Routing Protocol

In: Computers and Technology

Submitted By overatedae86
Words 8531
Pages 35
EIGRP and OSPF Comparison

For

Client Sponsor

Prepared By
Scott Hogg

Project Number
02

Date
March 14, 2002
|Distribution List |
|Name |Title/Duties |Company |
|John Vogt-Nilsen |Manager – Network Operations | |
|Sammy Hutton |Principal Systems Analyst | |
|Scott Hogg |Principal Consultant |Lucent |
|Phil Colon |Managing Consultant |Lucent |

|Revision History |
|Version |Date |Author |Comments |
|1.0 |03/14/2002 |Scott Hogg |Initial Draft |
| | | | |
| | | | |
| | | | |
| | | |…...

Similar Documents

Advanced Routing

...Linux Advanced Routing & Traffic Control HOWTO Bert Hubert Netherlabs BV Gregory Maxwell Remco van Mook Martijn van Oosterhout Paul B Schroeder Jasper Spaans Revision History Revision 1.1 DocBook Edition 2002−07−22 A very hands−on approach to iproute2, traffic shaping and a bit of netfilter. Linux Advanced Routing & Traffic Control HOWTO Table of Contents Chapter 1. Dedication.........................................................................................................................................1 Chapter 2. Introduction ......................................................................................................................................2 2.1. Disclaimer & License.......................................................................................................................2 2.2. Prior knowledge................................................................................................................................2 2.3. What Linux can do for you...............................................................................................................3 2.4. Housekeeping notes..........................................................................................................................3 2.5. Access, CVS & submitting updates..................................................................................................3 2.6. Mailing list..............................................

Words: 28706 - Pages: 115

Routing Protocol Comparison

...Introduction 1 2.1 Industry Standard protocols vs. Proprietary protocols: 2 3.0 Technical Background 2 3.1 Types Of Routing Protocols 2 3.1.1 Static Routing 2 3.1.2 Distance Vector Protocols 3 3.1.3 Link-State Protocols 4 3.1.4 Advanced Distance Vector Protocol 5 3.1.5 Path Vector Protocols 5 4.0 Protocol Decision Criteria 5 5.0 OSPF 8 6.0 EIGRP 18 7.0 Analysis 21 8.0 Recommendation 22 9.0 References 23 9.1 URLs 23 9.1.1 OSPF 23 9.1.2 EIGRP 24 9.2 Books 24 9.2.1 OSPF 24 9.2.2 EIGRP 24 Executive Summary The network is based on the TCP/IP protocol, which permits the efficient routing of data packets based on their IP address. Cisco routers are used at various points in the network to control and forward the data. Alcatel OmniSwitch switch/routers are also used in the Site 2 facilities. At the current point a decision is being made by on whether to keep the existing Alcatel infrastructure in the Site 2 facility or migrate that equipment to similar Cisco equipment as exists in Site 1. The current Alcatel equipment is experiencing severe problems such as hardware failures, power supply failures, operating system memory leaks resulting in reboots. If the decision is made to upgrade the Alcatel switch/routers then an evaluation will need to be made on what the proper routing protocol should be running......

Words: 8531 - Pages: 35

Implementation and Evaluation of Wireless Mesh Networks on Manet Routing Protocols

...2013 Implementation and Evaluation of Wireless Mesh Networks on MANET Routing Protocols Shashi Bhushan1,Anil Saroliya2 ,Vijander Singh3 Research Scholar, Computer Science, Amity University, Jaipur, India 1 Assistant Professor, Computer Science, Amity University, Jaipur, India 2 Senior Lecturer, Computer Science, Amity University, Jaipur, India 3 Abstract—Wireless Mesh Network (WMN) is a kind of network which is made up of Mesh router and Mesh clients where Mesh router having lesser mobility and form the heart of WMNs. In this paper, Wireless Mesh Network over MANET implemented using routing protocols such as AODV, DSR. In this work NS-2.34 simulator is used for simulations. Various measurements and calculations were figure out in this work like throughput, Average end-end delay, PDR, NRL and Routing packets in Random way point mobility model. WMN have features such as self configuration, self healing and low cost of equipment. This work specifically aims to study the performance of routing protocols in a wireless mesh network, where static mesh routers and mobile clients participate together to implement networks functionality such as routing and packet forwarding in different mobility scenarios Keywords- Ad hoc Network, Routing Protocols, Wireless Mesh Network, Performance, Throughput, PDR, NRL and Routing packets in Random way point mobility model, Simulation on Network simulator NS-2, AODV,DSR , Routing Overhead. I. INTRODUCTION A Mobile Ad-hoc network (MANET) is......

