path-type There are four possible types of paths used to route traffic to the destination, listed here in decreasing order of preference: intra-area, inter-area, type 1 external or type 2 external. Intra-area paths indicate destinations belonging to one of the router's attached areas. Inter-area paths are paths to destinations in other OSPF areas. These are discovered through the examination of received summary-LSAs. AS external paths are paths to destinations external to the AS. These are detected through the examination of received AS-external-LSAs. Cost The link state cost of the path to the destination. For all paths except type 2 external paths this describes the entire path's cost. For Type 2 external paths, this field describes the cost of the portion of the path internal to the AS. This cost is calculated as the sum of the costs of the path's constituent links. [ Page 54 ]
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
Type 2 cost Only valid for type 2 external paths. For these paths, this field indicates the cost of the path's external portion. This cost has been advertised by an AS boundary router, and is the most significant part of the total path cost. For example, a type 2 external path with type 2 cost of 5 is always preferred over a path with type 2 cost of 10, regardless of the cost of the two paths' internal components. Link State Origin Valid only for intra-area paths, this field indicates the LSA (router-LSA or network-LSA) that directly references the destination. For example, if the destination is a transit network, this is the transit network's network-LSA. If the destination is a stub network, this is the router-LSA for the attached router. The LSA is discovered during the shortest-path tree calculation (see Section 16.1). Multiple LSAs may reference the destination, however a tie-breaking scheme always reduces the choice to a single LSA. The Link State Origin field is not used by the OSPF protocol, but it is used by the routing table calculation in OSPF's Multicast routing extensions (MOSPF). When multiple paths of equal path-type and cost exist to a destination (called elsewhere "equal-cost" paths), they are stored in a single routing table entry. Each one of the "equal-cost" paths is distinguished by the following fields: Next hop The outgoing router interface to use when forwarding traffic to the destination. On broadcast, Point-toMultiPoint and NBMA networks, the next hop also includes the IP address of the next router (if any) in the path towards the destination. Advertising router Valid only for inter-area and AS external paths. This field indicates the Router ID of the router advertising the summary- LSA or AS-external-LSA that led to this path.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
Networks N12, N13, N14 and N15). It is assumed all AS-external-LSAs originated by RT5 and RT7 are advertising type 1 external metrics. This results in type 1 external paths being calculated to destinations N12-N15.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
[ Page 56 ]
April 1998
Next Adv. Hops(s) Router(s) __________________________________________________________________ N N1 1 intra-area 4 RT1 * N N2 1 intra-area 4 RT2 * N N3 1 intra-area 1 * * N N4 1 intra-area 3 RT3 * R RT3 1 intra-area 1 * * __________________________________________________________________ N Ib 0 intra-area 22 RT5 * N Ia 0 intra-area 27 RT5 * R RT3 0 intra-area 21 RT5 * R RT5 0 intra-area 8 * * R RT7 0 intra-area 14 RT5 * R RT10 0 intra-area 22 RT5 * R RT11 0 intra-area 25 RT5 * __________________________________________________________________ N N6 0 inter-area 15 RT5 RT7 N N7 0 inter-area 19 RT5 RT7 N N8 0 inter-area 18 RT5 RT7 N N9-N11,H1 0 inter-area 36 RT5 RT11 __________________________________________________________________ N N12 * type 1 ext. 16 RT5 RT5,RT7 N N13 * type 1 ext. 16 RT5 RT5 N N14 * type 1 ext. 16 RT5 RT5 N N15 * type 1 ext. 23 RT5 RT7 Table 13: Router RT4's routing table in the presence of areas.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
in Table 14.
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
The LSA header contains the LS type, Link State ID and Advertising Router fields. The combination of these three fields uniquely identifies the LSA. There may be several instances of an LSA present in the Autonomous System, all at the same time. It must then be determined which instance is more recent. This determination is made by examining the LS sequence, LS checksum and LS age fields. These fields are also contained in the 20-byte LSA header. Several of the OSPF packet types list LSAs. When the instance is not important, an LSA is referred to by [ Page 57 ]
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
its LS type, Link State ID and Advertising Router (see Link State Request Packets). Otherwise, the LS sequence number, LS age and LS checksum fields must also be referenced. A detailed explanation of the fields contained in the LSA header follows.
Network Dictionary
http://www.javvin.com/networkdictionary.html
12.1.1. LS age
This field is the age of the LSA in seconds. It should be processed as an unsigned 16-bit integer. It is set to 0 when the LSA is originated. It must be incremented by InfTransDelay on every hop of the flooding procedure. LSAs are also aged as they are held in each router's database. The age of an LSA is never incremented past MaxAge. LSAs having age MaxAge are not used in the routing table calculation. When an LSA's age first reaches MaxAge, it is reflooded. An LSA of age MaxAge is finally flushed from the database when it is no longer needed to ensure database synchronization. For more information on the aging of LSAs, consult Section 14. The LS age field is examined when a router receives two instances of an LSA, both having identical LS sequence numbers and LS checksums. An instance of age MaxAge is then always accepted as most recent; this allows old LSAs to be flushed quickly from the routing domain. Otherwise, if the ages differ by more than MaxAgeDiff, the instance having the smaller age is accepted as most recent.[12] See Section 13.1 for more details.
