Tasks
Routing describes how information moves from a source to the destination using the shortest path and taking the minimum time.The routing process is perfomed by network device called router, it uses specific algorithms to find the shortest route for the information to be followed from the source to the required destination. Routing uses defined protocols to uniquely identify devices that are connected to the network.There are various types of the routing. Static routing in this the administrator identifies the specific path for routing while in dynamic routing the router identifies by itself the required or the preferable path for routing.it is categorized in multiple ways. In this the network protocols are described and the best of all is implemented in the network architecture that is used to link all the universities in Switchlan.
This section involves picking from an assortment of case studies that are related and analyzing them in order to get a crystal clear about the topic that was researched. A comparison between these case studies is shown to see its similarities, advantages and disadvantages and thus a conclusion is drawn.
In networking data sent from one path to another follows a specific path Dong(208). There are a number of paths to be followed between the nodes and selection of the appropriate path to be followed between the nodes is the key issue of all. The appropriate path selection can only be done by using the routing protocols Green(2013). Routing selects the shortest path of information flow from the source to the required destination.Data is routed from the source to the required destination through a series of multiple routers. Routing can be done in two ways static routing and dynamic routing Talbi(2009). Stating routing is about manual selection of the required path while dynamic routing is done on the basis of routing protocol e.g RIP, OSPF and EIGRP .Dynamic routing is more efficient than static routing Sailer(2009).Is done depending on the routing protocols there are two routing protocols interior gateway protocol and exterior gateway routing protocol. Interior protocol run within autonomous systems while exterior run outside the autonomous systems .The interior gateway protocols include RIP, OSPF and EIGRP Ptaff(2015). This paper describes the interior routing protocols the researchers have worked upon including making the protocols more efficient and secure.
The following is the routing protocol tree showing how routing is sub divided.
Interior gateway protocol (IGP)
Literature Review
This kind of protocol is found within an autonomous system. There are four IGP protocols has discussed below Signal (2009).
Routing information Protocol(RIP)
Routing information protocol is a vector distance routing protocol which is standardized . The RIP uses a form distance as hop count metric. Since this is a distance vector, it prevents routing loops by limiting the maximum number of hop counts which might be allowed especially in paths which are between the destinations and the sources. RIP allows maximum of 15 hops. The routes of an RIP can be considered unreachable f the number of hops exceeds 15.
RIP It is found within the autonomous system ,shares information within the system by using an algorithm called distance vector algorithm. It was described by Ford and Fulkomen. Mostly used in internet based protocol. Since many networks are connected together by many gateways the type of network may be simple such has point to point .There are two version of RIP this are RIPv1 and RIPv2 Sklavos().Rip for big networks since it supports up to a maximum of sixteen hosts.
Functioning
It creates a list of all functioning nodes in the entire network the information is sent to the routers in the system. Every router connected receives information on its end and forwards the same information to the next router. This process make sure that each router in the entire system receives information continuously. After information is received its metric is increased for further transfer within the system. The parts with lowest metric count within the system is selected during selection.
Open Shortest Path First (OSPF)
Open Shortest Past First is usually described in RFC 2328 that is an IGP which is used to supply routing data within an autonomous system. OSPF is the most used in bigger networks since it is based on link state technology which uses algorithm that finds the shortest path.
This is link state protocol mostly used in internet protocol. Is commonly used in IGP than others since it supports a large network and allows subnetting Sandberg(2012). The protocol is open to every vendor. It has the following benefits over the others.
- Reduces effect on CPU and memory
- Full supported class behavior.
- Uses multiple paths created by fully loading balancing.
It divides the autonomous system into divisions for easier administration and optimization of traffics. The cost calculation the network is done by Dijkstra algorithm. Every router calculates the cost to allow data to pass across it. After the cost is calculated data is transferred to all other routers .It also supports load balancing that enable data to be transferred to all the required destinations this distributes network traffics among all the routers.
Routing Protocols Overview
This type of routing protocol has no limitation that is caused by hops , this is because when comparing RIP which has a limit of 15 hops and when the hops exceeds 15, this protocol cannot be reached
Enhanced Interior Gateway Routing Protocol (EIGRP)
This is built by enhancing IGP. It uses the distance vector technology without changing the information and enhances high efficiency of the protocols. Has an improved convergence method due to Diffusing Update Algorithm (DUAL).The algorithm provide loop free environment during path calculation. There are four building blocks of EIGRP that includes Neighbor Discovery or Recovery, Reliable Transport Protocol, DUAL Finite State Machine, and Protocol Dependent Modules Talbi(2009).
