INTERNET TECHNOLOGIES AND BENEFITS

QUESTION

 

Assignment Brief                                                                               (Assignment 1)

 

Foundation Degree in Computer Network Management

 

Module: Unit 5 – Internet Technologies

Assignment 1

50%

Assignment Type: Summative

Timed Test

50%

Assignment Title: Enigma Media Resources

Complete

100%

Words or equivalent: 2,500

Version

2012

Date Set: 01/03/2012 Draft Submission: 10/05/2012
Tutor Name(s):   Deadline: 24/05/2012

 

 

 

 

 

Relevance of this assignment to your Personal Development Plan:

As you work through this assignment, record in your PDP how you plan to

  • Develop your skills in relation to seeking information on your assignment
  • Develop your existing skills or acquire new competencies in research techniques
  • On completion of the assignment, record your reflections on your own learning, performance and achievement in your PDP

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Marking Guidelines

 

Pass:

 

A Pass grade is achieved by carrying out all of the requirements described in the tasks below and ensuring that all assessment criteria specified has been met.

 

 

 

Merit:

 

In order to achieve a merit the student must:

 

Use a range of methods, techniques and sources to collect, analyse and process information relevant to the given problem domain.

 

Distinction:

 

In order to achieve a Distinction the student must:

 

 

 

Check the validity and relevance of complex information that you collect, analyse and process and the techniques used in the completion of the tasks set.

 

 

 

Evaluate and synthesize information relevant to the problem domain and justify valid conclusions in the design, implementation and documentation of the tasks.

 

Show an individual approach to the preparation and coherent presentation of your work and use technical language fluently where appropriate.

 

 

 

 

 

The unit will be assessed overall on the following percentage basis.

 

 

 

Percentage Mark                       Indicative Grade

 

70%  100% ……………………Distinction

 

55%  69% ……………………..Merit

 

40%  54% ……………………..Pass

 

0% – 39% …………………………Referral/Fail

 

 SOLUTION

                                              INTERNET TECHNOLOGIES

                                                  Enigma Media Resources

The Enhanced Interior Gateway Routing Protocol (EIGRP) unites simplicity of customary routing systems with rapid rerouting the abilities of link state protocols, as long as superior competence for fast junction and updates for particular routing. When the system topology changes then the distributed algorithm used with Enhanced Interior GRP takes less than five seconds to provide convergence. This system is similar to convergence that is linked up with etiquettes such as open shortest path first, Novell Link Service Protocol (NLSP), and one intermediate system to other system. In system Enhanced IGRP transfers information that is related to routing when a change takes place. This changed information only can be passed to affected areas.

This Enhanced IGRP ropes only three system protocols such as IP, and Novell internet work package system (IPX). Each of this systems has specific procedure and value added functionality. IP Enhanced IGRP has a support of variable subnet masks (VLSMs). IPX Novell and EIGRP supports additional service advertisement protocol (SAP) inform, eliminates the routing information protocol and provides most favorable path for use. A router that running Apple talk Enhanced IGRP ropes partially, surrounded direction-finding updates and provides load sharing and optimal path usage.

The benefits and considerations that are involved in Integrating enhanced IGRP in to following types of internetwork.

  • The IP- the existing IP system is running IGRP.
  • The Novell IPX – is running with RIP and SAP
  • Apple Talk- The existence apple talk is working with Routing Table Maintenance protocol.

When Enhanced IGRP is integrated in existing networks than planning of phase implementation is to be done. Then adding of enhanced IGRP is to be done at the margin of network by configuring enhanced IGRP on a frontier router on backbone of the core system. Integration of enhanced IGRP has to be done at next part.

Configuring an IGRP network:

IGRP is a network that is related to distance vector routing protocol technique that is designed by Cisco organizations which contains big, randomly complex networks with assorted medium.

 

An autonomous system is a compilation of unified routers which is interconnected with common management control. In general, an autonomous system consists of multiple ip networks which are connected with help of routers. Routes that are originated from one autonomous system to another system are redistributed.