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
12.1.2. Options
The Options field in the LSA header indicates which optional capabilities are associated with the LSA. OSPF's optional capabilities are described in Section 4.5. One optional capability is defined by this specification, represented by the E-bit found in the Options field. The unrecognized bits in the Options field should be set to zero. The E-bit represents OSPF's ExternalRoutingCapability. This bit should be set in all LSAs associated with the backbone, and all LSAs associated with non-stub areas (see Section 3.6). It should also be set in all ASexternal-LSAs. It should be reset in all router-LSAs, network-LSAs and summary-LSAs associated with a stub area. For all LSAs, the setting of the E-bit is for informational purposes only; it does not affect the routing table calculation.
http://www.javvin.com/diskshare.html
DiskAccess
12.1.3. LS type
The LS type field dictates the format and function of the LSA. LSAs of different types have different names (e.g., router-LSAs or network-LSAs). All LSA types defined by this memo, except the AS-externalLSAs (LS type = 5), are flooded throughout a single area only. AS-external-LSAs are flooded throughout the entire Autonomous System, excepting stub areas (see Section 3.6). Each separate LSA type is briefly described below in Table 15.
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
[ Page 58 ]
OSPF Version 2 LS Type LSA description ________________________________________________ 1 These are the router-LSAs. They describe the collected states of the router's interfaces. For more information, consult Section 12.4.1. ________________________________________________ 2 These are the network-LSAs. They describe the set of routers attached to the network. For more information, consult Section 12.4.2. ________________________________________________ 3 or 4 These are the summary-LSAs. They describe inter-area routes, and enable the condensation of routing information at area borders. Originated by area border routers, the Type 3 summary-LSAs describe routes to networks while the Type 4 summary-LSAs describe routes to AS boundary routers. ________________________________________________ 5 These are the AS-external-LSAs. Originated by AS boundary routers, they describe routes to destinations external to the Autonomous System. A default route for the Autonomous System can also be described by an AS-external-LSA. Table 15: OSPF link state advertisements (LSAs). 16.
April 1998
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
Actually, for Type 3 summary-LSAs (LS type = 3) and AS- external-LSAs (LS type = 5), the Link State ID may LS Type Link State ID _______________________________________________ 1 The originating router's Router ID. 2 The IP interface address of the network's Designated Router. 3 The destination network's IP address. 4 The Router ID of the described AS boundary router. 5 The destination network's IP address. Table 16: The LSA's Link State ID. additionally have one or more of the destination network's "host" bits set. For example, when originating an AS- external-LSA for the network 10.0.0.0 with mask of 255.0.0.0, the Link State ID can be set to anything in the range 10.0.0.0 through 10.255.255.255 inclusive (although 10.0.0.0 should be used whenever possible). The freedom to set certain host bits allows a router to originate separate LSAs for two networks having the same address but different masks. See Appendix E for details. When the LSA is describing a network (LS type = 2, 3 or 5), the network's IP address is easily derived by masking the Link State ID with the network/subnet mask contained in the body of the LSA. When the LSA is describing a router (LS type = 1 or 4), the Link State ID is always the described router's OSPF Router ID. When an AS-external-LSA (LS Type = 5) is describing a default route, its Link State ID is set to DefaultDestination (0.0.0.0).
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
This field specifies the OSPF Router ID of the LSA's originator. For router-LSAs, this field is identical to the Link State ID field. Network-LSAs are originated by the network's Designated Router. Summary-LSAs originated by area border routers. AS-external-LSAs are originated by AS boundary routers.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
12.1.7. LS checksum
This field is the checksum of the complete contents of the LSA, excepting the LS age field. The LS age field is excepted so that an LSA's age can be incremented without updating the checksum. The checksum used is the same that is used for ISO connectionless datagrams; it is commonly referred to as the Fletcher checksum. It is documented in Annex B of [Ref6]. The LSA header also contains the length of the LSA in bytes; subtracting the size of the LS age field (two bytes) yields the amount of data to checksum. The checksum is used to detect data corruption of an LSA. This corruption can occur while an LSA is being flooded, or while it is being held in a router's memory. The LS checksum field cannot take on the value of zero; the occurrence of such a value should be considered a checksum failure. In other words, calculation of the checksum is not optional. The checksum of an LSA is verified in two cases: a) when it is received in a Link State Update Packet and b) at times during the aging of the link state database. The detection of a checksum failure leads to separate actions in each case. See Sections 13 and 14 for more details. Whenever the LS sequence number field indicates that two instances of an LSA are the same, the LS checksum field is examined. If there is a difference, the instance with the larger LS checksum is considered to be most recent.[13] See Section 13.1 for more details.
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
this lookup function the router can determine whether it has itself ever originated a particular LSA, and if so, with what LS sequence number. An LSA is added to a router's database when either a) it is received during the flooding process (Section 13) or b) it is originated by the router itself (Section 12.4). An LSA is deleted from a router's database when either a) it has been overwritten by a newer instance during the flooding process (Section 13) or b) the router originates a newer instance of one of its self-originated LSAs (Section 12.4) or c) the LSA ages out and is flushed from the routing domain (Section 14). Whenever an LSA is deleted from the database it must also be removed from all neighbors' Link state retransmission lists (see Section 10).
