Table of Contents Table of Contents...................................................................................................................1 Table of Figures......................................................................................................................1 Introduction............................................................................................................................2 1. Routing Protocols...........................................................................................................3 1.1 Introduction to Routing Protocols...........................................................................3 1.2 Where they are used................................................................................................3 1.3 Why they are important...........................................................................................3 1.4 Different types of Routing Protocols.......................................................................3 1.4.1 Description of different types of Routing Protocol...............................................4 2. Design of a new Routing Protocol..................................................................................6 2.1 Introduction to your design.....................................................................................6 2.2 Calculating Cost......................................................................................................6 2.2.1 How your routing protocol calculates cost?..........................................................6 2.2.2 Present a formula and explain it if appropriate......................................................6 2.3 Packet Headers........................................................................................................7 2.4 Operation......................................................................................................................8 2.4.1 Overhead................................................................................................................8 3. Make informed judgements relating to diverse networking algorithms KS1, KS4, KS6, KS7, KS10............................................................................................................................11 4. Compare and contrast existing and emergent networking technologies KS1 –KS10. .12 Conclusion...........................................................................................................................13 References............................................................................................................................18 Table of Figures Figure 1 IPv4 packet header--------------------------------------------------------------------------7 Figure 2 Addressing table---------------------------------------------------------------------------14 Figure 3 Suggested scoring rubric-----------------------------------------------------------------17 Introduction In the world of laptop networks, there are important components that can be referred to as the source and destination. the information that is passed is said to be communicated from these two additives from time to time. they may be one-of-a-kind styles of paths that may be considered. Therefore the system of choosing the quality direction over other paths is referred to as routing which is completed by programmed devices referred to as protocols. there are fashionable protocols that assist us to ensure the protection of records transfer. the use of a routing protocol essentially connects and reaches numerous endpoints that let in to collaborate disasters that take area in links and nodes in addition to additions and withdrawals of other addresses. using routing protocols is that they may be maximum commonly distributed as it runs on each specific router that is related in a community. the purpose of a routing protocol is that it recognizes the way how routers have their means of communicating to each different in addition to enhancing them to collaborate with sure nodes that may be determined in a computer community. consequently, the usage of a routing protocol permits them to share this sort of information not only to instant neighbours however to the complete community as properly. thru this manner, they're capable of put in force know-how on what the topology is and what are its effects. it somehow extensively combines certain modifications that paralyze each single records line that enables the internet to acquire its survivability and reliability. there are numerous sorts of traits regarding routing protocols that include a technique that avoids the use of routing loops that allows them to require routing convergence, based on their scalability and different factors consisting of relay multiplexing that is related to cloud get entry to framework