Link State Advertisement (LSA) Last Updated : 11 Jul, 2025 Comments Improve Suggest changes 8 Likes Like Report Open shortest path first (OSPF) is a link-state routing protocol which is used to find the best path between the source and the destination router using its own shortest path first (SPF) algorithm. OSPF routers exchange LSAs to update and maintain topological OSPF database by the devices operating OSPF but to first understand the types of LSAs, we first have to understand about the router roles in OSPF. Router Roles - Backbone router - The area 0 is known as backbone area and the routers in area 0 are known as backbone routers. Internal router - An internal router is a router which have all of its interfaces in a single area. Area Boundary Router (ABR) - The router which connects backbone area with another area is called Area Boundary Router. The ABRs therefore maintain multiple link-state databases that describe both the backbone topology and the topology of the other areas. Autonomous System Border Router (ASBR) - When an OSPF router is connected to a different protocol like EIGRP, or Border Gateway Protocol, or any other routing protocol then it is known as AS. The router which connects two different AS (in which one of the interface is operating OSPF in area 0) is known as Autonomous System Border Router. These routers perform redistribution. ASBRs run both OSPF and another routing protocol, such as RIP or BGP. LSA Types - There are different types of LSAs exchanged depending upon the areas in which devices operating OSPF reside. Type-1 (Router Link Advertisement) - This is a Type-1 LSA exchanged by the routers which belongs to a same area. The router contains status of link, Router I'd, IP information and current interface state. If a router is connected to multiple areas then separate Type 1 LSA is exchanged. As shown in the figure, Type 1 LSA are exchanged by the routers within the same area but if other interface of router is in another area then different Type 1 LSA will be exchanged. Type-2 (Network Link Advertisement) - This is a Type-2 LSA which is send by DR (Designed Router) only to all the other routers present in the same area (broadcast or multi-access network) . These contain the DR and BDR IP information and also the state of other routers that are part of same network. Remember DR is responsible for distributing routing information to all other routers present in same broadcast area. As shown in the figure, in a broadcast network, only DR distributes the routing information to other routers in the same area. Type-3 (Summary LSA) - This is a Type-3 LSA which are generated by ABRs to areas other than in which it resides. The topological database which ABR receives from other areas are injected into the backbone area. This includes the IP information and Router I'd of ABR that is advertising these LSA. As shown in the figure, R3 (ABR) floods the routing information of area 1 to other areas by generating Type 3 LSA. Type-4 (Summary ASBR LSA) - ABR send these Type 4 LSA towards the area other than the area in which they are generated. These LSAs are generated by ABR to tell others the route to ASBR. As we can see in the figure, R4 is an ASBR therefore to advertise it's own routes to R3, R4 will generate a Type 1 LSA which in turn generate a Type 4 LSA and flood the LSA to all other external areas to tell the route of ASBR to other area routers . Type-5 AS external link advertisement - These LSAs are generated by ASBR to advertise routes of other Autonomous System than OSPF. As shown in the above figure R4 will be an ASBR (as connecting area of OSPF and RIP) and route 1.1.1.0/24 is to be advertised in OSPF areas. This is the responsibility of ASBR to advertise other routing protocol routes into OSPF areas therefore R4 will now create a Type 5 LSA to advertise these route to all other OSPF areas.Advantages of LSA: The link-state routing protocol's key advantage is quick network convergence. Link-state routing protocols immediately flood the LSP out all interfaces without making any changes, with the exception of the interface from which the LSP was received, when they receive an LSP.Link-state routing methods utilise several areas and organise the network areas in a hierarchy. The numerous areas enable more accurate route summary.A topological map or SPF tree is used in link-state routing to build the network topology. Each router can independently identify the shortest path to each network using the SPF tree.Following the first flooding of LSPs, LSPs are only issued in response to changes in the topology and only include data related to those changes. The only information in the LSP relates to the affected link. Periodic updates are never sent by the link-state.Disadvantages of LSA: Because link-state routing protocols provide an exhaustive topology map, they also demand more CPU processing because the SPF algorithm uses more CPU power than distance-vector techniques, including Bellman-Ford.A database and SPF tree are created and maintained by the link-state routing protocol. Memory use was higher for the database and SPF tree than for a distance vector protocol.The protocol for link-state routing Flood link-state packets are sent during initial setup, as well as during network outages and topology changes, which have an impact on a network's bandwidth capacity. If the network is unstable, it also affects the network's bandwidth. Create Quiz Comment S saurabhsharma56 Follow 8 Improve S saurabhsharma56 Follow 8 Improve Article Tags : Misc Computer Networks Explore Computer Network BasicsBasics of Computer Networking4 min readTypes of Computer Networks6 min readIntroduction to Internet5 min readNetwork Devices3 min readWhat is OSI Model? - Layers of OSI Model11 min readTCP/IP Model6 min readDifference Between OSI Model and TCP/IP Model2 min readPhysical LayerPhysical Layer in OSI Model3 min readTypes of Network Topology9 min readTransmission Modes in Computer Networks (Simplex, Half-Duplex and Full-Duplex)3 min readTransmission Media in Computer Networks7 min readData Link LayerData Link Layer in OSI Model4 min readSwitching | Computer Networks2 min readVirtual LAN (VLAN)3 min readFraming in Data Link Layer3 min readError Control in Data Link Layer3 min readFlow Control4 min readPiggybacking in Computer Networks2 min readNetwork LayerNetwork Layer in OSI Model3 min readIntroduction of Classful IP Addressing7 min readClassless Addressing in IP Addressing7 min readWhat is an IP Address?11 min readIPv4 Datagram Header4 min readDifference Between IPv4 and IPv63 min readPublic and Private IP addresses4 min readIntroduction To Subnetting5 min readWhat is Routing?10 min readNetwork Layer Protocols9 min readTransport LayerTransport Layer in OSI Model4 min readTransport Layer Protocols9 min readTransmission Control Protocol - TCP4 min readUser Datagram Protocol - UDP3 min readSession Layer & Presentation LayerSession Layer in OSI model2 min readPresentation Layer in OSI model2 min readSecure Socket Layer (SSL)4 min readPoint-to-Point Tunneling Protocol - PPTP2 min readMultipurpose Internet Mail Extension (MIME) Protocol3 min readApplication LayerApplication Layer in OSI Model4 min readClient-Server Model3 min readWorld Wide Web (WWW)6 min readIntroduction to Electronic Mail4 min readWhat is a Content Distribution Network and how does it work?4 min readProtocols in Application Layer4 min readAdvanced TopicsWhat is Network Security?7 min readQuality of Service and Multimedia5 min readAuthentication in Computer Network3 min readEncryption, Its Algorithms And Its Future6 min readIntroduction of Firewall in Computer Network3 min readMAC Filtering in Computer Network3 min readWi-Fi Standards Explained2 min readWhat is Bluetooth?6 min readGenerations of wireless communication2 min readCloud Networking4 min readPracticeTop 50 Plus Networking Interview Questions and Answers15+ min readTop 50 TCP/IP Interview Questions and Answers 202515+ min readNetwork Fundamentals Interview Questions - Computer Networks15+ min readLast Minute Notes for Computer Networks14 min readComputer Network - Cheat Sheet15+ min read Like