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
set to 0, its LS checksum is calculated, and the LSA is added to the link state database and flooded out the appropriate interfaces. See Section 13.2 for details concerning the installation of the LSA into the link state database. See Section 13.3 for details concerning the flooding of newly originated LSAs. The ten events that can cause a new instance of an LSA to be originated are: (1) The LS age field of one of the router's self-originated LSAs reaches the value LSRefreshTime. In this case, a new instance of the LSA is originated, even though the contents of the LSA (apart from the LSA header) will be the same. This guarantees periodic originations of all LSAs. This periodic updating of LSAs adds robustness to the link state algorithm. LSAs that solely describe unreachable destinations should not be refreshed, but should instead be flushed from the routing domain (see Section 14.1). When whatever is being described by an LSA changes, a new LSA is originated. However, two instances of the same LSA may not be originated within the time period MinLSInterval. This may require that the generation of the next instance be delayed by up to MinLSInterval. The following events may cause the contents of an LSA to change. These events should cause new originations if and only if the contents of the new LSA would be different: (2) An interface's state changes (see Section 9.1). This may mean that it is necessary to produce a new instance of the router-LSA. (3) An attached network's Designated Router changes. A new router-LSA should be originated. Also, if the router itself is now the Designated Router, a new network-LSA should be produced. If the router itself is no longer the Designated Router, any network-LSA that it might have originated for the network should be flushed from the routing domain (see Section 14.1). (4) One of the neighboring routers changes to/from the FULL state. This may mean that it is necessary to produce a new instance of the router-LSA. Also, if the router is itself the Designated Router for the attached network, a new network-LSA should be produced. The next four events concern area border routers only: (5) An intra-area route has been added/deleted/modified in the routing table. This may cause a new instance of a summary- LSA (for this route) to be originated in each attached area (possibly including the backbone). (6) An inter-area route has been added/deleted/modified in the routing table. This may cause a new instance of a summary- LSA (for this route) to be originated in each attached area (but NEVER for the backbone). (7) The router becomes newly attached to an area. The router must then originate summary-LSAs into the newly attached area for all pertinent intra-area and inter-area routes in the router's routing table. See Section 12.4.3 for more details. (8) When the state of one of the router's configured virtual links changes, it may be necessary to originate a new router-LSA into the virtual link's Transit area (see the discussion of the router-LSA's bit V in Section 12.4.1), as well as originating a new router-LSA into the backbone. The last two events concern AS boundary routers (and former AS boundary routers) only: (9) An external route gained through direct experience with an external routing protocol (like BGP) changes. This will cause an AS boundary router to originate a new instance of an AS-external-LSA. (10) A router ceases to be an AS boundary router, perhaps after restarting. In this situation the router should flush all AS-external-LSAs that it had previously originated. These LSAs can be flushed via the premature aging procedure specified in Section 14.1. The construction of each type of LSA is explained in detail below. In general, these sections describe the contents of the LSA body (i.e., the part coming after the 20-byte LSA header). For information concerning the building of the LSA header, see Section 12.1.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
12.4.1. Router-LSAs
A router originates a router-LSA for each area that it belongs to. Such an LSA describes the collected states of the router's links to the area. The LSA is flooded throughout the particular area, and no further. [ Page 62 ]
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
April 1998
Network Dictionary
o If the attached network does not belong to Area A, no links are added to the LSA, and the next interface should be examined. o If the state of the interface is Down, no links are added. o If the state of the interface is Loopback, add a Type 3 link (stub network) as long as this is not an interface to an unnumbered point-to-point network. The Link ID should be set to the IP interface address, the Link Data set to the mask 0xffffffff (indicating a host route), and the cost set to 0. o Otherwise, the link descriptions added to the router-LSA depend on the OSPF interface type. Link descriptions used for point-to-point interfaces are specified in Section 12.4.1.1, for virtual links in Section 12.4.1.2, for broadcast and NBMA interfaces in 12.4.1.3, and for Point-to-MultiPoint interfaces in 12.4.1.4. After consideration of all the router interfaces, host links are added to the router-LSA by examining the list of attached hosts belonging to Area A. A host route is represented as a Type 3 link (stub network) whose Link ID is the host's IP address, Link Data is the mask of all ones (0xffffffff), and cost the host's configured cost (see Section C.7).
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
Link Data set to the IP interface address associated with the virtual link and cost set to the cost calculated for the virtual link during the routing table calculation (see Section 15).
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
Next RT3's router-LSA for the backbone is shown. It indicates that RT3 has a single attachment to the backbone. This attachment is via an unnumbered point-to-point link to Router RT6. RT3 has again indicated that it is an area border router. ; RT3's router-LSA for the backbone LS age = 0 Options = (E-bit) LS type = 1 Link State ID = 192.1.1.3 Advertising Router = 192.1.1.3 bit E = 0 bit B = 1 ;always true on origination ; ;indicates router-LSA ;RT3's router ID ;RT3's router ID ;not an AS boundary router ;area border router [ Page 65 ]
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2 #links = 1 Link ID = 18.10.0.6 Link Data = 0.0.0.3 Type = 1 # TOS metrics = 0 metric = 8 ;Neighbor's Router ID ;MIB-II ifIndex of P-P link ;connects to router
April 1998
Network Dictionary
http://www.javvin.com/networkdictionary.html
12.4.2. Network-LSAs
A network-LSA is generated for every transit broadcast or NBMA network. (A transit network is a network having two or more attached routers). The network-LSA describes all the routers that are attached to the network. The Designated Router for the network originates the LSA. The Designated Router originates the LSA only if it is fully adjacent to at least one other router on the network. The network-LSA is flooded throughout the area that contains the transit network, and no further. The network-LSA lists those routers that are fully adjacent to the Designated Router; each fully adjacent router is identified by its OSPF Router ID. The Designated Router includes itself in this list. The Link State ID for a network-LSA is the IP interface address of the Designated Router. This value, masked by the network's address mask (which is also contained in the network-LSA) yields the network's IP address. A router that has formerly been the Designated Router for a network, but is no longer, should flush the network-LSA that it had previously originated. This LSA is no longer used in the routing table calculation. It is flushed by prematurely incrementing the LSA's age to MaxAge and reflooding (see Section 14.1). In addition, in those rare cases where a router's Router ID has changed, any network-LSAs that were originated with the router's previous Router ID must be flushed. Since the router may have no idea what it's previous Router ID might have been, these network-LSAs are indicated by having their Link State ID equal to one of the router's IP interface addresses and their Advertising Router equal to some value other than the router's current Router ID (see Section 13.4 for more details).
