Design and Configuration of SWICHLAN Network
VerifiedAdded on 2019/12/28
|24
|4874
|147
Essay
AI Summary
EIGRP is a scalable and simple-to-configure routing protocol that supports stub systems with minimal overhead. However, its proprietary nature by Cisco may make it less attractive in large multivendor network environments. The provided network design consists of a core switch (Cisco Catalyst 6509) with dual supervisors and four 6416 blades, as well as distribution switches (Catalyst 3500-series). Technical considerations include redundancy, logical topology, VLANs, and network addressing. HSRP is enabled on VLANs for failover and default gateway purposes. The research provides a comprehensive overview of the SWICHLAN network, including routing protocols BGP and OSPF.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Simplified version of the SWITCHlan network
Prepared for:
Prepared By:
03/17/2017
Prepared for:
Prepared By:
03/17/2017
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
Contents
Table of Contents........................................................................................................................................................................ 2
ABBREBIATION........................................................................................................................................................................... 4
Abstract........................................................................................................................................................................................... 4
Introduction.................................................................................................................................................................................. 5
Network Design........................................................................................................................................................................... 6
Network Design Deliverables...........................................................................................................................................6
Network architecture description.............................................................................................................................6
Routing Protocols.................................................................................................................................................................. 9
LITERATURE REVIEW........................................................................................................................................................... 12
IP ROUTING........................................................................................................................................................................... 12
ROUTING BASICS................................................................................................................................................................ 13
ADMINISTRATIVE DISTANCE.......................................................................................................................................14
Distance Vector............................................................................................................................................................... 14
Link State........................................................................................................................................................................... 14
ROUTING METRICS............................................................................................................................................................ 15
Critically compare the routing protocols......................................................................................................................16
Equipment for Core Layer..........................................................................................................................................18
Distribution.......................................................................................................................................................................19
Technical Considerations................................................................................................................................................ 19
Contents
Table of Contents........................................................................................................................................................................ 2
ABBREBIATION........................................................................................................................................................................... 4
Abstract........................................................................................................................................................................................... 4
Introduction.................................................................................................................................................................................. 5
Network Design........................................................................................................................................................................... 6
Network Design Deliverables...........................................................................................................................................6
Network architecture description.............................................................................................................................6
Routing Protocols.................................................................................................................................................................. 9
LITERATURE REVIEW........................................................................................................................................................... 12
IP ROUTING........................................................................................................................................................................... 12
ROUTING BASICS................................................................................................................................................................ 13
ADMINISTRATIVE DISTANCE.......................................................................................................................................14
Distance Vector............................................................................................................................................................... 14
Link State........................................................................................................................................................................... 14
ROUTING METRICS............................................................................................................................................................ 15
Critically compare the routing protocols......................................................................................................................16
Equipment for Core Layer..........................................................................................................................................18
Distribution.......................................................................................................................................................................19
Technical Considerations................................................................................................................................................ 19
Technical Considerations for Switches.................................................................................................................19
Logical Topology................................................................................................................................................................. 19
VLANs.................................................................................................................................................................................. 19
Network Addressing.....................................................................................................................................................19
CONCLUSION.............................................................................................................................................................................. 20
Logical Topology................................................................................................................................................................. 19
VLANs.................................................................................................................................................................................. 19
Network Addressing.....................................................................................................................................................19
CONCLUSION.............................................................................................................................................................................. 20
ABBREBIATION
Abstract
SWITCHlan is a network that used to connect to several universities and other institutions from all over
Switzerland. The main objective of this network is to fulfil effective distribution of knowledge through
the Internet and in the worldwide academic networks.
Following scenarios has been considered for the network design,
Redundant IP access connections for research and education in Switzerland
Fine Performance under ever growing network traffic
How this really is impacted by various network metrics for example latency and finish-to-finish
delay Implementation of network systems is really a complex and costly task
Cost effective
To manage and maintain SWICHlan Fibre Optic backbone infrastructure.
To manage6and maintain Voice/IP, Wireless (Satellite, WLAN, WI-MAX) and WI-FI
Infrastructure around universities and institution .
To create and manage network and invasion alarm systems for network
To boost the internet Convenience Plan, develop and implement faculty -wide and
native area systems
Monitor network operations to understand performance, security and capacity
issues
In control of IP addressing, naming computer network points and servers on
research and education institution.
Abstract
SWITCHlan is a network that used to connect to several universities and other institutions from all over
Switzerland. The main objective of this network is to fulfil effective distribution of knowledge through
the Internet and in the worldwide academic networks.
Following scenarios has been considered for the network design,
Redundant IP access connections for research and education in Switzerland
Fine Performance under ever growing network traffic
How this really is impacted by various network metrics for example latency and finish-to-finish
delay Implementation of network systems is really a complex and costly task
Cost effective
To manage and maintain SWICHlan Fibre Optic backbone infrastructure.
To manage6and maintain Voice/IP, Wireless (Satellite, WLAN, WI-MAX) and WI-FI
Infrastructure around universities and institution .
To create and manage network and invasion alarm systems for network
To boost the internet Convenience Plan, develop and implement faculty -wide and
native area systems
Monitor network operations to understand performance, security and capacity
issues
In control of IP addressing, naming computer network points and servers on
research and education institution.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
I've discovered within this paper simplified kind of the SWITCHlan network and discuss areas that
involved network design. OSI network reference model acquainted with implement the network for
SWICHlan.
Plus this paper, I've conducted a LITERATURE REVIEW for routing protocol.
Introduction
A network method is some computers along with other network devices which are interact to alter
information. Such computers can also be known as nodes or stations and run software that initiates
and manages their interaction in discussing files along with other sources.
The Internet may be the global system of interconnected pcs that do some searching online
protocol suite (TCP/IP) to link devices worldwide.
A network system could be a network that links computers along with other network devices
allowing communication and understanding exchange between systems, software, and users.
Merchandise is assumed to obtain networked once they could exchange information.
With appropriate configuration, a combination of cable or wireless media, interconnection of
computers additionally to networking hardware devices your pc network is produced.