parameters. however, as a result, certain numerous traits inclusive of multilayer interfacing may also be diagnosed as approaches of distributing uncompromised networking gateways to authorized ports. Source (Educba et al 2020) 1. Routing Protocols 1.1 Introduction to Routing Protocols The definition of routing protocols is based on components or instead of a protocol that is been applied by a router by way of showing the precise route through which the information is been transferred. It suggests how routers paintings in a network and most importantly the way to share statistics primarily based on those adjustments, the reason for a routing protocol is that it enables the network to makes drastic changes primarily based on its situations so the decisions that they make won’t be taken into consideration static. Source (Webopedia, 2021) 1.2 Where they are used. They may be specifically used within the distribution of routing information that takes area between routing devices. As this occurs the information will start to exchange primarily based on the situations of the community. therefore it's miles vital to ensure that these packets attain their destination. fortunately, routing protocols are in particular used at the spine considered to specific protocols used on a few sites. they may be normally used for routing within networks that are needed to use across firewalls. Source (Docstore, 2021) 1.3 Why they are important. They are taken into consideration essential because these days community visitors and network complexities are hastily increasing. So basically routing protocols are configured on routers for the cause of replacing routing statistics. it is important because when configuring a community the usage of routing protocols is green, due to the fact it's far essential to understand the capabilities of those protocols and the distinction among every kind. In other, they're of notable help to routers that allows them to pick out the trails that send records between diverse networks. Source (Router freak, 2020) 1.4 Different types of Routing Protocols. In this challenge, there are numerous sorts of routing protocols. they're as follows: • Routing statistics Protocol • indoors Gateway Protocol • Open Shortest route First • outdoors Gateway Protocol • enhanced interior Gateway Routing Protocol • Border Gateway Protocol • Intermediate machine-to-Intermediate system 1.4.1 Description of different types of Routing Protocol Routing statistics Protocol – that's regularly recognised to be the amount one protocol to be created because it's been applied in foremost networks, but it also runs on the appliance layer of the OSI model. the most problem of RIP is that it's a most hop count number of 15 which makes it unsuitable for giant networks. Interior Gateway Protocol – this is often frequently considered as a distancevector protocol and became built on the foundations laid down. This certain protocol uses metrics like bandwidth, delay and reliability. however, it is the option to suit the viability of routes inside the community. IGRP is proper for larger networks because it proclaims updates every 90 seconds and features the foremost hop matter of 255. this allows it to sustain larger networks than a protocol like RIP. IGRP is moreover extensively used because it's proof against routing loops as it updates itself routinely while modifications occur within the community. Open Shortest direction First – is a hyperlink state IGP it's taken into consideration for IP networks using this certain algorithm. It’s accustomed calculate the shortest direction to confirm green transmission of packets. It additionally keeps databases that contain facts approximately the encircling topology of the community. This sure protocol uses the Dijkstra algorithm to recalculate network paths when the topology adjustments. It’s additionally enormously comfy because it's scalable to big environments Outdoors Gateway Protocol – this protocol is used to alter facts between gateway hosts that connect one another with the use of self-sustaining systems. As a result, it presents a forum for routers to share information throughout distinct domain names. the foremost example of EGP is that the online itself. thus the routing desk of this protocol consists of routers and different gadgets. it works via keeping a database of within sight networks and paths that are able for them to realize. the knowledge is shipped to related routers, once the expertise is been reached, they require the prospect to switch their routing tables and undertake extra informed route choice for the duration of the community Better indoors Gateway Routing Protocol – this can be mostly a distance vector routing protocol that's used for IP networks, which is usually the proprietary of Cisco because it becomes designed to go with the first protocol. The aim of this protocol is that