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
12.4.3. Summary-LSAs
The destination described by a summary-LSA is either an IP network, an AS boundary router or a range of IP addresses. Summary-LSAs are flooded throughout a single area only. The destination described is one that is external to the area, yet still belongs to the Autonomous System. Summary-LSAs are originated by area border routers. The precise summary routes to advertise into an area are determined by examining the routing table structure (see Section 11) in accordance with the algorithm described below. Note that only intra-area routes are advertised into the backbone, while both intra-area and inter-area routes are advertised into the other areas. To determine which routes to advertise into an attached Area A, each routing table entry is processed as follows. Remember that each routing table entry describes a set of equal-cost best paths to a particular destination: [ Page 66 ]
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
o Only Destination Types of network and AS boundary router are advertised in summary-LSAs. If the routing table entry's Destination Type is area border router, examine the next routing table entry. o AS external routes are never advertised in summary-LSAs. If the routing table entry has Path-type of type 1 external or type 2 external, examine the next routing table entry. o Else, if the area associated with this set of paths is the Area A itself, do not generate a summary-LSA for the route.[17] o Else, if the next hops associated with this set of paths belong to Area A itself, do not generate a summary-LSA for the route.[18] This is the logical equivalent of a Distance Vector protocol's split horizon logic. o Else, if the routing table cost equals or exceeds the value LSInfinity, a summary-LSA cannot be generated for this route. o Else, if the destination of this route is an AS boundary router, a summary-LSA should be originated if and only if the routing table entry describes the preferred path to the AS boundary router (see Step 3 of Section 16.4). If so, a Type 4 summary-LSA is originated for the destination, with Link State ID equal to the AS boundary router's Router ID and metric equal to the routing table entry's cost. Note: these LSAs should not be generated if Area A has been configured as a stub area. o Else, the Destination type is network. If this is an inter-area route, generate a Type 3 summary-LSA for the destination, with Link State ID equal to the network's address (if necessary, the Link State ID can also have one or more of the network's host bits set; see Appendix E for details) and metric equal to the routing table cost. o The one remaining case is an intra-area route to a network. This means that the network is contained in one of the router's directly attached areas. In general, this information must be condensed before appearing in summary-LSAs. Remember that an area has a configured list of address ranges, each range consisting of an [address,mask] pair and a status indication of either Advertise or DoNotAdvertise. At most a single Type 3 summary-LSA is originated for each range. When the range's status indicates Advertise, a Type 3 summary-LSA is generated with Link State ID equal to the range's address (if necessary, the Link State ID can also have one or more of the range's "host" bits set; see Appendix E for details) and cost equal to the largest cost of any of the component networks. When the range's status indicates DoNotAdvertise, the Type 3 summary-LSA is suppressed and the component networks remain hidden from other areas. By default, if a network is not contained in any explicitly configured address range, a Type 3 summaryLSA is generated with Link State ID equal to the network's address (if necessary, the Link State ID can also have one or more of the network's "host" bits set; see Appendix E for details) and metric equal to the network's routing table cost. If an area is capable of carrying transit traffic (i.e., its TransitCapability is set to TRUE), routing information concerning backbone networks should not be condensed before being summarized into the area. Nor should the advertisement of backbone networks into transit areas be suppressed. In other words, the backbone's configured ranges should be ignored when originating summary-LSAs into transit areas. If a router advertises a summary-LSA for a destination which then becomes unreachable, the router must then flush the LSA from the routing domain by setting its age to MaxAge and reflooding (see Section 14.1). Also, if the destination is still reachable, yet can no longer be advertised according to the above procedure (e.g., it is now an inter-area route, when it used to be an intra-area route associated with some non-backbone area; it would thus no longer be advertisable to the backbone), the LSA should also be flushed from the routing domain.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
April 1998
Network Dictionary
In a stub area, instead of importing external routes each area border router originates a "default summaryLSA" into the area. The Link State ID for the default summary-LSA is set to DefaultDestination, and the metric set to the (per-area) configurable parameter StubDefaultCost. Note that StubDefaultCost need not be configured identically in all of the stub area's area border routers.
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
; Summary-LSA for AS boundary router RT7 ; originated by Router RT4 into Area 1 LS age = 0 ;always true on origination Options = (E-bit) ; LS type = 4 ;Type 4 summary-LSA Link State ID = Router RT7's ID Advertising Router = 192.1.1.4 ;RT4's ID metric = 14
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
12.4.4. AS-external-LSAs
AS-external-LSAs describe routes to destinations external to the Autonomous System. Most AS-externalLSAs describe routes to specific external destinations; in these cases the LSA's Link State ID is set to the destination network's IP address (if necessary, the Link State ID can also have one or more of the network's "host" bits set; see Appendix E for details). However, a default route for the Autonomous System can be described in an AS-external-LSA by setting the LSA's Link State ID to DefaultDestination (0.0.0.0). ASexternal-LSAs are originated by AS boundary routers. An AS boundary router originates a single AS-external-LSA for each external route that it has learned, either through another routing protocol (such as BGP), or through configuration information. AS-external-LSAs are the only type of LSAs that are flooded throughout the entire Autonomous System; all other types of LSAs are specific to a single area. However, AS-external- LSAs are not flooded into/ throughout stub areas (see Section 3.6). This enables a reduction in link state database size for routers internal to stub areas. The metric that is advertised for an external route can be one of two types. Type 1 metrics are comparable to the link state metric. Type 2 metrics are assumed to be larger than the cost of any intra-AS path. If a router advertises an AS-external-LSA for a destination which then becomes unreachable, the router must then flush the LSA from the routing domain by setting its age to MaxAge and reflooding (see Section 14.1).