Words: 4335 - Pages: 18

Ccna Routing

...American International University–Bangladesh Continuing Education Center (CEC)  02 8816173 Ext 406  www.cec.aiub.edu CCNA Routing and Switching Course Outline CCENT Introduction to Networks Routing & Switching Essentials Scaling Networks Connecting Networks CCNA CCNA 1 – Introduction to Networks This course introduces the architecture, structure, functions, components, and models of the Internet and other computer networks. The principles and structure of IP addressing and the fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum. By the end of the course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement IP addressing schemes. Chapter 1 2 3 4 5 6 7 8 9 10 11 Topic Exploring the Network Configuring a Network Operating System Network Protocols and Communications Network Access Ethernet Network Layer Transport Layer IP Addressing Subnetting IP Networks Application Layer It’s a Network Students who complete Introduction to Networks will be able to perform the following functions:  Understand and describe the devices and services used to support communications in data networks and the Internet  Understand and describe the role of protocol layers in data networks  Understand and describe the importance of addressing and naming schemes at various layers of data networks in IPv4 and IPv6 environments  Design, calculate, and apply......

Words: 1022 - Pages: 5

Protocols

...LAB 3.1-3.4 3.1.1 – WHAT WOULD HAPPEN IF WIRELESS DEVICES WERE NOT GOVERNED BY THE WI-FI ALLIANCE AND EACH VENDOR HAD ITS OWN STANDARDS AND PROTOCOLS? A. WIRELESS DEVICES WOULD HAVE DIFFICULTY COMMUNICATING. WHAT IS OKAY WITH ONE VENDOR MAY NOT BE OKAY WITH ANOTHER VENDOR. PRICES OF DEVICES AND CONNECTIONS WOULD ALSO CHANGE. 3.1.2 – GIVE AN EXAMPLE OF A MODEL THAT IS USED TO VISUALIZE SOMETHING THAT IS DIFFICULT TO OBSERVE OR PERCEIVE. A. CONNECTIONS REQUIRING ROUTER EQUIPMENT – HUBS, SWITCHES AND ROUTERS. 3.1.3 – WHAT ARE THE DIFFERENT LAYERS YOU THINK WOULD BE NECESSARY FOR COMMUNICATION TO BE MAPPED TO A MODEL? A. APPLICATION LAYER, PRESENTATION LAYER, SESSION LAYER, TRANSPORT LAYER, DATA LINK LAYER AND PHYSICAL LAYER. 3.1.4 – WHAT WILL HAPPEN IF A MODEL IS TOO GENERAL? TOO GRANULAR? A. THE MODEL WOULD NOT BE FLEXIBLE IF TOO GENERAL; IF TOO GRANULAR, A LOAD IMBALANCE WOULD OCCUR. 3.1 REVIEW – 1. WHY WOULD A 3-LAYER MODEL OF COMMUNICATION THAT HAS THE LAYERS PHYSICAL, NETWORK AND APPLICATIONS BE INSUFFICIENT TO ADEQUATELY DESCRIBE NETWORK COMMUNICATIONS? A. THE 7-LAYER COMMUNICATION MODEL WAS TESTED AND SUCCESSFULLY PROVEN TO WORK. IF A LAYER IS MISSING THE MODEL WILL NOT WORK PROPERLY. 2. WHAT IS THE HISTORY OF THE OSI REFERENCE MODEL? A. TO SERVE AS THE FOUNDATION OF THE ESTABLISHED WIDELY ADOPTED SUITE OF PROTOCOLS THAT ARE USED BY INTERNATIONAL INTERNETWORKS. 3. WHAT IS THE HISTORY OF THE TCP/IP MODEL? A. BOTH DEVELOPED TOGETHER (INTERNET AND TCP/IP)...

