Sunday, May 5, 2019

Network Topology Assignment Example | Topics and Well Written Essays - 750 words

Network analysis situs - Assignment ExampleOSPF and EIGRP and bust routers functions as the interface between the laboratory fund raising and biota laboratory (Shoniregun, 2007). File servers allow for be storing the files of volunteers data, which include network-attached storeroom. The figure indicates an outline of the network routing system. RIP network EIGRP-Network Router-EIGRP Router OSPF Router RIP Router-EIGRP, RIP and performs route redeployment amid the EIGRP and RIP networks. Similarly, router OSPF, RIP redistributes routes amid biology lab and fundraising blank space (Shoniregun, 2007). The tangential router of Fund raising and research lab requires redistribution amid EIGRP and OSPF. 2. What information will you redistribute between routing protocols? When we pack a network where multiple routing protocols are present, we go through a process of route redistribution. The divers(prenominal) segments of network erudite routes based on the protocol that is configu red on them (Shoniregun, 2007). Route redistribution aids in the spread this knowledge in an understandable manner, by other segments. The roue leaned by EIGRP to RIP should be redistributed in a way that it is explicit by RIP and vice versa. Default-metric or interpretation of a metric is applied for specific posting. 3. Identify the problems you expect to encounter (with different metrics, security, etc.) when you redistribute. Essentially, efficiency is original in any network. Single metrics pose a scrap in the attainment of optimal performance. Multiple metrics should be integrated into the internet protocol system to ensure, apt internet performance. On the other hand, the concept of security is primarily connected to the exigency of protecting sensitive data from unofficial access (Shoniregun, 2007). It is notable that, significant security issues arise during the designation of an internet protocol due to minimum or non-existent of authentication mechanisms In addition , the ad hoc routing protocols used in designing internet protocols systems are tractable to security issues due to lack of security design features (Shoniregun, 2007). This renders the protocols vulnerable for attacking. It is promissory noteworthy that, poor security measures during internet designing may lead to an inefficient network, for instances, chances of wrong messaging and redirection to unintended nodes is likely to occur. 4. Explain how you will overcome the problems. This concept of network protocol security is significant for any network to perform. The ever-changing technical trends in commercial applications have complicated the approach of solving protocol security issues (Shoniregun, 2007). It is imperative to note that quality of service (QoS) in the internet has emerged as a cornerstone for numerous network service (Shoniregun, 2007). The data origin authentication and data veracity for IP, control, and routing protocols remains paramount in ensuring a in eff ect(p) and efficient network. The language used in designing an internet protocol has remained a key challenge in ensuring internet protocol security (Shoniregun, 2007). The security issues can be easily avoided by ensuring high school standards of authentication of identity of IP and routing protocols. More over, the language used should be apt in combine with the internet protocol specifications and the with the authorization policy. To solve problems arising from metrics, the designer should ensure usage of fixed metrics. This is because, the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.