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
[ Page 68 ]
OSPF Version 2
April 1998
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
[ Page 69 ]
OSPF Version 2
April 1998
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
[ Page 70 ]
OSPF Version 2
April 1998
(c) Remove the current database copy from all neighbors' Link state retransmission lists. (d) Install the new LSA in the link state database (replacing the current database copy). This may cause the routing table calculation to be scheduled. In addition, timestamp the new LSA with the current time (i.e., the time it was received). The flooding procedure cannot overwrite the newly installed LSA until MinLSArrival seconds have elapsed. The LSA installation process is discussed further in Section 13.2. (e) Possibly acknowledge the receipt of the LSA by sending a Link State Acknowledgment packet back out the receiving interface. This is explained below in Section 13.5. (f) If this new LSA indicates that it was originated by the receiving router itself (i.e., is considered a self- originated LSA), the router must take special action, either updating the LSA or in some cases flushing it from the routing domain. For a description of how self-originated LSAs are detected and subsequently handled, see Section 13.4. (6) Else, if there is an instance of the LSA on the sending neighbor's Link state request list, an error has occurred in the Database Exchange process. In this case, restart the Database Exchange process by generating the neighbor event BadLSReq for the sending neighbor and stop processing the Link State Update packet. (7) Else, if the received LSA is the same instance as the database copy (i.e., neither one is more recent) the following two steps should be performed: (a) If the LSA is listed in the Link state retransmission list for the receiving adjacency, the router itself is expecting an acknowledgment for this LSA. The router should treat the received LSA as an acknowledgment by removing the LSA from the Link state retransmission list. This is termed an "implied acknowledgment". Its occurrence should be noted for later use by the acknowledgment process (Section 13.5). (b) Possibly acknowledge the receipt of the LSA by sending a Link State Acknowledgment packet back out the receiving interface. This is explained below in Section 13.5. (8) Else, the database copy is more recent. If the database copy has LS age equal to MaxAge and LS sequence number equal to MaxSequenceNumber, simply discard the received LSA without acknowledging it. (In this case, the LSA's LS sequence number is wrapping, and the MaxSequenceNumber LSA must be completely flushed before any new LSA instance can be introduced). Otherwise, as long as the database copy has not been sent in a Link State Update within the last MinLSArrival seconds, send the database copy back to the sending neighbor, encapsulated within a Link State Update Packet. The Link State Update Packet should be sent directly to the neighbor. In so doing, do not put the database copy of the LSA on the neighbor's link state retransmission list, and do not acknowledge the received (less recent) LSA instance.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
April 1998
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
Link state databases must remain synchronized over all adjacencies associated with the above eligible interfaces. This is accomplished by executing the following steps on each eligible interface. It should be noted that this procedure may decide not to flood an LSA out a particular interface, if there is a high probability that the attached neighbors have already received the LSA. However, in these cases the flooding procedure must be absolutely sure that the neighbors eventually do receive the LSA, so the LSA is still added to each adjacency's Link state retransmission list. For each eligible interface: (1) Each of the neighbors attached to this interface are examined, to determine whether they must receive the new LSA. The following steps are executed for each neighbor: (a) If the neighbor is in a lesser state than Exchange, it does not participate in flooding, and the next neighbor should be examined. (b) Else, if the adjacency is not yet full (neighbor state is Exchange or Loading), examine the Link state request list associated with this adjacency. If there is an instance of the new LSA on the list, it indicates that the neighboring router has an instance of the LSA already. Compare the new LSA to the neighbor's copy: o If the new LSA is less recent, then examine the next neighbor. o If the two copies are the same instance, then delete the LSA from the Link state request list, and examine the next neighbor.[20] o Else, the new LSA is more recent. Delete the LSA from the Link state request list. (c) If the new LSA was received from this neighbor, examine the next neighbor. (d) At this point we are not positive that the neighbor has an up-to-date instance of this new LSA. Add the new LSA to the Link state retransmission list for the adjacency. This ensures that the flooding procedure is reliable; the LSA will be retransmitted at intervals until an acknowledgment is seen from the neighbor. (2) The router must now decide whether to flood the new LSA out this interface. If in the previous step, the LSA was NOT added to any of the Link state retransmission lists, there is no need to flood the LSA out the interface and the next interface should be examined. (3) If the new LSA was received on this interface, and it was received from either the Designated Router or the Backup Designated Router, chances are that all the neighbors have received the LSA already. Therefore, examine the next interface. (4) If the new LSA was received on this interface, and the interface state is Backup (i.e., the router itself is the Backup Designated Router), examine the next interface. The Designated Router will do the flooding on this interface. However, if the Designated Router fails the router (i.e., the Backup Designated Router) will end up retransmitting the updates. (5) If this step is reached, the LSA must be flooded out the interface. Send a Link State Update packet (including the new LSA as contents) out the interface. The LSA's LS age must be incremented by InfTransDelay (which must be > 0) when it is copied into the outgoing Link State Update packet (until the LS age field reaches the maximum value of MaxAge). On broadcast networks, the Link State Update packets are multicast. The destination IP address specified for the Link State Update Packet depends on the state of the interface. If the interface state is DR or Backup, the address AllSPFRouters should be used. Otherwise, the address AllDRouters should be used. On non-broadcast networks, separate Link State Update packets must be sent, as unicasts, to each adjacent neighbor (i.e., those in state Exchange or greater). The destination IP addresses for these packets are the neighbors' IP addresses.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
However, if the received self-originated LSA is newer than the last instance that the router actually originated, the router must take special action. The reception of such an LSA indicates that there are LSAs in the routing domain that were originated by the router before the last time it was restarted. In most cases, the router must then advance the LSA's LS sequence number one past the received LS sequence number, and originate a new instance of the LSA. It may be the case the router no longer wishes to originate the received LSA. Possible examples include: 1) the LSA is a summary-LSA or AS-external-LSA and the router no longer has an (advertisable) route to the destination, 2) the LSA is a network-LSA but the router is no longer Designated Router for the network or 3) the LSA is a network-LSA whose Link State ID is one of the router's own IP interface addresses but whose Advertising Router is not equal to the router's own Router ID (this latter case should be rare, and it indicates that the router's Router ID has changed since originating the LSA). In all these cases, instead of updating the LSA, the LSA should be flushed from the routing domain by incrementing the received LSA's LS age to MaxAge and reflooding (see Section 14.1).