In this the routers always keeps information on link failures and check whether the network is working properly. The routers keeps information on the neighboring routers to enhance easy and faster communication among the modules of the system Cruz-Neira(2011).
The components that operates EIGP includes the following:
- Protocol dependent module
- Reliable transport protocol
- DUAL finite state machine
- Neighbour recovery
Since EIGRP refreshes are activated when there is a change, it is imperative to have a procedure
that switches progressively learn of different switches on straightforwardly associated organize. A switch ought to find once a neighboring switch is inaccessible of out of commission. Neighbor
Revelation and Recovery is expert by sending little Hello bundles intermittently at low
cost. Once the welcome bundles are gotten, regardless of whether this neighbor is alive can be resolved. The neighboring switch will begin trading data when switches are working.
Comparison of network protocols
In view of our three topologies, we mimicked the execution of each directing convention on all three topologies. This time the speediest convention is still EIGRP. OSPT has longer introduction and recoup time than the other two conventions. The distinction in top length for OSPF isn’t critical in little and huge topologies. Tear is the slowest one in extensive work particularly when the connection is fizzled; its introduction length is half of OSPF. Tear has long fizzle merging think about to the next two. Our presumption was RIP is restricted by its bounce tally which is just 15. EIGRP is as yet the quickest convention among each of the three. OSPF has a marginally longer introduction time contrast with RIP and both OSPF and RIP has any longer introduction time than EIGRP. The fall flat union time is not the same as the work topology where EIGRP>OSPF>RIP, however, the distinction isn’t noteworthy. Tear has the longest recuperate time and OSPF is somewhat speedier. It is obvious to tell that RIP has best execution on little system contrasting with huge tree and work. Since RIP needs to refresh like clockwork, it will take additional time on vast systems. The execution of OSPF is very comparative in three topologies. The introduction time in scorch work is a marginally speedier than that in expansive work and substantial tree.
Interior Gateway Protocol (IGP)
Conclusion
We conclude from various articles that routing protocols work efficiently in various circumstances by applying various techniques but they also have some flaws. These flaws can be covered by applying little changes in the old routing techniques. OSPF for example has some deficiencies for load sharing and proper utilization of bandwidth of all links and these deficiencies can be covered by applying traffic engineering and MPLS. The notion of this research paper is to review routing protocols and contributing with the concept of traffic engineering and load sharing for the proper utilization of resources on OSPF
Network model is a set of networker layers and how they are connected to interact with each other. In this scenario OSI layer model and TCP layer models are used .
International Standard organization layer
This layer defines how different devices of the network are arranged and connected to facilitate easy and faster transfer of information across the all network for easy communication among universities. The layers used in this network include according to Talbi(2009).
- Physical layer
- Data link layer.
- Network layer
- Transport layer
- Session layer
- Presentation layer.
Physical layer
This are the hardware components that are used in the network. In this scenario there many hardware components are connected together to form the network. The components include Servers ,routers switches ,hubs, cables computers and many others.. Each component performs different functions in the network according to Parkland(2008).The following is the diagrammatic representation of the network.
The above is the representation of the network architecture that connects the universities. Each university has a subnet network that are connected together by the cloud. Each university has a different network topology as shown below and different routing protocols.
University 1 subnet
Network topology of the uni 1 subnet is tree topology Dong(2008) and OSPF routing protocol is implemented .The router which is connected to the cloud is connected to a main switch that serves information to clients.
University 2 network topology
This network topology comprises of two routers and many clients it is star topology network Sanberg(2011).In this there is implementation of RIP routing protocol.
University 3 subnet network topology
This is the university where the servers will be stored it contains star network topology
University 4 subnet network topology
This is the university where the servers will be stored it contains tree network topologyThis is a mesh topology that comprises of many switches that are connected together.
University 5 subnet network topology
This is the university where the servers will be stored it contains tree network topology
Routers
In this network both the brouter and core routers are used.Brouter router are used because they serve both as a bridge and a router. They also ehance faster flow of data between the network subnets they do not course high traffic.While Core router are used in communication among different networks devices within the network this because they are chip and easily available.
