Uploaded by anuradhauh

Sample Routing protocol design 3 rechecked.docx

advertisement
Table of Contents
Table of Contents...................................................................................................................1
Table of Figures......................................................................................................................1
Introduction............................................................................................................................2
1.
Routing Protocols...........................................................................................................3
1.1
Introduction to Routing Protocols...........................................................................3
1.2
Where they are used................................................................................................3
1.3
Why they are important...........................................................................................3
1.4
Different types of Routing Protocols.......................................................................3
1.4.1 Description of different types of Routing Protocol...............................................4
2.
Design of a new Routing Protocol..................................................................................6
2.1
Introduction to your design.....................................................................................6
2.2
Calculating Cost......................................................................................................6
2.2.1 How your routing protocol calculates cost?..........................................................6
2.2.2 Present a formula and explain it if appropriate......................................................6
2.3
Packet Headers........................................................................................................7
2.4 Operation......................................................................................................................8
2.4.1 Overhead................................................................................................................8
3. Make informed judgements relating to diverse networking algorithms KS1, KS4, KS6,
KS7, KS10............................................................................................................................11
4.
Compare and contrast existing and emergent networking technologies KS1 –KS10. .12
Conclusion...........................................................................................................................13
References............................................................................................................................18
Table of Figures
Figure 1 IPv4 packet header--------------------------------------------------------------------------7
Figure 2 Addressing table---------------------------------------------------------------------------14
Figure 3 Suggested scoring rubric-----------------------------------------------------------------17
Introduction
In the world of laptop networks, there are important components that can be referred to as
the source and destination. the information that is passed is said to be communicated from
these two additives from time to time. they may be one-of-a-kind styles of paths that may
be considered. Therefore the system of choosing the quality direction over other paths is
referred to as routing which is completed by programmed devices referred to as protocols.
there are fashionable protocols that assist us to ensure the protection of records transfer. the
use of a routing protocol essentially connects and
reaches numerous endpoints that let in to collaborate disasters that take area in links and
nodes in addition to additions and withdrawals of other addresses. using routing protocols
is that they may be maximum commonly distributed as it runs on each specific router that
is related in a community. the purpose of a routing protocol is that it recognizes the way
how routers have their means of communicating to each different in addition to enhancing
them to collaborate with sure nodes that may be determined in a computer community.
consequently, the usage of a routing protocol permits them to share this sort of information
not only to instant neighbours however to the complete community as properly. thru this
manner, they're capable of put in force know-how on what the topology is and what are its
effects. it somehow extensively combines certain modifications that paralyze each single
records line that enables the internet to acquire its survivability and reliability. there are
numerous sorts of traits regarding routing protocols that include a technique that avoids the
use of routing loops that allows them to require routing convergence, based on their
scalability and different factors consisting of relay multiplexing that is related to cloud get
entry to framework parameters. however, as a result, certain numerous traits inclusive of
multilayer interfacing may also be diagnosed as approaches of distributing uncompromised
networking gateways to authorized ports. Source (Educba et al 2020)
1.
Routing Protocols
1.1 Introduction to Routing Protocols
The definition of routing protocols is based on components or instead of a
protocol that is been applied by a router by way of showing the precise route
through which the information is been transferred. It suggests how routers
paintings in a network and most importantly the way to share statistics primarily
based on those adjustments, the reason for a routing protocol is that it enables
the network to makes drastic changes primarily based on its situations so the
decisions that they make won’t be taken into consideration static.
Source
(Webopedia, 2021)
1.2 Where they are used.
They may be specifically used within the distribution of routing information
that takes area between routing devices. As this occurs the information will start
to exchange primarily based on the situations of the community. therefore it's
miles vital to ensure that these packets attain their destination. fortunately,
routing protocols are in particular used at the spine considered to specific
protocols used on a few sites. they may be normally used for routing within
networks that are needed to use across firewalls. Source (Docstore, 2021)
1.3 Why they are important.
They are taken into consideration essential because these days community
visitors and network complexities are hastily increasing. So basically routing
protocols are configured on routers for the cause of replacing routing statistics.