SWITCHlan has connected to8universities and research institutions throughout Europe. SWITCH
also makes sure that they're connected while using web and built-into academic systems
worldwide.
This document contains additional information regarding the network the idea of theSWITCHlan
and will be offering documentation within the new network configuration.
In this report, following objective are discussed and elaborated,
Provide critical literature review on routing protocols.
Describe of the network models created including scenarios and diagrams.
Describe of each scenario in details including the justification (reasons) for design and choice of
performance parameters.
involved network design. OSI network reference model acquainted with implement the network for
SWICHlan.
Plus this paper, I've conducted a LITERATURE REVIEW for routing protocol.
Introduction
A network method is some computers along with other network devices which are interact to alter
information. Such computers can also be known as nodes or stations and run software that initiates
and manages their interaction in discussing files along with other sources.
The Internet may be the global system of interconnected pcs that do some searching online
protocol suite (TCP/IP) to link devices worldwide.
A network system could be a network that links computers along with other network devices
allowing communication and understanding exchange between systems, software, and users.
Merchandise is assumed to obtain networked once they could exchange information.
With appropriate configuration, a combination of cable or wireless media, interconnection of
computers additionally to networking hardware devices your pc network is produced.
SWITCHlan has connected to8universities and research institutions throughout Europe. SWITCH
also makes sure that they're connected while using web and built-into academic systems
worldwide.
This document contains additional information regarding the network the idea of theSWITCHlan
and will be offering documentation within the new network configuration.
In this report, following objective are discussed and elaborated,
Provide critical literature review on routing protocols.
Describe of the network models created including scenarios and diagrams.
Describe of each scenario in details including the justification (reasons) for design and choice of
performance parameters.
Investigation and analysis of all results from all simulations.
Critically compare the routing protocols and recommendation for network that implemented
A conclusion, which is evaluative and reflective.
Network Design Within this section mainly concentrate on the suggested
network design for SWICHlan network.
Network Design Deliverables
This network design provides the following deliverables:
• Network architecture description
• Network specifications and diagrams
• Capacity plan • RF plan and measurement methods
• Listing of equipment mounting sites Network architecture description
Network Design
Network Design Within this section mainly concentrate on the suggested network design for SWICHlan
network.
Network Design Deliverables
This network design provides the following deliverables:
• Network architecture description
• Network specifications and diagrams
• Capacity plan • RF plan and measurement methods
• Listing of equipment mounting sites
Critically compare the routing protocols and recommendation for network that implemented
A conclusion, which is evaluative and reflective.
Network Design Within this section mainly concentrate on the suggested
network design for SWICHlan network.
Network Design Deliverables
This network design provides the following deliverables:
• Network architecture description
• Network specifications and diagrams
• Capacity plan • RF plan and measurement methods
• Listing of equipment mounting sites Network architecture description
Network Design
Network Design Within this section mainly concentrate on the suggested network design for SWICHlan
network.
Network Design Deliverables
This network design provides the following deliverables:
• Network architecture description
• Network specifications and diagrams
• Capacity plan • RF plan and measurement methods
• Listing of equipment mounting sites
Network architecture description
The overall SWITCHlan network architecture a combination of three-layer architecture model and
Partial mesh network design use to design.
There is multiple VLANs design for each location.In the [Figure 1.1] shows identified VLANs for each
location. All VLANs are designed according to the hierarchical Architecture model.
There are three layers in hierarchical Architecture model, the [Figure 1.0] show the graphical
representation.
Core Layer
Distribution Layer
Access layer
Figure 1.0 : Three tire Architecture
Core Layer
Routed backbone architecture is used in the Core layer. It is basic backbone architecture.
The overall SWITCHlan network architecture a combination of three-layer architecture model and
Partial mesh network design use to design.
There is multiple VLANs design for each location.In the [Figure 1.1] shows identified VLANs for each
location. All VLANs are designed according to the hierarchical Architecture model.
There are three layers in hierarchical Architecture model, the [Figure 1.0] show the graphical
representation.
Core Layer
Distribution Layer
Access layer
Figure 1.0 : Three tire Architecture
Core Layer
Routed backbone architecture is used in the Core layer. It is basic backbone architecture.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Backbone consists with 3000 km of optical dark fibers network. Each sub set of VLANs are
connected to the backbone thought the routers.
Access layer
Routed backbone architecture is used in the Core layer. It is basic backbone architecture.
The Backbone consists of 3000 km of optical dark fibers network.
Each sub set of VLANs is connected to the backbone thought the routers. Access layer Access layer
consists of a set of VLANs. Each geographical location has a VLAN with the VLANS router. Multiple
Switches were connected to the backbone router through the Firewall.
Mainly message traffic stays with the sub net VLANs, unless it configures to transmit anywhere else in
the network. In those cases, the network layer address is used to move packets. For example in a
switched backbone, a broadcast message and those single sent to every computer in the network.
However, a router backbone ensures that broadcast messages communicate with in the network that
subnet belongs.
Distribution Layer
Each VLAN and LAN connected to a switched backbone. Each backbone switch connected to a router.
connected to the backbone thought the routers.
Access layer
Routed backbone architecture is used in the Core layer. It is basic backbone architecture.
The Backbone consists of 3000 km of optical dark fibers network.
Each sub set of VLANs is connected to the backbone thought the routers. Access layer Access layer
consists of a set of VLANs. Each geographical location has a VLAN with the VLANS router. Multiple
Switches were connected to the backbone router through the Firewall.
Mainly message traffic stays with the sub net VLANs, unless it configures to transmit anywhere else in
the network. In those cases, the network layer address is used to move packets. For example in a
switched backbone, a broadcast message and those single sent to every computer in the network.
However, a router backbone ensures that broadcast messages communicate with in the network that
subnet belongs.
Distribution Layer
Each VLAN and LAN connected to a switched backbone. Each backbone switch connected to a router.