Routing Information Protocol (RIP)
Switches
There are different types of switches that are applied in this network. They include managed network switches and unmanaged network switches. Managed are used because they do not need to be watched over and over hence low cost of management. While managed are used in setting network configurations for high speed in data transfer Tabi(2009)…
Servers
Three different types of servers are implemented in this network . They include database server, file server and http server. Database server manages common databases for the network, handling all data storage, database management and requests for data. File server are used to store user data files. And domain servers which are used to authenticate users to access the network
Cables
The copper wires are mainly used in this network structure to because they are cheap and they transmit data at high speed .They are also durable and require minimum repair Huyan(2011).
Multiplexer Switches
They are located in the distribution layer. They transmit data in high speed from the sources to the required destination.
Computers
This are the devices that make use of the data in networker. They out put the data that is stored in the servers.
Firewall
Each subnet has a firewall connected to the router to filter content and for security purposes .The application firewalls are used because they are more secureTalbi (2009).
Traffic generated
The web traffic model and file traffic model were generated in the network. The web traffic is sent and received by the server. While the file traffic is sent and received by the file server. This are useful in network topologies in analyzation of the algorithm used in the network and the performance of the network.
Applications
The applications that run in network include windows 8 support .It is implemented because it is more secured than the others. It also supports running of variety of software’s in the network.
While constructing the network various assumptions were made which include the following.
The universities are served same severs that are located in one of the universities.
We also assumed that any packet lost between the source and the destination is due to network congestion and nay lost is due to a channel of networks and bit –rates. For this network we make assumptions that connecting the servers can be located in any of the university as long as there is enough security.
Every computer or mobile phone connected to the network has associated owner. Every owner has the responsibility that his or her machines acquires responsible properties for it to connect to the network.
Open Shortest Path First (OSPF)
Security standards assumptions
This applies to all devices that connect to that Switchlan network through wireless or through network ports or home.
Owners should make sure that there devices are running the recent antiviruses-malware software’s and regularly updated.
Device owners should install the most recent security a patches as soon as directed by the Switchlan network community.
This is the second layer of the network model which a has a lot function and liabilities .It works between the hosts which are directly connected via a cable. Its is responsible for converting bits of data into signals which can be easily transferred to their required destinations. Morever it deals with data flow control and control of the protocols. Other functions include addressing and error control in the network.
Networker layer
This is the network layer in where routers are located .It controls addressing, sub networking and interconnection of the small networks through use of the protocols according Huyan (2011). Each router may have different protocol but communicates with each other within the network through sending of the information to the required destination. The internet protocols addresses are assigned to devices so that they can be uniquely be identified within the network. Broadcasting routing is used to enable the devices communicate with each other at very high speed this prevents delay in information transfer within the network.
Transport layer
This layer that carries out the transportation of data with the network. It has two main protocols. Transport control protocol and user datagram protocol Green(2013). This deals with the transfer of data within the t internet and network.
This is the layer that is found at the top of the networker. It involves applications that enable devices to communicate within the network model. The following software are implemented in this network.
This the operating system that is used in the in the server since is the latest and has more security features that prevent intruders from accessing the network without the admin permission.
The following remote processes occur in the networker.
Client –Server: In this one device acts as the server the other one as the client. This is the type of communication that is implemented in this network. The computer are the clients and the server are located at different locations to serve information to the computers.
Peer-peer: This is type of communication which both devices serve information to each other . It is applied only in some of the departments in the network.The diagram below describes client to server network Talib(2013).
Enhanced Interior Gateway Routing Protocol (EIGRP)
The client server interact through the following methods.
Sockets
In this the client and server interacts through sockets .The server keeps the port open and waits until the a clients sents a request. Once the request is received it processed and the response is returned to the socket of the clients as shown in the diagram below Huyan(2011).
Remote procedural call
This where the devices interacts with each other through the process of calling. A call is made to the server and the server replies to the caller that is the client through another process that contains a response according to Sandberg (2012).
The network diagram
The following is a diagram of the network to be implemented
This is brief presentation of the network design architecture to be implemented for the for connection of all the universities.
