Ass 4 Fatima
Ass 4 Fatima
Ass 4 Fatima
PROGRAM: BSSE
SEMESTER: 4TH
SECTION: U
SAP ID:70129779
WHAT IS ROUTING PROTOCOL?
Distance vector routing protocols are protocols that use distance to work out the
best routing path for packets within a network.
These protocols measure the distance based on how many hops data has to pass
to get to its destination. The number of hops is essentially the number of routers
it takes to reach the destination.
Link state protocols take a different approach to finding the best routing path in
that they share information with other routers in proximity. The route is
calculated based on the speed of the path to the destination and the cost of
resources.
Link state routing protocols use an algorithm to work this out. One of the key
differences to a distance vector protocol is that link state protocols don’t send out
routing tables; instead, routers notify each other when route changes are
detected.
Routers using the link state protocol create three types of tables; neighbor
table, topology table, and routing table. The neighbor table stores details of
neighboring routers using the link state routing protocol, the topology table
stores the whole network topology, and the routing table stores the most
efficient routes.
IGPs
IGPs are routing protocols that exchange routing information with other routers
within a single autonomous system (AS). An AS is defined as one network or a
collection of networks under the control of one enterprise. The company AS is
thus separate from the ISP AS.
Distance vector routing protocols are protocols that use distance to work out the
best routing path for packets within a network.
These protocols measure the distance based on how many hops data has to pass
to get to its destination. The number of hops is essentially the number of routers
it takes to reach the destination.
Link state protocols take a different approach to finding the best routing path in
that they share information with other routers in proximity. The route is
calculated based on the speed of the path to the destination and the cost of
resources.
Link state routing protocols use an algorithm to work this out. One of the key
differences to a distance vector protocol is that link state protocols don’t send out
routing tables; instead, routers notify each other when route changes are
detected.
Routers using the link state protocol creates three types of tables; neighbor
table, topology table, and routing table. The neighbor table stores details of
neighboring routers using the link state routing protocol, the topology table
stores the whole network topology, and the routing table stores the most
efficient routes.
IGPs
IGPs are routing protocols that exchange routing information with other routers
within a single autonomous system (AS). An AS is defined as one network or a
collection of networks under the control of one enterprise. The company AS is
thus separate from the ISP AS.
EGPs
On the other hand, EGPs are routing protocols that are used to transfer routing
information between routers in different autonomous systems. These protocols
are more complex and BGP is the only EGP protocol that you’re likely to
encounter. However, it is important to note that there is an EGP protocol named
EGP.
Pros:
Cons:
Open Shortest Path First or OSPF protocol is a link-state IGP that was tailor-made
for IP networks using the Shortest Path First (SPF) algorithm. The SPF routing
algorithm is used to calculate the shortest path spanning-tree to ensure efficient
data transmission of packets. OSPF routers maintain databases detailing
information about the surrounding topology of the network. This database is
filled with data taken from Link State Advertisements (LSAs) sent by other
routers. LSAs are packets that detail information about how many resources a
given path would take.
OSPF also uses the Dijkstra algorithm to recalculate network paths when the
topology changes. This protocol is also relatively secure as it can authenticate
protocol changes to keep data secure. It is used by many organizations because
it’s scalable to large environments. Topology changes are tracked and OSPF can
recalculate compromised packet routes if a previously-used route has been
blocked.
Pros:
Efficient Routing: Utilizes the Shortest Path First (SPF) algorithm to ensure
optimal data packet transmission.
Detailed Network Insight: OSPF routers maintain a database on the
network’s topology, offering a detailed perspective on its structure.
Dynamic Adaptability: Employs the Dijkstra algorithm to dynamically adjust
to network topology changes, ensuring continuity in data transmission.
Security Features: Offers protocol change authentication to maintain data
security, ensuring that only authorized updates are made.
Highly Scalable: Suitable for both small and large-scale network
environments, making it versatile for various organizational sizes.
Cons:
The reason why this protocol has fallen out of favor is that it doesn’t support
multipath networking environments. The EGP protocol works by keeping a
database of nearby networks and the routing paths it could take to reach them.
This route information is sent on to connected routers. Once it arrives, the
devices can update their routing tables and undertake more informed path
selection throughout the network.
Pros:
Cons:
Pros:
Cons:
Border Gateway Protocol or BGP is the routing protocol of the internet that is
classified as a distance path vector protocol. BGP was designed to replace
EGP with a decentralized approach to routing. The BGP Best Path Selection
Algorithm is used to select the best routes for data packet transfers. If you don’t
have any custom settings then BGP will select routes with the shortest path to the
destination.
BGP only sends updated router table data when something changes. As a result,
there is no auto-discovery of topology changes which means that the user has to
configure BGP manually. In terms of security, BGP protocol can be authenticated
so that only approved routers can exchange data with each other.
Pros:
Cons:
Under IS-IS routers are organized into groups called areas and multiple areas are
grouped together to make up a domain. Routers within the area are placed with
Layer 1 and routers that connect segments together are classified as Layer 2.
There are two types of network addresses used by IS-IS; Network Service Access
Point (NSAP) and Network Entity Title (NET).
Pros:
Cons: