StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Network Organization, Addressing, and Routing Protocols - Research Paper Example

Cite this document
Summary
Name of the Author Name of the Professor Course 10 February 2012 Network Organization, Addressing, and Routing Protocols The best routing protocol for this scenario is Open shortest Path First OSPF routing protocol. This protocol defines a methodology for transporting information…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.6% of users find it useful
Network Organization, Addressing, and Routing Protocols
Read Text Preview

Extract of sample "Network Organization, Addressing, and Routing Protocols"

Download file to see previous pages

The database maintaining a routing table develops a shortest path tree. The routes are than calculated the routes while minimizing the use of bandwidth ("Open Shortest Path First." 353-353). However, for a successful OSPF deployment, defining are boundaries and address assignment is essential. (Thomas 800) if all these domains are addressed adequately, the output will make all the difference. These domains are categorized in six different sections illustrated below: OSPF Network Topology OSPF Addressing and Route Summarization OSPF Route Selection OSPF Convergence OSPF Network Scalability OSPF Security In order to achieve the desired objectives, OSPF will ensure data redundancy over the network.

Routers without OSPF enabled configuration will only be able to efficiently communicate routing information with other routers and do not provide redundancy, minimum network utilization and identification of the shortest path (Moy 339). However, there are some considerations that must be taken in to account for implementing network redundancy in OSPF. In order to implement a redundant network with OSPF there must be a backbone line. Moreover, the size of the backbone link must be appropriate, as every router located on the backbone requires reconfiguration for the routes whenever every state of the link changes.

On the other hand, if the size of the backbone is small, the likelihood for change is minimized along with the quantity of CPU cycles that is required to re configure routes. Furthermore, OSPF backbone must be synchronized and all the routers should be directly connected (Moy 339). As OSPF comprises of virtual links, they establish a path between two border routers that are not directly terminated on the backbone link. Likewise, these virtual links are utilized for reconciling segregated backbone.

Lastly, locating workstations, servers or shared network resources on the backbone are not a suitable option, as their absence makes the environment more stable and easy. On the other hand, OSPF enabled routers will ensure shortest path for transmitting data in time and with few hops. Moreover, routing loops can be considered as an alternative to OSPF but have certain drawbacks. For instance, data collision can be unexpected and unmanageable within the network. Therefore, OSPF is recommended for data redundancy along with eliminating traffic bottlenecks that may occur (Moy 339).

The newly established IP version 6 protocol integration with OSPF facilitates for achieving the desired outcomes from the network. Moreover, OSPF is considered as an adaptive routing technique that synchronizes with business networks via Internet Protocol and provides link state routing. This algorithm is beneficial for business networks because large amount of data is exchanged with high redundancy and efficiency. The ultimate benefit for deploying link state routing is the cost, as it is considered as a cost effective solution (Moy 339).

OSPF adoption provides an infrastructure for interior gateway that is beneficial for minimizing for excluding erroneous routing tables, minimizing memory usage and limits the usability on processors that are involved in the process. For satisfying the appetite of bandwidth hungry applications, advanced network protocols are essential to maintain even a network for small medium enterprises. Apart from its benefits to business networks,

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Organization, Addressing, and Routing Protocols Research Paper”, n.d.)
Network Organization, Addressing, and Routing Protocols Research Paper. Retrieved from https://studentshare.org/information-technology/1443406-network-organization-addressing-and-routing
(Network Organization, Addressing, and Routing Protocols Research Paper)
Network Organization, Addressing, and Routing Protocols Research Paper. https://studentshare.org/information-technology/1443406-network-organization-addressing-and-routing.
“Network Organization, Addressing, and Routing Protocols Research Paper”, n.d. https://studentshare.org/information-technology/1443406-network-organization-addressing-and-routing.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Organization, Addressing, and Routing Protocols

Impact of Mobility on Enactment of Routing Protocols Associated with Ad Hoc Networks

This term paper "Impact of Mobility on Enactment of routing protocols Associated with Ad Hoc Networks" discusses the details associated with attacks incorporated with AODV.... The routing protocols that are associated with MANET are categorized into hybrid, table-driven, and demand-driven routing protocols [1].... Hybrid routing protocols interlinks with the other two protocols i.... table-driven and demand-driven routing protocols....
35 Pages (8750 words) Term Paper

Evaluation of Routing Protocols

When deploying a corporate network for internationally located business offices, there is always a requirement for selecting suitable routing protocols.... The selection of routing protocols emphasize on security, reliability, data transmission carrier, efficiency, and robustness.... A solution is designed to connect these offices with appropriate topology design, adequate routing protocols and bandwidth carrier that will save bandwidth cost....
8 Pages (2000 words) Essay

Complete Computer Network Infrastructure for a Real or Ficticious Business

For the WAN architecture, we will discuss the technologies, protocols and services that will be used for connecting these sites together.... However, acquiring and maintaining computer networks can be a difficult task along with its alignment with the goals and objectives of the organization.... This paper ''Complete Computer network Infrastructure for a Real or Ficticious Business'' assumes a proposed network of a hospital that will remotely connect to maternity homes....
20 Pages (5000 words) Research Paper

Network Routing

As we know that every router run routing protocols to find out the best path to the destination, one can consider the 'link-states' as representing the status of the interfaces on the router.... The functionality of the link-state protocols is that it knows the status of the link, whether it is up or down and what is its bandwidth and calculates a cost to use that path.... Due to the features of media type awareness and other factors, these protocols consume more processing power and memory....
11 Pages (2750 words) Assignment

Computer Networks Principles

The first design will discuss the issues regarding a LAN design and the second one will discuss the routing design and necessary configurations.... As systems and networking advisors, we need to design a computer network for the business based on the structure of the company and the number of computers and we will consider the fact that the network needs to be scalable and reliable.... he design of the network for the business case study is in a way that the increase of employees or the offices has a minimum impact on the quality and the performance expected from the network....
14 Pages (3500 words) Assignment

Networking Funamentals

Both protocols are incorporated in VLSI chips and are not reachable to usual users.... This approach gives organizations equally a fine thoughtful of the LAN protocols and the exploit of LAN in today's data networking.... There are two more popular PHY and MAC layer protocols which are mainly significant in any LAN.... In modern LAN, both protocols are incorporated on a single chip.... The chips depicts straightforward interfaces to the exterior, but the protocols are not straight unreachable....
14 Pages (3500 words) Essay

Analysis of Internet Protocol Networks

hellip; protocols in data communication are the rules and procedures that govern communications between different devices on a network.... Support protocols in this layer include protocols that will provide booting, management services and hostname mapping.... Protocol developers were not entirely concerned with the movement of data from the network to another.... They govern various aspects like how a modem and computer communicate, how files or e-mails are transferred over the internet r even how a telephone network connects to different telephones....
13 Pages (3250 words) Coursework

Transmission Control Protocol and User Datagram Protocol

Transmission Control Protocol (TCP) is a set of protocols or rules that are used with Internet Protocol to send data interns of units or packets between computers that are interconnected or over the Internet.... Transmission Control Protocol (TCP) is a set of protocols or rules that are used with Internet Protocol to send data interns of units or packets between computers that are interconnected or over the Internet.... The two protocols (TCP and UDP) provide means in which data can be exchanged between different computers....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us