Sunday, June 16, 2019

Network Topology Assignment Example | Topics and Well Written Essays - 750 words

Network Topology - Assignment ExampleOSPF and EIGRP and rip current routers functions as the interface between the laboratory fund raising and biology laboratory (Shoniregun, 2007). point servers will be storing the files of volunteers data, which include net profit-attached storeroom. The figure indicates an outline of the internetwork routing system. RIP network EIGRP-Network Router-EIGRP Router OSPF Router RIP Router-EIGRP, RIP and performs route redeployment amid the EIGRP and RIP networks. Similarly, router OSPF, RIP redistributes routes amid biology lab and fundraising office (Shoniregun, 2007). The tangential router of Fund raising and research lab requires redistribution amid EIGRP and OSPF. 2. What information will you redistribute between routing communications protocols? When we have a network where multiple routing protocols are present, we go through a process of route redistribution. The diverse segments of network erudite routes based on the protocol that is conf igured on them (Shoniregun, 2007). Route redistribution aids in the spread this knowledge in an understandable manner, by other segments. The roue leaned by EIGRP to RIP should be redistributed in a way that it is explicit by RIP and vice versa. Default-metric or definition of a metric is applied for specific posting. 3. Identify the problems you expect to bump into (with different rhythmic pattern, security, etc.) when you redistribute. Essentially, efficiency is fundamental in any network. Single metrics pose a challenge in the attainment of optimal performance. Multiple metrics should be integrated into the internet protocol system to ensure, apt internet performance. On the other hand, the plan of security is primarily connected to the exigency of defend sensitive data from unauthorized access (Shoniregun, 2007). It is notable that, significant security issues arise during the designation of an internet protocol due to minimal or non-existent of assay-mark mechanisms In addi tion, the ad hoc routing protocols used in designing internet protocols systems are susceptible to security issues due to lack of security design features (Shoniregun, 2007). This renders the protocols vulnerable for attacking. It is far-famed that, poor security measures during internet designing may lead to an inefficient network, for instances, chances of wrong messaging and redirection to unintended nodes is likely to occur. 4. Explain how you will overcome the problems. This concept of network protocol security is significant for any network to perform. The ever-changing technological trends in commercial applications have complicated the approach of solving protocol security issues (Shoniregun, 2007). It is imperative to note that quality of service (QoS) in the internet has emerged as a cornerstone for numerous network services (Shoniregun, 2007). The data credit line authentication and data veracity for IP, control, and routing protocols remains paramount in ensuring a sec ure and efficient network. The language used in designing an internet protocol has remained a key challenge in ensuring internet protocol security (Shoniregun, 2007). The security issues can be easily avoided by ensuring high standards of authentication of identicalness of IP and routing protocols. More over, the language used should be apt in integrating with the internet protocol specifications and the with the authorization policy. To solve problems arising from metrics, the designer should ensure enjoyment of fixed metrics. This is because, the

No comments:

Post a Comment