Figure 2: Location base VLANs
Overall network architecture is partial Mesh Network Topology. The reason to select the partial mesh
network is redundancy. The partial mesh topology has increased the redundancy of the network than
the other network model while providing scalability.
In the mesh network topology, each node transmits data for the network. All mesh nodes conjoin in the
distribution of data in the network. Mesh networks can transmit messages using either a flooding
technique or a routing technique.
In a partial mesh topology, some nodes are associated with all the others, but other people are only
associated with individuals nodes they exchange most likely probably the most data.
Overall network architecture is partial Mesh Network Topology. The reason to select the partial mesh
network is redundancy. The partial mesh topology has increased the redundancy of the network than
the other network model while providing scalability.
In the mesh network topology, each node transmits data for the network. All mesh nodes conjoin in the
distribution of data in the network. Mesh networks can transmit messages using either a flooding
technique or a routing technique.
In a partial mesh topology, some nodes are associated with all the others, but other people are only
associated with individuals nodes they exchange most likely probably the most data.
The partial mesh design consists of three tiers or layers, each employing a different connection
technology.
Layers are
Access Layer
Mesh Layer
Injection Layer Combined with the community fiber MAN (FMAN).
This network has SWITCH NOC (Network Operations Center) based in the college building in Geneva.
Other location4(Point-of-Presence (PoP ) collocated limits or towers additionally to additional optical
fiber termination points at select locations.
Routing is done with the help of routing protocols.
Routing Protocols
The routing protocols Routing Protocols Following areas will discuss this topic:
Abstract
Objective
Introduction to routing protocols
Literature Review
Routing
IP Routing
Routing Basics
Administrative distance
Routing Class
Abstract
Primary purpose of the communication is transfer data from source to destination. There are plenty
of factors involve in communication for example communication media, Routers, Routing protocols,
routing algorithms.
technology.
Layers are
Access Layer
Mesh Layer
Injection Layer Combined with the community fiber MAN (FMAN).
This network has SWITCH NOC (Network Operations Center) based in the college building in Geneva.
Other location4(Point-of-Presence (PoP ) collocated limits or towers additionally to additional optical
fiber termination points at select locations.
Routing is done with the help of routing protocols.
Routing Protocols
The routing protocols Routing Protocols Following areas will discuss this topic:
Abstract
Objective
Introduction to routing protocols
Literature Review
Routing
IP Routing
Routing Basics
Administrative distance
Routing Class
Abstract
Primary purpose of the communication is transfer data from source to destination. There are plenty
of factors involve in communication for example communication media, Routers, Routing protocols,
routing algorithms.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
This short article mainly concentrates on routing protocols. Routing protocols defines how routers
talk to one another .Router is really a device which accustomed to either forward packets in one
node to a different or in one network to a different network. Routing Formula accustomed to define
the direction from the route.
.To provide information within an efficiently, each Network needed many protocols collaborating
together for delivering information. Mainly routing protocol shares the data first among immediate
neighbors, after which through the network. Routers make use of this approach to find out the
topology from the network.
There are lots of kinds of routing protocols that actually work together for delivering information
efficient, reliable and secure way.
The job is around the research into the routing protocols mainly for any wired network, their
functionality and operation. Other locations that concentrate on this review is interior gateway
protocols and criticality compares the most crucial ones.
objective
The goal of this project would be to
• produce a literature review section around the primary routing protocols for
wired systems , functionality and operation
• Further study about interior gateway protocols
• Critically compare the most crucial routing protocols
INTRODUCTION
Larger networks are carrying a lot of data for a whole bunch of computer and routers with lots of
computers around the outside that are connected to routers. Term routers refer to tracking 9Routing
protocols define how routers speak with each other.
talk to one another .Router is really a device which accustomed to either forward packets in one
node to a different or in one network to a different network. Routing Formula accustomed to define
the direction from the route.
.To provide information within an efficiently, each Network needed many protocols collaborating
together for delivering information. Mainly routing protocol shares the data first among immediate
neighbors, after which through the network. Routers make use of this approach to find out the
topology from the network.
There are lots of kinds of routing protocols that actually work together for delivering information
efficient, reliable and secure way.
The job is around the research into the routing protocols mainly for any wired network, their
functionality and operation. Other locations that concentrate on this review is interior gateway
protocols and criticality compares the most crucial ones.
objective
The goal of this project would be to
• produce a literature review section around the primary routing protocols for
wired systems , functionality and operation
• Further study about interior gateway protocols
• Critically compare the most crucial routing protocols
INTRODUCTION
Larger networks are carrying a lot of data for a whole bunch of computer and routers with lots of
computers around the outside that are connected to routers. Term routers refer to tracking 9Routing
protocols define how routers speak with each other.
The router is something which1used with the idea to forward packets in a single node to another or
perhaps in one network to a new network. Routing Formula familiar with define the direction in the
route. To supply information inside an efficiently, each Network needed many protocols collaborating
together for delivering information.
Mainly routing protocol shares the information first among immediate neighbours ,then with the
network. Routers use this method to identify the topology in the network.
There are numerous types of routing protocols that interact for delivering information efficient, reliable
and secure way. The1work is about the study in to the routing protocols mainly for just about any wired
network
1a packet in one tool and delivering it with the network to a different device on the different
network. Router is a device which used to either forward packet from one node to another or from one
network to another network.
The1routers don’t mind concerning the host they merely worry about the systems and also the best
road to each network. The logical network address from the destination host can be used to obtain
packets to some network via a routes network, and so the hardware address from the host can be
used to provide the packet from the router towards the correct destination host
Routes support for that Dynamic process if a person of router goes lower within the network.
There are a couple of primary ways of routing, Static routing and Dynamic Routing.
In the static routes, the metric value is used if there is more than one route to get to a particular
network ID, the metric value that's the smallest value will be used to actually send the data that
direction. Dynamic routing protocols, the metric were based on what was called1the "Hop Count,"
which was simply the quantity of routersit needed to access a particular network ID packet in one
tool and delivering it with the network to a different device on the different network. Router is a
device which used to either forward packet from one node to another or from one network to another
network.
