logo

Network traffic Assignment PDF

5 Pages1189 Words38 Views
   

Added on  2021-06-18

Network traffic Assignment PDF

   Added on 2021-06-18

ShareRelated Documents
To provide the best possible services the user and the customer of the business the crucial factoris the network infrastructure of the business. Various type of the network traffic, including datafiles, email, IP telephony and video application for multiple business units must support theexchange by an enterprise network. To prevent the unnecessary distribution of traffic thenetwork must be configured, to ensure the optimization. The network has to be remainedavailable for the users and must be scale effectively and easily and that has to be ensured by thenetwork architecture. Internetwork is desirable when the routing protocol that is runningthroughout the entire IP is single, for a number of reason multi protocol routing is common,company mergers, multiple network administrator manage different multiple departments andthe environments of multi vendor. The multi protocol network is configured by Open ShortestPath First (OSPF), Enhanced Interior Gateway Routing Protocol (EIGRP), and RoutingInformation Protocol version two (RIPv2) for securing and efficiently use the networkinfrastructure that is existing can be implemented. The connection to the boundary routers ofthe Internet service providers (ISPs) will be configured by the Border Gateway Protocol (BGP)to give permission to the organization to connect their network to the Internet.
Network traffic Assignment PDF_1
Secure update of OSPF and EIGRP:If an attacker gain the access to the network line and modify how the network traffic is routedthen he can exploit the network. A device that can capture it done by rerouting the network, theattacker can attack by leaving no trace and can get sensitive data by man-in-the-middle attack.To prevent this kind of attack, securing the network, to ensuring the integrity of the routinginformation in the network is done by the routing protocol authentication. To secure the routingin OSPF and EIGRP network, unique passwords on each of the router’s neighbour interfaces isconfigured by the Message Digest 5 (MD5) authentication. MD5 is a algorithm of cryptographywhich is a hash algorithm that sends the hash instead of the key of authentication itself. Thedigest of the message is created using the key and a message, not depending on the key itself;while it is transmitted it is prevented from read. The implementation of OSPF is easy,
Network traffic Assignment PDF_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on Network Configuration and Testing
|38
|2404
|18

Advanced Routing Configuration using GN3 Software
|11
|975
|326

Assignment TCP/IP Networking
|19
|1595
|148

TCP/IP Networking Assignment | Multiple Network Interfaces
|21
|1497
|169

Data and Computer Networking: OSPF Router Configuration, Switching and DHCP Configuration
|22
|1045
|337

Configuring VLANs, ROS, DHCP and PPP for Sacramento and Los Angeles sites
|4
|610
|197