The enhanced IGRP should be added to IGRP to redistribute in sequence between IGRP independent systems 68 into an EIGRP self-directed system 68.

 

 

Route selection

This Enhanced IGRP can be used by three types of routes such as: interior, exterior and summary. EIGRP is an internal route; external routes are which learned from routes that are erudite from a new protocol and redistribution into EIGRP. Summary routes are those routes which are enhanced IGRP which are created vigorously to auto summarized and this course selection is based upon organizational distance. The evasion administrative detachment for enhanced IGRP is 90 for internal, 170 for external, or 5 for summary. The default managerial distance for IGRP is 100 since internal improved IGRP routes takes priority over IGRP routes and these routes are preferred to peripheral enhanced IGRP routes.

The computation of size and default value for IGRP and Enhanced IGRP are same. By evade the complex metrics are sum of section delays and lowest part of bandwidth for a known route. Even though the adjustment of non-payment value can be done with metric commands and the evasion are to be chosen carefully to supply excellent process in most of the networks.

Route Summarization

With IGRP, routing information that is promoted out an interface is repeatedly recapitulated at major set-up boundaries. Particularly, this mechanical summarization takes place for those routes where major arrangement fluctuate from major network of boundary to which advertisement is propel. The routes are the parts of important system number of interfaces that are advertised without any summarization.

The promotion of routing in sequence which is out of Ethernet information 0, IGRP will summarize network that is 128.106.xxxxx and will not summarize network 128.105.xxxx. Therefore the routes for IGRP will be advertised to 128.106.xxxx with a system mask of 255.255xxxxxxxxx and course for 128.105.2.1 with a system mask of 255.255.255.0.

Enhanced IGRP provides same routing information of IGRP because it provides auto summarization. The previous configuration of enhanced IGRP is modified so, redistribution of routing information is not summarized.

There is a sub netted as major system in the IP routing table at this point. Then the advertising out Ethernet interface 0 will be summarized for route 128.107.1.xxxx as 128.107.0.xxxxxxx with a association mask of 255.255.0.0. This enhanced IGRP will be summarized to network 128.107.0.0 and it will summarize to network mask 255.255.255.0. The auto summarization is applied only to the networks that are directly connected, not redistributed. The network 128.107.xxxxxxxx can be recapitulated out of all the interfaces for an enhanced IGRP.

Redistribution between Enhanced IGRP and RIP

Redistribution of RIP in to EIGRP demonstrates a router that is connected to two networks, one of such network uses RIP and other uses EIGRP. The main goal of router is to publish RIP in to an EIGRP and then to publish Enhanced IGRP in to a RIP, which can prevent the happening of route feedback.

 

The process of RIP starts with the help of RIP router. The system configuration command identify that the RIP process to send RIP updates out which are directly connected to the network starting with series 171.xxxxxxxxxx. In this particular case RIP process will throw the updates out of an interface of Ethernet 0 and this not an interface that is in serial with interface 0. This happens since the reflexive interface is applied to interface 0 which is serial to the network. The redistributed router configuration command specifies that routing information from Enhanced IGRP can be promoted to RIP routing information. The non-attendance metric router command grounds to use RIP to similar metric level for all the specific routes that are obtained by the Enhanced IGRP. This default metric helps in solving a problem that is redistributed routes that have an incompatible metrics. The reasonable substitute is used in enabling redistribution of default metric when metrics that are obtained cannot be connected.

The inactive interface of router pattern command disables the transmission of serial interface 0 as an updates. In this present case, the unreceptive command is used in RIP this means that router doesn’t have any scope of sending the updates about the submissive interface. But this router still processes the updates which can receives based on updates that it receives on interface. This means routers are interfaced with routers that are behind the passive interface. The EIGRP is a router with different global configuration commands that start an Enhanced IGRP process and this can be assigned to autonomous system 90.  The network configuration of the router can be specified that Enhanced IGRP process helps in sending updates to process the boundaries that are indirectly connected to the network 171.108.0.0. The details of Enhanced IGRP will be sent to updates on interface that is serial 0 and then interface of Ethernet 0 because of the inactive interface command that are applied to Ethernet commands.