The routers don’t mind concerning the host they merely worry about the systems and also the best
road to each network. The logical network address from the destination host can be used to obtain
packets to some network via a routes network, and so the hardware address from the host can be
used to provide the packet from the router towards the correct destination host
perhaps in one network to a new network. Routing Formula familiar with define the direction in the
route. To supply information inside an efficiently, each Network needed many protocols collaborating
together for delivering information.
Mainly routing protocol shares the information first among immediate neighbours ,then with the
network. Routers use this method to identify the topology in the network.
There are numerous types of routing protocols that interact for delivering information efficient, reliable
and secure way. The1work is about the study in to the routing protocols mainly for just about any wired
network
1a packet in one tool and delivering it with the network to a different device on the different
network. Router is a device which used to either forward packet from one node to another or from one
network to another network.
The1routers don’t mind concerning the host they merely worry about the systems and also the best
road to each network. The logical network address from the destination host can be used to obtain
packets to some network via a routes network, and so the hardware address from the host can be
used to provide the packet from the router towards the correct destination host
Routes support for that Dynamic process if a person of router goes lower within the network.
There are a couple of primary ways of routing, Static routing and Dynamic Routing.
In the static routes, the metric value is used if there is more than one route to get to a particular
network ID, the metric value that's the smallest value will be used to actually send the data that
direction. Dynamic routing protocols, the metric were based on what was called1the "Hop Count,"
which was simply the quantity of routersit needed to access a particular network ID packet in one
tool and delivering it with the network to a different device on the different network. Router is a
device which used to either forward packet from one node to another or from one network to another
network.
The routers don’t mind concerning the host they merely worry about the systems and also the best
road to each network. The logical network address from the destination host can be used to obtain
packets to some network via a routes network, and so the hardware address from the host can be
used to provide the packet from the router towards the correct destination host
Three major classes are in prevalent experience IP systems:
Interior gateway protocols type 1 Link-condition routing protocols - OSPF which is-IS ? link-condition routing protocols Distance-vector routing protocols - Routing Information Protocol, RIPv2, IGRP.
Exterior gateway -
LITERATURE REVIEW
IP ROUTING
IP routing is the procedure of moving packets in one network to a different network using
routers. The IP routing process is essential to know since it pertains all routers and
configurations which use IP.
IP routing can be used ,
• Forward packets in one node with other within the internetwork.
• Determine the information needs to follow to achieve the destination node with
the internetwork of nodes.
The information is transmission within the network happen by means of packets.
The packet carries the information with informations of source and also the destination addresses.
IP routing enables a router to construct a forwarding table or also known as like a routing table to
look for the next hop the data packets ought to be sent to be able to achieve the destination node.
Interior gateway protocols type 1 Link-condition routing protocols - OSPF which is-IS ? link-condition routing protocols Distance-vector routing protocols - Routing Information Protocol, RIPv2, IGRP.
Exterior gateway -
LITERATURE REVIEW
IP ROUTING
IP routing is the procedure of moving packets in one network to a different network using
routers. The IP routing process is essential to know since it pertains all routers and
configurations which use IP.
IP routing can be used ,
• Forward packets in one node with other within the internetwork.
• Determine the information needs to follow to achieve the destination node with
the internetwork of nodes.
The information is transmission within the network happen by means of packets.
The packet carries the information with informations of source and also the destination addresses.
IP routing enables a router to construct a forwarding table or also known as like a routing table to
look for the next hop the data packets ought to be sent to be able to achieve the destination node.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
So that you can find all of the systems within the internetwork along with a road to achieve each
remote internetwork, a routing protocol can be used.
It's also used to make sure that all of the routers within the internetwork have a similar routing
table. Generally, a routing protocol determines the very best path for any router to transmit packets
towards the remote network with an internetwork.
Examples for routing protocols,
• Routing Information Protocol (RIP)
• Routing Information Protocol version 5 (RIPv2)
• Enhanced Interior Gateway Protocol (EIGRP)
• Open Shortest Path First (OSPF).
Routing table define all the details that required to achieve the location to the whole remote
network in internet work. In te remote network data packet could be transmit while using routed
protocol
Routed protocol is use ways of packet delivery to transferring packets from source towards the
destination.
ROUTING BASICS
A router should retain the following informations to transfer route packets from sourse towards
the destination
• Destination Address
• Neighbor routers that it learns about all remote systems
• Possible routes to any or all remote systems
remote internetwork, a routing protocol can be used.
It's also used to make sure that all of the routers within the internetwork have a similar routing
table. Generally, a routing protocol determines the very best path for any router to transmit packets
towards the remote network with an internetwork.
Examples for routing protocols,
• Routing Information Protocol (RIP)
• Routing Information Protocol version 5 (RIPv2)
• Enhanced Interior Gateway Protocol (EIGRP)
• Open Shortest Path First (OSPF).
Routing table define all the details that required to achieve the location to the whole remote
network in internet work. In te remote network data packet could be transmit while using routed
protocol
Routed protocol is use ways of packet delivery to transferring packets from source towards the
destination.
ROUTING BASICS
A router should retain the following informations to transfer route packets from sourse towards
the destination
• Destination Address
• Neighbor routers that it learns about all remote systems
• Possible routes to any or all remote systems
• The best path to each remote network
• How to keep and verify routing information
Router must have routing table. Routing table is really a map from the interconnectivity from the
nodes within the internetwork containing information on which road to follow and the way to
achieve the remote network.
This type of map is made based on the informations shared one of the nodes within the internetwork
configured within the same routing protocol. Anybody can produce a routing table by hand. Every
single node involve online work to develop the topology.
for example send , received update to construct . The adjacent nodes has the road to achieve it'.at
the. the exit interface to achieve the neighbor node.
If your node isn't directly connected or perhaps is connected with a sequence of nodes then your
node have to get its method to the destination node.
To obtain the needed path information node use ,
• Static Routing
• Dynamic Routing.
Static routing - by hand create and updating from the routing table through the administrator by
inserting all network information into each nodes.