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
[ Page 74 ]
OSPF Version 2 Action taken in state Circumstances Backup All other states _________________________________________________________________ LSA has No acknowledgment No acknowledgment been flooded back sent. sent. out receiving interface (see Section 13, step 5b). _________________________________________________________________ LSA is Delayed acknowledgDelayed ackmore recent than ment sent if advernowledgment sent. database copy, but tisement received was not flooded from Designated back out receiving Router, otherwise interface do nothing _________________________________________________________________ LSA is a Delayed acknowledgNo acknowledgment duplicate, and was ment sent if adversent. treated as an imtisement received plied acknowledgfrom Designated ment (see Section Router, otherwise 13, step 7a). do nothing _________________________________________________________________ LSA is a Direct acknowledgDirect acknowledgduplicate, and was ment sent. ment sent. not treated as an implied acknowledgment. _________________________________________________________________ LSA's LS Direct acknowledgDirect acknowledgage is equal to ment sent. ment sent. MaxAge, and there is no current instance of the LSA in the link state database, and none of router's neighbors are in states Exchange Table 19: Sending link state acknowledgements.
April 1998
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
on the state of the interface. If the interface state is DR or Backup, the destination AllSPFRouters is used. In all other states, the destination AllDRouters is used. On non-broadcast networks, delayed Link State Acknowledgment packets must be unicast separately over each adjacency (i.e., neighbor whose state is >= Exchange). The reasoning behind sending the above packets as multicasts is best explained by an example. Consider the network configuration depicted in Figure 15. Suppose RT4 has been elected as Designated Router, and RT3 as Backup Designated Router for the network N3. When Router RT4 floods a new LSA to Network N3, it is received by routers RT1, RT2, and RT3. These routers will not flood the LSA back onto net N3, but they still must ensure that their link-state databases remain synchronized with their adjacent neighbors. So RT1, RT2, and RT4 are waiting to see an acknowledgment from RT3. Likewise, RT4 and RT3 are both waiting to see acknowledgments from RT1 and RT2. This is best achieved by sending the acknowledgments as multicasts. The reason that the acknowledgment logic for Backup DRs is slightly different is because they perform differently during the flooding of LSAs (see Section 13.3, step 4).
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
Several retransmitted LSAs may fit into a single Link State Update packet. When LSAs are to be retransmitted, only the number fitting in a single Link State Update packet should be sent. Another packet of retransmissions can be sent whenever some of the LSAs are acknowledged, or on the next firing of the retransmission timer. Link State Update Packets carrying retransmissions are always sent directly to the neighbor. On multi-access networks, this means that retransmissions are sent directly to the neighbor's IP address. Each LSA's LS age must be incremented by InfTransDelay (which must be > 0) when it is copied into the outgoing Link State Update packet (until the LS age field reaches the maximum value of MaxAge). If an adjacent router goes down, retransmissions may occur until the adjacency is destroyed by OSPF's Hello Protocol. When the adjacency is destroyed, the Link state retransmission list is cleared.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
point, the current LSA instance (having LS sequence number MaxSequenceNumber) must be prematurely aged and flushed from the routing domain before a new instance with sequence number equal to InitialSequenceNumber can be originated. See Section 12.1.6 for more information. Premature aging can also be used when, for example, one of the router's previously advertised external routes is no longer reachable. In this circumstance, the router can flush its AS- external-LSA from the routing domain via premature aging. This procedure is preferable to the alternative, which is to originate a new LSA for the destination specifying a metric of LSInfinity. Premature aging is also be used when unexpectedly receiving self-originated LSAs during the flooding procedure (see Section 13.4). A router may only prematurely age its own self-originated LSAs. The router may not prematurely age LSAs that have been originated by other routers. An LSA is considered self- originated when either 1) the LSA's Advertising Router is equal to the router's own Router ID or 2) the LSA is a network-LSA and its Link State ID is equal to one of the router's own IP interface addresses.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
6 and 16.1). Such an area requires special treatment when summarizing backbone networks into it (see Section 12.4.3), and during the routing calculation (see Section 16.3). o The time between link state retransmissions, RxmtInterval, is configured for a virtual link. This should be well over the expected round-trip delay between the two routers. This may be hard to estimate for a virtual link; it is better to err on the side of making it too large.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
An LSA Each transit vertex has an associated LSA. For router vertices, this is a router-LSA. For transit networks, this is a network-LSA (which is actually originated by the network's Designated Router). In any case, the LSA's Link State ID is always equal to the above Vertex ID. List of next hops The list of next hops for the current set of shortest paths from the root to this vertex. There can be multiple shortest paths due to the equal-cost multipath capability. Each next hop indicates the outgoing router interface to use when forwarding traffic to the destination. On broadcast, Point-to-MultiPoint and NBMA networks, the next hop also includes the IP address of the next router (if any) in the path towards the destination. Distance from root The link state cost of the current set of shortest paths from the root to the vertex. The link state cost of a path is calculated as the sum of the costs of the path's constituent links (as advertised in router-LSAs and network-LSAs). One path is said to be "shorter" than another if it has a smaller link state cost. The first stage of the procedure (i.e., the Dijkstra algorithm) can now be summarized as follows. At each iteration of the algorithm, there is a list of candidate vertices. Paths from the root to these vertices have been found, but not necessarily the shortest ones. However, the paths to the candidate vertex that is closest to the root are guaranteed to be shortest; this vertex is added to the shortest-path tree, removed from the candidate list, and its adjacent vertices are examined for possible addition to/modification of the candidate list. The algorithm then iterates