Words: 996 - Pages: 4

Routing

...IT, Web Routing Name: Institution: Routing A router is a network device capable of passing data between two networks. The most basic reason for using a router is to connect a LAN to the internet (Lowe, 2013). A bridge on the other hand sits between two types of networks, for example between an Ethernet and wireless (Pomerleau, 2009) Routers can be helpful under the following circumstances. To begin with, routers are capable of connecting different network architectures such as Ethernet and Token Ring networks and so if it is expected that the LAN network in our case will need to use different network architectures in the future, then routers will be best choice. Second, a router is more efficient than a bridge because a router will process information that is specifically addressed to it where as a bridge processes all messages it receives. Therefore, a router would increase network data processing speed thus will end up with an efficiently working network when using a router than when using a bridge. Next, routers are advantageous in circumstances when an organization needs to communicate to the external environment and therefore routers are capable of connecting to a Wide Area Network (WAN) such as the internet (Ogletree 2004). The capacity to connect to the external environment enables the organization to be in contact to the government for information on taxation as well as connection to customers, suppliers and even competitors. Furthermore, routers are......

Words: 1275 - Pages: 6

List of Protocols

...List of network protocols (OSI model) This article is about network protocols organized by OSI model. For network protocols organized by TCP/IP model, see Internet Protocol Suite. This is a list of network protocols, categorized by their nearest Open Systems Interconnection (OSI) model layers. This list is not exclusive to only the OSI protocol family. Many of these protocols are originally based on the Internet Protocol Suite (TCP/IP) and other models and they often do not fit neatly into OSI layers. The OSI model | 7 Application layer | 6 Presentation layer | 5 Session layer | 4 Transport layer | 3 Network layer | 2 Data link layer | * LLC sublayer * MAC sublayer | 1 Physical layer | * v * t * e | பொருளடக்கம் * 1 Layer 1 protocols (physical Layer) * 2 Layer 2 protocols (Data Link Layer) * 3 Layer +3 protocols * 4 Layer 3 protocols (Network Layer) * 5 Layer 3.5 protocols * 6 Layer 3+4 protocol suites * 7 Layer 4 protocols (Transport Layer) * 8 Layer 5 protocols (Session Layer) * 9 Other protocols * 10 Layer 7 protocols (Application Layer) * 11 Protocol description languages * 12 See also * 13 Further reading * 14 External links Layer 1 protocols (physical Layer) * Telephone network modems- V.92 * IRDA physical layer * USB physical layer * EIA RS-232, EIA-422, EIA-423, RS-449, RS-485 * Ethernet physical layer Including 10BASE-T, 10BASE2, 10BASE5, 100BASE-TX,......

Words: 1041 - Pages: 5

Protocols

...A protocol is a set of invisible compute rules that govern how an Internet document will be transmitted onto the screen. For two computers to communicate with one another, they must be able to understand one another through the same language. In order for computers to exchange information there must be a preexisting agreement as to how the information will be structured and how the sides will send and be received. The most important that defines the common networking protocols is the OSI known as Open Systems Interconnection. Introducing the TCP and the IP are two different protocols that are often linked together. The linking of several protocols is fairly common since the functions of different protocols may be complementary so that together they carry out particular tasks that are bases of operation layers. These suits of protocols are often used with many local area networks and carries out the basic operations of the Internet. Emailing also has its own set of protocols that has a variety of both for sending and receiving mail. The most common protocol for sending mail is the SMTP that is known for as Simple Mail Transfer Protocol. Then for receiving emails, the protocol being most commonly used is the Post Office Protocol, POP for short. Both the SMTP and the POP is used for managing the transmission for delivery of mail across the Internet. Web pages that are constructed to a standard method are called Hypertext Markup Language known as HTMO. The HTMP......

Words: 413 - Pages: 2

Impact of Mac Layer on the Performance of Odmrp, Fisheye, Aodv and Dsr, Routing Protocols in Mobile Ad Hoc Networks