The Dynamic Routing, the nodes exchange details based on the routing protocol configured within
the node. This post is updated within the routing table. Or no change happens in the internetwork
the discussing process starts and the details are exchanged until all of the nodes are converged
towards the same routing table.
Dynamic Routing is pretty much better than Static Routing
• How to keep and verify routing information
Router must have routing table. Routing table is really a map from the interconnectivity from the
nodes within the internetwork containing information on which road to follow and the way to
achieve the remote network.
This type of map is made based on the informations shared one of the nodes within the internetwork
configured within the same routing protocol. Anybody can produce a routing table by hand. Every
single node involve online work to develop the topology.
for example send , received update to construct . The adjacent nodes has the road to achieve it'.at
the. the exit interface to achieve the neighbor node.
If your node isn't directly connected or perhaps is connected with a sequence of nodes then your
node have to get its method to the destination node.
To obtain the needed path information node use ,
• Static Routing
• Dynamic Routing.
Static routing - by hand create and updating from the routing table through the administrator by
inserting all network information into each nodes.
The Dynamic Routing, the nodes exchange details based on the routing protocol configured within
the node. This post is updated within the routing table. Or no change happens in the internetwork
the discussing process starts and the details are exchanged until all of the nodes are converged
towards the same routing table.
Dynamic Routing is pretty much better than Static Routing
ADMINISTRATIVE DISTANCE
The executive distance (AD) can be used to rate the longevity of routing information. The worth
depends upon the information that the router receives from the nearby routers. Values range
comes from to 255.
• If values is zero - Reliable network
• If values is zero - doesn’t enables any traffic to feed it
If there's multiple AD , router accept the comparatively least AD
ROUTING CLASSES
There are three different routing classes:
Distance Vector
Find out the best road to the remote network in line with the distance in the router.
The space could be measured by means of the hop count, which essentially signifies the amount of
routers the information packet needs to mix to get towards the destination router.
The vector within the Distance vector signifies the road to the remote network. The space vector
routing protocols are class-full routing protocols.
Such classes, full routing tables are exchanged and updates are exchanged through broadcast.
e.g. - RIP, IGRP 2.1.4.2
Link State
You will find tree routing tables within the link condition routing protocols. The hyperlink
condition routing protocols will also be known as because the shortest path first protocols.
The executive distance (AD) can be used to rate the longevity of routing information. The worth
depends upon the information that the router receives from the nearby routers. Values range
comes from to 255.
• If values is zero - Reliable network
• If values is zero - doesn’t enables any traffic to feed it
If there's multiple AD , router accept the comparatively least AD
ROUTING CLASSES
There are three different routing classes:
Distance Vector
Find out the best road to the remote network in line with the distance in the router.
The space could be measured by means of the hop count, which essentially signifies the amount of
routers the information packet needs to mix to get towards the destination router.
The vector within the Distance vector signifies the road to the remote network. The space vector
routing protocols are class-full routing protocols.
Such classes, full routing tables are exchanged and updates are exchanged through broadcast.
e.g. - RIP, IGRP 2.1.4.2
Link State
You will find tree routing tables within the link condition routing protocols. The hyperlink
condition routing protocols will also be known as because the shortest path first protocols.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
The neighbor table - information on the directly connected routers.
The topology table - Information regarding the topology from the entire internetwork.
The routing table - consists the shortest road to the remote systems.
ROUTING METRICS
1. Hop count The quantity of routers that the packet will pass before arriving the
destination router.
2. Cost It's generally an arbitrary value that's assigned with the administrator and is
founded on the bandwidth
3. Bandwidth It is the data capacity in the link.
4. Delay Its measurements are the whole time taken having a packet to move within
the source router for the destination router.
5. Load Its measurements are the amount of activity around the network source link a
router or possibly a hyperlink. 6. Reliability It means network link’s bit error rate.
6. MTU This means Maximum Transmission Unit. It resembles the most frame length
in octets that's allowed to feed for the internetwork without fragmentation.
7. Routing Protocols might be considered,
8. Interior gateway protocols type 1 Link-condition routing protocols - OSPF which is-
IS
9. link-condition routing protocols : Distance-vector routing protocols - Routing
Information Protocol, RIPv2, IGRP.
The topology table - Information regarding the topology from the entire internetwork.
The routing table - consists the shortest road to the remote systems.
ROUTING METRICS
1. Hop count The quantity of routers that the packet will pass before arriving the
destination router.
2. Cost It's generally an arbitrary value that's assigned with the administrator and is
founded on the bandwidth
3. Bandwidth It is the data capacity in the link.
4. Delay Its measurements are the whole time taken having a packet to move within
the source router for the destination router.
5. Load Its measurements are the amount of activity around the network source link a
router or possibly a hyperlink. 6. Reliability It means network link’s bit error rate.
6. MTU This means Maximum Transmission Unit. It resembles the most frame length
in octets that's allowed to feed for the internetwork without fragmentation.
7. Routing Protocols might be considered,
8. Interior gateway protocols type 1 Link-condition routing protocols - OSPF which is-
IS
9. link-condition routing protocols : Distance-vector routing protocols - Routing
Information Protocol, RIPv2, IGRP.
10. Exterior gateway protocols
Inside the SWICHlan , Border Gateway Protocol (BGP) and Open Shortest Path First (OSPF) are
employed to communicate involving the network locations.
Border Gateway Protocol (BGP) may be used to route data packets among the two different
locations Systems.
Border Gateway Protocol (BGP) may be used to route data packets among the two different
locations Systems.
Open Shortest Path First (OSPF) may be used to route the packets within the VLAN network in the
SWICHlan
Critically compare the routing protocols
The objective of this would be to critically evaluate two complex Interior Gateway Protocols (IGP)
and supply an evaluation and objective review on their own strengths, weaknesses, operational
needs and discuss their commercial implementations.