IP network

The assimilation of enhanced IGRP in to an internetwork of IGRP is of two types: Changing an IGRP network and accumulating enhanced IGRP in to a system. The key consideration of combination of enhanced IGRP into a consecutively IGRP are as follows:

  • Assortment of routes
  • System handling
  • Redeployment of IGRP to improved IGRP and
  • Route summarization

IP Subnetting scheme

The class B area is divided in to 500 open shortest paths first (OSPF) for this purpose the area is assumed to be class B with the network address 150.100.0.0. The address space of two 512 areas are defined with the base of 150.100.2.0. Design of entire address space of 150.100.0.0 will require hundreds of additional pages for addressing information. Each of this area would require an equal number of entities.

Consider the network that consists of end to end links that are in serial through which each area can be assigned to subnet mask that allows two hosts per subnet. All of these subnets allow fourteen hosts per each of subnet. The making use of bitwise subnet and variable length subnet masks helps to permit customization of address space is facilitated to division of address spaces in to grouping that is allowed to grouping of Sub netting along the octet boundaries.  These address layout helps in determination of structured approach that is assigned to variable length subnet mask. There are two subnet masks present in which 255.255.255.240 and 255.255.255.252. The first subnet mask locates address of four bits wide and second subnet mask creates the address space that are of two bits of subnets. The addresses are assigned carefully such that area can be summarized with a single router configuration and the first set of addresses can be summarized in to backbone of commands which are located at starting with the subnet 150.100.2.0xxxxxxx.

                                 

Distribution of these subnets allows in taking decision about drawing line between the subnet and host within each such area. There are seven bits left after the creation of allocation mask that is in particular area. At the left of area mask there are about nine bits which are part of subnet portion that is addressed. By maintaining all of these nine bits which are been same for all the route summarization and address present in the same area and this can be easily gained by routers. The lists of subnet, valid IP address can be designed with the help of assigning addresses. If the requirements are different then large number of subnet are to be chosen and divided into smaller range of host and are combined in to several ranges of host, creating subnets with the help of more hosts. The design approach used in article can describe area of mask boundary and subnet masks that are to be assigned to any point of address space that is located which can provide design flexibility. The change in a specification of each area of mask boundary or subnet masks may be required if a network grow in its initial design space.

The network subnet mask of 255.255.255.240 has two bits together represents the subnet segment of addresses, where the other two bits are together provides a four bits host identifier. The subnet mask 255.255.255.252 has a route summarization that can be easily applied to network.

CDP mapping:

CDP is a layer 2 protocol that has capacity to connect lower physical media and network protocol layers. CDP helps in determining information that is obtained from adjacent Cisco devices such as kind of devices that are associated to the router interface, the connection that is used to make the connection and models of devices that are numbered. CDP is a media and protocol independent that runs with the help of Cisco equipments over the Sub network admittance protocol. This version is the most unconstrained version of protocol and Cisco ISO or later ropes CDPv2. CDP 1 is enables with the help of report 1 that is facilitated by default with Cisco release from 10.3 to 12.0 T.

 

 

CDP have a scope of starting up repeatedly and permits the users to perceive neighbor devices that can use by CDP. This works as a data link layer and allocate two systems through which they can learn about each other by which they can use different layers of procedures.

Every device that is organized sends the message that can be called as classified ad which can be associated directly to advertisements. Each device that is addressed can advertise at least at one protocol which can receive single network management protocol messages. The advertisement helps to hold time information, which indicates the time that is received by CDP information before it has been discarded. Each of this device helps to listen intermittent CDP communication is done to learn about neighbor devices that are present.

