COIT20264 Network Design (HT2, 2019) - Routing and Switching Protocols

Verified

Added on  2022/11/09

|6
|325
|30
Report
AI Summary
This report provides an overview of logical network design, focusing on routing and switching protocols and network security mechanisms. It explains how routing protocols facilitate communication between routers, enabling efficient data transmission across networks, and how switching protocols handle data traffic within a network. The report further discusses the evolution of network architectures, highlighting the shift towards data-centric designs and the integration of packet switching. Additionally, it explores network security, detailing various protection layers, software, hardware, and policies implemented to prevent unauthorized access and ensure data integrity. References are provided for further reading on interdependent network design and the implementation of Open vSwitch.
Document Page
LOGICAL NETWORK
DESIGN
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
DISCUSSION OF ROUTING AND SWITCHING PROTOCOLS
Routing protocol identifies how communication is made between routers,
sharing information which enables them for selecting routes among any tow
computer network or nodes.
Routers perform functions of “traffic directing” on internet, one router passes
data packets to another router through network until the destination computer
is reached.
Document Page
DISCUSSION OF ROUTING AND SWITCHING PROTOCOLS
(CONTINUED)
As data traffic outpaces voice traffic, data-centric architectures will be converted
from carrier networks, changing the course of performance of switch in
transport network.
Packet switching needs to be added to the network and transport network
should be optimized at same time, for meeting the packet switching’s
requirements.
Document Page
DISCUSSION OF SECURITY MECHANISMS
Network security is used for protecting data transmission within the network. A
networking security system depends on protection layers and have multiple
components which includes security software and networking monitoring along
with hardware components.
All the policies and provisions are included in the network security by network
administrator for preventing and monitoring unauthorized access, modification,
denial or misuse of network-accessible resources and computer network.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
REFERNECES
González, A.D., Dueñas Osorio, L., Sánchez Silva, M. and Medaglia, A.L., 2016.
The interdependent network design problem for optimal infrastructure system
restoration. Computer Aided Civil and Infrastructure Engineering , 31(5), pp.334-
350.
Pfaff, B., Pettit, J., Koponen, T., Jackson, E., Zhou, A., Rajahalme, J., Gross, J.,
Wang, A., Stringer, J., Shelar, P. and Amidon, K., 2015. The design and
implementation of open vswitch. In 12th {USENIX} Symposium on Networked
Systems Design and Implementation ({NSDI} 15) (pp. 117-130).
Document Page
THANK YOU!
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]