it is important because when configuring a community the usage of routing
protocols is green, due to the fact it's far essential to understand the capabilities
of those protocols and the distinction among every kind. In other, they're of
notable help to routers that allows them to pick out the trails that send records
between diverse networks. Source (Router freak, 2020)
1.4 Different types of Routing Protocols.
In this challenge, there are numerous sorts of routing protocols. they're as follows:
•
Routing statistics Protocol
•
indoors Gateway Protocol
•
Open Shortest route First
•
outdoors Gateway Protocol
•
enhanced interior Gateway Routing Protocol
•
Border Gateway Protocol
•
Intermediate machine-to-Intermediate system
1.4.1 Description of different types of Routing Protocol
Routing statistics Protocol – that's regularly recognised to be the amount one
protocol to be created because it's been applied in foremost networks, but it also
runs on the appliance layer of the OSI model. the most problem of RIP is that
it's a most hop count number of 15 which makes it unsuitable for giant
networks.
Interior Gateway Protocol – this is often frequently considered as a distancevector protocol and became built on the foundations laid down. This certain
protocol uses metrics like bandwidth, delay and reliability. however, it is the
option to suit the viability of routes inside the community. IGRP is proper for
larger networks because it proclaims updates every 90 seconds and features the
foremost hop matter of 255. this allows it to sustain larger networks than a
protocol like RIP. IGRP is moreover extensively used because it's proof against
routing loops as it updates itself routinely while modifications occur within the
community.
Open Shortest direction First – is a hyperlink state IGP it's taken into
consideration for IP networks using this certain algorithm. It’s accustomed
calculate the shortest direction to confirm green transmission of packets. It
additionally keeps databases that contain facts approximately the encircling
topology of the community. This sure protocol uses the Dijkstra algorithm to
recalculate network paths when the topology adjustments. It’s additionally
enormously comfy because it's scalable to big environments
Outdoors Gateway Protocol – this protocol is used to alter facts between
gateway hosts that connect one another with the use of self-sustaining systems.
As a result, it presents a forum for routers to share information throughout
distinct domain names. the foremost example of EGP is that the online itself.
thus the routing desk of this protocol consists of routers and different gadgets. it
works via keeping a database of within sight networks and paths that are able
for them to realize. the knowledge is shipped to related routers, once the
expertise is been reached, they require the prospect to switch their routing tables
and undertake extra informed route choice for the duration of the community
Better indoors Gateway Routing Protocol – this can be mostly a distance
vector routing protocol that's used for IP networks, which is usually the
proprietary of Cisco because it becomes designed to go with the first protocol.
The aim of this protocol is that routers take records from different routing tables
and data them. This protocol is furnished the sort of capabilities it's needed to
maximise efficiency. consequently, packet transmissions are tailor-made easier
thanks to the actual fact routes are recalculated to rush up the convergence
system
Border Gateway Protocol – this is often understood because of the actual fact
the routing protocol of the online truly is classed as a distance route vector
protocol. this type of set of rules is chosen due to the fine routes for packet
switches. the foremost effective direction choice algorithm is commonly
customized by way of adjusting the BGP cost network characteristic. BGP could
make routing selections based on elements like weight, nearby desire,
domestically generated. it's the potential of sending statistics when something is
considerably modified. As a result, there could also be no vehicle discovery of
topology changes which indicates that the patron possesses to configure BGP
manually. In terms of safety, BGP protocols are regularly authenticated so bestaccredited routers can exchange facts with each other.
Intermediate system-to-Intermediate device – is known as a hyperlink nation,
or IP routing protocol that's used on the web to ship IP routing statistics. This
positive protocol makes use of a modified model of the Dijkstra algorithm and
most significantly compromises of various tiers of additives that have stop
structures and domains. Source (Comparitech, 2020)
2.
