Retrieved from https://studentshare.org/information-technology/1461875-network-topology
https://studentshare.org/information-technology/1461875-network-topology.
OSPF and EIGRP and RIP routers functions as the interface between the laboratory fund raising and biology laboratory (Shoniregun, 2007). File servers will be storing the files of volunteer’s data, which include network-attached storeroom. The figure indicates an outline of the internetwork routing system. RIP network EIGRP-Network Router-EIGRP Router OSPF Router RIP Router-EIGRP, RIP and performs route redeployment amid the EIGRP and RIP networks. Similarly, router OSPF, RIP redistributes routes amid biology lab and fundraising office (Shoniregun, 2007).
The tangential router of Fund raising and research lab requires redistribution amid EIGRP and OSPF. 2. What information will you redistribute between routing protocols? When we have a network where multiple routing protocols are present, we go through a process of route redistribution. The diverse segments of network erudite routes based on the protocol that is configured on them (Shoniregun, 2007). Route redistribution aids in the spread this knowledge in an understandable manner, by other segments.
The roue leaned by EIGRP to RIP should be redistributed in a way that it is explicit by RIP and vice versa. Default-metric or definition of a metric is applied for specific posting. 3. Identify the problems you expect to encounter (with different metrics, security, etc.) when you redistribute. Essentially, efficiency is fundamental in any network. Single metrics pose a challenge in the attainment of optimal performance. Multiple metrics should be integrated into the internet protocol system to ensure, apt internet performance.
On the other hand, the concept of security is primarily connected to the exigency of protecting sensitive data from unauthorized access (Shoniregun, 2007). It is notable that, significant security issues arise during the designation of an internet protocol due to minimal or non-existent of authentication mechanisms In addition, the ad hoc routing protocols used in designing internet protocols systems are susceptible to security issues due to lack of security design features (Shoniregun, 2007).
This renders the protocols vulnerable for attacking. It is noteworthy that, poor security measures during internet designing may lead to an inefficient network, for instances, chances of wrong messaging and redirection to unintended nodes is likely to occur. 4. Explain how you will overcome the problems. This concept of network protocol security is significant for any network to perform. The ever-changing technological trends in commercial applications have complicated the approach of solving protocol security issues (Shoniregun, 2007).
It is imperative to note that quality of service (QoS) in the internet has emerged as a cornerstone for numerous network services (Shoniregun, 2007). The data origin authentication and data veracity for IP, control, and routing protocols remains paramount in ensuring a secure and efficient network. The language used in designing an internet protocol has remained a key challenge in ensuring internet protocol security (Shoniregun, 2007). The security issues can be easily avoided by ensuring high standards of authentication of identity of IP and routing protocols.
More over, the language used should be apt in integrating with the internet protocol specifications and the with the authorization policy. To solve problems arising from metrics, the designer should ensure usage of fixed metrics. This is because, the
...Download file to see next pages Read More