The protocol I chose to write about is the Border Gateway Protocol because it is the main protocol used to operate the internet and recommended protocol for Cisco design certifications. The BGP protocol is an inter-autonomous protocol; which means it is for connecting separate large networks, such as a college network to a corporate network or the internet. Due to the large number of routes and connection this protocol must manage; it uses very many features, or attributes, to achieve this. Cisco defines these attributes as weight, local preference, multi-exit discriminator, origin, AS_path, next hop, and community. These attributes are used to discover networks and determine the best path to use for sending packets to those networks. BGP was designed in accordance with RFC 1771, which was started in October of 1991 and published in March of 1995. In January of 2006 RFC 1771 was made obsolete by RFC 4271 which contains the updated information about BGP. These RFCs, along with a quite a few more, describe the design and operation of BGP. Cisco uses a much smaller paper to give a bas...
Geographic-based routing protocols: the protocol require the full-dimensional location information as the precondition. There are some popular protocols like Vector-Based Forwarding (VBF)[2] protocol. (section 3)
[3] The Design Philosophy of the DARPA Internet Protocols by David D. Clark [M.I.T. Laboratory for Computer Science]
Growing up I would see how people would make fun of my father's English because he would speak very broken English it would upset me that people would make fun of someone for the way they spoke. I would also always be asked if I was from mexico and How it was to hop the border. I would eventually start to ignore them because I know there's nothing wrong with being different and that we all need to accept each other no matter how we talk or where we come from. We are all human beings after all.
The Border Gateway Protocol (BGP) is responsible for communication between different Autonomous Systems (AS). The Internet is comprised of a large number of Autonomous Systems (AS) and exchanging routing information between two or more AS is achieved using BGP. Inter-domain routing in the Internet is carried out majorly by one protocol – Border Gateway Protocol (BGP). BGP is a distance-vector protocol and uses TCP as its underlying mechanism.
TCP/IP is a two-layer program. The higher layer is Transmission Control Protocol. TCP manages the assembling of a message or file into smaller packets. The smaller packers are transmitted over the Internet. Then, the packers are received by a TCP layer that reassembles the packets into the original message. Internet Protocol is the lower layer. IP handles the packet’s address. IP makes sure that the packet gets to the right destination. Each gateway computer on the network checks the address to see where it should forward the message. A message has packets that are routed differently than other packets in the message; however, they will be reassembled at the destination. (“What Is TCP/IP”)
Finally, a significant number of Mexican children cross the international border from Mexicali to Calexico, California daily for school. “A few blocks east of the border crossing, in clear view of the fenced barricade that separates Mexico and the United States, is the Calexico Mission School, a four-hundred-student private school associated with the Seventh Day Adventist Church” (Amaral, 2004) “Approximately 85 percent of students in this K-12 school are from Mexicali; they cross the border daily from Mexico to the United States and back again” (Collins, 2014). In mid-afternoon, dozens of students, some walking alone and some in groups can be seen approaching the border crossing. Also, some mothers, grandmothers, aunts or neighbors approach the border crossing with one or more younger children in tow.
The OSI network reference model was developed by the International Organization for Standardization (ISO) to facilitate communication between networks by keeping certain standards open rather than proprietary (Serpanos & Wolf, 2011). Each layer is stacked with the physical layer as the lowest and the application layer as the highest and one can think of each layer as containing stacks of protocols that make network communications function (Serpanos & Wolf, 2011). A protocol is a set of rules written in a common language that allows computers to communicate with each other. Each communication network is a node and the corresponding layer on each node communicates with each other.
An Open Shortest Path First (OSPF) protocol is the most used interior gateway protocol and computation intensive protocol where energy consumption in Internet Protocol (IP) networks is the main concern. The energy in an IP network can be saved by allowing a subset of IP router interfaces on sleep mode setting during the low traffic hours through the model of “move” by dint of an Energy Aware Routing (EAR) strategy, which is completely compatible with OSPF and is based on the “Shortest Path Tree (SPT) exportation” techinque or “Dijkstra's Algorithm”. In case of heavy traffic hours, the EAR strategy is not usable and may cause denial of service. The strategy implemented can help a network operator to control the network performance and allow a smoothed QoS degradation. This performance evaluation study permits to save about 30% of network links with a insignificant rise of link loads and network path lengths.
The latest version of the Internet protocol which we should be implemented is IPv4, also known as the TCP/IP structure. The reason why IPv4 is referred to as TCP/IP for the first two main protocols, out of its suite of protocols, which were developed by United States Defense Advanced Research Project Agency, also known as DARPA around the 1970s (Kozierok, 2005). ...
Perhaps the most redundant, fault-tolerant of all network topologies is the mesh LAN. Each node is connected to every other node for a true point-to-point connection between every device on the network.
Next, the writer goes over the second type of network architecture - the TCP/IP reference model, the granddaddy of the wide area computer network. This architecture allows the connection of multiple networks seamlessly. The architecture is flexible and capable of running even if some of the subnet hardware is destroyed or non-functional as long as the source and destination machines are functioning. In a similar fashion to the OSI model, the TCP/IP model has layers as well. In this case, we have four layers: the link
There are many types of routing or data/packet retransmitting hardware and devices that networks can utilize for security purposes. Some use one or a combination for data transfer. However, each poses a level or type of vulnerabilities, additional unwanted threats, and countless types of risk. The quintessential design is to provide a means to controlling the flow of packet transfer. The main function of the switch, router, gateways, or hubs is having the ability to process and forward data packets on the network. The creation and function is to ensure that each having their own unique functions and configurations which makes one a more viable optional choice over the next for ensuring data forwarding. For example, large networks will need routing protocols that will send the data packet to the intended destination and not broadcast it throughout the entire network.
Explain how the two important transport protocols deliver messages on behalf of the application and discuss the differences between them
A community protocol is a system for which people can engage and communicate with other