Design of a new Routing Protocol
2.1 Introduction to your design.
Designing and architecting new routing protocols is an upscale mission because they are
complicated structures managing dispensed network kingdoms, as a way to make and
maintain the routing databases. existing routing protocol implementations are compact,
bundling collectively a database, an ultimate direction calculation algorithm and a
community state distribution mechanism. This paper intends to provide a middlewarebased technique for designing and coping with routing protocols supported by the notion of
decomposing routing protocols into essential constructing blocks and identifying the
function of each aspect, and also to endorse a framework for composing dynamically new
routing protocols using a distributed item platform. consequently, A routing protocol
permits the verbal exchange nodes of various networks to alternate records a good way to
update and maintain routing tables. Documented samples of routing protocols are RIP,
IGRP, EIGRP, and OSPF. The routers are successful to support a couple of unbiased
routing protocols and maintain forwarding tables for several routed protocols. This consists
of routing table sizes, convergence times, and failure detection.
2.2
Calculating Cost
2.2.1 How your routing protocol calculates cost?
Every routing protocol uses an algorithm to calculate the only path to a destination.
Moreover, every routing algorithm uses metrics to calculate path costs. Metrics are simply
values, like hop count, bandwidth, delay, reliability and cargo. The metrics used depend on
the routing protocol. as an example, RIP uses the hop count metric only. IGRP uses
bandwidth and delay by default although it's often configured to use other metrics too
2.2.2 Present a formula and explain it if appropriate.
Cost Calculation
K1(bandwidth)- 1
K2(load)- zero
K3(put off) -1
K4(reliability)- zero
K5(MTU)-0
As simplest bandwidth and put off is used to calculate the fee. The formulation
used for fee calculation is:
EIGRP Metric = 256*((K1*Bandwidth) + (K2*Bandwidth)/(256-Load) + K3*put
off)*(K5/(Reliability + K4)))
As values of K1 and K3 are set to at least one, and K2, K4 and K5 are set to 0.
therefore the formula turns into:
Metric = 256*( Bandwidth +Sum of all postpone)
wherein the bandwidth = (10^7/least bandwidth) and
postpone = (sum of all delays /10)
2.3
Packet Headers
Figure 1 IPv4 packet header
2.4 Operation
Not like traditional DV protocols like RIP and IGRP, EIGRP wouldn't trust
periodic updates: routing updates are despatched only there's a trade. when a path
is misplaced, the updates stop; the invalid and flush timers grow and develop (the
timers aren't reset), and, within the future, the direction is flushed from the routing
table. this method of convergence assumes periodic updates. EIGRP’s approach
has the advantage that community resources aren't consumed with the help of
periodic updates. but, if a router dies, taking away all its downstream routes, how
might EIGRP detect the loss of these routes? EIGRP relies on small hey packets to
determine neighbour relationships and to come back across the shortage of a
neighbour. EIGRP uses reliable transmission for all updates between buddies.
buddies renowned the receipt of updates, and if an acknowledgement isn't
acquired, EIGRP retransmits the update. EIGRP uses the Diffusing update set of
rules (twin) for all route computations. dual’s convergence times are an order of
magnitude but those of conventional DV algorithms. twin can comprehend such
low convergence times by way of maintaining a desk of loop-unfastened paths to
every country, moreover to the least-value direction. EIGRP relies on neighbour
relationships to reliably propagate routing desk changes throughout the
community; routers end up to be pals after they see every other's hey packets on a
classy network. EIGRP sends hey packets every 5 seconds on high bandwidth
hyperlinks and each 60 seconds on low bandwidth multipoint hyperlinks.
Source
(Cisco, 2020)
2.4.1 Overhead
Protocol overhead refers to metadata and community routing data despatched by a
utility, which makes use of some of the available bandwidth of a protocol. These
facts, making up the protocol headers and alertness-particular records is referred
to as overhead since it would not contribute the content material of the message.
inside the similar way at some stage in a network, when nodes trade Routing
information using an equal bandwidth hired utilizing information packets, incur
overhead to the community cited as Routing overhead as this records packets are
exchanged periodically in certain intervals of it slow. One most of the examples
are often the hey packets or the preserve alive packets which are not the info
packets, however, devour the bandwidth of the community inflicting overhead to
the community. Source (Quora, 2020)
How much data is transmitted from each packet?
EIGRP is based on neighbour relationships to reliably propagate routing table adjustments
at some stage in the network; two routers turn out to be neighbours after they see every
different's good day packets on a widespread community. EIGRP sends howdy packets
every five seconds on excessive bandwidth links and every 60 seconds on low bandwidth
multipoint links.