Network graph
The above is the graphical presentation of the network architecture to be implemented. The network devices e.g servers, routers and switches are presented by nodes. The nodes are connected by lines which present the copper wires according to Cruz_Neira(2011). The small devices at the end represent the end user devices this include the computers and cell phones which make use of the internet.
The graph below shows the description and analysis of data using a graph in the simulation.
Speed of data in metres per second is plotted against time in the network structure. Different components of the network allow data to flow at different speed. Some of the components at certain level allow data to flow at high speed than others .Low speed of data may be due to high traffic of data in the network component .At certain point data flow in the network is at high speed due to low data traffic according to Ptaff(2015).Where components are required to serve information to many devices the speed of the data reduces drastically but where there are few receivers there is increase in speed of data in the components
Stimulated network model
RIP and OSPF were modeled to compare there impact on the network.The scenario below was created on OPNET modeler 17.5 and two different scenarios were for both protocols were run for about one hour simultaneously.There convergence duration time is as shown below.
From the above results analysis we can notice that OSPF converges very quickly compared to RIP. Due to the timers rip has and the nature of its operation, it falls behind when it comes to quick response to the network needs.
Functioning
Secondly the convergence activity was measured in a network and Ospf as high convergence than Rip.As shown below.
In the above analysis we notice the high activity of OSPF compared to that of OSPF. This falling behind of RIP creates a major issue in case of network failure as the network should wait for RIP to converge in order to recover, and that is translated into a delay. Then the below model is simulated to model a more complicated scenarios, EIGRP, OSPF and RIP were simulated and their protocol related traffic were analyzed as shown below :
The traffic generated in each scenario was analyzed in three different scenarios as shown below.
As we can see from the traffic analysis, EIGRP started at 4500 bit/Sec and then drops to 1100 Bit/Sec. when an error occurs (from the implemented error model in the scenario) it spikes to 4100 Bit/sec) The OSPF starts at 14000 Bit/Sec due to the massive hello packets broadcast at the beginning but then drops to a very low traffic even when the error occurs. Finally RIP protocol’s traffic is constant at 1100 Bit/Sec which has the most impact on flooding the network with unnecessary protocol related traffic which translates into network delay.
Description and Evaluation
As a conclusion we conclude that the convergence time of OSPF as faster than that of RIP and that is due to the internal characteristic of the protocols. Also the convergence activity of OSPF is much more than that of RIP and that makes OSPF a better routing protocol that can react to failure much more quickly. The traffic generated by the given routing protocols were simulated and we can notice from our analysis of the simulation that EIGRP has the minimum impact on the network followed by OSPF and at the end RIP has the highest traffic impact on the network. This research can act as a guidance for service providers and network administrators to help them make better discussions when it comes to choosing the right routing protocol for their network.
Routing protocols
This are the different paths that information follow from the source to the required destination.For the information to flow the router selects a path among many for the information to flow to the destination. The decision made depends on the routing algorithms and the time taken for data to reach the required destination. There are different types of routing protocols as described below according to Skalvos(2010).
Built a Network Model
Table showing the dynamic routing protocol which is implemented in the system Sailer(2013).
The dynamic routing is divided into two interior and exterior gateway protocols. The difference between the two is that interior gateway is used to exchange information within the same autonomous system while exterior is used to exchange the information outside the autonomous system. In the network we implemented the interior gateway protocol since network system is under same administration system. The interior protocol can be further be divided into distance routing protocol and link-state routing protocol. The link-state have no update time limit they can be updated at any time and they are mainly used in a making large scale network while the distance routing protocol are updated after 30-90 seconds and are mainly used in small network infrastructure. The link-state routing protocol is implemented because the network required is a large scale network. Furthermore the link-state network can be divided into ospf and is-is protocols. The OSPF protocol is implemented in the network infrastructure due to the following reasons according to Kim(2013).
- The configuration of the network is very simple.
- Its sends updates if there is any change in the network.
- It is gud for the network since it is used to manage the large networker infrastructures.
- The network system a cannot form unnecessary loops
Conclusion
The OSPF routing protocol a type of the link-state routing protocol should be implemented since is more advantageous and simple to be used. The protocol also provides high functionality that allows multiple vendors to interact with each other using internet protocols and transmission control protocols. It also have the following benefits in a network summarization of the routes, hierarchical segmentation and authentication which are features to handle a large network.