Enhanced Interior Gateway Routing Protocol (EIGRP) and Open Shortest Path First (OSPF) selected
for that evaluation
These protocols are selected because of their dominance in the current enterprise computer
systems .Both protocols are is associated with different major protocol class
EIGRP - Distance-vector protocol
OSPF - Link-condition protocol class.
Similarities
Inside the SWICHlan , Border Gateway Protocol (BGP) and Open Shortest Path First (OSPF) are
employed to communicate involving the network locations.
Border Gateway Protocol (BGP) may be used to route data packets among the two different
locations Systems.
Border Gateway Protocol (BGP) may be used to route data packets among the two different
locations Systems.
Open Shortest Path First (OSPF) may be used to route the packets within the VLAN network in the
SWICHlan
Critically compare the routing protocols
The objective of this would be to critically evaluate two complex Interior Gateway Protocols (IGP)
and supply an evaluation and objective review on their own strengths, weaknesses, operational
needs and discuss their commercial implementations.
Enhanced Interior Gateway Routing Protocol (EIGRP) and Open Shortest Path First (OSPF) selected
for that evaluation
These protocols are selected because of their dominance in the current enterprise computer
systems .Both protocols are is associated with different major protocol class
EIGRP - Distance-vector protocol
OSPF - Link-condition protocol class.
Similarities
• being classless therefore supporting CIDR/VLSM
• being capable of working with IPv4/IPv6 address families (OSPFv3 and EIGRP for IPv6)
• ensure loop-free routing
However OSPF and EIGRP are extremely varied protocols each using its own weaknesses and
strengths.
Operational strengths
Despite the fact that each of the protocols offer fast convergence occasions, EIGRP has faster
convergence occasions minimizing bandwidth consumption compared to OSPF .
EIGRP can take the hyperlink bandwidth into consideration and adjust the level of the updates sent.
Simulations transported out by Thorenoor, S. (2010) using OPNET Modeller demonstrate that EIGRP
outperforms OSPF when it comes to network convergence duration, protocol traffic, CPU and
network bandwidth utilization in addition to throughput and queuing delay (Based on the
Simulations made by Thorenoor, S. (2010) using OPNET Modeller)
Studies have shown that EIGRP includes a lower bandwidth utilization when routing information
exchanged and faster convergence occasions:
The amount of packet loss is smaller sized when utilizing EIGRP compared to OSPF.
OSPF as being a link-condition protocol keeps a LSDB - a roadmap from the whole network topology
to make sure loop free routing and improve convergence occasions in case of a hyperlink failure.
Rival OSPF, EIGRP doesn't keep whole topology, but holds a path to the achievable successor router
and in case of a hyperlink failure it might change to the achievable successor route producing a
rapid connectivity restoration.
• being capable of working with IPv4/IPv6 address families (OSPFv3 and EIGRP for IPv6)
• ensure loop-free routing
However OSPF and EIGRP are extremely varied protocols each using its own weaknesses and
strengths.
Operational strengths
Despite the fact that each of the protocols offer fast convergence occasions, EIGRP has faster
convergence occasions minimizing bandwidth consumption compared to OSPF .
EIGRP can take the hyperlink bandwidth into consideration and adjust the level of the updates sent.
Simulations transported out by Thorenoor, S. (2010) using OPNET Modeller demonstrate that EIGRP
outperforms OSPF when it comes to network convergence duration, protocol traffic, CPU and
network bandwidth utilization in addition to throughput and queuing delay (Based on the
Simulations made by Thorenoor, S. (2010) using OPNET Modeller)
Studies have shown that EIGRP includes a lower bandwidth utilization when routing information
exchanged and faster convergence occasions:
The amount of packet loss is smaller sized when utilizing EIGRP compared to OSPF.
OSPF as being a link-condition protocol keeps a LSDB - a roadmap from the whole network topology
to make sure loop free routing and improve convergence occasions in case of a hyperlink failure.
Rival OSPF, EIGRP doesn't keep whole topology, but holds a path to the achievable successor router
and in case of a hyperlink failure it might change to the achievable successor route producing a
rapid connectivity restoration.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
OSPF supports route summarisation around the border routers only, while EIGRP provides more
versatility by supporting per interface route summarisation this leads to reduced resource
utilisation and faster convergence. To be able to improve routing protocol scalability both protocols
support stub areas/routers (although the stub areas/routers operate in another fashion), OSPF areas
could be configured as stub, totally stubby, not-so-stubby or totally not-so-stubby. EIGRP has more
options for example receive-only, leak-map, connected, static, summary and reassigned, which could
be combined except the receive-only option. To help increase scalability OSPF uses areas to produce
2 tier network hierarchy which will help to logically sub-divide the network reducing LSA flooding
and LSDB size thus saving sources and making the protocol highly scalable.
EIGRP is exclusive by its utilization of Protocol-dependent Modules (PDM) which permit the protocol
to aid not just IP but additionally many other network layer protocols like IPX, AppleTalk and adjust
to future’s changes.
Both protocols allow equal cost load balancing, EIGRP will also support unequal cost load balancing.
Weaknesses and known issues
OSPF weaknesses include greater CPU, memory and bandwidth utilisation, greater convergence
occasions when compared with EIGRP, being not able to aid other protocols than IP/IPv6, being
complex to configure particularly when quantity of areas grow cheap summarisation only works
around the border routers. One of the EIGRP weaknesses is its insufficient interoperability along
with other vendors and Stuck-In-Active issue, despite the fact that mitigated by presenting SIA-query
and SIA-reply messages still from time to time causing unnecessary termination of neighbour
adjacencies when you will find hard to rely on links.
Operational requirements
The OSPF protocol was created through the Internet Engineering Task Pressure (IETF) like a non-
proprietary vendor-independent routing protocol this permit the protocol for use by vendor and let
people to conserve a multivendor network atmosphere. EIGRP unlike OSPF is really a 'cisco'
proprietary protocol therefore works just with 'cisco' devices, the protocol continues to be partly
versatility by supporting per interface route summarisation this leads to reduced resource
utilisation and faster convergence. To be able to improve routing protocol scalability both protocols
support stub areas/routers (although the stub areas/routers operate in another fashion), OSPF areas
could be configured as stub, totally stubby, not-so-stubby or totally not-so-stubby. EIGRP has more
options for example receive-only, leak-map, connected, static, summary and reassigned, which could
be combined except the receive-only option. To help increase scalability OSPF uses areas to produce
2 tier network hierarchy which will help to logically sub-divide the network reducing LSA flooding
and LSDB size thus saving sources and making the protocol highly scalable.