Security
Routing safety has obtained various degrees of attention during the last several years and
has nowadays begun to draw extra attention mainly around Border Gateway Protocol
(BGP) on the overall public internet. regardless of this new attention, however, the earth
maximum hospitable attack is typically not the net's BGP tables the routing systems within
your company community. because of the variability of sniffing-based assaults, an
employer routing infrastructure can certainly be attacked with man-in-the-centre and other
attacks designed to corrupt or trade the routing tables. Layer 3 device (both router or layer
3 transfer) unearths the simplest direction between the source and playground community.
Dynamic routing protocols are accustomed decrease administrator overhead, i.e.,
administrator ought to configure less but by default, all the routing records are visible to
any or all or any interesting events because it is not encrypted consequently hospitable an
assault. We’ll cosy the routing protocols like RIP, EIGRP and OSPF via placing an
authentication thereto via developing a key chain and apply it to the interface on which
we're advertising and marketing the routes. here, we'll not show protocol rather we'll place
authentication on RIP, EIGRP and OSPF. Source (Geeks4Geeks, 2020)
How does Security operate?
As Layer three routing turns more widely used, it offers the potential to carry the
intelligence to the threshold of the network – at each node. A Layer 2 transfer works at the
records layer (Layer 2) of the IP stack while a Layer 3 router works on the network layer
(Layer3). when using Layer 2 switching, all broadcast facts packets are forwarded for the
duration of the community besides filters are applied. maximum Layer 2 switches use
MAC addresses to connect amongst gadgets however those need to be learnt over the
complete community at the beginning of a consultation. in Layer three global, there is
intercommunication among networks, routers and customers both locally and at a long way
off places. These communications allow intelligence to be brought to each router to make
sure community traffic is greater efficiently routed. Layer three routers allow granular site
visitors management to be set at a person, tool and alertness stage. now not handiest can
finely tuned visitors priorities may be set, precision price limiting, congestion control and
interference avoidance protect in opposition to community incidents capable of bringing
networks to a halt. This allows for more 'genuine positioned’ better steady records fees – at
some stage in the network with decreased elements of failure. Layer three protocols are
dynamic once finished. A properly designed and accomplished Layer three community
additionally allows the administrator to installation automatic self-healing routes for data
to allow close to real-time recuperation of communications must one tool fail. but, with the
aid of imposing Layer three routing at the threshold, the community will advantage from
stepped forward safety, availability and bandwidth usage. Source (Data Sat, 2020)
3.
Make informed judgements relating to diverse networking algorithms KS1, KS4,
KS6, KS7, KS10
Charge, hop test, throughput, load balance, defer, jitter, realities switch potential, bundle
setback expense, etc are the most show pointers for guiding assessment. traditional
coordinating estimations' appraisal estimations are overwhelmingly remoted into fragments.
One is for the need of the company's chic help fine, for instance, take off the check,
throughput, esteem, load security, move pace, etc, and the other is for the essential of businessbased records transmission top calibre, for example, delay, jitter, speed of package mishap, etc
most extreme coordinating estimations work on something like one estimation for the overall
idea of the venture's administration or enrich the general idea of the administration, given that
some transmission quality is met. considering every association has unmistakable transmission
top-notch necessities, an enormous part of the ebb and accept the way things are steerage
estimations are not learned with the guide of a ton assessment roughly how various offices
with a particular business undertaking yield guarantee can improve transmission.
As affiliation hundreds are progressed, the 2 estimations require a more prominent broadened
strolling time than other customary computations. Our proposed estimations are thusly more
legitimate for systems that need additional factors through factor investigate results, higher
execution of equipment, and subtleties that aren't extremely high bit by bit. some other trouble
to be addressed later on is the way to manufacture a multi-objective computation with decline
unusualness and quicker execution. the issue of high computational eccentrics might be settled
as the preparing limitation of framework gadgets creates. In like manner, the business of
passed on multi-controller plans in SDN may address the trouble of exorbitant overhead
oversee planes with the augmentation of the partnership size. in the paper, our proposed
coordinating computations are normal for SR in SDN. it's far in a like manner achievable to
loosen up our approach to address normal scattered organizations and organizations that don't
utilize SR. Our proposed coordinating computation can be applied inside the way figuring of
typically dispersed organizations.