again. It terminates when the candidate list becomes empty. The following steps describe the algorithm in detail. Remember that we are computing the shortest path tree for Area A. All references to link state database lookup below are from Area A's database. (1) Initialize the algorithm's data structures. Clear the list of candidate vertices. Initialize the shortestpath tree to only the root (which is the router doing the calculation). Set Area A's TransitCapability to FALSE. (2) Call the vertex just added to the tree vertex V. Examine the LSA associated with vertex V. This is a lookup in the Area A's link state database based on the Vertex ID. If this is a router-LSA, and bit V of the router-LSA (see Section A.4.2) is set, set Area A's TransitCapability to TRUE. In any case, each link described by the LSA gives the cost to an adjacent vertex. For each described link, (say it joins vertex V to vertex W): (a) If this is a link to a stub network, examine the next link in V's LSA. Links to stub networks will be considered in the second stage of the shortest path calculation. (b) Otherwise, W is a transit vertex (router or transit network). Look up the vertex W's LSA (routerLSA or network-LSA) in Area A's link state database. If the LSA does not exist, or its LS age is equal to MaxAge, or it does not have a link back to vertex V, examine the next link in V's LSA.[23] (c) If vertex W is already on the shortest-path tree, examine the next link in the LSA. (d) Calculate the link state cost D of the resulting path from the root to vertex W. D is equal to the sum of the link state cost of the (already calculated) shortest path to vertex V and the advertised cost of the link between vertices V and W. If D is: o Greater than the value that already appears for vertex W on the candidate list, then examine the next link. o Equal to the value that appears for vertex W on the candidate list, calculate the set of next hops that result from using the advertised link. Input to this calculation is the destination (W), and its parent (V). This calculation is shown in Section 16.1.1. This set of hops should be added to the next hop values that appear for W on the candidate list. o Less than the value that appears for vertex W on the candidate list, or if W does not yet appear on the candidate list, then set the entry for W on the candidate list to indicate a distance of D from the root. Also calculate the list of next hops that result from using the advertised link, setting the next hop values for W accordingly. The next hop calculation is described in Section 16.1.1; it takes as input the destination (W) and its parent (V). (3) If at this step the candidate list is empty, the shortest- path tree (of transit vertices) has been completely built and this stage of the procedure terminates. Otherwise, choose the vertex belonging to the [ Page 79 ]
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
candidate list that is closest to the root, and add it to the shortest-path tree (removing it from the candidate list in the process). Note that when there is a choice of vertices closest to the root, network vertices must be chosen before router vertices in order to necessarily find all equal-cost paths. This is consistent with the tie-breakers that were introduced in the modified Dijkstra algorithm used by OSPF's Multicast routing extensions (MOSPF). (4) Possibly modify the routing table. For those routing table entries modified, the associated area will be set to Area A, the path type will be set to intra-area, and the cost will be set to the newly discovered shortest path's calculated distance. If the newly added vertex is an area border router or AS boundary router, a routing table entry is added whose destination type is "router". The Options field found in the associated router-LSA is copied into the routing table entry's Optional capabilities field. Call the newly added vertex Router X. If Router X is the endpoint of one of the calculating router's virtual links, and the virtual link uses Area A as Transit area: the virtual link is declared up, the IP address of the virtual interface is set to the IP address of the outgoing interface calculated above for Router X, and the virtual neighbor's IP address is set to Router X's interface address (contained in Router X's router-LSA) that points back to the root of the shortestpath tree; equivalently, this is the interface that points back to Router X's parent vertex on the shortestpath tree (similar to the calculation in Section 16.1.1). If the newly added vertex is a transit network, the routing table entry for the network is located. The entry's Destination ID is the IP network number, which can be obtained by masking the Vertex ID (Link State ID) with its associated subnet mask (found in the body of the associated network-LSA). If the routing table entry already exists (i.e., there is already an intra-area route to the destination installed in the routing table), multiple vertices have mapped to the same IP network. For example, this can occur when a new Designated Router is being established. In this case, the current routing table entry should be overwritten if and only if the newly found path is just as short and the current routing table entry's Link State Origin has a smaller Link State ID than the newly added vertex' LSA. If there is no routing table entry for the network (the usual case), a routing table entry for the IP network should be added. The routing table entry's Link State Origin should be set to the newly added vertex' LSA. (5) Iterate the algorithm by returning to Step 2. The stub networks are added to the tree in the procedure's second stage. In this stage, all router vertices are again examined. Those that have been determined to be unreachable in the above first phase are discarded. For each reachable router vertex (call it V), the associated router-LSA is found in the link state database. Each stub network link appearing in the LSA is then examined, and the following steps are executed: (1) Calculate the distance D of stub network from the root. D is equal to the distance from the root to the router vertex (calculated in stage 1), plus the stub network link's advertised cost. Compare this distance to the current best cost to the stub network. This is done by looking up the stub network's current routing table entry. If the calculated distance D is larger, go on to examine the next stub network link in the LSA. (2) If this step is reached, the stub network's routing table entry must be updated. Calculate the set of next hops that would result from using the stub network link. This calculation is shown in Section 16.1.1; input to this calculation is the destination (the stub network) and the parent vertex (the router vertex). If the distance D is the same as the current routing table cost, simply add this set of next hops to the routing table entry's list of next hops. In this case, the routing table already has a Link State Origin. If this Link State Origin is a router-LSA whose Link State ID is smaller than V's Router ID, reset the