Got a tricky question? Receive an answer from students like you! Try us!

Advanced Routing Protocols - Essay Example

Only on StudentShare
Author : dejuan20

Summary

In the modern era, networks are the most critical infrastructure layer running the IT enabled businesses globally. As the business requirements have grown, corporate networks have become more complex. The largest global computing network is the Internet which is the backbone of millions of businesses across the globe…

Extract of sample
Advanced Routing Protocols

The popular routing protocol used on the Internet is the Border Gateway Protocol (BGP) which is an exterior gateway routing protocol. Corporate networks manage internal routing with the help of Routing Information Protocol version 2 (RIPv2) and Open Shortest Path First (OSPF) which are interior gateway routing protocols. In this case study, the practical implementation of a complex network for an International Travel Agency is demonstrated using Cisco Routing devices. The protocols implemented are RIP, OSPF and BGP whereby RIP routes and redistributed into OSPF which in turn are redistributed into BGP.
This is a case study of an International Travel Agency that relies heavily on the Internet for advertising & sales operations. The organization has core interface to Internet at San Jose whereby two links are planned - Primary as a T3 connectivity and backup as T1 connectivity. The organization has planned large back-office operations at London and Capetown whereby London needs to have 30 networks with OSPF routing only (OSPF Stubby Area), Capetown needs to have another 30 networks with OSPF routing with limited external redistribution (OSPF Not-So-Stubby-Area) along with a large RIP area whereby 30 networks need to be connected using EZ IP configurations. ...
Download paper

Related Essays

Temporally-Ordered Routing Algorithm
The protocol's reaction is structured as a temporally-ordered sequence of diffusing computations; each computation consisting of a sequence of directed link reversals. The protocol is highly adaptive, efficient and scalable; being best-suited for use in large, dense, mobile networks. In these networks, the protocol's reaction to link failures typically involves only a localized "single pass" of the distributed algorithm. This capability is unique among protocols which are stable in the face of network partitions, and results in the protocol's high degree of adaptivity . This desirable behavior…
13 pages (3263 words)
Wireless Security. Webased Online Diary System.
This allows users to move freely while continuously having connection to the same resources. It is for this reason that webased online diary system webased online diary systems are the fastest growing form of webased online diary systeming in the U.S. Security issues continue to face Wi-Fi and other webased online diary system markets. By its nature, webased online diary system access opens up the potential for webased online diary system eavesdropping and data theft. Wi-Fi webased online diary systems have to be carefully encrypted to prevent unauthorized use. For example, people committing…
16 pages (4016 words)
LSI Technologies
The new equipment had more useful features, than the vacuum tube version. But the real push towards rapid advancement in the electronics industry came with the introduction of Integrated Circuits (ICs). This system relied on a process that could put hundred of electronic components on a single electronic chip measuring less than an eighth of an square (Shore, 1988). These integrated circuits formed the core of any electronic device, be it the computer, telephone equipment, measuring equipment, storage devices etc., which helped in making such equipment more reliable and faster. Having tasted…
6 pages (1506 words)
Mobile Computing
As a key component of Intelligent Transportation Systems Inter Vehicle Communication (IVC) is one of the major applications of mobile computing. A large amount of research has been carried out by academia and the industry alike in this field. IVC enables each and every high speed automobile to send, receive and forward packets amongst each other by dynamically forming mobile ad-hoc networks (MANETS). The information is transferred, distributed and acquired over this network. The vehicle to vehicle communication (V2V) enables the drivers and their vehicles to communicate with other vehicles…
10 pages (2510 words)
Advanced principles of Human computer interaction
This matte area is marginally raised from the surface for a functional reason. On the matte area, on the four points of the compass are four playback buttons. At the north point is a "MENU" button that allows you to navigate through the menus. At the west point is a step back button. At the south point is a play / pause button. At the east point is a step forward button.The MENU button takes you from the normal screen to a menu screen that allows you to navigate to different capabilities including "Music", "Photos" and "Videos" options on the menu. You can then enter each of these menus and…
7 pages (1757 words)
The Internet and the World Wide Web
It is an actively evolving social network which brings together myriad topics into a uniform hypertextual medium. It looks like a giant graph with hypertext, pages and edges as its nodes. Closely observed, the Web reveals textual matter, a tag structure, site identity and organization. In simple terms, the Web is just one of the basic structures of the much broader internet.…
8 pages (2008 words)