The common run period of different estimations. the 2 coordinating computations that we
exhort need longer strolling events than various ordinary estimations. To find the right plan,
the MOPSO estimation requires some emphasis. besides close to settling on the ideal OK
ways, our computation adds the way assessment degree, which isn't constantly communicated
sooner than through exceptional estimations. inside the proposed set of rules 2, the high-level
MOPSO computation enhancements the simultaneous speed look for adequacy simultaneously
as propelling the association masses. It requires a couple of speculation for the proposed set of
rules 2 than for the proposed set of rules 1. the two estimations that we proposed to require
more noteworthy estimation and augmentation of the control aeroplane's computational
diverse nature. at any rate, the computational multifaceted design of control planes might be
facilitated with the improvement of the managing limitation of framework contraptions and
the usage of dispersed multi-controllers in SDN.
4.
Compare and contrast existing and emergent networking technologies KS1 –
KS10
Conventional network architectures are ill-proper to fulfil the requirements of today’s
companies, carriers, and give up users. thanks to a huge industry attempt spearheaded by using
the Open Networking basis (ONF), software- described Networking (SDN) is reworking
networking structure.
within the SDN structure, they manipulate and information planes are decoupled, community
intelligence and state are logically centralized, and the underlying community infrastructure is
abstracted from the applications. As a result, organisations and carriers advantage
extraordinary programmability, automation, and network control, allowing them to build
surprisingly scalable, bendy networks that simply adapt to converting enterprise needs.
Networking generation thus far has consisted largely of discrete units of protocols designed to
connect hosts reliably over arbitrary distances, hyperlink speeds, and topologies. to fulfil
commercial enterprise and technical desires over the last few long time, the enterprise has
developed networking protocols to supply higher overall performance and reliability, broader
connectivity, and more stringent security.
Protocols tend to be described in isolation, but, with every fixing a particular hassle and
without the advantage of any essential abstractions. This has led to one of the primary barriers
of today’s networks: complexity. as an instance, to add or pass any tool, IT need to contact a
couple of switches, routers, firewalls, web authentication portals, etc. and update ACLs,
VLANs, nice of services (QoS), and other protocol-primarily based mechanisms using devicelevel management equipment. in addition, network topology, dealer switch version, and
software model all have to be taken under consideration. due to this complexity, today’s
networks are exceedingly static because it seeks to limit the risk of service disruption.
The static nature of networks is in stark assessment to the dynamic nature of today’s server
surroundings, where server virtualization has significantly extended the wide variety of hosts
requiring network connectivity and essentially altered assumptions approximately the physical
location of hosts. before virtualization, applications resided on a single server and in most
cases exchanged visitors with pick out customers. these days, packages are distributed
throughout multiple digital machines (VMs), which alternate site visitors flows with every
other. VMs migrate to optimize and rebalance server workloads, inflicting the physical stop
factors of current flows to alternate (from time to time unexpectedly) over the years.
Conclusion
Based totally on the routing protocols, it helps us to advantage higher know-how of every
routing protocol’s metric calculations. based on this mission we realise that EIGRP has the
quickest convergence for all network topologies. As a result, EIGRP utilizes the bandwidth,
while RIP sends full routing facts through periodic updates, which floods the network and
unnecessarily wastes bandwidth. consequently, the fine desire is EIGRP for all community
topologies which might be applied as it has a quick convergence that efficiently utilizes
bandwidth
Network Design
Device
R1
Interface
G0/0
IP Address
172.sixteen.1.1
Subnet Mask
255.255.255.0
R2
S0/0/zero
S0/zero/1
G0/0
172.16.3.1
255.255.255.252
192.168.10.five 255.255.255.252
172.16.2.1
255.255.255.0
N/A
N/A
N/A
R3
S0/zero/0
S0/0/1
G0/zero
172.sixteen.3.2 255.255.255.252
192.168.10.nine 255.255.255.252
192.168.1.1
255.255.255.zero
N/A
N/A
N/A
PC1
S0/zero/zero 192.168.10.6
255.255.255.252
S0/zero/1
192.168.10.10 255.255.255.252
NIC
172.sixteen.1.10 255.255.255.0
N/A
N/A
172.16.1.1
PC2
NIC
172.sixteen.2.10 255.255.255.0
172.16.2.1
PC3
NIC
192.168.1.10
192.168.1.1
255.255.255.zero
Figure 2 Addressing table
component 1: Configure EIGRP
Default Gateway
N/A
part 2: affirm EIGRP Routing
history
On this activity, you'll put in force simple EIGRP configurations including network
commands, passive interfaces and disabling automatic summarization. you'll then affirm your
EIGRP configuration using a spread of show commands and testing give up-to-cease
connectivity.