References
Dong, Y., Yu, Z. and Rose, G., 2008, December. SR-IOV Networking in Xen: Architecture, Design and Implementation. In Workshop on I/O Virtualization (Vol. 2).
Green, L.C., Wagner, D.A., Glogowski, J., Skipper, P.L., Wishnok, J.S. and Tannenbaum, S.R., 2013. Surround-screen projection-based virtual reality: the design and implementation of the CAVE., 126(1), pp.131-138.
huyan, L.N. and Agrawal, D.P., 2011. Generalized hypercube and hyperbus structures for a computer network. IEEE Transactions on computers, 33(4), pp.323-333.
Talbi, E.G., 2009. Metaheuristics: from design to implementation (Vol. 74). John Wiley & Sons.
Cruz-Neira, C., Sandin, D.J. and DeFanti, T.A., 2011, September. Surround-screen projection-based virtual reality: the design and implementation of the CAVE. In Proceedings of the 20th annual conference on Computer graphics and interactive techniques (pp. 135-142). ACM.
Singhal, S. and Zyda, M., 2009. Networked virtual environments: design and implementation. ACM Press/Addison-Wesley Publishing Co..
Sandberg, R., Goldberg, D., Kleiman, S., Walsh, D. and Lyon, B., 2012, June. Design and implementation of the Sun network filesystem. In Proceedings of the Summer USENIX conference (pp. 119-130).
Sklavos, N., Moldovyan, N.A. and Koufopavlou, O., 2010. High speed networking security: design and implementation of two new DDP-based ciphers. Mobile Networks and Applications, 10(1-2), pp.219-231.
Sailer, R., Zhang, X., Jaeger, T. and Van Doorn, L., 2009, August. Design and Implementation of a TCG-based Integrity Measurement Architecture. In USENIX Security symposium(Vol. 13, pp. 223-238).
Pfaff, B., Pettit, J., Koponen, T., Jackson, E.J., Zhou, A., Rajahalme, J., Gross, J., Wang, A., Stringer, J., Shelar, P. and Amidon, K., 2015, May. The Design and Implementation of Open vSwitch. In NSDI (pp. 117-130).
Buddhikot, M.M., Chandranmenon, G., Han, S., Lee, Y.W., Miller, S. and Salgarelli, L., 2011. Design and implementation of a WLAN/CDMA2000 interworking architecture. IEEE Communications Magazine, 41(11), pp.90-100.
Ioannidis, J. and Maguire Jr, G.Q., 2009, January. The Design and Implementation of a Mobile Internetworking Architecture. In USENIX Winter (Vol. 93).
Kim, G.H. and Spafford, E.H., 2010, November. The design and implementation of tripwire: A file system integrity checker. In Proceedings of the 2nd ACM Conference on Computer and Communications Security (pp. 18-29). ACM.
Boulis, A., Han, C.C. and Srivastava, M.B., 2008, May. Design and implementation of a framework for efficient and programmable sensor networks. In Proceedings of the 1st international conference on Mobile systems, applications and services (pp. 187-200). ACM.
Caesar, M., Caldwell, D., Feamster, N., Rexford, J., Shaikh, A. and van der Merwe, J., 2005, May. Design and implementation of a routing control platform. In Proceedings of the 2Nd Conference on Symposium on Networked Systems Design & Implementation-Volume 2 (pp. 15-28). USENIX Association.
Priyantha, N.B., Kansal, A., Goraczko, M. and Zhao, F., 2008, November. Tiny web services: design and implementation of interoperable and evolvable sensor networks. In Proceedings of the 6th ACM conference on Embedded network sensor systems (pp. 253-266). ACM.
Pakzad, S.N., Fenves, G.L., Kim, S. and Culler, D.E., 2008. Design and implementation of scalable wireless sensor network for structural monitoring. Journal of infrastructure systems, 14(1), pp.89-101.
Dillon, D.M., Dillon Software Services LLC, 2008. Software framework that facilitates design and implementation of database applications. U.S. Patent 7,412,455.
Kim, Y., Schmid, T., Charbiwala, Z.M. and Srivastava, M.B., 2009, September. ViridiScope: design and implementation of a fine grained power monitoring system for homes. In Proceedings of the 11th international conference on Ubiquitous computing (pp. 245-254). ACM.