EIGRP is exclusive by its utilization of Protocol-dependent Modules (PDM) which permit the protocol
to aid not just IP but additionally many other network layer protocols like IPX, AppleTalk and adjust
to future’s changes.
Both protocols allow equal cost load balancing, EIGRP will also support unequal cost load balancing.
Weaknesses and known issues
OSPF weaknesses include greater CPU, memory and bandwidth utilisation, greater convergence
occasions when compared with EIGRP, being not able to aid other protocols than IP/IPv6, being
complex to configure particularly when quantity of areas grow cheap summarisation only works
around the border routers. One of the EIGRP weaknesses is its insufficient interoperability along
with other vendors and Stuck-In-Active issue, despite the fact that mitigated by presenting SIA-query
and SIA-reply messages still from time to time causing unnecessary termination of neighbour
adjacencies when you will find hard to rely on links.
Operational requirements
The OSPF protocol was created through the Internet Engineering Task Pressure (IETF) like a non-
proprietary vendor-independent routing protocol this permit the protocol for use by vendor and let
people to conserve a multivendor network atmosphere. EIGRP unlike OSPF is really a 'cisco'
proprietary protocol therefore works just with 'cisco' devices, the protocol continues to be partly
opened up by 'cisco' for that interoperability reasons, but OSPF remains a far more attractive choice
for massive network applications because of its multivendor support and scalability.
Link-condition protocols generally want more CPU processing power and memory to function when
compared to distance-vector protocols because of the necessity of maintaining its local LSDB and
run SPF formula each time there's a general change in the neighborhood place to re-calculate SPF
Tree. Since OSPF only supports route summarisation in the area border, all of the intra-area routes
is going to be locked in the database. Flooding from the SLAs may cause congestions around the
slower links, but OSPF DR/BDR router can be used to minimise the amount of updates sent and
functions like a central distribution point for LSAs within an area.
Wijaya, C. (2011) highlights that the amount of total packets sent throughout the routing
information exchange is gloomier when utilizing EIGRP:
In comparison EIGRP requires less CPU, memory and link bandwidth sources because of the fact
that EIGRP transmits only bounded and triggered updates and doesn't keep whole network
topology in the database. EIGRP keeps a neighbour table and installs a achievable successor route
rather. Additionally, it transmits partial updates in case of a big change to lessen bandwidth
utilisation and is capable of doing capping the quantity of updates it transmits to avoid congestions.
Commercial implementation
OSPF is among the most widely used IGP in the current computer systems. Becoming an open
standard protocol means that it'll be preferred inside a massive multi-vendor systems because of its
interoperability. The hierarchical structure, route summarisation and stub options helps make the
protocol very scalable and appropriate for those sizes of systems.
EIGRP is fast and never as resource demanding as OSPF, it provides high versatility by enabling per-
interface route summarization and PDMs for a number of today’s and future’s protocols. EIGRP
supports stub systems and it is scalable, simple to configure and occasional overhead. The truth that
it's 'cisco' proprietary protocol could make the protocol look less attractive in large multivendor
network environments.
for massive network applications because of its multivendor support and scalability.
Link-condition protocols generally want more CPU processing power and memory to function when
compared to distance-vector protocols because of the necessity of maintaining its local LSDB and
run SPF formula each time there's a general change in the neighborhood place to re-calculate SPF
Tree. Since OSPF only supports route summarisation in the area border, all of the intra-area routes
is going to be locked in the database. Flooding from the SLAs may cause congestions around the
slower links, but OSPF DR/BDR router can be used to minimise the amount of updates sent and
functions like a central distribution point for LSAs within an area.
Wijaya, C. (2011) highlights that the amount of total packets sent throughout the routing
information exchange is gloomier when utilizing EIGRP:
In comparison EIGRP requires less CPU, memory and link bandwidth sources because of the fact
that EIGRP transmits only bounded and triggered updates and doesn't keep whole network
topology in the database. EIGRP keeps a neighbour table and installs a achievable successor route
rather. Additionally, it transmits partial updates in case of a big change to lessen bandwidth
utilisation and is capable of doing capping the quantity of updates it transmits to avoid congestions.
Commercial implementation
OSPF is among the most widely used IGP in the current computer systems. Becoming an open
standard protocol means that it'll be preferred inside a massive multi-vendor systems because of its
interoperability. The hierarchical structure, route summarisation and stub options helps make the
protocol very scalable and appropriate for those sizes of systems.
EIGRP is fast and never as resource demanding as OSPF, it provides high versatility by enabling per-
interface route summarization and PDMs for a number of today’s and future’s protocols. EIGRP
supports stub systems and it is scalable, simple to configure and occasional overhead. The truth that
it's 'cisco' proprietary protocol could make the protocol look less attractive in large multivendor
network environments.
Equipment for Core Layer
• The core switch is really a 'cisco' Catalyst 6509 with dual supervisors (in slots 1 and a pair
of).
• Each supervisor features a Multi-layer Switch Feature Card 2 (MSFC2) for Layer 3 switching.
• Each supervisor includes two Gigabit Ethernet ports.
• You will find four 6416 blades (in slots 3 through 6), because both versions contains 16 Gigabit
Ethernet ports. (All the Gigabit Ethernet ports require Gigabit Interface Ripper tools (GBIC)
modules for connectivity.)
• There are a couple of 6348 blades (in slots 7 and eight), because both versions contains 48
Fast Ethernet ports.
• The Cat6509 is running IOS v5.5(3), and also the MSFC2s are running IOS v12.1(2)E Desktop
Edition.