...Impact of MAC Layer on the Performance of ODMRP, Fisheye, AODV and DSR, Routing Protocols in Mobile Ad hoc Networks A. Sravani, G. Srinu, and A.Venkataramana Abstract— Mobile Ad hoc Network is an emerging area. Its standards are defined by IETF. MANET is a self generated, self organized and self handled network consisting of collection of independent nodes. MANETs Presents several desirable properties like dynamic topology, Easy of deployment and robustness, which are qualify them as an attractive topic for the research community. Providing QoS routing is a major issue in MANETs. Media Access Control layer plays crucial role in Ad hoc networks. Several routing protocols have already been proposed for MANETs. This paper describes the impact of MAC layer protocols like 802.11 and CSMA on the various routing protocols like AODV, DSR, ODMRP and Fisheye. Numbers of simulation scenarios were carried out by using Glomosim-2.03. The QoS parameters used are Throughput, Delay and PDR. Simulation results found that AODV performs better in 802.11 and CSMA, DSR and ODMRP performs better in only under 802.11. Keywords— MANET, AODV, DSR, FSR, GloMoSim, ODMRP I. INTRODUCTION Wireless communication networks are basically two types as shown in Fig.1. One is infrastructure based and other one is infrastructure less. Infrastructure based is cellular communications whereas infrastructure less is ad hoc networks. Fig.1 Classification of wireless communication networks A.......

Words: 2917 - Pages: 12

A Delay-Based Optimum Routing Protocol Scheme for Collision Avoidance Applications in Vanets

...Optimum Routing Protocol Scheme for Collision Avoidance Applications in VANETs Gayathri Narayanan1,a, Neethu Sathianadhan2,b and Sruthi Sanjiv Gangadharan3,c 1,2,3 Department of Electronics and Communication Engineering Amrita School of Engineering, Amritapuri Campus Kollam – Kerala, India agayathrin@am.amrita.edu, bneethu91ammu@gmail.com, csruti.sanjiv_g@ymail.com Keywords: Broadcast, Multi-hop, VANETs, Delay, Routing Protocols, AODV, Cluster-based routing, OSPF. Abstract — Broadcast transmissions are currently finding extensive applications in vehicular ad-hoc networks, albeit primarily in the research phase. Given the importance of knowing the updated network details of each node in the network, and also considering the fact that the delay in transmission of messages is a crucial factor in collision avoidance, it is imperative to implement a broadcast network which will ensure minimum delay in transmission of messages between the nodes. In this paper, we primarily implement a multi-hop broadcast vehicular network for collision avoidance. We consider the mobility and traffic density of vehicles and simulate the end-to-end delay in message transmission for a sparse and dense network scenario. In order to ensure high reliability and get the optimum delay, we extend the scenario to include three different routing protocols – AODV, Cluster-based routing and OSPF – and perform a comparison based on the end-to-end transmission delay to determine the optimum......

Words: 4169 - Pages: 17

Protocols

...LAYER PROTOCOLS • IP (Internet Protocol) • ICMP (Internet Control Message Protocol) • ARP (Address Resolution Protocol) • RARP (Reverse Address Resolution Protocol) 4.7.1 The IP PROTOCOL • IP represents the heart of the Internet Protocol suite • Provides the main service of the layer: data transmission in connectionless mode – datagram IP Header Format IP Header Format (Including user data, this makes an IP packet) IP Header fields: • Version - Indicates the version of IP currently used (now 4); • IP Header Length - Indicates the datagram header length in 32-bit words (value = 5); • Type-of-service - Specifies how a particular upper-layer protocol would like the current datagram to be handled. Datagrams can be assigned various levels of importance through this field; • Total length - Specifies the length of the entire IP packet, including data and header, in bytes. • Identification - Contains an integer that identifies the current datagram (sequence number). This field is used for re-assembling the datagram fragments; • Flags - A 3-bit field for fragmentation control:  000 - last fragment;  001 - not last fragment;  010 - the fragmentation not allowed. • Fragment offset - measured in double-words (offset from main datagram); • Time-to-live - Maintains a counter that gradually decrements down to zero, at which point the datagram is discarded. This keeps packets from looping endlessly; • Protocol - Indicates which upper-layer protocol......

Words: 1379 - Pages: 6

Internet Protocols

...INTERNET PROTOCOLS & APPLICATIONS * TCP/IP: The TCP/IP suite of protocols has become the dominant standard for internetworking. TCP/IP represents a set of public standards that specify how packets of information are exchanged between computers over one or more networks. * IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is the protocol suite originally employed by Novell Corporation’s network operating system, NetWare. It delivers functions similar to those included in TCP/IP. Novell in its current releases supports the TCP/IP suite. A large installed base of NetWare networks continue to use IPX/SPX. * NetBEUI: NetBIOS Extended User Interface is a protocol used primarily on small Windows NT networks. NetBEUI cannot be routed or used by routers to talk to each other on a large network. NetBEUI is suitable for small peer-to-peer networks, involving a few computers directly connected to each other. It can be used in conjunction with another routable protocol such as TCP/IP. This gives the network administrator the advantages of the high performance of NetBEUI within the local network and the ability to communicate beyond the LAN over TCP/IP. * AppleTalk: AppleTalk is a protocol suite to network Macintosh computers. It is composed of a comprehensive set of protocols that span the seven layers of the Open Systems Interconnection (OSI) reference model. The AppleTalk protocol was designed to run over LocalTalk, which is the Apple LAN physical topology...