routers take records from different routing tables and data them. This protocol is furnished the sort of capabilities it's needed to maximise efficiency. consequently, packet transmissions are tailor-made easier thanks to the actual fact routes are recalculated to rush up the convergence system Border Gateway Protocol – this is often understood because of the actual fact the routing protocol of the online truly is classed as a distance route vector protocol. this type of set of rules is chosen due to the fine routes for packet switches. the foremost effective direction choice algorithm is commonly customized by way of adjusting the BGP cost network characteristic. BGP could make routing selections based on elements like weight, nearby desire, domestically generated. it's the potential of sending statistics when something is considerably modified. As a result, there could also be no vehicle discovery of topology changes which indicates that the patron possesses to configure BGP manually. In terms of safety, BGP protocols are regularly authenticated so bestaccredited routers can exchange facts with each other. Intermediate system-to-Intermediate device – is known as a hyperlink nation, or IP routing protocol that's used on the web to ship IP routing statistics. This positive protocol makes use of a modified model of the Dijkstra algorithm and most significantly compromises of various tiers of additives that have stop structures and domains. Source (Comparitech, 2020) 2. Design of a new Routing Protocol 2.1 Introduction to your design. Designing and architecting new routing protocols is an upscale mission because they are complicated structures managing dispensed network kingdoms, as a way to make and maintain the routing databases. existing routing protocol implementations are compact, bundling collectively a database, an ultimate direction calculation algorithm and a community state distribution mechanism. This paper intends to provide a middlewarebased technique for designing and coping with routing protocols supported by the notion of decomposing routing protocols into essential constructing blocks and identifying the function of each aspect, and also to endorse a framework for composing dynamically new routing protocols using a distributed item platform. consequently, A routing protocol permits the verbal exchange nodes of various networks to alternate records a good way to update and maintain routing tables. Documented samples of routing protocols are RIP, IGRP, EIGRP, and OSPF. The routers are successful to support a couple of unbiased routing protocols and maintain forwarding tables for several routed protocols. This consists of routing table sizes, convergence times, and failure detection. 2.2 Calculating Cost 2.2.1 How your routing protocol calculates cost? Every routing protocol uses an algorithm to calculate the only path to a destination. Moreover, every routing algorithm uses metrics to calculate path costs. Metrics are simply values, like hop count, bandwidth, delay, reliability and cargo. The metrics used depend on the routing protocol. as an example, RIP uses the hop count metric only. IGRP uses bandwidth and delay by default although it's often configured to use other metrics too 2.2.2 Present a formula and explain it if appropriate. Cost Calculation K1(bandwidth)- 1 K2(load)- zero K3(put off) -1 K4(reliability)- zero K5(MTU)-0 As simplest bandwidth and put off is used to calculate the fee. The formulation used for fee calculation is: EIGRP Metric = 256*((K1*Bandwidth) + (K2*Bandwidth)/(256-Load) + K3*put off)*(K5/(Reliability + K4))) As values of K1 and K3 are set to at least one, and K2, K4 and K5 are set to 0. therefore the formula turns into: Metric = 256*( Bandwidth +Sum of all postpone) wherein the bandwidth = (10^7/least bandwidth) and postpone = (sum of all delays /10) 2.3 Packet Headers Figure 1 IPv4 packet header 2.4 Operation Not like traditional DV protocols like RIP and IGRP, EIGRP wouldn't trust periodic updates: routing updates are despatched only there's a trade. when a path is misplaced, the updates stop; the invalid and flush timers grow and develop (the timers aren't reset), and, within the future, the direction is flushed from the routing table. this method of convergence assumes periodic updates. EIGRP’s approach has the advantage that community resources aren't consumed with the help of periodic updates. but, if a router dies, taking away all its downstream routes, how might EIGRP detect the loss of these routes? EIGRP relies on small hey packets to determine neighbour relationships and to come back across the shortage of a neighbour. EIGRP uses reliable transmission for all updates between buddies. buddies renowned the receipt of updates, and if an acknowledgement isn't acquired, EIGRP retransmits the update. EIGRP uses the Diffusing update set of rules (twin) for all route