Distribution
• The closet switches are 'cisco' Catalyst 3500-series switches.
• There are three Catalyst 3524s,
• 24 Fast Ethernet ports and 2 Gigabit Ethernet ports.
• In-line capacity to IP telephones.
• 14 Catalyst 3548s,
• 48 Fast Ethernet ports and 2 Gigabit Ethernet ports.
• Jn-line power.
• All from the Cat3500s are running IOS v12.(5.2)XU.
• The core switch is really a 'cisco' Catalyst 6509 with dual supervisors (in slots 1 and a pair
of).
• Each supervisor features a Multi-layer Switch Feature Card 2 (MSFC2) for Layer 3 switching.
• Each supervisor includes two Gigabit Ethernet ports.
• You will find four 6416 blades (in slots 3 through 6), because both versions contains 16 Gigabit
Ethernet ports. (All the Gigabit Ethernet ports require Gigabit Interface Ripper tools (GBIC)
modules for connectivity.)
• There are a couple of 6348 blades (in slots 7 and eight), because both versions contains 48
Fast Ethernet ports.
• The Cat6509 is running IOS v5.5(3), and also the MSFC2s are running IOS v12.1(2)E Desktop
Edition.
Distribution
• The closet switches are 'cisco' Catalyst 3500-series switches.
• There are three Catalyst 3524s,
• 24 Fast Ethernet ports and 2 Gigabit Ethernet ports.
• In-line capacity to IP telephones.
• 14 Catalyst 3548s,
• 48 Fast Ethernet ports and 2 Gigabit Ethernet ports.
• Jn-line power.
• All from the Cat3500s are running IOS v12.(5.2)XU.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Technical Considerations
This contains details about the technical concerns that influenced the configurations from the
switches and also the routers.
Technical Considerations for Switches
The following aspects were taken into account to create the switch configurations.
Redundancy
The Cat6509 provide redundancy within the core switch. Anytime only supervisor is active along
with other nodes remain in standby mode
Logical Topology
This outlines the logical topology (Layer 3) from the SWICHLAN network.
VLANs
The SWICHLAN network is split into several VLANs, and every one of the VLANs link one wiring
closet. :
Network Addressing
IP may be the network protocols being used around the SWICHLAN network. An Ip is really a
unique value which is used to acknowledge a pc on the network.
Each switch comes with an Ip assigned for management purposes. The Ip for every switch is
assigned in the VLAN for that closet that resides.
Hot Standby Router Protocol (HSRP) is enabled on VLANs for failover backward and forward
MSFC2s within the Cat6509, which behave as the default gateway on every subnet. Typically, Router
1 (the main HSRP router) uses the Ip .2 for every VLAN, and Router 2 (the secondary router) uses .3.
The virtual router Ip is .1 for each one of the VLANs
CONCLUSION
The research into the network design, routing protocols and demanding evolution of
routing protocols continues to be completed in an in depth way. Case study has provided
This contains details about the technical concerns that influenced the configurations from the
switches and also the routers.
Technical Considerations for Switches
The following aspects were taken into account to create the switch configurations.
Redundancy
The Cat6509 provide redundancy within the core switch. Anytime only supervisor is active along
with other nodes remain in standby mode
Logical Topology
This outlines the logical topology (Layer 3) from the SWICHLAN network.
VLANs
The SWICHLAN network is split into several VLANs, and every one of the VLANs link one wiring
closet. :
Network Addressing
IP may be the network protocols being used around the SWICHLAN network. An Ip is really a
unique value which is used to acknowledge a pc on the network.
Each switch comes with an Ip assigned for management purposes. The Ip for every switch is
assigned in the VLAN for that closet that resides.
Hot Standby Router Protocol (HSRP) is enabled on VLANs for failover backward and forward
MSFC2s within the Cat6509, which behave as the default gateway on every subnet. Typically, Router
1 (the main HSRP router) uses the Ip .2 for every VLAN, and Router 2 (the secondary router) uses .3.
The virtual router Ip is .1 for each one of the VLANs
CONCLUSION
The research into the network design, routing protocols and demanding evolution of
routing protocols continues to be completed in an in depth way. Case study has provided
compressive detail concerning the Network the perception of SWICHlan network .Here
discussed , Every single aspect involve with network design. Even the routing protocols
which have been utilized in this analysis are BGP and OSPF. Within this analysis for any
better comparison to occur one protocol from distance vector and something protocol from
link condition has been utilized. With such protocols works well for finding the right
possible shortest path in the available pathways in the source router towards the
destination router. The origin router send update messages to the neighbor routers and
receives update messages using their company routers and using the particular formula
from the protocol implemented within the router it calculates the very best road to achieve
the remote network.
References
(Priscilla Oppenheimer, (2011) ,Cite right : Top-Down Network Design, Third
Edition,Cisco Press)
(Martin Pueblas, Brian Cox, Srinivas Tenneti, Steve Gyurindak(2013),Cisco
Service Ready Architecture for Schools Design Guide ,Available
at ;URLhttp://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Education/
SchoolsSRA_DG/SchoolsSRA-DG.pdf, 02/09/2017)
discussed , Every single aspect involve with network design. Even the routing protocols
which have been utilized in this analysis are BGP and OSPF. Within this analysis for any
better comparison to occur one protocol from distance vector and something protocol from
link condition has been utilized. With such protocols works well for finding the right
possible shortest path in the available pathways in the source router towards the
destination router. The origin router send update messages to the neighbor routers and
receives update messages using their company routers and using the particular formula
from the protocol implemented within the router it calculates the very best road to achieve
the remote network.
References
(Priscilla Oppenheimer, (2011) ,Cite right : Top-Down Network Design, Third
Edition,Cisco Press)
(Martin Pueblas, Brian Cox, Srinivas Tenneti, Steve Gyurindak(2013),Cisco
Service Ready Architecture for Schools Design Guide ,Available
at ;URLhttp://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Education/
SchoolsSRA_DG/SchoolsSRA-DG.pdf, 02/09/2017)
1 out of 24
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.