StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Routing Protocol Security OSPFv2 - Dissertation Example

Cite this document
Summary
Routing Protocol Security OSPFv2 Name Institution Conclusion and Future Recommendations The current research demonstrated quite clearly that a OSPF V2 Routing protocol can be used as an internet security measure. The study sought to investigate the Open Shortest Path First (OSPF) as a link-state routing protocol often used in the Internet Protocol (IP) networks…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.7% of users find it useful
Routing Protocol Security OSPFv2
Read Text Preview

Extract of sample "Routing Protocol Security OSPFv2"

Download file to see previous pages

Using MD5 method to make a comparison between the security measures often associated with the use of OSPF v2 Routing protocol, it worked quite well to implement a network structure, which made it possible to evaluate and assess the Project background research on OSPF v2 authentication security alongside highlighting the solution that was deemed reliable for the OSPF v2 authentication. Through the use of the Quagga software, a network was implemented, which helped in testing, as well as evaluating OSPF v2 authentication.

This project clearly demonstrated that OSPF as an interior gateway protocol, can route the Internet Protocol into a single routing domain. It showed that OSPF can gather a link-state information from routers and be able to construct a network of topology maps, which are more often than not used for determining routing table that is often presented in the internet layer. It was also shown that OSPF was designed in such a way that it can support the variable length subnet masking, and it is also capable of detecting any change within a topology such as any link failure and be able to converge onto a loop-free routing structure within seconds.

This project also demonstrated that the OSPF network might be subdivided into various routing areas for purposes of simplifying administration and optimization of traffic and for resource utilization. It also showed that OSPF does not make use of the TCP/IP transport protocol. It is instead encapsulated in the IP datagram. This contrasts with other related routing protocols such as the Border Gateway protocol and the Routing Information protocol. It also became apparent that Router within the same broadcast domain often link from adjacencies whenever they need to detect each other.

Such a detection takes place whenever a Router gets to identify itself within the hello OSPF protocol packet. This is often referred to as the two-way state. this project, as well indicted that the OSPF makes use of the multicast, as well as the unicast in sending the link state updates and the hello packets. Recommendations for Future Research The current research demonstrated clearly that it is possible OSPF V2 Routing protocol can be used as an internet security measure. Given the focus of this study and previous studies on OSPF V2 Routing protocol and other earlier versions, it is worth recommending that there is need to migrate to IPv6 considering that the solution to the existing problem which is OSPFv2 routing is to transfer to OSPFv3 and use IPsec Protocol between sites (WAN.

It has been indicated that OSPF protocol when operated on other versions such as on IPv4, it operates more securely between routers. This provides an option to use varied authentication methods to give allowance to routers that are trusted to participate in routing. Although it has been noted that OSPFv3, when running on IPv6, does not any more support the protocol-internal authentication, it relies on the IPv6 protocol security (Tanenbaum, 2003). As often is the case, the OSPF version 3 would help introduce some modifications to the given IPv4 protocol implementation.

Other than the virtual links, virtually all neighbor exchanges often exclusively make use of the IPv6 link-local addressing (Cisco Systems Inc, 2009). It is widely known that the IPv6 protocol always do run per link, and not based upon the subnet. It is worth contenting that all the IP prefix information has

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Routing Protocol Security OSPFv2 Dissertation Example | Topics and Well Written Essays - 750 words”, n.d.)
Routing Protocol Security OSPFv2 Dissertation Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1475950-routing-protocol-security
(Routing Protocol Security OSPFv2 Dissertation Example | Topics and Well Written Essays - 750 Words)
Routing Protocol Security OSPFv2 Dissertation Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1475950-routing-protocol-security.
“Routing Protocol Security OSPFv2 Dissertation Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1475950-routing-protocol-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Routing Protocol Security OSPFv2

Network Organization, Addressing, and Routing Protocols

Name of the Author Name of the Professor Course 10 February 2012 Network Organization, Addressing, and Routing Protocols The best routing protocol for this scenario is Open shortest Path First OSPF routing protocol.... These domains are categorized in six different sections illustrated below: OSPF Network Topology OSPF Addressing and Route Summarization OSPF Route Selection OSPF Convergence OSPF Network Scalability OSPF security In order to achieve the desired objectives, OSPF will ensure data redundancy over the network....
3 Pages (750 words) Research Paper

Network Topology

This concept of network protocol security is significant for any network to perform.... The ever-changing technological trends in commercial applications have complicated the approach of solving protocol security issues (Shoniregun, 2007).... The language used in designing an internet protocol has remained a key challenge in ensuring internet protocol security (Shoniregun, 2007).... Identify the problems you expect to encounter (with different metrics, security, etc....
3 Pages (750 words) Assignment

Routing Protocol Security

The paper “routing protocol security” seeks to examine OSPF v2 routing protocol security with a focus on various security measures such as message digest and digital certificate.... The two protocols are based upon the link-state routing OSPF v2 routing protocol, which is a link-state routing protocol that was developed purposely for the internet Protocol networks.... hellip; In order to achieve the set project objective, issues of concern included the history of OSPF, types of OSPF packet type, Authentication Mechanisms in OSPF v2, OSPF security, Authentication Mechanism in OSPF v2, Digital Signature of OSPF, methodology used, system design, hardware and software, testing scenarios, and analysis of data analysis....
3 Pages (750 words) Dissertation

Complete Computer Network Infrastructure for a Real or Ficticious Business

Moreover, for maintaining and monitoring the network, we will discuss network security features that will be implemented in this proposed network.... This paper ''Complete Computer Network Infrastructure for a Real or Ficticious Business'' assumes a proposed network of a hospital that will remotely connect to maternity homes....
20 Pages (5000 words) Research Paper

Network Routing

A working and configuration of a routing protocol shall also be elaborated.... It falls in the category of link-state routing protocol.... The routing protocol is configured on all of the routers specified in the topology diagram and advertises to every host connected in the topology except the loopback interface attached to Chelmsford HQ.... Requirement for this implementation was of an open standard routing protocol with fast convergence and support routing update security....
11 Pages (2750 words) Assignment

The Outstanding Networks Relative to Traditional IP Networks

Such a discussion availed the avenue critically to investigate the effects of interior gateways routing protocol.... Moreover, the authors should be lauded because they gave specifications of the twin routing protocol for the present study.... The aim will hence guide… In addition, that aim is precise and will help the researcher solely focus on the MPLS VPN technology. How can MPLS VPN backbone be modelled to solve the shortcomings associated with Traditional IP-based networks, ATM networks and Frame Relay in the management of enormously large networks like scalability flexibility, security, and cost?...
5 Pages (1250 words) Assignment

Network IT Operations Report and Configuration

The networking equipment should meet modern requirements as they highly influence other weighty concerns as security.... On security matters, the website of the company has been occasionally compromised with customer credit card records stolen from the back end customer database....
14 Pages (3500 words) Coursework

Advanced Routing in the Computer Networking Environment

This ospfv2 is o protocol that helps in authentication privileges.... nbsp;… Just like most of the other systems some of the factors of the network system IPv6 include the availability of the new system, the mode of addressing to be used types of connectivity, routing strategy, quality of service, scalability, and performance, reliability, accessibility, security, fault tolerance and some other minor factor making up the bigger network.... The move to select the DSN model in the transition of the network from IPv4 to IPv6 is a result of careful consideration that was made by having security, optimal performance, and high availability at the top priority in the network design....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us