computations. dual’s convergence times are an order of magnitude but those of conventional DV algorithms. twin can comprehend such low convergence times by way of maintaining a desk of loop-unfastened paths to every country, moreover to the least-value direction. EIGRP relies on neighbour relationships to reliably propagate routing desk changes throughout the community; routers end up to be pals after they see every other's hey packets on a classy network. EIGRP sends hey packets every 5 seconds on high bandwidth hyperlinks and each 60 seconds on low bandwidth multipoint hyperlinks. Source (Cisco, 2020) 2.4.1 Overhead Protocol overhead refers to metadata and community routing data despatched by a utility, which makes use of some of the available bandwidth of a protocol. These facts, making up the protocol headers and alertness-particular records is referred to as overhead since it would not contribute the content material of the message. inside the similar way at some stage in a network, when nodes trade Routing information using an equal bandwidth hired utilizing information packets, incur overhead to the community cited as Routing overhead as this records packets are exchanged periodically in certain intervals of it slow. One most of the examples are often the hey packets or the preserve alive packets which are not the info packets, however, devour the bandwidth of the community inflicting overhead to the community. Source (Quora, 2020) How much data is transmitted from each packet? EIGRP is based on neighbour relationships to reliably propagate routing table adjustments at some stage in the network; two routers turn out to be neighbours after they see every different's good day packets on a widespread community. EIGRP sends howdy packets every five seconds on excessive bandwidth links and every 60 seconds on low bandwidth multipoint links. Security Routing safety has obtained various degrees of attention during the last several years and has nowadays begun to draw extra attention mainly around Border Gateway Protocol (BGP) on the overall public internet. regardless of this new attention, however, the earth maximum hospitable attack is typically not the net's BGP tables the routing systems within your company community. because of the variability of sniffing-based assaults, an employer routing infrastructure can certainly be attacked with man-in-the-centre and other attacks designed to corrupt or trade the routing tables. Layer 3 device (both router or layer 3 transfer) unearths the simplest direction between the source and playground community. Dynamic routing protocols are accustomed decrease administrator overhead, i.e., administrator ought to configure less but by default, all the routing records are visible to any or all or any interesting events because it is not encrypted consequently hospitable an assault. We’ll cosy the routing protocols like RIP, EIGRP and OSPF via placing an authentication thereto via developing a key chain and apply it to the interface on which we're advertising and marketing the routes. here, we'll not show protocol rather we'll place authentication on RIP, EIGRP and OSPF. Source (Geeks4Geeks, 2020) How does Security operate? As Layer three routing turns more widely used, it offers the potential to carry the intelligence to the threshold of the network – at each node. A Layer 2 transfer works at the records layer (Layer 2) of the IP stack while a Layer 3 router works on the network layer (Layer3). when using Layer 2 switching, all broadcast facts packets are forwarded for the duration of the community besides filters are applied. maximum Layer 2 switches use MAC addresses to connect amongst gadgets however those need to be learnt over the complete community at the beginning of a consultation. in Layer three global, there is intercommunication among networks, routers and customers both locally and at a long way off places. These communications allow intelligence to be brought to each router to make sure community traffic is greater efficiently routed. Layer three routers allow granular site visitors management to be set at a person, tool and alertness stage. now not handiest can finely tuned visitors priorities may be set, precision price limiting, congestion control and interference avoidance protect in opposition to community incidents capable of bringing networks to a halt. This allows for more 'genuine positioned’ better steady records fees – at some stage in the network with decreased elements of failure. Layer three protocols are dynamic once finished. A properly designed and accomplished Layer three community additionally allows the administrator to installation automatic self-healing routes for data to allow close to real-time recuperation of communications must one tool fail. but, with the aid of imposing Layer three routing at the threshold, the community will advantage