Link State Origin to V's router-LSA. Otherwise D is smaller than the routing table cost. Overwrite the current routing table entry by setting the routing table entry's cost to D, and by setting the entry's list of next hops to the newly calculated set. Set the routing table entry's Link State Origin to V's router-LSA. Then go on to examine the next stub network link. For all routing table entries added/modified in the second stage, the associated area will be set to Area A and the path type will be set to intra-area. When the list of reachable router-LSAs is exhausted, the second stage is completed. At this time, all intra-area routes associated with Area A have been determined. The specification does not require that the above two stage method be used to calculate the shortest path tree. However, if another algorithm is used, an identical tree must be produced. For this reason, it is important to note that links between transit vertices must be bidirectional in order to be included in the above tree. It should also be mentioned that more efficient algorithms exist for calculating the tree; for example, the incremental SPF algorithm described in [Ref1]. [ Page 80 ]
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
(5) Next, look up the routing table entry for the destination N. (If N is an AS boundary router, look up the "router" routing table entry associated with Area A). If no entry exists for N or if the entry's path type is "type 1 external" or "type 2 external", then install the inter-area path to N, with associated area Area A, cost IAC, next hop equal to the list of next hops to router BR, and Advertising router equal to BR. (6) Else, if the paths present in the table are intra-area paths, do nothing with the LSA (intra-area paths are always preferred). (7) Else, the paths present in the routing table are also inter-area paths. Install the new path through BR if it is cheaper, overriding the paths in the routing table. Otherwise, if the new path is the same cost, add it to the list of paths that appear in the routing table entry.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2 nothing with the LSA and consider the next in the list.
April 1998
Network Dictionary
(4) Let X be the cost specified by the preferred routing table entry for the ASBR/forwarding address, and Y the cost specified in the LSA. X is in terms of the link state metric, and Y is a type 1 or 2 external metric. (5) Look up the routing table entry for the destination N. If no entry exists for N, install the AS external path to N, with next hop equal to the list of next hops to the forwarding address, and advertising router equal to ASBR. If the external metric type is 1, then the path-type is set to type 1 external and the cost is equal to X+Y. If the external metric type is 2, the path-type is set to type 2 external, the link state component of the route's cost is X, and the type 2 cost is Y. (6) Compare the AS external path described by the LSA with the existing paths in N's routing table entry, as follows. If the new path is preferred, it replaces the present paths in N's routing table entry. If the new path is of equal preference, it is added to N's routing table entry's list of paths. (a) Intra-area and inter-area paths are always preferred over AS external paths. (b) Type 1 external paths are always preferred over type 2 external paths. When all paths are type 2 external paths, the paths with the smallest advertised type 2 metric are always preferred. (c) If the new AS external path is still indistinguishable from the current paths in the N's routing table entry, and RFC1583Compatibility is set to "disabled", select the preferred paths based on the intra-AS paths to the ASBR/forwarding addresses, as specified in Section 16.4.1. (d) If the new AS external path is still indistinguishable from the current paths in the N's routing table entry, select the preferred path based on a least cost comparison. Type 1 external paths are compared by looking at the sum of the distance to the forwarding address and the advertised type 1 metric (X+Y). Type 2 external paths advertising equal type 2 metrics are compared by looking at the distance to the forwarding addresses.
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2
April 1998
if N is now newly unreachable, the calculation in Section 16.4 must be rerun for the single destination N, in case an alternate external route to N exists. Case 2: Area A is a transit area and the router is an area border router. In this case, the following calculations must be performed. First, if N's routing table entry presently contains one or more inter-area paths that utilize the transit area Area A, these paths should be removed. If this removes all paths from the routing table entry, the entry should be invalidated. The entry's old values should be saved for later comparisons. Next the calculation in Section 16.3 must be run again for the single destination N. If the results of this calculation have caused the cost to N to increase, the complete routing table calculation must be rerun starting with the Dijkstra algorithm specified in Section 16.1. Otherwise, if the cost/path to an AS boundary router (as would be the case for a Type 4 summaryLSA) or to any forwarding addresses has changed, all AS-external-LSAs will have to be reexamined by rerunning the calculation in Section 16.4. Otherwise, if N is now newly unreachable, the calculation in Section 16.4 must be rerun for the single destination N, in case an alternate external route to N exists.
Network Dictionary
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
OSPF Version 2 does not affect any of the algorithms presented in this specification.
April 1998
Network Dictionary
Footnotes
[1]The graph's vertices represent either routers, transit networks, or stub networks. Since routers may belong to multiple areas, it is not possible to color the graph's vertices. [2]It is possible for all of a router's interfaces to be unnumbered point-to-point links. In this case, an IP address must be assigned to the router. This address will then be advertised in the router's router-LSA as a host route. [3]Note that in these cases both interfaces, the non-virtual and the virtual, would have the same IP address. [4]Note that no host route is generated for, and no IP packets can be addressed to, interfaces to unnumbered point-to-point networks. This is regardless of such an interface's state. [5]It is instructive to see what happens when the Designated Router for the network crashes. Call the Designated Router for the network RT1, and the Backup Designated Router RT2. If Router RT1 crashes (or maybe its interface to the network dies), the other
http://www.javvin.com/networkdictionary.html
http://www.javvin.com/securitymap. html
http://www.javvin.com/tcpipguide.html
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor CyberGauge
http://www.javvin.com/easy.html
http://www.javvin.com/businesscardscanner.html
http://www.javvin.com/colorcardscanner.html
http://www.javvin.com/portablescanner.html
www.networkdictionary. com
[ Page 86 ]