component 1: Configure EIGRP
Step 1: permit the EIGRP routing technique.
allow the EIGRP routing procedure on each router the usage of AS number one. The
configuration for R1 is shown.
R1(config)# router eigrp 1
R2(config)# router eigrp 1
R3(config)# router eigrp 1
what is the variety of numbers that may be used for AS numbers? 1 – 65,535
Step 2: put it up for sale directly connected networks.

Use the show ip course command to display the without delay linked networks on each
router.

how can you inform the distinction between subnet addresses and interface addresses?
Subnets are identified with a “C” and link addresses are diagnosed with an “L”.

On every router, configure EIGRP to market it the precise without delay connected
subnets. The configuration for R1 is shown.
R1(config-router)# community 172.16.1.zero zero.0.0.255
R1(config-router)# community 172.sixteen.three.zero zero.zero.zero.3
R1(config-router)# community 192.168.10.four zero.0.zero.3
R2(config-router)# network 172.sixteen.2.0 zero.0.0.255
R2(config-router)# network 172.sixteen.3.0 zero.zero.zero.three
R2(config-router)# community 192.168.10.8 zero.zero.zero.three
R3(config-router)# network 192.168.1.zero 0.zero.0.255
R3(config-router)# network 192.168.10.4 zero.0.zero.three
R3(config-router)# network 192.168.10.8 0.zero.0.three
Step 3: Configure passive interfaces.
Configure the LAN interfaces to no longer put it on the market EIGRP updates. The
configuration for R1 is proven.
R1(config-router)# passive-interface g0/zero
R2(config-router)# passive-interface g0/zero
R3(config-router)# passive-interface g0/0
Step 4: Disable computerized summarization.
The topology includes discontiguous networks. consequently, disable computerized
summarization on each router. The configuration for R1 is proven.
R1(config-router)# no automobile-summary
R2(config-router)# no automobile-summary
R3(config-router)# no car-summary
observe: previous to IOS 15 vehicle-summary had to be manually disabled.
Step five: store the configurations.
part 2: verify EIGRP Routing
Step 1: look at neighbour adjacencies.

Which command displays the acquaintances located by way of EIGRP? display ip
eigrp acquaintances

All 3 routers have to have two neighbours indexed. The output for R1 need to appear
much like the following:
IP-EIGRP acquaintances for system 1
H deal with Interface maintains Uptime SRTT RTO Q Seq
(sec) (ms) Cnt Num
zero 172.sixteen.3.2 Se0/zero/zero 14 00:25:05 forty one thousand 0 28
1 192.168.10.6 Se0/zero/1 12 00:thirteen:29 forty one thousand zero 31
Step 2: show the EIGRP routing protocol parameters.

What command displays the parameters and other statistics approximately the
contemporary country of any active IPv4 routing protocol approaches configured on
the router? display ip protocols

On R2, input the command you listed for 2a and solution the subsequent questions:
how many routers are sharing routing statistics with R2? 2
where are these records located underneath? Routing statistics resources
what's the most hop count? a hundred
Step 3: affirm cease-to-give up connectivity
PC1, PC2 and PC3 ought to now be able to ping each different. If no longer, troubleshoot your
EIGRP configurations.