The most important use of these devices is to find out all devices that are connected directly to Cisco.  CDP helps in delivering of message to the network administrator and each router using this system will exchange information with neighboring networks that are connected to local routers. The CDP commands are used to enable router globally on particular interface that is located at particular router.

Static Routing

Routing is act of transmitting information from internetwork from source to destination. The category is based on the system that is routed towards the set up and then modified. Non adaptive routing is called as static routing. Static routing helps hardly in meeting of algorithms these are table mappings that are established by network administrator before begin of routing. These routers don’t change until the network administrator alters them in a routing. Algorithms that are used for static routing are easily designed and can be worked well in network environments. Routing decision made in this current system is based on topologies. Because the static routing cannot react to the changes that are made, which are not suitable to today’s large consistently changing networks. Most of the systems that are working are dynamic routing system.

Distance vector

The distance vector routing is shares a knowledge o entire routing system and distribution of information takes place between neighbors. This allocation of data takes place at regular intervals of time. The router using distance vector have two things one is distance the final destination and other is vector or direction as traffic should be controlled. The various uniqueness of distance vector routing includes interrupted updates, neighbors, broad casting modernizes and entire routing table is updated with the help of routers.

This distance vector routing helps in implementation and maintenance. The level of acquaintance that is required to deploy and later to maintain a network is not so high. This routing classically doesn’t require large amount of memory to store the information. They even don’t require large CPU and depending upon the network size and IP addressing that is linked with they even don’t require high level bandwidth. This can be major drawback when distance protocol is deployed in to large networks.

REFERENCES:

  • Prathima, A, 2006, Wireless Communications. Springer.
  • Lye’s B, 2010, Artificial Intelligence Techniques for Networked Manufacturing Enterprises Management, Springer, ISBN 1849961182, 9781849961189.
  • Daoliang, Yande, L, and Yingyi, C, Computer and Computing Technologies in Agriculture IV, Part 2Springer, ISBN 3642183352, 9783642183355
  • Ran C, 2011, Intelligent Computing and Information Science: International Conference, ICICIS 2011 Chongqing, China, January 8-9, 2011 Proceedings, Springer, ISBN 3642181333, 9783642181337.
  • F. Baker,1995, Requirements for IP Version 4 Routers, Standards Track, RFC 1812.

·       Jonathan B, 1982, SIMPLE MAIL TRANSFER PROTOCOL,RFC 821.

·       Reynolds, 1994, Network Working Group, Request for Comments: 1700.

·       Flick, September 2003, Applicability Statement for Reclassification of RFC 1643 to Historic Status, Request for Comments: 3638

·       Jeremy, K, April 26, 2012, Engineers look to fix the weakness of internet routing protocol, Computer world.

·       Business w, April 12 2012, Info world security central, April 27, 2012, IT engineers ponder fix to dangerous Internet routing problem, press release, renesys.

 

·       Stefan Savage, Tom Anderson, Detour: a Case for Informed Internet Routing and Transport, http://cseweb.ucsd.edu/~savage/papers/UW-CSE-98-10-05.pdf.

 

·       Bird internet routing, 2.4.2012, CZNIC, http://bird.network.cz/.

 

·       Timothy, G,Internet routing protocols, 2008, http://www.cl.cam.ac.uk/teaching/0708/AdvSysTop/ASTlecture_01.pdf.

 

·       Cisco 12000 Series Internet Router  Flash Disk Information, 2008, http://www.cisco.com/en/US/docs/routers/12000/12012/maintenance/guide/14024_fd.pdf



LD69

“The presented piece of writing is a good example how the academic paper should be written. However, the text can’t be used as a part of your own and submitted to your professor – it will be considered as plagiarism.

But you can order it from our service and receive complete high-quality custom paper.  Our service offers Technology  essay sample that was written by professional writer. If you like one, you have an opportunity to buy a similar paper. Any of the academic papers will be written from scratch, according to all customers’ specifications, expectations and highest standards.”

Please  Click on the  below links to Chat Now  or fill the Order Form !

 

order-now-new                                     chat-new (1)