from stepped forward safety, availability and bandwidth usage. Source (Data Sat, 2020) 3. Make informed judgements relating to diverse networking algorithms KS1, KS4, KS6, KS7, KS10 Charge, hop test, throughput, load balance, defer, jitter, realities switch potential, bundle setback expense, etc are the most show pointers for guiding assessment. traditional coordinating estimations' appraisal estimations are overwhelmingly remoted into fragments. One is for the need of the company's chic help fine, for instance, take off the check, throughput, esteem, load security, move pace, etc, and the other is for the essential of businessbased records transmission top calibre, for example, delay, jitter, speed of package mishap, etc most extreme coordinating estimations work on something like one estimation for the overall idea of the venture's administration or enrich the general idea of the administration, given that some transmission quality is met. considering every association has unmistakable transmission top-notch necessities, an enormous part of the ebb and accept the way things are steerage estimations are not learned with the guide of a ton assessment roughly how various offices with a particular business undertaking yield guarantee can improve transmission. As affiliation hundreds are progressed, the 2 estimations require a more prominent broadened strolling time than other customary computations. Our proposed estimations are thusly more legitimate for systems that need additional factors through factor investigate results, higher execution of equipment, and subtleties that aren't extremely high bit by bit. some other trouble to be addressed later on is the way to manufacture a multi-objective computation with decline unusualness and quicker execution. the issue of high computational eccentrics might be settled as the preparing limitation of framework gadgets creates. In like manner, the business of passed on multi-controller plans in SDN may address the trouble of exorbitant overhead oversee planes with the augmentation of the partnership size. in the paper, our proposed coordinating computations are normal for SR in SDN. it's far in a like manner achievable to loosen up our approach to address normal scattered organizations and organizations that don't utilize SR. Our proposed coordinating computation can be applied inside the way figuring of typically dispersed organizations. The common run period of different estimations. the 2 coordinating computations that we exhort need longer strolling events than various ordinary estimations. To find the right plan, the MOPSO estimation requires some emphasis. besides close to settling on the ideal OK ways, our computation adds the way assessment degree, which isn't constantly communicated sooner than through exceptional estimations. inside the proposed set of rules 2, the high-level MOPSO computation enhancements the simultaneous speed look for adequacy simultaneously as propelling the association masses. It requires a couple of speculation for the proposed set of rules 2 than for the proposed set of rules 1. the two estimations that we proposed to require more noteworthy estimation and augmentation of the control aeroplane's computational diverse nature. at any rate, the computational multifaceted design of control planes might be facilitated with the improvement of the managing limitation of framework contraptions and the usage of dispersed multi-controllers in SDN. 4. Compare and contrast existing and emergent networking technologies KS1 – KS10 Conventional network architectures are ill-proper to fulfil the requirements of today’s companies, carriers, and give up users. thanks to a huge industry attempt spearheaded by using the Open Networking basis (ONF), software- described Networking (SDN) is reworking networking structure. within the SDN structure, they manipulate and information planes are decoupled, community intelligence and state are logically centralized, and the underlying community infrastructure is abstracted from the applications. As a result, organisations and carriers advantage extraordinary programmability, automation, and network control, allowing them to build surprisingly scalable, bendy networks that simply adapt to converting enterprise needs. Networking generation thus far has consisted largely of discrete units of protocols designed to connect hosts reliably over arbitrary distances, hyperlink speeds, and topologies. to fulfil commercial enterprise and technical desires over the last few long time, the enterprise has developed networking protocols to supply higher overall performance and reliability, broader connectivity, and more stringent security. Protocols tend to be described in isolation, but, with every fixing a particular hassle and without the advantage of any essential abstractions. This has led to one of the primary barriers of today’s networks: complexity. as an instance, to add or pass any tool, IT need to contact a couple of switches, routers, firewalls, web authentication portals, etc. and update ACLs, VLANs, nice of services (QoS), and other protocol-primarily based mechanisms using devicelevel management equipment. in addition, network topology, dealer switch version, and software model all have to be taken under consideration. due to this complexity, today’s networks are exceedingly static because it seeks to limit the risk of service disruption. The static nature of networks is in stark assessment to the dynamic nature of today’s server surroundings, where server virtualization has significantly extended the wide variety of hosts requiring network connectivity and essentially altered assumptions approximately the physical location of hosts. before virtualization, applications resided on a single server and in most cases exchanged visitors with pick out customers. these days, packages are distributed throughout multiple digital machines (VMs), which alternate site visitors flows with every other. VMs migrate to optimize and rebalance server workloads, inflicting the physical stop factors of current flows to alternate (from time to time unexpectedly) over the years. Conclusion Based totally on the routing protocols, it helps us to advantage higher know-how of every routing protocol’s metric calculations. based on this mission we realise that EIGRP has the quickest convergence for all network topologies. As a result, EIGRP utilizes the bandwidth, while RIP sends full routing facts through periodic updates, which floods the network and unnecessarily wastes bandwidth. consequently, the fine desire is EIGRP for all community topologies which might be applied as it has a quick convergence that efficiently utilizes bandwidth Network Design Device R1 Interface G0/0 IP Address 172.sixteen.1.1 Subnet Mask 255.255.255.0 R2 S0/0/zero S0/zero/1 G0/0 172.16.3.1 255.255.255.252 192.168.10.five 255.255.255.252 172.16.2.1 255.255.255.0 N/A N/A N/A R3 S0/zero/0 S0/0/1 G0/zero 172.sixteen.3.2 255.255.255.252 192.168.10.nine 255.255.255.252 192.168.1.1 255.255.255.zero N/A N/A N/A PC1 S0/zero/zero 192.168.10.6 255.255.255.252 S0/zero/1 192.168.10.10 255.255.255.252 NIC 172.sixteen.1.10 255.255.255.0 N/A N/A 172.16.1.1 PC2 NIC 172.sixteen.2.10 255.255.255.0 172.16.2.1 PC3 NIC 192.168.1.10 192.168.1.1 255.255.255.zero Figure 2 Addressing table component 1: Configure EIGRP Default Gateway N/A part 2: affirm EIGRP Routing history On this activity, you'll put in force simple EIGRP configurations including network commands, passive interfaces and disabling automatic summarization. you'll then affirm your EIGRP configuration using a spread of show commands and testing give up-to-cease connectivity. component 1: Configure EIGRP Step 1: permit the EIGRP routing technique. allow the EIGRP routing procedure on each router the usage of AS number one. The configuration for R1 is shown. R1(config)# router eigrp 1 R2(config)# router eigrp 1 R3(config)# router eigrp 1 what is the variety of numbers that may be used for AS numbers? 1 – 65,535 Step 2: put it up for sale directly connected networks. Use the show ip course command to display the without delay linked networks on each router. how can you inform the distinction between subnet addresses and interface addresses? Subnets are identified with a “C” and link addresses are diagnosed with an “L”. On every router, configure EIGRP to market it the precise without delay connected subnets. The configuration for R1 is shown. R1(config-router)# community 172.16.1.zero zero.0.0.255 R1(config-router)# community 172.sixteen.three.zero zero.zero.zero.3 R1(config-router)# community 192.168.10.four zero.0.zero.3 R2(config-router)# network 172.sixteen.2.0 zero.0.0.255 R2(config-router)# network 172.sixteen.3.0 zero.zero.zero.three R2(config-router)# community 192.168.10.8 zero.zero.zero.three R3(config-router)# network 192.168.1.zero 0.zero.0.255 R3(config-router)# network 192.168.10.4 zero.0.zero.three R3(config-router)# network 192.168.10.8 0.zero.0.three Step 3: Configure passive interfaces. Configure the LAN interfaces to no longer put it on the market EIGRP updates. The configuration for R1 is proven. R1(config-router)# passive-interface g0/zero R2(config-router)# passive-interface g0/zero R3(config-router)# passive-interface g0/0 Step 4: Disable computerized summarization. The topology includes discontiguous networks. consequently, disable computerized summarization on each router. The configuration for R1 is proven. R1(config-router)# no automobile-summary R2(config-router)# no automobile-summary R3(config-router)# no car-summary observe: previous to IOS 15 vehicle-summary had to be manually disabled. Step five: store the configurations. part 2: verify EIGRP Routing Step 1: look at neighbour adjacencies. Which command