Suggested Scoring Rubric
hobby segment question place possible
factors Earned points
hobby segment question place possible
factors Earned points
component 1: Configure EIGRP
Step 1 2 component 1: Configure EIGRP
Step 2a
2
Step 2a
component 1 total 4
element 2: verify EIGRP Routing
Step 2a
Step 2b
Step
1a
5 element 2: verify EIGRP Routing
five
Step 2a
6
Step 2b
part 2 general 16
Packet Tracer rating 80
total rating one hundred
Figure 3 Suggested scoring rubric
References
Lindokuhle Dlamini. 2020. Introduction to Routing Protocols - Lindo Kuhle Dlamini Medium.
[ONLINE] Available at: https://medium.com/@dlindokuhle8/introduction-to-routingprotocolsd1718638af8d. [Accessed 20 July 2021].
NETWORK CHEF BD. 2020. Introduction to Routing Protocols - NETWORK CHEF BD.
[ONLINE] Available at: https://networkchefbd.com/routing-protocols/. [Accessed 20 July
2021].
Routing Protocol - an overview | Science Direct Topics. 2020. Routing Protocol - an
overview |Science Direct Topics. [ONLINE] Available at:
https://www.sciencedirect.com/topics/computer-science/routing-protocol. [Accessed 20 July
2021].
Wikipedia. 2020. Routing protocol - Wikipedia. [ONLINE] Available at:
https://en.wikipedia.org/wiki/Routing_protocol. [Accessed 20 July 2021].
Introduction to Routing Protocols | Cumulus Linux 4.0. 2020. Introduction to Routing
Protocols | Cumulus Linux 4.0. [ONLINE] Available at:
https://docs.cumulusnetworks.com/cumulus-linux/Layer-3/Introduction-to-RoutingProtocols/.
[Accessed 20 July 2021].
Router Freak. 2020. Routing Protocols explained, and how to choose and use them.
[ONLINE]
Available
at:
https://www.routerfreak.com/understanding-networkroutingprotocols/.
[Accessed 20 July 2021].
Routing protocols. 2020. Routing protocols. [ONLINE] Available at https://studyccna.
com/routing-protocols/. [Accessed 20 July 2021].
Comparitech. 2020. Routing Protocol Types - The Ultimate Guide (The Essentials!).
[ONLINE]
Available
at:
https://www.comparitech.com/net-admin/routing-protocoltypesguide/.
[Accessed 20 July 2021].
What is routing protocol? Webopedia Definition. 2020. What is routing protocol? Webopedia
Definition. [ONLINE] Available at:
https://www.webopedia.com/TERM/R/routing_protocol.html. [Accessed 20 July 2021].
PCMag. 2020. Definition of routing protocol | PCMag. [ONLINE] Available at:
https://www.pcmag.com/encyclopedia/term/routing-protocol. [Accessed 20 July 2021].
Bayt.com. 2020. Disadvantages of EIGRP Protocol? - Bayt.com Specialties. [ONLINE]
Available
at:
https://specialties.bayt.com/en/specialties/q/351245/disadvantages-ofeigrpprotocol/.
[Accessed 20 July 2021].
Bayt.com. 2020. What is the advantage of the EIGRP protocol? - Bayt.com Specialties.
[ONLINE]
Available
at:
https://specialties.bayt.com/en/specialties/q/286817/what-istheadvantageof-eigrp-protocol/. [Accessed 20 July 2021].
7 things that you should know about Layer 3 | Datasat Communications. 2020. 7 things that
you should know about Layer 3 | Datasat Communications. [ONLINE] Available at:
http://www.datasat.com/information/2014/datasat-layer-3.php. [Accessed 20 July 2021].
Geeksforgeeks. 2020. Securing Routing Protocols - Geeksforgeeks. [ONLINE] Available at:
https://www.geeksforgeeks.org/securing-routing-protocols/. [Accessed 20 July 2021].
Search Security. 2020. Routing protocol security. [ONLINE] Available at:
https://searchsecurity.techtarget.com/tip/Routing-protocol-security. [Accessed 20 July 2021].
What is routing overhead? - Quora. 2020. What is routing overhead? - Quora. [ONLINE]
Available at: https://www.quora.com/What-is-routing-overhead. [Accessed 20 July 2021].
Cisco. 2020. Enhanced Interior Gateway Routing Protocol - Cisco. [ONLINE] Available at:
https://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routingprotocoleigrp/
16406-eigrp-toc.html. [Accessed 20 July 2021].
Download