Words: 1711 - Pages: 7

A Report to Critically Compare a Number of Routing Protocols; Including Rip V2, Eigrp & Ospf

...Routing & Router Configuration A Report to Critically Compare a Number of Routing Protocols; Including RIP v2, EIGRP & OSPF Paul McDermott CCNA 2 Table of Contents 1.0 Abstract 3 2.0 Introduction 4 3.0 Protocol overview 5 3.1 RIP v2 Overview 5 3.2 EIGRP Overview 6 3.3 OSPF Overview 6 4.0 Protocol Comparison 10 4.1 Topology Overview 10 4.2 Protocol Types 10 4.3 Administration Distance 10 4.4 Protocol Tables 11 4.5 Algorithm 11 4.6 Metric 12 4.7 Periodic Updates 12 4.8 Hierarchical / Scalable 12 4.9 Load Balance 13 4.10 Comparison Table 14 5.0 Conclusion 15 6.0 References 16 Abstract The following report is a critical comparison of three routing protocols; RIPv2, EIGRP and OSPF, detailing the protocol features, as well as their similarities and differences. The report takes an in-depth look at the technical elements and algorithms used in these protocols, such as Bellman Ford, DUAL, and the Dijkstra Algorithm; and how these algorithms are used to calculate the routing metric. The report also discusses the fact that EIGRP is the most desirable protocol to use on Cisco based routers, while OSPF can be used across different router manufacturers. While looking at the technical considerations that are needed in choosing a routing protocol for a desired network the report will also look into the CPU/memory requirements, and how difficult the protocol is to install and......

Words: 4222 - Pages: 17

Routing

...CALL ROUTING IN TELEPHONE NETWORKS INTRODUCTION ROUTING is a process of finding a path from a source to every destination in the network. A routing protocol sets up a routing table in routers and switch controllers. A node makes a local choice depending on global topology Telephone calls must be routed across a network of multiple exchanges, potentially owned by different telephone carriers. The exchanges are all connected using trunks. Each exchange has many "neighbours", some of which are also owned by the same telephone operator, and some of which are owned by different operators. When neighbouring exchanges are owned by different operators, they are known as interconnect points. This means that there is really only one virtual network in the world that enables any phone to call any other phone. This virtual network comprises many interconnected operators, each with their own exchange network. Every operator can then route calls directly to their own customers, or pass them on to another operator if the call is not for one of their customers. Call Routing When a call is received by an exchange, there are two treatments that may be applied: • Either the destination terminal is directly connected to that exchange, in which case the call is placed down that connection and the destination terminal rings. • Or the call must be placed to one of the neighboring exchanges through a connecting trunk for onward routing. Each exchange in the chain uses pre-computed......

Words: 820 - Pages: 4

Essential Protocol

...Essential Network Protocols Modern computer networking leverages many components to enable computers on one network (or opposite side of the world) to communicate with a computer on a different network (or other side of the world). Of the components that enable network communication, there are several in the TCP/IP suite of protocols that work in the background to provide reliable Internet connection and data transport every day for millions of computers worldwide. Internet protocol or IP is an essential component of modern internetwork communication. IP is a connectionless protocol that provides neither fault tolerance nor error correction. It is also not responsible for the setup or teardown of network communications. The primary job assigned to IP is logical addressing and routing as it resides at layer 3 (the Network layer) of the OSI model. While every host on the network has a hardware address (also called a MAC address), hosts can only communicate with other hosts in the same broadcast domain using MAC addressing. For internetwork communication, a logical, unique network address is required so that the devices forwarding network traffic (primarily routers), can determine the source and destination and best route to forward data packets. The ARP or Address Resolution Protocol enables devices on a single network, in a single broadcast domain, to find the hardware or MAC address of a device on the network given the IP......

Words: 1258 - Pages: 6