displays the acquaintances located by way of EIGRP? display ip eigrp acquaintances All 3 routers have to have two neighbours indexed. The output for R1 need to appear much like the following: IP-EIGRP acquaintances for system 1 H deal with Interface maintains Uptime SRTT RTO Q Seq (sec) (ms) Cnt Num zero 172.sixteen.3.2 Se0/zero/zero 14 00:25:05 forty one thousand 0 28 1 192.168.10.6 Se0/zero/1 12 00:thirteen:29 forty one thousand zero 31 Step 2: show the EIGRP routing protocol parameters. What command displays the parameters and other statistics approximately the contemporary country of any active IPv4 routing protocol approaches configured on the router? display ip protocols On R2, input the command you listed for 2a and solution the subsequent questions: how many routers are sharing routing statistics with R2? 2 where are these records located underneath? Routing statistics resources what's the most hop count? a hundred Step 3: affirm cease-to-give up connectivity PC1, PC2 and PC3 ought to now be able to ping each different. If no longer, troubleshoot your EIGRP configurations. Suggested Scoring Rubric hobby segment question place possible factors Earned points hobby segment question place possible factors Earned points component 1: Configure EIGRP Step 1 2 component 1: Configure EIGRP Step 2a 2 Step 2a component 1 total 4 element 2: verify EIGRP Routing Step 2a Step 2b Step 1a 5 element 2: verify EIGRP Routing five Step 2a 6 Step 2b part 2 general 16 Packet Tracer rating 80 total rating one hundred Figure 3 Suggested scoring rubric References Lindokuhle Dlamini. 2020. Introduction to Routing Protocols - Lindo Kuhle Dlamini Medium. [ONLINE] Available at: https://medium.com/@dlindokuhle8/introduction-to-routingprotocolsd1718638af8d. [Accessed 20 July 2021]. NETWORK CHEF BD. 2020. Introduction to Routing Protocols - NETWORK CHEF BD. [ONLINE] Available at: https://networkchefbd.com/routing-protocols/. [Accessed 20 July 2021]. Routing Protocol - an overview | Science Direct Topics. 2020. Routing Protocol - an overview |Science Direct Topics. [ONLINE] Available at: https://www.sciencedirect.com/topics/computer-science/routing-protocol. [Accessed 20 July 2021]. Wikipedia. 2020. Routing protocol - Wikipedia. [ONLINE] Available at: https://en.wikipedia.org/wiki/Routing_protocol. [Accessed 20 July 2021]. Introduction to Routing Protocols | Cumulus Linux 4.0. 2020. Introduction to Routing Protocols | Cumulus Linux 4.0. [ONLINE] Available at: https://docs.cumulusnetworks.com/cumulus-linux/Layer-3/Introduction-to-RoutingProtocols/. [Accessed 20 July 2021]. Router Freak. 2020. Routing Protocols explained, and how to choose and use them. [ONLINE] Available at: https://www.routerfreak.com/understanding-networkroutingprotocols/. [Accessed 20 July 2021]. Routing protocols. 2020. Routing protocols. [ONLINE] Available at https://studyccna. com/routing-protocols/. [Accessed 20 July 2021]. Comparitech. 2020. Routing Protocol Types - The Ultimate Guide (The Essentials!). [ONLINE] Available at: https://www.comparitech.com/net-admin/routing-protocoltypesguide/. [Accessed 20 July 2021]. What is routing protocol? Webopedia Definition. 2020. What is routing protocol? Webopedia Definition. [ONLINE] Available at: https://www.webopedia.com/TERM/R/routing_protocol.html. [Accessed 20 July 2021]. PCMag. 2020. Definition of routing protocol | PCMag. [ONLINE] Available at: https://www.pcmag.com/encyclopedia/term/routing-protocol. [Accessed 20 July 2021]. Bayt.com. 2020. Disadvantages of EIGRP Protocol? - Bayt.com Specialties. [ONLINE] Available at: https://specialties.bayt.com/en/specialties/q/351245/disadvantages-ofeigrpprotocol/. [Accessed 20 July 2021]. Bayt.com. 2020. What is the advantage of the EIGRP protocol? - Bayt.com Specialties. [ONLINE] Available at: https://specialties.bayt.com/en/specialties/q/286817/what-istheadvantageof-eigrp-protocol/. [Accessed 20 July 2021]. 7 things that you should know about Layer 3 | Datasat Communications. 2020. 7 things that you should know about Layer 3 | Datasat Communications. [ONLINE] Available at: http://www.datasat.com/information/2014/datasat-layer-3.php. [Accessed 20 July 2021]. Geeksforgeeks. 2020. Securing Routing Protocols - Geeksforgeeks. [ONLINE] Available at: https://www.geeksforgeeks.org/securing-routing-protocols/. [Accessed 20 July 2021]. Search Security. 2020. Routing protocol security. [ONLINE] Available at: https://searchsecurity.techtarget.com/tip/Routing-protocol-security. [Accessed 20 July 2021]. What is routing overhead? - Quora. 2020. What is routing overhead? - Quora. [ONLINE] Available at: https://www.quora.com/What-is-routing-overhead. [Accessed 20 July 2021]. Cisco. 2020. Enhanced Interior Gateway Routing Protocol - Cisco. [ONLINE] Available at: https://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routingprotocoleigrp/ 16406-eigrp-toc.html. [Accessed 20 July 2021].